Search is not available for this dataset
text
stringlengths
197
632k
id
stringlengths
47
47
dump
stringclasses
1 value
url
stringlengths
14
1.32k
file_path
stringclasses
740 values
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
44
200k
score
float64
1.5
5
int_score
int64
2
5
Sorry, the eBook that you are looking for is not available right now. We did a search for other eBooks with a similar title, however there were no matches. You can try selecting from a similar category, click on the author's name, or use the search box above to find your eBook. Despite a rapid increase in the availability of many forms of gambling, there has been little serious study in the literature of the likely effects. This book seeks to fill that gap by reviewing what is known about gambling in Britain and studying work on the nature, prevalence and possible causes of problem gambling. Drawing on the history and recent British studies on the subject, Gambling and Problem Gambling in Britain gives an in-depth theoretical and practical viewpoint of this subject. Areas covered include: * gambling in Britain since Victorian times * expansion of gambling in the late twentieth century * what we now know about problem gambling and its treatment * a consideration of the future of gambling in Britain. This book will be invaluable for professionals, trainees and academics in the areas of counselling, primary care, probation and social work. Published: 3rd July 2003
<urn:uuid:e82b320f-d79e-4739-848c-4f16f6fe0e2c>
CC-MAIN-2015-35
http://www.booktopia.com.au/ebooks/gambling-and-problem-gambling-in-britain-jim-orford/prod9780203420744.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.935968
236
1.78125
2
There's much more to Salem's history, however, than its infamous witch trials. In the 18th century, for example, it emerged as one of the young nation's most important and wealthiest cities, had one of America's most active seaports, and was a major shipbuilding, fishing, and maritime trade center. Unfortunately, visitors will have a bit of a hard time discovering the full picture of Salem's past until the federal government shutdown ends. The Salem Regional Visitor Center and the Salem Maritime National Historic Site, which are both operated by the National Park Service, are temporarily closed during the shutdown. Fortunately, volunteers and organizations such as Destination Salem are staffing information tables outside the shuttered buildings to help guide visitors. It's important to note that virtually everything else in Salem, including all of the regularly scheduled Haunted Happening events, remain open and operational. Through October 31, 2013 at locations throughout the city.
<urn:uuid:15af8c0e-85d4-42c5-862e-89ff5847ba3d>
CC-MAIN-2015-35
http://www.bostonusa.com/visit/bostoneveryday/huba-huba-blog/post/2013/4/Virtually-All-of-Salem-s-Haunts-are-Happening/1702/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.966315
187
2.328125
2
For some time. several individuals have asked why we don’t just initiate suit against the obviously dishonest tactics and claims by the global warming industry under the Racketeer Influence and Corrupt Organization Act (RICO). This law commissions “private attorneys general” to pursue violations on their own, in essence as proxies for the state. I have explained with intermittent impatience that just serially lying or exaggerating to deceive are not on their face RICO “predicate” offenses. There must be three instances of a certain type of enumerated behavior over ten years to constitute a pattern in violation of RICO. I have received an email from someone who has much appropriate training and experience and which causes me to revisit the issue. He writes, “Well, now it really does look like a massive conspiracy to defraud the government. When I was in law school, one of my profs noted dryly that once in a while the Massachusetts Attorney General would sternly announce ‘we are going to investigate this matter of ____,’ and the sky of Boston would blacken with the smoke of burning documents. I bet there was a blip in electricity use this morning from emails being deleted by the climate change community.” Well, it is certainly true that, on its face this prospect has to be taken seriously barring revelation that words do not actually mean what they appear, in full context of the issue and the email, to mean (which so far has been the principal substantive defense). Fraud is a RICO predicate offense. If what we are seeing unfold is evidence of fraud, a RICO complaint is a possibility, along with what the “discovery” process would reveal. The email and data authors (and massagers, playing “tricks” with the data to “hide the decline” in temperatures) do appear to be true believers in their cause, and often in their data, neither of which is dispositive. They also are candid in ways triggering tortuous arguments explaining how those words don’t really mean what they say. The defenders say the literal readings – that’s plural, not a one-off remark – represent “sinister interpretations” (New York Times), and the implausible is actually the appropriate reading. For example, we’re now, for the first time, told that calling something the researchers did with data a “trick” to “hide the decline” in temperatures is actually very typical application of common lingo about scientific methods purporting to represent findings. This is the first I have encountered in this context a benign meaning for that. This defense might have currency had not the actions in question already been exposed by private investigations and being, in fact, a “trick” “hiding the decline” in temperatures. The U.S. taxpayer has much exposure here in the joint projects and collaborations which operated in reliance upon what the University of East Anglia’s Climate Research Unit was doing, on the data CRU have been denying access to and recently claiming simply, if again implausibly, to have lost. As well as on the taxpayer-funded IPCC process, and the peer-review process addressed in these emails as having been corrupted with a particular outcome in mind. Also, there are U.S. taxpayer-funded offices and individuals involved in the machinations addressed in the emails, and in the emails themselves. The plain reading of what has been revealed so far, if the documents are indeed authentic as a blanket admission yesterday seemed to make clear, does give the appearance of a conspiracy to defraud, by parties working in taxpayer funded agencies collaborating on ways to misrepresent material on which an awful lot of taxpayer money rides. In fact, their centers and careers and reputations ride on there being a “global warming” crisis, or at least there being some semblance of acceptance thereof. I am not yet drawing conclusions on this, but all of the above is food for thought. I will look into this further when I’m back from travel and able to give it some attention, as will some colleagues. We also must confront the truth hinted at by the jibe about the massive email deleting that has surely taken place in the past 72 hours. The ability to permanently delete such material, and codes and other files, is not something I am at all expert in, but an issue on which the viability of pursuing any such actions would hinge. So, hopefully more later.
<urn:uuid:a9baf822-530b-4f46-9e99-7104342e5435>
CC-MAIN-2015-35
http://www.breitbart.com/big-government/2009/11/21/manipulating-climate-change--warming-to-rico/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.97118
932
1.53125
2
External Web sites Britannica Web sites Articles from Britannica encyclopedias for elementary and high school students. - Edmond H. Fischer - Student Encyclopedia (Ages 11 and up) (born 1920). American biochemist Edmond H. Fischer was the corecipient with Edwin G. Krebs of the 1992 Nobel Prize for Physiology or Medicine for discoveries concerning reversible phosphorylation, a biochemical mechanism that governs the activities of cell proteins.
<urn:uuid:ef861b3a-9670-4d1b-9552-4962452544d6>
CC-MAIN-2015-35
http://www.britannica.com/biography/Edmond-H-Fischer/article-websites
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.835516
97
1.914063
2
External Web sites Britannica Web sites Articles from Britannica encyclopedias for elementary and high school students. - Davies, Samuel - Student Encyclopedia (Ages 11 and up) (1723-61), U.S. religious leader and educator. Davies was born on Nov. 3, 1723, in Delaware’s New Castle County. He was prominent in the wave of religious revivalism known as the Great Awakening. By 1755 he had become the most influential churchman in his area. He helped in the founding of the Presbytery of Hanover, and by 1759 he was president of the College of New Jersey (now Princeton).
<urn:uuid:584348a2-c2b5-4ad5-97cb-ce6a253a94eb>
CC-MAIN-2015-35
http://www.britannica.com/biography/Samuel-Davies/article-websites
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.974975
139
2.921875
3
Group therapy, the use of group discussion and other group activities in treatment of psychological disorders. Despite widespread recognition that the groups to which a person belongs may affect his attitudes and behaviour, the traditional medical emphasis on the privacy of the doctor–patient relationship slowed general acceptance of group psychotherapy. Only a few physicians practiced group therapy before World War II. The large numbers of soldiers requiring psychotherapy compelled psychiatrists to try to treat them in groups, and the use of group methods proved so effective that they developed rapidly in the postwar years. The practice of group therapy expanded to clinical and counselling psychologists as well as social workers. Group therapeutic techniques are as varied as those of individual therapy and similarly tend to stress either alleviation of members’ distress by direct measures or the creation of a group atmosphere conducive to increased self-understanding and personal maturation. Groups of the first type may have any number of members, sometimes up to 50 or more. Some are primarily inspirational in that their chief aim is to raise members’ morale and combat feelings of isolation by cultivating a sense of group belongingness through slogans, rituals, testimonials, and public recognition of members’ progress. Certain of these groups have developed into autonomous movements conducted solely by their members. An outstanding example is Alcoholics Anonymous, organized by chronic alcoholics to help themselves. The other class of group methods, particularly those utilizing nondirective (client-centred) or psychoanalytic techniques, strives to foster free discussion and uninhibited self-revelation. Most use small face-to-face groups, typically composed of five to eight members with similar problems. Members are helped to self-understanding and more successful behaviour through mutual examination of their reactions to persons in their daily lives, to each other, and to the group leader in an emotionally supportive atmosphere. Sensitivity training is a technique for improving human interactions in a non-therapeutic setting, and came into vogue (particularly in the United States) in the 1960s and 1970s. Deriving from group therapy methods, it utilizes intensive group discussion and interaction to increase individual awareness of self and others. It has been known under a variety of names, including T-group, encounter group, and human relations or group dynamics training. The methods of such training have been applied to a wide range of social problems (e.g., in business and industry) to enhance trust and communication among individuals and groups throughout an organization. The idea of treatment of the family as a group (family therapy or counselling) is based on the view that the destructive interrelations of family members may be made more positive by examining their behaviour patterns toward each other. Many family therapists adhere to the principle derived from group process theory that family members adopt various roles; families frequently designate one member to play the martyr role and that individual’s behaviour is correspondingly shaped over time, sometimes to the point of emotional disturbance. Much of the distress of the psychiatric patient is thus viewed to be caused by self-perpetuating and self-defeating ways of relating to intimates. Family therapy is thus an attempt to analyze family roles and readjust them in order to create more balance. The issues that threaten the stability of the family unit, such as incest, divorce, child abuse, drug or alcohol abuse, questions relating to child-rearing disagreements, finance, social and ethical values, are exposed in the presence of an experienced therapist and openly discussed. Through an understanding of the issues threatening the family and an appreciation of the individual assets of each family member, therapy often leads to an effective resolution of family problems. The concept of family therapy developed during the early 20th century, largely through the efforts of Austrian psychiatrist Alfred Adler (1870–1937). The offshoot of marital (sometimes known as couple or relationship) therapy derived from the psychotherapy techniques of Swiss psychiatrist Carl Jung (1875–1961). William H. Masters and Virginia E. Johnson based the techniques of their sex therapy on extensive research in human sexual response. Social, or milieu, therapy for institutionalized patients represents an extension of group therapeutic principles to make the mental hospital a therapeutic community, all aspects of which will help to restore the patients’ mental health. This involves the creation of a positive, supportive atmosphere and a full program of occupational, recreational, and educational activities. It also involves the development of a flexible, democratic social structure in which all members of the treatment staff work as a coordinated team and the patients participate responsibly, to the limits imposed by their disabilities, in all phases of hospital life. See also psychodrama.
<urn:uuid:ddb84110-332a-4157-9d2d-1fadde438f24>
CC-MAIN-2015-35
http://www.britannica.com/topic/group-therapy
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.958851
936
3.671875
4
The buzz about the benefits of red wine has many of us raising a glass to good health. And for those who choose not to imbibe, it turns out the booze behind the buzz may not be necessary. Grape juice and de-alcoholized wine can offer similar benefits, including: 1. The power of grapes: Studies show that a daily glass or two of red wine may lower the risk of heart disease. While alcohol content may be partially responsible for wine’s ability to relax blood vessels and increase levels of “good” (HDL) cholesterol, the hearty concentration of flavonoid compounds, such as anthocyanin, catechins and resveratrol, play their own role in heart health by boosting antioxidants. It comes as no surprise that purple grape juice – essentially unfermented red wine – boasts flavonoid compounds, as well. 2. Grape antioxidants: Grape flavonoids seem to have similar protective effects in juice as they have in wine. Studies show that these compounds help prevent the oxidation of LDL (“bad”) cholesterol that leads to plaque formation and build-up inside artery walls. According to a study in the journal Circulation, when 15 patients with cardiovascular disease were given a glass of grape juice each day for two weeks, their LDL oxidation was significantly reduced and blood flowed more freely through the arteries. And according to preliminary research in a 2007 Cardiovascular Research study, grape juice stimulated the production of nitric acid in cells lining the arteries, which allows for improved blood flow. The flavonoid content in grape juice was shown to be similar to that of red wine, and, in addition, a study in the Journal of Biomedical Biotechnology found that one member of the flavonoid family in particular – anthocyanins – were better absorbed from grape juice than from red wine. The researchers believe the higher natural sugar content of grape juice may aid absorption. The absence of alcohol may boost the amount of time these antioxidant compounds stay in the body, according to findings reported in the January 2000 American Journal of Clinical Nutrition. When volunteers were given red wine and then a de-alcoholized version of the same red wine, catechin flavonoids remained in the blood for more than four hours in the volunteers who drank the nonalcoholic wine, but just over three hours in those who drank the wine with alcohol. Red wine comes out on top, however, when it comes to resveratrol, which has been linked with preventing heart disease and cancer in preliminary studies. Resveratrol is extracted from the skins of the grapes during the fermentation phase of winemaking, which doesn’t occur in grape juice. Both red wine and grape juice can, in moderation, be a healthy addition to a balanced diet that includes a variety of nutritious foods. So enjoy a 4-ounce glass of grape juice a day, and be sure to scan labels for 100 percent juices with no added sugars.
<urn:uuid:48a48adc-ad73-4b2f-9d51-b5e4741c83ff>
CC-MAIN-2015-35
http://www.buffalonews.com/life-arts/health/get-the-benefits-of-wine-without-the-buzz-20131109
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.958959
607
2.421875
2
Last May while attending the International Contemporary Furniture Fair (ICFF) in New York City, I participated in a seminar: “Shaping the City with Dwell.” Or at least I think I did. This program was held in a funky tent structure in the Javits Center beneath a gigantic exhaust fan. Deafened by a maniacal, roaring hum, I strained for half an hour to hear the intricacies of reshaping urban design before being driven out into the convention hall. By contrast, the next ICFF program – “Italian Creativity, Future Perfect” – was held in a normal, non-tent meeting room off of the main show floor. In this session, it was much easier to hear, comprehend, and learn. As an editor for Buildings and BI-Buildings Interiors over the last six years, I have attended countless meetings, seminars, conferences, discussions, and roundtables. Some meetings were good; others were long, uncomfortable, and noisy. And I am sure my faithful readers have had their share of less-than-fruitful meetings. Recently, we offered a poll question to our readers on Buildings.com: “What are the most important components of a productive meeting?” One online respondent wrote: “[The most important factors are] speakers who have made the effort to carefully prepare their presentations, including timing them so they don’t go over their share of the agenda and staying on topic; helping to maintain the momentum of the meeting; and keeping the energy level of attendees high.” Fifty-two percent of respondents ranked having well-prepared speakers as the most important factor for a successful meeting. Having a specific agenda, a wide assortment of snacks and beverages, and good supporting materials – in that order – were also ranked high. For quite a while, I wanted to tackle how facilities managers can change the physical environment to create conference rooms that promote learning and collaboration. From high-tech audio-visual equipment to a nice cushy chair, this BI-Buildings Interiors section will examine how facilities managers can facilitate successful meetings through design, as well as provide tips to improve your own meetings. While there are limits to what anyone can do about chatty speakers and stale pretzels, BI offers examples of meeting spaces that work. – Regina Raiford Babcock, Senior Editor
<urn:uuid:2c166548-ac19-4a71-904f-688fa9b08818>
CC-MAIN-2015-35
http://www.buildings.com/article-details/articleid/2007/title/the-good-the-bad-and-the-just-plain-boring.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.960992
489
1.585938
2
Itch Grass can be identified by the following characteristics: Itch Grass Facts - Erect annual grass that reaches heights of 4 metres. - A single plant can produce 2,200 seeds. - Seeds can lay dormant for up to seven years. Itch Grass is a Declared Local Pest in the Burdekin under Local Law No.3 (Community and Environmental Management) 2012. Itch Grass Control - Machine hygiene is extremely important; all machinery should be clean before entering and leaving a property. - In-crop spray management. - Do not slash itch grass plants. If you are unsure, contact BPS on 4783 1101 or Burdekin Shire Council 4783 9800 to get confirmation. The Itch Grass will then need to be deseeded and sprayed.
<urn:uuid:c7ba91a3-d671-40af-a0eb-c73d7374b0b9>
CC-MAIN-2015-35
http://www.burdekin.qld.gov.au/environment-waste-and-water/land-protection/declared-pest-plants-queensland/itch-grass/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.828133
172
2.734375
3
The Volcker Rule, part of the 2010 Dodd-Frank bill, was scheduled to go into effect in two weeks’ time. But earlier this year, Federal Reserve Chairman Ben Bernanke conceded that the Fed will miss the upcoming deadline. Even with the deferred implementation, the Volcker Rule is on every banker’s lips. But what is the average person supposed to make of the rule? And how will it impact Main Street, as well as Wall Street? What is the Volcker Rule? The concept of the Volcker Rule is to prevent banks from using their clients’ money, which is FDIC-insured, to make potentially risky trades and leave taxpayers to pick up the tab. The Volcker Rule is modeled on the Depression-era Glass-Steagall Act, which prevented a commercial bank (which takes deposits) from doing any trading at all. Volcker is often called Glass-Steagall-lite, because rather than forbidding commercial banks to trade entirely, it allows some trading to occur in those institutions. Most big banks have both a commercial and an investment side, and the policy will affect all the major financial players, from major banks like Bank of America and JPMorgan Chase to investment firms Goldman Sachs and Morgan Stanley. This is to protect both the bank and its depositors from speculative trading and heavy losses. The way that the rule is supposed to work is by prohibiting any federally insured depository institution or banking entity, or institution that receives Federal Reserve funds, from engaging in proprietary trading. Very simply put, this means that banks will not be allowed to trade money from their depositors’ accounts for a profit, so that the FDIC, and therefore taxpayers, will not have to cover the bank’s losses. But there’s one problem with the Volcker Rule: While banks can’t trade for profit, they can trade to hedge existing positions. In theory, hedging trades would make the bank no money at all: by definition, a hedge goes up when the original position goes down, and vice versa. However, big banks’ complex balance sheets defy simple one-to-one comparisons. They have myriad financial instruments on their books, from plain-vanilla mortgages and Treasury bonds to the infamous derivative alphabet soup. Given that complexity, which even experts cannot model perfectly, virtually any trade could be justified as a hedge. Therefore, limiting proprietary trading to only hedges does very little at all. How can you tell a trade from a hedge? MIT’s Andrew Lo had a simple answer: Just look at how the trader gets paid. A hedge doesn’t increase a bank’s profits; in fact, its impact would likely be hard to quantify. A trader would therefore be paid according to her hedging ability, not the bank’s gain or loss. A speculative trade, on the other hand, is made for profit, and the trader would be paid according to how much she earned the bank. But it’s hard to imagine regulators applying heuristics like this. Instead, they’ll have to take banks’ word for it. Another snarl in a regulatory tangle Naturally, banks are not happy with the rule and worried about its implementation. So are many others, from the U.S. Chamber of Commerce to Safeway to Macy’s. Banks no longer follow the 3-6-3 rule: pay 3 percent interest on deposits, charge 6 percent interest on loans, and hit the golf course by 3:00. Instead, they opt for the more lucrative, and riskier, business of investment banking. Whatever the Volcker Rule’s actual effect on proprietary trading, it will most certainly add another layer of regulation. Government regulators will have to establish a hierarchy of supervisors and a series of checks to be put on banks trading information. This is a nightmare task, because it will require the authors to codify age-old banking questions. What standards will determine whether a hedge is risk-mitigating? How can you quantify what threatens the financial stability of the United States? Which exemptions to the ban on proprietary trading can be justified? Who will oversee these compliance programs, and how? These are just a few of the questions that caused the delayed implementation of the Volcker Rule, and with the widespread impact the provision is bound to have, they should not be taken lightly. The Volcker Rule seeks to impose an artificial constraint on tightly-knit institutions, separating commercial from investment banking after the fact. The size of both the problem it hopes to tackle and the banks affected stymies the Fed’s implementation efforts. But for all the sound and fury from Democratic lawmakers on one side, and Wall Street on the other, the Volcker Rule might well have little impact on the banking industry.
<urn:uuid:2ce4cfed-d45d-4616-b3b2-b448c5bd2b43>
CC-MAIN-2015-35
http://www.businessinsider.com/heres-what-you-need-to-know-about-the-volcker-rule-2012-7
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.946643
986
2.25
2
The 15 Most Miserable Countries In The World apThe global economic picture is fairly grim. Debt ridden Eurozone countries have seen unemployment driven high by austerity measures and economic stagnation. The civil unrest in the Mideast and North Africa stemmed in part from joblessness in the region. Meanwhile, the price of food and energy soars everywhere. The so-called "misery index" conceived by economist Arthur Okun is calculated by adding together unemployment and inflation. Doing this simple calculation, we found the most miserable countries in the world. Note: We calculated figures for 81 countries that consistently report unemployment and CPI figures
<urn:uuid:1ca9d9ff-8959-42e4-bcff-4d42432ef6a2>
CC-MAIN-2015-35
http://www.businessinsider.com/the-15-most-miserable-countries-in-the-world-2011-6
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.907822
129
2.234375
2
SOUTH JORDAN, Utah--(BUSINESS WIRE)--Cricut today announced Cricut Explore, a new product designed to be the world’s easiest design-and-cut system for making polished DIY projects. Cricut Explore’s industry-first system includes an advanced cutting machine plus easy-to-use online design software, which helps DIY crafters go from inspiration to creation in just a few clicks. From home décor and fashion to crafting and parties and events, Cricut Explore enables DIYers to easily design and cut, write or score a wide range of projects. The heart of this new DIY experience is Cricut Design Space, free online design software powered by a library of more than 50,000 images and hundreds of ready-to-make projects. Users can browse Cricut-designed projects, click “Make It Now” and follow the step-by-step instructions to create handmade projects in minutes. Users can also create and visualize their own projects before actually cutting materials. Starting from blank canvas templates for popular items ranging from t-shirts to iPad cases to pillows, DIYers can incorporate images from Cricut’s vast library and personalize and make their own creations. To provide a new level of freedom, users can also import images and fonts from the Web or their computers to “cut what they want.” The Cricut Explore electronic cutting machine introduces patent-pending Cut Smart technology, which delivers precision cutting of various materials via dual carriage heads: one clamp with a premium German carbide blade for cutting, and a secondary clamp for drawing or writing with a pen or marker. The secondary clamp can also be used for a scoring tip. Cut Smart makes it easy for users to create invitations and cards by cutting and writing in one simple step. Cricut Explore also features the Smart Set™ dial, a material selection dial that works in conjunction with Cut Smart technology to eliminate the need to make pressure, depth and speed adjustments. With a turn of the dial, users can easily alternate between multiple cutting materials: paper, vinyl, iron on, light cardstock, cardstock, fabric and poster board. To meet users’ need for flexibility, the dial also offers a custom option that can be preset to a desired material of choice, such as chipboard, craft foil, magnetic materials or Duck Tape® Sheets. “A new generation of DIY crafters want the satisfaction of handmade along with the convenience and immediate gratification of digital. They want to make that beautiful project they find on Pinterest, without needing a PhD in crafting,” said Ashish Arora, president and CEO of Cricut. “With Cricut Explore, users can go from inspiration to creation in just a few clicks, easily creating handmade projects that are both polished and personal.” Users can buy individual images from Cricut Design Space starting at 99 cents per image or subscribe to the Cricut-branded portion of the library (25,000+ images) on a monthly or yearly basis. Users can also buy digital cartridges or use their existing cartridges to unlock the same artwork through Cricut Design Space. Out of the box, the initial offering of the Cricut Explore comes with a simple guide and a selection of materials – including cardstock, iron-on, vinyl and two Duck Tape® Sheets – to immediately start on one of 50 free projects. For more information, visit Cricut’s website, or follow the company on Facebook, Twitter and Pinterest. Pricing and Availability Cricut Explore will have a suggested retail price of $299. Cricut Explore will debut on the Home Shopping Network in February and will be available through a broad range of Cricut retail partners including Amazon, Jo-Ann, Michaels, Walmart.com, and many others starting March 16th. No-commitment monthly subscriptions to Cricut Design Space are available for $9.99 and annual subscriptions can be purchased for $99.99. Cricut® is a world leader in personal electronic cutting machines that enable people to achieve their creative best. For 50 years, Cricut has sold tools that inspire creativity, including the Cricut electronic cutting machine, Cricut Craft Room® design software, and the Cricut Cuttlebug™ embosser and die cutter. Today, millions of people use Cricut products to create projects, and Cricut products have won dozens of industry awards. Visit www.cricut.com or call (800) 937-7686.
<urn:uuid:34563852-00ff-4de1-b57a-1c2ec56856a8>
CC-MAIN-2015-35
http://www.businesswire.com/news/home/20140121005656/en/Cricut-Presents-Explore-World%E2%80%99s-Easiest-Design-and-Cut-System
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.9121
953
1.5
2
Teaching spelling and vocabulary is easy with VocabularySpellingCity! Students can study and learn their word lists using vocabulary and spelling learning activities and games. Students can take final or practice spelling and vocabulary tests right on this engaging site. Premium games and automated student record keeping are available to Premium Members. Took the kids to the supermarket. Made them choose the fruit. Ended up some grapples, "crunches like an apple, tastes like a grape." Really fun. Just ate it. Not bad but not nearly as much fun as the anticipation with them. Hi! Welcome to CafeMom! Please join us on The Park Bench group. It's a great place to get started, meet other moms like you, and find active conversations! I hope to see you there! http://www.cafemom.com/group/theparkbench
<urn:uuid:28503b55-1de9-4cd9-b048-d22d46ae86a4>
CC-MAIN-2015-35
http://www.cafemom.com/home/sandra1968
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.921639
177
1.945313
2
Royal Air Force Air Vice-Marshal William Bertram Callaway, CBE, AFC, DL (1889 - 1974) THE CASE OF THE MISSING The growth of the Royal Flying Corps was slow, because, at first, its only duties were thought to be reconnaissance and spotting for the artillery. Also, until 1915 at least, there was no such thing as a serious aircraft industry in Britain. Even when it got started the speeded up rate of expansion of the RFC meant that many squadrons had to use French aircraft. The RFC also relied primarily on French aero engines throughout the war. Some indication of the expansion is given by the number of aircraft produced by the British aircraft industry: 200 in 1914, and 2,000 in 1915, 6,000 in 1916, 14,000 in 1917, and 24,000 in 1918. Hundreds were wrecked in training and hundreds more were destroyed in combat or in accidents in France, but the number of first line squadrons increased steadily. Large numbers of officers were required for all the new squadrons and training schools, not only as pilots and observers but as commanding officers, adjutants, engineer officers, photographic officers, intelligence officers, and so on. Staff officers were also required for the headquarters of the various wing and brigade headquarters which administered the squadron, as well as at the GHQ of the RFC in France and in London. I thought that our man had almost certainly come in at this stage, between 1915 and 1917. A great many of the officers for these appointments came from infantry and cavalry regiments and kept on wearing their regimental uniforms while they were attached to the RFC. Young officers commissioned directly into the Royal Flying Corps wore the "maternity jacket" of that corps - in khaki, of course, since the RFC was an army unit. This explains why any squadron picture of the RFC from 1916 and 1917 is likely to include officers in Scottish trews or kilts, in cavalry breeches, in Australian uniforms, in American uniforms toward the end of the period, and in the famous maternity jacket. There will be no naval uniforms, they appear only in pictures of squadrons of the Royal Naval Air Service at this time and are usually the only uniforms in sight. Now an officer who was between 24 and 29 when the First World War broke out, was transferred to the RFC in 1915 or 1916, and was granted a permanent commission in the RAF in 1919 or 1920, was very likely to have already had about six years service before the war started. It was therefore a fair guess that he would have been at the Royal Military Academy at Sandhurst and that he would have been commissioned at the age of 18 between about 1903 and 1908. We would therefore expect to find him in the Army Lists between those dates. If he came from the navy he might crop up in Navy records even earlier, since the Royal Navy have always been notorious cradle snatchers. The Royal Flying Corps fought the air war for the army between August 1914 and March 1918. The Royal Naval Air Service did it for the navy. There was tremendous expansion and, of course, tremendous losses. I seem to remember reading somewhere (probably in The Birth of Independent Air Power by Malcolm Cooper) that in 1918 the RFC was losing, every month, the equivalent of the full strength of the corps as it had been in 1917. Then on 1 April 1918, to the great disgust of many of the officers, the RFC and the RNAS were merged into one service, henceforth to be known as the Royal Air Force. When the war ended, just over seven months later, in November 1918, there was immediately an enormous cutback in men and materials in the RAF. As Sir Maurice Denn puts it, in The Royal Air Force and Two World Wars, "The Royal Air Force was speedily run down from its wartime strength of 280 squadrons to a force one-tenth that size, mostly abroad." Only those who were considered to be the very best, or the most experienced, which is not necessarily the same thing, were offered permanent commissions in the new service. My missing air vice marshal from the 1940s must therefore have had a fair amount of significant service in the Royal Flying Corps or the Royal Naval Air Service to have been offered and been granted a permanent commission in the Royal Air Force around 1919 or 1920. In 1920 he would, of course, have been 35 years old if he was born in 1885, or 30 years old if he was born in 1890 - not an age at which to start looking for a new career. If he had been at Sandhurst (the army's officer cadet school) before the war, he would have been commissioned at the age of 18 and would appear in the Army Lists between 1903 and 1908. These are on the open shelves at the PRO at Kew, and the Prince Consort's Library in Aldershot has a special room full of them, going back to about 1750 as I recall. If our man had been a naval cadet at Dartmouth, presumable he would have started at about 11 or 13, but I know very little about the navy. However, there are Navy Lists also at the Public Record Office. My inquirer now had a date (within a range of five years) for her uncle's birth; she had an estimated date for his original commission in the army or the navy; she had a pretty certain date for his first commission in the Royal Air Force and she had his rank and approximate age in 1939/1940. She could rely on the fact that he hadn't been Air Officer Commanding Fighter Command between 1936 and about 1943, and, if he was 50 years of age in 1940, it was reasonable to look for his death certificate between, say, 1950 and 1990. The RAF Lists would undoubtedly fill in most of the rest of his details. It was now her problem and, as A. J. Camp said recently, it was up to her to "get out there and trace something." About a month ago I found myself with a spare couple of hours at the PRO, so I decided to see how my speculations about Air Vice Marshal Callaway would have worked out in practice, by looking at nothing more than the Army, Navy and RAF Lists on the shelves. I couldn't immediately see the Army Lists, but the Navy Lists were staring me in the face, so I decided to start with them. I took down the volume for 1912 and there in the alphabetical index were three Callaways. One of them was W. B., so I had apparently been right about his having already been a serving officer at the beginning of the First World War, even if he was in the navy rather than the army. Against his name in the Navy List were the letters AP, with seniority from 15 October 1910, so I was right again about his having had about six years service before the war. I looked up "AP" in the abbreviations at the front of the book and found that it meant Assistant Paymaster. I had a vague idea that this didn't merely mean a sort of glorified accounts clerk. I thought it was a phrase that the navy used for staff officers, but it hardly mattered. I assumed that he was probably a lieutenant or sub-lieutenant, aged about 25. This would have given him a date of birth around 1887, which was bang in the middle of my first estimate of 1885-1890. It would have been interesting to trace the date at which Callaway transferred, presumable, to the Royal Naval Air Service, and his subsequent service throughout the First World War, but I didn't have time. Instead I turned straight to the RAF List for 1919. There I found only one Callaway, and he had the initials W. B. He was shown as captain, with seniority from 1 April 1918, because the RAF hadn't yet sorted out its own rank designations in 1919. His captaincy was, of course, an army rank, not a naval one. An army captain equates with a lieutenant in the navy, whereas a navy captain equates roughly with a full colonel or a brigadier in the army. Callaway therefore wasn't a very senior officer for his age and service in 1919, but he had probably been a couple of ranks higher during the war and had to come down in the much reduced peacetime RAF. Meanwhile, his name in the RAF List for 1919 was now marked with an S. When I looked that up in the abbreviations, I found that it meant Seaplane Officer. That sounded very reasonable for an ex-navy man in a service which then had lots of seaplanes and continued to use them for most of the next 20 years. What he was actually doing didn't interest me very much, so from 1919 I jumped 10 years to 1929, and there was William Bertram Callaway. By then he was a wing commander with seniority from 1 July 1926. Also, he had an AFC, which stand for Air Force Cross and is awarded for bravery while flying, other than in action against an enemy. The DFC or Distinguished Flying Cross is for bravery while flying in action against an enemy. The citation for Callaway's AFC would presumably be in the London Gazette somewhere between 1919 and 1926. The RAF List also had the letters "qs" against his name and the list of abbreviations tells us that this means he had qualified at a military or naval staff college. This was obviously my man and, since he had apparently ended up as an air vice marshal, it was interesting to see that among the other wing commanders at this time was one Keith Park, AFC, DFC. He had seniority from 1 January 1929 and was "psa": a graduate of the RAF Staff College. Keith Park, you may remember, commanded 11 Group of Fighter Command during the Battle of Britain. By 1929 the RAF List was coming out twice a year and in the second volume I found that, from 7 September 1929, W. B. Callaway had been senior RAF officer in the aircraft carrier HMS Furious. Again a very reasonable appointment for a former naval officer. I won't bother to detail all the units and officers under his command, some of whom were Royal Air Force and some were Royal Navy. They were all there but it must suffice to say that the HMS Furious and/or Callaway, administered two flights of Fleet fighters, three flights of Fleet Spotter Reconnaissance aircraft, and two flights of Fleet Torpedo Bombers, some of which were based at shore stations. Each flight had about six RAF and RN officers - 36 all told. This suggests to me that there would probably also have been around 300 "other ranks" - sailors and airmen - but they are not listed individually. By jumping another nine or 10 years to the RAF List for 1939, I discovered that William Bertram Callaway's career had taken a sharp turn for the better. Someone must have decided that as he was getting seriously senior it was about time he shed his naval bias and found out what the Royal Air Force was all about. Broadly speaking, if you were after promotion and pay in the RAF in the 1920s and the 1930s, it was as well to subscribe publicly to the notion that the whole point of the RAF was to serve as a bomber force. Whether he did or not, I obviously can't say, but on 17 August 1937 he had been appointed Air Officer Commanding 5 Group of Bomber Command, based at Grantham in Lincolnshire. On my revised estimate of his date of birth (1887) he would have been 50 years of age at that time. I forgot to make a note of his rank but he was presumably an air commodore. He now had under his command no less than seven squadrons - 211 Bomber Squadron at Grantham; 144 Bomber Squadron at Hemswell; and 44, 50 and 110 Bomber Squadrons at Waddington, with 61 Bomber Squadron apparently split between Hemswell and Waddington. I already knew (from the books by Hastings and Middlebrook) that he had still been AOC 5 Group until September 1940, so now I skipped to 1943, the fourth year of the war, to see if the RAF List said anything about him then. I expected the wartime lists to be pretty thin and uninformative, but to my surprise there he was again. By then he was fourth on the list of air commodores, but he was shown as an acting air vice marshal serving as Senior Air Staff Officer to Air Marshal Sir Trafford Leigh Mallory, who was Air Officer Commanding Fighter Command. He had been appointed that position on 28 November 1942. There was the source of the family legend that he had been in charge of Fighter Command. He hadn't , but he wasn't far off it. Since Leigh Mallory was the AOC and Callaway was his SASO this meant broadly that Callaway (in conjunction with the operational troop commanders) would advise Leigh Mallory from day to day on resources in terms of the numbers of pilots, aircraft and airfields available at any given moment and their fitness for combat, as well as losses and the availability of replacements from Training Command. Leigh Mallory would then decide on the best use he could make of his resources in terms of strategy and tactics and form an operational plan with his group commanders. Then it would be Callaway's job to ensure that Officers, men, aeroplanes, airfields, ammunition, fuel, rations and everything else were laid on at the right place and the right time to make the operations possible - but he was not the Air Officer Commanding. He had a very important job but, as is so often the case with family legends, it was not quite as important as his niece had thought. I was a bit startled by the enormous amount of detail published about senior officers and their appointments in these wartime lists. Whether they were actually distributed during the war I don't know, but it seemed no wonder that junior officers shot down over Germany were equally startled to discover how much the Germans knew about the RAF command structure. Junior RAF officers would have been fairly ignorant of this subject. They probably never looked at an RAF List themselves, but the Luftwaffe's intelligence branch would, of course, have been studying them busily year by year and following the careers of all the regular officers. For my part, I was getting a bit bored with Air Vice Marshal William Bertram Callaway. Obviously he was my man, since he was the only Callaway in the RAF List. The other two Callaways in the Navy List before World War I had apparently never transferred to the RNAS, or, if they had, they had not transferred to the RAF in 1918/9. However, since William Bertram was the one who had been in charge of Fighter Command, more or less, and he would have been about 57 in 1945, I thought I might as well follow him through to the end. The list for October 1944 showed that he was fourth in seniority on the list of air commodores and he was still SASO at Fighter Command. By then the Air Officer Commanding was Air Marshal Sir Roderic Hill, who had been in that job since 15 November 1943. Callaway was obviously providing a sort of backbone of continuity for a succession of Air Officers Commanding. I wondered, indeed, whether Callaway was supposed to carry Hill - a rather absent-minded scientific type famous for having designed his own house but forgetting to include a staircase to the upper floor. His daughter tells this and other tales in the biography of her father which she wrote 30 odd years ago. In the RAF List for 1945, Callaway was still shown as an air commodore, but he was now second on the list and he was still serving as an acting air vice marshal in the job of SASO at Fighter Command. By this time he has acquired a CBE (Commander of the Order of the British Empire) and I noticed that he had been passed, in terms of rank, by several people who had been his juniors on the wing commanders' list way back in 1929. One of them was a man named Champion de Crespigny and another was Keith Park. Newspaper journalists are fond of finding failure and disgrace in that sort of situation, but that is, of course, nonsense. Callaway's career had been admirable, but not everyone can be top of the tree. The RAF List for 1950 showed that Callaway had retired on 6 May 1945 (two days before the end of the war in Europe) still in the rank of air commodore, but permitted to retain the rank of air vice marshal. I hope he got the pension to go with it. This issue of the list finally revealed the dreaded secret of his date of birth. It was 15 October 1889. I was two years out, but it was still neatly within the bracket of five years that I had guessed at two years earlier, even before I had first discovered him as an air commodore at 5 Group. If I had bothered to follow through the later lists, after 1950, I would eventually have come to one in which his name disappeared even from the list of retired officers. That would naturally give a pretty clear indication of the date of his death. I believe that the RAF List now includes an obituary list but I don't think it did so then. One could, of course, build up a much more detailed story. Anyone who cared, could track him year by year and post by post. They could also track down the history of the units through the official history and myriad unofficial histories of bits of the RAF. Also, I have no doubt that there are still dinner clubs and the like of, say ex-officers of 5 Group or of HQ, Fighter Command, even perhaps of HMS Furious, some of whom would have served with or under Air Vice Marshal William Bertram Callaway. By getting in touch with them, one might well reach a position at which it would be possible to write a very detailed biography, especially if it could be filled in with stories and photographs supplied by family and friends. Bomber Command by Max Hastings, published by Michael Joseph, 1979, ISBN 0718116038. Flying Corps Headquarters, 1914-1918, Maurice Baring, Heinemann, 1930 (out of print). The Air Weapon by C. F. Snowden Gamble, Oxford University Press, 1931 (out of print). The Birth of Independent Air Power by Malcolm Cooper, Allen and Uawin, 1986, ISBN 0049422049. The Royal Air Force and Two World Wars by Sir Maurice Dean, Cassell, 1979. The War Diaries of Bomber Command by Martin Middlebrook, Viking Press, 1985, ISBN 0670801372. ~ Article written by Brian Haimes for Family Tree Magazine UK, Vol. 7, No. 12, October 1991 AOC 5 Group, 1937-9 The son of a Royal Navy engineer captain, William Bertram Callaway was born on 15 October 1889 and educated privately before following his father into the Royal Navy in 1907. He spent nine years in the RN before transferring to the RNAS in 1916, when he won the AFC, and was commissioned into the RAF in 1918. As an Air Commodore, Callaway became the first AOC of the newly created 5 (Bomber) Group on 17 August 1937 and relinquished the appointment two years later to AVM Arthur Harris, who was later to become AOC-in-C Bomber Command. Promoted AVM in 1942, Callaway retired from the RAF in 1947 to become Divisional Controller, SW Division, Ministry of Civil Aviation, where he remained until his retirement in 1953. He lived at Lingfield in Surrey until his death on 28 August 1974, aged eighty-four. ~ From http://www.raf.mod.uk/bombercommand/commanders/group.html MILITARY DESIGNATIONS AND RANKS Air Vice-Marshal William Bertram Callaway, CBE, AFC, DL Born: 15 Oct 1889 Retired: 6 May 1945 Died: 28 Aug 1974 1 Jan 1943 AFC - 3 Jun 1919 MiD - 1 May 1918 MiD - 17 Mar 1941 MiD Ė 1 Jan 1945 PR2 - 12 Jun 1945 DL (Gloucestershire) - 1953 Midín: xx xxx xxxx Sub-Lt: xx xxx 1907 Ass't Pay: 15 Oct 1910 Flt Lt: 23 May 1917 Flt Cdr: xx xxx xxxx. (Royal Air Force): (T) Capt [Lt]: 1 Apr 1918 Capt: 1 Dec 1918 Flt Lt: 1 Aug 1919 [1 Apr 1918] Sqn Ldr: 1 Jan 1921 Wg Cdr: 1 Jul 1926 Gp Capt: 1 Jul 1933 A/Cdre: 1 Jul 1937 Act AVM: 25 Nov 1942 - 1 Feb 1945 1907: Officer, Royal Navy 17 Sep 1912: Assistant Paymaster, HMS Cumberland Served aboard the Cruiser, HMS Cumberland, which was a Training Ship for Naval Cadets, as an Interpreter. xx xxx 1916: Officer, RNAS 1 Aug 1919: Awarded Permanent Commission as a Captain (Seaplane) 1 Sep 1919: Staff Officer 2nd Class (Air Staff), HQ Coastal Area 31 Oct 1919: Staff, Ground Wing, RAF College - Cranwell 22 Jan 1920: Removed from the Navy Lists on being awarded Permanent Commission in RAF xx xxx xxxx: Staff, No 2 School of Technical Training (Boy's) 23 Jan 1922: Staff, School of Naval Co-operation 5 Feb 1923: Staff, RAF Base Calshot 1 Apr 1923: Officer Commanding, No 480 (Flying Boat) Flight 4 Feb 1926: Flying Staff, HMS Eagle 21 Jan 1927: Attended Army Staff College, Camberley 3 Jan 1929: Staff, HQ No 10 Group 7 Sep 1929: OC Flying, HMS Furious 6 Aug 1930: Staff, Deputy Directorate of Staff Duties 1 Sep 1933: Officer Commanding, RAF Base Calshot 20 Mar 1936: Officer Commanding, No 203 Sqn 17 Aug 1937: AOC, No 5 (Bomber) Group 11 Sep 1939: Assistant to AOC, No 18 (Reconnaissance) Group 16 Oct 1939: SASO, HQ No 12 (Fighter) Group 25 Nov 1942: SASO, HQ Fighter Command 15 Oct 1943: SASO, ADGB xx xxx 1945: Commandant, Midland Command, ATC xx xxx 1947: Controller, South West Division, Ministry of Civil Aviation RAF 5 GROUP HISTORY Formed 1 Apr 1918 in VII Brigade from Dover-Dunkirk Group RNAS. Transferred to South-Eastern Area, 8 May 1918. (Operations) added 8 Aug 1918. Raised to Command status, 15 Aug 1918. Reduced to Group status in South-Eastern Area, 25 Feb 1919. Disbanded, 15 May 1919. Reformed 1 Sep 1937 as No 5 (Bomber) Group in Bomber Command. Disbanded 15 Dec 1945. Badge Authorized: March 1945 1 Apr 1918 Lt Col F C Halahan xx May 1918 Brig-Gen C L Lambe 15 May 1919 - 1 Sep 1937 Disbanded 17 Aug 1937 A/Cdre W B Callaway 11 Sep 1939 AVM A T Harris 22 Nov 1940 AVM N H Bottomley 12 May 1941 AVM J C Slessor 25 Apr 1942 AVM W A Coryton 28 Feb 1943 AVM The Hon R A Cochrane 16 Jan 1945 AVM H A Constantine ~ From http://www.rafweb.org/Grp01.htm SHIPS ON WHICH HE SERVED Air Vice-Marshal William Bertram Callaway, CBE, AFC, DL The fourteenth HMS Cumberland was a 9800 ton armored cruiser launched in 1902. She was re-commissioned in 1917 and was used to escort transatlantic convoys from Nova Scotia and New York to the United Kingdom, a duty which occupied her until the end of the First World War. ~ From https://en.wikipedia.org/wiki/HMS_Cumberland_%281902%29 HMS Eagle was built at Clydebank, and was launched on the 8th of June 1918, a former Battleship construction suspended in 1914. during World War II HMS Eagle served off China in 1939, East Indies 1939 - 1940, Mediterranean in 1940 - 1941. and in the South Atlantic 1941 - 1942 and Force H in 1942, she was sunk by U-73, North of Algiers on the 11th August 1942. Capable of carrying 40 planes she was originally destined to be a battleship for Chile but was bought back and altered. Displacement: 22,600 tons. Speed: 23 knots. Armament: twelve 6 inch guns, four 4 inch AA guns, four 3 pdr guns and six 21inch torpedo tubes. Complement: 950. ~ From http://www.battleships-cruisers.co.uk/hms_eagle.htm HMS Furious, a 19,513-ton aircraft carrier, was built at Newcastle-on-Tyne, England. Begun as a light battle cruiser (or "large light cruiser") of modified Courageous class, she was modified in the latter stages of construction and completed in July 1917 with a single 18-inch gun aft and an aircraft launching platform forward. After several months' experience with the Grand Fleet, she was further modified, receiving an aircraft landing deck and hangar aft. With the completion of that work in March 1919, Furious returned to the North Sea, providing important experience in the operation of combat landplanes at sea. On 19 July 1918, she launched a historic air strike that destroyed two enemy airships and their support facilities at Tondern, in northern Germany. A month earlier, in another historic incident, she had used both anti-aircraft guns and fighter aircraft to thwart an attack by German seaplanes. Following the end of World War I, the carrier operated in the Baltic Sea. Her wartime aircraft landing arrangements having proved very unsatisfactory, Furious was laid up in reserve in late 1919. After further experience with other aircraft carriers, she was massively reconstructed, emerging in August 1925 as a 22,450-ton ship with upper and lower hangars, topped by a long flight deck clear of obstructions, with a shorter aircraft launching deck at the bow. This configuration established a pattern for other British and Japanese aircraft carriers of that era. Furious operated actively through the inter-war years, continuing her pioneering work as a platform for developing seagoing aviation techniques and combat doctrine, as those applied to the situations confronting the Royal Navy. In the later 1930s, her small forward aircraft flying-off deck was converted to a gun platform and she was refitted with a small "island" superstructure amidships on the starboard side of the upper flight deck. Through the first five years of World War II, Furious served with the Home Fleet in the Atlantic area. By mid-war, she was quite elderly, limited in capabilities, and required continual maintenance. She took part in an attack on the German battleship Tirpitz in April 1944, but was placed in reserve later in that year. After post-war employment in target trials, HMS Furious was sold for scrapping in January 1948. ~ From http://www.history.navy.mil/photos/sh-fornv/uk/uksh-f/furis-6.htm Richard Gould Callaway, W. B. Callaway's father was serving in the Royal Navy on board this ship in 1881 as an Engineer. Minotaur Class ironclad battleships built 1863-66. Ships of the class were HMS Minotaur, HMS Agincourt and HMS Northumberland. HMS Agincourt at anchor in Bantry Bay c. 1884 when she was second Flagship of the Channel Fleet. Converted to a training ship and renamed Boscawen III in 1904, then Ganges II in 1906. Broken up in 1927. ~ From http://www.battleships-cruisers.co.uk/minotaur_class1.htm Air Vice-Marshal William Bertram Callaway, CBE, AFC, DL |William Callaway||36||Blacksmith||Eggbuckld Devonshire| |Lavinia (Gould) Callaway||36||wife||Eggbuckld Devonshire| |Lavinia Callaway||6||dau||Tam Foliott Devonshire| |Richard G Callaway||4||son||Tam Foliott Devonshire| |Alice C Callaway||2||dau||Tam Foliott Devonshire| |Fanny M Callaway||4 mon||dau||Tam Foliott Devonshire| |Ann Gould||66||m-i-l||Eggbuckld Devonshire| From the 1881 England Dwelling 4 Liberty St. Census Place : Plymouth St. Andrew, Devon, England Page Number 21 living in a Lodging House with others are: Jane D. Callaway 28 born in St. Heliers, Jersey, Channel Islands, wife of Engineer R.N. Sylvia Alice Callaway dau 11 born in Tamerton, Devon, England Janie Alice Callaway dau 4 born in Portsmouth, Hampshire, England |Richard Gould Callaway||44||Staff Engineer |Devonshire Tamerton Foliott| |Jane D (le Moignan) Callaway||38||wife||Jersey St. Helier Channel Islands| |Sylvia K Callaway||14||dau||Devonshire Tamerton Foliott| |Janie D Callaway||10||dau||Hants Portsmouth| |Richard B G Callaway||9||son||Devonshire Plymouth| |Ruth L Callaway||3||dau||Devonshire Stoke| |Ethel W Callaway||2||dau||Devonshire Stoke| |William B Callaway||1||son||Kent New Brompton| |Alice K Callaway||3 mon||dau||Kent New Brompton| |Name||Age in 1901||Birthplace||Relationship||Civil Parish||County/Island| |Alice Kathleen Callaway||10||New Brompton, Kent, England||Daughter||Hornsey||Middlesex| |Ethel Winifred Callaway||12||Stoke, Devon, England||Daughter||Hornsey||Middlesex| |Frank Morgnan Callaway||9||New Brompton, Kent, England||Son||Hornsey||Middlesex| |Jane Denise Callaway||48||St Helens, Jersey, Channel Islands||Wife||Hornsey||Middlesex| |Janie Denise Callaway||21||Portsmouth, Hampshire, England||Daughter||Hornsey||Middlesex| |Richard Gould Callaway||54||Taunton, Devon, England||Head||Hornsey||Middlesex| |Ruth Lilian Callaway||13||Stoke, Devon, England||Daughter||Hornsey||Middlesex| |Sylvia Alice Callaway||24||Taunton, Devon, England||Daughter||Hornsey||Middlesex| |William Bertram Callaway||11||New Brompton, Kent, England||Son||Hornsey||Middlesex| Jane D. le Moignan is Jane Denize le Moignan, daughter of Charles le Moignan and Anne Hocquard who married at St. Clement, Jersey, Channel Islands on 10 Mar 1838. Charles was a Master Mariner. William Bertram Callaway married Evelyn Winifred Trim in 1925. She was the daughter of the Sheriff of Southampton. They had only one child, Juliet Callaway. Juliet went to school at St. Margaret's Bushey, then trained as an actress at the Royal Academy of Dramatic Art, London, England. William Bertram Callaway (click to enlarge) BIG FLYING BOAT'S ADVENTURE Moored to Tramp Steamer in Thames Mouth Night Aboard Vessel March 22, 1927 The giant flying boat which was reported missing off the South Coast last evening has turned up safely today under somewhat remarkable circumstances. It was at about 3 p.m. yesterday that Squadron-leader Calloway, who is in charge of Number 480 flight at the Royal Air Force Station, Calshot, Hants, took the machine up, accompanied by a crew of five men, for the purpose of delivering it at the works of Messrs. Short Bros., Rochester. The vessel, which is of the twin-engined F-5 type, was to be re-conditioned. Shortly after leaving Calshot fog was encountered, and the non-arrival of the flying boat, coupled with the complete absence of news as to its whereabouts, occasioned considerable alarm. Today, however, all fears were set at rest, for the flying boat arrived safely at the Isle of Grain. Along the Water. Squadron-leader Calloway and his crew had spent the night on board an anchored tramp steamer, to which they had moored the flying boat. They had suffered no injury. The ship was the S.S. Nephrite. Captain Jones, a Belfast man, treated them well, with eggs and bacon and hot tea. Finding himself enveloped in a thick haze at Sheerness, Squadron-leader Calloway steered for the open sea and skimmed along the water until he sighted the tramp. When daylight came he flew to Grain, completing the journey to Rochester later. Weighing about six tons, the flying boat belongs to a type that was much used during the war. It is equipped with two Rolls-Royce Eagle engines, each of 360 horse-power. (article written about 1944) Air Vice-Marshal W. B. Callaway, Senior Air Staff Officer at Fighter Command, has given up his job, I understand. He is the first victim of the new "too old at fifty" rule in the R.A.F. - he is 56 this year. He has been transferred to the Air Training Corps and given the post of regional commander. His place at Fighter Command has been filled by Air Commodore G. H. Ambur, who has been his deputy for the past year or so. I expect that Air Commodore Ambur will now be promoted to Air Vice-Marshal. THE FLYING BOMB MAN (article written about 1944) Unavoidably, Air Vice-Marshal Calloway is known to everyone in the R.A.F. as Cab Calloway. He has been S.A.S.O. at Fighter Command for the past three years. Sir Trafford Leigh-Mallory brought him there. He is a short, dark man, dapper, with a low-pitched voice, and sharp featured. He played a big part in the counter-measures against the flying bombs. On the night when the first flying bomb came over he left his bed to go down to the Operations Room at his headquarters to take charge. Simon Webb, W. B. Callaway's grandson, has also submitted to CFA copies of W. B. Callaway's birth certificate and marriage certificate. SHERIFF OF SOUTHAMPTON Title: The Mayor and the Sheriff of Southampton and a happy band of people greet Don Bradman. Source: Dan Bradman Scrapbooks, Vol. 33, 1938, pg. 51 Summary: A photo of Bradman with the Mayor of Southampton, and the Sheriff of Southampton, surrounded by a crowd of smiling people, at the arrival of the Australian Cricket Team for the 1938 tour of England. Note - This Sheriff of Southampton may be Sheriff Trim mentioned above. ~ From http://www.slsa.sa.gov.au/bradman/scrapbooks/33/bsb33051.htm Additional information about Air Vice-Marshal William Bertram Callaway can be found in Kelly's Handbook to the Titled, Landed and Official Classes. Back to English Research
<urn:uuid:31e5c007-fe06-4106-aca8-4fced8dcd597>
CC-MAIN-2015-35
http://www.callawayfamily.org/document/wbcallawayairmarshal.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.976475
7,613
3
3
Retailers have had a tough time in the economy overall. We haven’t seen the typical spike in retail sales after a recession. But, as N.C. Cooperative Extension economist Mike Walden says, there is a part of the retail market that is doing better than the rest. “What we are seeing in the retail market now is almost two markets. We’ve had a good rebound at the high end, so-called luxury products. Part of the reason is because luxury products took a big hit during the recession, but they are coming back. Also because the people who buy those — primarily higher-income households — their unemployment rate has tended to be lower, so they have more buying power. “But in contrast we have a much weaker retail market that is focusing on maybe the low-to-middle end. Those are the people — the buyer of those products … are the people who are really struggling. They tend to have higher unemployment rates. “So we are really seeing a two-pronged retail market: high end doing much better; low-middle end, not doing as well. And in some sense that reflects the entire economy.”Category: Economic Perspective
<urn:uuid:42c56233-8aba-4edd-97ab-df295ec6854a>
CC-MAIN-2015-35
http://www.cals.ncsu.edu/agcomm/news-center/economic-perspective/split-buying/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.982612
250
1.59375
2
- 2015 Federal Election Bad week for pedestrians Pedestrians were hit by vehicles in three separate instances last week. A 35-year-old woman was hit by a car while crossing the intersection of Robron Road and Alder Street at 2:20 p.m. on Friday. “Totally a piece of bad driving resulted in the injury to this person,” said RCMP Sgt. Craig Massey. “When we have vehicles stopped at a cross walk, other drivers need to be aware of the totality of their surroundings and generally if other vehicles are stopped at a cross walk there’s a good reason for it.” Two vehicles making right hand turns were stopped at the cross walk waiting for the woman to cross the intersection. A 19-year-old Campbell River woman driving south on Alder Street in a 1986 Honda Accord passed the two stopped vehicles, entered the crosswalk, and struck the pedestrian. “For whatever reason this young driver decided to go past them (the other cars),” said Massey. “From the pedestrian’s standpoint, at that point vehicle traffic has stopped to allow you safe passage in the cross walk as you’re entitled to do, and then she was clipped by the impending driver.” The pedestrian was treated for minor injuries. Charges of fail to yield to a pedestrian will be laid against the 19-year-old driver. A young man was hit on Dogwood Street near 7th Avenue while he was jaywalking at 1:42 p.m. on Thursday. The 23-year-old Campbell River man was running across Dogwood Street attempting to dodge through passing traffic. According to Massey, witnesses reported that he got through the southbound traffic, but when crossing into northbound traffic he emerged suddenly from behind a large truck. “The last vehicle that he ran in behind in the southbound traffic was some type of a cube truck so that obscured the visibility of him to any northbound traffic,” said Massey. “So he emerged from behind that cube truck directly into the path of the northbound motorist.” Massey said the young man ran into a Jeep driven by a Campbell River man when he crossed into the northbound lane. “He actually ran into the vehicle, rather than the vehicle running into him,” said Massey. “If he was struck fully on the front of the vehicle, that would indicate the vehicle had struck him. In this case, he struck a moving vehicle from the side and ended up going over the hood and impacting the windshield.” The pedestrian was transported to hospital, and details on the man’s injuries are unknown, but he was released from hospital later that day. He was issued with a violation notice for failing to yield right of way to a vehicle when not in a cross walk. Later in the evening on Thursday, a pedestrian was hit in a gas station parking lot, however, the driver and the pedestrian left the scene before police arrived. Massey described the incident as “very odd.” Witnesses at the scene said that a silver Honda CRV had been parked curbside in the 900 block of South Island Highway about 8:00 p.m. “For reasons unknown, the vehicle starts to accelerate, turns into the parking lot for that fueling station, strikes the pedestrian,” explained Massey. “The pedestrian goes up over the hood of the vehicle and rolls off, and the vehicle continues on and flees from the scene.” When police arrived, they were told that the pedestrian had gotten up and left the scene as well. Massey said police are still investigating the incident. “We’re trying to track down both the pedestrian and the operator of the silver Honda CRV to try and find out if this was an intentional act or truly an accident,” said Massey.
<urn:uuid:6ff5eb0c-7f8a-4c37-b2cf-f7236a1e2289>
CC-MAIN-2015-35
http://www.campbellrivermirror.com/news/135127388.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.980133
823
1.5625
2
The Squaxin Island Tribe recently launched PaddleToSquaxin2012.org, an information and news website for the final stop in the 2012 Intertribal Canoe Journey. The website will be the main conduit for public information for one of the largest tribal cultural events in the region. The journey is an annual intertribal celebration of Pacific Northwest canoe culture and tradition. A different tribe hosts each year. The Squaxin Island Tribe has selected “Teaching of Our Ancestors” as the core theme for the 2012 journey hosting. More than 100 canoes will land at the Port of Olympia, in Washington state, on July 29th, with thousands of people joining together to welcome each arrival. Canoe Families, friends and relatives then move to a celebration & Potlatch Protocol at the Squaxin Island Community, Kamilche, WA, July 30 – August 5. Both the landing and potlatch protocol are open to the public. For centuries, Pacific Northwest tribal people navigated the waterways in intricately carved dugout canoes. The Salish Sea, the body of water that encompasses Puget Sound, the Strait of Juan de Fuca and the Strait of Georgia in Canada, was the central force that connected canoe cultures for intertribal communication and trade. But early federal government mandates outlawed many tribal traditions, resulting in ceremonial practices and the art of canoe building and ceremonial practices being nearly lost. In 1989, the Canoe Journey, originally called “Paddle to Seattle”, was organized as a revival of the canoe culture traditions and the Native American contribution to the Washington State Centennial. Today, tribes from Washington, Oregon, Alaska, Hawaii, Canada, New Zealand, Japan and the Seminole Tribe in Florida participate. The Squaxin Island Tribe has reached out to all marine based indigenous peoples to participate in the 2012 Journey. 2012 Canoe Journey staff is working in partnership with the Port of Olympia, cities of Olympia and Shelton as well as Thurston and Mason Counties and their communities. A Canoe Journey Green Team Subcommittee is working to create a zero waste event. Paddle to Squaxin 2012 is a drug and alcohol free event.
<urn:uuid:7ad8dd92-a35b-4aff-a778-8cdc68655bd0>
CC-MAIN-2015-35
http://www.canoekayak.com/news/industry-updates/paddletosquaxin2012-launches/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.932263
450
2.4375
2
Kenneth Cole Community Action Program @ Columbia University I have learned an incredible amount about New York City neighborhoods, non-profit organizations and how the two work together to achieve tangible results in the community. Wherever my future career takes me, I would like to carry CIVITAS’ dedicated example as proof that active citizen engagement can lead to real, noticeable changes within a bustling city.” -Hannah Diaz, Urban Planning Intern, CIVITAS The Kenneth Cole Community Action Program @ Columbia University provides students with a New York-based internship in the field of civic engagement and not-for-profit. Civic engagement means working to make a difference in the civic life of our communities and developing the combination of knowledge, skills, values and motivation to make that difference. The Kenneth Cole Community Action Program @ Columbia University (formerly "Columbia Communities in Action - CCIA"), in partnership with the Center for Career Education (CCE) and Student Engagement, began in 2008 as a new way to engage students in the community while developing key transferable skills. Today, the program is also run in partnership with Kenneth Cole. With the support of career counseling professionals, students are able to identify and develop personal and professional goals. As part of the program, participants take part in networking events, training workshops and educational programming designed to help explore career opportunities in civic engagement throughout the Spring semester. Participants intern with a not-for-profit organization that will allow them to simultaneously build skills and gain experience while contributing to a cause they feel passionate about. Students work in a variety of different roles from research to project management to fundraising and development. The possibilities to utilize and apply skills are endless in this field. To get a better understanding of the variety of opportunities available through this program, please read the Student Experiences section below. The following are a small sampling of industry areas in which students have interned through the program: |Immigrant Rights||Women's Health||Urban/Community Improvement |Legal Advocacy||Public policy ||Environmental Issues||LGBT Rights| |Corporate Responsibility||Education||Faith based/Spiritual organizations||Child & Family Services| The Kenneth Cole Community Action Program @ Columbia University is a combination of internship experience at a not-for-profit organization, peer connections with other program interns and career development and support with career counseling professionals. Program features include the following: - Pre-program training that includes program overview, self assessment exercises, and goal setting workshops with the support of a career counseling professional. - Twelve-week internship for 10-20 hours per week during the Spring semester. - Mid-semester dinner with other interns to discuss and debrief on internship experiences. - One-on-one career counseling appointments throughout the twelve weeks to support and enhance the internship experience. - End of Program Reflection Session that includes evaluation of the internship experience, goal attainment analysis, resume workshop and interview coaching. - Networking events, fairs and workshops in the field of non-profit and civic engagement. Upon completion of the Kenneth Cole Community Action Program @ Columbia University, students will have gained a richer understanding of civic engagement and the not-for-profit industry. Students will have learned about the wide variety of roles involved in not-for-profit work and had several opportunities to network with individuals currently working in the field. Additionally, students will have acquired professional skills such as research, effective communication, problem solving, time management and project management. With the support of a career counseling professional, students will also be able to articulate their experience through goal setting exercises, understanding transferable skills they have gained, and reflecting upon their internship experience appropriately. "Ultimately, my time at Lambda Legal assisted me in deciding what I wanted to do as a career. As a Political Science and History major, I've had extensive training in political theories on organization and historical accounts of social movement...However, I've never has the chance to work first hand at one. The internship complimented my studies well by showing me how to conduct fieldwork and how a non-profit movement organization functions. I was able to learn how to practically apply what I've learned." - Andrew Wright, 2013 Intern, Lambda Legal The application period is now closed. Please check back for Spring 2016 opportunities in Fall 2015. |Intern Cecilia Hackerson worked as a Community Organizing Intern at Goddard Riverside Community Center SRO Law Project. Check out Cecilia's informative reflection about the challenges she faced and knowledge she gained. ||Intern Jacquelyn Kovarik was so inspired by the activism and dedication to service at the All Stars Project in New York City that she plans to stay involved. Read more about her experience here.| |Joanna Kelly worked as an intern for the development department of the Vera Institute of Justice. The Vera Institute is a non-profit organization that partners with governmental organizations and leaders in civil society to improve the justice systems in our country. For more about Joanna's experience read here.||Intern Sarah Zimmerman gained first hand experience in urban planning through her work as an Urban Planning Intern at CIVITAS. Check out Sarah's creative storify about her internship experience.| An energized blogger, Ayushe Misra, writes about her experience at Reach the World (RTW)! RTW is a STEM-based, global education program to connect students in classrooms with scholars traveling around the world. As an intern, she was able to explore careers in education, marketing, and public relations. Read about her experience here. |Ariela Wallace reflects on her internship experience at the Interfaith Center of New York. As the outreach intern, her primary responsibilities included assistance with the expansion of the “Reentry Family and Faith Circles of Support.” Check out her wonderful work with the East Harlem community here.| As the Community Mobilization and Education Intern, Maria Martinez certainly made a difference through the National Latina Institute for Reproductive Health (NLIRH) where she established meaningful connections and became part of the community! NLIRH is focused on increasing efforts to serve Latinas and women of color in their access to reproductive health. Read more about Maria’s experience here. |Anne Chen reflects on her internship experience at America Needs You, a non-profit organization dedicated to provide first-generation, low-income college students with support in professional development. She enjoyed her experience so much that she decided to extend her time beyond her original commitment! Read more here.| Please attend one information session to learn more about the Kenneth Cole Community Action Program @ Columbia University as well as other CCE Spring Internship Programs (CAE, SIP, and VIP). Monday, October 12, 2015 12:00pm - 1:00pm CCE Conference Room Tuesday, October 20, 2015 5:00pm - 6:00pm CCE Conference Room If you have questions about this program, please feel free to contact: Associate Director, Office of Student Engagement Associate Director, Center for Career Education (CCE) If you are an employer interested in hosting a student through the Kenneth Cole Community Action Program @ Columbia University, please contact: Associate Director, Alumni Outreach
<urn:uuid:4da5d091-6215-486c-a4eb-dc3f7ee03949>
CC-MAIN-2015-35
http://www.careereducation.columbia.edu/findajob/cce-internship/KCCAPatCU
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.940833
1,488
1.867188
2
Catholic Relief Services In 1943, during World War II, the Catholic Bishops of the United States established Catholic Relief Services (CRS) to help war-torn Europe and its refugees recover from this great conflict. In the 1950s, as Europe regained its balance, the agency began to look to other parts of the world, seeking out those who could benefit from the assistance of Catholics in the United States. Over the next two decades, Catholic Relief Services expanded its operations and opened offices in Africa, Asia, and Latin America. During this time of expansion, CRS built on its tradition of providing relief in emergency situations and began to seek ways to help people in the developing world break the cycle of poverty through community-based, sustainable development initiatives. 70 years later, CRS mission continues to focus on helping those most in need, providing assistance to 130 million people in more than 90 countries in Africa, Asia, Latin America, the Middle East and Eastern Europe. CRS emphasizes the empowerment of partners and beneficiaries in programming decisions. Over 92 percent of CRS expenditures go directly to programmes that benefit the poor overseas while 37 percent of CRS programmes and campaigns focuses on emergency relief in the wake of disasters and civil conflict. Long-term development programming focuses on the areas of agriculture, community health, education, health, HIV/AIDS, micro finance and peacebuilding. Once CRS meets the immediate needs for food, water and shelter when supporting survivors of natural disasters and chronic emergencies, they then transition to rebuilding and reconstruction. The innovative approach of CRS, combining healthcare, literacy and microfinance, has allowed them to engage in 164 sustainable agricultural projects in 34 countries. CRS headquarters is located in Baltimore, MD and has approximately 5,000 employees worldwide. The agency is governed by a Board of Directors consisting of 15 clergy and six lay people. Domestically, CRS carries out the social mission of the Church with 8.5 million Catholics in 14,337 parishes, dioceses and schools through programmes such as CRS Rice Bowl, CRS Fair Trade, the Helping Hands volunteer programme, advocacy initiatives, and programmes for university students and young people. As part of the universal mission of the Catholic Church, CRS works with local, national and international Catholic institutions and structures, as well as other organisations, to assist people on the basis of need, not creed, race or nationality. Overseas work is done in partnership with local church agencies, other faith-based partners, non-governmental organisations and local governments. Caritas Updates from the United States Catholic Relief Services Info |Postal Address||Catholic Relief Services 228 W. Lexington St. Baltimore, Maryland 21201-3443 |Telephone||+1-877 435 7277| |Fax||+1 410 234 2986|
<urn:uuid:385df504-e516-46cf-98b8-095e276927c9>
CC-MAIN-2015-35
http://www.caritas.org/where-we-are/north-america/united-states-of-america-crs/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.930267
574
2.671875
3
A person with cancer wouldn’t be put into a looney bin, but that’s where patients with mental illness are said to go. While mental illness is just as real, it is sometimes assumed it’s “all in their heads” and can be controlled with will alone. Often medicine can and will control many mental illnesses but getting the patient to get past the stigma of getting a diagnosis or treatment is not always easy. There are a lot of reasons to not want a mental illness; however one in five people in BC will be affected by such an illness, according to the Canadian Mental Health Association. We have to eradicate the stigma. Phrases like “looney bin” and “nuthouse” just perpetuate shame. The invisibility of mental illness, i.e. no physical evidence, can make it hard to understand. As a result, people often wonder why those suffering don’t work their way out of their situations. There are things those of us with mental illness can do to help ourselves, but there are no cures, and we cannot just “get over it.” Believe me, if we could, we would! People sometimes use hurtful words and don’t even realize the damage that is being done. Casual comments can cut deep. “I have a crazy amount of work to do,” meaning an out of control amount, or “that movie was insane,” are commonplace. Such phrases further alienate those with mental illness. Choosing kinder words and thinking before we speak can do a world of good. The word “insane” according to the Collins Essential English Dictionary can mean mentally ill or stupidly irresponsible. No wonder such a word stigmatizes! We need to talk openly about mental illness to get rid of the stigma, and we can start by choosing our words wisely.
<urn:uuid:aa4c323e-c722-498e-a873-dc52be9a2e47>
CC-MAIN-2015-35
http://www.castanet.net/news/A-Life-Bipolar/110434/Stigma
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.963402
398
2.828125
3
BENEFITS OF BEING IN A 4-H CLUB A statewide club study was conducted during the fall of 1998 of all 4-H clubs in NYS. In addition several focus groups were held around the state. The following is a sample of what was learned. * They like being involved in 4-H over a period of several years (2 to 5). * Most members belong to general type clubs, (not limiting your experiences). * They like exploring a broad range of interesting topics. * They like 4-H a lot as opposed to finding it to be just o.k. * They were somewhat interested in doing things for other people. * They were very interested in the values learned in 4-H that help guide their lives. * They have been able to practice what they learned in their daily lives. * Many were interested in having a career related to what they learned in 4-H. When asked what was most important to them in their club experience, their highest rated response was; having fun followed by, having interesting things to do, under good adult leadership, where they made new friends, and were active. Finally, the majority of respondents in each category said that 4-H helped them to learn the following skills: * Setting goals * Keeping records * Resolving conflicts * Making decisions * Planning and organizing * Accepting people who are different * Nutrition and food safety * Feeling confident about themselves * Solving problems * Communicating ideas * Working as a team * Making healthy choices THE 4-H LEADER What and who is a 4-H leader? An adult who works voluntarily with a group of 4-H members. Parents or other adults who are willing to volunteer a part of their time and skills. Many 4-H leaders are parents with full time jobs, who may or may not have been involved in 4-H as a child. They share their abilities and life experiences with the youth in their club. All prospective 4-H leaders must apply by filling out an application, have references checked, and if selected, sign a code of conduct. Are there different kinds of leaders? Yes. Some adults teach members how to do things and are called project leaders. They usually have a special interest or skill such as photography or clothing or gardening. Adults who help a group get organized and run their meetings are called Coordinating Leaders. STARTING A 4-H CLUB How do you get a 4-H group started? You need at least five young people 8 to 19 years old and adult leaders who are willing to help. A Membership Specialist is available to assist you with everything you need to get started. How big should a club be? This depends on the age of the members, where they meet and the leadership available. The average club in Delaware County usually has five to ten members and two or three leaders. All new clubs are encouraged to start small and increase in size when the club leaders feel comfortable. What about officers? 4-H clubs may have officers. The Extension office provides helpful materials for presidents, vice-presidents, secretaries, treasurers, news reporters, recreation leaders, and historians. It is a good idea to wait until the second or third meeting to elect officers, when members have gotten to know one another. The club format is an excellent vehicle for leadership development! Is there more to the club experience? Yes! Opportunities abound for 4-Hers to expand their experiences through countywide programs. These programs provide higher levels of learning and achievement along with forums for youth to share what has been learned. The programs also offer opportunities to meet youth throughout the county, the region and the state and gain new friendships!
<urn:uuid:7e3ae955-e912-4dc1-b1c4-962d1b246bfb>
CC-MAIN-2015-35
http://www.ccedelaware.org/4h-youth-development/4HClubs.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.978315
779
2.328125
2
DragonWave Wins In-Flight Wi-Fi Backhaul Contract Published on: 22nd Jan 2014 Note -- this news article is more than a year old. Microwave backhaul vendor, DragonWave says that it has been selected as a solutions for backhaul connectivity as part of Gogo's ongoing expansion efforts. Gogo is a provider of in flight services, having equipped more than 2,000 commercial aircraft and more than 6,500 business jets. The DragonWave Horizon Quantum and Horizon Compact+ radios offer the performance parameters for linking Gogo's remote tower locations back into a wired network. DragonWave's links are being designed into the Gogo network by Future Technologies Venture. Delivering up to 4 Gbps per link, Horizon Quantum split-mount system provides dual-channel capability and high spectral efficiency, capacity, and nodal intelligence. "We've enjoyed helping support the unique vision Gogo is pursuing to provide airline travelers around the world with dependable inflight entertainment services," said Peter Allen, DragonWave President and CEO. "Probably the best compliment one gets from a customer is repeat business, and we're committed to help Gogo succeed as they expand their business of connecting passengers to the Internet at 30,000 feet."
<urn:uuid:71122696-40b7-49a1-b7fb-b2e845dc0c96>
CC-MAIN-2015-35
http://www.cellular-news.com/story/64023.php?source=rss
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.930137
254
1.539063
2
- About Us - Local Savings - Green Editions - Legal Notices - Weekly Ads Connect with Us Yah baby! When hearing is believing A hearing test given just hours after birth could help children avoid years of playing catch up. With help from a local Lions Club, Harrison Hospital began offering in September 2002 a universal newborn hearing screening free of charge. The painless test takes about five minutes. A probe is inserted into the babys ear and a series of clicking sounds are transmitted into the ear said Wendy Quisenberry, patient care supervisor for Harrison Silverdale. A computer and software measure the babys response and issues a pass or refer rating. If the newborn does not pass, the test is given again before discharge. If the baby does not pass, the parents are referred to a pediatrician. Since September they have tested 672 babies. The baby is typically tested 12 hours after birth when all gestation/birth debris has cleared the ear. The test is usually given after the baby has been changed or fed when the child is relaxed. The Bremerton Central Lions Club donated the money to purchase the equipment and software. The Lions Foundation matched those funds. Harrison Hospital Foundation has also contributed to the program. Quisenberry said parents have been ecstatic about the new test, which isnt mandated by the state. Significant hearing loss is one of the most common health problems at birth affecting three in every 1,000 newborns according to the American Academy of Pediatrics. Left undetected hearing loss can impact basic language, social and thinking skills. If detected and treated however, these negative impacts can be lessened and even eliminated. The goal is to get all babies with hearing loss the help they need within their first three months of life she said. Babies who are identified and receive treatment by six months of age have the chance to develop speech and language skills close to their peers. Without screening the average age at which hearing loss is identified is between 2 and 3.
<urn:uuid:9ed70c49-073e-412b-832e-7337308d2e95>
CC-MAIN-2015-35
http://www.centralkitsapreporter.com/news/19779684.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.956052
409
2.59375
3
You may well have heard Dr Baxter this summer as she was featured on BBC’s Woman’s Hour talking about her latest research on women in the boardroom. Enjoy this interview with her and be inspired! Dr Judith Baxter is senior lecturer of Applied Linguistics at Aston University and has a very impressive array of publications and books to her credit. She recently published some research into how women’s language styles impact on boardroom behaviours, a topic very close to my heart! I’m so pleased we got this opportunity to talk with her. Jane: Judith, thank you so very much for making the time to talk with changing people readers, it’s much appreciated. Your latest piece of research made a stir nationally (it was featured here on the blog too) and was picked up by several media outlets. We obviously only got edited highlights in the press so could you tell us a little more about what prompted the project? Judith: My interest goes back some way! A few years ago, I was working in a FTSE 100 company as a consultant and I couldn’t help but notice that all the senior managers I encountered were male. As an applied linguist, I wanted to know why there was a lack of senior women on senior management boards, and wondered if the use of language might help to explain this. Was there something about the way leaders use language that might hinder senior women? Research has explored the topic from many perspectives – historical, sociological, educational and psychological – but I wasn’t aware of any research on the language of leadership, so I wanted to fill the obvious gap! The (very simplified) conclusions of that research were that women’s style of talking in board rooms led to a loss of their authority. How do you think women can mitigate the effects of that? Well, that is a very simplified version of my findings. My principal finding is that senior women use a type of leadership language that I call ‘double-voiced discourse’ (DvD) more than senior men. DvD involves anticipating the hidden agendas and concerns of your colleagues and adjusting what you say in light of this. It is used to predict and dilute potential conflict with colleagues especially in difficult or challenging contexts. It seems to be particularly prominent where women are outnumbered on Boards. The media picked up on the ‘weak’ form of DvD, which can make women sound apologetic or defensive and therefore lose authority with their teams or colleagues. For example, I have heard senior women frame a comment by saying: ‘I’m sure you’ve thought of this before but I think that…’, and ‘this must sound perfectly obvious to you but...’ and ‘at the risk of sounding assertive’, and even ‘I will shut up, I’ve been speaking too much’. It is difficult for women to change this because such self-corrective devices are learnt over time from girlhood in order to handle conflict with others in acceptable and non-threatening ways. The first step towards mitigating such effects is to notice when other people use DvD, or better still to notice when you use it yourself. Ask whether self-deprecating phrases are actually helpful or needed within a given context, or whether they just make you sound uncertain and tentative. Once you have developed a level of awareness of the language you use, you can start to adjust it by removing the more tentative phrases. Perhaps note how senior women or men you consider as role models use speech when they sound particularly assured. However, my findings also show that there is a ‘strong’ version of DvD which helps senior women to be highly effective as leaders in male-populated contexts. Strong DvD enables women to adjust and adapt what they have to say to achieve their own agenda but also to preserve alliances with colleagues. For example, a senior woman succeeded in getting her team to accept a tough decision by asking them to step into her shoes and visualise the issue from her point of view. She said, ‘See my problem is that if I have to go to the Board and ask for another million pounds, then the consequence will be…..’. In another example of a meeting, a woman said to a male colleague who hadn’t spoken but was looking agitated, ‘I can tell you want to say something, Simon, please share your views’. These examples showed a heightened ability to predict colleagues’ concerns and respond to them while remaining clearly in authority. How far do you still think women need to adopt male ways of behaving to progress at work? I see so-called male ways of behaving as part of the ‘strong’ version of DvD. The ability to speak assertively is a vital part of effective leadership communication for both women and men. The knack is to judge when it is necessary to speak assertively and when it would be wiser to use an alternative strategy. So a woman leader I observed who judged she wasn’t being taken seriously about her decision on a controversial issue suddenly did a ‘role-break’ by saying ‘come on guys, give me a break will you, we’re getting f*****g nowhere with this.’ People sat up and listened. The use of role-breaking out of the conversational frame in order to speak assertively if required can be a very effective strategy alongside more conciliatory approaches. When you were at school did you imagine having the academic life you now have? What were your aspirations then? I felt I was given a very limited set of options as I was sent to an academic, all-girls grammar school which expected the most able pupils to go to university and then on to teach, and those who were viewed as less able to go to a teacher training college. That was the choice: teach, or if you were a really hopeless case, go into nursing! I do wish I had been given some careers advice about entering the business world; I didn’t even consider it and yet it might have suited me better than the academic world, who knows! Today, I am the first to suggest the business world as a career to our English graduates as I think they have many of the right aptitudes: criticality, excellent communication and social skills, creativity. However, I do love being an academic; it gives a certain freedom. Have you had a role model in your career? Or someone who has supported and encouraged you? I would like to say my mother but it isn’t true, much as I love her. If there is a female role model, it would be the Vice Chancellor at Aston, Professor Julia King, who is one of the few VCs in the UK, despite the predominance of women at middle management level in academia. She has championed the cause of women leaders by appointed two pro-Vice Chancellors who are women, and two (out of five) Deans who are women. This is almost unheard of in British academia! She also has the personal touch. She knows about my work and encourages me by sending me details of conferences, interesting articles and contacts for my research. My research has even been discussed on the Executive Committee and Council, always good for the ego! Which person in the public eye do you most admire and why? I think Helen Morrissey is very inspiring. From what I read, it really is a case of ‘I don’t know how she does it’. She meets all the superwoman criteria of running her own business, being paid a super-sized salary, having dozens of children, sustaining happy family relationships, looking slim and glamorous, and alongside all that, she seems a really decent person who says down-to-earth things about women, the work-life balance and leadership. I hesitate to say this, but I also think the pop star Madonna has been a source of inspiration. I doubt that she’s a particularly nice person or that she is good at social relationships which I usually think is essential. But she has an extraordinary drive and sense of self-discipline which has allowed her to achieve against the odds and to display an amazing range of talent. I think young women could learn from her. Do you think your research applies to women in academia as well as in business? Indeed I do. This could be a long discussion so suffice to say the same pressures exist in academia as they do in the business world for men to succeed at the expense of women. It was in a University Senate meeting that I heard a senior woman who had only spoken twice say ‘I’m talking too much, I’m talking too much’. There has been much talk of late about quotas for women in the boardroom. It’s something I have come to believe has to happen to change attitudes, albeit a conclusion I’ve come to with reluctance. What are your thoughts on quotas? Yes I would agree too, because it is a necessary counter force to systemic pressures to promote men at the expense of women. I believe that if we can move towards a gender balance in the boardroom, the gap between a male and a female style of speech would disappear. Both men and women would use a broader range of linguistic strategies akin to the strong version of DvD. What’s the best piece of advice you have ever been given? I used to be very nervous about giving talks, even though I was a teacher in my early days. I still get nervous but in a good way. I was given this advice. If you have to give a talk, a speech or a presentation to a room full of strangers who you know nothing about, act as if you know them. Look them in the eye, take them in, speak as you would normally speak to a group of people you do know, don’t prepare jokes and the natural rapport will emerge. What advice would you give a young woman with her sights set on the boardroom? My advice would be to learn to use the strong form of DvD to your advantage! What this means in practice is learning that language is a powerful resource to achieve your own ambitions while preserving alliances with team members and colleagues who matter. It is a case of judging when to use humour, politeness, authority, role-breaking tactics, scenario setting, visualising and other DvD strategies to their best effect. Yes it can be quite manipulative, but always in a good way, as you are using it to manage people to bring the best out of them, while making a powerful impact on others. How do you relax and unwind? Hmmm. There isn’t much time for that as I commute from home in Hampshire to Aston University in Birmingham. I used to ride and own horses when my daughters were younger, but now I enjoy simple walks in the country at weekends with my husband and dog! I also love going to the theatre, high brow and low brow. I have seen Shakespeare’s All’s Well that Ends Well and the Wizard of Oz in London recently. If you could choose an alternative career, anything at all, what would it be and why? Almost certainly a theatre director. When I was younger, I directed a number of plays in schools and colleges and it was magical. I can but dream! I’d love to see what would have happened if you’d put your talents to use in the theatre world! I suspect more older talented women actors might be around… Judith, thank you so much for sharing your thoughts, it’s a fascinating topic. If you’d like to see find out a bit more about Dr Baxter her University link is here and she has a blog called Leadership Talk which makes reference to her project. This link will take you to her book page on Amazon. Would you like regular bursts of inspiration in your in box? Sign up to my blog. (Your privacy is always respected). Click here. Posted on September 8th, 2011 by Jane
<urn:uuid:9b015dd6-fdba-43e7-ab70-c3d653a50e39>
CC-MAIN-2015-35
http://www.changingpeople.co.uk/2011/inspirational-women-dr-judith-baxter/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.976996
2,516
1.851563
2
Protestantism and Patriotism is a detailed study of the first two Anglo-Dutch Wars (1652-1654 and 1665-1667) and the ideological contexts in which they were fought. It differs from other treatments of English foreign policy in this period by emphasizing that diplomacy, trade and warfare cannot be studied in isolation from domestic culture. It also insists, unlike most studies of domestic politics in the period, that England's place in Europe and the wider world was central to political and cultural developments in this revolutionary age. Back to top Rent Protestantism and Patriotism 1st edition today, or search our site for Steven C. A. textbooks. Every textbook comes with a 21-day "Any Reason" guarantee. Published by Cambridge University Press.
<urn:uuid:61ece2e2-54d0-45fb-b3b8-d9770bb2c064>
CC-MAIN-2015-35
http://www.chegg.com/textbooks/protestantism-and-patriotism-1st-edition-9780521893688-0521893682?ii=23&trackid=10f55ce1&omre_ir=1&omre_sp=
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.959446
156
3.015625
3
Designed for beginning elementary education teachers, this comprehensive study guide will help you prepare for the WEST-E Elementary Education certification exam. This guide covers the core competencies and skills of mathematics, science, health/fitness, language arts, social studies, and the arts. Mastered the content? Practice for the real exam with 110 sample test questions that include full answer rationales and question rigor level. Achieve excellence with this study guide from XAMonline! Back to top Rent WEST Elementary Education 1st edition today, or search our site for Sharon textbooks. Every textbook comes with a 21-day "Any Reason" guarantee. Published by XAMonline, Incorporated.
<urn:uuid:b62ce657-8ffb-4b92-bb0b-3c6b4940957a>
CC-MAIN-2015-35
http://www.chegg.com/textbooks/west-elementary-education-1st-edition-9781607871385-1607871386
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.893232
141
2.421875
2
When he puts on his sailor suit, sailor hat, and sailor whistle, the boy in this book is ready for a journey. He imagines himself on a ship, sailing across the sea, in search of treasure. A sailor's life is dangerous. But a sailor must be brave no matter what happens. In this charming story about imagination and adventure, told with Uri Shulevitz's signature playfulness and style, a little boy learns how to be courageous, both on the high seas and at home. The tale is based on a childhood memory from the time when the author/illustrator and his family lived in Warsaw on the eve of World War II. Back to top Rent When I Wore My Sailor Suit 1st edition today, or search our site for Uri textbooks. Every textbook comes with a 21-day "Any Reason" guarantee. Published by Farrar, Straus and Giroux (BYR).
<urn:uuid:73199f75-5e08-43eb-b9e1-515c0bd56a9c>
CC-MAIN-2015-35
http://www.chegg.com/textbooks/when-i-wore-my-sailor-suit-1st-edition-9780374347499-0374347492
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.952629
191
2.03125
2
Investigating interesting problems about the world makes mathematics compelling and engaging, but many students experience math as simply a set of rules and procedures to memorize and repeat on tests. Writing, however, frees students of the idea that mathematics is a collection of right answers owned by teachers. In Writing to Learn Mathematics, Joan Countryman demonstrates how you can dramatically improve students' reasoning capabilities using: journals learning logs letters autobiographies investigations formal papers. The text provides descriptions of writing activities that classroom teachers can use to enhance the learning of math and includes examples of student writing, from short journal entries to excerpts from longer research papers. Most helpful are the topics suggested to explore at different levels of the primary and secondary mathematics curriculum, including descriptions of student responses to these presentations. Readers of Writing to Learn Mathematics will discover how writing can help students develop concepts and thinking skills as well as free them to recognize what they know--and what they want to explore. Back to top Rent Writing to Learn Mathematics 1st edition today, or search our site for Joan textbooks. Every textbook comes with a 21-day "Any Reason" guarantee. Published by Heinemann.
<urn:uuid:5b701026-a5a9-463c-94b3-72eac6377b6b>
CC-MAIN-2015-35
http://www.chegg.com/textbooks/writing-to-learn-mathematics-1st-edition-9780435083298-0435083295
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.940342
231
3.59375
4
CHESTER Zoo is celebrating two new arrivals in just a matter of days. Delighted keepers and staff have welcomed a new baby Rothschild giraffe and a baby black rhino – both critically endagered species – to the zoo in a matter of days. The giraffe, which already stands 5ft 6in tall, was born to mum Dagmar following a 14-and-a-half month pregnancy on Monday, October 1, while nine-year old black rhino, Ema Elsa, gave birth to her as yet unnamed calf on Wednesday, October 3. Tim Rowlands, curator of mammals at the Upton zoo, said: “Dagmar is a first-time mum but you’d never guess it. She has been doing brilliantly so far. She seems to be taking motherhood all in her, rather long, stride. “The baby is strong and tall and she was on her feet really quickly and suckling from mum not long after.” With only 670 Rothschild giraffes left in the wild the zoo matched Dagmar up with a bull giraffe, Thorn, using a similar format to a digital dating services. The database contains information on gender, age, height and weight, as well as details of an animal’s personality. Lizzie Bowen, senior giraffe keeper, said: “Dagmar was described as being rather playful and pretty and she has certainly lived up to that. She seemed to turn Thorn’s head pretty much straight away and this week we’ve seen the result with the birth of a beautiful, pure baby Rothschild giraffe.” While the black rhino calf is only a matter of days old, it already plays a vital role in helping to sustain the world’s black rhino population which has been ravaged by poachers, with only 700 Eastern black rhinos left in the wild. Keeper Helen Massey said: “Black rhino face a very real threat of extinction and so every birth is vital to ensure their survival. “The zoo puts a heck of a lot of time, money and effort into trying to protect the species in the wild and we support a number of sanctuaries across Africa. However, as the demand for rhino horn intensifies, poaching is becoming a bigger and bigger problem. “Our new arrival is only taking small steps at the moment, but eventually it will have a bigger role to play as part of a co-ordinated breeding programme.”
<urn:uuid:44a9f3fb-b565-4731-a064-acf3e390cda0>
CC-MAIN-2015-35
http://www.chesterstandard.co.uk/news/116662/zoo-staff-delighted-by-new-arrivals.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.968155
523
2.078125
2
teach money to kids Deepti - posted on 04/06/2011 taking along for shopping and teaching is a good idea. but frankly speaking, no offence intended, paying for the house chores is not a good idea.. because being a family member, it is the duty to participate in home tasks and cooperate... by giving money u r giving the message that she is special and if she does something for her family and home then it should be compensated with money... i would say that a child should be motivated to participate and help without monetary benefit... also do you get money for maintaining your house and doing chores then why should others... i m giving u this link which may be of help to u, kindly visit: ur child may not be a defiant one but u can get ideas to make her more responsive and responsible towards her family!! have a gud day:)) Momma - posted on 04/06/2011 The best way I found to teach money to my child was to explain that she doesn't just get money, she earns money. I rewarded her for chores and then would take her shopping, teaching her along the way that what she spends she no longer has. How to save for her big items and how to purchase quality items not just junk because it's colorful and caught her eye. Maybe explain what goes thru your mind when you buy things. Join Circle of Moms Sign up for Circle of Moms and be a part of this community! Membership is just one click away.Join Circle of Moms
<urn:uuid:1df5bd97-7bd7-4cb4-9c92-648bbade3061>
CC-MAIN-2015-35
http://www.circleofmoms.com/back-to-school/teach-money-to-kids-633869
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.963102
319
2.234375
2
One of the benefits of electing a president with an ecological agenda who has lived in a Great Lakes state is the commitment to lakes restoration in the 2010 budget that Congress approved Wednesday. Emerging intact was President Barack Obama's promise to upgrade the health of the planet's largest group of freshwater lakes. The president has put the first-year price tag at $475 million. Now, it's up to legislators to follow through with appropriations for a project vital to the well-being of our region's most precious resource. Obama's proposed allocation is the biggest single-year cash infusion a president has ever promised to the Great Lakes. More specifics are expected next week, but so far it appears the money would float a new interagency initiative to address invasive species, habitat conservation and pollution. Obama knows firsthand that the Great Lakes' health is vital to the health of our regional economy. These waterways provide drinking water, help in the generation of power, and fuel shipping and sport fishing industries -- as well as a significant tourism trade. As a senator from Illinois, Obama co-sponsored the Great Lakes Legacy Act, which funneled tens of millions of dollars into the restoration of those 10,000-year-old bodies of water. As president, Obama could be a Great Lakes booster on steroids. Yet while we applaud his bold request, we recognize that the devil will be in the details. What will the legislation authorizing the appropriation look like? How will success be measured? What happens after 2010? Will this windfall be the start of a steady stream of greenbacks greening the Great Lakes? Obama and congressional delegations from the eight states that border the lakes must remain unanimous and unequivocal in their support of this initiative, so it doesn't die a death of a thousand partisan cuts. A fine example of across-the-aisle cooperation features Republican Sen. George Voinovich of Ohio and Michigan Democratic Sen. Carl Levin teaming up last Thursday to introduce a beefed-up Great Lakes Legacy Act. Yet such bipartisanship doesn't guarantee that this legislation won't sink without a ripple. That can't be allowed to happen, lest our Great Lakes become mediocre lakes.
<urn:uuid:e0c7f164-32cc-4634-a78e-208f63a63678>
CC-MAIN-2015-35
http://www.cleveland.com/opinion/index.ssf/2009/05/obama_offers_a_welcome_lift_fo.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.946331
441
2.421875
2
Does art have a season? |'The Fish' by Olga Snyder, from the Felted Wonders reader challenge gallery. I suppose if you are passionate about a genre of art, it doesn't matter. I couldn't bear the idea of touching yarn in the summer, but I know knitters who knit all year long, regardless of the heat or humidity. So it goes with people who like to felt . I'm sure avid felters make felt crafts all year round. We certainly received an enthusiastic response to the Felted Wondersreader challenge we ran this past summer (results in the November/December 2012 issue). But for me, the urge to play with fuzzy fibers doesn't take hold until the first frost— and then it takes hold with a vengeance. Felting is an ancient art, and it takes no time at all— and very few materials— to learn how to felt using the wet or hand needle felting methods. Hand needle felting, in particular, requires a very small investment of time and money. Hand needle-felting supplies consist of loose fibers, L-shaped hand needles (they are very sharp and have barbs at the business end), base felt (anything from felt balls to craft felt sheets to a felted piece of knitting), and a piece of thick foam for felting into. Here are basic felting instructions, adapted from Kelli Perkins's article in the July/August 2008 issue of Cloth Paper Scissors 1. Determine what kind of image you want to create on the front of your card. Start with larger, less complex shapes and work towards more intricate designs as you gain experience. A simple heart or flower is a nice beginning. |Basic needle felting supplies. 2. Place a pre-cut felt base on the felting foam. 3. Pull a small tuft of roving and fold or roll it into a loose ball roughly the size of the image you want to create. Lay it on the felt and poke the needle into it a few times to secure it to the foam. 4. From that point, poke the needle into the roving repeatedly until it begins to form a bond with the base. Be extra careful to know where your fingers are in relation to the needle at all times. After poking for a while, pick the base up from the foam and move it to another position. You'll see that the roving has migrated to the back of the felt base. Note: It is only necessary to push the needle into the foam ½" or less. 5. Continue poking the roving, tucking and folding the edges over with the needle as you go to form the image you are trying to create. |'Artichoke in Bloom' by Peggy J. Schadler, from the Felted Wonders reader challenge gallery. 6. Once you've outlined the basic form, select small tufts of different colors and place them on top of the already felted area, then felt over them again to meld them into the picture. You can create highlights and shading with various shades of wool or silk. Go ahead and mix different kinds of roving and even lengths of fun fibers and yarns. Many things will felt up nicely. Hand needle felting is great for small felting projects like jewelry, artist trading cards, and embellishments. There are many projects and ideas for felting in back issues and CD collections of Cloth Paper Scissors magazine . If you don't have every issue, now's the time to fill in your collection and catch up on projects and techniques you've missed. P.S. Do you tend to use different kinds of art techniques depending on the season? If so, what do you do in cooler weather vs. warmer weather? How else do you adapt your art to the weather? Leave a comment below.
<urn:uuid:dab399b7-635e-4b6a-9303-0498b3dd92f8>
CC-MAIN-2015-35
http://www.clothpaperscissors.com/blogs/clothpaperscissorstoday/archive/2012/11/14/how-to-hand-needle-felt.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.946506
800
2.203125
2
Volume 2, Part 1: Extant Commissioned Ships The following document is available for downloading or viewing: For more information on accessing this file, please visit our help page. Gules a griffin Or armed and langued Azure issuant from a crown vallary Argent holding in its claws an anchor Argent. The crown vallary represents the various fortifications built since Kingston's foundation. The griffin comes from the Coat of Arms of Count Louis de Buade of Pallau and Frontenac, the City's founder, and is found in the City's Arms. The anchor alludes to the City's rich naval affiliations. The main colours are from the City's Coat of Arms. PRO REGE ET GREGE (For sovereign and people) Gold and Red First of Name Coastal Defence Vessel, Kingston Class. Commissioned 21 September 1996.1 1. Annual Historical Report/Rapport historique annuel 1996, HMCS/NCSM Kingston, 18 March/mars 1997, file/dossier 1325-1, AHR/RHA1326-3351 Footnotes notice: This content is provided as it appears in the originating document (see PDF link above) and cannot be altered. Some notes reference annotation in only one of the official languages, and therefore numbers may not match in the content you are viewing. For clarification, we invite you to check the corresponding footnote in the French page.
<urn:uuid:0f185410-6317-4e58-8a39-0d1bd93715b9>
CC-MAIN-2015-35
http://www.cmp-cpm.forces.gc.ca/dhh-dhp/his/ol-lo/vol-tom-2/par1/kingston-eng.asp
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.825586
301
1.96875
2
Remember when it was taboo to write in books? Well, a college career of in-book highlighting and two e-readers later, I'm ready to admit that I have absolutely no guilt about writing in books. Or tearing them apart, for that matter. So when I was looking for inspiration for a DIY charging dock and found myself staring at a shelf of books, I knew I had the answer. With this guide, you'll turn a hardcover book into a charging station for your Android or iPhone. And, if you have an Android phone that's equipped with NFC, I'll also show you how to make your DIY dock. - a box cutter with a fresh blade - a hardcover book - your phone's USB charging cord - an NFC tag (optional, for those who have NFC-enabled phones) To tackle this project, watch the video for step-by-step instructions, and check out the tips, after the clip. A few tips: - Please, please be careful with the project. We don't want any amputated fingers and blood-ridden charging docks. That being said, proceed at your own risk, and leave this DIY to the adults. - Although the video shows instructions for an Android charging dock, the same process can be repeated for the iPhone. Simply cut the hole and the tunnel to the width of the dock connector. - If you wish, you can secure the cord to the cover of the book with a hot glue gun. This will make docking your phone a lot easier.
<urn:uuid:91488b7f-81e6-4d6a-9ef0-8ffa4da70c6a>
CC-MAIN-2015-35
http://www.cnet.com/how-to/diy-turn-a-book-into-a-sleek-charging-phone-dock/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.954749
318
1.796875
2
Head to the Google homepage today and you'll see the usual logo altered with some head-scratching physics symbols. That's because today is the 127th birthday of Niels Bohr, Danish physicist and Nobel Prize winner. Born (Bohrn?) on 7 October 1885, Bohr had science in his blood. His father Christian was a professor of physiology at the University of Copenhagen, and the man who named the phenomenon known as Bohr shift or Bohr effect. This is a macrobiological phenomenon relating to the relationship between blood pH, blood Co2 concentration, and haemoglobin proteins releasing oxygen. (To be honest, it's all a bit complex for a Sunday morning.) Aged 18, Niels Bohr started studying philosophy and mathematics, receiving his doctorate in 1911. In 1912 he joined the Victoria University of Manchester, and became part of the group of eminent scientists who studied the structure of the atom. Bohr published his model of atomic structure in 1913, in which he introduced the theory of electrons travelling in orbit around the atom's nucleus, sort of like satellites. He posited that the chemical properties of each element were largely down to the number of electrons it had in orbit. He also came up with the idea that an electron could drop from a higher energy orbit to a lower, and while doing so would emit a photon of discrete energy. This became the basis of quantum theory, so Bohr's influence can't be overstated. His work led to him being awarded the Nobel Prize for physics in 1922. He was honoured for services in the investigation of the structure of atoms, and of the radiation emanating from them. Michale Frayn's 1998 play Copenhagen centred on what might have happened in a 1941 meeting between Bohr and fellow physicist Werner Heisenberg. The two are said to have held differing views concerning the use of nuclear weapons in the second world war. Bohr died in Copenhagen in 1962 of heart failure.
<urn:uuid:5ba9c5a8-de8e-4493-bec8-f738ffbbde64>
CC-MAIN-2015-35
http://www.cnet.com/uk/news/niels-bohr-celebrated-with-google-doodle/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.973589
405
3.59375
4
"We have to be very careful I mean you really never know what you're going to encounter on Boilermaker Sunday, last year for example was a very hot and humid day and the medical tents were very, very busy,” says Boilermaker President Tim Reed. Reed says running 9.3 miles in hot humid weather is often a recipe for dehydration, which is why 20 medical stations are set up along the course plus the main medical tent at the finish line and two at the post-race party. "To basically rehydrate people is the biggest thing that they have to do, if they're really in a severe distress they can go anywhere from putting them into ice baths just to start controlling their temperatures because you don't want to have a situation where they go into heat stroke,” said Reed. Eyewitness Meteorologist Samantha Wessing runs the Boilermaker every year. She says mile six along Burrstone Road is always brutal. "There’s not much cover from the sun and it's black top so by the time you hit here you're about an hour into the race and it's getting to be almost 9 o’clock so the heat is going up, not many clouds to cover the sun, it's just hot,” says Wessing. But it's not just about the runners. The thousands of people who come out to watch the race are also affected by the weather. "An ideal Boilermaker Sunday for me is very, very low humidity probably the early 60's to by noon, rising to the early 70's,” said Reed. Copyright 2015 Nexstar Broadcasting, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
<urn:uuid:3d65cbe6-49bd-4ab2-80cd-5b03684a98f1>
CC-MAIN-2015-35
http://www.cnyhomepage.com/news/beating-the-boilermaker-heat
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.981566
359
1.6875
2
|The Message text: This email was created by [your name] who thought you would be interested in the following Article: "Opening the Internet Browser Programmatically" Given below is code for opening the Internet browser programmatically in VB 6 and VB.NET.VB 6Private Declare Function ShellExecute Lib "shell32.dll" Alias _ "ShellExecuteA" (ByVal hwnd As Long, ByVal lpOperation As String, _ ByVal lpFile As String, ByVal lpParameters As... CodeProject also contains hundreds of articles, free source code samples and applications to help in your day to day programming. Why not give it a try!
<urn:uuid:aecb4ed5-1028-4147-9d39-c4b67238d92d>
CC-MAIN-2015-35
http://www.codeproject.com/script/common/TellFriend.aspx?obtid=2&obid=242314
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.848547
146
1.546875
2
This week's book giveaway is in the OCAJP 8 forum. We're giving away four copies of OCA Java SE 8 Programmer I Study Guide and have Edward Finegan & Robert Liguori on-line! See this thread for details. Jayavardhan geepi wrote: Is independent anonymous class possible? I mean , an anonymous class that neither extend any class nor implement any interfaces... No. In the end there is always java.lang.Object as the root of every class hierarchy. But you can make anonymous subclasses of Object. The only thing is, unless you override equals, hashCode, toString or finalize this anonymous subclass will be pointless. Overriding clone is senseless as the class wouldn't implement Cloneable, and all other methods are final. Without overriding any of these 4 methods your anonymous subclass will behave exactly like Object itself.
<urn:uuid:85380a70-b4b0-4b81-80ea-5028679808b8>
CC-MAIN-2015-35
http://www.coderanch.com/t/508054/java/java/anonumous-class
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.87279
181
1.851563
2
Social Welfare Scholarships Do Yourself a Favor Social welfare is a specialty within social work that focuses on specific demographic or economic groups, or neighborhoods, communities or segments of society, with an ultimate goal of supporting the well-being of that particular demographic. Its emphasis is creating a more humane and just society for everyone. Studies in the field provide curriculum in a broad range of social services, including sociological and economical, work-related coursework. If you are pursuing social welfare as a degree, you may choose to focus on a particular population. Make sure you explore the emphasis of each program or scholarship before deciding on your path. Sometimes, they are in specialized issues: poverty; hunger; homelessness;, mental illness; disenfranchized children, families, seniors or minorities; substance abuse; housing; and other societal issues. A degree in social welfare prepares you for a wide range of careers, including those in government, non-profits, business and education. Many graduates go on to careers in social work, non-profit organizing, fundraising, or counseling, while others continue onto higher degrees. The University of Wisconsin-Milwaukee Helen Bader School of Social Welfare offers varying degrees in criminal justice or social work. There are several scholarships awarded based on the information undergraduates provide in the scholarship application, including: - Harry and Esther Kovenock Award for undergraduates awards $1,000 for senior social work students with a 3.2 GPA or higher and financial need. - National Organization of Black Law Enforcement Executives (N.O.B.L.E.) goes to under-represented minorities with a 2.5 GPA or higher who want to pursue careers in correctional or criminal justice; the amount varies. - Kathleen Scheller Memorial Scholarship, $1,000, goes to a non-traditional student (40 years or older) who wants a career n social work and has a financial need. - Robert L. Stonek Award, $1,000, goes to an undergraduate or graduate with academic achievement in criminal justice who has a commitment to the field as a practitioner, educator or researcher. - Alumni/Yolanda-Vega Will Scholarship, $1,000, goes to undergraduates and graduates in social work or criminal justice who works full-time and/or has significant family demands. - Greater Milwaukee Association of Realtors Youth Foundation Scholarship (G.M.A.R.), $1,000, goes to undergraduates and graduates in social work or criminal justice with a financial need, academic achievement and innovative approaches to dealing with problems in youth. - Don and Helen Banta Scholarship, $500, for a graduate in social work with a 3.0 GPA or higher. - Both the Lucetta Bissell Award and the Social Welfare Community Organization Scholarship go to female graduate students in social work and is based on financial need and academic achievement and leadership in community involvement. Students interested in pursuing a major in social welfare at the University of Kansas may be qualified for any number of scholarships through the School of Social Welfare: - Monte Murphy Fund is dedicated to assisting graduate students with financial need with awards ranging from $500 to $,1500. Applicants must be in good academic standing and maintain a 3.0 GPA. - William Palm Minority Fund helping under-represented ethnic students working on their graduate degree with awards ranging from $700 to $1,500. Financial need is the biggest criteria, although applicants must be in good academic standing and maintain a 3.0 GPA. - Tikkun Olam Scholarship supports a graduate student who is committed to Jewish culture, language and thought, and plans on working in social service administration in Kansas City. Funded through a consortium of Kansas City-area Jewish foundations, the scholarship provides a generous stipend of approximately $10,000 per year ($5,000 per semester). - Christine Smith Scholarship is funded through a personal estate. Each year, the program awards a scholarship to a graduate or doctoral student specializing in children and family issues at a notable university in the United States or Canada. The $15,000 award goes to the student who has two or more years of recent professional experience in the field of social work or a related field, and who, on completion of their research or study, will apply their knowledge and skills to make a contribution to societal well-being. - University Educational Opportunity Fund monies are set aside to aid social work students who are committed to serving Native American children, juveniles and their families. School of Social Welfare majors attending SUNY-Stony Brook in New York provides a well-balanced program for both undergraduate and graduate students. The comprehensive program preps the next generation of professionals for careers in a range of social work specialties, particularly in the realm of healthcare. It also offers specialized scholarships: - Students can apply for various scholarships as they become available: the National Hispanic Scholarship, Project 1000 (for Hispanic students), the Jewish Foundation for Education of Women Scholarships (non-sectarian), and New York State Regents Professional Opportunity Scholarships (for minority students). . - Hy Frankel Award, $3,000, is given to a graduating student who is committed to combining law and social welfare to advocate and promote the well-being of children, families and communities. - Sylvia Cutts Memorial Scholarship awards $500 to an outstanding African-American female student with financial need. - W. Burghardt Turner Fellowships supports an incoming minority (African American, Native American and Hispanic American) with full tuition and a stipend for two full years of study. The stipend is $10,000 each year for two years. Each spring, the University of North Carolina’s School of Social Work awards 28 scholarships and four awards for returning students working on their Masters in Social Work, including: - Melvarene Johnson Adair Scholarship and Chaney-Jacobs-Preyer Scholarship are for any student who is in good academic standing and demonstrates financial need. - Annie Kizer Bost Award is given annually to the graduating student who, in the opinion of the faculty, shows the greatest potential for service to the public welfare system of North Carolina. - Armfield Scholarship goes to a first-year student to promote racial and cultural diversity within the student body. - Bertie Oscar Edwards Award goes to students in good academic standing from Western North Carolina who have an interest in domestic violence, child abuse, mental illness, or mental health services. - Kirsten E. Hewitt Memorial Scholarship supports students who are interested in working with the elderly population. - Alan Keith-Lucas Scholarship supports students in the distance education program. - African Studies - African-American Studies - Arabic Studies - Asian Studies - Asian-American Studies - Behavorial Science - Celtic Studies - Chicano Studies - Chinese Studies - Consumer Science - English Literature - Ethnic Studies - European Studies - French Studies - German Studies - Greek Studies - Human Services - Italian Studies - Japanese Studies - Latin American Studies - Middle Eastern Studies - Native American Studies - Peace and Conflict Studies - Political Science - Russian Studies - Scandinavian Studies - Social Welfare - Spanish Studies - Women's Studies - Writing an Essay - Selecting an Essay Topic - Information Requests - College Books - Scholarship Scams - Management Services - Tax Credits - Thank You Letters - Spam-Free Searching - Tuition Reimbursement - College Saving Tips
<urn:uuid:309690d5-04a4-4f41-91bb-ba7490160f4c>
CC-MAIN-2015-35
http://www.collegescholarships.org/scholarships/social-science/welfare.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.921083
1,554
2.015625
2
In 1934 Geoffrey de Havilland was worried that an acknowledged aviation lead in Britain could slip away unless prompt action was taken. The England to Australia “MacRobertson” air race focused international attention and a wide range of impressive entrants was likely to be forthcoming. He decided to design and produce a highly specialised long-range twin engine racing aircraft that would incorporate a number of innovations with few compromises for comfort or simplicity. In a perilously short space of time a wholly new aircraft – the DH 88 – was designed and three aircraft were built speculatively. De Havilland was successful in selling all three, albeit at a discounted rate. Not surprisingly these aircraft – named Comet – attracted the most famous and competent pilots of the time. The first of the aircraft to fly was registered G-ACSP, named “Black Magic” and was bought by Jim and Amy Mollison (nee Johnson) who were both independently recognised as world record holders in their own right. This combination started the race as favourite. Black Magic was the first of a great new generation of British aircraft that flew with all three of the now commonplace technical features; - Retractable undercarriage - Variable pitch propellers Shortly after being sold to Portugal Black Magic disappeared for a number of decades until found languishing on a portugese farm and recovered to the UK. After passing through a number of owners Black Magic now resides in a safe and secure environment with her own workshop. G-ACSP ‘Black Magic’ is now in the process of a complete restoration to airworthy condition by the Comet Racer Project Group. Although a number of years away she will one day make her second ‘Maiden’ flight from the safety of her new home at Derby Airfield. A vast amount of help is needed to realise the dream of seeing Black Magic getting back into the air once again. Anyone who is interested in the project would be most welcome to get in touch with us, make a donation, offer assistance or perhaps become a member (after completion of the restoration all members will automatically be entered into a draw to win a flight in Black Magic).
<urn:uuid:cb71006d-f72b-454a-bbe7-4f905d6b825a>
CC-MAIN-2015-35
http://www.cometracer.co.uk/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.974023
440
2.21875
2
In the course of any argument or discussion, good communicators need to know how to avoid logical fallacies. Logical fallacies weaken an argument by treating a false assumption as fact, but because many speakers and writers don’t take the time to consider the basis of their arguments, logical fallacies are fairly common in politics, business and even in interpersonal communication. This infographic about rhetorical techniques and logical fallacies (aka rhetological fallacies) by Information is Beautiful can help you understand these concepts better. To understand logical fallacies, you should consider the six main categories of fallacy types: attacks, content manipulation, faulty deduction, inaccurate cause and effect, emotional appeals and mental appeals. While there are dozens of different fallacies, most of them fall into these six groups. Attacks include ad hominems, in which the speaker attacks the other speaker rather than the counterargument. Unfortunately, this type of argument can be effective, but pointing out the attack will undermine its effectiveness. Content manipulation is exactly what it sounds like: changing facts in order to suit the goals of an argument. The classic example is a confirmation bias. The speaker ignores facts that do not support or that directly oppose his argument. Faulty deduction mimics a logical argument, but makes an ultimately illogical conclusion. The speaker might assume that a small sample size represents a whole group or that a general rule applies to all individual circumstances. Some faulty deductions are hard to spot, but they undermine an argument just the same. Inaccurate or garbled cause and effect is somewhat similar to faulty deduction, but these arguments try to draw a clear link between an observation and an assumption when such a link isn’t necessarily there. An example is denying the antecedent. The speaker might say that “new refrigerators are cold, so the only way to get a cold refrigerator is to buy new.” This falsely assumes that there is one logical explanation for why a refrigerator would be cold–that is, it is a new refrigerator. All inaccurate cause and effect fallacies make a similar logical leap from a fact to a conclusion. Mental appeals include the appeal to authority, which politicians frequently use. Saying something like, “that man must be guilty, because the police arrested him,” would be an example of an appeal to authority. The speaker is not addressing the core argument of the man’s guilt. Instead, he’s implying that the authority has expert knowledge of the circumstances and therefore must be correct. Other mental appeals make similar jumps in logic. An appeal to probability, for instance, assumes the inevitability of an event or circumstance without any reasoning. In an appeal to tradition, the speaker opposes change simply because it is a departure from established practices. Appeals to the mind appear to make sense at first, but they’re easily eliminated through logical counterargument. Appeals to emotion are almost identical, but they focus on fear, love, hate and other strong emotions. An appeal to spite is a classic example. The speaker might say, “republicans hate the environment, so trusting a republican’s energy plan is ludicrous.” Usually, appeals to emotion are less overt, but they ignore the logical parts of an argument in favor of controlling the listener’s emotions. All of these types of fallacies can quickly weaken a strong argument. In order to communicate clearly, you should remember to avoid these fallacies and know how to spot them in opposing points of view.
<urn:uuid:cc250183-ad2b-4e41-be57-95b7688e8983>
CC-MAIN-2015-35
http://www.communicationstudies.com/rhetological-fallacies-errors-and-manipulations-of-rhetoric-and-logical-thinking
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.935906
717
3.65625
4
Google took a huge step yesterday by introducing its first self-driving car prototype, and the automotive industry has taken notice. General Motors Product Development Chief Mark Reuss admitted if Google keeps going with autonomous vehicles it could become a "serious competitive threat." Between Tesla, which some have said can turn the Big Three into the Big Four, and Google the car industry is starting to face serious competition from the sidelines. A study in January said all cars on the road will be autonomous after 2050, a prediction that certainly bodes better for Google than it does GM, Chrysler, or Ford (at least for now). GM is developing its own autonomous vehicles, but Reuss insisted his company isn't in a race with Google. That could change, though, if the public starts to perceive GM as falling behind. Catching up would be difficult if Google becomes the brand for driverless cars. And it's already getting close.
<urn:uuid:4140e6cc-00ad-4e1a-9fd7-e236ab0b59ca>
CC-MAIN-2015-35
http://www.complex.com/sports/2014/05/gm-exec-admitted-google-can-be-serious-threat
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.973535
185
1.796875
2
As CIO at Boeing, Ted Colbert is no stranger to the Internet of Things. For more than a decade, the aerospace giant has deployed thousands of communications-enabled smart devices to sense, control and exchange data across the factory floor, on the battlefield, and within the company's 787 Dreamliner aircraft. For National Football League CIO Michelle McKenna-Doyle, however, it's a whole new ballgame. Currently the league is experimenting with instrumentation by deploying sensors on the playing field, the ball, and the players and their helmets; it's even exploring ways to track fans. The Internet of Things presents two opportunities for IT, says Chris Curran, chief technologist and principal in the advisory practice at PwC. "The first requires the CIO to insert himself into the product design and management process," he says. "The second is a new discussion for the CIO to initiate." One concerns product instrumentation; the other is about "instrumenting" the business itself -- equipping physical locations, vehicles, devices, equipment, people and so on with sensors and beacons to better understand, analyze and make decisions about the way the business processes perform. To accomplish all of that, McKenna-Doyle says, "a tighter collaboration with customer-facing business partners is a must." The Internet of Things (IoT) is set to explode, driven largely by the consumer market, where the number of smart "things" and everyday products equipped with IP-addressable sensors -- from wearable smart bands to smart refrigerators -- is multiplying exponentially. Research firm Gartner estimates that 26 billion IoT-ready products will be in service by 2020. That's an average of 3.3 devices for every man, woman and child on the planet. And that doesn't include the projected 7.3 billion smartphones and tablets. While some of the first smart things were networked sensors used in industrial settings, the definition has broadened. Smart devices increasingly use IP or have access to an IP gateway that can feed data back over the Internet -- and over corporate networks. Michele Pelino, an analyst at Forrester Research, describes IoT devices as "anything that connects objects or assets or individuals [and makes it possible to know their] status in a real-time way." Gartner analyst Hung LeHong's definition of the IoT includes any connected device or software that can sense and that you can control and use to exchange data. This includes apps that let people send recipes to their ovens, enable BMW owners to unlock their cars if they lose the keys or make it possible for Tesla electric cars to receive automatic over-the-air software upgrades, he says. As with mobile phones before them, some of these new devices will walk through the office door with employees, while others will be embedded in products that connect to corporate systems from homes and other businesses. And the number of IoT applications spearheaded by lines of business will increase as organizations find new ways to improve productivity, streamline processes and fatten up the bottom line by instrumenting equipment, environments and people and analyzing the data streams generated by those systems. Even seasoned veterans like Colbert are bracing for an onslaught. What's different now, he says, is the accessibility of many different types of data, the speed at which the data can be gathered, and the tools a business can use to get its arms around that data. "The pace of development of sensors is moving much faster than folks can keep up with," he says. And as the cost of developing and deploying sensors has dropped, businesses can capture more data faster and from more parts of more assets than ever before. "This is about solving hard business problems with better data," Curran says. It's a sea change, says Vince Campisi, CIO at General Electric's Global Software Center. "Before, even if we had the ability to get the cost of the sensor down, we wouldn't have been able to transport, store and analyze the data." Now, with the evolution of tools for managing and analyzing big data, he says, "we have both."
<urn:uuid:9928db1e-b442-4c6d-9510-f5a8ef7c53e9>
CC-MAIN-2015-35
http://www.computerworld.com/article/2488136/internet-4-things-to-do-now-to-get-ready-for-the-internet-of-things.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.95348
836
1.703125
2
Con Edison Media Relations July 26, 2012 CON EDISON PREPARING FOR STORMS, URGING CUSTOMERS TO TAKE PRECAUTIONS NEW YORK – Con Edison is closely monitoring the rain and windstorms approaching the region and preparing to respond to any electrical service outages or other emergencies that occur. The storms could carry high winds that could knock trees into power lines, transformers and other equipment, causing customers to lose power. Customers can report power interruptions or service problems as well as view service restoration information online at www.conEd.com or on their cell phones and PDAs. They may also call Con Edison at 1-800-75-CONED (1-800-752-6633). When reporting an outage, customers should have their Con Edison account number available, if possible, and report whether their neighbors also have lost power. Con Edison will continue to provide updates through the media. In addition, important information will also be posted on www.conEd.com. Con Edison is working closely with city and municipal emergency officials and the company is in constant communication with the New York City Office of Emergency Management and the Westchester County Department of Emergency Services. In the event that the storms impact our area, Con Edison offers the following safety tips: - If you see downed electrical wires, do not go near them. Treat all downed wires as if they are live. Never attempt to move or touch them with any object. Be mindful that downed wires can be hidden from view by tree limbs, leaves or water. - Report all downed wires to Con Edison and your local police department immediately. If a power line falls on your car while you're in it, stay inside the vehicle and wait for emergency personnel. - Leave at least one light switch in the on position to alert you when power has been restored. - Check to make sure your flashlights and any battery-operated radios are in working order. Also, make sure you have a supply of extra batteries. - If you have a power outage, avoid opening your freezer to see if food is still frozen. Every time you open the door, room-temperature air enters and speeds the thawing process. Most fully loaded freezers will keep food frozen for approximately 36 to 48 hours; half-full freezers will keep food frozen for approximately 24 hours.
<urn:uuid:b5d09667-97ca-4955-b0ec-ad7f69e87998>
CC-MAIN-2015-35
http://www.coned.com/newsroom/news/pr20120726.asp
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.92397
486
1.664063
2
The era of cheap 3D printing is upon us. That is, if you're willing to make do with the less-detailed and size-limited results that can be produced with home 3D printers. If you want industrial-quality creations, you'll still need an industrial 3D printer. Soon, you might be able to get just that from your local office supply store with the Staples Easy 3D. A new partnership between the office supply chain and MCOR Technologies, it seeks to make getting a 3D-printed object of your virtual model as convenient as ordering a batch of business cards from your local Staples branch. To use the service, simply visit their website, upload your design (yep, you'll still need to know how to create models on a computer), pick out specs and place your order. All items will be printed in-store at whichever Staples branch you put in your order with. Basically, it's their business card ordering model applied to 3D printing, making the process very convenient. Staples Easy 3D will use a commercial-class 3D printer called the Iris to create your projects, so this should be way more detailed than what you can get with your Makerbots and Form 1s. Anything a commercial-class 3D printer can create will be available to order, including custom parts, product prototypes, art objects, architectural models, medical models and 3D maps. No word on costs or turnaround times, but we imagine the convenience alone should be a godsend to anyone who requires 3D printed objects on a frequent basis. The Staples Easy 3D will debut in Netherlands and Belgium in early 2013 before rolling out to Staples branches in other countries.
<urn:uuid:e07fb3df-b64f-4148-adc4-23da454e5ac7>
CC-MAIN-2015-35
http://www.coolthings.com/staples-easy-3d/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.93704
343
1.585938
2
So, the deep thinkers in Congress managed to get a deal that would avoid the fiscal cliff disaster that they devised themselves, but not before demonstrating, again, how dysfunctional our political culture is. The deal that our leaders arrived at pleased almost no one. And the way they arrived at the deal managed to inspire fear in the markets and doubts around the world about our government's ability to meet challenges in any rational way. The worst thing is that we will get to do it all over again in a couple of months. I'd like to say that things will go better, but I would be lying. The truth is that Congress will continue to careen from crash to crash. That's because we've set up a system of choosing legislators that rewards unyielding intransigence and rigid ideological obstinacy. Most people's eyes glaze over when the discussion turns to gerrymandering. It's not just that they see the subject as boring. It's also that they think gerrymandering really doesn't affect them. They're wrong. Gerrymandering in large part created the dysfunctional political culture we now have. It distorts election results to suggest a greater dominance by one party. In the 2012 election, Democratic candidates for the U.S. House picked up 49.1 percent of the vote across the nation. Republicans won 48.1 percent. But the districts were drawn so that the GOP actually ended up controlling the House, 234-201. In Indiana, the results were more dramatic. Republican candidates for the Indiana House captured roughly 54 percent of the vote in 2012, but were able to lay claim to 69 of the 100 seats in the chamber. When a system distorts the voters' preferences that violently, that system eats away at its own foundation — the principle that our government draws its authority from the consent and support of the governed. But that's the big picture problem. Closer to the ground, gerrymandering gives us leaders who lack basic leadership skills. Gerrymandering gives us candidates who not only don't know how to reach out to people who disagree with them but who don't even see the value in doing so. Gerrymandering gives us deal-makers who haven't the slightest idea how to strike a deal. That's because these candidates emerge from districts that are specifically crafted to have overwhelming majorities of people who think exactly the same way. In order to get elected they never have to work with anyone who thinks in a different way. This country and this state are far more rational than our political system would suggest. Most Americans and most Hoosiers are neither stubbornly conservative nor unyieldingly liberal. They are a combination of ideological traits — conservative in some ways, liberal in others and ambivalent in still others. But the system we've got now tends to send people who are unfailingly liberal or conservative to represent us. They then spend all their time fighting because they came to leadership believing that their side has a monopoly on wisdom and virtue. That's not the way things were supposed to work. Our elected officials were supposed to resolve our differences, not exacerbate them. But we now have a system in which our elected representatives are more strident and less reasonable than the country and state they serve. The only way we can solve that problem is by changing the way we elect our leaders — by taking the power to draw the maps away from the folks who want to use it for purely partisan gain. John Krull is director of Franklin College's Pulliam School of Journalism, and executive editor of TheStatehouseFile.com. Need Help? Call us at 1-877-304-7771. Monday-Friday: 6am-5pm / Saturday: 6am-11am / Sunday: 7am-Noon
<urn:uuid:8409ebc0-401f-4652-a2d7-5dd3edd74ef3>
CC-MAIN-2015-35
http://www.courierpress.com/opinion/columnists/gerrymandering-contributes-to-washingtons
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.972386
779
1.679688
2
The days of constructing a commercial building in Craig out of four long metal walls will come to an end if a proposed new land use code is approved. The city of Craig's land use code has been under consideration for 18 months, and it would change some zoning and regulations that currently govern construction. "We're combining into one document of municipal codes, the subdivision and zoning regulations," Craig community development director Dave Costa said. "It's modeled after the state of Colorado land use codes." The 30-year-old document that now oversees building in Craig has been updated occasionally, but Costa said this new plan will be easier to understand and the procedures will be easier to follow. The new code is designed to bring many of Craig's buildings into compliance with existing codes, as well as allowing some businesses to expand that now are held back by the city codes. "There are some significant changes, but also some exciting differences," Costa said. "We looked at the entire community, including some incorrectly zoned properties, and we're recommending some significant changes." In May 2005, the city planning commission joined with a Loveland consulting firm to begin work on overhauling the city's land use code. Katers and Associates had worked previously with the town of Hayden to revise its codes, and with the planning commission's help, a code better suited to Craig was developed. Notable changes include creating a special Downtown District, with a central core at Yampa Avenue and Victory Way. North of downtown -- where the east side of Yampa Avenue is currently zoned light industrial -- will be a mixed-use zone from Sixth Street to the bypass road north of town. "We'll have a zone district that will allow residences and businesses both," Costa said. "It's a diverse area where professional offices and businesses can be next to homes. It currently is about 60-40, business and residential." The major highway corridor along Victory Way will be changing from commercial to community-commercial in an attempt to accommodate existing structures in the zone district. Metal buildings in commercial zones will no longer be permitted without breaks in long walls and facades or other architectural additions being added. Building height limits will climb to 50 feet from the current 35. New regulations for oil and gas drilling within city limits also will be part of the code. "We never had addressed those before, but we don't want the development of the oil industry without complying with the city rules and requirements," Costa said. "Everybody owns mineral rights all over town. We want to require setbacks from dwellings and public right-of-ways." An open house for public comment is proposed for Jan. 13 at the council chambers, and Costa plans to attend, along with the consultants and city officials. "We have a good working document here, but we're always open to input from the public," he said. "The more eyes, the better." Dan Olsen can be reached at 824-7031, ext. 207, or firstname.lastname@example.org.
<urn:uuid:f1e09498-11ba-433a-9c51-626d52ec141c>
CC-MAIN-2015-35
http://www.craigdailypress.com/news/2006/nov/29/building_codes_changes/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.964329
625
1.554688
2
An assistant pastor was speaking to his pastor about us before we arrived. "No, you don't understand these people are not just showing up in a Honda Accord with a briefcase and a Bible asking, 'Where's the prophet's chamber? We're here to preach a revival.' These people have dinosaurs onboard and they are going to be hatching stuff in In 1841 Richard Owen coined the term "dinosaur" which means "terrible lizard". And as discussed in Seminar Session #2 in the pre-flood world everything lived longer, in most cases hundreds of years, and therefore grew larger. Keep in mind that reptiles never stop growing. dinosaurs in the Bible? Yes, they are. See Session #3 for two hours of information on this topic. We have several children's DVDs on these animals. Creation for Kids (two-hour, mini seminar for those 9 to 15), Dinosaurs, and What is Science? our itinerary (conference schedule) and see if we will be at a church near you. You can also visit pet stores and possibly see one or more of these post-flood Owen is a vegetarian and he is about seven years old. We named him Owen because Richard Owen first coined the term "dinosaur" or terrible lizard back in 1841. The first dinosaur fossil ever assembled looked just like an iguana; therefore, they named it an Iguanadon. Owen is the modern day descendant to the dinosaur we commonly call the iguanadon. He now lives with a family in is a bearded dragon.He eats veggies, fruits and small rodents and crickets.Sandy is the modern day descendent to the anklyosaurus dinosaur. In this photo he was three years old. Most lizard books state that the bearded dragon is the closest lizard that could be considered a pet.Bearded dragons are very friendly and docile.Notice how similar Sandy is to the toy anklyosaurus. is a Chlamydosaurus, commonly known as a frilled dragon. Originally from New Guinea and Australia these modern day dinosaurs have become prized pets. She feasts on mice, crickets and other rodents. Her temperament is much like that of a dog, and she is quite affectionate. people are familiar with the frilled dragon as the dinosaur who spat at and killed the big guy in Jurassic Park as he was attempting to steal the dinosaur embryos. She does open her frill while she chews and when she is protecting her territory. Newmans are a green, basilisks. These lizards used to be quite rare, but we have seen them in pet stores in Houston, Texas; Gary, Indiana; Albuquerque, New Mexico; and Harleysville, Pennsylvania. Perry is a brown, male basilisk. He is a very good-natured reptile. The brown basilisks are fairly common and inexpensive. They, like Rhodee, eat rodents and small bugs. Notice the resemblance between the Newmans and Perry and a parasaurolophus or sailfin. Notice the crest on the back of each of their Misha is a Russian Tortoise. The evolutionists say that the turtles and tortoises were alive during the time of the dinosaurs. Of course they were, but that doesn't mean 65 millions years ago. The 10 Commandments declare that everything was created at the same time (six days). Mark 10:6 and Matthew 19:4 indicate that Adam and Eve were here from the beginning of the creation. Through genealogy we can determine this to be approximately 6,000 years ago. is a Chinese water dragon. He delights on a range of insects. Notice his name includes the word DRAGON! Notice that the scientific name for many reptiles include "saurus".
<urn:uuid:98fdfc00-5472-414b-9e0d-8056a6205e3f>
CC-MAIN-2015-35
http://www.creationseminar.net/dinosaurs%20today.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.941227
834
2.390625
2
Tips for teens on early puberty. Puberty comes as you grow up! What is puberty? It is the earliest age at which you can have children. Some people call it sexual maturity. For a year or two at puberty, girls start to develop breasts, boys' sex organs develop, voices change, hair grows under the armpits and other places. Researchers at England's Bristol University found that puberty now starts much earlier than it used to. After studying 14,000 children from birth, researchers found that one girl in six reaches puberty by the age of eight. Only 40 years ago it was one girl in 100. Boys usually reach sexual maturity later than girls, but even so, one boy in 14 now reaches puberty by the age of eight. Forty years ago it was one boy in 150. What causes early puberty? Possible reasons for early puberty are: Is early puberty good, or bad? Earlier puberty is neither good nor bad. It is just something that happens. But one problem is that parents of the earlier developers sometimes don't believe that puberty can start so early, so they worry when there is no need to. Another problem is that those who reach sexual maturity before others in their class sometimes mix with older kids. This means they are in danger of dropping friends their own age, which is not good. For example, if a 12-year-old mixes with 16-year-olds, the older teens expect the 12-year-old to have the same experiences and reactions as they do, which isn't always possible. This may make the younger teen worried about “fitting in”, and take on experiences he or she is not ready for. How to handle puberty What does the Bible say? The Bible is good evidence that people are reaching sexual maturity earlier today. Adam was 130 years old when he and Eve gave birth to Seth (Genesis 5:3). Abraham was 100 years old and his wife Sarah was 90 when they had a child (Genesis 17:17). In fact, in the early generations after God created the world, parents gave birth to their children when they were very old. The age of sexual maturity got lower as human life-spans got shorter. There is evidence that this trend has continued. In 1990, archaeologists in Griswold, Connecticut, unearthed some graves dating to the late 1600s to early 1700s. Excavators found the remains of 13 children. One child's coffin had the initials N.B. and an age: “N.B. — age 13.” Even though this child was 13, an examination showed that by today's standards the child would be 9 or 10. If that child was typical, in only 300 years maturity rates have increased by more than 30 per cent. To sum up, there is nothing either good or bad about early or late puberty. It happens at different ages, so whatever age it starts in you is the normal, natural age for you.
<urn:uuid:80e06ed6-c8b6-4a34-a136-b4b6a200abd0>
CC-MAIN-2015-35
http://www.creationtips.com/puberty.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.975645
617
3.21875
3
title>CS267/Sp1996 Assignment 2 U.C. Berkeley Department of Electrical Engineering and Computer Science Assignment 2: Due: February 22, 5pm Your assignment is to solve the Sharks and Fish problems 1 and 2, i.e. fish swimming around in an ocean subject both to external current and gravity. You should modify 4 out of 5 existing For extra credit, you may complete all 5 programs. Although this is not strictly required, you are encouraged to tune code performance, especially for poor gravity implementations. The CM5 code is on rodin in /usr/castle/share/proj/shortcourse/wator. Pointers to the code are here. It is harder to test your implementation to see if you answers are accurate in a simulation of this kind, because it is less clear what the "right" answer is supposed to be, unlike matrix multiplication. You should try 2 test cases: In addition to looking at nice pictures produced by the code, and turning in a picture of the fish after several "together and apart" cycles from Case 2, you should time one of the CM5 programs and one of the SMP programs, and compute the speedup and efficiency. For this, remove the I/O, and time only the main loop of the program. Is the speedup what you expect? If not, can you Turn in pointers to your code, some nice pictures, some measurements, and anything else you may want to share with us.
<urn:uuid:f82ae92d-22de-44bb-a8e0-dc91da612b65>
CC-MAIN-2015-35
http://www.cs.berkeley.edu/~demmel/cs267/assignment2.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.913933
324
1.640625
2
Prehension may be defined as "The act of taking hold, seizing or grasping, as with the hand" (Webster's 3rd International Dictionary). Nonprehensile manipulation, then, can be defined as the manipulation of objects without grasping them. Manipulation without prehension is a natural way of handling objects for both humans and machines. The ability to manipulate objects which may not be graspable increases the flexibility of a robot interacting with its environment, without adding complexity to the mechanical design. This research analyses the mechanics of nonprehensile contact between a simple, two degree of freedom manipulator and a part. The intent is to develop reliable but sensorless manipulation routines for use in an automated assembly environment. While nonprehensile, sensorless devices are in common use in such environments, existing parts orienting devices, such as bowl feeders or the SONY Automatic Parts Orienting System, must be custom designed for each specific task. To decrease the setup or changeover time for an assembly line, what is needed is a simple but more general device, which can be easily modified or reprogrammed in response to a change in tasks. We present a planning algorithm for sensorless parts orienting in the plane with two one degree of freedom palms. Our method finds feasible paths through the space of equivalent state configurations of the object in the palms, without requiring that the palms maintain stable support of the object over the entire path. We show that such a device can reliably orient parts in the plane. Planning reorientations requires the geometric descriptions of the parts, the part's center of mass, and an upper bound on the coefficient of friction between the part and the palms. The plans produced by our algorithm are robust to uncertainties in the part's initial state and in the coefficient of friction, as well as to small inaccuracies in manipulator calibration.
<urn:uuid:0327074e-8504-4dc9-b7df-f4734b98ae20>
CC-MAIN-2015-35
http://www.cs.cmu.edu/afs/cs/project/mlab/www/papers/nbz-thesis.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.922432
374
2.859375
3
This course is designed for telecommunications managers, voice administrators, Internet administrators, intranet managers and administrators, network designers, carrier, ISP, and vendor personnel. 2 days; Various locations By Global Knowledge Network This course will give you a real-world, multivendor and multiple options look at integrating your voice and fax traffic over your current data networks. Analyze, discuss, and demonstrate cost vs. latency issues. Review and demonstrate software and hardware voice signal to IP packet conversion and compression options. Design real-world feasible voice over data network solutions that match your current data network capabilities through several case studies. This course covers key technical aspects of Internet packet telephony, including architectural models, compression agorithms, transport protocols, quality of service issues, Internet multicast, middleware services, packet telephony standards, and Internet telephony products and services. Participants review background material covering the necessary fundamentals of networking, multimedia, and digital signal processing. The course also includes a hands-on demonstration of Internet telephony in a laboratory to illustrate the user experience on the Internet. (The above material was contributed by Ley Christopher.) Last updated by Henning Schulzrinne
<urn:uuid:732a6e96-c62c-4b38-8a4c-df3a3ce61085>
CC-MAIN-2015-35
http://www.cs.columbia.edu/~hgs/internet/internet-telephony-training.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.859243
241
2.296875
2
CS549: Cryptography and Network Security Department of Computer Science, Illinois Institute of Technology Description and Goals The course will start with a review of necessary background topics such as number theory, basic conventional encryption methods, basic public key cryptosystems, basic digital signature systems, and zero knowledge proof systems. We will then discuss applications of cryptography in different fields, such as wireless sensor networking, RFID, mesh networks, cloud computing, mobile computing, and social networks. New and emerging topics in both theoretical research and applications will be presented as well. The goal of the course is to provide students with the necessary foundations to apply cryptography techniques in new and emerging fields. The focus of this class is to discuss and understand the security challenges in emerging systems, and wireless networks. 1) Classroom: Stuart Building Room 204 2) Date/Time: Monday 6:25pm-9:05pm (see IIT calendars for holidays), 3) Class Dates: August 25th to December 6, 2014. 4) Instructor: XiangYang Li; Electronic contact: xli at cs dot iit dot edu; Office: SB 229C; Office hours: Monday: 2-4pm 5) Teaching Assistant: ???, Office: SB 019B, Office Hours: Monday, Friday 1PM to 3PM. 6) Course Lectures: See the following links for the course schedule and lectures (See also old lectures http://www.cs.iit.edu/~cs549/cs549s07/lectures.htm) Undergraduate/graduate courses in number theory, algorithms, networking, and programming are preferred but not required. However, the course will provide a short review on the necessary background material. Finally, it is assumed that the students are familiar with some programming language, such as C. Books and Suggested Readings There are several good textbooks for this course. Recommended books are: Cryptography and essentials (the first two books are strongly recommended textbooks; you should get them) 1. Modern Cryptography: Theory and Practice, by Wenbo Mao 2. Cryptography: Theory and Practice, by Douglas R. Stinson, CRC press, hardcover. 3. Handbook of Applied Cryptography, by Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. CRC Press, 1996. 4. Foundations of Cryptography, vol. I (2001) and vol. II (2004), by Oded Goldreich. Cambridge Press. Network Security (the first book is strongly recommended; you should get it if possible) 1. Cryptography and Network Security: Principles and Practice, by William Stallings , Prentice Hall, Hardcover. Fifth Edition is out also. See http://williamstallings.com/Crypto3e/Crypto3e-student.html for student online help. 2. Network Security Essentials: Applications and Standards, by William Stallings. Prentice Hall, Hardcover, Published November 1999, 366 pages, ISBN 0130160938 3. Secrets and Lies: Digital Security in a Networked World by Bruce Schneier John Wiley, Published August 2000, 412 pages, ISBN 0471253111. Introduction to number theory 1. D. Angluin: Lecture Notes on the Complexity of Some Problems in Number Theory. Available for download from Tal Malkin's website at Columbia. This is a short review of number theory and its computational aspects. It is sufficient for the needs of our class. 2. V. Shoup: A Computational Introduction to Number Theory and Algebra. This is a very comprehensive introduction to algorithmic number theory, with all the necessary mathematical background self-contained. This is a BETA version, but in good shape. 3. A Course in Number Theory and Cryptography (Graduate Texts in Mathematics),(Hardcover) by Neal Koblitz 4. Number theory with computer applications, by Ramanjuachary Kumandari and Christina Romero (1998) 5. Fundamental Number Theory with Applications, 1998 edition, by Richard Mollin; Excellent Online Lecture Notes 1. S. Goldwasser and M. Bellare: Lecture Notes on Cryptography. These are notes from a summer cryptography class given by Profs. Shafi Goldwasser and Mihir Bellare at MIT. The treatment here is focused on the theoretical foundations of cryptography. 2. M. Bellare and P. Rogaway: Lecture Notes for a graduate cryptography course at UCSD. The approach here is still aimed towards precise definitions and provable security, although more emphasis is given to practical considerations. 3. J. Katzí lecture Notes for the Intro to Crypto class thought at University of Maryland. There are also some good links from my homepage: http://www.cs.iit.edu/~xli/confref.html Tasks and Grading Policy This is tentative grading policy for session CS549-01, CS549-02, and the instructor reserved the right to do small changes. Each studentís grade has following 5 components. a) Class attendance (5%) a) We will do attendance monitoring. You can miss one class at most among all monitored class attendances. b) The attendance accounts for 5%. b) One term paper (15%) (Each student is expected to read several papers from a chosen topic and be able to lead the discussion about the papers in this topic.) 1) EACH student needs to read several papers and write a reaction paper to summarize the papers and propose improvement. Each student needs to first select a topic from the list of topics listed in our class webpage. Each student then needs to write a comprehensive summary of papers from the chosen topic. The selection of the topic from the list is first-come-first-service. No TWO students are allowed to select the SAME topic. The paper is selected from the list of papers provided by me (you can also suggest some really good papers to present, but this needs to be approved by the instructor before you can present this paper). You cannot COPY any material from any segment of results written by others (online material or published books, papers, reports), unless you need to cite some results or statements and clearly indicate in your report. 2) The term reaction paper should be due at the end of the semester. The paper should be at least of 8-15 pages and in IEEE conference format. The paper is due on December 1st, 2014. Upload your paper in PDF format to blackboard and naming the file using your name and additional info so that your file name will be unique. 3) Reaction paper counts for 15% c) One term project and presentation (30%) (the term project is formed by a team of students, but the team should have TWO students. We will NOT allow group with 3 or more than 3 members). This project is about programming and implementation. 1) The term project is proposed by students, i.e., yourself (or you can choose from the list of programming assignments given by me). You need to carefully think about this project. You have to really implement the project and show that it works. See programming assignments for details. 2) Each group needs to discuss the term project with the instructor before September 5th, 2014. Each group needs to submit a 2 page project proposal by the end of the 3rd week (September 12th, 2014). Upload this to blackboard for your group. 3) Each student in the group will be graded equally unless it was reported to me and confirmed that some student did not do sufficient work for the project. 4) Each group needs to do a 20 min presentation at the end of the semester to demo the final results of your project (part of November 24th, and December 1st, 2014). For presentation, each group will need to reserve a timeslot (numbered 1 to 10) for presentation at specific days. a. Presentation Final: covers the following material: Explain your design. Discuss design alternatives, cryptography and network security aspects of your project, such as algorithms, data to show the performance of your systems, system architecture. The challenges faced by your group in implementing the project and how you address these challenges; Lessons learned from the project, and future plan for the project. Management aspects such as your project plan, critical paths, means of team communication (e-mail, chat room, meetings, version control system). b. Bring your own laptop to present slides and to demo your application. The presentation should demo your implementations of some real systems. Your group needs to run your application or demo your system. Demonstrate what it does for its users. Show that your system functions properly. You also need to submit the programming codes that work properly. d) One final exam for this course (30%). The exam will be held before or during the final exam week. It will cover all materials studied in the lectures. e) Two homework problem-sets (each 10%, total 20%). 1) Homework problem sets will also be posted at the blackboard. Download the PDF files of the homeworks from the class webpage or from the blackboard. You need to upload your written solution to blackboard. The tentative grading policy for India session CS549-03: For students from India session (cs549-03), you will be graded based on the following 4 tasks: Individual term paper 15%, individual term programming project 30%, final exam 35%, and homework 20%. Notice that, all programming projects and paper writing projects are individual effort (not group project). You have to propose your own programming project (by sending email to TA). You also need to send TA an email about the topics you will work on and write a technical paper (it could be a well thought survey paper on a given topic, or a research paper on an open question, or some nice protocol design and analysis on some interesting topics). For term project, you need to do online presentation using Skype with TA. b. No late assignments handed in after the extended deadline will be accepted. Requests for an additional extension will almost always be denied. c. In this course you are allowed to discuss the problems with your classmates, and to work together. If you choose to do so, please indicate the name(s) of the people with whom you have worked. Otherwise, it will be treated as cheating! Keep in mind that you may discuss assignment problems, general proof strategies, or general algorithms with other students in the course, but you may not collaborate in the detail development or actual writing of problem sets. You need to upload your solution to the blackboard. For convenience, you can also submit additional hard-copy to TA. Please help us by stapling all written pages, labeling them with your name, and clearly labeling each problem. You don't want us to lose part of your assignment or not see your answers, do you? d. All students are required to do team project (exceptions will only be made for remote students who cannot form a team). All members in each team will be graded equally for the team project unless it has been verified that some students contribute significantly less. e. The term paper must be an individual effort, and thus written and submitted individually. Notice that it should be the result of individual effort. Examples of individual term paper include, but are not limited to, 1) survey on some research topics, 2) successful addressing of some challenging research questions. It is encouraged that you discuss with your classmates on the research topics. The term paper should be written in conference format. f. If you are remote students who cannot form a team with other students, term project and term paper will be individual effort. Note that you still need to term project and term paper. If you are remote student and cannot do your presentation in the classroom, you can prepare PPT, video-tape your presentation, and send me your files. We can then play your presentation of the paper in classroom. Tentative Grading Policy To get A, you need perform well in all aspects of the class. Generally, (this is tentative, so the instructor reserves the right to change the scale here.), 1) For all students, you get grade A, if your score is at least 87 (out of maximum 100). You get B, if your score is [75, 86], and C if your score is [60,74]. 2) For undergraduate students, you will get D if your score is [50,59] and you will get E if your score is [0,49]. 3) For graduate students, you will get E if your score is [0,59]. Term Paper Ideas: 1) Reading papers on some related topics, and then writing a comprehensive survey on some topics. Examples of topics: trustworthy computing, security issues in cloud computing, security issues in wireless sensor networking, security issues in CPS. 2) Comprehensive and well organized literature review on some interesting topics and papers from ACM CCS conferences or other related conferences. 3) Work on some specific challenging research topics and write a paper about your research results. This could be a theoretical problem which could lead to publication in some research oriented conferences or journals. The term paper must be formed like a conference paper that summarizes the results from term project, including, technical challenging questions that are successfully addressed, and NEW algorithms or protocols that are presented and implemented, and new experiment results collected from the project. Term Project ideas (you are encouraged to propose your own team projects, and discuss with me the feasibility of your projects.): 1) Modeling/Simulation/Verification/Synthesis/Implementation of some network security systems 2) Something related to your own research. You implement the protocols you designed and then evaluate the performances of your protocols in real systems or testbeds. 3) Real network security systems, such as security protocols for CPS Term Project grading: In particular, the following four aspects of a term project were considered in project grading: 1) Project has a clear goal 2) Goal has a clear value if achieved 3) There are novel ideas involved in achieving the goal 4) These ideas and your implementation work In summary, the project grade is based on answers to these questions: Clear goal? Has value? New ideas? Ideas work? If you would like to get detailed written feedback on your project report please let me know and I will give you a marked hard copy. If you disagree with my assessment of any of the above regarding your project, please see me. I would be happy to discuss the final project grade with you and fix it if appropriate. How to do a good presentation: Wear professional attire; Clear and concise manner of speaking; Professional-looking audio/visual material such as slides; Split the presentation time about evenly among the members of your team and rehearse the hand-off when the presentation is done by a team. Rehearse your presentation and demo, and time the duration of each part. One or more group members may deliver the presentation, but all group members are expected to be present and available to answer questions about the project. During the presentation all group members should join together with the presenter at the front of the room. Please put any electronic materials on a memory stick or post to the web in a readily available location. Tentative Course Topics to be covered This course provides an introduction to the theory and the practice of cryptography and network security. Particular topics to be covered include: Basic concepts, number theory I. CONVENTIONAL ENCRYPTION. Conventional Encryption: Classical Techniques. Conventional Encryption: Modern Techniques. Conventional Encryption: Algorithms. Confidentiality Using Conventional Encryption. II. PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS. Message Authentication and Hash Functions. Hash and MAC Algorithms. Digital Signatures and Authentication Protocols. III. Other Issues: Privacy, Verifiable Computing, Proof of Possession. Privacy research topics in mobile social networking, cloud computing, mobile computing, and others. Other Course Policies A copy of the full University Academic Honor Code (code of academic honesty) can be found in the current Student Handbook. Code of Academic Honesty: email@example.com, page 243 of UG Bulletin http://retention.iit.edu/resources/bulletin_2008_2010.pdf
<urn:uuid:0fdb3a9c-d43d-469a-b485-1b7204e62517>
CC-MAIN-2015-35
http://www.cs.iit.edu/~cs549/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.916136
3,435
2.171875
2
You know how condominium complexes extract a monthly fee from residents? Usually, it goes to help cover the cost of maintaining common areas, such as replacing worn-out carpeting, decorating the lobby at Christmas, or keeping the sidewalks and parking lot snow-free in winter. Well, guess what the inhabitants of a 14-story tower in densely populated central Tokyo will be getting for their money? Sunlight. That's right: sunlight. They learned to their dismay not long ago that another building almost as tall is to be built on the lot next door, mere feet away. Since it will block ol' Sol's rays for all but the unit owners on the top floors, and since - as one member of their association put it - "We are united in our desire for sunlight," they filed a grievance. Happily, a solution has been found. It's a system, developed by a consortium of engineering companies with government financing, that consists of a large lens on the roof that captures the rays and transmits them via fiber-optic cables throughout the building. Thus, each resident will receive a full ration of natural light, minus the ultraviolet. It's believed to be a first for an entire building, although the system has proved effective in some private homes and offices. No word on whether the monthly condo fee now will be going sky-high.
<urn:uuid:87e7912f-f4c6-4d72-ab19-7f826600febb>
CC-MAIN-2015-35
http://www.csmonitor.com/2006/0509/p03s03-nbgn.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.973129
275
2.1875
2
West Africa Rising: World Bank predicts more rapid growth While the US limps back from its downturn at an economic growth rate of 3.0, World Bank officials expect the 47 countries south of the Sahara to cruise at a an average of 5.3 percent growth this year. Dakar, Senegal — • West Africa Rising is a weekly look at business, investment, and development trends. The world's poorest continent is getting richer, and you could almost smell it in the numbers read out by World Bank functionaries starring in a videoconference in Dakar, Senegal last week. While the US limps back from its downturn at a economic growth rate of 3 percent, World Bank officials expect the 47 countries south of the Sahara to cruise at a respectable 5.3 percent growth this year – or 6.5, if you exclude South Africa and its sporadic strikes. And even that appears as a pittance contrasted to an emerging celebrity-state like Ghana, whose economy – set to expand by 13.4 percent in 2011 – is now the fasting growing one on the continent. Within West Africa, the land of Kente cloth and King's Bite cocoa is followed by Nigeria, where the World Bank predicts 7 percent growth over the next 12 months. And while the bank didn't put out numbers for Liberia, the International Monetary Fund projects that economy to grow by 9 percent between now and New Year's. That's the kind of boom that "represents serious inroads against poverty," the IMF's deputy director for Africa, Mark Plant, told me over post-press conference pastries last year. And it's happening – but not everywhere. And not for everyone. Welcome to West Africa Rising, a weekly Africa Monitor column that looks every Tuesday at business, investment, and development trends in the region. Sure, the 250 million denizens of Africa's western bulge live in the most heavily peace-kept region of the world. But the fast food chains of Lagos or the docks at Dakar Port tell a different story, one that goes beyond the typical world media's emphasis on African conflict. Consider what the continent offers America: New markets, new allies, a new boom to be a part of. Start with Wal-Mart, which early last month became the biggest retailer on this continent of street vendors and fish stalls. Or watch KFC, which plans to sizzle its original recipe out of 1,200 Africa chains by 2014 – and double its Africa revenue in the process. Even American universities are boosting by 20 percent a year their own peculiar Africa-bound export: Study abroad students, 13,000 of whom backpacked through the continent last year. Then there's the geopolitics: In an epoch when China has supplanted the Soviet Union as the compelling model of how to transmogrify a rural backwater into a new millennium hyper-power, World Bank attachés can point to Ghana as a flag-bearer for the Bretton Woods consensus. So, in-between reports on how the UN negotiates a hopefully peaceful resolution to Ivory Coast's emergency, don't lose sight of the full picture: The next decade could be the one when West Africa rescues the West. Check in each Tuesday as we take a look at the trends in one of the world's last investment frontiers.
<urn:uuid:978a00d5-e2e6-45fa-b56b-aca5cd1a6974>
CC-MAIN-2015-35
http://www.csmonitor.com/World/Africa/Africa-Monitor/2011/0118/West-Africa-Rising-World-Bank-predicts-more-rapid-growth
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.93128
680
2.0625
2
OBELISKS IN AUGUSTAN ROME Pliny, Historia Naturalis 36. 14 (69): the Arsinoeion] eum navalibus incommodum Maximus quidam praefectus Aegypti transtulit in Forum, reciso cacumine, dum vult fastigium addere auratam, quod postea omisit. et alii duo sunt Alexandriae ad portum in Caesaris templo, quos excidit Mesphres rex, quadragenum binum cubitorum. [Mesphres =Thutmose III. One of these latter obelisks is Cleopatra's Needle.] (70) Above all, there came also the difficult task of transporting obelisks to Rome by sea. The ships used attracted much attention from sightseers. That which carried the first of two obelisks was solemnly laid up by Augustus in a permanent dock at Puteoli to celebrate the remarkable achievement; but later it was destroyed by fire. The ship used by the Emperor Gaius for bringing a third was carefully preserved for several years by Claudius, for it was the most amazing that had ever been seen at sea . . . . The obelisk placed by Augustus in the Circus Maximus was cut by King Psemetnepserphreus, who was reigning when Pythagoras was in Egypt, and measures 85 feet and nine inches, apart from its base, which forms part of the same stone. The obelisk in the Campus Martius, however, which is 9 feet less, was cut by Sesothis. [Pliny has these kings reversed: the obelisk in the Piazza del Popolo was commissioned by Seti I/Rameses II; the one on Montecitorio was commissioned by Psammetichus II.] The third obelisk in Rome stands in the Vatican Circus that was built by the Emperors Caius and Nero. It was the only one of the three that was broken during its removal. It was made by Nencoreus the son of Sesostris, and there still exists another that belongs to him: it is 100 cubits in height and was dedicated by him to the sun god in accordance with an oracle after he had been stricken with blindness and then regained his sight. Suetonius Augustus 104: reliquias [Augusti] . . . Mausoleo condiderunt. id opus inter Flaminiam Viam ripamque Tiberis sexto suo consulatu exstruxerat circumiectasque silvas et ambulationes in usum populi iam tum publicaret. Strabo Geography 5. 3.8: The most noteworthy [of the tombs in the Campus Martius] is what is called the Mausoleum, a great mound near the river, on a lofty foundation of white marble, thickly covered with evergreen trees to the very summit. Now on top is a bronze image of Augustus Caesar. Beneath the mound are the tombs of himself and his kinsmen and his intimates. Behind the mound is a large sacred precinct with wonderful promenades. And in the center of the Campus is the Crematorium [ ustrinum ], surrounded by a white marble enclosure wall; it has an iron fence surrounding it on all sides; inside it is planted with black poplars. Curiosum Urbis Romae [Valentini & Zuchetti, Codice topografico della città di Roma I (1940) 149] in Musileo Augusti duo altae singulae pedes XLII semis. The Esquiline Obelisk - seen in city plans of Bufalini (1551) and Duperac (1577) lying in at least four pieces between the Mausoleum and the river, now the Via Ripetta . Duperac's drawing of ca. 1575 shows the obelisk without the benben. - first excavation, July 14, 1519 (Lanciani, Storia degli scavi di Roma (Roma 1902-1912) I, 192.) - Baldassare Peruzzi and Antonio da Sangallo immediately studied and sketched the obelisk (A. Bartoli, I monumenti antichi di Roma nei designi degli Uffizi di Firenze [Roma 1914-1922] II #201 and 202; III #355, 412, 420.). - The second is referred to in 1527 by Andrea Fulvio, Antichità di Roma (Antiquitates Urbis 1527; translated by Ferrucci 1588, 138). - In September 1585 Pope Sixtus V (Peretti) ordered the removal of the obelisk to the rear of S. Maria Maggiore. This work was carried out by Badino da Stabia. F. Artaud de Montor, Histoire des souverains pontifes romains IV (Paris 1851) 372-377. - Space was obtained by the demolition of two churches, S. Alberto and S. Luca. Foundations for the obelisk were under way by March 11, 1587. - Erection of the obelisk was completed under the direction of Domenico Fontana (who had moved and reerected the Vatican Obelisk in the previous year) and Carlo Maderno on July 29, 1587. - Consecration of the obelisk took place on August 13, 1587, in the presence of the pope. - The cornice, star, and cross were cast by Giacomo Tranquilli to designs of Giacomo della Duca. Bufalini's map of 1551, with the obelisks lying in the street next to the Tiber (S) CHRISTVS PER INVICTAM CRVCEM POPVLO PACEM PRAEBEAT QVI AVGVSTI PACE IN PRAESEPE NASCI VOLVIT. (N) CHRISTVM DOMINVM QVEM AVGVSTVS DE VIRGINE NASCITVRVM VIVENS ADORAVIT SEQ DEINCEPS DOMINVM DICI VETVIT ADORO. (E) CHRISTI DEI IN AETERNVM VIVENTIS CVNABVLA LAETISSIME COLO QVI MORTVI SEPVLCRO AVGVSTI TRISTIS SERVIEBAM. (W) SIXTVS V PONT MAX OBELISCVM AEGYPTO ADVECTVM AVGVSTO IN EIVS MAVSOLEO DICATVM EVERSVM DEINDE IN PLVRES CONFRACTVM PARTES IN VIA AD SANCTVM ROCHEM IACENTEM IN PRISTINAM FACIEM RESTITVTVM SALVTIFERAE CRVCI FELICIVS HIC ERIGI IVSSIT A D MDLXXXVII PONT III.
<urn:uuid:6826707c-c1dc-43e9-a717-801dc48596cd>
CC-MAIN-2015-35
http://www.csun.edu/~hcfll004/obelisks.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.911131
1,533
2.890625
3
Control iTunes Media Playback From Your Android Device [How-To] Remote was among the first apps that was released on the App Store by Apple. The app allows iPhone and iPad users to control media playback on iTunes on their Mac or Windows based PC without any hackery or complex procedures. While many Android apps on the Play Store offer similar functionality, they need an application to be installed on your PC. In comes Retune from SquallyDoc studios that works just like Remote from Apple for Android devices, and is free as well. Retune does not require any kind of application to be installed on your PC, and works just like Remote does. It also allows you to enqueue songs to Up Next The only requirement that ReTune has is that the Android device and the PC/Laptop should be on the same network. 1. Make sure you have iTunes already running on your PC or Mac. Then, download and start Retune from the Play Store. 2. After accepting the welcome message, Retune will display a 4 digit code, which needs to be entered in iTunes running on your PC. 3. On your PC, wait for iTunes to detect your Android device. If your network connections are properly optimised, it should not take iTunes more than 30 seconds to detect your device. On iTunes 11, click on the top right corner to see the list of devices that iTunes has found and is connected to. 4. Click on the name of your Android device being displayed by iTunes, and then proceed to enter the 4-digit code on the next screen. Now, you can successfully control iTunes media playback on your PC via your Android device. However, keep in mind that you can control the media playback only when iTunes is already running on your PC. You cannot use Retune to launch or quit iTunes on your PC. 5. Retune has a very nifty feature up its sleeve that will automatically pause the music playback on your PC, if you receive an incoming call on your Android phone. You can enable this option from under Settings by selecting the Pause on Incoming calls option. For the ease of use, the beautiful UI, and the features that it offers, it really is commendable for the developer to offer Retunes for free. If you are loving Retunes, I would suggest you to donate some money to the developer using the Donate option in the app, to show support for his work.
<urn:uuid:26a76f89-7eef-4a4d-a427-4d57856a1d1b>
CC-MAIN-2015-35
http://www.cultofandroid.com/34947/control-itunes-media-playback-from-your-android-device/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.934632
498
1.53125
2
Apple manufacturing partner Foxconn has shut down its operations in Vietnam for three days as a result of anti-China protests over oil drilling. China recently began drilling for oil near to the Paracel Islands in the South China Sea. The problem? While the islands are controlled by the People’s Republic of China, they’re claimed by both Vietnam and Taiwan. The disputed ownership has prompted protesters in Vietnam to ransack factories near to Ho Chi Minh City. The violence has already forced manufacturers for Nike and Adidas, as well as Walmart, to temporarily halt productions. Now Foxconn has done the same –giving its workers in Vietnam a three-day leave of absence starting Saturday to “ensure [their] safety.” At least 21 people have reportedly been killed so far in the violence. Along with Pegatron, Foxconn is Apple’s primary supplier and assembler, responsible for working on devices including the iPhone and iPad. It’s not know how much of that work is accomplished in Vietnam, thereby making it difficult to say what the knock-on effects could be for Apple if protests continue. Source: Financial Times
<urn:uuid:0b6f7d0f-2108-4e90-9223-462d9eb806a9>
CC-MAIN-2015-35
http://www.cultofmac.com/279417/violence-makes-apple-supplier-halt-production-vietnam/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.967361
239
1.6875
2
If you're the type of person who likes pumping iron in the gym, you may have overlooked yoga stretching in the past. However, yoga is becoming an increasingly popular way to stay fit and limber these days, and you might want to think about signing up for a class. Here are three yoga stretching benefits to keep in mind if you're still on the fence. Cardio exercise is important for weight management, but it also can have a significant impact on your heart as well. Yoga stretches are a great way to boost blood circulation, reduce high blood pressure and lessen the chance of heart disease and heart attacks. All those hours in the gym can really take a toll on your muscles. If you've been feeling particularly achy lately, you'll be happy to know what yoga exercises can target and relieve pain in specific muscle groups like the neck, back and shoulders. If you like participating in organized sports leagues for football, baseball or hockey, yoga is the perfect way to stay loose and limber before a game. Increased flexibility can boost your speed and agility as well as strengthen muscles that your usual workout plan may have overlooked.
<urn:uuid:a08a11ac-3eb2-41f3-8458-50fe1ff2ea99>
CC-MAIN-2015-35
http://www.dahnyoga.us/tag/yoga-stretching-benefits/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.967888
229
1.648438
2
The Associated Press has reported that the godfather of the modern skeptical movement, Martin Gardner, has passed away. Gardner exerted a profound influence upon numerous academics via his 'Mathematical Games' column in Scientific American, was a skilled and knowledgable contributor to the (performance) magic community, and with his 1952 book Fads and Fallacies in the Name of Science is seen by many as the man who kick-started skeptical activism in the modern age. His long-time friend James Randi has written a short blog about his passing: Martin Gardner has died. I have dreaded to type those words, and Martin would not have wanted to know that I’m so devastated at what I knew – day to day – had to happen very soon. I’m glad to report that his passing was painless and quick. That man was one of my giants, a very long-time friend of some 50 years or so. He was a delight, a very bright spot in my firmament, one to whom I could always turn to with a question or an idea, with any strange notion I could invent, and with any complaint or comment I could come up with. ...He was such a good man, a productive and useful member of our society, and I can anticipate the international reaction to his passing. His books – so many of them – remain to remind us of his contributions to us all. His last one was dedicated to me, and I am just so proud of that fact, so very proud… It will take a while, but Martin would want me to get on with my life, so I will. Phil Plait has also written about Gardner's passing, and Scientific American has reposted their 2005 profile of him as a tribute. For a video profile of the man, see the following 1996 documentary hosted by David Suzuki: About the only people that might not be as glowing in their summation of Gardner's life are those involved in off-beat science and the paranormal - subject areas against which Gardner wrote numerous polemics, befitting his role as a founder of CSICOP (now CSI). My own investigation of Gardner's 'skepticism' has revealed a man who was certainly not immune to writing biased, erroneous, and misleading tracts - coincidentally, I was only weeks away from publishing a critique of his 'debunking' of the mediumship of Leonora Piper (which I'll withhold for a while as a mark of respect). But all of us certainly have our moments of error; and on balance, one must say that Gardner inspired and helped a large number of people, and the growth of knowledge, in a good way over his long life. Martin Gardner was 95 years old.
<urn:uuid:6718a279-48b3-4645-8420-dd778be2f61e>
CC-MAIN-2015-35
http://www.dailygrail.com/Skepticism/2010/5/Vale-Martin-Gardner-1914-2010
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.987232
559
1.5
2
Bedbugs easily hitch rides in luggage, backpacks, briefcases, purses, clothing and furniture, according to Harvard Medical School. Here are some measures you can take to minimize the chance of bringing bedbugs into your home: • Travel precautions. When staying in a hotel, place your luggage on a table or luggage rack away from the bed and off the floor, or keep it in the bathroom. You may also want to bring along a large plastic trash bag to put your suitcase in. Check mattress seams for dots of bedbug feces; if possible, inspect the headboard, bed frame and underside of the box springs for signs of infestation. Keep bed linens off the floor. Upon returning home, unpack directly into the washing machine (placed on the "hot" setting) or run your clothes in a dryer for 20 minutes. • Protect your home. Used furniture is one of the biggest bedbug sources. If you can't resist a bargain, inspect it before bringing it home. Place your mattress and box springs in protective mattress and box spring encasements, which eliminate bedbugs' access to favorite hiding places. Simultaneous feelings of exhaustion and being "keyed up" characterize early adrenal dysfunction, the subject of nurse practitioner Marcelle Pick's self-help book, "Are You Tired and Wired?" (Hay House, $24.95), The Washington Post says. The adrenal glands are responsible for providing the fight-or-flight hormones in response to stress. She suggests a 30-day plan to solve adrenal dysfunction, including dietary supplements, exercise, stress-reduction techniques and, the biggie, an adrenal-friendly diet with regular meal times and no processed foods. VegNews, the lifestyle magazine for vegans, highlights 10 herbivores who are shaping the world, according to The Washington Post. There are the famous people who are outspoken about their animal-free ways, including talk show host Ellen DeGeneres and hip-hop mogul Russell Simmons. Then there are the not-so-famous people, such as Jason Gaverick Matheny, who works with a research group whose aim is to develop vegan-acceptable food that looks and tastes like meat. Elsewhere in the mag is the "Vegan Bucket List": the 99 things all vegans ought to do "before you retire to that great tofu farm in the sky."
<urn:uuid:80b8ee5f-aa25-4189-bcff-4112e71cfea2>
CC-MAIN-2015-35
http://www.dailyherald.com/article/20110321/entlife/703209999/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.927272
493
1.8125
2
"We're of course deeply disappointed in today's decision and are still reviewing it," Earnest told reporters traveling with the president. In a ruling that will constrain future presidents, the court held on a 9-0 vote that the three appointments Obama made to the U.S. National Labor Relations Board (NLRB) in 2012 were unlawful. The decision limits the ability of presidents to make so-called recess appointments without Senate approval, although the court did not go as far as it could have gone in restricting a president's powers. The decision, written by Justice Stephen Breyer, could especially hamper the Obama administration if Republicans were to win control of the Senate in the November elections. They already control the House of Representatives. It also is likely to make it more difficult for the president to make appointments of his choosing during the last two years of his term. The ruling has little immediate impact because Democrats, who currently control the Senate, pushed through a rule change in November 2013 that made it harder for Republicans to block the president’s nominees. A Senate deal in July 2013 paved the way for the confirmation of five NLRB members. The board will, however, have to reassess all the decisions that were made when the temporary appointees were in office. The complicated legal issue boils down to when the Senate is formally in recess. Only then does the president’s recess appointment power kick in. In Thursday’s ruling, the court limited the definition of the recess, therefore reducing the circumstances in which presidents can make recess appointments. The court said that there is no recess when the Senate is holding so-called pro-forma sessions when no business is being conducted but the Senate is not formally adjourned. But the court did not cut back on the president's power to make recess appointments in between Senate sessions or recesses during a legislative session. Although the court was unanimous on the outcome, the court was divided on its legal reasoning. Justice Antonin Scalia wrote a concurring opinion in which he was joined by his conservative colleagues. The court ruled in a case in which soft drink bottler Noel Canning Corp challenged an NLRB ruling against it. The company argued the ruling was invalid because some of the NLRB board members on the panel that issued it were recess appointees improperly picked by Obama. With the intervention of senior Republicans, the U.S. Chamber of Commerce and other business interests, the Yakima, Washington-based company's case has become a much broader fight over the president's ability to make appointments while the Senate is in recess and what exactly constitutes a recess. Obama used his recess appointment power to name three members to the five-member NLRB in January 2012. Democratic and Republican presidents have made many such temporary appointments - valid for up to two years - of officials who otherwise would have had difficulty winning Senate confirmation. The Obama administration said it was following the long-established interpretation of the recess appointments clause of the U.S. Constitution, dating back to President George Washington. Noel Canning and its backers contended that Obama ignored the original intent of the Constitution's drafters, who included the recess appointments clause to ensure the government could continue to function when the Senate was in recess for months at a time and senators would travel to Washington on horseback. The case is NLRB v. Noel Canning, U.S. Supreme Court, No. 12-1281.v ReutersCopyright © 2015, Daily Press
<urn:uuid:2a330dd3-74ba-499b-b3e0-0def5d730e8f>
CC-MAIN-2015-35
http://www.dailypress.com/news/chi-obama-appointments-ruling-20140626-story.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.981275
710
1.75
2
Your feedback is important to us! We invite all our readers to share with us their views and comments about this article. Disclaimer: Comments submitted by third parties on this site are the sole responsibility of the individual(s) whose content is submitted. The Daily Star accepts no responsibility for the content of comment(s), including, without limitation, any error, omission or inaccuracy therein. Please note that your email address will NOT appear on the site. Alert: If you are facing problems with posting comments, please note that you must verify your email with Disqus prior to posting a comment. follow this link to make sure your account meets the requirements. (http://bit.ly/vDisqus) Shirley Temple Black, who lifted Depression-era America's spirits as a bright-eyed, dimpled child movie star and later became a U.S. diplomat, died late Monday evening at the age of 85 .Born April 23, 1928, Temple Black started her career in the early 1930s and was famous by age 6 . She became a national institution, and her raging popularity spawned dozens of Shirley Temple novelties, as she became one of the first stars to enjoy the fruits of the growing merchandising trade.She was 3 when her mother put her in dance school, where a talent scout spotted her and got her in "Baby Burlesk," a series of short movies with child actors spoofing adult movies.In 1935 she received a special Oscar for her "outstanding contribution to screen entertainment".She made some 40 feature-length movies in 10 years, starring alongside such actors as Randolph Scott, Lionel Barrymore and Jimmy Durante.Temple was 17 in 1945 when she married John Agar, who would eventually appear with her in two movies. FOLLOW THIS ARTICLE
<urn:uuid:cfa64a8b-c543-4c44-903b-60ba83e41428>
CC-MAIN-2015-35
http://www.dailystar.com.lb/Culture/Performance/2014/Feb-12/247031-shirley-temple-black-hollywood-child-star-dies.ashx
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.971389
365
1.515625
2
On Tuesday, the University launched its eighth massive open online course — better known as MOOC — “Effective Thinking Through Mathematics,” which will be taught by mathematics professor Michael Starbird, “The real goal of education is to get people to be better thinkers, so that’s the goal of the course,” Starbird said. “I think one of the most important things a person can learn is how to think deeply over a longer, extended period of time, when you don’t have a bunch of things coming in.” According to Starbird, his MOOC has been in development for a year, and he has filmed more than 50 hours of content for the course. Starbird said one of his biggest challenges was finding an engaging way to present the material. “It’s not exactly thrilling movie productions,” Starbird said. “We were joking about inserting a car chase to keep people’s attention.” Starbird said he approached his MOOC as an experiment, focusing on the interactions between himself and his students. “I sat there with [two or three] students on either side of me and I would pose a question — either a mathematical puzzle, problem or concept — and have them work on that mathematical issue, and I would comment as they were working about strategies of thinking,” Starbird said. “I don’t know the extent of which people who are just watching this will actively engage in that same way — which was my hope — or not. That part of the experiment is not known yet.” The University launched four MOOC courses in the fall that had completion rates ranging from 1 to 13 percent. In 2012, the UT System invested $5 million in edX, an online education provider, in order to bring MOOCs to UT. Last semester, UTAustinX, UT’s MOOC program, offered four classes. The courses are open to anyone in the world, and, although UT will not offer any credit for completed courses, students who pass can obtain certificates of mastery. Engineering professor Michael Webber’s MOOC, “Energy 101,” had the highest completion rate of all of last semester’s MOOCs, at 13 percent. Webber said one of his goals in the course was to have a high retention rate. “[A high retention rate] was an explicit goal and something we pursued as part of our MOOC development,” Webber said. “We did that through social media goals and our use of Facebook and Twitter to interact with students.” Webber said he has several ideas on how to improve MOOCs in the future. “I’d like to see it get easier to do a good job with a MOOC and have the MOOC technology work better with integrating assessments,” Webber said. “If you’re teaching a class and you cannot assess the students, then you’re not really teaching — you’re entertaining.” Germanic studies professor John Hoberman taught a MOOC called “Age of Globalization” last semester. “These courses were, in terms of compensation, one sixth of my salary and one course off in the fall,” Hoberman said. “In terms of the amount of work required, that’s modest compensation, but you don’t go into this to make money. You don’t make a MOOC to make money.” Hoberman said he considers his course a success and would potentially pursue a different MOOC in the future. “In a real sense, a MOOC that has something substantial to offer to all sorts of people is a kind of public service,” Hoberman said.
<urn:uuid:30d6fade-e7d8-4a21-a214-788a590fe775>
CC-MAIN-2015-35
http://www.dailytexanonline.com/news/2014/02/18/university-to-launch-eighth-mooc-despite-retention-challenges
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.975357
810
2.734375
3
Battle Brother (3.5e Prestige Class) From D&D Wiki |“||If at all possible the official position of the monastery is non-interference, we do not dabble in worldly affairs of others as long as we are left alone. There are times when that is not possible or when something must be acquired to ensure our safety or avert disaster. This is the reason you all are called upon now to take new vows to ensure that no one will destroy all we hold sacred even unto our dying breath.||”| |—Viamon Sivatho, Elven Battle Brother, Dedicant of the Flowing River| Monks in various monasteries have different tasks but none are more specialized than the battle brother, a monk that possesses the sole purpose of offensively taking the fight outside the walls they live in into the world. When something needs to be taken in defense of the temple such as an artifact of great power that endangers their temples, when a group tries to start assembling to assault one of their strongholds or when certain items need to be acquired by the monks that is when the battle brothers are called upon. These monks dedicate themselves to physical perfection to ensure that any task laid before them can be completed with the least amount of damage to their organization. The battle brothers are taken from the quickest and most determined monks and trained in every aspect to ensure success in their mission, even though their missions don't always end in bloodshed. A battle brother can acquire things they need through diplomacy, combat and even through more subtle means like poisons can be utilized in the defense of the temples objectives. The battle brother is taught that their primary concern is the defense of the temple, that the objectives they are given have purpose and they must bend themselves to make sure they complete their objectives. Many times individual battle brothers will be dispatched with an objective without all the necessary details of why they are tracking a specific piece, though they are explained everything once they return by the head masters of the order. The battle brothers accept this as a burden but understand it; if the battle brother should fall into enemy hands prior to the use of a device they are sent for (like an ancient artifact that can decimate the temple) they will not be able to divulge any information to their captors. Becoming a Battle Brother Battle brothers are chosen from the monk ranks to fulfill the needs of their organizations, and rarely is this opportunity given to anyone that seeks it. The battle brother training is presented to many initiates which are then weeded from the program to ensure only those with the proper mentality and ability reach the ranks of battle brother, since many would not understand exactly what they are called upon to do. The average advancement ratio to battle brother standing is less than one in thirty and this average holds true for most orders due to the rigorous training they receive. The physical portions are almost never the reason the students wash out of the program; most students are washed out during the scenerios that each student goes through. There are multiple scenerios for each temple; they are by no means identical but they do convey one true meaning for the battle brothers as time goes on. This meaning is for them to win, whatever the cost and method, and to return with a completed objective. This is harrowing to many of the monks that receive the final training for advancement into the battle brother circle, and the final test is usually a live test to assure that the monk can carry out what he intellectually understands. Many monks fail the final test simply because they cannot accept the possibility that they may need to do terrible or ghastly things in defense of the monastery. |Skill:||Tumble, Move Silently, or Diplomacy 8 ranks| |Special:||Able to inflict at least d8 lethal damage with a hand-to-hand attack on the monk chart. Chosen by the battle brothers in their organization and pass all tests.| |1st||+1||+2||+0||+2||Monk Abilities, Needs of the order| |2nd||+2||+3||+0||+3||Evasion, Improved Natural Attack| |9th||+9||+6||+3||+6||Two Weapon Combat| Class Skills (4 + Int modifier per level) Through all the unique and specialized training a battle brother receives he gains a number of abilities that will allow him to become a destructive force in service of his master. The battle brother is not considered a cross class for the monk or warrior monk and does not stop their ability to advance in those classes. All of the following are class features of the battle brother. Monk Abilities (Ex): The battle brother continues to advance as a monk for purposes of determining AC, unarmed damage increases, flurry of blows advancement, fast movement and the Insightful Strike class feature if available. The battle brother does not gain any other class features of a monk that would be gained through normal advancement such as timeless body. Needs of the Order (Ex): Due to his conditioning and training the battle brother is highly resistant to anything that tries to interfere with his task, which translates into a +4 bonus against any enchantment spell designed to gain control over the battle brother. Further if the save is failed and the battle brother is magically forced into compulsion he remains true to his training and organization; if they are commanded to act against their orders the command automatically fails and the enchantment is broken. In short the battle brother can never be used to work against his organizations goals, as long as he is aware of the goals that are in place. Direct actions against his group are straight out impossible and this ability can even override supernatural compulsion such as aboleth's mind enslavement. Evasion (Ex): At 2nd level or higher if a battle brother makes a successful Reflex saving throw against an attack that normally deals half damage on a successful save, she instead takes no damage. Evasion can be used only if a battle brother is wearing light armor or no armor. A helpless battle brother does not gain the benefit of evasion. If the battle brother already possesses the evasion ability it improves to Improved Evasion and the battle brother only takes half damage on a failed Reflex saving throw. Improved Natural Attack (Ex): At 2nd level the battle brother gains the Improved Natural Attack feat. Unlike the normal gaining of this feat the battle brother applies this to every form of natural attack instead of just a single form of natural attack (it applies to arms, legs or any other part of the body the battle brother wishes to use in order to injure his opponents.) - Base Attack Bonus +1 = When conducting a charge you may add an additional d6 to your damage rolls. - Base Attack Bonus +6 = Full attack actions beyond the first suffer a -3 to hit instead of the normal -5. - Base Attack Bonus +11 = During a full round attack the battle brother may trade base attack bonus for damage. - Base Attack Bonus +16 = You may make a full round attack as a standard action. Great Fortitude [Combat] Bonus Feat (Ex): This ability is similar to the Great Fortitude ability found in the Races of War Sourcebook. This feat gives the following bonuses based upon your base attack bonus. - Base Attack Bonus +1 = +3 Bonus on Fortitude saving throw. - Base Attack Bonus +6 = You die at -20 hit points and go unconscious at -5. - Base Attack Bonus +11 = You gain 1 hit point per level. - Base Attack Bonus +16 = You gain DR 3/-. - Base Attack Bonus +1 = +2 Bonus on all attack rolls, this bonus is expertise based. - Base Attack Bonus +6 = +3 to damage rolls with the selected weapon of choice (natural weapons for the battle brother.) - Base Attack Bonus +11 = Your weapon of choice (natural) increases the critical multiplier by one step (x2 to x3) - Base Attack Bonus +16 = You may take 10 on a single attack roll per round, and you may add 5 to one attack roll per round determined after the roll is made. Two Weapon Combat [Combat] Bonus Feat (Ex):This ability is similar to the Two Weapon Fighting ability found in the Races of War Sourcebook. This feat gives the following bonuses based upon your base attack bonus. - Base Attack Bonus +1 = You can make an additional attack for every base attack (i.e. non flurry of blows) you possess at your current level. - Base Attack Bonus +6 = You recieve a shield bonus to AC that is equal to 1/4 of your character level. - Base Attack Bonus +11 = You gain an additional attack of opportunity every round. - Base Attack Bonus +16 = You gain the ability to rend your opponent for 2d6 + damage bonuses if you manage to strike with two separate weapons in the same combat round. This can only be done once a round regardless of how many paired strikes occur. Atone (Sp): Due to their nature a battle brother can often find that they must do things contrary to their beliefs. When this occurs the battle brother is able to atone for his trespasses without the aid of a priest. This ability functions just like an Atonement spell and the only requirement is a pennance on the behalf of the temple in order to regain their former status. This allows the battle brother to accomplish anything in the service of the organization without punishing him for his success. A battle brother who becomes non-lawful cannot gain new levels as a monk but retains all monk abilities. Like a member of any other class, a battle brother may be a multiclass character, but multiclass battle brothers face a special restriction. A battle brother who gains a new class or (if already multiclass) raises another class by a level may never again raise his battle brother level, though he retains all his battle brother abilities. The exception to this rule is if a battle brother decides to advance in the monk class or any monk prestige class (monk prestige classes are defined as any class that advances monk abilities or advance on the monk hand-to-hand table.) Epic Battle Brothers |22nd||Superior Natural Attack, Bonus Feat| |25th||Strength of the Order 1/day| |28th||Perfect Natural Attack, Bonus Feat| |30th||Bonus Feat, Strength of the Order 2/day| Superior Natural Attack (Ex): The battle brothers combat abilities continue to grow as he learns new and more lethal ways to cause his opponents great pain and damage. The battle brothers hand to hand damage increases for all attacks by an additional rank and this ability stacks with the Improved Natural Attack that he gained at the 8th level of the battle brother class. Strength of the Order (Ex): The battle brother at level 25 is endowed through a special process to call upon the strength of their belief in the order. This transfers into a +10 divine bonus to all stats and allows him to regenerate all of his hit points once. This bonus exists for a number of rounds equal to the class level of the battle brother but comes at a terrible price; first the battle brother takes d4 temporary damage to all stats and is stunned for d10+ the number of rounds that the power was active, then he is dazed for the number of rounds equal to half his stunned rounds. For the following hour after the use of this ability the character is fatigued, making this ability a last resort option to ensure victory. At level 30 this ability can be used twice a day and the following changes to the drawbacks; the dazed condition only lasts for d4 rounds, the stunned effect lasts for half that duration and the recovery time is lessened to 10 minutes. Perfect Natural Attack (Ex): The battle brothers combat abilities have reached the pinnacle of all hand-to-hand combat abilities. From this point forward the battle brother receives the following bonus to his damage modifier when figuring the hand-to-hand damage: the battle brother now advances his hand-to-hand damage by 1/4 of his wisdom modifier, rounding down (+8 wisdom modifier gives 2 damage advances.) This ability stacks with Improved Natural Attack but does not stack with the Superior Natural Attack as this ability overwrites the previous bonuses gained from the other class feature. The epic battle brother gains a bonus feat selected from the Epic Battle Brother Bonus Feat list every two levels after 20th level. Epic Battle Brother Bonus Feat List: Armor Skin, Blinding Speed, Damage Reduction, Energy Resistance, Epic Prowess, Epic Speed, Epic Toughness, Exceptional Deflection, Fast Healing, Improved Combat Reflexes, Improved Ki Strike, Improved Spell Resistance, Improved Stunning Fist, Keen Strike, Legendary Climber, Legendary Wrestler, Righteous Strike, Self-Concealment, Shattering Strike, Vorpal Strike. Playing a Battle Brother Combat: The battle brother is built for combat, designed to take on multiple attackers at once and potentially win. They are self sufficient, resourceful and above all extremely dangerous; the battle brother is not above slaughtering people from suprise, using poisons if required or even sacrificing others to ensure their goal is achieved. With their increased hand-to-hand damage the battle brother is an extremely dangerous adversary, and these abilities only increase with time. The key with battle brothers is that he will be quick to take any advantage available including targeting weaker individuals in hit and run attacks to make sure the odds are always in their favor. Advancement: This character advances like most monk type classes. Other monk prestige classes or going back into base classes can both be excellent choices, as the different class features available can help forge him into a destructive weapon. Resources: Battle brothers are expected to be sulf sufficient and to require very little resources to get their tasks complete. Since they are sent on missions considered to be vital to their organizations survival they are able to either borrow items that they believe are necessary or in some occasions are given them outright. However if a battle brother continuously asks for far more than what the organization should be providing or does not turn over everything upon completion of his duties he can quickly find himself stripped of his ranks. If the battle brother is thrown out of his organization this has a very real consequence; he may not advance in the class of the battle brother unless some sort of pennance is reached for his organization and they allow him to re-enter the ranks. This can range from anything between accomplishing the next three missions without any help from the organization to large sums of money needing to be donated to the temple. Battle Brothers in the World |“||Gentlemen, the device you are carrying is inherently evil and dangerous. My order would like to safe guard it and would be willing to trade you for it, name your price.||”| The battle brother is a chief negotiator, thief, assassin and warrior for their organization, authorized to do whatever is necessary to accomplish whatever mission they are sent upon. The entire purpose of their training and positions of autonomy is to ensure that they can safeguard the temple against anything that might cause it great harm or destruction. Unlike regular monks battle brothers all possess a purpose; to allow the temple to flurish without having to worry about outside threats. In times of needs it isn't uncommon for a grandmaster to order the battle brothers to go out and earn money through mercenary work or as part of adventuring groups to strengthen the position of the order. A battle brother does not mind this task as it falls into the same realm as all their other tasks; the end result is important to the church, even if the battle brother does not understand it at the moment. NPC Reactions: Unless the order requires it a battle brother is not differential from a monk (some orders require certain robe colors or tatoos on the battle brother as a means of identification but not all.) Since they are so hard to identify they are normally treated as a monk until their true nature and abilities are revealed. When a battle brother is revealed they normally are given a wide berth and people try to make sure that they don't get in there way. Most stories tell of ruthless monks that will destroy anything in their path until they accomplish their goal or die. Battle Brother Lore Characters with ranks in Knowledge (religion) can research battle brothers to learn more about them. When a character makes a skill check, read or paraphrase the following, including information from lower DCs. |15||Battle brothers are elite hand-to-hand fighters serving their order.| |20||The battle brothers receive unique training and will violate other vows to ensure success of a mission.| |25||Battle brothers will not always attack an opponent if other means avail themselves. However when they do attack their strikes are lethal and the most experienced battle brothers can call upon a power that strengthens them considerably.| Battle Brothers in the Game In the realm of player characters the battle brother is uncommon but not rare. Normally the temple will select the recruits based upon contributions to the temple (i.e. does the monk actually donate to the organization), their willingness to be tasked by the temple and their ability to remove obstacles (not necessarily combat, diplomacy is also looked upon with favor.) If the player character is asked to be chosen for a position among the brothers he must pass a series of tests (recommended no less than 3 no more than 7) that show he has the right attitude and conviction to serve the temple. If he passes all of his tests for acceptance he can either be sent on quests (with the player group if they are willing) or be instructed to continue working with the group to acquire items for the church. If he is selected to maintain his relations with the current group the contributions from the battle brother should be between 10-20% of the individuals share. As for NPCs the battle brothers can be introduced in a number of ways depending on the campaigns approach. Maybe the PCs stumbled across an ancient artifact that seems very useful but the destructive powers force an order to get it from the players. In such cases the NPC should always attempt negotiation first (remember they don't want to kill everything, they are just very good at being lethal) and should that fail they will resort to violence or theft to ensure it does not remain in their hands. Another good way to introduce them into the campaign is to have them fighting a group of bandits threatening the abbey. Adaptation: If a PC is interested in this class they will need to bring it to the attention of the DM, as this is a selection based system not a random set of numbers. If you fail the tests you are barred from this class; this isn't suited for everyone and it certainly isn't a class you get into if you decide you like it. The whole purpose of this individuals is to strengthen the position of the temple and eliminate threats in any way possible. Even if the individuals actions force an alignment shift the individual will receive atonement rather than scorn as long as it was in the interests of the temple. If the individual passes his tests his eyes will be opened to the realities of the temples positions which might not be as comforting as one would think. Sample Encounter: At the monastery of the Eight fold path the grandmaster has learned of rumors that a highly evil artifact the Necromus has appeared. Sparing no time the grandmaster has selected the battle brother Kauld Mordakai to travel into the vicinity and investigate these rumors; if they appear to be true he is to retrieve the artifact and if not he shall return to the temple. Kauld has managed to narrow his investigation to an old temple to a forgotten god that enjoyed human sacrifice for his worship and is certain that the artifact is inside. |LN Medium humanoid (human)| |Init/Senses||+5/Listen +, Spot +| |AC||27, touch 25, flat-footed 27 (wisdom 11, Dex 2, Armor 4)| |hp||112 (16d8 HD)| |Speed||60 ft. (12 squares)| |Melee||Flurry of Blows +23/+23/+23/+23/+20/+17 (2d8+17/19–20 x3)| |Atk Options||Ki Strike (Magic)| |Combat Gear||Bracers of Armor +4| |Abilities||Str 14 (18), Dex 12 (14), Con 14, Int 10, Wis 18 (22), Cha 8| |SQ||Improved Evasion, Insightful Strike, Purity of Body, Needs of the order,| |Feats||Improved Unarmed Strike, Stunning Fist, Dodge, Combat Reflexes, Weapon Mastery, Insightful Strike, Blind Fight, Improved Grapple, Stunning Fist, Blitz, Great Fortitude, Improved Initiative| |Skills||Balance +8, Climb +11, Diplomacy +11 Hide +13, Listen +13, Move Silently +13, Spot +13, Tumble +13| |Possessions||combat gear plus Gloves of Dexterity +2, Periapt of Wisdom +4,Belt of Giant Strength +4, Ring of Sustenance| Elite array for NPC stats There are several options for Kauld in this scenerio; if the PCs are on their way he could have just finished retrieving the artifact, he could be just entering the cave to try to find it or he could lay in wait and let the PCs do the work for him. He will attempt to barter for the artifact first (he will trade anything he owns and up to 25,000 gp payable upon reaching the temple) and if successful will happily take it off the PCs hands. If barter fails he will attack ruthlessly attempting to eliminate casters first and flee if the need arises using tumble to get away without provoking further attacks. The only person who could hope to catch him would be a monk, and after securing healing he will immediately return to attempt to take the artifact again either through theft or force.
<urn:uuid:9ab406b7-9f60-45ad-a59f-74daff86a328>
CC-MAIN-2015-35
http://www.dandwiki.com/wiki/Battle_Brother_(3.5e_Prestige_Class)
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.946451
4,558
1.539063
2
Nicos Vekiarides, CEO of integrated cloud storage provider TwinStrata It’s no secret that storage needs will continue to grow in the upcoming years. In fact, research from IDC projects installed raw storage to exceed 7 zettabytes (each zettabyte is 1 million petabytes) by 2017 as part of a staggering 16 ZB digital universe. What this means for IT organizations is an increased strain managing growing storage capacities. Further exacerbating matters are regulatory requirements extending data lifetimes to 10 years or more and effectively requiring data to remain accessible online for that extended period of time. While cloud storage does not necessarily meet IT’s growing storage capacity needs, adding cloud-integrated storage into existing NAS or SAN environments makes it relatively easy to relocate data securely into a cloud provider, eliminating the need to maintain an expanding on-premise storage infrastructure. Offloading storage to cloud may sound good on paper, but it does present at least one initial challenge when it comes to storing large amounts of data: getting the initial upload to the cloud. Importing Data to the Cloud A little math can compute how long it takes to upload a large amount of data across a WAN. For instance, if you have an uplink speed of 100Mbit/sec, you should be able to push nearly 1TB per day. Before becoming too comfortable with that figure, consider that it is theoretical and does not account for other users sharing the WAN link, hops/latencies or other overhead that can slow down throughput. Even at a theoretical maximum of 1TB/day, 100TB of data may take over 3 months to upload – a relatively long and cumbersome process. In instances where network bandwidth is not the best option for the initial upload, consider shipping your data to the cloud via a cloud provider import service (as offered by Google and AWS). You can ship disks containing your data directly to the cloud providers, who can load the data in one of their data centers or at a high-bandwidth access point with zero impact to your network. For large data sets, this can be the difference between weeks and months versus days to get data into the cloud. What about Security? While best practices dictate that corporate data should be encrypted at-rest in the cloud, security is sometimes a forgotten aspect of the import process. Transporting unencrypted storage can easily become the weak link in an otherwise tightly secured cloud environment. Ideally, a data import process ought to follow the same practice of encrypting data at-rest prior to transporting it. Would you ever hand your unencrypted data to stranger? Well, whether the data is handled by a “trusted” shipping/transport company or cloud provider, there is no reason to leave a window open for breach by an unauthorized or unknown party. Look for an import process that encrypts and encapsulates data into object format stored in the cloud prior to shipping the data from your premises. Following the same security practice used for storing data online in the cloud eliminates having to make any security compromises during the import. The Bottom Line Cloud storage has become a viable alternative for both storing data online and protecting data by copying it offsite. While the process of loading large data sets into the cloud may seem ambitious and cumbersome, cloud import processes can significantly reduce the time requirements as well as the potential network impact. An import process that follows best practices around security can provide a rapid data upload with the appropriate level of security that your corporate data demands. Industry Perspectives is a content channel at Data Center Knowledge highlighting thought leadership in the data center arena. See our guidelines and submission process for information on participating. View previously published Industry Perspectives in our Knowledge Library.
<urn:uuid:0e2b8898-8ba6-4d58-bc83-68fffc03fb99>
CC-MAIN-2015-35
http://www.datacenterknowledge.com/archives/2013/12/04/move-bigger-data-cloud/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.917483
761
2
2
Data collected as part of the overall mission of the Hipparcos satellite; it represents a catalogue of position, parallax, proper motion, and magnitude data collected for over one million stars. In most cases, its precision is much greater than all earlier catalogues. About the only case in which the Tycho data would be ignored would be if Hipparcos data (see Hipparcos Catalogue) is available instead. The Tycho data is essentially a survey of all stars that were bright enough to be measured by the detector, and is essentially complete to about magnitude 10.5, with somewhat incomplete coverage to magnitude 11 or 11.5. Related category ASTRONOMICAL CATALOGS Home • About • Copyright © The Worlds of David Darling • Encyclopedia of Alternative Energy • Contact
<urn:uuid:030bd86a-1a3f-43c0-ba6d-6b0ece80d337>
CC-MAIN-2015-35
http://www.daviddarling.info/encyclopedia/T/Tycho_Catalogue.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.909877
162
2.859375
3
Definitions for Aluminuməˈlu mə nəm This page provides all possible meanings and translations of the word Aluminum aluminum, aluminium, Al, atomic number 13(noun) a silvery ductile metallic element found primarily in bauxite The metallic element forming the base of alumina. This metal is white, but with a bluish tinge, and is remarkable for its resistance to oxidation, and for its lightness, having a specific gravity of about 2.6. Atomic weight 27.08. Symbol Al. Also called aluminium. A metallic chemical element (symbol Al) with an atomic number of 13. The Aluminum was an American automobile built by the Aluminum Manufacturers, Inc. of Cleveland, from 1920 to 1922. The car was manufactured primarily as an experiment, in an attempt to prove that aluminum could be used in the construction of automobiles. Six cars were built; each was a five-passenger touring car weighing 2400 lb and featuring a 126-inch wheelbase and a four-cylinder Alcoa engine. In 1922 Pierce-Arrow became involved in the company, and all cars built after that point were constructed under Pierce-Arrow's aegis and bore the name Pomeroy. U.S. National Library of Medicine A metallic element that has the atomic number 13, atomic symbol Al, and atomic weight 26.98. Translations for Aluminum From our Multilingual Translation Dictionary Get even more translations for Aluminum » Find a translation for the Aluminum definition in other languages: Select another language:
<urn:uuid:9b11f462-7b6e-4cfe-8f1a-73a5bf7caa3d>
CC-MAIN-2015-35
http://www.definitions.net/definition/Aluminum
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.869777
327
3.359375
3
Definitions for clinkklɪŋk This page provides all possible meanings and translations of the word clink chink, click, clink(noun) a short light metallic sound jail, jailhouse, gaol, clink, slammer, poky, pokey(verb) a correctional institution used to detain persons who are in the lawful custody of the government (either accused persons awaiting trial or convicted persons serving a sentence) make a high sound typical of glass "champagne glasses clinked to make a toast" tinkle, tink, clink, chink(verb) make or emit a high sound The sound of metal on metal, or glass on glass. You could hear the clink of the glasses from the next room. Jail or prison, after the Clink prison in Southwark, London. Used in the phrase in the clink. If he keeps doing things like that, heu2019s sure to end up in the clink. Stress cracks produced in metal ingots as they cool after being cast. To make a clinking sound; to make a sound of metal on metal or glass on glass; to strike materials such as metal or glass against one another. The hammers clinked on the stone all night. Origin: as metal against metal. to cause to give out a slight, sharp, tinkling, sound, as by striking metallic or other sonorous bodies together to give out a slight, sharp, tinkling sound to rhyme. [Humorous] a slight, sharp, tinkling sound, made by the collision of sonorous bodies Origin: [OE. clinken; akin to G. klingen, D. klinken, SW. klinga, Dan. klinge; prob. of imitative origin. Cf. Clank, Clench, Click, v. i.] Translations for clink From our Multilingual Translation Dictionary Get even more translations for clink » Find a translation for the clink definition in other languages: Select another language:
<urn:uuid:d94dfe0e-2305-4242-9790-15f7279fe3e9>
CC-MAIN-2015-35
http://www.definitions.net/definition/clink
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.781894
448
2.875
3
Definitions for one-man This page provides all possible meanings and translations of the word one-man one-man(a), one-person(a), one-woman(a)(adj) designed for or restricted to a single person "a one-man show"; "a one-person tent"; "Sarah Silverman's hilarious one-woman show" Find a translation for the one-man definition in other languages: Select another language:
<urn:uuid:77ca6690-82df-42f2-afad-bbbde16d13a4>
CC-MAIN-2015-35
http://www.definitions.net/definition/one-man
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.845803
96
2
2
Definitions for percutaneousˌpɜr kyuˈteɪ ni əs This page provides all possible meanings and translations of the word percutaneous transdermal, transdermic, percutaneous, transcutaneous(adj) through the unbroken skin; refers to medications applied directly to the skin (creams or ointments) or in time-release forms (skin patches) "transdermal estrogen"; "percutaneous absorption" Taking place through the skin In surgery, percutaneous pertains to any medical procedure where access to inner organs or other tissue is done via needle-puncture of the skin, rather than by using an "open" approach where inner organs or tissue are exposed. The percutaneous approach is commonly used in vascular procedures. This involves a needle catheter getting access to a blood vessel, followed by the introduction of a wire through the lumen of the needle. It is over this wire that other catheters can be placed into the blood vessel. This technique is known as the modified Seldinger technique. More generally, "percutaneous", via its Latin roots means, 'by way of the skin'. An example would be percutaneous drug absorption from topical medications. More often, percutaneous is typically used in reference to placement of medical devices using a needle stick approach. In general, percutaneous refers to the access modality of a medical procedure, whereby a medical device is introduced into a patient's blood vessel via a needle stick. This is commonly known as the Seldinger technique named after Dr. Sven Ivar Seldinger. The technique involves placing a needle through the skin and into a blood vessel, such as an artery or vein, until bleedback is achieved. This is followed by introduction of a flexible "introducer guide wire" to define the pathway through the skin and into the passageway or "lumen" of the blood vessel. The needle is then exchanged for an "introducer sheath" which is a small tube that is advanced over the introducer guide wire and into the blood vessel. The introducer guide wire is removed, and exchanged for a catheter or other medical device to be used to deliver medication or implantation of a medical implant such as a filter or a stent into the blood vessel. Translations for percutaneous From our Multilingual Translation Dictionary Get even more translations for percutaneous » Find a translation for the percutaneous definition in other languages: Select another language: Discuss these percutaneous definitions with the community: Word of the Day Would you like us to send you a FREE new word definition delivered to your inbox daily? Use the citation below to add this definition to your bibliography: "percutaneous." Definitions.net. STANDS4 LLC, 2015. Web. 4 Sep. 2015. <http://www.definitions.net/definition/percutaneous>.
<urn:uuid:70f4776d-e036-42f1-ab24-3ed848cba235>
CC-MAIN-2015-35
http://www.definitions.net/definition/percutaneous
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.88306
614
2.46875
2
This weekend the nation commemorates the 4th of July, the day American colonies declared their Independence from England in 1776. While many Americans will hang flags, participate in parades, and watch fireworks, Independence Day is not a cause for celebration to all. One of the most powerful voices of the abolition movement was Frederick Douglass. He was born a slave in Maryland in 1818. As a young boy Douglass was taught to read by Slaveholder Sophia Auld. It was a dangerous and radical act that changed his destiny. Douglass escaped from slavery in the1830s and became a leader in the growing campaign against slavery, through lectures and his anti-slavery newspaper, ??The North Star. On July 4th, 1852, Douglass delivered one of his most powerful speeches against slavery in Rochester, New York. - Dramatic reading of Frederick Douglass’s 4th of July Oration. Read by Bernard White of Pacifica station WBAI in New York. Recent Shows More The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions,
<urn:uuid:6c3df7c1-a6c2-487e-bb46-83b0d478662b>
CC-MAIN-2015-35
http://www.democracynow.org/1998/7/3/remembering_frederick_douglass_during_independence_day
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.962878
278
3.765625
4
House Passes Worker Protection Against Combustible Dust Explosion and Fire Act The House has just passed the Worker Protection Against Combustible Dust Explosion and Fire Act, H.R. 5522 by a vote of 247-165. This bill would require the U.S. Occupational Safety and Health Administration to issue rules regulating combustible industrial dusts, like sugar dust, that can build up to hazardous levels and explode. In early February the Imperial Sugar refinery in Port Wentworth, Georgia, exploded, killing 13 workers and severely injuring many more. OSHA and the U.S. Chemical Safety Board, which have launched a major investigation into the Imperial Sugar explosion, have concluded that the explosion was caused by combustible sugar dust. In 2006, following a series of fatal combustible dust explosions, the U.S. Chemical Safety Board conducted a major study of combustible dust hazards. It identified 281 combustible dust incidents between 1980 and 2005 that killed 119 workers, injured 718 others, and extensively damaged industrial facilities. OSHA has known about these dangers for years, but has failed to act. Even after the Chemical Safety Board urged OSHA in 2006 to issue rules controlling dust hazards, OSHA has never offered any indication that it is planning to issue such rules without being required to do so by law. |Tammy Miser: “Shawn's back was towards the furnace when they were picking up their tools and there was a blast. Some say Shawn got up and started walking towards the door and then there was a second, more intense blast. Shawn didn't die instantly. He laid on building floor while the aluminum dust burnt through his flesh and muscle tissue. The breaths that he took burnt his internal organs, and the blast took his eyesight. Shawn was still conscious and asking for help… And the two things that I can always remember and that never leave are his last words, ‘I’m in a world of hurt,’ and his last breaths.” Education and Labor Chairman George Miller spoke against the Republican motion to recommit, which would have effectively gutted the legislation: |Chairman Miller: “These workers in this critical industry are entitled to this protection. And the facts on the ground are, the last time we put a standard was for the food and grain industry and it has turned out to be wildly successful. Why is it wildly successful? Because injuries went down 40%. Fatalities went down 60%. Explosions went down 60%. Don’t you think we know enough now to think that these other workers in this industry are entitled to this protection? But OSHA has done nothing. OSHA has done nothing. And if OSHA is not going to act, we must… We ought to oppose this motion to recommit in the name of the workers, in the name of their families, in the name of our nation we owe to them to protect these workers.”|
<urn:uuid:a9e725df-688d-49cc-85fa-d5082c136595>
CC-MAIN-2015-35
http://www.democraticleader.gov/newsroom/house-passes-worker-protection-against-combustible-dust-explosion-and-fire-act/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.975328
598
2.421875
2
Intraoral Autogenous Block Onlay Bone Grafting for ExtensiveReconstruction of Atrophic Maxillary Alveolar Ridges Devorah Schwartz-Arad, DMD, PhD;Liran Levin Laser-Assisted Flapless Crown Lengthening: A Case Series In medicine, and to a lesser extent in dentistry, evolving technologies have served to expand the indications for minimally invasive procedures. In dentistry, lasers, although currently less integral to advances in minimally invasive procedures, are nevertheless evolving as potentially effective adjunctive tools within the therapeutic arena. Adhesive Dentistry: Materials & Techniques Simplified The Interproximal Height of Bone as a Prognostic Guide to Esthetic Tooth Replacement Predictable interproximal soft tissue dimensions measured from the most coronal IHB (note: measurements rounded to nearest half millimeter for clinical relevance and utilization). Replicating Nature - When Nature Has Been Compromised - Part 3 Dr. Cherilyn Sheets and Dr. Jacinthe Paquette outline the utilization of provisional restorations as a blueprint for the final restoration. Smile Design and The Bonded Functional Esthetic Prototype (BFEP) The lecture will cover some simple Photoshop techniques to enhance a smile digitally to present to the patient and motivate them to accept treatment. Minimizing Post-Operative Sensitivity - Part 2 of 2 In this presentation we will look at the most common causes of Post-operative sensitivity following adhesive restorative procedures and how to minimize them. Indications of In-Office Treatments: Topical Fluoride, Varnish, Foam and Gels A study conducted in the 1990s, demonstrated a steady rate of decline of instances of coronal caries through the 1980s. This decline was attributed to an increase in oral health education regarding diet, oral hygiene and an increased awareness about the benefits of applying fluoride-containing topical treatments such as dental sealants varnishes, foams, or gels to the teeth of individuals of all ages in moderate-to-high risk groups for caries. This presentation reviews the history, efficacy, and indications. You will learn the history of all varnishes, differences in fluoride foams and gels as well as which fluorides work best for different patients and practices. The Smile Design Revolution - Management, Communication and Implementation Treatment planning a full mouth rehabilitation is amazingly challenging. So many options and steps must be coordinated and controlled to achieve a successful outcome. Developing the Smile Design is just the starting point. Carefully integrating this design to function is the key. This presentation will show how this process is a complex brainstorm that needs to be guided by logical and rational steps to achieve consistent and predictable solutions. Digital Dentures: Revolutionizing Treatment for the Edentulous Patient While the number of edentulous patients is increasing every year, the access to care is decreasing. In order to streamline the complete denture process, more companies are incorporating CAD/CAM. This lecture will review how digital technology is changing complete dentures, and how it can be incorporated into clinical practice. To view this dental publication or article, you must be a registered user of Dental XP. If you are already a member, click here to login.Registration is free and only takes several minutes. Dental XP will never spam you, or sell your information.
<urn:uuid:c9ccca95-0e28-4caa-9c1a-ec0994121944>
CC-MAIN-2015-35
http://www.dentalxp.com/article/intraoral-autogenous-block-onlay-bone-1051268.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.890186
701
1.640625
2
Dental Student Research Program Erica Recker (D2) presented "A Student Perspective: Research & Student Life in the College of Dentistry" during a November 22, 2014 pre-football game luncheon hosted by UI President Sally Mason. She discussed her research project, Dental Student Research Group, and all of the student organizations available at the UI College of Dentistry. The goals of the Dental Student Research Program are to expose and involve highly qualified dental students to dental, oral and craniofacial research so as to 1) instill critical thinking through research experience; 2) assist faculty research and support the scholarly mission of the college; 3) encourage students to consider dental academics and research as career options As a part of this program we hope to 1) stimulate student interest and participation in oral health research which is not currently available in the general dental curriculum and 2) foster collaboration between student trainees and faculty mentors and encourage the trainees to become involved in the design, conduct and reporting of research. The Program's specific training objectives include: Acquiring detailed knowledge of an area of research using contemporary methods for literature searching and data mining; Instruction in study design; involving development of a hypothesis, planning of experiments, and incorporation of appropriate statistical analysis; Acquisition of specific laboratory research skills as appropriate to the investigation; Learning how to prepare and communicate information to the scientific community; and Achieving a sense of identification with the scientific community through participation in such activities as local, regional, and national research meetings.
<urn:uuid:051e9b68-94cd-4475-aed9-e13bc5839782>
CC-MAIN-2015-35
http://www.dentistry.uiowa.edu/student-research-mission
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.932756
317
2.09375
2
In Focus: CASNR Texas Tech University Press News Texas Tech Trivia Book On Sale Now! “Tech Trivia” is the perfect gift for any Red Raider. It includes interesting facts about all facets of the university, including academics, athletics and student life. Excerpts from Tech Trivia... The Masked Rider became a reality in 1936 and was initially called a Ghost Rider. The legendary coach Paul “Bear” Bryant suffered the worst defeat of his career in 1954 when his Texas A&M Aggies lost to Texas Tech 41-9. Texas Tech’s campus is the nation’s second largest campus at 1,839 acres. Author W.F. “Bill” Bennett worked as a Texas Tech soil scientist for 30 years. He loves Lubbock and says it was a perfect place for him and his family. Bennett has seen many members of his family graduate from Texas Tech, which is one of the many reasons he felt obligated to write “Tech Trivia.” A portion of the proceeds from the sales of “Tech Trivia” will help to support Texas Tech.
<urn:uuid:a8900017-6af7-4abb-9a11-7f45a047997a>
CC-MAIN-2015-35
http://www.depts.ttu.edu/communications/newsletter/stories/08June/tech-trivia-book.php
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.97351
241
1.671875
2
Sharp Systems of America has come out with the Actius RD3D notebook computer, which uses the company's TFT 3D LCD technology in a 15-inch screen and switches between 3D to 2D viewing. Engineers achieved the 3D effect by dividing the light from the LCD in different patterns and directing the different images to the left and right eyes. Viewers see the image in 3D when it is centered in front of the display. For more info, go to www.sharp3d.com. Fifty-six-year-old Pasquale Russo has been doing metalwork for more than 30 years in a tiny southern Italy village. Many craftsmen like him brought with them fabrication skills when they came from the Old World to America. Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
<urn:uuid:988e9ba2-2d82-4213-9db5-96fa9d8f6915>
CC-MAIN-2015-35
http://www.designnews.com/document.asp?doc_id=215783
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.95732
213
1.765625
2
Fight child abuse with love Child abuse has grown to 3 million reported cases a year. Even scarier is that between 1985 and 1993 cases of children being abused by their parents skyrocketed by 50 percent. Kids tend to be quiet about abuse when they are younger, not knowing how to deal with this situation. When somebody fully does not know how to get out of a situation, especially with family being involved, some tend to take their life in an attempt to end their suffering and find peace. Now ask yourself, "How can we stop this, effectively and precisely?" First let's look at the three steps of the beginning. Make sure your kid is always safe, and in good hands. Next, praise them to be healthy, so they feel good about themselves and feel great about life. Last and most importantly, nurture your child. Give them all the wonderful aspects in life, and make them feel loved.
<urn:uuid:d0e3ebba-5c22-4caa-92ae-5a3cf2d43fba>
CC-MAIN-2015-35
http://www.desotoexplorer.com/news/2007/may/24/fight_child_abuse/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.976231
186
1.828125
2
I am working on a program that uses XML for data archival. This data archive creates XML files in the multi-megabyte range (5 MB - 500 MB and greater). The problem is that the Microsoft XML parser loads the entire file into memory (using virtual memory) until the system crashes. What is the best way to use large files and data sets with XML? This issue has become somewhat contentious for developers working with the Microsoft DOM, and I suspect it's on the top of the "things to fix" in their queue of bugs. The problem of working with large documents is commonunfortunately, the answers aren't. However, I can suggest a couple of different routes. Take a good hard look at your schema, and see if you can decompose your XML into some form of an object model. For example, you may have a structure that looks something like this: For compression sake, I haven't shown the other 4923 employees in this XML structure, but you can readily imagine that they are there, and this large amount of data will cause the parser to crash. However, this particular structure can readily be decomposed into an object model with three object classes (company, division, and employee) and two collection classes (divisions and employees). An object class can in turn be thought of as a container of both properties (leaf nodes) and collections (group nodes) while a collection class itself only contains object classes as children (although obviously it can be a grandparent to one or more collections). The advantage to such a decomposition is that you can use a collection node as an alias into subordinate XML documents. For example, you could modify the previous structures so that the employees collection nodes point to specific files: You could similarly decompose the into separate files, which in turn would contain the decomposed employees (I don't really want to think about what I just wrote). Once you have your resources linked, you do have to do a little more work in manipulating it. For example, if you were trying to do a company-wide survey to find out who makes more than $100,000 a year, you couldn't just use the .selectNodes() function. However, you could emulate it with some work. The ExtendedQuery function shows one approach for doing just that (this code is written in Visual Basic, but you can convert it to VBS by removing the As XXX keywords: function ExtendedQuery(primaryNode as IXMLDOMElement,queryStr as String) as DOMDocument dim colXML as DOMDocument dim tempXML as DOMDocument dim queryStrArray as Variant dim queryMain as String dim querySub as String dim src as String for each superNode in primaryNode.selectNodes(queryMain) if not isNull(src) then if src<>"" then for each subNode in tempXML.documentElement.selectNodes(querySub) This function works by taking a slightly modified XSL query stringa pound sign (#) is inserted after the node name where the link occurs. For example, to get those workers who make more than $100,000 dollars, you'd use the expression: set newDoc=ExtendedQuery(xmlDoc,"//employees#employee[salary $gt% 100000]") The function splits the query string into two parts, and uses the left part to query the primary node and return all pointers that satisfy the query. Then it retrieves the filename of each collection, loads that collection into memory, applies the secondary query to it, and copies all valid nodes (and sub-nodes) into an interim XML document. If you just wanted to get those employees in research that satisfy the criterion, you'd use the same query syntax you normally would, with the # exception: set newDoc=ExtendedQuery(xmlDoc,"//division[name = 'Research']/employees@employee[salary $gt$ 100000]") It's worth noting some important but subtle points here. The query returns an entirely new document that maintains its own internal pointers, not simply a collection of XML node pointers (which is essentially what a nodelist is). In other words, the document that's returned does not contain any references to the document that called it in the first place. Because you're dealing with a new entity, this object will also be slower than querying using the selectNodesboth because a number of XML files will need to get loaded and because nodes are themselves copies, rather than just their pointers being copied. Also, the previous code applies only to one level of indirectionI leave it as an exercise to extend this to multiple levels, although it's not terribly complex (hint: use recursion). There is a trade-off here, however. What you are doing is trading memory management for timethe deeper you go, the longer the query will take, on an exponential basis. Too many levels of indirection will make the query come to a crawl. Additionally, you haven't completely eliminated the possibility of maxing out memory. If you perform a general query requesting all employees ("//employees#*") and you have 5000 employees, you will still have an XML tree that will push the bounds of memory. One final piece of advice on this topic: The src does not necessarily need to be an XML file explicitly. It could be a parameterized out-of-proc (exe) server, or an Active Server Page (ASP) talking via ActiveX Data Objects (ADO) to a SQL Server database, so long as the output of the process is a valid XML stream. One variation of this schema is to create an intermediate index XML file that would contain a link between a shortcut name and a file referencethat way, you wouldn't even need to explicitly hardcode the links in the master document. This is a common strategy when working with SGML (Standard Generalized Markup Language) documents that support inline interpolation of elements.
<urn:uuid:46d1dfa8-6c11-48b6-b792-da4f3f0884a3>
CC-MAIN-2015-35
http://www.devx.com/tips/Tip/25104
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.895704
1,245
1.882813
2
London Zoo wants to redesign the City’s iconic Gherkin so it resembles a penguin. The unlikely-sounding plan is part of promotional campaign for the Zoo's penguins. ZSL London Zoo commissioned a production team to draw up a dramatic redesign of the famed skyscraper to remind visitors to the capital not to miss their penguins in 2012. London Zoo says it plans to 'approach city bigwigs with the bold concept of turning the prominent Swiss Re Building – more commonly known as The Gherkin – into a giant penguin'. We think there's more chance of a Humboldt penguin learning to fly (or tapdance) than there is of this becoming a reality – but it's a nice promo campaign nonetheless. You can watch the real penguins through London Zoo's penguin webcam.
<urn:uuid:1465d0c0-8d2b-49c8-96a9-2ce5493be101>
CC-MAIN-2015-35
http://www.digitalartsonline.co.uk/news/creative-lifestyle/london-zoo-wants-turn-citys-iconic-gherkin-building-into-penguin/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.925159
171
1.75
2
Verizon is getting the iPhone on Feb. 10 and AT&T is nervous as hell. In a desperate attempt to make itself look good, the wireless carrier is shooting out e-mails to its existing customers, reminding them of the one known advantage AT&T has over Verizon: talking while using data. The ad (seen above) shows a woman talking on the phone while searching for movie tickets on Fandango, reports Gear Live. The woman is using Bluetooth, since having a headset (or using the speakerphone) is the only scenario where you could feasibly attempt such a multitask on any network. AT&T began this line of attack ads in late 2009, when it and Verizon were trading blows over 3G coverage. Luke Wilson starred in the original commercials. The claim is still relevant, but talking and browsing simultaneously isn’t an activity that people do very often. AT&T customers who are switching to Verizon are likely doing so because AT&T’s service is spotty and inconsistent in their town or home. From the anecdotal evidence we’ve gathered, Verizon’s CDMA network excels at having coverage in areas where AT&T’s GSM performance suffers. However, entering the 4G era, this argument is irrelevant. Both Verizon and AT&T are implementing and launching 4G networks using LTE technology, and both will be capable of browsing and talking at the same time. Is browsing while talking a feature that means something to you?
<urn:uuid:2183b823-0289-4ea5-a49e-617810d0352e>
CC-MAIN-2015-35
http://www.digitaltrends.com/mobile/att-ads-tout-last-advantage-over-verizon-iphone-talking-while-browsing/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.947343
307
1.523438
2
Warning: To complete electrical works you must comply with Electrical Regulations - Click here for more information. Please also see our project on the New Wiring and Cable Colours. Relax!!! This problem does not mean you have a major wiring fault. This is a never ending problem which has been looked into for donkeys years. A wiring fault in your circuit will be picked up by fuses and MCB's long before it gets to the bulb. What can Cause a Bulb to Blow? There are a few reasons bulbs can blow, the major one being cheaper bulbs. The elements in cheap bulbs are much thinner and any surge of power, however slight, simply breaks them. Always go for more expensive, better quality light bulbs, its cheaper in the long run. A loose connection in the lamp holder can also cause bulbs to blow. This is because the circuit is not completed as tightly as it could be and the electricity may have cause to "arc" or jump across the contact, rather than simply flowing through it. When this happens it produces more heat in the fitting than is expected or catered for by the bulb, and the bulb can blow. The same can happen if the spring loaded connection in the bulb holder is slightly loose. This will cause electricity to arc across the contact, cause too much heat and blow the bulb. This can very often be diagnosed by looking at the contact on the bottom of the bulb to see if it is pitted. Arcing electricity effectively melts the metal it is arcing onto ( This is how arc welding works) so if the bulb contact is being subjected to arcing, tiny little indentations occur, called pitting. It is sometimes possible, if the live connection in your light switch is a little loose, for this to happen here also. Heat will be generated and it is possible, though very very remote, for the bulb to blow as a result of this. What happens When a Bulb Blows? When a bulb blows, 99% of the time the fuse for the lighting circuit will blow or trip also. This makes the problem seem rather bigger than it actually is. The reason for a blowing lamp tripping an MCB is that the lamp element gets thinner during its life to the point where it breaks at the thinnest point, this point will melt just before failure. The resistance of the overheating element will momentarily be very low and a current surge is caused, this is picked up by MCB's but generally not fuses. Blowing Bulb Checklist So, three things to look into if your bulbs keep blowing: - Your bulb supplier - The wire connections inside your bulb holder - If the spring loaded connectors are working properly inside the bulb holder As a last resort you can also check the tightness of the connections in your switch. As mentioned above, make sure you have turned the power off before you do any maintenance whatever. Read our projects on electrical safety and Part P building Regulations. Be careful out there ! This was also sent in by one of our users, N.J. Stainton 99% of the time tungsten fillamented bulbs have their own fuses built into the stem. these nearly always blow as the lamp fails, usually saving the main fuse. The reason stated, although possible, is not common. What usually occurs is at the point of the filament failing (usually at switch on), an expanding arc occurs, melting back the filament as it goes. The arc's ionised low impedance path allowing more current to flow, the remaining parts of filament soon devoured by the extra heat and current ,until , usually around 1 second later, the arc bridges both supply "arms". THIS is when the fuse(s) in the stem of the bulb fuse. A further comment from another user, Chris Riley There is a situation where "Blowing Light Bulbs" is not fairly immediate, but where the life of the lamp does not meet a customers expectation of a nominal 1000 hours burning. This is a grey area also described as "my light bulbs keep blowing" by people. Articles and letters in a Professional publication over the years (when 240volts was rated standard) have indicated that: - An increase of 5% above the rated voltage of a light bulb reduces its life by 50%. - Mounting a lamp with base down and bulb upper reduced life by 50%. I have no references to whatever research, but trust the knowledge of members of an Engineering Institution.Now, those living close to an Electricity Substation will receive a voltage higher than the nominal, so that those furthest away still have a proper supply. So we can have: - a. Reduce your 1000 hour lamp burning expectancy by 50% to 500hours. - b. Maybe reduce your 500 hour lamp expectancy for your base down wall lights to 250 hours. To complicate matters further, I have tried the "lifetime guarantee" light bulbs (recently with 10 year guarantee). Two blew at switch on!!
<urn:uuid:cf3b74e2-5d73-402a-9b7b-dec37af83231>
CC-MAIN-2015-35
http://www.diydoctor.org.uk/projects/bulbs.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.948623
1,032
3.0625
3
Chaotic terrain in Ariadnes Colles 24 April 2009 Chaotic terrain in Ariadnes Colles Ariadnes Colles ortho-image Ariadnes Colles, perspective view The High Resolution Stereo Camera on board Mars Express, operated by the German Aerospace Center (Deutsches Zentrum für Luft- und Raumfahrt; DLR), took images which show the region of Ariadnes Colles on the Red Planet. The image data was acquired on 16 April 2007 in the region of Ariadnes Colles that lies at about 34° south and 172° east. The ground resolution is about 13 m/pixel. Mars exhibits numerous 'chaotic terrains'. These are areas with an apparently inordinate accumulation of rocks of varying sizes and flat-topped features. Ariadnes Colles is one such chaotic terrain located in the southern highlands of Mars. It covers an area of 180 x 160 sq km, roughly half the size of Estonia. The HRSC images show the northwestern part of the region. Ariadnes Colles, annotated nadir view Ariadnes Colles, nadir view Most of the area pictured is dominated by erratically shaped rocks that are 1-10 km in size (1). These are lighter in colour compared to their surroundings. Some larger blocks appear similar to mesa, a flat-topped natural elevation, and can reach a height of 300 m (7). A striking lineation on the surface of the blocks (visible upon zooming in) (2) is oriented in the northwest-southeast direction. The northwestern flanks have been eroded more strongly than the opposing southeastern flanks. Wrinkle ridges, which form as a result of tectonic compression, are visible in the southwestern part (3). These ridges mark the western boundary of Ariadnes Colles. In contrast to other chaotic terrains such as Iani Chaos, Adrianes Colles is not a water source region. This is why it is still debated whether Ariadnes Colles formed by the action of water or wind. Ariadnes Colles in 3D The darker material in the southern parts is most likely sand or volcanic ash; some slopes of the flat-topped features have been covered by this dark material that was blown up on the slopes (4). Ariadnes Colles context map A large impact crater, 1200 m deep, is visible on the right (6). It shows a smaller crater superimposed on it. The larger crater is about 30 km in diameter and covers an area roughly the size of Hamburg. The smaller younger crater lies almost at the centre of the older one, and has a diameter of just 10 km. The colour scenes have been derived from the three HRSC-colour channels and the nadir channel. The perspective views have been calculated from the digital terrain model derived from the stereo channels. The anaglyph image was calculated from the nadir and one stereo channel. The black and white high-resolution images were derived from the nadir channel which provides the highest detail of all channels. The High Resolution Stereo Camera (HRSC) experiment on the ESA Mars Express Mission is led by the Principal Investigator (PI) Prof. Dr. Gerhard Neukum who also designed the camera technically. The science team of the experiment consists of 45 Co-Investigators from 32 institutions and 10 nations. The camera was developed at the German Aerospace Center (DLR) under the leadership of the PI G. Neukum and built in cooperation with industrial partners (EADS Astrium, Lewicki Microelectronic GmbH and Jena-Optronik GmbH). The experiment on Mars Express is operated by the DLR Institute of Planetary Research, through ESA/ESOC. The systematic processing of the HRSC image data is carried out at DLR. The scenes shown here were processed by the PI-group at the Institute for Geosciences of the Freie Universitaet Berlin in cooperation with the German Aerospace Center (DLR), Institute of Planetary Research, Berlin.
<urn:uuid:74f7fec8-62fa-4127-90e7-a721316c8a01>
CC-MAIN-2015-35
http://www.dlr.de/mars/en/desktopdefault.aspx/tabid-5109/8603_read-17066/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.929863
857
2.71875
3
JACKSON HEIGHTS — Officials are trying to put the brakes on speeders by lowering the speed limits on two major roads in the coming months, part of the city's latest push to decrease pedestrian injuries and fatalities. The Department of Transportation announced 14 thoroughfares around the city will be part of the second phase of its arterial slow zone program, including more than five miles of Metropolitan Avenue in Queens and most of Roosevelt Avenue. "Slow zones are a critical and widely endorsed element of Vision Zero,” said DOT Commissioner Polly Trottenberg. Streets in the slow zone program will have their speed limit lowered by 5 mph to 25 mph and there will be new signage installed. The NYPD will also implement increased enforcement of speed limits. There were five fatalities on the 5.8 mile stretch of Roosevelt Avenue from 2008 and 2012, between Queens Boulevard and 154th Street, according to the DOT. There the new rules will be implemented in September. The 5.6 mile stretch of Metropolitan Avenue, from Onderdonk Avenue to 132nd Street, saw six fatalities, and the new slow zone there will be implemented in December. Earlier this year, the city created slow zones on four major roads in Queens — Jamaica Avenue, Northern Boulevard, Queens Boulevard and Rockaway Boulevard.
<urn:uuid:25a10876-117b-412b-9b94-42e3f9bf7abe>
CC-MAIN-2015-35
http://www.dnainfo.com/new-york/20140804/jackson-heights/speed-limit-on-roosevelt-metropolitan-avenues-be-lowered-25-mph
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.941349
263
1.75
2
Volume 2 Issue 7 - April 01, 2004 Disabled seek political space DNIS News Network - In an unprecedented show of strength, India's physically challenged people came out of their shell on March 20 and demanded their share of attention from political parties by, for starters, including their needs in election manifestos. The landmark event was a 'National convention on political rights of disabled people' at FICCI auditorium, Delhi, convened by the Disabled Rights Group. In order to make political parties realise the seriousness of their needs, around 700 people from 17 states of India came together in Delhi and submitted their Charter of Demands to the BJP and the CPI (M). The Congress was hugely conspicuous by its absence. A demand for the reconstitution of the National Disability Commission to include disabled people in prominent positions, along with an immediate revision of the identified job list for disabled people, are listed in the charter. DNIS is produced and managed by: National Centre for Promotion of Employment for Disabled People Screening Guidelines to be followed by CISF Security Staff for Passengers with Disabilities at Indian Airports Rights of Persons with Disabilities Bill Mental Health Care Bill CRPD Monitoring Report - List of Awardees 2015 :NCPEDP MPHASIS Universal Design Awards (2.7 MB) - List of Awardees 2014 :NCPEDP MPHASIS Universal Design Awards (1 MB) - List of Awardees 2013 :NCPEDP MPHASIS Universal Design Awards (1.44 MB) - List of Awardees 2012 :NCPEDP MPHASIS Universal Design Awards (804 KB) - List of Awardees 2011 :NCPEDP MPHASIS Universal Design Awards (864 KB) - List of Awardees 2010 :NCPEDP MPHASIS Universal Design Awards (623 KB) SHELL HELEN KELLER AWARDS NCPEDP-Shell Helen Keller Awardees 2013 - Disabled persons too want to vote - Disabled seek political space - Javed Abidi: Candidate for the differently abled - President Kalam urged to make voting disabled-friendly - Visibility in election manifestos - Blind doctor set to practice medicine - SC notice to Centre on care of mentally ill - Disabled passengers' nightmare at domestic airport - HC orders disability pension for Army man sacked in 1964 - Stress on special education Disability News and Information Service is produced and managed by:
<urn:uuid:35122a38-c4cb-4ca7-8673-7c10adb6cb32>
CC-MAIN-2015-35
http://www.dnis.org/news.php?issue_id=7&volume_id=2&news_id=107&i=1&interview_id=
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.914513
512
1.75
2
A Paradise for Outdoor Recreation The COWASEE Basin is rich in wildlife habitat and cultural resources, and its timber and agriculture have contributed to employment and a way of life unique to this area. Outdoor recreation opportunities for hunters, fishermen, hikers, birdwatchers and boaters provide critical revenue for local businesses. To ensure these recreational and financial opportunities for the future, we must act now by working together to promote habitat protection. Tour Guide of the COWASEE Basin (Adobe PDF - file size 5M)
<urn:uuid:29489c6e-011e-4e9c-b12b-35e7f3244ec3>
CC-MAIN-2015-35
http://www.dnr.sc.gov/cowasee/recreation.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.883923
106
1.65625
2
Finding out your dog has cancer, or as we call it in our house “Madge”, is one of the greatest fears pet owners have. If you’re wondering why we call it “Madge”, the answer is simple, doesn’t it sound a lot less intimidating. Plus, I bet it made you smile. I came across an interesting article to help alleviate some fears and/or answer some of your questions. DENVER, July 11, 2008 /PRNewswire via COMTEX/ — Dog owners and lovers in the United States view canine cancer as the greatest health threat to their beloved pets. They are correct. One in four dogs die of cancer. Cancer is the number one cause of death in dogs over the age of 2. Morris Animal Foundation (MAF) has posted on its Web site, http://www.MorrisAnimalFoundation.org, a canine cancer exclusive of special interest to dog owners and dog lovers everywhere. We can also give our support to help fight this disease. MAF has launched an unprecedented global campaign to raise funds to cure canine cancer in the next 10 to 20 years, and while seeking the ultimate cure, to develop more effective treatments for dogs suffering from cancer today. MAF is funding canine cancer research at many of the top veterinary colleges in the world. Learn more about the campaign at http://www.CureCanineCancer.org. If we all put our paws together hopefully we will beat this disease once and for all. Our Most-Commented Stories
<urn:uuid:c533f608-b7a8-4393-bf27-0ed05cc2e4b7>
CC-MAIN-2015-35
http://www.dogster.com/the-scoop/1-fear-of-dog-owners-canine-cancer
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.94423
323
2.1875
2
The IRS is already the administrator of the second-largest anti-poverty program in America. It's about to become the second-largest health regulatory agency in the Federal Government, since they'll be in charge of lots of rules governing who does and doesn't count as a "full time employee" for insurance mandate purposes, computing insurance subsidies for middle class households, monitoring employer-sponsored insurance plans, and so forth. As they ramp up for 2014, they've started issuing hypotheticals estimating the price family insurance plans. One of these hypotheticals assumes that a family of four will end up spending $20,000 on their insurance policy. This is far more than most households can expect to spend. In reality, a family that sized earning less than 400% of the Federal Poverty Line, or $92,200 in 2012, will pay somewhere between $100 and $750 per month for health insurance. That's a big bite -- equal to a car or student loan payment in many cases -- but it's something that households can probably manage. Once again, I've reproduced the incredibly helpful table from the Vermont Health Care Reform Agency of Administration. The UC Berkeley Labor Center also has an Affordable Care Act calculator that might be useful.
<urn:uuid:1ff753cc-152a-4077-8b98-5cb70d6610df>
CC-MAIN-2015-35
http://www.donkeylicious.com/2013/02/health-insurance-is-expensive-but.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.968475
249
1.773438
2
| || | Xanax vs. Lorazepam??? Xanax vs. Lorazepam??? I was recently changed from 1 MG Xanax (taking 3 times a day) Lorazepam 1 MG (taking those 3 times a day) is this equal to Xanax 1 MG? Or a better choice than the Xanaxs in the long run?? Please,can someone help explain this to m? They are comparable doses. The lorazepam has a little longer half life than the xanax and the effects of lorazepam last a little longer than the xanax. The lorazepam would be a little better for anxiety and the xanax would be a little better for actual panic attacks. Hope that helps. God bless. I am not a dr. My statements are based on years of experience and related education. Consult with the professional of your choice regarding matters of concern. The pharmacist told me that the 1 MG Xanax are the SAME as the 1MG Lorazepam...but it doesn't feel the same....? What is the difference? I asked something similar in another post,but I'm still confused. ANY for your help,btw. they are in the same family Ativan (Lorazepam ) and Xanax (alaprolazam) are in the benzodizapine family. They both are used to treat anxiety and the such. Xanax comes in hard and fast and leaves pretty quickly. Ativan comes on a bit slower and and eases in and stays around longer than the xanax. So if a person is trying to control generalized anxiety then ativan is the better med. If a person is having acute panic attacks then xanax would probably be the better med because it hits the system a bit faster and harder. The difference in the way you feel is simply the different nuances of the meds. It's been my experience that ativan doesnt give you that floaty, high kinda feeling right off the bat. However , it is an excellent med for its purpose. Lorazepam vs Xanax Thanks so much for helping me understand,by breaking down like that. Thank you to the others that commented as well.I appreciate any help I can get. Originally Posted by Bobbi1969 I was taking 1 mg of Xanax 3 to 4 times a day for about 2 years...the first couple of months were fine-it worked like it was supposed to. then I started to feel like I never had enough I came to the conclusion I was immune to it so I would just start taking more and more of it to try to get the same effect. but it never worked nothing like that first couple of months I was on it. So then I just kept taken more and more and more and nothing... Everyone states its a very addictive drug and I was full blown addicted to it (not even getting anymore effect from it-so I just thought ill just keep taking more and more to get back there but that never worked) and i didn't even realize it...all I wanted was to feel normal, feel that first original feeling I had when I started my Xanax. The thing with me tho I just point blank stopped it right on the spot. it wasn't working. I didn't experience any side effects or withdrawal. Im now on Lorazpem and I LOVE it....we all know everyone wants some kind of high/feeling from it and I get this all from Lorazpem makes me feel a little goofy but a happy goof with no worries and I love it. Xanax didn't do that at all just put me in never never land every day. I abused Xanax and I don't have to with this drug. By far the best I have been on and its a lot trust me-I am still taking two other meds for depression and OCD. Just over all im doing much better with these 3 (including the lorazepam) then I have even been with the others (Xanax)-I know I rambled on and im sorry but I hope this helps some.... Originally Posted by CareBear84 You're playing with some very serious, potentially dangerous drugs. These are drugs that quickly lend themselves to physical and psychological addiction. If you've already been addicted to one, you are not "safe" taking another. That's just the nature of addiction. Stopping either of these drugs abruptly is one of the few withdrawals that can lead to seizures or death. This is not a risk to take lightly. These drugs have not been evaluated for long-term use. They are not intended for day-to-day life's stressors; they are intended for crisis anxiety situations, for 4 weeks or less. These drugs are numbing your emotions. That means it's numbing both joy and pain; this is an unhealthy crutch to use to deal with anxiety. There are countless other ways to handle anxiety that do not involve such dangerous, addictive medications. Benzodiazepenes (both Xanax and Ativan) slow your respiration and anesthetize your nervous system. Your responses are delayed. Your breathing is affected. If you take more - or take it with another narcotic - you can drift from drugged high to sleep and to a coma all too easily. Generally, many of the drug overdoses you hear about involve one of these benzo drugs and a narcotic. By the way, the reason the effect of xanax lessened is called "tolerance." Our bodies adjust to the presence of the drug, and it loses its effectiveness. The same thing will happen with the lorazepam, as you body learns tolerance from it. If you continue, you'll be chasing this high again and again. Naturally, you are free to do as you please - just know the risks, and think twice before you suggest this drug regimen to anyone else. We do not advise people of how to feel high on this forum. I decided I was going to help myself by quitting, cold turkey, a "cocktail" of prescriptions for Depression, Anxiety, and Adult ADHD. A day later I was in the Emergency Room being monitored by some various serious and concerned medical staff. My blood pressure was so high, I could have had a stroke. My pulse was 120. I was experiencing severe withdrawals. I have never felt so horrible in my life. Originally Posted by ARTIST658 Do not try to play doctor with your prescriptions. There is a reason that they are controlled via prescription. The possibility of serious damage or death is very real. Take care of yourself....
<urn:uuid:58d02bc8-a5e3-48e4-ba7f-397759cbaa05>
CC-MAIN-2015-35
http://www.drugs.com/forum/need-talk/xanax-vs-lorazepam-53234.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.974075
1,389
1.515625
2
Working with Two Surface Apps on One Screen Windows lets you place two apps side by side on your Surface. In fact, it will probably happen when you don't expect it: You click a link that somebody mailed you, and all of a sudden the Mail app shrinks to fill half the screen, and Internet Explorer fills the screen's other half to display the linked page. Windows calls that "snapping an app" because you're snapping one app next to another on the same screen. You can snap Start screen apps next to each other, and you can even snap a Start screen app next to your traditional Windows desktop. To snap an app, follow these steps: Open an app that you'd like to use and snap it to the screen's left or right. Tap an app from the Start menu to open it. When it fills the screen, slide your finger down from the screen's top until the app turns into a small window on a blank screen. Then, drag the app to the screen's left or right side; when a horizontal line appears, lift your finger; the app "snaps" to the closest edge. If you're using a mouse, point at the top of the app and, while holding down the right mouse button, drag the app downward. When the app shrinks, drag it to the left or right side of the screen to snap it into place. Return to the Start screen and open a second app; it snaps to the opposite side of the screen. When you open the second app, it automatically snaps to the empty side of the screen, leaving both apps onscreen. To resize the apps, drag the divider between them. Find the three dots on the line separating the two snapped apps. Then drag those three dots to the left or right side, depending on which app you want to enlarge. To close a snapped app, drag the three dots all the way toward the app you want to close; when your finger reaches the edge, the app disappears from the screen. (It stays running in the background, though, so you can return to it later.) If desired, replace a snapped app with a different one. If you revisit the Start screen and open a third app, that app opens as a small window on top of the other two. Tap the app you don't want, and the hovering third app jumps in to replace it. By opening and snapping apps, dragging the divider between them, and replacing snapped apps with others, you can make the most of the Start screen's formerly full-screen apps. Want to snap an app that's already open? Reveal all of your open apps by sliding your screen in about an inch from the left edge and then back again. A row of thumbnail-sized apps appears, representing your open apps. Drag any of those thumbnails to the screen's left or right edges, and it snaps to that side. You can also snap apps alongside the Windows Desktop app, a handy way to keep an eye on e-mail while working.
<urn:uuid:96eb745c-e9e9-4228-a48c-a29e2d44cd55>
CC-MAIN-2015-35
http://www.dummies.com/how-to/content/working-with-two-surface-apps-on-one-screen.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.919772
628
2.78125
3
Last Modified on Jul 16, 2014 Natural Remedies to Help Terrified Dogs During Thunderstorms For dogs, thunderstorm anxiety (astraphobia) can be almost a given, at least when they're puppies. Fortunately, a few pet care tips can help you get your dog accustomed to the idea of thunderstorms, and even if your adult dog still has a thunderstorm phobia. Homeopathy for dogs is one potential solution. Gelsemium is a great homeopathic remedy for pets that will help to alleviate their fear or uneasiness when they are anticipating a certain type of event. It's great for thunderstorm phobia in dogs, but this treatment can also be used after a frightening experience in those cases where your pet is showing signs of being lethargic or is shaky as a result of what happened, or just for dogs with anxiety in general. Thunderstorm Anxiety Remedies Other home remedies for your dog's storm-related anxiety include a so-called thunder jacket for dogs or thunder shirt, which is simply a snug-fitting garment that "hugs" your pet in a way that calms its anxiety. The concept has clinical acceptance in pets and people too and is similar to swaddling in babies. Flower remedies and soothing scents are among other natural options to soothe and end your dog's thunderstorm phobia. [YEA] I tried everything for my black lab. Nothing seemed to work. I got really concerned for her when I came home from work to find she had dug her way through a bedroom door and was almost through an exterior door. With bloody paws I took her to our vet, who really doesn't like to give drugs if there is an alternative, who told me about Rescue Remedy. He advised that I give her 1 full dropper, because of her size and extreme fear, directly on her tongue at the first indication she is getting fearful. She has been doing this for about a year now and she still doesn't like storms but she tolerates them 1000 times better now. No digging, no wetting herself, no pacing. She will now sit semi-calmly, just panting, beside me. You can get it at GNC, it is definitely worth it. It is really for people and I am told it works great for anyone with a fear of flying too. [YEA] I had a dog that would literally /freak out/ during thunderstorms. She would try to climb on anything and everything. I lost two television sets, many many pieces of sculpture and figurines and the list just goes on and on. Of course, my dog was worth a lot more than all of those combined. A nurse friend recommended The Bach Rescue Remedy. I put it in her water during a thunderstorm and also gave her a drop on her tongue, during the storm. It does not work instantly. This takes time, but over time and I mean years, it does work. She finally got to the point that she would just pant and lie there. Yes, she was still upset, but no way near the way she was before I started giving her Rescue. You only need to use during times of stress, I'm not sure, but I wouldn't use it all the time. Anyway, I'd use it only during the storms. That's what I did, because I would think it doesn't work if you use it all the time. If you know it's going to rain or thunder that day, leave it in the water bowl. Just a drop! Good luck!! [YEA] Like I was thinking with your guy. I would put a leash on him when I heard a storm coming so you could keep him close, and work with him, looking to see what will work. I am positive there is a cure, you may have to figure it out. With Diablo after the fireworks scare, which may have been the start of his fears, but his digestive problems seemed to be a cause, he would react in fear to Something New on Every walk. I mean the strangest things... Flashing lights, loud mufflers, trash cans, a white van, flags or overhead banners flapping, a wire strung from 2 buildings, and if we went under them he would go down to the ground, and each time I would talk to him, or rub him if we were sitting or stopped, but the next walk it would be something new. I was really getting tired of talking and started singing, and was thinking of a button activated tape player or chip like an answering machine has, with my voice recorded, so I could push the button and it would play, since him hearing my voice calmed him. Many have had to get used to all the noises and numbers of people they were seeing in a big city, but it usually didn't take long, and I could desensitize them. My last 2 were spooked by sunlight reflecting off car windshields that would cause a moving reflection inside the room. Me working a flashlight and doing my thing with them cured that fairly fast. A bit harder because they didn't realize that I was causing the light far from me. Believe me, there is always a cure. [YEA] My dog Sampson is a lab/hound mix, who is very afraid of thunderstorms and loud noises, such as fireworks and gun shot. During a thunderstorm, his whole body shakes, he pants, whines and paces from room to room. He tries to hide in closets and the bathtub. I have tried many different remedies, including Dog Appeasing Pheromones. After being up all night trying to calm him down, during a severe thunderstorm, I was at my wits end. I called the vet to ask for tranqulizers. The vet suggested I try giving him Melatonin. I give him one, 3mg Melatonin before a thunderstorm and he sleeps right through it. It is amazing!! Replied by Paula Replied by Worldover [YEA] My dog used to freak out with being in a crate during thunderstorm. This crate was one of the steel types with bars. Solution: got a soft crate - now he does not hurt himself if I am gone out of the house and he happens to be in there with a thunderstorm. [YEA] Swaddling for thunderstorm anxiety: I recently saw an article about a special coat to put on your dog when they are experiencing anxiety due to a thunderstorm. I think it was called ___. I also saw a video on you tube that was pretty impressive with a shivering, trembling dog calming down completely when wearing the coat. I tried it on my dog with a home-made version of it, the original costs about $40. I made my own little thing to wrap around my dogs torso and it fastens tightly with velcro. It really did work to calm her down, but not completely. I need to figure out how to wrap it across her front also, like the ____ coat does. Still, I was impressed with the effect I got. The key is to wrap them up real tight, you could probably even just put a tight t-shirt on them. Replied by Worldover Replied by Jb Replied by Js
<urn:uuid:ee60b30f-be3e-4689-988e-63c84da4a86c>
CC-MAIN-2015-35
http://www.earthclinic.com/pets/thunderstorms.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.984976
1,504
1.617188
2
(NEW YORK) — Lady Gaga is taking her talents to space. Vanity Fair Daily caught up with the “Dope” vocalist at her ArtPop record-release party Sunday and, in an exclusive interview, Gaga confirmed that she will be the first artist to perform in space. “I was asked specifically to sing, so I’m going to be the first recording artist to sing in space, and I did not purchase my flight,” she revealed. “My ticket was given to me. This is a special festival event held by Zero G Colony, and I will be flying to space two months after the first commercial flights take off.” Last week, reports surfaced that the 27-year-old singer would sing a single track in outer spaced during the Zero G Colony musical festival in early 2015. Regarding reports of intense vocal training and alleged wardrobe restrictions for the event, Gaga was less forthcoming. “Well, I have to check out the specs, and I’ll let you know,” she said. Zero G Colony is a three-day high-tech musical event that will take place in New Mexico’s Spaceport America in 2015. Boasting a “galactic music experience,” the festival will feature a fusion of cutting-edge technology with world-class entertainment. Copyright 2013 ABC News Radio
<urn:uuid:c0b5936a-c565-4d4f-b528-ec2ee0c62bec>
CC-MAIN-2015-35
http://www.eastidahonews.com/2013/11/lady-gaga-confirms-concert-in-space-plans/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.969544
283
1.726563
2
East Brother was one of about seventy lighthouses built on the West Coast of the United States in the late 1800s and early 1900s. Its history is linked to these other beacons in many ways. All were built and maintained by the federal government. All responded to similar changes in our culture and technology. And many were cared for by keepers who had worked at other lighthouses as well. In other respects, however, each lighthouse, including East Brother, has its own unique story to tell. Lighthouses help mariners in several ways. Major sea coast lights serve as landfalls for ships arriving from across the ocean. These lighthouses and the smaller lights along the coast and in bays also act as guides for coastal vessels, in some cases warning them of dangerous reefs or shoals. Others mark turning points along the coast or at entrances to bays or harbors. Most also aid mariners as landmarks visible during the day. They are, however, of little help day or night when there is thick fog. In the past many light stations were equipped with a fog signal such as a bell, steam whistle, or steam siren. Today such devices have given way to electronic fog signals and radio beacons. These modern aids and ship-based radar have frequently made lighthouses of secondary importance in navigation. Nevertheless, there is still nothing quite as reassuring as seeing a light, particularly when steering a vessel near shore to enter a harbor or bay. Several events shaped the early history of West Coast lighthouses. These in turn set the stage for construction of later stations such as at East Brother Island. First was the acquisition by the United States of Oregon Territory in 1846 and California in 1848. No lighthouses were built in California under Spain or Mexico. Lighthouses would have been of little benefit since so few ships served the small population in Alta California at that time. There is a report that the Spaniards sometimes hung a lantern on a stake at Ballast Point when a ship was expected at San Diego Bay, but this was hardly a lighthouse. Thus the United States started from scratch in planning a system of lighthouses for the Pacific Coast. Another dramatic event, the discovery of gold in 1848, changed the face of California almost overnight. Hundreds of ships, each filled with hopeful gold-seekers, set sail for the Golden Gate. The gold rush touched off continued immigration which brought growth in agriculture, lumbering, construction and other activities. As cities and towns swelled with activity, so did commerce and shipping. California's population of immigrants grew from less than 15,000 in early 1848 to 223,856 in 1852. By 1870 the state's population had expended to over 560,000. The third significant event in the early development of West Coast lighthouses was the establishment of the Lighthouse Board. This administrative body took over the duties of the fifth auditor of the Treasury Department, who had supervised the nation's lighthouse system from 1820 to 1852. On August 31, 1852, Congress passed an act requiring the President to appoint three high ranking officers from the Navy, three engineers from the Army, and two civilian scientists to constitute the Lighthouse Board. The Secretary of Treasury served as the board's ex-officio president. The diverse makeup of the Lighthouse Board enabled it more easily to administer the varied duties of a growing lighthouse establishment, which included maintaining lightships, buoys, fog signals and other navigational aids. The board intended to improve the quality and dependability of United States lighthouses, bringing them up to the level of those in France, England, and Scotland. The Lighthouse Board held its first meeting October 9, 1852. One of its early tasks was to divide the nation into twelve lighthouse districts. The entire West Coast became the Twelfth District with headquarters in San Francisco. (Later Oregon and Washington were made into the Thirteenth District.) Each district had a Naval officer as an inspector in charge of personnel and daily operations, and an Army engineer to oversee new construction and repairs at the different light stations. The Lighthouse Board planned most of the lighthouses eventually built on the West Coast, but not all. By the time they met, arrangements had already been made to construct the first set of lighthouses here. Earlier, on April 20, 1852, the government contracted with the firm of Francis A. Gibbons and Francis X. Kelly of Baltimore, Maryland, to build eight lighthouses. These were to be constructed at Point Loma near San Diego, Point Conception, Point Pinos near Monterey, Southeast Farallon Island, Battery Point (Fort Point) and Alcatraz Island on San Francisco Bay, and at Humboldt Harbor-all in California. They were also hired to build a lighthouse at Cape Disappointment at the mouth of the Columbia River in what is now Washington. Gibbons and Kelly purchased the bark Oriole, gave her new fittings, and loaded the ship with all materials necessary to build the lighthouses with the exception of stone, which would be quarried near each lighthouse site. The shipload of materials with crew and workmen set sail from Baltimore August 12, 1852, and arrived in San Francisco on January 29, 1953. Gibbons and Kelly agreed to build the eight lighthouses for just $136,000-all that Congress had appropriated. From early on the builders were plagued by unexpected difficulties. Just three months after the Battery Point lighthouse was constructed (but before the lens arrived from France), the Army selected that very site for a fort. The structure was razed before ever being lighted, and eventually a second lighthouse was built. After construction of lighthouses at Battery Point, Alcatraz, Point Pinos, and Southeast Farallon Island, the workmen sailed north to Cape Disappointment. The site was aptly named. Here the Oriole was wrecked and her cargo destroyed. Fortunately, no lives were lost, but work was delayed while replacement materials were purchased. At Point Loma the problems continued. Additional time and materials needed to build a road to the site made the cost nearly double the $15,000 originally budgeted for the job. At Point Conception and Southeast Farallon Island the lighthouses had to be rebuilt because the lenses, when they arrived, were too big to fit. Finally, on June 1, 1854, the Alcatraz Island lighthouse became the first to be lighted on the West Coast. Not until October of 1856 did the last of these first eight lighthouses, Cape Disappointment, go into operation. Each lighthouse was a simple, rectangular, masonry dwelling known as a Cape Cod structure. Most had a circular tower rising from the center, through at several locations the on-site decision was made to offset the tower or detach it from the dwelling. The design was devised by Ammi B. Young, an architect employed by the Treasury Department. By the end of the 1850s eight more lighthouses were built on the West Coast. They were similar in design to the first eight, but were built by local contractors and for even less money than the amount paid to Gibbons and Kelly. The second eight were built at Santa Barbara, Point Bonita, and Crescent City in California, at Umpqua River in Oregon, and at Willapa Bay, Cape Flattery, Smith Island, and New Dungeness in Washington. During the early 1860s, while the nation was preoccupied with the Civil War, no lighthouses were built on the West Coast. In fact, during the war 164 East Coast lights were discontinued and many were badly damaged. By 1866, however, most of these beacons had been repaired and relighted, and the Lighthouse Board again turned its attention to constructing new lighthouses. In the 1850s and 1860s the Pacific's ragged edge devoured numerous ships. The loss of these vessels, their cargo, and many lives underscored the need for additional lighthouses. In California during the late 1860s and early 1870s twelve more lighthouses, many with fog signals, would be constructed-among these East Brother.
<urn:uuid:8a0d27ff-0ff4-4035-abd4-c70c21094e13>
CC-MAIN-2015-35
http://www.ebls.org/west.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.982858
1,682
3.765625
4
Principles of the Theory of Solids by J. M. Ziman Professor Ziman's classic textbook on the theory of solids was first pulished in 1964. This paperback edition is a reprint of the second edition, which was substantially revised and enlarged in 1972. The value and popularity of this textbook is well attested by reviewers' opinions and by the existence of several foreign language editions, including German, Italian, Spanish, Japanese, Polish and Russian. The book gives a clear exposition of the elements of the physics of perfect crystalline solids. In discussing the principles, the author aims to give students an appreciation of the conditions which are necessary for the appearance of the various phenomena. A self-contained mathematical account is given of the simplest model that will demonstrate each principle. A grounding in quantum mechanics and knowledge of elementary facts about solids is assumed. This is therefore a textbook for advanced undergraduates and is also appropriate for graduate courses. Sponsored High Speed Downloads 7488 dl's @ 3999 KB/sPrinciples of the Theory of Solids [Full Version] 6313 dl's @ 2526 KB/sPrinciples of the Theory of Solids - Fast Download 6513 dl's @ 4821 KB/sPrinciples of the Theory of Solids - Direct Download
<urn:uuid:f3c37a23-5d45-4318-92e4-2620c2faafbf>
CC-MAIN-2015-35
http://www.ebooks-share.net/principles-of-the-theory-of-solids/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.919544
267
2.65625
3
An embedded system is a special-purpose system in which the computer is completely encapsulated by the device it controls. Unlike a general-purpose computer, such as a personal computer, an embedded system performs pre-defined tasks, usually with very specific requirements. Since the system is dedicated to a specific task, design engineers can optimize it, reducing the size and cost of the product. Embedded systems are often mass-produced, so the cost savings may be multiplied by millions of items. Some examples of embedded systems include ATMs, cell phones, printers, thermostats, calculators, and videogame consoles. Handheld computers or PDAs are also considered embedded devices because of the nature of their hardware design, even though they are more expandable in software terms. This line of definition continues to blur as devices expand. The field of embedded system research is rich with potential because it combines two factors. First, the system designer usually has control over both the hardware design and the software design, unlike general-purpose computing. Second, embedded systems are built upon a wide range of disciplines, including computer architecture (processor architecture and microarchitecture, memory system design), compiler, scheduler/operating system, and real-time systems. Combining these two factors means that barriers between these fields can be broken down, enabling synergy between multiple fields and resulting in optimizations which are greater than the sum of their parts. One challenge with embedded systems is delivering predictably good performance. Many embedded systems (e.g. anti-lock brakes in a car) have real-time requirements; if computations are not completed before a deadline, the system will fail, possibly injuring the user. Unfortunately, many of the performance enhanceming features which make personal computers so fast also make it difficult to predict their performance accurately. Such features include pipelined and out-of-order instruction execution in the processor, and caches in the memory system. Hence the challenge for real-time system researchers is to develop approaches to design fast systems with easily predicted performance, or to more accurately measure existing complex but fast systems.
<urn:uuid:1299ae87-8bb9-4c54-a059-24d2145a5614>
CC-MAIN-2015-35
http://www.ece.ncsu.edu/research/cas/ecs
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.954126
423
3.796875
4
Comparative Advantage: A Natural Gas Dilemma When the price of natural gas plunged in 2008, manufacturers smiled. As Dow Chemical’s CEO recently explained, cheaper natural gas means a $4 billion investment in 120 new manufacturing projects. Using cheap gas, Dow plans to build ethylene, propylene, chlorine and herbicide plants. They will be producing the chemicals that mattress, toy, plastic packaging and adhesives makers need. But, as one Dow officer said, “You know, we can’t do this without affordable natural gas.” Because affordable US natural gas is more expensive in world markets, producers want to export it. However, selling the gas abroad at a higher price could elevate its price at home. Consequently, Dow says the US government should limit and even prohibit natural gas exports. Disagreeing, a Chevron executive said, “We need enough demand to keep the supply coming. We believe markets work best when there are no artificial constraints or stimulants to supply and demand.” Hearing the Dow position, 19th century economist David Ricardo would ask us to remember comparative advantage. He would say that because the US produces natural gas with the lower opportunity cost, it should export it to others who sacrifice more when they produce their own energy. Then, world productivity will increase and every nation will benefit. Dow would reply, “But what about the jobs that the US needs now?” And therein lies the dilemma. Sources and resources: For more detail on the natural gas dilemma, I recommend this NY Times article. You also might want to look at a recent McKinsey report, an excellent econtalk podcast on Adam Smith, David Ricardo and comparative advantage, and more from econlife on natural gas.
<urn:uuid:e9c6a437-2afd-406f-a57a-e42c9962f970>
CC-MAIN-2015-35
http://www.econlife.com/a-us-comparative-advantage-for-producing-natural-gas/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.930325
362
2.75
3
This is a practical guide to help both teachers and students learn more about iPad and iOS 6 from the basics to the more sophisticated features. This eBook is completely free so you can jump right in and start downloading it. This eBook is designed in such a way to make it easy for users to easily navigate its content . Both the font and interface are reader friendly and most important of all the tutorials and tips it contains are things every teacher and student need to know about particularly when using iPad for educational purposes. Click Here to access and download this free guide. Enjoy
<urn:uuid:c98d1394-c5b5-4e43-b10a-ecda92e4a6f0>
CC-MAIN-2015-35
http://www.educatorstechnology.com/2013/03/the-student-guide-to-ipads-and-ios-6.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.940845
113
2.0625
2
While it remains a challenging time for the telecommunications industry, advances are being made to reduce costs and improve service levels. New advanced management capabilities for the optical layer are key to network and business improvement. Features such as wavelength path trace, per-wavelength power monitoring, and power alarm thresholds help network operators improve their network operations while decreasing operational costs and increasing customer satisfaction. The need for sophisticated optical monitoring has arisen as the metropolitan-area network has evolved. In first-generation MANs, optical links are generally node-to-node, with wavelength-division multiplexing (WDM) providing fiber relief but no topology changes. Thus, frame-based monitoring techniques are generally sufficient for fault sectionalization and isolation. Optical layer monitoring, if provided, is focused on power measurement at a wavelength's source and destination end points only. With increased bandwidth, shared point-to-point architectures result in excessive processing of through traffic at points such as add-drop multiplexers (ADMs). To alleviate this, second-generation metro networks reduce the electronic switch/processing costs through an increase in optical layer complexity, thus permitting wavelength or waveband routing through optical ADMs (OADMs). Third-generation systems take this one step further by allowing the wavelength connectivity to be dynamically reconfigurable. Naturally, to manage the capital cost savings allowed by this electronic-to-optical processing shift, a commensurate shift to optical-layer monitoring is required. End-to-end frame-based monitoring is no longer sufficient. It can provide transponder-to-transponder link integrity and link ID verification but provides no fault sectionalization capability. Fault management of a complex static or reconfigurable OADM-based network based on end-point information is impractical; the operational costs involved in implementing and maintaining a metro network would significantly outweigh the capital costs. The need for improved optical-layer performance monitoring (OPM) has been recognized, and several commercial solutions have emerged. With a few exceptions, most of these solutions focus on detailed spectral analysis, providing high-resolution wavelength, power, and signal-to-noise measurements. However, the detailed measurements provide no information about the course a particular light-path has taken through the network. For such networks, an advanced optical-layer management system that can identify individual services, as opposed to merely wavelengths, is needed. This system will facilitate better and more automated network management and anticipate the migration to reconfigurable networks where real-time management is the key to success. One of the key requirements for an optical-layer management system is to present relevant information effectively and place it in context so that it is clearly understandable and usable. The trade-offs here involve the amount and type of information to be gathered and delivered-too much can be as bad as too little-and the associated costs. These translate into four requirements for an advanced optical-layer management system. First, OPM needs to be ubiquitous within a network, and architectures that focus on precise optical spectral analysis are too expensive for this. Such solutions tend to be deployed only at key locations within the network or as temporary test cards for troubleshooting. But a lack of deployment would mean a loss of optical layer sectionalization and fault isolation capability. An alternative approach that complements detailed spectral analysis is to have power measurement at every node-or, even better, at every optical module within a network. This is coupled with a method of providing a unique ID to every wavelength and the ability to read the ID without expensive optical or electronic frame-based processing. Digital signal-processing technology makes this method possible at low costs, without relying on more-expensive optical signal processing. Such functionality should be fully integrated so that optical management functions can be provided systemwide, not just locally. Having integrated power and ID measurement capability within all optical cards permits network-wide path/power management, independent of the network topology or architecture. With the introduction of reconfigurable or dynamic connectivity, either through reconfigurable OADMs or optical switches, this management capability becomes essential, analogous to the Sonet performance monitors provided to help manage ADM-based connectivity. The second requirement is to provide multiple logical views of performance data, creating a much clearer picture of the network's operational status. A spectral (channelized) view on a single fiber is great for visualizing spectral utilization. A spatial view-a power trace along a light path-monitors each wavelength/service each step along the way. A multiple-fiber view provides a spectral power view on the working and protected, forward and reverse paths across the network. OPM must also provide optical path tracing and ID, independent of assigned wavelength colors-because multiple services with the same optical wavelength (on different fibers) can route through the same multifiber node/hub. This is possible if unique ID tags are assigned to each wavelength. Finally, efficient real-time operational information and notification of faults are required. For more on this topic and three examples of situations where an advanced optical-layer management system reduces the operational costs and enhances the quality of service, see the complete online article at www.eet.com/in_focus/. See related chart
<urn:uuid:118e316a-9391-4c52-b472-4a28ad03a56c>
CC-MAIN-2015-35
http://www.eetimes.com/document.asp?doc_id=1206042
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.919046
1,062
1.617188
2
3D scaling could be important if there is high interdependence between the operations of each CPU, but I maintain that we may have to build new computing models to really take advantage of systems built around CPUs like this. Separate memory for each processor is a good start, since it relieves the bottleneck of access to shared memory. Data centers are a good application for this, because they often work on large numbers of independent transactions. By the way, we may also have to look at the nomenclature. I just realized that this isn't really a Central Processing Unit (CPU). It's more like a Central Processing Pool (CPP?). For that matter, is the 'processor' the chip or each of the sections of it? The same word is used for both in this article. As we unveil EE Times’ 2015 Silicon 60 list, journalist & Silicon 60 researcher Peter Clarke hosts a conversation on startups in the electronics industry. Panelists Dan Armbrust (investment firm Silicon Catalyst), Andrew Kau (venture capital firm Walden International), and Stan Boland (successful serial entrepreneur, former CEO of Neul, Icera) join in the live debate.
<urn:uuid:26b4ca7e-3029-4256-8a89-fe8020bf691e>
CC-MAIN-2015-35
http://www.eetimes.com/messages.asp?piddl_msgthreadid=34841&piddl_msgid=201252
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.943658
239
2.578125
3
35. Pinus clausa (Chapman ex Engelmann) Sargent, Rep. For. N. America. 199. 1884. Pinus inops Aiton var. clausa Chapman ex Engelmann, Bot. Gaz. 2: 125. 1877; P. clausa var. immuginata D.B. Ward Trees to 21m; trunk to 0.5m diam., straight and erect to leaning and crooked, much branched; crown mostly rounded or irregular. Bark gray to gray-brown, furrowed, with narrow, flat, irregular ridges, resin pockets absent, on upper sections of the trunk reddish to red-brown, platy becoming smooth distally. Branches spreading to ascending, poorly self-pruning; twigs slender, violet- to red-brown, rarely glaucous, aging gray, smooth. Buds cylindric, purple-brown, to 1cm; scale margins white-fringed. Leaves 2 per fascicle, spreading-ascending, persisting 2--3 years, (3--)6--9(--10)cm ´ ca. 1mm, straight, slightly twisted, dark green, all surfaces with fine, inconspicuous stomatal lines, margins finely serrulate, apex short-conic; sheath 0.3--0.5(--0.7)cm, base persistent. Pollen cones ellipsoid, ca. 10mm, brownish yellow. Seed cones maturing in 2 years, shedding seeds soon thereafter or often long-serotinous, long-persistent, solitary or whorled, spreading, symmetric (rarely slightly asymmetric, reflexed), lanceoloid before opening, ovoid to broadly ovoid when open, 3--8cm, red-brown, sessile or on stalks to 1cm, scales with dark red-brown, purple, or purple-gray border distally on adaxial surface; apophyses thickened, shallowly and angulately raised, transversely rhombic, cross-keeled; umbo central, low-pyramidal, tapering to sharp tip or weak, often deciduous prickle. Seeds obovoid-oblique; body ca. 4mm, dark brown to nearly black; wing to 17mm. 2 n =24. Fire successional in sand dunes and white sandhills; 0--60m; Ala., Fla. Although Pinus clausa is too profusely branched to be important for saw timber, it is managed to produce a high volume of pulpwood in northern peninsular Florida.
<urn:uuid:2fd77b91-5ce8-45ae-9842-ba8e7a37c3b2>
CC-MAIN-2015-35
http://www.efloras.org/florataxon.aspx?flora_id=1&taxon_id=233500926
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00229-ip-10-171-96-226.ec2.internal.warc.gz
en
0.796918
562
2
2