text
stringlengths
509
12k
id
stringlengths
47
47
dump
stringclasses
6 values
url
stringlengths
15
1.27k
file_path
stringlengths
125
139
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
1.02k
2.05k
score
float64
2.52
5.06
int_score
int64
3
5
“What kinds of things do you think you might be able to see and do during your visit to Biosphere 2?” Starting with this single visitor survey question, Elisabeth Roberts and Matthew Wenger, College of Education doctoral students and Earth Education Research and Evaluation (EERE) Team members, set out to help re-vamp the Biosphere 2 visitor experience. Their goal was to learn from visitors how to make visits more engaging, more educational and more relevant to life on the planet outside the glass. Originally built in the 1980s to research and develop self-sustaining space-colonization technology, Biosphere 2 was acquired by the UA in 2007 and today serves as a large-scale scientific research laboratory. The facility not only houses cutting edge research, but offers an unmatched tool for educating the general public about the planet Earth and its ecological systems. Last year, Biosphere 2 leadership not only knew that their organization needed to improve. Being well-connected to the UA, they also knew that the EERE Team at the College of Education’s Teaching, Learning and Sociocultural Studies department could help. After just two meetings to discuss the arrangements, the real collaborative work began in the fall of 2009. The EERE Team, led by Associate Professor Bruce Johnson, conducts research on the development of ecological understandings, environmental perceptions, and environmental actions. They also offer evaluation services to centers that provide earth education programs. Says team member Roberts, “We figure out what’s needed and how to get the answers. It’s applied research, not theory. We get the data to help people make decisions.” Their goal was to evaluate Biosphere 2’s public outreach and tour design, study the visitor experience, and use that data to help the staff develop better visitor tour programs, improve outreach efforts, design new exhibits, and increase public understanding of ongoing research. Roberts and the five-person team knew that success would depend on much more than the results of visitor focus groups. They took a big-picture view that would examine internal staff perspectives as well as external perceptions, and focus on developing strategies around where those visions intersect. Starting internally, they talked with a group that included Director Travis Huxman, Sustainability Director Nathan Allen and other senior staff, as well as eight tour guides. They asked questions like: What perspectives did the staff members have in common when it came to a vision for education and outreach? Where did they differ? Through this process, the team helped the Biosphere 2 staff develop a clear picture of their common goals, as well as an idea of where their visions diverged. The EERE Team then took their next step, formulating and conducting over 145 on-site visitor surveys at Biosphere 2 in the spring of 2010. Some of their findings were expected. Others were surprising. Most visitors came with specific expectations for their experience, and those expectations were being fulfilled. Fifty-seven percent of visitors expected to see the different biomes and ecosystems within the facility. Still, a large number of visitors expressed a desire to learn more about Biosphere 2’s history and underlying engineering and design. They wanted to know more about the ongoing research being done. Almost half of visitors specifically wanted to learn how the Biosphere 2 design relates to sustainability issues of life on Earth, such as green technology and water conservation. “They knew they had to shift from a show-and-tell model with tour guides to explore other options for engaging visitors,” says Roberts. “They had to define what they wanted people to experience, such as hanging out and talking with a researcher working in the rainforest. How do you allow visitors to do that while not interrupting the work? The potential outcomes are very strong and can create intimate connections. That’s the kind of outcome we wanted—that sense of ‘I was there. I got to talk to the scientists doing the work.’” Aside from their work with Biosphere 2, the College of Education team has contributed to projects around the nation and the world, including the Cooper Center for Environmental Learning, T.R.E.E. of New Orleans, the McKeever Center for Environmental Learning in Pennsylvania, and the Cyprus Center for Environmental Research and Education. In preparation for reaccreditation by the Higher Learning Commission’s North Central Association (NCA) in 2010, the University of Arizona has crafted a Self-Study Report documenting and evaluating performance in each of five key criteria: Mission and Integrity, Preparing for the Future, Student Learning and Effective Teaching, Creativity and Knowledge Discovery, and Engagement and Service. In this report, the collaboration between the College of Education and Biosphere 2 was cited as it demonstrates the quality of the University for NCA re-accreditation. The complete 2010 Self-Study Report can be downloaded at http://nca2010.arizona.edu/documents/selfstudy.pdf.
<urn:uuid:c20172d8-3ebe-4233-8954-2e01998a1b23>
CC-MAIN-2015-11
http://www.arizona.edu/taking-it-next-level-college-education-team-helps-improve-biosphere-2-experience
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463411.14/warc/CC-MAIN-20150226074103-00141-ip-10-28-5-156.ec2.internal.warc.gz
en
0.964573
1,024
2.625
3
What makes soldiers abuse prisoners? How could Nazi officials condemn thousands of Jews to gas chamber deaths? What's going on when underlings help cover up a financial swindle? For years, researchers have tried to identify the factors that drive people to commit cruel and brutal acts and perhaps no one has contributed more to this knowledge than psychological scientist Stanley Milgram. Just over 50 years ago, Milgram embarked on what were to become some of the most famous studies in psychology. In these studies, which ostensibly examined the effects of punishment on learning, participants were assigned the role of "teacher" and were required to administer shocks to a "learner" that increased in intensity each time the learner gave an incorrect answer. As Milgram famously found, participants were willing to deliver supposedly lethal shocks to a stranger, just because they were asked to do so. Researchers have offered many possible explanations for the participants' behavior and the take-home conclusion that seems to have emerged is that people cannot help but obey the orders of those in authority, even when those orders go to the extremes. This obedience explanation, however, fails to account for a very important aspect of the studies: why, and under what conditions, people did not obey the experimenter. In a new article published in Perspectives on Psychological Science, a journal of the Association for Psychological Science, researchers Stephen Reicher of the University of St. Andrews and Alexander Haslam and Joanne Smith of the University of Exeter propose a new way of looking at Milgram's findings. The researchers hypothesized that, rather than obedience to authority, the participants' behavior might be better explained by their patterns of social identification. They surmised that conditions that encouraged identification with the experimenter (and, by extension, the scientific community) led participants to follow the experimenters' orders, while conditions that encouraged identification with the learner (and the general community) led participants to defy the experimenters' orders. As the researchers explain, this suggests that participants' willingness to engage in destructive behavior is "a reflection not of simple obedience, but of active identification with the experimenter and his mission." Reicher, Haslam, and Smith wanted to examine whether participants' willingness to administer shocks across variants of the Milgram paradigm could be predicted by the extent to which the variant emphasized identification with the experimenter and identification with the learner. For their study, the researchers recruited two different groups of participants. The expert group included 32 academic social psychologists from two British universities and on Australian university. The nonexpert group included 96 first-year psychology students who had not yet learned about the Milgram studies. All participants were read a short description of Milgram's baseline study and they were then given details about 15 variants of the study. For each variant, they were asked to indicate the extent to which that variant would lead participants to identify with the experimenter and the scientific community and the extent to which it would lead them to identify with the learner and the general community. The results of the study confirmed the researchers' hypotheses. Identification with the experimenter was a very strong positive predictor of the level of obedience displayed in each variant. On the other hand, identification with the learner was a strong negative predictor of the level of obedience. The relative identification score (identification with experimenter minus identification with learner) was also a very strong predictor of the level of obedience. According to the authors, these new findings suggest that we need to rethink obedience as the standard explanation for why people engage in cruel and brutal behavior. This new research "moves us away from a dominant viewpoint that has prevailed within and beyond the academic world for nearly half a century -- a viewpoint suggesting that people engage in barbaric acts because they have little insight into what they are doing and conform slavishly to the will of authority," they write. These new findings suggest that social identification provides participants with a moral compass and motivates them to act as followers. This followership, as the authors point out, is not thoughtless -- "it is the endeavor of committed subjects." Looking at the findings this way has several advantages, Reicher, Haslam, and Smith argue. First, it mirrors recent historical assessments suggesting that functionaries in brutalizing regimes -- like the Nazi bureaucrat Adolf Eichmann -- do much more than merely follow orders. And it simultaneously accounts for why participants are more likely to follow orders under certain conditions than others. The researchers acknowledge that the methodology used in this research is somewhat unorthodox -- the most direct way to examine the question of social identification would involve recreating the Milgram paradigm and varying different aspects of the paradigm to manipulate social identification with both experimenter and learner. But this kind of research involves considerable ethical challenges. The purpose of the article, the authors say, is to provide a strong theoretical case for such research, "so that work to address the critical question of why (and not just whether) people still prove willing to participate in brutalizing acts can move forward." - S. D. Reicher, S. A. Haslam, J. R. Smith. Working Toward the Experimenter: Reconceptualizing Obedience Within the Milgram Paradigm as Identification-Based Followership. Perspectives on Psychological Science, 2012; 7 (4): 315 DOI: 10.1177/1745691612448482 Cite This Page:
<urn:uuid:d4354e9d-ffed-4d5d-82ad-ad9fe76414aa>
CC-MAIN-2015-11
http://www.sciencedaily.com/releases/2012/07/120718164947.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462426.4/warc/CC-MAIN-20150226074102-00007-ip-10-28-5-156.ec2.internal.warc.gz
en
0.950529
1,103
3.109375
3
Helicopters: How They Work Rotary Wing Terminology Lets talk a moment about terminology. There are many terms associated with rotary wing flight. One must become familiar with the terminology of rotorcraft before they can expect to understand the mechanics of rotary wing flight. Let's look at a few definitions. Main Rotor System - Root: The inner end of the blade where the rotors connect to the blade grips. - Blade Grips: Large attaching points where the rotor blade connects to the hub. - Hub: Sits atop the mast, and connects the rotor blades to the control tubes. - Mast: Rotating shaft from the transmission, which connects the rotor blades to the helicopter. - Control Tubes: Push \ Pull tubes that change the pitch of the rotor blades. - Pitch Change Horn: The armature that converts control tube movement to blade pitch. - Pitch: Increased or decreased angle of the rotor blades to raise, lower, or change the direction of the rotors thrust force. - Jesus Nut: Is the singular nut that holds the hub onto the mast. (If it fails, the next person you see will be Jesus). Main Rotor Blade - Leading Edge: The forward facing edge of the rotor blade. - Trailing Edge: The back facing edge of the rotor blade. - Chord: The distance from the Leading Edge to the Trailing Edge of the rotor blade. - Swash Plate: Turns non-rotating control movements into rotating control movements. - Collective: The up and down control. It puts a collective control input into the rotor system, meaning that it puts either "all up", or "all down" control inputs in at one time through the swash plate. It is operated by the stick on the left side of the seat, called the collective pitch control. It is operated by the pilots left hand. - Cyclic: The left and right, forward and aft control. It puts in one control input into the rotor system at a time through the swash plate. It is also known as the "Stick". It comes out of the center of the floor of the cockpit, and sits between the pilots legs. It is operated by the pilots right hand. - Pedals: These are not rudder pedals, although they are in the same place as rudder pedals on an airplane. A single rotor helicopter has no real rudder. It has instead, an anti-torque rotor (Also known as a tail rotor), which is responsible for directional control at a hover, and aircraft trim in forward flight. The pedals are operated by the pilots feet, just like airplane rudder pedals are. Tandem rotor helicopters also have these pedals, but they operate both main rotor systems for directional control at a hover. Here are some of the component parts that make up a helicopter. While this is an example of one specific helicopter (UH-1C), not all helicopters will have all of the parts listed here. Some of this may be a bit more of the same old stuff we have just discussed, but it will show everything as it relates to everything else on the aircraft and the location of each component. Anatomy of a Helicopter - Rotor Blade: The rotary wing that provides lift for the helicopter. - Stabilizer Bar: Dampens control inputs to make smoother changes to the rotor system. - Swashplate: Transfers non-moving control inputs into the spinning rotor system. - Cowling: The aerodynamic covering for the engine. - Mast: Connects the transmission to the rotor system. - Engine: Provides power to the rotor systems. - Transmission: Takes power from the engine and drives both rotor systems. - Greenhouse Window: A tinted window above each of the pilot seats. - Fuselage: The body of the helicopter. - Cabin Door: Allows access to the cabin and cockpit. - Skids: Landing gear that usually have no wheels or brakes. - Crosstube: The mounting tubes and connection for the skids. - Motor Mount: A flexible way to attach the engine to the fuselage. - Tailboom: Also known as an "empenage" is the tail of the helicopter. - Synchronized Elevator: A movable wing that helps stabilize the helicopter in flight. - Tailrotor: Provides anti-torque and in-flight trim for the helicopter. - Tail Rotor Driveshaft: Provides power to the tailrotor from the transmission. - 45 Degree Gearbox: Transfers power up the vertical fin to the 90 degree gearbox. - 90 Degree Gearbox: Transfers power from the 45 degree gearbox to the tailrotor. - Vertical Fin: Holds the tailrotor and provides lateral stabilization. - Tail Skid: Protects the tailboom when landing. This picture illustrates how the helicopter moves when using the appropriate controls. Up and Down movements are controlled by the "Collective". Side to Side and Forward and Back motions are controlled by the "Cyclic". Lateral control (Also called directional control or "Yaw") is achieved by using the "Foot Pedals". While you are looking at the picture of the controls (Left side of this paragraph), I will explain how to do a normal takeoff. First, you must make sure the throttle is all the way open (For a turbine powered helicopter, advanced properly for a reciprocating engine powered helicopter). Once you have established the proper operating RPM, then you can pull up slowly on the collective. As you increase collective pitch, you need to push the left pedal (In American helicopters...right pedal for non-American models) to counteract the torque you generate by increasing pitch. (In reciprocating engined models, you will advance the throttle as you increase collective pitch). Keep pulling in pitch and depressing the pedal until the aircraft gets light on the skids. You may sense a turning motion to the left or right, if so, you may need more or less pedal to maintain heading. The cyclic will become sensitive and (depending on how the aircraft leaves the ground heels or toes of the skids last) as you continue to pull in pitch and depress the pedal, you will put in the appropriate cyclic input to level the aircraft as it leaves the ground. As the aircraft eases into the air, forward cyclic will be required to start the aircraft in a forward motion. As the aircraft advances forward, it will gain speed until about 15 knots and then the aircraft will shudder a little as you transition through ETL (Effective Translational Lift...See the unique forces page for a more in depth explanation of ETL). As you transition through ETL, the collective will need to be reduced, the pedal will need less pressure, and the cyclic will need to be forced forward to counteract the force against the front of the rotor system. Failure to push forward will result in an abrupt nose high attitude and a reduction in forward speed. After the shudder of ELT is experienced, you will see a marked gain in forward airspeed, a reduced need for pedal input and a reduced need for collective pitch as the rotor system becomes more efficient. The airspeed indicator will most likely jump from zero to 40 knots indicated airspeed and will smoothly advance as the aircraft goes faster. Now you have taken off and with a little release of foward cyclic pressure, the aircraft will establish a climb and continue to gain airspeed. At this point, the pedals are only used to trim the aircraft, and most maneuvers are accomplished by using a combination of the cyclic and collective controls. (That wasn't so hard...was it?) We don't need no stinking runways!
<urn:uuid:f823a316-1205-4389-b4cb-0363cf9c6c6f>
CC-MAIN-2015-11
http://www.helicopterpage.com/html/terms.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936459277.13/warc/CC-MAIN-20150226074059-00139-ip-10-28-5-156.ec2.internal.warc.gz
en
0.918086
1,610
3.75
4
Trade secrets, in addition to patents, trademarks and copyrights, are another form of intellectual property that can be protected. In contrast to the Federal statutory schemes for protecting patents, trademarks and copyrights, trade secrets are generally protected under state law. All states have some form of legal protection for trade secrets. North Carolina’s version of such a law, enacted in 1981, is entitled the "Trade Secrets Protection Act" and can be found under the N.C. General Statutes, Chapter 66, Section 152. As for all the states, the North Carolina law is based on the Uniform Trade Secrets Act, which in 1980 codified the variety of case (i.e., "judge-made") law from around the country. There are quite a few elements to the law in North Carolina, and any legal conclusion as to what constitutes a trade secret will depend upon the facts in each circumstance. A general overview, however, can be made. Under North Carolina law a trade secret can be a variety of forms of business or technical information. Types of information that can be protected as a "trade secret" include formulas, patterns, programs, devices, compilations of information, methods, techniques or processes. Project launch dates for new products, marketing plans, computer programs, negotiated price lists in a contract, and customer lists have all been found to be trade secrets under North Carolina law. Many of these examples are of a type of information that cannot be protected through patents, copyrights or trademarks. And, trade secret protection can potentially last forever, as long as they are kept secret and reasonable steps are taken to preserve their secrecy. Therefore, trade secrets can be an important element of any business enterprise. Business or technical information that is generally known or readily ascertainable by independent means would not be considered a trade secret, since this information is not really considered "secret." To be a trade secret, the business or technical information must derive some commercial value from not generally being known to others. Trade secret information need not be limited to "positive" information, but can also include negative or inconclusive data. The criterion is whether or not the information has "commercial" value. Surely knowing that a particular process will not work to produce an intended result would have value against a competitor! Perhaps one of the most important characteristics of a trade secret under North Carolina law is that it must be "the subject of efforts that are reasonable under the circumstances to maintain its secrecy." This usually requires affirmative steps to be taken by the owner of the trade secret. First, trade secrets must be identified so that employees and business contacts can be put on notice of the secret and proprietary nature of the information. Some form of a confidentiality agreement is often essential to the protection of a trade secret, where the recipients of the trade secret are obligated to keep it confidential. Furthermore, restricted access to the information (e.g., passwords for computer-based information or secured facilities for offices or laboratories) also helps to identify the special nature of the trade secret. Conducting exit interviews for departing employees, reminding them of their obligation to keep confidential the company’s trade secrets and inquiring as to the whereabouts of information they possessed as employees, may also be essential to ensure that secrecy of the information is being reasonably maintained. For example, describing your company’s marketing plan in an annual report distributed on your web site would prevent that plan from being considered a trade secret. Another example where trade secret status could be destroyed is taking public visitors on a tour of your facility and showing them your "top secret" device for making widgets. Neither of these examples evidence any effort to keep the information secret. It is also important to note that obtaining patent protection is the antithesis of keeping trade secrets. To secure Federal patent protection, the patentee makes a bargain with the public – exclusive protection for a limited period of time in exchange for full public disclosure of the invention. So, once patent protection is sought, protection as a trade secret is abandoned – because there are no longer efforts to keep the trade secrets "secret." Sometimes, however, trade secret information would be relevant to the examination of a patent application. This is particularly true in those instances where trade secret information could be "material" information with respect to patentability. Applicants have an affirmative duty to disclose "material" information to the Patent & Trademark Office and failure to do so can lead to the invalidation of patent rights. In instances where trade secret information must be disclosed, a special procedure can be used whereby the Patent & Trademark Office will prevent information from appearing in the publicly available records. The claim to a trade secret is not affected if someone else independently discovers it, and identical trade secrets can coexist without conflict. In this regard, trade secrets differ from patent protection in that there can be only one "patented" invention. Independent discovery is not a defense to patent infringement unless one can demonstrate that they invented it first. Owners of trade secrets have the right to prevent other persons from using or transferring the trade secrets without permission. Misappropriation of trade secrets is an actionable offense, and is defined in North Carolina law as the acquisition, disclosure, or use of a trade secret of another without authority or consent. Independent development or reverse engineering of a trade secret is not considered to be misappropriation. In order to prove misappropriation, it must be shown that the accused person knew, or should have known, of the trade secret, and has had a specific opportunity to acquire it. It is important, therefore, that in the first instance the trade secret was identified and protected in order to obtain a remedy for its misappropriation. One remedy for misappropriation under North Carolina law is an injunction in which a court protects the trade secret by ordering the offender not to further use the information. Under some circumstances, where an injunction against the use of the trade secret would be unreasonable, a court can order a royalty to be paid to the owner of the trade secret. In addition to an injunction, a court can order monetary damages be paid to the owner of the trade secret, as measured by the economic loss caused by the misappropriation. Willful and malicious misappropriation could also lead to punitive damages. Any legal action for misappropriation must be commenced within three years after it is, or reasonably should have been, discovered. Failure to bring legal action within this period of time means the loss of the opportunity to recover damages for the misappropriation of the trade secret, or to obtain an injunction against its further use. Therefore, it is important to remain vigilant when relying upon trade secret protection for intellectual property. Furthermore, failure to protect trade secret information in one instance could decrease your ability to protect subsequent misappropriation of the same information. This article was published in the February 2002 issue of the Triangle TechJournal.Hutchison & Mason, PLLC is a Raleigh, North Carolina based law firm specializing in information technology and life science companies. Their web site is www.hutchlaw.com.. Article on trade, secrets by Hutchison and Mason PLLC
<urn:uuid:c2898091-82e7-49c2-8ea1-efb6f2bb0c8e>
CC-MAIN-2015-11
http://www.zeromillion.com/entrepreneurship/trade-secrets.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463411.14/warc/CC-MAIN-20150226074103-00141-ip-10-28-5-156.ec2.internal.warc.gz
en
0.933786
1,448
2.515625
3
An international research team coordinated at the IRCM in Montréal found a possible alternative treatment for lymphoid leukemia. Led by Dr. Tarik Möröy, the IRCM's President and Scientific Director, the team discovered a molecule that represents the disease's "Achilles' heel" and could be targeted to develop a new approach that would reduce the adverse effects of current treatments such as chemotherapy and radiation therapy. The study's results are being published today in the prestigious scientific journal Cancer Cell. The researchers' results have direct implications for the treatment of acute lymphoblastic leukemia (ALL), one of the four most common types of leukemia. ALL is a cancer of the bone marrow and blood that progresses rapidly without treatment. Current treatments consist of chemotherapy and radiation therapy, which are both highly toxic and non-specific, meaning that they damage healthy cells as well as tumour tissues. "Even when effective, patients can suffer dramatic side effects from these treatments," says Dr. Möröy, who is also Director of the Hematopoiesis and Cancer research unit at the IRCM and corresponding author of the study. "Therefore, they would directly benefit from an improved therapy that could reduce the necessary dose of radiation or chemotherapy, and thus their side effects, while maintaining the treatments' efficacy. Therapies that target specific molecules have shown great promise. This is why, for the past 20 years, I have been studying a molecule called Gfi1, which plays an important role in the development of blood cells and cancer." When normal cells are transformed into tumour cells, the body responds by activating a tumour suppressor protein that induces cell death. Tumour cells must therefore counteract cell death in order to survive. "With this study, we found that leukemic cells depend on the Gfi1 molecule for their survival," explains Dr. Cyrus Khandanpour, co-first author of the study and University Hospital physician at University Duisburg-Essen in Germany. "In fact, this molecule helps the malignant cells avoid death by hindering the activity of the tumour suppressor protein. Our results show that when Gfi1 is removed in mice that suffer from T-cell leukemia, the tumour disappears and the animals survive." "Following this discovery, we wanted to test whether it could be used as a viable approach to treat leukemia in humans," adds Dr. Möröy. "We transplanted cells from a patient with T-cell leukemia into a mouse. We then inhibited the Gfi1 molecule using a commercially-available agent, and noticed that it stopped the expansion of human leukemia in the bone marrow, peripheral blood and spleen, without leading to adverse effects." "These results are a significant indication that therapies targeting the molecule Gfi1 would work in human patients," says Dr. H. Leighton Grimes, co-corresponding author of the study from the Cincinnati Children's Hospital Medical Center. "In fact, if our results translate to patients, they could improve the prognosis of people suffering from lymphoid malignancies," adds Dr. James Phelan, the study's co-first author and recent PhD graduate in Dr. Grimes' laboratory. "Our study suggests that a molecular-based therapy targeting Gfi1 would not only significantly improve response rates, but may also lower effective doses of chemotherapy agents or radiation, thereby reducing harmful side effects," concludes Dr. Khandanpour, who is also a visiting scientist at the IRCM. "Gfi1 represents an Achilles' heel for lymphoid leukemia and we are continuing to work so that our approach may soon move to clinical trials." About acute lymphoblastic leukemia Acute lymphoblastic leukemia (ALL) is one of the four most common types of leukemia and affects blood cells and the immune system. The disease develops when immature white blood cells are overproduced in the bone marrow, crowd out normal cells, and eventually spread to other organs. Acute refers to the relatively short time course of the disease, as it can be fatal in as little as a few weeks if untreated. According to the Leukemia & Lymphoma Society of Canada, ALL is the most common type of cancer in children from one to seven years old, and the most common type of leukemia in children from infancy up to age 19. Four out of five children with ALL are cured of their disease after treatment. The number of adults and their remission lengths have grown significantly over the past 30 years. An estimated 4,800 people in Canada were expected to develop leukemia in 2010. About the study The article published in Cancer Cell was a collaborative project between Tarik Möröy's team in Montréal, Cyrus Khandanpour in Germany, H. Leighton Grimes and James Phelan from Cincinnati in the United States, and Bertie Göttgens from Cambridge in the United Kingdom. Collaborators from Dr. Möröy's IRCM laboratory include Lothar Vassen, Riyan Chen, Marie-Claude Gaudreau and Joseph Krongold. Research at the IRCM was funded by grants from the Canadian Institutes of Health Research (CIHR), the Canada Research Chair program, the IRCM and the Cole Foundation. For more information on this discovery, please refer to the article summary published online by Cancer Cell: http://www.cell.com/cancer-cell/abstract/S1535-6108(13)00036-6. About Tarik Möröy Tarik Möröy obtained a PhD in biochemistry from the Ludwig-Maximilians University in Munich, Germany. He is the IRCM's President and Scientific Director, Full IRCM Research Professor and Director of the Hematopoiesis and Cancer research unit. Dr. Möröy is also Full professor-researcher in the Department of Microbiology and Immunology (accreditation in biochemistry) at the Université de Montréal, and Adjunct Professor in the Department of Medicine (Division of Experimental Medicine) and the Department of Biochemistry at McGill University. Dr. Möröy holds the Canada Research Chair in Hematopoiesis and Immune Cell Differentiation. For more information, visit www.ircm.qc.ca/moroy. About the IRCM Founded in 1967, the Institut de recherches cliniques de Montréal (www.ircm.qc.ca) is currently comprised of 36 research units in various fields, namely immunity and viral infections, cardiovascular and metabolic diseases, cancer, neurobiology and development, systems biology and medicinal chemistry. It also houses three specialized research clinics, eight core facilities and three research platforms with state-of-the-art equipment. The IRCM employs 425 people and is an independent institution affiliated with the Université de Montréal. The IRCM Clinic is associated to the Centre hospitalier de l'Université de Montréal (CHUM). The IRCM also maintains a long-standing association with McGill University. About the Canadian Institutes of Health Research (CIHR) CIHR is the Government of Canada's health research investment agency. CIHR's mission is to create new scientific knowledge and enable its translation into better health, more effective health services and products, and a stronger Canadian health care system. Composed of 13 Institutes, CIHR provides leadership and support to more than 14,100 health researchers and trainees across Canada.
<urn:uuid:ed888010-f9af-4701-9c6e-43421387f860>
CC-MAIN-2015-11
http://www.eurekalert.org/pub_releases/2013-02/idrc-rd021113.php
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461359.90/warc/CC-MAIN-20150226074101-00179-ip-10-28-5-156.ec2.internal.warc.gz
en
0.931372
1,538
3.34375
3
Republic of German-Austria |Republic of German-Austria| |Unrecognised rump state; unofficial state of the Weimar Republic| Provinces claimed by German Austria. The border of the subsequent First Austrian Republic is outlined in red. |Historical era||Aftermath of World War I| |-||Proclamation by Charles I||11 November 1918| |-||Republic declared||12 November 1918| |-||Reichsrat claims Cisleithania|| 22 November 1918 |-||Treaty of St Germain||10 September 1919| |-||Ratified by Reichsrat||21 October 1919| The Republic of German-Austria (German: Republik Deutschösterreich or Deutsch-Österreich) was created following World War I as the initial rump state for areas with a predominantly German-speaking population within what had been the Austro-Hungarian Empire. German-Austria claimed sovereignty over all the majority-German territory of the former Habsburg realm: a total area of 118,311 km2 (45,680 sq mi) with 10.4 million inhabitants. This included nearly all the territory of present-day Austria, plus South Tyrol and the town of Tarvisio, both now in Italy; southern Carinthia and southern Styria, now in Slovenia; and Sudetenland and German Bohemia (which later became part of Sudetenland), now in the Czech Republic. In practice, however, its authority was limited to the Danubian and Alpine provinces of the old Habsburg realm—with few exceptions, most of present-day Austria. In Habsburg Austria-Hungary, "German-Austria" was an unofficial term for the areas of the empire inhabited by Austrian Germans. With the impending collapse of the empire in late 1918, ethnic German deputies to the Cisleithanian Austrian parliament (Reichsrat) last elected in 1911 sought to form a new rump state of German-Austria. It declared a "provisional national assembly of the independent German Austrian state" and elected Franz Dinghofer of the German National Movement, Jodok Fink of the Christian Social Party, and Karl Seitz of the Social Democratic Workers' Party as assembly presidents. The assembly included representatives from Bohemia, Moravia, and Austrian Silesia who refused to adhere to the new state of Czechoslovakia which had been declared on October 28, 1918. On November 11, 1918, Emperor Charles I relinquished his right to take part in Austrian affairs of state. The next day, November 12, the National Assembly officially declared German-Austria a republic, and named Karl Renner as provisional chancellor. It drafted a provisional constitution that stated that "German-Austria is a democratic republic" (Article 1) and "German-Austria is a component of the German Republic" (Article 2). The latter provision reflected the deputies' feelings that Austria was no longer viable on its own with the loss of 60 percent of its territory, and the only course was union with Germany. Later plebiscites in the provinces of Tyrol and Salzburg yielded majorities of 98 and 99% in favor of a unification with Germany. On November 22, the national assembly officially laid claim to all ethnic German areas of Cisleithania. However, the Allies of World War I opposed such a move and German-Austria was largely powerless to resist the forces of Italy, Czechoslovakia, and the Kingdom of Serbs, Croats, and Slovenes from seizing territory. On September 10, 1919, Renner signed the Treaty of Saint Germain and it was ratified by the national assembly on October 21. According to its provisions, the country had to change its name from "German Austria" to Austria. Article 88 of the treaty, sometimes called a "pre-Anschluss attempt", states that "the independence of Austria is inalienable otherwise than with the consent of the Council of the League of Nations"—in effect, barring any attempt by Austria to unite with Germany. Likewise, in the Treaty of Versailles dictating the terms of peace for Germany, there was a prohibition of unification. With these changes and the settling of Austria's frontiers, the era of the First Republic of Austria began. German-Austria originally consisted of nine provinces (Provinzen): - Upper Austria (Oberösterreich), all of the current Austrian state of Upper Austria plus the Bohemian Forest region (Böhmerwaldgau) now in the South Bohemian Region of the Czech Republic; - Lower Austria (Niederösterreich), all of the current Austrian state of Lower Austria and the city-state of Vienna, plus German South Moravia (Deutschsüdmähren), now divided between the Czech regions of South Bohemia, Vysočina, and South Moravia; - German Bohemia (Deutschböhmen), areas of western Bohemia that were later part of Sudetenland from 1938–45, now part of the Czech Republic; - Sudetenland, parts of the historical regions of Moravia and Austrian Silesia. Boundaries do not correspond to later use of the term Sudetenland. - Styria (Steiermark), most of historical Styria including the current Austrian state of Styria and the north-eastern part of the Slovenian informal region of Lower Styria; - Salzburg, all of the current Austrian state of Salzburg; - Carinthia (Kärnten), all of historical Carinthia including the current Austrian state of Carinthia, the Slovenian unofficial region of Carinthia, the Slovenian municipality of Jezersko and the now Italian municipalities of Tarvisio, Malborghetto Valbruna and Pontebba; - German Tyrol (Deutschtirol), most of historical Tyrol including the current Austrian state of Tyrol and the present day Italian province of South Tyrol, but not the current Italian province of Trentino; - Vorarlberg, all of the current Austrian state of Vorarlberg. Several German minority populations in Moravia, including German populations in Brünn (Brno), Iglau (Jihlava) and Olmütz (Olomouc), as well as the German enclave of Gottschee (Gottschee) in Carniola also attempted to proclaim their union with German Austria, but failed. The areas now outside of the current Republic of Austria often had significant non-German minorities and occasionally non-German majorities and were quickly taken by troops of the respective countries they were to eventually join. On the other hand, ethnic Germans in the western part of the Kingdom of Hungary that formed a majority in the area known as German West Hungary and agitated to join to Austria were successful and the area became the state of Burgenland, with the notable exception of the region around Ödenburg (Sopron) which was also intended to be the state capital, but due to a very contentious plebiscite, remained part of Hungary. The only other part of the former German counties of 'Burgenland' in the Kingdom of Hungary also not to become part of the Austrian Republic due to the treaty was Preßburg (Bratislava) which went to Czechoslovakia. Despite the prohibition of the use of the term "German-Austria", the republic's unofficial national anthem between 1920 and 1929 was "German Austria, you wonderful country" (Deutschösterreich, du herrliches Land). Its words were penned by then-Chancellor Karl Renner, a signatory of the Treaty of Saint Germain. - The Kingdom of Hungary had become the Hungarian Democratic Republic in 1918. - "Treaty of Peace between the Allied and Associated Powers and Austria; Protocol, Declaration and Special Declaration ATS 3". Austlii.edu.au. Retrieved 2011-06-15.
<urn:uuid:66d34c67-63b6-4c35-ba00-815f1726dc40>
CC-MAIN-2015-11
http://en.wikipedia.org/wiki/German_Austria
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936469305.48/warc/CC-MAIN-20150226074109-00165-ip-10-28-5-156.ec2.internal.warc.gz
en
0.933734
1,676
4.0625
4
What Physicists and Astronomers Do Physics research has led to advances in many fields, such as the development of magnetic resonance imaging technology used in medicine. Physicists and astronomers study the ways in which various forms of matter and energy interact. Theoretical physicists and astronomers may study the nature of time or the origin of the universe. Physicists and astronomers in applied fields may develop new military technologies or new sources of energy, or monitor space debris that could endanger satellites. Physicists and astronomers typically do the following: - Develop scientific theories and models that attempt to explain the properties of the natural world, such as atom formation or the force of gravity - Plan and conduct scientific experiments and studies to test theories and discover properties of matter and energy - Write proposals and apply for research grants - Do complex mathematical calculations to analyze physical and astronomical data, such as data that may indicate the existence of planets in distant solar systems - Design new scientific equipment, such as telescopes and lasers - Develop computer software to analyze and model data - Write scientific papers that may be published in scholarly journals - Present research findings at scientific conferences and lectures Physicists explore the fundamental properties and laws that govern space, time, energy, and matter. Some physicists study theoretical areas, such as the fundamental properties of atoms and molecules and the evolution of the universe. Others design and perform experiments with sophisticated equipment such as particle accelerators, electron microscopes, and lasers. Through observation and analysis, they try to discover and formulate laws that explain the forces of nature, such as gravity, electromagnetism, and nuclear interactions. Others apply their knowledge of physics to practical areas, such as the development of advanced materials and medical equipment. Astronomers study planets, stars, galaxies, and other celestial bodies. They use ground-based equipment, such as radio and optical telescopes, and space-based equipment, such as the Hubble Space Telescope. With these they make observations and collect data on the motions, compositions, and other properties of the objects they study. Some astronomers focus their research on objects in our own solar system, such as the sun or planets. Others study distant stars, galaxies, and phenomena such as neutron stars and black holes, and some monitor space debris that could interfere with satellite operations. Many physicists and astronomers do basic research with the aim of increasing scientific knowledge. These researchers may attempt to develop theories that better explain what gravity is or how the universe works or was formed. Other physicists and astronomers do applied research. They use the knowledge gained from basic research to develop new devices, processes, and other practical applications. Their work may lead to advances in areas such as energy, electronics, communications, navigation, and medical technology. Because of these workers, lasers can now be used in surgery and microwave ovens are in most kitchens. Astronomers and physicists typically work on research teams with engineers, technicians, and other scientists. Some senior astronomers and physicists may be responsible for assigning tasks to other team members and monitoring their progress. They may also be responsible for finding funding for their projects and therefore may need to write applications for research grants. Although all of physics involves the same fundamental principles, physicists generally specialize in one of many subfields. The following are examples of types of physicists: Condensed matter physicists study the physical properties of condensed phases of matter, such as liquids and solids. They study phenomena ranging from superconductivity to liquid crystals. Astrophysicists study the physics of the universe. Astrophysics is a term that is often used interchangeably with astronomy. Particle and nuclear physicists study the properties of atomic and subatomic particles, such as quarks, electrons, and nuclei, and the forces that cause their interactions. Medical physicists work in healthcare and use their knowledge of physics to develop new medical technologies and radiation-based treatments. For example, some develop better and safer radiation therapies for cancer patients. Others may develop more accurate imaging technologies that use various forms of radiant energy, such as magnetic resonance imaging (MRI) and ultrasound imaging. Atomic, molecular, and optical physicists study atoms, simple molecules, electrons, and light, and their interactions. Some look for ways to control the states of individual atoms, which might allow for further miniaturization, or contribute toward the development of new materials or computer technology. Plasma physicists study plasmas, which are considered a distinct state of matter and occur naturally in stars and interplanetary space and artificially in neon signs and plasma screen televisions. Many plasma physicists study ways to create possible fusion reactors that might be a future source of energy. Unlike physicists, astronomers cannot do experiments on their subjects because they are so far away that they cannot be touched or interacted with. Therefore, astronomers generally make observations or work on theory. Observational astronomers observe and collect data. Theoretical astronomers analyze, model, and theorize about how systems work and evolve. Some astronomers specialize further into other subfields. The following are examples of types of astronomers who specialize by the objects and phenomena they study: Planetary astronomers focus on the birth, evolution, and death of planets. They may try to discover planets outside our galaxy. Stellar astronomers study stars, black holes, nebulae, white dwarfs, and supernovas. Solar astronomers study the sun. They study the sun’s many complex systems, such as its atmospheres, magnetic field, and they investigate new ways to study it. Galactic astronomers study the Milky Way galaxy, the galaxy in which we live. Cosmologists and extragalactic astronomers study the entire universe. They study the history, creation and evolution, and the possible futures of the universe and its galaxies. These scientists have recently developed several theories important to the study of physics and astronomy, including string, dark matter, and dark energy theories. The following are examples of astronomers who specialize by how they study objects and phenomena: High-energy astrophysicists study objects or phenomena by collecting and analyzing x rays, gamma rays, and other forms of high-energy rays that can help locate and study black holes or neutron stars. Optical astronomers use optical telescopes, which collect visible light, to study their subjects. Telescopes that collect visible light often have digital cameras that create an image on computer screens. Radio astronomers analyze the radio spectrum for data about their subjects. These astronomers often study quasars, which are the high-energy nuclei of distant galaxies, and were the first to find compelling evidence for the Big Bang theory. Theoretical astronomers generally do not collect data through observation, but analyze large data sets that others collect to create new theories or find new anomalies. Growing numbers of physicists work in interdisciplinary fields, such as biophysics, chemical physics, and geophysics. For more information, see the profiles on biochemists and biophysicists and geoscientists. Many people with a physics or astronomy background become professors or teachers. For more information, see the profiles on high school teachers and postsecondary teachers.
<urn:uuid:3bcda075-194e-457b-b7ae-31c807588146>
CC-MAIN-2015-11
http://www.bls.gov/ooh/life-physical-and-social-science/print/physicists-and-astronomers.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463658.66/warc/CC-MAIN-20150226074103-00193-ip-10-28-5-156.ec2.internal.warc.gz
en
0.934778
1,449
3.671875
4
To highlight the direction for life and physical sciences aboard the International Space Station, a panel of experts gathered May 21 for the Destination Station: International Space Station Science Forum. This forum, the first in a new series of public discussions dedicated to research aboard the station, emphasized current and future microgravity research that will prepare astronauts for long-duration missions farther into the solar system than ever before and provide lasting benefits to life on Earth. Not only does the space station provide a one-of-a-kind orbiting laboratory for researching many science disciplines in microgravity, but it also serves as a technology development testbed for deep space exploration and is a destination to grow a robust commercial market in low-Earth orbit. While the use of the space station continues to grow, science studied aboard is underway at an unprecedented pace. In addition to continued scientific opportunity, there also are key areas in which to focus on the most crucial research needs in space. In 2011, the National Research Council published a report on how best to use the space station. This report, entitled "Recapturing a Future for Space Exploration: Life and Physical Sciences Research for a New Era," established priorities and provided recommendations for life and physical sciences research in microgravity for the 2010-2020 decade. "We took a broad look at what research needed to be done in the physical sciences and the life sciences to underpin the future of space exploration," said Elizabeth Cantwell, director for mission development in the engineering directorate at Lawrence Livermore National Laboratory in Livermore, California, and co-chair of the National Research Council's decadal study. "We recommended that because animal studies underpin so much of our knowledge and understanding of human health terrestrially, that animal studies be supported more strongly in the space station science program and that microbial studies be beefed up in the form of long-term ability to study microbes in space on the space station." Among other recommendations for the space station, the report endorsed a clearly defined and prioritized integrated life and physical sciences research portfolio and associated objectives. This report detailed seven major disciplines for focus by station research, including plant and microbial biology and animal and human biology. Life science research already conducted aboard the space station includes studies of protein crystals, pharmaceutical treatments and model organisms like plants and fish. Model organisms have characteristics that allow them to easily be maintained, reproduced and studied in a laboratory and have a genetic makeup that is relatively well-documented and well-understood by scientists. Upcoming research in the area of -omics, the study of the entire complement of biomolecules like proteins or genes, and in rodent research will further enable humans to carry out long-term space exploration and support a greater understanding of how gravity shapes fundamental biological processes. In response to the report, "we identified new facilities that we needed, like new rodent and plant habitats, and starting this year, those facilities are going to keep coming online one-by-one, and each will be used on every flight over and over on the space station for the next 10 years," said Julie Robinson, Ph.D., chief program scientist for the International Space Station. Protein crystals have been studied in microgravity throughout the space station's assembly, and investigations using protein crystals continue today. High quality crystals grown on the space station are used to determine protein structure. This helps researchers understand better protein the three-dimensional structure of proteins and may lead to designing new therapeutics for diseases. In fact, a previous study of protein crystals on the space station led to the discovery of a water molecule in a protein-inhibitor complex that now is being used to develop a treatment for Duchenne muscular dystrophy. The Center for the Advancement of Science in Space (CASIS), the non-profit organization that manages the U.S. portion of the space station designated as a national laboratory, currently is coordinating other protein crystal growth investigations with potentially significant results. The Crystallization of Huntingtin Exon 1 Using Microgravity (CASIS PCG HDPCG-1) seeks to crystallize huntingtin, a protein associated with Huntington's disease. Meanwhile, the Advancing Membrane Protein Crystallization By Using Microgravity (CASIS PCG HDPCG-2) investigation seeks to crystallize the cystic fibrosis protein and closely related proteins to contribute to research for improved treatments for cystic fibrosis. Past and future research using model organisms, such as plants, microbes like yeast or animals, advances knowledge about the influence of microgravity on cells. Taking these organisms to space allows for examination of growth and development and physiological, psychological and aging processes without the impact of gravity. One such investigation, the Commercial Biomedical Testing Module (CBTM): Effects of Osteoprotegerin on Bone Maintenance in Microgravity studied mice on the space station to understand better a drug therapy for bone health and how it functions. The research showed that mice treated with osteoprotegerin exhibited decreased bone substance loss compared to untreated mice. The findings in orbit were combined with ground study data and included in a drug application to the Food and Drug Administration, resulting in the pharmaceutical Prolia, which is used to treat osteoporosis. Upcoming CASIS rodent research will provide pharmaceutical evaluation of muscle atrophy. The recently developed geneLAB research platform greatly expands life science investigation in microgravity. Through the geneLAB platform, scientists will have access to tools aboard the space station that enable drug development and biomedical research, expanding investigation into many more types of disease systems. The geneLAB model allows researchers to study several types of model organisms routinely used in genetics research on Earth, including bacteria and fungi, plants, fruit flies, worms, fish and mice. "Instead of representing a particular piece of space hardware or equipment, or a single mission or study, geneLAB is a new research model that enables a wide range of science experiments that will seek to understand how exposure to spaceflight affects living issues at the biomolecular and genetic level," said Marshall Porterfield, Ph.D., director of Space Life and Physical Sciences in the Human Exploration and Operations Mission Directorate at NASA Headquarters in Washington. While this expansion of research is happening 250 miles above Earth in the orbiting lab, astronaut and Expedition 40 commander Steve Swanson, Ph.D., provided details about conducting that research during the science forum via live downlink from the space station. "When we're up here, we try to get as much science as we can done each and every day," said Swanson. "One of the advantages of being a national lab is that we get to help other government agencies and other companies do research and that, in turn, helps our economy." With the Obama Administration's commitment to extend the space station to at least 2024, scientists have an additional 10 years of research opportunity for new discoveries, medical breakthroughs and advancements in technology development. Many dedicated researchers have already discovered the invaluable opportunity for their investigations aboard the space station and are producing benefits to people on Earth. The findings also continue to advance the body of scientific knowledge that will help launch NASA's human deep space exploration goals into reality. Explore further: CASIS-sponsored research heads to space station aboard SpaceX-3
<urn:uuid:cc10bd12-baee-42f4-9738-5c84d9fd07fc>
CC-MAIN-2015-11
http://phys.org/news/2014-05-forum-highlights-future-aboard-international.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462555.21/warc/CC-MAIN-20150226074102-00029-ip-10-28-5-156.ec2.internal.warc.gz
en
0.927942
1,465
3.234375
3
The laser turns 50 On May 16, 1960, Hughes Lab researcher Theodore Maiman built the world's first laser, even as two Bell Labs researchers got the patent for the innovation. Fifty years ago Sunday, a Hughes Labs researcher named Theodore Maiman changed the world. That day, Maiman became the first person on Earth to build a working laser, something that colleagues at a number of other companies and institutions had been feverishly trying to do for months or even years. Coming out of World War II, explained Hughes Lab veteran and current Raytheon optics and lasers senior principal physicist Daniel Nieuwsma, many people were working with radar and were looking or ways to boost their power. One method that was tried was using masers, or microwave amplification by stimulation of emission of radiation. Essentially, these are devices that, according to Stanford's Gravity Probe B program, set "up a series of atoms or molecules and excites them to generate the chain reaction, or amplification, of photons." The maser was first postulated by Albert Einstein in 1917, but it wasn't until after World War II that anyone built one. But now, in 1960, people were looking to move beyond the maser to what was being referred to as the laser--or light amplification by stimulated emission of radiation--essentially an optical maser. "Everyone was looking to make this optical maser work," Nieuwsma recalled, but Maiman "was the first to get everything together." And on May 16 of that year, Maiman, using a flash lamp to simulate a pink ruby rod--the very first generations of lasers were solid state using a ruby crystal--crafted and used, the world's first laser. That breakthrough has had a major ripple effect. Today, lasers are used all around the world in a wide range of industries and government agencies, from the consumer electronics to science to law enforcement, the military, entertainment, and many others. They can be small devices, like diode lasers, or huge systems with massive applications. And it all started on May 16, 1960. Hughes made it, but Bell Labs got the patent While Maiman was the first to actually build a laser, he wasn't the one who got the patent for the invention. That honor went to two researchers at Bell Labs named Charles Townes and Arthur Schawlow. In 1958, after working for eight months, the two men finished a paper describing their work on the laser, despite the fact that they had not actually built one. That paper, which proposed the idea that the principles of the maser could be applied to the spectrum's optical regions, was published in the December 1958 issue of "Physical Review," notes a Bell Lab Web page on the history of the laser. Two years later, the two men received U.S. patent No. 2,929,922 for their scholarship on the laser. Yet it was still Maiman who will go down in history as the man who invented the suddenly very much in demand technology. According to Nieuwsma, management at Hughes--a precursor to Raytheon--had been listening to people in the field, like Schawlow, who didn't believe that the ruby was the right material for expanding the maser into the optical regions of the spectrum. But Maiman had what Nieuwsma now called a "nine-month window" and was able to finally work out how to employ a short pink ruby rod in his work. The benefit of the ruby rod was that Maiman was able to stimulate ions in its crystal, which began to store energy. The energy turned to light and the next thing you know, Maiman had created the laser. Because Hughes was a defense contractor, management wanted to use Maiman's new invention mainly for , Nieuwsma recalled. First up, he said, was a 1961 project to make laser range finders that could fire a laser pulse at a distant target and make easy work of measuring the distance to the target. Hollywood has long loved lasers. What's your favorite laser-related movie or TV moment? As well, Hughes, in conjunction with the U.S. Army, was by the mid- to late 1960s working on laser target designators, Nieuwsma said, which allow a target to be illuminated by laser pulses which, in turn, can be focused on by a laser-homing bomb or other munition. The result, he said, was that it was now possible to very accurately blast a target. This became incredibly important during the Vietnam war, continued Nieuwsma, when, with the help of a laser target designator, the U.S. Air Force was finally able to knock out the Thanh Hoa bridge in Vietnam, a span that it had previously attacked with 873 bombing sorties, none of which was accurate enough. In May 1972, he continued, the Air Force was finally able to destroy the bridge. But there were also nondefense purposes that companies like Hughes and Raytheon were interested in. For example, in 1965, Nieuwsma said, Raytheon built the first laser welder, a device capable of welding multiple pieces in "very delicate welding operations" together. Lasers were also employed in ophthalmology, for things like retinal detachment, as well as in dentistry and in surgery, because lasers can instantly cauterize a wound. In the auto industry, lasers became an efficient and safe way to cut sheet metal, while more recently, lasers have become a mainstay of the fiber optics in the telecommunications industry. And that, according to Bob Byren, a Raytheon researcher, is because lasers are three orders of magnitude more efficient than masers. So lasers, he said, have become the backbone of the telecom industry. To Byren, another important element of lasers is that they are mono-chromatic. That means they are one color, a useful factor when someone is trying to pinpoint a military target. By filtering out the single color of the laser, it can be possible, using infrared cameras, to illuminate a target with a laser in such a way that those involved with the target will never know. Lasers in the real world But seriously: lasers have a lot of real-world uses. What do you think is most significant? Another application would be for sensing chemical weapons. According to Byren, a laser puts out a single very narrow line that can be matched with the spectroscopic features of the chemical that, say, an army is trying to detect. That would be useful, Nieuwsma said, for detecting a chemical cloud coming at you. Similarly, though, a laser could be used in a civilian case for monitoring chemical pollution coming from, say, the smokestack of a factory. And while the very first lasers were mono-chromatic and solid state, scientists have in the years since found a way to create lasers in a range of colors and wavelengths, as well as power. In the early days, as with Maiman's invention, a solid state laser rod was excited by a flash lamp. The laser rod itself was being excited by light, explained Byren. But then came carbon dioxide lasers where the rod could be excited by an electric discharge. And then came chemical lasers where the major element could come from a mixing of chemicals. And then came semiconductor lasers and diode lasers, new systems that relied on different materials and which could be very bright. Indeed, said Nieuwsma, for the last 20 years, diode lasers have taken the place of the flash lamp in the optical stimulation of the laser crystal. While lasers were gaining a lot of momentum in the military and in industry and medicine in the early years, it may not have been until the 1970s that the general public got their first taste of the technology. Oddly enough, some of the public's first experiences with lasers would have been in places like Laseriums and in the supermarket where bar code scanners became the norm. Fifty years later, the laser has become one of the most ubiquitous elements of modern life. We may not always realize they're there, but they are. But in 1960, though the scientific world was well aware of what the technology was capable of, it still took one man--Theodore Maiman--to build the first one. And the rest is history.
<urn:uuid:53cbe68d-4a66-4295-81ad-a2b11a3bee9e>
CC-MAIN-2015-11
http://www.cnet.com/news/the-laser-turns-50/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463658.66/warc/CC-MAIN-20150226074103-00193-ip-10-28-5-156.ec2.internal.warc.gz
en
0.974397
1,736
4.03125
4
Fossils are not all mixed up in the sense that we see animals from different time periods mixed in with dinosaurs. If all these animals coexisted with one and other we should see bones, not hundreds of miles away, but embedded in the same rock strata. Your example of a small dog like creature carries no weight. It has been well known for some time now that small mammals lived along side dinosaurs. Add to that that your example is dog-like not a dog ... or a wolf or any other modern animal. We have found fossils of dinosaurs that have eaten other dinosaurs, why haven't we found fossils of dinosaurs that have eaten deer ? It was the dinosaur’s extinction that allowed mammals to evolve into the multitude of species we see today. What I am waiting to see is a modern day animal’s bones found in the same strata that date to the same time period as a dinosaur. Not just nearby but embedded in the same rock. This should be a fairly simple task; we find multiple species of dinosaurs embedded in the same rock all the time. You pick the species, but it must exist as a living creature today. If I understand you correctly, you are postulating that given time and reptile could grow to be as large as a dinosaur. While it is true that reptiles are technically indeterminate growers, if there were no limits to their growth, then we should see dinosaur sized geckos.. but we don’t. Why is that? There can be other limits to an animal’s size other than genetic code to stop it from growing. . Structurally its body form simply might not support a huge amount of body weight, or the organs it has are inappropriate for large sizes.For example, some dinosaurs had 'brains' in their tails to help them manage their bodies. Clearly dinosaurs were disposed to large sizes, geckos are not. This new petroglyph is better than the first, but I still see problems here. I went back a page from the link you sent for the petroglyph. They printed this quote from the park guidebook - "There is a petroglyph in Now the cave paintings in The petroglyph itself presents some problems as well There are anatomic anomalies from what we know about sauropods. It is not likely that sauropods dragged their tales as depicted here as evidenced by the lack of tail marks when we find foot prints such as those in Glen Rose Texas. The head here is depicted as being very round, however sauropods heads were elongated much like a horses. It is not known if sauropods smiled or not. Here are two unenhanced pictures of the petroglyph . The‘sauropod’ is still reasonable visible but there seems to be something missing. Hmmm. what could it be ? Right , the glyph of the man. I admit that when taking pictures of rock faces, not all details are always visible. That notwithstanding, in the example you sent the in the man is very visible and is in fact much clearer than the sauropod, but is completely indiscernible in the unenhanced photo. You would think that there would be at least a hint of a man figure there, but no it is just not there . I can’t go so far as to say that the pictures on BIBLE.CA have been altered, but it does seem strange that the man is not visible in the pictures I found. I am trying to find an image analyst to take a look at the BIBLE.CA pictures and determine if it actually has been modified. And while we are on the man figure .. why doesn’t the park literature make mention of it ? This would be a fairly important fact. Even without the guide in hand, I can safely surmise that there is no mention of the man glyph in the guidebook because if there was, surely BIBLE.CA would have quoted that as well, but they didn’t. Still, even without the man figure there does appear to be petroglyph sauropod that was created by Native Americans between 400 to 1300 A.D. So let take a closer look at the glyph itself. Here are two pictures of the glyph outlined to showing the entire glyph, not just the 'sauropod' As you can see, when the entire glyph is exposed the picture looks far less like a sauropod than BIBLE.CA would lead you to believe. In one outline the ‘tail’ is not attached, and in both outlines there appears to be a an extra set of legs attached to the tail. There is something growing out of the back in both. While I suppose it still looks something like a sauropod, I don’t see the clear sauropod image that is depicted on BIBLE.CA. Finally there is your last statement that ‘God-did-it’. How do you know this ‘supernatural force’ is your god? Why not Allah-did-it, Buddha-did-it , Vishnu-did-it, Fairy’s-did-it or the Flying Spaghetti Monster-did-it ? There is as much empirical data for each of these supernatural beliefs as there is for yours. That being said, if your final answer is God-did-it then I simply reject that as an explanation. As Christopher Hitchens said, “What can be asserted without proof can be dismissed without proof’. And while absence of evidence may not be evidence of absence it is certainly absence of probability. If not then the existence of fairies is equally possible as the non-existence of fairies. Don’t get me wrong, you are welcome to your faith, but I don’t think it fair to expect others to accept or even respect that which has no evidence.
<urn:uuid:98675298-a60f-4786-90e5-8d27249cec39>
CC-MAIN-2015-11
http://the-non-flood.blogspot.com/2009/04/non-flood.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463679.20/warc/CC-MAIN-20150226074103-00206-ip-10-28-5-156.ec2.internal.warc.gz
en
0.968404
1,232
3.484375
3
Space Shuttle Atlantis sits poised for the STS 129 launch from Pad 39 A on 16 November 2009. Atlantis would likely fly a proposed new flight as STS-135. Credit: Ken Kremer The end of the Space Shuttle Era is rapidly approaching and with it some urgent questions including, “How will the US support continued use of the ISS?” and “What would NASA do if granted an additional shuttle flight?” Currently, only 5 flights remain on the manifest and right now, the final shuttle flight is set for September 2010. This deadline and policy was decreed by the Bush Administration and simultaneously coincides with the end of ISS assembly and the end of the Fiscal 2010 budget year. Thus far the Obama Administration has not announced any policy changes despite recurring questions from Congress and the press as the retirement approaches. Then comes the big “gap” in US human spaceflight launch capability between the looming shuttle shutdown and the debut of the Orion capsule. Orion will not be ready until 2015 or later. So there will be a minimum 5 year “gap” when NASA cannot launch its own astronauts or even unmanned cargo supply vessels to the International Space Station which will operate until at least 2015. Hence the practical questions from the US side on “How to re-supply the ISS?” NASA will then be utterly dependent on Russia to launch US astronauts to the ISS at a cost of some $50 million per Soyuz seat. Several companies are receiving NASA funding under the COTS program to develop cargo up-mass vehicles to the ISS and are also exploring crewed options. For the most part, the general public is unaware of these facts. Congress has been fully aware of this quandary since 2004 when President Bush announced new NASA goals as part of the VSE or “Vision for Space Exploration” to return to the Moon and beyond to Mars. NASA’s budget has been cut in the intervening years and the “gap” has grown longer. Insufficient funding from Washington, DC directly caused a slower development pace for Orion and the Ares rocket. One much discussed “gap” closing measure is to slightly extend the deadline for closing out the shuttle program by adding 1 or more new flights. This action requires a direct decision soon from President Obama and enabling funding from Congress. If granted the authority to extend the Shuttle program with an additional flight, NASA officials at a very high level have already decided on paper what such a mission would entail. Bill Gerstenmaier, NASA Associate Administrator for Space Operations says that the team has done some planning for what is dubbed a ‘contingency’ flight. “It sits on the manifest as a ‘contingency’ if we need to fly it. It would be prudent to have an MPLM (pressurized Multi-purpose logistics module) in there to carry spares and restock station. We originally wanted to have a back up shuttle available in case we had a situation where we needed to do a contingency crew support to keep them in orbit for some period of time.” At the Kennedy Space Center (KSC), I spoke with Scott Higginbotham about the details of the ‘contingency’ flight. Scott is a shuttle payload mission manager at KSC, most recently for STS-129 . He told me, “If there was to be another mission then the plan is to fly another MPLM. We have two more MPLM’s but only one is flight worthy. For the call up mission, the possible new last flight, we would fly ‘Raffaello’. But NASA needs more money and work modifications to get ‘Raffaello’ ready and up to speed”. NASA has three MPLM’s total, named ‘Leonardo’, ‘Raffaello’ and ‘Donatello’ after significant engineers in Italian history and the Ninja turtles too. All were built by Alenia in Italy under contract to the European Space Agency (ESA). ‘Leonardo’ will be permanently attached on the current last flight, STS 133, after “beefing up the outside to provide extra micrometeoroid debris protection for the module. That will allow it to stay on orbit,” according to Gerstenmaier. ‘Leonardo’ would then be redesignated as a Permanent Multipurpose Module, or PMM. Initially it will be docked at a space facing port on the Harmony connecting node. “Since the MPLM’s only go up on short sortie missions, their shielding is not as thick as the other station elements,” said Higgenbotham. ‘Leonardo’ flies once more in March 2010 and will then be modified to add shielding. “Donatello will never fly. It’s become our spare parts man to be raided if needed.” Alenia also constructed the Tranquility and Cupola long duration modules I observed recently at a ceremony inside the KSC Space Station Processing Facility (LINK). While inside the station facility, I inspected all three of the MPLM’s (see photos). “Because of the limited number of shuttle missions left and budget constraints, it makes more sense financially to just fly ‘Leonardo’ over and over again. ‘Raffaello’ is being maintained just in case” added Higgenbotham. “We know that we would like to fly more supplies to the station and bring things home. But whether we actually go prepare ‘Raffaello’ for that contingency mission is being discussed. So we are doing some of the advanced exercises in case we get turned on.” “We know the big picture of what would be included. It would include science experiments, spare parts, food, clothing, station consumables and what the crew needs to get by day to day”, he said. “So if I have the ability to launch another MPLM mission, then I can loft thousands of pounds that I don’t need to pay a commercial vendor or the Russians to do,” Higgenbotham explained. “We can save them for other items that may break down in the future.” Large outside items would probably not go up on that mission. “The expectation is we are going to clear the house of all large external parts by the time the last mission flies. All those are planned for going up on the already manifested missions. We have analyzed what’s needed over the lifetime of the station if we extend out to 2020,” said Higgenbotham. The station must be continually resupplied with spare parts and logistics for its remaining lifetime whether it’s 2015 or longer to 2020 which is far beyond the upcoming retirement of the Space Shuttle. “NASA has one External Tank (ET) already built for the ‘contingency’ mission” according to Mike Moses, shuttle integration manager at KSC. Two others exist only in pieces he told me. Since it takes 3 years to build a new ET from scratch, there would be some launch delay for any further missions beyond the possible ‘contingency’ flight. The future goals of NASA and US human and robotic spaceflight hangs in the balance awaiting critical choices by President Obama and political leaders in Washington, DC. At this point, there is no indication of when President Obama will make a decision on goals or funding. With each day’s delay, the chances to extend the shuttle program are diminished as US manufacturing production lines are shut down, more shuttle workers are layed off and their high technology skills are lost. About 7000 shuttle workers will lose their jobs at KSC and many more across the US as the Space Shuttle program is terminated in the midst of the current recession.
<urn:uuid:a2a63703-ca13-4361-81f3-0e829a653245>
CC-MAIN-2015-11
http://www.universetoday.com/47120/what-would-nasa-do-with-an-added-shuttle-flight/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463679.20/warc/CC-MAIN-20150226074103-00207-ip-10-28-5-156.ec2.internal.warc.gz
en
0.949546
1,640
2.703125
3
In What the Nose Knows, as well as here on FirstNerve, I’ve questioned the conventional wisdom about the dog’s sense of smell, namely that it is amazingly better than our own. Recent evidence suggests that the human nose, in terms of its sensitivity as an odor detector, is quite competitive with the canine nose. The dog’s ease in odor tracking may have more to do with differences in sniffing behavior, nostril design and the amount of brain devoted to analyzing olfactory information. Still, the conventional narrative gets a boost with every report of dogs smelling termites, bedbugs, abnormal glucose levels in diabetics, bowel cancer, ovarian cancer, and so on. Just because a trained scent dog is handy in a pilot study (“does disease X have a smell?”) doesn’t prove that dogs alone are able to make this discrimination. And unless tight controls are built into the experimental design, we still have to rule out that subtle, unintended cues from the dog’s handler are giving us a false result. This was brought home by a new study that examined the role of human handlers in the response of working scent dogs. Conducted by Lisa Lit and her colleagues at the University of California at Davis, the experiment looked at canine scent-tracking behavior without using any scent at all. It’s a trans-species examination of what social psychologists call “demand characteristics”, i.e., cues that study participants use to glean the aim of an experiment and behave accordingly. In this case, 18 dog-plus-handler teams—all trained, certified, and experienced in the detection of drugs or explosives—search four rooms in a church for contraband. In view of the teams, an experimenter set down a metal box of gunpowder or marijuana samples. The samples, however, were never opened; this was a ruse to make the room searches believable. Each dog/handler team searched the four rooms twice. An observer noted when and where the dog signaled an “alert.” Of course the correct response in every trial was “no alert,” as there were not drugs or explosives present. What were present, on some trials, were decoys: a red sheet of paper (for the handlers to notice) or a new tennis ball and a couple of Slim Jims (for the dog to notice), or both. Lit and her team were interested in how alerts by the scent dog (i.e., false alarms) were distributed across the experimental conditions. The great majority of false alarms happened in rooms with a red sheet of paper; this included trials with and without a scent decoy. To Lit and her team, this suggests that human influence on handler beliefs affects alerts to a greater degree than dog influence on handler beliefs.Lit et al., consider and dismiss the possibility that handlers were calling alerts in the absence of corresponding behavior from the dog. Instead, they suspect that the dogs were responding to subtle cues from the handler, who in turn was influenced by the apparent location cue of the red paper. This would be an instance of the Clever Hans Effect. (Dig up your Psych 1 notes, people.) Even without formal training, dogs respond to human cues such as pointing, nodding, head turning and gazing. The mental pull of these cues is powerful, to the point that a companion dog looking for food will ignore a bowl full of food and head to an empty bowl if directed there by his owner. Highly trained scent-detection dogs don’t fall for obvious distractions; clearly, however, they are not immune from subtle, even unintended, influence from their handlers. Scent-tracking dogs have proven useful in search and rescue missions, detection of contraband, and tracking of criminal suspects. Whether the results of so-called scent lineups conducted by police dogs should be admitted as courtroom evidence is another question altogether. Radley Balko wrote about a recent case in Texas that brought these issues to the forefront. Research on the olfactory ability of dogs are becoming increasingly sophisticated. While some results, like Lit’s, raise important cautions, another new study adds to the positive side of the ledger. It involved a rigorous and well-designed assessment of the dog’s ability to distinguish identical human twins (aka monozyogtic or MZ twins) by smell. Previous studies (in 1955, 1988, 1990 and 2006) have been a mixed bag. It has been claimed that MZ twins can be distinguished, cannot be distinguished, cannot be distinguished when they share a similar diet, and can be distinguished by some dogs but only if the twins don’t live together. The new study, by researchers in the Czech Republic, starts on a strong note by using a single breed of dog with similar levels of training, namely ten German Shepherds, each a trained and proven scent-detection animal employed by the Czech Republic Police. The key body scents were provided by pairs of kids living together: two sets of MZ twins and two sets of DZ twins. Their MZ/DZ status was confirmed by DNA testing. BO was collected according to Czech Police forensic protocols (cotton pads in glass jars) and presented to the dogs in a seven-jar “lineup.” The dog signaled a scent match by lying down next to the jar that smelled like the target his handler gave him at the start of each trial. Various combinations of target and lineup scents were used; on trials when the target scent was not in the lineup, the correct response for the dog was to not lie down. Remarkably, every dog made the correct judgment in every trial (10 dogs, 60 trials each). It seems the mixed results of earlier studies were due to variable skill levels among the dogs tested. Still, not one single incorrect response in 600 trials? (Experimental data with zero statistical variance is, uh, a little unusual.) On the other hand, if it’s this easy for dogs, I bet that humans are able to smell the difference between MZ twins living together. The studies discussed here are “Handler beliefs affect scent detection dog outcomes.” by Lisa Lit, Julie B. Schweitzer, & Anita M. Oberbauer, published in Animal Cognition 14:387-394, 2011, and “Dogs discriminate identical twins,” by Ludvik Pinc, Luděk Bartoš, Alice Reslová, & Radim Kotrba, published in PLoS One, 6(6):e20704, 2011.
<urn:uuid:6f009dbe-35a2-4106-8b03-4599790808a5>
CC-MAIN-2015-11
http://www.firstnerve.com/2011/07/dogs-life-canine-olfaction-put-to-test.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463411.14/warc/CC-MAIN-20150226074103-00142-ip-10-28-5-156.ec2.internal.warc.gz
en
0.956895
1,359
2.5625
3
ADDIS ABABA (Thomson Reuters Foundation) - Funeral societies may make their money from the business of bereavement, but in Ethiopia they are also important social networks that use kinship and trust to cushion communities from the worst effects of disasters. Ethiopian burial and mutual aid societies known as “iddirs” are a form of what researchers call social capital - the bonds, customs and trust that connect people in a society. Local organisations and informal networks are a source of resilience that help poor, vulnerable people withstand economic, environmental and political shocks, according to new research from the International Food Policy Research Institute (IFPRI). People can draw on social capital in confronting many different kinds of stresses, including climate-linked disasters, but it remains a relatively unexplored resource, IFPRI says. "We call the bonds that tie people together social capital because they can be used as assets to help people get higher social returns - in terms of community support - in the future, enabling them to cooperate in addressing a crisis," Ruth Meinzen-Dick, a senior research fellow at IFPRI, told Thomson Reuters Foundation at a recent conference in Ethiopia on building resilience for food and nutritional security. A research paper by Meinzen-Dick and IFPRI research analyst Quinn Bernier, which was presented at the conference, highlights the role of social capital in making it easier for individuals, households and communities to share and manage risk. "In Ethiopia, iddirs comprise strong social ties that have been expanded beyond just dealing with funerals to also provide health insurance,” Meinzen-Dick said. “Health shocks are one of the biggest forms of loss that push people into poverty, and with the iddirs, people know each other and cooperate in areas (like health insurance) where the formal sector or government are reluctant to go." Iddirs operate on the basis that if one person dies, the rest of the group pay for that person's funeral. In some places, a funeral can bankrupt a family, which makes funeral societies an important way of helping people shoulder the financial burden. The model has also been applied in Ethiopia’s pastoral communities. Through family-based and other alliances for managing rangeland and water resources, herders who have grazing allow those without to feed livestock on their land. Similar associations have provided basic protection and support in many other parts of the world. “U.S. immigrant groups (a long time back) formed these kinds of funeral societies, and some have evolved into big life insurance societies today," Meinzen-Dick said. "If we talk about government programmes coming into the community, and we assume it is a blank slate where the government has to provide, we are missing what is already going on in that community, and are even destroying existing social capital," she added. IFPRI’s research shows that poor countries and communities - especially vulnerable groups such as women and children - are subject to multiple stresses, including food price rises, financial crisis, droughts, floods, disease and conflicts that disrupt food security. The study of how individuals, bigger groups and states prepare for and recover from shocks has given rise to the concept of resilience, which indicates the means by which people cope with a crisis and, ideally, emerge from it in a better situation. Another example of social capital at work is migrant networks in the Philippines, where community bonds help local people deal with economic and other shocks. A 2012 survey of Bukidnon, a province in the Northern Mindanao region, showed that all households had at least one person they could rely on in an emergency. Study authors found that 75 percent of the households surveyed could access a network to ease economic losses. Others reported networks for obtaining price information, assistance with family problems, household chores, taking care of family members, and even technology adoption. Other examples of resilience-building social capital cited by Meinzen-Dick included Pakistan’s national rural livelihoods programme, which helps community groups participate in developing village infrastructure to improve their productivity, such as building roads. Members, particularly women, are provided with agricultural credit so they can purchase inputs to boost their yields and market their produce more effectively. In India, the Self Employed Women's Association (SEWA), a trade union and federation of more than a million members who earn a living through their own labour or small businesses, offers services like healthcare, legal aid, credit and insurance. And in Nepal, FECOFUN, a federation of community forest user groups, partners with the government and advocates for policies that support members’ livelihoods. It also provides grants and training to help them manage their resources better. A FOOD-SECURE FUTURE More than 800 development experts at the IFPRI conference in Addis Ababa discussed how to include resilience in a new global development agenda - now being crafted - by strengthening policies, investments and institutions to achieve food and nutritional security. Ahead of the expiry of the Millennium Development Goals next year, negotiations on a new set of post-2015 development targets are heating up. IFPRI Director General Shenggen Fan said they must take resilience seriously if hunger and under-nutrition are to be tackled definitively. "A resilience approach has the potential to improve livelihoods and support economic growth and transformation while mitigating future shocks," said Fan. "In fact, it can help us tackle issues that run across the entire agriculture, food, nutrition and environmental system." Practical examples include Ethiopia's PRIME programme for pastoralist areas, run by aid agencies and backed by the U.S. government. It integrates nutrition, early warning systems and skills transfer, linking herders to markets while building their ability to adapt to environmental change. They might choose to diversify into keeping livestock that are less susceptible to drought, for example. In Tanzania, World Vision has brought smallholder farming, natural resource management and social safety nets together under its “Secure the Future” programme. This takes a long-term approach that aims to equip people to cope with economic and climate-related shocks. Busani Bafana is a journalist based in Bulawayo, Zimbabwe, who covers climate change and agriculture issues.
<urn:uuid:e625e420-a007-4d2d-aef0-1e5066440d3c>
CC-MAIN-2015-11
http://www.trust.org/item/20140521131539-y3m2z/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464193.61/warc/CC-MAIN-20150226074104-00205-ip-10-28-5-156.ec2.internal.warc.gz
en
0.951469
1,285
2.65625
3
From a scientific viewpoint, causality is a concept that enables us to predict that such-and-such an event will soon occur as a consequence of an earlier event. For example, if you pour hot water on a ball of snow, it will start to melt. In the context of mathematical statistics, there's another concept, correlation, which can be applied to sets of events that have already happened, with a view to demonstrating that they appear to be interdependent. You might say that, faced with correlated events, we suspect the existence of causal relationships, but we are not able to specify them precisely. In certain cases, observers discover correlations between series of events that could not possibly be related by causality. For example, we might find that a graph expressing variations in the price of lemonade in Sydney over the last decade is almost identical to statistics concerning the number of foxes killed by hunters in England. Pure coincidence! In France, at the present moment, road safety authorities are dismayed by the fact that the number of deaths in accidents during the month of January was considerably higher than a year ago. Specialists immediately wondered why. Was there some causal factor behind this disappointing statistic? They have been unanimous in pointing out that there is indeed a strong correlation in France between road deaths and presidential elections. In other words, as strange it might seem, greater numbers of French drivers kill themselves when there's an election just around the corner. The suspected causal relationship involves the weird French tradition of presidential amnesties. In regalian style, one of the first acts performed by a newly-elected president is to grant amnesties to vast numbers of small-time delinquents and citizens who have committed petty misdemeanors such as parking their vehicle illegally or speeding. The alleged reasoning of pre-election drivers is as follows: If I were to drive recklessly and get pulled over by a gendarme, I might be condemned to paying a fine. But when the new president arrives on the scene next May, he/she will wash away our sins by granting the traditional amnesty. So, there's no reason why I should worry about getting pulled over by a gendarme. So, I'll drive recklessly. Now, that sounds a bit far-fetched. But experts swear it's a fact that French drivers "reason" in that weird way. I'm particularly interested in another concept, not unlike correlation, known as synchronicity: a term applied to coincidental happenings that are so amazing that observers get around to wondering if these events were not brought about mysterious forces that we do not yet understand scientifically. A typical case of synchronicity is when you come upon an old letter from a friend whom you haven't seen for ages and, while you're browsing through the letter, the friend in question phones you. It's not surprising that many serious people consider that believing in a concept such as synchronicity is akin to believing in magic. But some scientists are prepared to admit that certain coincidental happenings are so extraordinary that it's tempting to imagine them as instances of situations that we do not master totally in terms of conventional probability theory. Most often, when such happenings are discussed among people of a scientific bent, they soon end up evoking things such as quantum events or Heisenberg's uncertainty principle. My favorite personal synchronicity anecdote concerns the British novelist Lawrence Durrell [1912-1990], who was one of my heroes when I was a young man. I had heard that he lived in a village in Provence, and I imagined erroneously that the name of this village was Nîmes. In fact, Nîmes is a large city, and Durrell's village was located quite a long way away from the city. [My misunderstanding was like that of a French tourist in Australia who, having heard that a friend lives in the bush to the north of Sydney, starts searching for his friend by taking a taxi to North Sydney.] Be that as it may, I strolled around the heart of Nîmes, early in the morning, a little dismayed to discover that it was indeed a huge "village"... and nevertheless met up personally with Durrell, seated all alone at a café patio alongside the ancient Roman arena. Exceptionally, Durrell had driven into Nîmes early in the morning to get his automobile repaired. We spent an hour together, conversing about trivia such as Henry Miller's shock at the idea of having to use an outdoor dunny at Durrell's place, and Durrell's relatives in Tasmania who would regularly send him a crate of apples every year. I've often imagined that I had this marvelous encounter with my novelist hero, not through mere chance, nor even through a causal chain of events, but rather because—somehow or other—I had "willed" that I should meet him there, at that place and at that moment. Now, call me crazy, if you like, call me unscientific... but I can think of no better explanation of this synchronicity.
<urn:uuid:82e8887f-f046-492c-8bfa-34bf8cd0d4e1>
CC-MAIN-2015-11
http://skyvington.blogspot.com/2007/02/things-that-happen-conjointly.html?showComment=1204062840000
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462035.86/warc/CC-MAIN-20150226074102-00266-ip-10-28-5-156.ec2.internal.warc.gz
en
0.978011
1,040
2.609375
3
Where Were You? As the 40th anniversary of the Apollo 11 mission approaches, the Space Foundation wants to know where you were and what you were thinking on the historic evening of July 20, 1969, when Neil Armstrong placed the first human footprint in the Lunar Dust (and took this historic picture of Buzz Aldrin, while Michael Collins piloted the Command Module above). Watch your e-mail box for a request to send us your memories and your thoughts. And, since we know that most of the population alive today wasn't around in 1969, we'd like to hear what your parents or grandparents told you about their thoughts, too. Follow us on Twitter (SpaceFoundation) this month as we reminisce about what we consider one of the greatest moments in the history of humankind. Here's what some of our friends told us: As Apollo 11 approached the moon, my father, an Air Force pilot, was on his way to Viet Nam for a one-year tour of duty. We were living in Austin, Texas, dreading Dad's departure, but the Apollo 11 mission provided my brothers, sisters and me with a powerful - if temporary - diversion. In fact, you could say our collective fascination with aviation transformed into a family obsession with space flight. I always wondered why Buzz Aldrin didn't go first. Years later, I realized that he was the lunar module commander, so it was his job to ensure the ship's safety so that Armstrong could step out first. Everyone remembers who's first; but it takes a huge person to accept the role of No. 2. I got goosebumps not when Armstrong and Aldrin stepped on the moon, but when they stepped out of the capsule after a successful splashdown. I knew that if they could come home safely from the moon, then so could my Dad from Viet Nam. - Charley, American Airlines, DFW Airport, Texas At twelve, I was alone watching a Zenith c1968 color television. Proud of being America, astounded at the rate of progress. - LunarPioneer on Twitter I was 8 years old, living on a farm in Creston, Neb. My whole family gathered around our black and white TV to watch. I was sitting on a footstool next to my dad and was totally awestruck. I remember being so filled with emotion that I was crying - and of course my family teased me about that endlessly! - Barb, Verizon, Basking Ridge, N.J. I watched the moon landing at my aunt and uncle's farm in rural Augusta County, Va. A large antenna on the roof captured the signal from Harrisonburg, the nearest town with a TV station, about 15 miles away. My father's extended family crowded around the grainy black and white image in a small living room where, night and day, a police scanner constantly crackled in the background (a rural source of entertainment and breaking news). The house had no running water and was heated by woodstoves. My relatives acknowledged the event as they might react to an election in a foreign country, it happened, but had little relevance in their lives - it didn't impact the weather, the market price of eggs, or demand for milk. - Carol, Space Foundation, Colorado Springs, Colo. I was watching TV, "glued to the tube," trying not to miss even an instant, absolutely fascinated. - TaylorTB on Twitter I was going to summer school at Western State College in Gunnison, Colo., We didn't have much access to TV, but managed to watch this. It was pretty amazing. - Bev, Denver, Colo. I was growing up in Phoenix - it was a zillion degrees outside and I was so happy as a kid to have a bonafide excuse from mom & dad to be inside with A/C watching TV. The impact of the moment was too profound for a kid of 8 to really grasp, but I have carried that visual image of planting the flag in the moon dust my entire life. It has become an indelible life-time memory in black & white. Frankly, I still think the accomplishment is nothing short of astounding. - Barbara, Verizon, Southlake. Texas I was on the tarmac in a BWIA Boeing 727 Whisperjet on the island of Antigua enroute to Barbados for a surfing trip with my brother, [and some friends].. We were sipping Rum Punch in our seats when the pilot and captain of the flight announced through the loud speakers to all awaiting takeoff that "The Eagle Had Landed!" I vaguely remember him piping in the audio sound of the event through the speaker system on the plane so that we could actually join in on the event. The pilot had a British accent. So, the moment was even more surreal for me. I actually found myself losing track of where we were and what we were about to journey, as I was a huge follower of the NASA Space Program and every Mercury, Gemini and Apollo mission. P.S. This was my Woodstock! - Peter, University of Southern California, University Hills, Calif. Pictured: Buzz Aldrin on the Moon; photo by Neil Armstrong, courtesy of NASA
<urn:uuid:d920affc-cbf3-4478-b388-c418e327b926>
CC-MAIN-2015-11
http://www.spacefoundation.org/media/space-watch/where-were-you
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463444.94/warc/CC-MAIN-20150226074103-00163-ip-10-28-5-156.ec2.internal.warc.gz
en
0.97615
1,068
2.640625
3
Did you know? Elim is surrounded by an extraordinary diversity of rare fynbos plants, many of them medicinal. The first slave monument in South Africa was built at the Elim Moravian Mission Station, a village owned and managed by the Moravian Church. It is home to 2 500 people, all of them coloured, and most of them of slave descent. The mission station at Elim was established in 1824, when German missionaries arrived at the Cape. Biblically, Elim is the place the Israelites rested after crossing the Red Sea. It was a place of cooling waters and palm trees. In the Cape, Elim was also a refuge, a place of safety, initially for the indigenous Khoi people and later for hundreds of destitute freed slaves. The Elim Moravian Church was built in 1835, and is one of a few places of worship built in the Cape Dutch style. The mission station was established by Bishop Hallbeck on May 24, 1824 in what is now the Overberg region of the Western Cape. Fynbos abounds, and fig trees line the entrance to the village. Elim residents were taught trades and skills by the missionaries. The country's first slave monument was built in 1938, a century after emancipation, in homage to the people who had become the majority of the Elim community. The monument was "re-unveiled" in 2004 after falling into disrepair in the 1990s. It was rebuilt in time to mark the United Nations declaration that 2004 was the year to celebrate the victory of humanity’s struggle against slavery. From 1837 to 1840 the population of Elim doubled from 350 to to 715, and in 1854 it rose to 1 241 as more and more freed slaves sought refuge there. All three Moravian mission stations, Elim, Genadendal and Mamre, opened their doors to freed slaves. It has been estimated that there were up to 60 000 slaves in the Cape at the time of emancipation on 1 December 1834. Following their emancipation, many slaves were left destitute by their former masters. Some found refuge at the mission stations, where they were baptised and their names were changed. Each family was given a plot to build their homes, as well as garden plots and a subsidy to start off with. Many of the cottages are still whitewashed every year, the brilliant white offset by the dark thatch roofs, a skill at which Elim men are still very adept. Their thatching skills are sought the world over. The working water mill, which used to grind the flour for the local bakery, was restored to its original state and declared a national monument in 1974. Elim is still owned by the Moravian Church and the village has national heritage status. Even today whitewashed houses sparkle in the sun, most of the roofs are neatly thatched and all roads, still, lead to the beautiful Moravian Church. The church clock, which is more than 240 years old, was installed in 1914. The clock was built in Germany and was initially installed in a church in Herren, Germany in 1764. The old Mission Shop has been converted into a museum, filled with hand-crafted pieces and many photographs chronicling the community's history. A water mill dating back to 1833, boasting the largest wooden water wheel in South Africa, was restored in 1990. The mill can still be used for grinding wheat. A trip to Elim will not be complete without enjoying the local hospitality at the Old Mill Tearoom. The tearoom forms part of the heritage centre, where visitors can also learn more about the community's history. Church plays an integral part of life in Elim. Many people who have moved to Cape Town, go back regularly, to spend time with their family or to observe Easter and Christmas. The Moravian Brass Band also has a proud musical tradition. Travel tips & Planning info Who to contact Tel: +27 (0)28 482 1806/+27 (0)74 544 7733 Tel: +27 (0)28 482 1715 How to get here From Cape Town, it's a comfortable two-hour drive. Many roads lead to Elim. Best time to visit The flowers around the town are best in September, October and November, but Elim can be visited any time of year. Ask to see if your trip coincides with a special religious occasion. Around the area While in the area, don't miss the southernmost point of Africa. There are lovely towns in the area, including Napier, Bredasdorp, with its shipwreck museum, and Arniston, with its marine cave and beaches. Once you're there, most attractions in the tiny town are within walking distance. What will it cost A tour with local guide Emil Richter costs approximately R50 per person. Length of stay Two nights is ideal. Where to stay There is a simple guesthouse within the church complex, and meals are served. Don't forget to ask about the local bread, made with wheat ground in the historic water mill.
<urn:uuid:b24b0796-7848-4d14-afb7-590e6abc2e14>
CC-MAIN-2015-11
http://www.southafrica.net/trade/en/articles/entry/article-southafrica.net-elim-moravian-mission-town
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463411.14/warc/CC-MAIN-20150226074103-00142-ip-10-28-5-156.ec2.internal.warc.gz
en
0.975618
1,067
3.578125
4
|This article needs additional citations for verification. (February 2008)| In Hawaiian mythology, the deity Lono is associated with fertility, agriculture, rainfall, music and also peace. In one of the many Hawaiian legends of Lono, he is a fertility and music god who descended to Earth on a rainbow to marry Laka. In agricultural and planting traditions, Lono was identified with rain and food plants. He was one of the four gods (with Kū, Kāne, and Kāne's twin brother Kanaloa) who existed before the world was created. Lono was also the god of peace. In his honor, the great annual festival of the Makahiki was held. During this period (from October through February), war and unnecessary work was kapu (forbidden). In Hawaiian weather terminology, the winter Kona storms that bring rain to leeward areas are associated with Lono. Lono brings on the rains and dispenses fertility, and as such was sometimes referred to as Lono-makua (Lono the Provider). Ceremonies went through a monthly and yearly cycle. For 8 months of the year, the luakini was dedicated to Ku-with strict kapus. Four periods (kapu pule) each month required strict ceremonies. Violators could have their property seized by priests or overlord chiefs, or be sentenced to death for serious breaches. Lono and Captain Cook Some Hawaiians have believed that Captain James Cook was Lono returned and indeed this fact may have ultimately contributed to Cook's death (see James Cook - Third voyage (1776-1779)). It is uncertain whether Cook was taken for the god Lono or one of several historical or legendary figures who were also referred to as Lono-i-ka-Makahiki. According to Martha Warren Beckwith, there was indeed a tradition that such a human manifestation of the god [Lono] had actually appeared, established games and perhaps the annual taxing, and then departed to "Kahiki", promising to return "by sea on the canoes ʻAuwaʻalalua" according to the prose note. "A Spanish man of war" translates the queen, remembering a tradition of arrival of a Spanish galleon beaten out of its course in the early days of exploration of the Pacific. A "very large double canoe" is Pukui's more literal rendering, from ʻAu[hau]-waʻa-l[o]a-lua. However, she may have been referring to the blue-sailed invertebrate called the Portuguese man o' war, which Hawaiians speak of, perhaps half in derision, as ʻAuwaʻalalua. The mother honored Keawe's son, perhaps born propitiously during the period of the Makahiki, by giving him the name of Lono-i-ka-Makahiki, seeing perhaps in the child a symbol of the god's promised return. "Another and earlier Lono-i-ka-makahiki on the ʻUmi line of ruling chiefs of Hawaii is better known to Hawaiian legendary history. This Lono was born and brought up not far from the place where were laid away the bones of Keawe and his descendants, woven into basket-work like those of his ancestors from the time of Liloa, near the place where Captain Cook's grave stands, a monument to a brave but in the end too highhanded a visitor among an aristocratic race such as the Polynesian. This Lono cultivated the arts of war and of word-play and was famous as a dodger of spears and expert riddler. He too may have contributed to the tests of skill observed during the ceremony of the Makahiki". "It is not, however, likely that either of these comparatively late ruling chiefs on the ʻUmi line was the Lono whose departure was dramatized in the Makahiki festival and whose "return" the priests of the Lono cult on Hawaii anticipated so eagerly. Both were born in Hawaii, and no legend tells of either of them sailing away with a promise to return. A more plausible candidate for the divine impersonation is the legendary Laʻa-mai-Kahiki, "Sacred-one-from-Tahiti," who belongs to a period several hundred years earlier, before intercourse had been broken off with southern groups. Laʻa came as a younger member of the Moikeha family of North Tahiti, older members of whom had settled earlier in the Hawaiian group. He brought with him the small hand drum and flute of the hula dance. As his canoe passed along the coast and the people heard the sound of the flute and the rhythm of the new drum-beat, they said, "It is the god Kupulupulu!" and brought offerings. Kupulupulu is Laka, worshiped as god of the hula in the form of the flowering lehua tree and welcomed also as god of wild plant growth upon which the earliest settlers had subsisted and still continued to subsist to some extent during the cold winter months before staple crops were ready to gather. This Laʻa-mai-kahiki took wives in various districts, especially on Oahu, stronghold of Lono worship, from whom families now living claim descent. He seems to have sailed back to Tahiti at least once before his final departure. In this sojourner belonging to a great family from the south, who came like a god, enriched the festival of the New Year with games and drama, possibly organized the collection of tribute on a southern pattern, and departed leaving behind him a legend of divine embodiment, one is tempted to recognize a far earlier appearance of that Lono of the Makahiki in whose name the Kumulipo chant was dedicated to Keawe's infant son and heir". Hunter S. Thompson The late Gonzo writer Hunter S. Thompson wrote that he believed himself to be the resurrected Lono while on assignment in Hawaii for Running magazine with artist and friend Ralph Steadman. In a letter included in the book The Great Shark Hunt, Thompson describes his arrival to Kailua Bay in 1981: - The word traveled swiftly, up and down the coast, and by nightfall the downtown streets were crowded with people who had come from as far away as South Point and the Waipio Valley to see for themselves if the rumor was really true - that Lono had, in fact, returned in the form of a huge drunken maniac who dragged fish out of the sea with his bare hands and then beat them to death on the dock with a short-handled Samoan war club. Thompson's writings on the experience have been compiled into a book, The Curse of Lono, illustrated by Ralph Steadman. As Lono, Thompson is shown as wearing the head of a marlin as a mask, with his eyes doubling as the eyes of the fish. - The Kumulipō, line 1714 - Cordy, Ross "Exalted sits the chief: The ancient History of the Hawai'i Island". Honolulu, HI Mutual Publishing (2000), 61 - Beckwith 1951. - Thompson, Hunter (1979). The Great Shark Hunt: Strange Tales from a Strange Time, 1st ed., Summit Books, 105-109. ISBN 0-671-40046-0. - Martha Warren Beckwith (1951). www.sacred-texts.com/pac/ku/ku06.htm "The Kumulipō". - Leilehua Yuen (includes role of Lono in the Makahiki). www.kaahelehawaii.com/pages/culture_makahiki.htm http://www.kaahelehawaii.com/pages/culture_makahiki.htm www.kaahelehawaii.com/pages/culture_makahiki.htm. Missing or empty
<urn:uuid:ad14bfd2-6bd3-442b-a5d6-9ffa3622fb04>
CC-MAIN-2015-11
http://en.wikipedia.org/wiki/Lono
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462555.21/warc/CC-MAIN-20150226074102-00028-ip-10-28-5-156.ec2.internal.warc.gz
en
0.972058
1,668
3.59375
4
Cyclopædia of Political Science, Political Economy, and the Political History of the United States EMBARGO, ANGARIA, ARRÊT DE PRINCE. These three terms designate three different measures which the government of a country may take toward merchant vessels, whether they belong to its own subjects or to the subjects of foreign nations. These measures have this in common, that they are impediments in the way of freedom of commerce. They present certain differences, which the best authorities, such as Vinnius ad Peckium, De Nav. non excus.; Stypmannus, Ad Jus maritimum, part v , chap. i., 4. 32: Loccenius, De Jure marit.; Targa, Dé Ponderazione maritimme; Galiani, De Doveri de Principi neutrali, have not sufficiently set forth—Embargo is the act of the sovereign power in a country of detaining in its ports in time of war, or even in peace in the anticipation of war, or as a reprisal measure, the ships of subjects, of friends or enemies, of natives or foreigners, together with their cargoes, and of preventing their departure for a longer or shorter time, but without exacting any active service from them. —The usual object of an embargo is to throw an obstacle in the way of the divulgation of facts which it is to the interest of the power laying the embargo to keep secret, such as preparations for an expedition, a revolt, or the death of a prince or sovereign. Justice and the rights of nations, in accordance with which each is completely independent of all others, can not approve such measures. Hence, a great number of treaties contain stipulations guaranteeing the ships of the nations signing them from embargo. History show that these stipulations have not always been respected. In the wars of the Crimea, of Italy, of 1866, and of 1870-71, European governments did not have recourse to the measure of embargo. Far from laying an embargo upon the ships of the enemy, they allowed them all necessary time to return to their own country. An embargo is sometimes laid before the declaration of war; it is a forerunner of the rupture between two nations. If matters are amicably arranged between the parties, the embargo is raised. —Embargo does not occasion neutral parties as much damage as does angaria; it causes detention, but does not force the ships on which it is laid into active service and the dangers which accompany it; hence it is not the custom to indemnify their owners. —The two most recent examples of embargo are that laid by England, on Jan. 14, 1801, upon the Danish, Swedish and Russian ships which were in the ports of Great Britain, and which was only ended by the maritime convention of 1801; and that by France upon Dutch vessels, Nov.7, 1832, which was raised after the capture of the citadel of Antwerp. —It is customary to stipulate in modern treaties for certain conditions to assure the subjects of the contracting powers established in the country of the other power sufficient time to enable them to leave and to remove the goods which belong to them. —Angaria , service or labor exacted against one's will,) is the making of a requisition, by a belligerent, of the foreign vessels it its ports or roads, and imposing on them, paying them a remuneration, which detracts in no wise from the arbitrary character of the measure, certain services of war, such as transportation of troops, arms and ammunition, in spite of their rights of neutrality. Angaria imposes an active service upon the vessels on which it is laid; embargo, on the contrary, imposes no active service. Angaria affects all ships which happen to be in a port or road; embargo ordinarily only those of a single nation; it is often in the nature of a reprisal. Very like angaria is the act by which the Prussain government, in the war of 1870-71, scuttled six English merchantmen, which were stationed in the lower Seine. The Prussian government, however, soon took pains to acknowledge that an indemnity was due from it to the proprietors fo these vessels. —Some modern authors, in the first rank of which may be cited Hautefeuille, Des Droits et des Devoirs des Nations neutres, 2d ed., vol. iii., p. 415, etc., justly inveigh against the doctrines of the publicists of the last century and the early part of the nineteenth, who wished to legitimatize embargo and angaris, by considering them as a law, or as a consequence of the law of legitimate defense, etc. Custom, it is true, has for a long time authorized the practice; but the illegality of such measures is too evident and too contrary to the ideas of justice and morality to survive. It is one of the incontestable rights of sovereignty either to permit or refuse entry to a port, and the power of carrying on commerce there; but the vessel once admitted to sojourn and trade there, it is an arbitrary act to impose any service upon it, such as is authorized by angaria. There does not exist a treaty, a single international act, by which belligerents are authorized to violate the neutrality of ships stationed in their ports. So far from that, in the case of angaria, as in that of embargo, many international conventions stipulate that the ships belonging to the contracting powers shall not be seized. Angaria "is less the exercise of a right than the abuse of power." —Is the neutral ship impressed by angaria exempt from confiscation if it happens to be taken by the enemy? Hübner, De la Saisie des Bátiments neutres, vol. i., chap. vii., §2, decides this question in the affirmative; but his opinion can not be justified. The captor could not be expected to seek out the causes which have changed a neutral vessel into an enemy's vessel; and the ship taken under these conditions is evidently a fair prize.—"Arrêt de prince" must not be confounded with either embargo or angaria. It consists, although peace may be in no danger, in seizing on the plea of public necessity, a ship, whether it is still at anchor in port or has set out to sea and in the latter case interrupting a voyage already begun. It is a species of angaria in time of peace. An arrêt de prince may proceed from the government of the seized ships, or from a foreign government. In the case of arrêt de prince, the seized vessel is yielded up to its owners, or its value and that of its cargo is paid; whereas embargo terminates almost always in the confiscation of the enemy's property. Return to top
<urn:uuid:92d5a02a-da1d-442e-99c8-3118de612ad1>
CC-MAIN-2015-11
http://econlib.org/library/YPDBooks/Lalor/llCy408.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463104.7/warc/CC-MAIN-20150226074103-00076-ip-10-28-5-156.ec2.internal.warc.gz
en
0.948458
1,430
3.0625
3
In this case, the EGG. Victorian hand blown opaque milk glass Easter eggs. Back at the turn of the century these eggs were useful-(Victorian multi- tasking).After Easter when these eggs would have been given as a present, you could put one in a holey sock and the darling needed to repair the hole was much easier. Also if your hens were in a snit and not laying,one could put these eggs under the hen then she would produce. That is the smaller sized ones!These days,I am not much into darning socks,also have no chickens , so I just like collecting these eggs. |One of my favorite things, a French wire egg holder.| |Some eggs have blown raised design like the horse shoe on the egg above. These were blown into a mold and are not as common as the plain eggs.| The custom of offering Easter eggs has been around for many years. Although there were some earlier societies that gave eggs as gifts at Easter time, the practice was started in 18th century Europe. By the end of the 19th century, a variety of artificial eggs was being made. In Germany,paper mache and card board eggs with hand painted designs were the rage. Here in America the first known artificial Easter egg was the hand blown milk glass egg. It soon became a cottage industry. The men would blow the eggs using a hot furnace and a rod.Some where blown into a mold while others were blown free hand. The ladies would hand paint and decorate them. They used water based paint and usually this media has not stood up well to the times and many examples are missing much of the paint. This is usually because people tend to wash them and rub hard, when a soft dry cloth would usually do the trick The missing paint never bothered me, just added to their charm. |The small horse she design on the center egg is also raised .| |I love them when they are all in a pile like this.| |This is the pontil, where the egg was cut from the glass rod after being blown.| Nothing could be more an Easter Tradition than an egg.The Egyptians,Persians and Hindus all believed that the world began with an enormous egg, this the egg was a symbol of new life, has been around for eons. Edward 1 spent 18 pence to have eggs gold leafed and colored for easter gifts. The first mention of Easter eggs in a book was written over 500 years ago. North Africa tribes had a custom of coloring eggs much earlier than that. |This was a very good artist that painted these two birds.| Easter eggs are special eggs that are often given to celebrate Easter or springtime.The egg is a pagan symbol of the rebirth of the Earth in celebration of spring and was adopted by early Christians as a symbol of the resurrection of Christ.The first dyed eggs were red to represent the blood of Christ, shed on the cross. The hard shell of the egg symbolized the sealed tomb of Christ. The cracking of which symbolized the resurrection from the dead. Legend is that Mary brought cooked eggs to share with the other women at the tomb of Jesus and the eggs in her basket miraculously turned red when she saw that Christ had risen. Another legend is that Mary went to the emperor of Rome and greeted him with,"Christ is Risen", where upon he pointed to an egg on the table and stated,"Christ has no more risen than that egg is red", after making this statement, it is said that the egg turned blood red. |Don't you just love this sweet chicken?| |Sometime in the very large eggs life some one added a decal.| The egg has long been a symbol of,"fertility" and the,"begining".17th and 18th centuries saw the manufacturing of eggs to give to children to celebrate Easter. The Victorian Glass egg was one of many forms produces in those years. The Victorian glass eggs were made by hand and sold in General store, larger department store, traveling salesmen wagons and from mail order catalogs. The good thing about them was that they would last for ever, had to only buy them once and would become a tradition where they were used every year. They were usually stored in the china cabinet along with the other family treasures. I started collecting these eggs many years ago for my country kitchen. I would get a bunch, sell them off and usually end up starting all over again. I don't know why I sell anything, as I usually can't stand it and just end up buying more. You do not see these eggs all the time, but somehow they seem to come out of the woodwork around Easter. I looked on Ebay yesterday and there was a long list of them. They range in price from a few dollars to almost 100 dollars. Some of the paint and decorations are in better condition than the others. I have a standing rule that I will not pay more than $20.00 for one. I buy them when I see them all year long. They are usually at a better price when it is not Easter time. I keep mine in an old copper boiler on the floor in the kitchen. When I give tours they always catch peoples eyes and attention. Usually they come out and adorn my Easter table. I am having my family this year so will have to go all out, look for that post next week. I hope you all enjoy my Victorian Glass eggs as much as I do. I hope you all have a wonderful,safe and glorious Easter. Please come by any time for a tour. I will leave the lights on and Sissy Dog will meet you with a jump and a kiss. |The one with the baby chick coming out was made in various sizes. Again blown into a two part mold.|
<urn:uuid:a874ea87-6dba-4088-9fef-88708e364f50>
CC-MAIN-2015-11
http://myoldhistorichouse.blogspot.com/2011_04_21_archive.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462232.5/warc/CC-MAIN-20150226074102-00310-ip-10-28-5-156.ec2.internal.warc.gz
en
0.988136
1,198
2.609375
3
Lone Writer stood beside a sign in Utah’s desert. According to that sign, he was in the Wolverine Petrified Forest. It didn’t look like a forest to him -- just a lot of sand and rocks. The sign said if he had been there 225 million years ago, he would have been in the middle of a lush forest. If you believe man came from apes, you might expect to see them racing through the forest with a dinosaur hot on their heels. At that time Utah was much closer to the equator. Geologists believe it was about the same distance from the equator as Cuba is today. During that time, Nevada and California were located at the bottom of an ocean and Utah was near the coast. The most common explanation for the changes is the movement of Earth’s tectonic plates but that stuff is way over Lone Writer’s head. He was just happy there were no dinosaurs sizing him up for lunch. There’s not much left of the petrified forest where Lone Writer was standing. All he found was a small petrified stump. According to the sign, there is more of the forest about a mile west in the canyon. Lone Writer’s knees no longer permit such hikes, so he was unable to get a photo of any giant fossilized conifer trees. Getting to the Wolverine Petrified Forest from Boulder, Utah, begins with a very scenic drive along the Burr Trail. After climbing out of Long Canyon, a sandy road branches off to the right into White Canyon. The road can be nasty when wet since it follows the floor of narrow washes. It eventually crosses Wolverine Creek and follows the creek to the Petrified Forest trailhead. Four-wheel drive is recommended, but a talented driver could get in using a passenger car during dry weather. Continuing down Wolverine Wash is not permitted, so the road climbs out of the wash and winds through a thick forest of pinion-juniper trees. It continues in and out of washes and is sometimes high enough to provide a panoramic view of the entire area. While cruising through the forest wondering what it all looked like 225 million years ago, one unsettling thought kept interfering with the tranquil environment presenting itself to Lone Writer. That thought, “If this was a swamp and gradually transformed into a desert, isn’t it logical to expect it might someday transform itself back to a swamp?” The last time that happened it wiped out the dinosaurs and probably did a lot of damage to any other creatures living at that time. If it did so again, would it wipe out all of mankind?” The road forms a half circle that eventually leads back to the Burr Trail. Lone Writer continued east and entered Capital Reef National Park. A short distance later, he turned into Upper Muley Twist Canyon. A narrow two-track road welcomes the visitor into the canyon. It immediately goes to the floor of the wash and stays there to the end of vehicle access. The first arch you see high above at the top of the canyon on Burr Trail is called Peek-a-Boo Arch. It is visible a long time before entering the canyon, while still on the Burr Trail. About halfway to the end of the vehicle access, the trail passes Trinity Arch. This triple arch is on the left side of the canyon and hard to miss. Look closely at the photo in this story and you will see the third arch behind the second arch. It is very small in comparison to the other two arches, but it does qualify as an arch. Those of you healthy enough to find a way to reach the top of this arch may find other arches, too, but that’s all Lone Writer has seen. The access road ends at a trailhead for a long hike through Capital Reef National Park. There are other arches along that hike, but they are not accessible to handicapped people. Those of you who are still able to hike in the desert might want to spend a couple days in the Upper Muley Twist. It is an isolated and quiet place to kickback and ponder the ways of the world. In the summer months, it can be very hot in that area. Plan your trip in September or October. After returning to the Burr Trail, Lone Writer turned east and went down the Burr Trail Switchbacks. This is just a graded road, but it is very scenic. Lone Writer found a panoramic viewpoint and stopped for lunch, surrounded by a landscape formed when the tectonic plates of the earth moved and the dinosaurs died. Larry E. Heck has been writing stories about fun, scenic, and historic places to go in a 4x4 since 1985. Check out the border-to-border Outlaw Trail Project 2014. It crosses the country from Canada to Mexico, primarily on backcountry roads, connecting locations used as hideouts to the sites of bank and train robberies. Create a log-in account at www.Outlaw-Trail.com and receive a gift certificate for a free eBook. |Latitude North||Longitude West||Comments| |N37 55.4606||W111 13.2401||Intersection of Wolverine Canyon Road and the Burr Trail.| |N37 48.2461||W111 12.3815||The entrance to Wolverine Petrified Forest.| |N37 51.2133||W111 2.5800||Entrance to Upper Muley Twist Canyon.|
<urn:uuid:9aea2dfd-6446-4552-a1ea-6004f7cf1775>
CC-MAIN-2015-11
http://www.fourwheeler.com/events/1405-wolverine-petrified-forest/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463679.20/warc/CC-MAIN-20150226074103-00206-ip-10-28-5-156.ec2.internal.warc.gz
en
0.966512
1,127
2.96875
3
In the five years since its inception, the State Wildlife Grant Program has played an important role in the conservation of Vermont's wildlife. The following are some projects funded through State Wildlife Grants: Bright Futures Ahead for the Osprey, Loon & Peregrine Falcon The osprey, common loon, and peregrine falcon were recently removed from the state's endangered species list-the first ever in Vermont. Their recoveries came about because state and federal wildlife agencies, nongovernmental organizations, electric utilities, and private landowners collaborated to address the problems that had decimated the birds' populations: habitat loss, pollutants such as lead and mercury, and pesticides that weaken eggs. Monitoring and recovery planning funded by State Wildlife Grants is an essential element to complete recovery. Inspired by these recoveries and armed with State Wildlife Grant funds, communities will go on to proactively conserve other wildlife, to enhance our quality of life, and our economies for future generations. Lake Champlain Lake Sturgeon Restoration Project Sturgeon numbers in Lake Champlain dropped dramatically in the first half of the 1900s due to commercial fishing and loss of spawning habitat. The lake sturgeon is now listed as an endangered species in Vermont. With funding from the State Wildlife Grants program, Vermont Fish & Wildlife Department biologists documented spawning activity, by collecting sturgeon eggs or larvae, in all four rivers that had been used as spawning sites in the past. Future efforts such as improving habitat by restoring a more natural flow regime in rivers during the spawning and incubation periods, removing obstructions to historic spawning sites, public education, and continued protection efforts should put Lake Champlain's lake sturgeon on the road to recovery. Building Fish-Friendly Roads and Improving Wildlife Passage Fish and other aquatic wildlife require unfettered movement through streams and rivers to maintain healthy populations. Man-made obstacles such as poorly designed culverts get in their way. With funding from the Wildlife Conservation and Restoration Program (the precursor to State Wildlife Grants), and in partnership with the Agency of Transportation, the Fish & Wildlife Department hosted an intensive training session with national expert Kozmo Bates, where more than 60 road managers, fisheries biologists, and others learned state-of-the-art fish and wildlife friendly road designs. Vermont's many successful wildlife-transportation projects have made the state a national leader in road ecology. Bobcat and Landscape Ecology in the Champlain Valley Anyone who's ever looked for a home knows how difficult it can be to find the right place. Choices are rarely simple. Would you accept a smaller living room if the view was great? What if the house were close to work? How close do shopping or schools need to be? How much privacy do you want? Clearly, finding the right place is a blend of many factors. We're not alone. Many wildlife species face the same questions. Though some species are quite easy to satisfy-you can find squirrels in almost any forest, woodlot or suburban yard-others are more discriminating. The bobcat is in the latter category. Although bobcats are found throughout Vermont, it is an elusive animal with special habitat needs that aren't fully understood. It is believed a combination of steep rocky ledges, wetlands, and large undeveloped tracts of land connected by corridors are important to the future of bobcats in Vermont. However, no one is sure how bobcat reproduction and survival are impacted by the loss or degradation of these habitats. As development pressure increases in Vermont, bobcat habitat might be lost or fragmented. Wildlife biologists will tackle this home design puzzle using funding from the State Wildlife Grants program. Mark Freeman with the University of Vermont Cooperative Extension Unit, in cooperation with the Vermont Fish & Wildlife Department, are evaluating how ledge habitat, landscape fragmentation, road densities, and increasing human densities affect bobcat habitat use, bobcat birth rates, and bobcat survivability. Ten to twenty bobcats in Vermont's Champlain Valley will be fitted with radio collars. The high-tech collars will record time, date, level of activity, and temperature every five hours. Biologists will be able to track the bobcats' movements over a two year period. The movements will be mapped along with habitat information collected from on-the-ground surveys and remote-sensing geographic information systems (GIS) data. The end product will be a picture of how bobcats move through their territories and should reveal the requirements of healthy bobcat communities. This will allow land and wildlife managers to identify and manage important bobcat habitat, ensuring bobcats will be around in Vermont for future generations to enjoy. The Hydro-Acoustic Project The Hydro-Acoustic Project isn't the name of a band. However it will keep Bernie Pientka out late at night listening attentively. Bernie is a fisheries biologist with Vermont Fish & Wildlife Department (VFWD) and in this case he'll listen for fish-not Phish. Bernie is interested in the forage fish community of Lake Champlain. Forage fish play a key role supporting much of the lake's food web. Most food webs resemble pyramids, with lots of species at the bottom eaten by fewer species at the top. However, rainbow smelt is the single dominant species of the deep-water fish community in Lake Champlain. If the smelt population were to decline, due to disease, pollution, the arrival of an invasive species or some other reason, much of the rest of the pyramid of larger fish could crash. In other words, this little three-ounce, iridescent fish with a pale green back and purple, blue and pink sides plays a pivotal role in the lake's ecosystem. Clearly, keeping tabs on the smelt population is important, but counting fish in the sixth largest lake in the U.S. is no easy task. So, with financial support from the State Wildlife Grants program, Bernie, Dave Gibson (VFWD), Nick Staats (USFWS), Donna Parrish (VT Cooperative Fish and Wildlife Research Unit) and Lars Rudstam (Cornell University) are designing a lakewide hydro-acoustic survey to track the abundance and distribution of smelt and other forage fish in the lake. Based on a similar method used in the Great Lakes, sonar (sound waves) is used to "photograph" the fish. Some are then netted to determine the species and their age. Biologists can then estimate the number and age of fish in the lake. Surveys are conducted at night when the fish are more uniformly distributed, using the department's 32-foot research vessel. Tracking changes in abundance of the forage fish community more accurately adds to our understanding of the entire Lake Champlain ecosystem. Data collected will aid biologists in evaluating and responding to changes to the ecosystem, such as the impacts of new invasive species, helping to maintain a balance in a lake so important to wildlife and people
<urn:uuid:c1b3cf06-26f4-47af-a54e-a33551c7eae5>
CC-MAIN-2015-11
http://www.vtfishandwildlife.com/SWG_Projects.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936459277.13/warc/CC-MAIN-20150226074059-00139-ip-10-28-5-156.ec2.internal.warc.gz
en
0.931601
1,421
2.875
3
A reader asks a wonderful question: how old did folks have to be to do certain things? Part 1 of the answer looks at Colonial charters. Blog reader Howard Swain correctly notes that “(i)n Colonial times as well as today, a person had to be a certain (age) to be allowed to do something — be taxed, serve in the military, witness a document, etc. In genealogy sometimes we can find no birth date for a person. But we may have a date at which he was taxed, witnessed a document, etc. So, to use that to put a bound on when he had to have been born by, we need to know the ages at which it was legal to do various things. … I have a feeling that many assume that the age for many of these things was 21, which clearly is not true.” Howard adds that many online resources for these sorts of ages don’t cite sources, leaving us wondering where they got their information and whether they’re accurate or not.1 So… how old DID you have to be to do things? Any question like this is going to be one that brings joy to the heart of anybody trained in the law. That’s because the answer, of course, is one of those wonderful lawyerly-type answers that drives everyone else totally batty.2 Answer: It depends. (Cue in the groans and the eye-rolls.) Okay. Let’s work through this piece by piece. The reason it depends is because there are at least three sources of law that might exist at any particular time for any particular place that could provide the answer. First, there may be some fundamental document like a colonial charter or a state or national constitution with some specific age provision. If there is, it’s going to trump any other source of law. Second, there may be a statute that sets a specific age. If there is, and it isn’t trumped by some fundamental document, then it will control. Finally, if there’s nothing in any fundamental document and nothing in any statute, then in most of what’s now the United States,3 the common law rule will control. We’ll take these one by one over a period of some time. Today, we’ll look at colonial charters. Only a few colonial charters have specific age-related provisions. In the colonies governed by those charters, however, those provisions will control for the time period they were in effect. In 1669, the eight Lords Proprietor of the Province of Carolina, which included most of the land between what is now Virginia and Florida, adopted what was called the Fundamental Constitutions of Carolina. The problem is the provisions were particularly unpopular in what became South Carolina, never were ratified by the assembly, and were only followed in some measure and in some areas between 1669 and 1719.4 But the Fundamental Constitutions had three key age-related provisions: (1) Paragraph 101 required every man aged 17 and above to be recorded once, and only once, as a church member;5 (2) Paragraph 116 required “inhabitants and freemen of Carolina above seventeen years of age, and under sixty, … to bear arms and serve as soldiers” in the militia; and (3) Paragraph 117 required an oath of loyalty from every inhabitant aged 17 and older.6 In those early years, then, and particularly in the northern areas governed by the Lords Proprietor of the Province of Carolina, look for these records and consider the age of 17 as a key. New Jersey was originally two colonies, the Colony of East Jersey and the Colony of West Jersey. The fundamental documents of both contained some age-related provisions. In East Jersey, the 1683 Fundamental Constitutions required the ruling Proprietors to be 21 years old in order to vote (section XIII), jurors were required to be age 25 (section XIX), and whenever any names were to be drawn by lot for elections or jury service, the drawing was done by a boy under the age of 10 (sections III and XIX).7 Find a proprietor on a voting list and you know he’s 21 or older; find a juror, he’s 25 or more; find a boy’s name in a record showing a drawing by lot and he had to be nine years old or younger. At least until we get to the early Constitutions. In West Jersey, the 1664 Concession and Agreement of the Lords Proprietors of the Province of New Caesarea, or New Jersey, to and With All and Every the Adventurers and All Such as Shall Settle or Plant There made the age of 14 a very important age. Land grants were restricted to those who came over with their own arms and supplies, or to servants “male or female, exceeding the age of fourteen years” who would either entitle their masters to land or themselves be entitled to land at the end of their service.8 Find any name on a list as a person for whose service land was issued under that Agreement and you know he or she had to be 14 or older. In Pennsylvania, it was clear from the outset that a person was not of full age until the age of 21. That age was the key age set out even for the “Governour” under Penn’s Charter of Libertie of 25 April 1682, the Frame of Government of 5 May 1682 and the Frame of Government of 2 February 1683. The Frame of Government of 1696 set 21 as the voting age.9 No need to consult the statutes or the common law for the early days in Pennsylvania for those questions. Meeting between the 16th and 19th of March 1641, some 22 years before the Charter of Rhode Island, the General Court of Election at Portsmouth issued an order that the Justices of the Peace take an oath of fidelity “or some other strong cognizance” from “all men or youth above fifteen years of age.”10 Find any name on the court’s early lists, and you know that man is aged 15 or above. We’ll go on, in later posts, to review early constitutions, then statutes, then common law rule (and we’ll gather ‘em all up into a permanent reference file when we’re done). And as we travel down this road, at every step, we’ll see that the answer is always the same: it depends. - An example is “English Common Law, 18th Century Virginia,” USGenWeb (http://www.usgenweb.org/research/misc.shtml#law : accessed 16 Jan 2012). ↩ - There’s an old joke about the guy in a hot air balloon who gets lost in a fog off the coast of New England. The fog is so thick he can’t see anything at all. Finally the fog clears just enough that he spots a man standing on a spit of land. “Hey,” he shouts down. “Can you tell me where I am?” “Sure,” the man on the ground replies. “You’re in a hot air balloon off the coast of New England.” And with that the fog rolls back in and covers everything again. And we all know the man on the ground is a lawyer… because the answer is absolutely true… and totally useless. ↩ - Louisiana in particular has a legal system partially based on French and Spanish codes, as opposed to English common law, and is usually called a Civil Law jurisdiction. See generally Henry Plauche Dart, The Sources of the Civil Code of Louisiana, Address Delivered to the Louisiana Bar Association, 2 June 1911, pamphlet (New Orleans : J.G. Hauser, 1911), reprint from the Louisiana Bar Association Report, 1911; digital images, Google Books (http://books.google.com : accessed 16 Jan 2012.) ↩ - William MacDonald, editor, Select Charters and Other Documents Illustrative of American History 1606-1775 (New York : MacMillan, 1906), 149-150; digital images, Google Books (http://books.google.com : accessed 16 Jan 2012). ↩ - Ibid., 166. ↩ - Ibid., 168 ↩ - Aaron Leaming and Jacob Spicer, The Grants, Concessions and Original Constitutions of the Province of New Jersey, the Acts passed during the Proprietary Governments, 1758; reprint (Clark, N.J. : Lawbook Exchange, 2002); online, New Jersey Digital Law Library, Rutgers-The State University (http://njlegallib.rutgers.edu/statutes/LS.php : accessed 16 Jan 2012). ↩ - Ibid. ↩ - “Colonial Charters, Grants and Related Documents,” Yale Law School Avalon Project (http://avalon.law.yale.edu/subject_menus/statech.asp : accessed 16 Jan 2012). ↩ - III Records of the Colony of Rhode Island and Providence Plantations in New England (Providence, 1856), Vol. I, pp. 111 – 115; reprinted online, Yale Law School Avalon Project (http://avalon.law.yale.edu/17th_century/ri04.asp : accessed 16 Jan 2012). ↩
<urn:uuid:90280dac-8e81-4f84-b51b-2120bc723641>
CC-MAIN-2015-11
http://legalgenealogist.com/blog/2012/01/17/part-1-how-old/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462232.5/warc/CC-MAIN-20150226074102-00311-ip-10-28-5-156.ec2.internal.warc.gz
en
0.947445
1,996
2.90625
3
May 19, 2010 Contact: Georgia Parham 812-334-4261 x 1203 ENDANGERED SPECIES DAY: MAY 21, 2010 Conserving an Endangered Ecosystem: The Northern Tallgrass Prairie National Wildlife Refuge By Kim Mitchell and Alice Hanley U.S. Fish and Wildlife Service Five years ago, the U.S. Senate designated the third Friday in May as Endangered Species Day. This year, Endangered Species Day is May 21, an opportunity to raise awareness about imperiled plants, animals, and habitats, and to demonstrate ways that others can help conserve these resources. The following is an example of the U.S. Fish and Wildlife Service working with others to recover endangered plants, animals and habitats. Northern tallgrass prairie, once one of the Midwest’s largest and most biologically productive ecosystems, has been reduced to less than one-tenth of one percent of its original expanse and has become almost functionally extinct due to fire control and extirpation of keystone species. Estimates place the original northern tallgrass prairie in Minnesota and Iowa at approximately 25 million acres. Fewer than 300,000 acres remain, most of it scattered in small parcels that often have little or no wildlife value. Grassland nesting birds, such as dickcissels, bobolinks, and upland plovers, are some of the most imperiled species found in northern tallgrass prairies. They have shown more dramatic, consistent, and widespread declines than any other group of birds in North America. Not surprisingly, their declines mirror declines in quantity and quality of our native grasslands. Besides simply having few areas available for nesting, predation and competition further reduce the chance for grassland nesting birds to survive and have young. Large predators (wolves, cougar, and bear) have been replaced by smaller predators (fox, skunk, and raccoon) that prey extensively on birds, their eggs, and their young. Grassland birds that nest in prairie fragments are forced to concentrate their nests in small, scattered parcels of habitat characterized by large amounts of edge (the area where prairie meets farmland, lawns, or other types of habitats). The problem with edge, from a bird’s perspective, is that it provides corridors along which red fox, striped skunk, and raccoon hunt, making it easy for them to find ground nests near edges. The more edge and less interior grasslands, the more nests lost to predators. Further, fire control and woody plantings have allowed forest-edge birds to expand from the Midwest oak and Eastern deciduous forests, westward into prairies areas, adding to competition for the small amount of remaining habitat. The Northern Tallgrass Prairie National Wildlife Refuge was established in 2000 to address the loss of these American grasslands and the declining species that depend on them. Refuge management focuses on connecting scattered remnant prairies in western Minnesota and Iowa and restoring ecosystem functions. The refuge provides a place for groups with similar goals to work together to conserve and restore northern tallgrass prairie. Lands proposed for inclusion in the refuge contain native grasslands that, in many cases, are the only remaining cover available to wildlife in a predominantly agricultural landscape. Incredibly, these remnant tracts support more than 300 plant species and 1,500 insect species. Wildlife associated with these small, scattered tracts include upland sandpiper, marbled godwit, sandhill crane, and prairie chicken. Approximately 243 species of birds are known to regularly use the northern tallgrass prairie area at some time of the year, with 152 species breeding here. Although limited to small, scattered tracts of remnant prairie, the Northern Tallgrass Prairie National Wildlife Refuge supports a surprising diversity of life. Four plant species and seven wildlife species found in the refuge are federally endangered or threatened, including two of the world’s largest populations of the threatened prairie bush clover, as well as the federally threatened western prairie fringed orchid and piping plover. The refuge contains indispensable habitat for waterfowl such as mallards, pintail, canvasback and blue-winged teal. Several globally rare species can be found here, including some of the last remaining populations of the rare Dakota skipper, powesheik skipperling, and regal fritillary butterflies. Remaining tallgrass prairie in Minnesota and Iowa is continually threatened by lack of fire, intensive grazing systems, gravel mining, conversion to agricultural row crops, and invasive nonnative species. Protection through acquisition or easement prevents conversion and allows management in the form of prescribed fire, rotational grazing where appropriate, and restoration of old cropland using local ecotype grass and forb seed. In the long term, refuge staff hope to reconstruct tallgrass prairie using native plant species to buffer or connect remnant native prairie tracts, which are severely threatened by fragmentation. During poor economies, financially stressed farmers often consider dividing and selling portions of their land. Easements can provide financial assistance to help them keep their property and prevent further subdivision. Prairies are a well-documented store of terrestrial carbon. Preventing conversion with grassland easements ensures this carbon will be maintained. The Northern Tallgrass Prairie National Wildlife Refuge, by preserving and restoring remnant prairie, is preventing the extinction of an ecosystem and helping to conserve and recover many rare and declining species. For information on endangered species work in the Midwest, visit www.fws.gov/midwest/endangered The mission of the U.S. Fish and Wildlife Service is working with others to conserve, protect and enhance fish, wildlife, plants and their habitats for the continuing benefit of the American people. We are both a leader and trusted partner in fish and wildlife conservation, known for our scientific excellence, stewardship of lands and natural resources, dedicated professionals and commitment to public service. For more information on our work and the people who make it happen, visit www.fws.gov. Connect with our Facebook page at facebook.com/usfwsmidwest, follow our tweets at twitter.com/usfwsmidwest, watch our YouTube Channel at youtube.com/usfws and download photos from our Flickr page at flickr.com/photos/usfwsmidwest.
<urn:uuid:fe1e6a2c-ef91-421d-9cc7-e51ba55f1962>
CC-MAIN-2015-11
http://www.fws.gov/midwest/news/219.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462839.81/warc/CC-MAIN-20150226074102-00058-ip-10-28-5-156.ec2.internal.warc.gz
en
0.925588
1,291
3.265625
3
Looks like you are using an old version of Internet Explorer - Please update your browser Originally published in Creation 5(4):10-11, April 1983 NASA Astronaut Col. Jack Lousma is quite convinced that outer space offers plenty of evidence of both creation and creator. When the Russian Cosmonauts went into space in the 1950s they reported there was no sign of a creator God; no evidence of creation. NASA Astronaut Col. Jack Lousma, who has flown over 39 million kilometres in space in both Skylab and space shuttle flights, disagrees with his Russian counterparts. He’s quite convinced that outer space offers plenty of evidence of both creation and creator. Here’s what he says. (Reprinted by permission of RADAS) I have never been able to follow the reasoning of the two cosmonauts who said they had explored space and had not seen God. The distances they travelled didn’t begin to penetrate the vast vistas of the cosmos. None of us has gone anywhere. Even after travelling 39 million kilometres in Skylab, I really haven’t gone anywhere either. In comparison to the size of the universe, I’ve only touched the very edge. If we tried to measure the universe in kilometres we would be talking in figures with many, many zeroes on them … beyond our understanding or our ability to avoid confusion. Some astronauts have gone farther into space than I have [gone]. But even the men who walked on the moon were only 400,000 kilometres away from earth. They were so close that a radio message from NASA’s Mission Control Centre could reach them in one and a third seconds. If I can’t believe that the spacecraft I fly assembled itself, how can I possibly believe that the universe assembled itself.I’m not being modest when I say we haven’t been anywhere yet. The size of the universe is the closest thing to infinity that I can imagine. It helps me to understand just a little bit of the infinite wisdom and power of the Creator-God who I’m convinced made this vast universe. There is a sense of personal danger in space travel—and I think that’s one of the feelings that makes a person do this kind of thing. There’s a certain amount of challenge involved in risk. You extend the thing you would least like to lose—your life. But when you leave the earth, in a spacecraft, I personally think there’s a real motivation to look toward God. After being in space, I certainly have a much greater appreciation for the world God has made, the universe He’s created. It’s very clear in my mind that this universe couldn’t have happened by chance. People ask me, “Did you have any special religious experience in space?” I answer them, “I’m sorry. My experience in space was no different than it was on earth”. Reading my Bible in Skylab was no different than reading it on earth, as I had been doing daily for years. Well, there was one small difference. The pages were a little easier to turn in that weightless environment. That book tells us a lot about the world in which we’re living and how it got to be the way it is. I think it’s important to keep in touch with the One who made the total universe. I read that book on a daily basis here on earth and I talk to the One who wrote it. So why should I do any differently in space? Space does do interesting things to your body…particularly after 59 days of weightlessness. Blood tends to shift toward the abdomen. So our legs thinned and our abdomens enlarged. When we relaxed in space, our arms drifted upward. When you sleep on earth your neck is limp and relaxed on the pillow and doesn’t move around. In space, however, your head tends to whirl around or to move from side to side. So we use a small band around our foreheads to tie us down when we sleep. Haircuts are really unique. Because there is no gravity hair doesn’t fall…you need a vacuum cleaner to prevent hair from floating around your head. Coming back to earth also produced some difficulties. We came back from our flight with 20 percent less volume of blood, and about 10 percent fewer red cells. It was difficult to walk a straight line or to proceed in an erect fashion down a straight line. We tended to wander to either side, and then to over-correct as we tried to stabilise our course. Apparently the sensors in our legs were no longer used to any side movement. I’ve seen some of the intricate engineering that is necessary before a spacecraft can reach orbit. My experiences with Skylab and the Apollo-Soyuz Mission and now in the Space Shuttle reconfirm that nothing worthwhile happens without intelligent planning and design. Nothing creates itself. I don’t see God in space as a physical body. But I see all kinds of evidence of His existence, His intelligence and His power. The cosmos is far more complex than any space vehicle. If I can’t believe that the spacecraft I fly assembled itself, how can I possibly believe that the universe assembled itself. I’m convinced only an intelligent God could have built a universe like this. Answers in Genesis is an apologetics ministry, dedicated to helping Christians defend their faith and proclaim the gospel of Jesus Christ effectively. We focus on providing answers to questions about the Bible—particularly the book of Genesis—regarding key issues such as creation, evolution, science, and the age of the earth.
<urn:uuid:64d5e52f-6582-4cad-b5d5-b0f8e576c777>
CC-MAIN-2015-11
https://answersingenesis.org/creation-scientists/astronaut-on-creation/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936469305.48/warc/CC-MAIN-20150226074109-00165-ip-10-28-5-156.ec2.internal.warc.gz
en
0.961038
1,183
2.546875
3
We won’t stop until we’ve eradicated HIV/AIDS Eradicating HIV Reservoirs Figure 1. The HIV latent reservoir. Infection of CD4+ T cells by HIV will result in cell death or apoptosis in most cells. However, some cells will return to a quiescent state, transitioning into a memory CD4+ T cell. These cells contain an integrated copy of the viral genome (red) within their DNA (black) and are transcriptionally silent with no viral gene expression. Cure Strategy: Eradicating the HIV Reservoirs HIV is able to remain a chronic, life-long infection due to its ability to stay hidden within infected blood cells. These cellular “reservoirs” contain the genetic code of HIV. They remain invisible to our body’s immune defenses, and are not sensitive to anti-HIV drugs. Latent reservoirs of HIV are located throughout the body, including the brain, lymphoid tissue, bone marrow, and the genital tract. These reservoirs persist, even in the presence of Highly Active Antiretroviral Therapy (HAART), today’s standard of care. While HAART is able to deplete the reservoir, it does so very slowly. Mathematical models have shown that most patients would have to be on HAART for 60-80 years before their HIV reservoirs are depleted. One proposed eradication strategy is to activate these latently infected cells in the continued presence of HAART. The rationale for the strategy is two-fold. By stimulating latently infected cells to replicate and express the virus, such cells will die more rapidly [HIV-induced cell death]. Once the cellular reservoirs begin producing HIV, the infected cells will be recognized by the immune system. The key to this strategy is the simultaneous administration of an activating agent concurrently with HAART, and perhaps other therapies to prevent new or spreading infection. Figure 2. Targeting the viral reservoir. Treatment with prostratin will result in activation of latent viruses, inducing viral gene expression. A combination approach will include HAART and additional compounds that may result in enhanced immune responses, inhibiting new infections and increasing HIV-induced cell death. AIDS Research Alliance is developing the drug candidate prostratin, which research suggests activates latently infected cells to produce virus. Our goal is to target these cells using a combination approach that will purge virus from the latent reservoirs. Learn more about . . . AIDS Research Alliance & HIV Reservoir Bibliography Scientists at AIDS Research Alliance co-authored the following articles with collaborating researchers: - Biancotto, A., J. C. Grivel, F. Gondois-Rey, L. Bettendroffer, R. Vigne, S. Brown, L. B. Margolis, and I. Hirsch. 2004. Dual role of prostratin in inhibition of infection and reactivation of human immunodeficiency virus from latency in primary blood lymphocytes and lymphoid tissue. J Virol 78:10507-10515. - Hezareh, M. 2005. Prostratin as a new therapeutic agent targeting HIV viral reservoirs. Drug News Perspect 18:496-500. - Hezareh, M., M. A. Moukil, I. Szanto, M. Pondarzewski, S. Mouche, N. Cherix, S. J. Brown, J. L. Carpentier, and M. Foti. 2004. Mechanisms of HIV receptor and co-receptor down-regulation by prostratin: role of conventional and - Kitchen, S. G., N. R. Jones, S. LaForge, J. K. Whitmire, B. A. Vu, Z. Galic, D. G. Brooks, S. J. Brown, C. M. Kitchen, and J. A. Zack. 2004. CD4 on CD8(+) T cells directly enhances effector function and is a target for HIV infection. Proc Natl Acad Sci U S A 101:8727-8732. - Korin, Y. D., D. G. Brooks, S. Brown, A. Korotzer, and J. A. Zack. 2002. Effects of prostratin on T-cell activation and human immunodeficiency virus latency. J Virol 76:8118-8123.novel PKC isoforms. Antivir Chem Chemother 15:207-222. - Rullas, J., M. Bermejo, J. Garcia-Perez, M. Beltan, N. Gonzalez, M. Hezareh, S. J. Brown, and J. Alcami. 2004. Prostratin induces HIV activation and downregulates HIV receptors in peripheral blood lymphocytes. Antivir Ther 9:545-554. - Witvrouw, M., C. Pannecouque, V. Fikkert, A. Hantson, B. Van Remoortel, M. Hezareh, E. De Clercq, and S. J. Brown. 2003. Potent and selective inhibition of HIV and SIV by prostratin interacting with viral entry. Antivir Chem Chemother 14:321-328.
<urn:uuid:66d15473-c800-4ddc-8589-91d3ac8e383a>
CC-MAIN-2015-11
http://aidsresearch.org/cure-research/eradicating-hiv-reservoirs
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936535306.37/warc/CC-MAIN-20150226074215-00152-ip-10-28-5-156.ec2.internal.warc.gz
en
0.860356
1,099
2.796875
3
|This article needs additional citations for verification. (January 2010)| UTF-32 (or UCS-4) stands for Unicode Transformation Format 32 bits. It is a protocol to encode Unicode characters that uses exactly 32 bits per Unicode code point. This makes UTF-32 a fixed-length encoding, in contrast to all other Unicode transformation formats which are variable-length encodings. The UTF-32 form of a character is a direct representation of its codepoint. The main advantage of UTF-32, versus variable-length encodings, is that the Unicode code points are directly indexable. Examining the n'th code point is a constant time operation. In contrast, a variable-length code requires sequential access to find the n'th code point. This makes UTF-32 a simple replacement in code that uses integers to index characters out of strings, as was commonly done for ASCII. The main disadvantage of UTF-32 is that it is space inefficient, using four bytes per character. Non-BMP characters are so rare in most texts, they may as well be considered non-existent for sizing issues, making UTF-32 up to twice the size of UTF-16 and up to four times the size of UTF-8. The original ISO 10646 standard defines a 31-bit encoding form called UCS-4, in which each encoded character in the Universal Character Set (UCS) is represented by a 32-bit friendly code value in the code space of integers between 0 and hexadecimal 7FFFFFFF. Because only 17 planes are actually in use, all current code points are between 0 and 0x10FFFF. UTF-32 is a subset of UCS-4 that uses only this range. Since the Principles and Procedures document of JTC1/SC2/WG2 states that all future assignments of characters will be constrained to the BMP or the first 14 supplementary planes, UTF-32 will be able to represent all Unicode characters. Accordingly, UCS-4 and UTF-32 are now identical except that the UTF-32 standard has additional Unicode semantics.[clarification needed] Though a fixed number of bytes per code point appear convenient, it is not as useful as it appears. It makes truncation easier but not significantly so compared to UTF-8 and UTF-16 (both of which can search backwards for the point to truncate by looking at 2-4 code units at most). It is extremely rare that code wishes to find the N'th code point without earlier examining the code points 0 to N-1. This means an integer index that is incremented by 1 for each character can be replaced with an integer offset, measured in code units and incremented by the number of code units as each character is examined. This removes all speed advantages of working with UTF-32. The few instances where N is generated without looking at the earlier code points, such as some hashing and high-speed search algorithms, do not require that N be exact, and thus, like truncation, can be made to work on UTF-8 or UTF-16 by adjusting the position to the nearest code point boundary, a fixed-time operation. UTF-32 does not make calculating the displayed width of a string easier, since even with a “fixed width” font there may be more than one code point per character position (combining marks) or more than one character position per code point (for example CJK ideographs). Editors that limit themselves to left-to-right languages and precomposed characters can take advantage of fixed-sized code units, but such editors are unlikely to support non-BMP characters and thus can work equally well with 16-bit UTF-16 encoding. The main use of UTF-32 is in internal APIs where the data is single code points or glyphs, rather than strings of characters. For instance in modern text rendering it is common that the last step is to build a list of structures each containing x,y position, attributes, and a single UTF-32 character identifying the glyph to draw. Often non-Unicode information is stored in the "unused" 11 bits of each word. On Unix systems, UTF-32 strings are sometimes used for storage, due to the type wchar_t being defined as 32-bits. Python versions up to 3.2 can be compiled to use them instead of UTF-16; from version 3.3 onward, UTF-16 support is dropped, and a system is used whereby strings are stored in UTF-32 but with leading zero bytes optimized away where unnecessary. Seed7 and Lasso encodes all characters and strings with UTF-32. Use of UTF-32 strings on Windows (where wchar_t is 16 bits) is almost non-existent. Non-use in HTML5 - SIL, Mapping codepoints to Unicode encoding forms, §1: UTF-32 - Löwis, Martin. "PEP 393 -- Flexible String Representation". python.org. Python. Retrieved 26 October 2014. - The Unicode Standard 5.0.0, chapter 3 - formally defines UTF-32 in §3.10, D99-D101 - Unicode Standard Annex #19 - formally defined UTF-32 for Unicode 3.x (March 2001; last updated March 2002) - Registration of new charsets: UTF-32, UTF-32BE, UTF-32LE - announcement of UTF-32 being added to the IANA charset registry (April 2002)
<urn:uuid:188edb6d-19d8-4ed2-9d08-d7004692a65c>
CC-MAIN-2015-11
http://en.wikipedia.org/wiki/UTF-32/UCS-4
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462141.68/warc/CC-MAIN-20150226074102-00289-ip-10-28-5-156.ec2.internal.warc.gz
en
0.886528
1,138
3.78125
4
Parrotlilies abloom in early summer attract hordes of hummingbirds. Parrotlilies grow from clusters of white peanut-sized tubers arranged like the spokes of a wagon wheel. In the spring, they send up 8-12 in (20-30.5 cm) stalks that have the general character of an upright Solomon's seal with the foliage clustered in a little umbrella at the top of the stem. Although the stem is arrow-straight and the foliage is held in a horizontal position, the glistening parallel-veined pale green leaves tend to curl under at the edges and droop at the ends and always look a bit limp. As the season progresses, the stem elongates to 18-30 in (46-76 cm) and the leaves (now looking more twisted than limp) appear to spread out along its length in a stretched out spiral arrangement. Early in the summer, clusters of red flowers appear at the stem tips. The tubular 1-2 in (2.5-5 cm) flowers look like distorted azalea blossoms that are struggling to open. The ragged uneven petal edges curl slightly inward instead of flaring outward. The flowers are crimson on the outside with light lemon-lime shades at the petal tips and on the inside. The interior of the flower is streaked with greenish-black. The blossoms are followed by barrel-shaped 3/4 in (2 cm) long seed pods. The whole plant turns straw-colored before it goes dormant and disappears in the late summer or early fall. 'Mona Lisa' has brighter, bigger, and more abundant flowers than the species. There is also a variegated form that has leaves heavily streaked with creamy white. 'Frosted Peruvian Lily' has cinnamon colored flowers and white tipped foliage. 'Parrot' is a cross of A. psittacina, A. caryophyllae, and A. inodora. There are some 30 species of Alstroemeria that occur in grasslands and pampas in South America. A. psittacina is native to northern Brazil. This is a popular ornamental in New Zealand, where it blooms at Christmas and is known as "New Zealand Christmas bell." Parrotlily has escaped cultivation and naturalized in many parts of the world, including the southeastern U.S. Parrotlilies like rich, slightly acidic soils (pH 5.8 -6.8). Container plants do well in a soil mix of half Perlite and half ground up and composted wood chips and bark. Fertilize regularly with a complete nitrogen-heavy supplement Light: Grow in full sun where summer temperatures are moderate. High or partial shade is preferred in hot climates. Moisture: Although they can survive drought by going dormant, parrotlilies need very moist, but well aerated soil, to grow well. They will tolerate some flooding, but the rhizomes tend to rot if the soil is too heavy and/or remains wet for too long. Hardiness: USDA Zones 7 - 10. Parrotlily may look exotic, but it is not a tropical plant. Though it will tolerate hot summers, this species is happiest when the gardener is comfortable in a long-sleeved shirt, not sweating in a Hawaiian print. The plants will go dormant if the soil temperature rises to around 70°F (21°C). The rhizomes require winter chilling. If planted 8 in (20 cm) deep and heavily mulched, they will survive temperatures down to nearly 0°F (-17.7°C). In very cold climates, the tubers can be overwintered in damp sand or peat at a temperature of 35-40°F (1.7-4.4°C), but they are fragile and must be handled carefully and not allowed to dry out. Propagation: Parrotlily germinates poorly, slowly, and erratically. Only about 20 percent of the seeds sprout and grow successfully. Soaking the seeds for 12 hours prior to sowing is recommended. They should be planted when the weather is still warm, but don't expect them to sprout before they have been thoroughly cooled by temperatures down to around 35-40°F (1.7-4.4°C). Place the seed trays in indirect light and keep them constantly moist while you wait...and wait. Don't be too quick to give up. Seedlings will keep popping up over a long period of time. Once they do, they'll grow to transplant size in 4-6 weeks and make respectable pot plants 6-10 weeks thereafter. Be extremely careful about transplanting parrotlilies. The roots are brittle and the plants can easily be killed by rough handling. In the garden, set tubers at least 6 in (15 cm) deep and 12-18 in (30.5-46 cm) apart. In cold climates plant 8 in (20 cm). Young plants in nursery beds will grow faster 2 in (5 cm) deep and 20 in (51 cm) apart. When you set them out, carefully spread their delicate roots over a mound of earth like you would a daylily's. Alstroemeria psittacina is a parent of many of the spectacularly colorful Alstroemeria hybrids that are often used in florist's bouguets. These are also easy to grow and less invasive than the species. Click to download a large (800x600) version of this image. Parrotlilies lend red color and exotic atmosphere to the garden. They also make good cut flowers with an exceptionally long vase life. The roots of many Alstroemeria species are used to make a starchy farina. This is a seductive plant. It is colorful, unusual, and exotic looking and effortless to grow once you get it going. Every gardener I know who has seen it has wanted it, begged a start, then nurtured it and delighted in it - for a few years. Then every one of them has come to curse the way it spreads and taken to ripping it out with a vengeance. Perhaps its best use is as breeding stock for developing more spectacular and less troublesome varieties of Alstroemeria. This is an extremely invasive species. Although it has not yet been widely recognized as an ecological problem, parrotlily has spread into natural areas in western Australia and is likely to do so elsewhere. It is definitely ill behaved in cultivation. It self-seeds vigorously unless the flowers are cut off after blooming. Neglect deadheading or move a few tubers around in the soil and it will spread throughout your garden and haunt you forever. You can pull up every visible shred or even move away and start over with a new landscape. For a time, you may actually believe you have triumphed. But then you'll see that little umbrella of leaves popping up next to a prized plant... Spraying with Roundup just before the plants go dormant will knock parrotlily back, but it will take most of your nearby plants with it - and one or two treatments won't kill all of it.
<urn:uuid:9eafc40e-a9fa-4075-98ff-f688f9296aec>
CC-MAIN-2015-11
http://www.floridata.com/ref/a/alst_psi.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936468546.71/warc/CC-MAIN-20150226074108-00179-ip-10-28-5-156.ec2.internal.warc.gz
en
0.941632
1,483
3.125
3
All species of trees mature at a different rate. Some are ready for harvest in just a few years and others may take 40 or more years before they are mature enough to harvest. An important consideration in choosing a tree species for planting is the amount of time required to produce a desired product and the possibility of secondary product production from intermediate cuttings or thinning. Below is a table listing commonly planted tree species and the average time required to produce various products from each on a favorable site. |Ash, green and white ||Pulpwood* 30-50 yrs. Logs (handle stock, lumber) 40-70 yrs. | ||Pulpwood* 10-20 yrs. Logs (boxes, crates, lumber, veneer) 30-50 yrs. | ||Posts 7-15 yrs.| |Maple, soft (silver and red) ||Pulpwood* 20-30 yrs. Logs (lumber and veneer) 40-60 yrs. | |Maple, hard (includes sugar) ||Logs (lumber and veneer) 40-90 yrs.| ||Posts 20-30 yrs. Logs (lumber and veneer) 40-80 yrs. | ||Logs (lumber and veneer) 40-70 yrs. | ||Logs (lumber and veneer) 40-80 yrs. Nuts 20+ yrs. (75-225 yrs. best) | ||Pulpwood* 20-30 yrs. Logs (lumber and veneer) 40-80 yrs. | ||Pulpwood* 20-30 yrs. Logs (lumber, boxes) 40-70 yrs. | ||Logs (lumber and veneer) 40-80 yrs. Nuts 12+ yrs. (30-130 yrs. best) | |Poplar, yellow (tulip) ||Pulpwood* 20-30 yrs. Logs (lumber and veneer) 40-60 yrs.| ||Pulpwood* and posts 15-30 yrs. Poles and piling 35-50 yrs. Logs 40-60 yrs. | || Pulpwood* and posts 20-30 yrs. Poles and pilings 40-50 yrs. Logs 40-79 yrs. | |Pine, eastern white ||Christmas trees 7-10 yrs. Pulpwood* 15-25 yrs. Logs 40-80 yrs. | ||Christmas trees 8-15 yrs. Pulpwood* and posts 15-25 yrs. Logs 40-60 yrs. | ||Christmas trees 8-15 yrs. Posts 25-35 yrs. Logs 40-80 yrs. | *Markets do not exist in all areas of Kentucky. There are several steps you should follow before selling your timber. 1. Seek the advice of a professional forester. You may choose to have a forester with the Division of Forestry assist you or you may hire a consulting forester. The division will evaluate your timber and identify (marking) which trees should be removed and which should remain for the overall health of your forest. The service provided by the division is to assist you with implementation of your forest stewardship plan. The purpose of marking is to improve the quality of the stand of timber for the future. All timber markings performed by division foresters are based on sound forest management principals. This service is limited to 50 acres but waivers can be obtained for larger acreage. The cost for this service is $6 per 1,000 board feet. 2. Sell your timber by bids. Once your timber is marked, you need to prepare a bid for advertised timber contract. This contract will spell out the details of the timber sale. To view and print a sample contract, click Sample Bid for an Advertised Timber Contract. 3. After receiving the bids, proceed with hiring a logger, usually the highest bidder, with a written timber sale contract. All commercial harvesting operations in Kentucky are required to have a Kentucky master logger on site and in charge. A master logger is someone who has completed a three-day training course which includes information about timber harvesting best management practices, proper tree felling and safety. You can check the Kentucky master logger Web site for a list of Kentucky master loggers in your area. The Kentucky Forest Conservation Act (KRS 149.330 - 149.355) requires that every commercial logging operation in Kentucky have a master logger on site and in charge at all times. Master loggers must complete the Kentucky Master Logger Program (KML) and learn how to operate efficiently within the framework of constantly changing environmental and safety regulations. The training is a three-day program, one day per week for a three-week period. Participants must attend and participate in all three days of the program to be designated as a Kentucky master logger. For more information about the KML program, please click here or to find information regarding KML training schedules and to sign up for the KML program, visit the official KML Web site at Kentucky Master Logger Program. Landowners also need to be familiar with the requirements of the Kentucky Forest Conservation Act and environmental regulations related to forestry operations. Landowners who cut timber on their own land for non-industrial purposes are not required to have a master logger certificate; however, landowners are responsible for implementing best management practices (BMPs) for the purpose of protecting watersheds as required under the Agriculture Water Quality Act. For more information on BMPs, please link to the Agriculture Water Quality Act (KRS 224.71-100 to 224.71-140).
<urn:uuid:f21d0401-114a-4b59-946b-3ea8da636169>
CC-MAIN-2015-11
http://forestry.ky.gov/LandownerServices/Pages/HarvestingandSellingYourTimber.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462035.86/warc/CC-MAIN-20150226074102-00266-ip-10-28-5-156.ec2.internal.warc.gz
en
0.910109
1,211
2.875
3
“That is an American guitar.” - This article is about the Golden Age of the American Justice Coalition. For the retcon Silver Age version of the team see American Justice Coalition (Silver Age) In the early years, before America became what it is today, the country was full of villainy and injustice. Several early American heroes arose from among the ashes of a degraded civilization. They were the few capable of standing against the criminal tyranny. Thus, the American Justice Coalition (AJC) was formed. edit George Washington The group was lead by George Washington, who came to earth in a meteor shower from a distant alien planet. He was adopted by human parents who taught him to keep his identity well hidden. Some people call him "the Man of Iron", although believing this to be his real name is just being silly. While he is known as George Washington to the common populous, his true identity is unknown, except to a few key people, including someone who claims to be his best friend, a reporter for the largest newspaper in the colonies. He gained an intense sense of justice, which often clashed with Benjamin Franklin's slightly more anti-heroic tactics. They had mutual respect for one another, but occasionally had a falling out on key political issues. He is generally considered the leader of the Coalition, although each of the members has had an episode or two devoted to them. His powers include: - Super-human Strength - Heat Vision - X-ray Vision - color vision - Bullet-proof skin - Resistance to extreme temperatures - Invulnerability to alcohol - Throwing dollars across the Potomac - Chopping down cherry trees - Ignorance in small doses Some have disputed the flight as simply an ability to jump extremely far. edit Benjamin Franklin Of the group, the second in command was Benjamin Franklin. He was the son of a wealthy family in the largest and darkest city in all of the colonies. His parents were murdered by a mugger in the rough part of town. Franklin's following years have been disputed as to his actions, although many purport that he crawled into the criminal underbelly of society, and learned to understand the inner workings of the evil mind. He was inducted into a ninja school, but left when they threatened to destroy all of America due to decadence. Franklin is the bad-attitude second-in-command of the AJC, often clashing epically with Washington, whom he believes to be too lenient with criminals. He has no actual super powers except for his butler. His equipment was far advanced for the time, enabling him to fight crime alongside the Man of Iron himself. He possessed martial arts skillz, as well as many shiny gadgets. His strange looking utility belt saved him on countless occasions. edit Betsy Ross Steeped in Geek mythology, Betsy Ross was the princess of an Amazon book-selling tribe. She moved to America because of the books, and to teach the people how to use condoms and cook corn and toast. Sometimes, people call her Diana, although she seems to prefer "Betsy" or "Lynda". Her role in the AJC varies from person to person. Some consider her to be the group's "feminine side", and others consider her the "whore". Her powers include: - highly developed fighting skills - enhanced hearing - enhanced vision - animal empathy - sisterhood with fire (they still send each other Christmas cards) - high resistance to magic edit John Hancock John Hancock had wings on his back. Before his days in the Coalition, he spent a small fortune building a large tower in Boston, Massachusetts. He intended to use this to watch over the city as it slept, and as a base to fight crime from. Unfortunately for Boston, Hancock was contacted by Washington and invited to join the AJC, leaving a massive tower in the city, minus all of the state-of-the-art security equipment that was planned for it. The tower has since been changed into an office building. edit Thomas Jefferson Jefferson once ran all the way from Boston to Washington with his main superpower: Lightning speed. This is, in fact, his only power. He was supposed to be working with Paul Revere, but because he was running so fast his cries of "the British are coming", were simply not heard, and all the credit went to Revere. edit John Adams He is green. This probably means that he is a Martian from Mars, and he can shape shift, and stuff. Although, he could very possibly be from another planet other than Mars. Little else is known about him except that he is very into the game of Baseball cards, many of his own are from an Alien collection. edit James Madison He has a ring from an alien race. The ring has magic powers which allow it to either make green things, or make things green. He is best known as the creator of the White House, which was used as the Coalition's base for most of its operation. For a while, the White House was the "Green House", until George Washington asked that it be painted white so that it wouldn't clash with anyone's uniform. Madison later admitted that looking at Thomas Jefferson's uniform against the green walls reminded him too much of Christmas to be healthy. In some of the group's earlier adventures, there were a handful more members. Fairly early on, there was a falling out between George Washington and Jesus, which resulted in the large AJC splitting off into the two other groups. One, becoming the group that founded this great country of America, and the other to become what we call The Justice League of Jesus. On occasion, the two forces would put aside their differences and battle for the greater good of the planet. In general, however, the two groups fought like whiney little children arguing over who has to sit on the back seat hump. edit Notable Adventures - Writing the Declaration of Independance, this challenge required all of the Coalition's powers, as they needed to stop time as everyone within a four mile radius came to sign the document (which was later sold on eBay). - Saving downtown Tokyo from a giant, green monster that had mutated from dumping too much Tea into the Boston Harbor. The group later befriended the monster, who aided them on later missions. The monster was named for Oscar Wilde, the well known quote-smith. - Defeating Lex Luthor and King Lear at the Battle of 1812 - Saving the earth from a giant meteor using a massive green baseball bat (created by James Madison), held by George Washington, and used to hit a home-run into the atmosphere (witty comments provided by Ben Franklin and John Adams) - Along with Dashboard Confessional's Cloud Strife, the AJC fought Oprah and defeated her once and for all. - Attempting to defeat Dr. Phil, George Washington was almost killed by an Englandite Bullet fired by Phil. Washington spent the rest of the fight recuperating, while the others fought the bad Doctor. - Sitting on the jury in the case of Pirate v. Ninja, they also helped to protect the jury from outside threats. edit Fellow Justice Fighters - Flying Spaghetti Monster - Oscar Wilde - Cloud Strife - The AAAAAA (who give them all cheap rates on car insurance and free movie passes) - The Punisher - Willy Wonka - Agent Kim Possible - Fox News - Hannah Montana edit Notable American Justice Coalition Alumn edit Neutral Parties
<urn:uuid:b91a27fd-6f14-44e2-8894-21b7a59680f3>
CC-MAIN-2015-11
http://uncyclopedia.wikia.com/wiki/American_Justice_Coalition?diff=cur&oldid=4588839
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936465693.74/warc/CC-MAIN-20150226074105-00193-ip-10-28-5-156.ec2.internal.warc.gz
en
0.980932
1,564
2.609375
3
As our children go through life, they will continually interact with government. Under present conditions in the United States, government will confiscate about half of everything they ever earn - through direct taxes on their wages and taxes on the people and institutions with whom they conduct business. Government regulations and bureaucrats will limit their activities in business, recreation, home life, and even in the exercise of their Christian faith. Government may draft them to fight in war. Virtually every newspaper they read will be filled with reports of the actions of federal, state, and local government. Clearly, our homeschools must teach children about government. This education is complicated by the fact that we have essentially two classes of governments - the ones that Americans have agreed to under the federal Constitution and Bill of Rights, state constitutions, and local charters and the ones that we live under, which are quite different. Perpetuated by now vast bureaucracies and often unprincipled politicians, these governments have assumed roles that are not specified or permitted by agreement with the people. This second class - the government we have today - continually spends vast resources "educating" the people with propaganda activities. About which class of government should we teach our children? The practical answer must be both. In the early years of homeschooling, education about American government can be restricted largely to the study of history. The minds of children who are still too young to comprehend the details of government documents can learn the underlying concepts through the eyes of those who created them. This can be done by studying appropriate history books or by reading biographies, autobiographies, and other writings about and by those who created our government. I much prefer the teaching of history through autobiographies. Autobiographies are enjoyable to read and give the most accurate account of history possible, since they were written by those who made history and actually participated in the events. No account written by a human being is ever completely unbiased or perfectly accurate, but autobiography is the closest to the truth that we can read - especially if we include autobiographies from several points of view. For example, the War Between the States can be studied by reading the autobiographies of U.S. Grant and William Sherman and the writings of Abraham Lincoln on the Union side and the autobiographies of Jefferson Davis and Alexander Stephens (president and vice-president of the Confederacy) on the Confederate Side. Adding the autobiography of Booker T. Washington for a view of post-Civil War America is also valuable. Alternately, one could read a textbook about the civil war by some modern historian; one who will probably give an account that fits the particular social agenda that the writer wishes to promote. The autobiographical method is much more accurate. As the student grows older, the actual documents of government should be studied - the documents themselves and not textbooks telling about the documents. There is no substitute for studying the Constitution and the Bill of Rights in their entirety. But what about explaining them to the student? Again, the original is better. The student should read the Federalist Papers and other writings in which the founding fathers themselves debated the issues underlying their creation of our government. In addition, the student should read autobiographical writings such as those by George Washington and Benjamin Franklin; books by scholars who influenced the founding fathers or who eloquently described their principles such as John Locke, Frederick Bastiat, and Adam Smith; and later writers who worked to perpetuate their principles such as David Crockett, Henry Hazlitt, and Leonard Read. These are not just dry, scholarly works. The autobiographies of great Americans and the principal writings by which they attempted to influence events are some of the most interesting and entertaining books in the English language - written with the skill and erudition that we would like our children to emulate in their own writing and speech. Thinking for Themselves Petr Beckmann, an outstanding American scientist who was a refugee from Communist Czechoslovakia, wrote often about the "trust and parrot" method by which too many Americans form their opinions - especially about science. He wrote many articles in which he urged his readers to not believe him. Instead, he gave them the primary scientific references and asked them to read those documents and compare their conclusions with his own. In learning about government (or anything else, for that matter), our children should not be taught to "trust and parrot." They should not be taught to form their principles and opinions by reading overviews, or watching news programs, in which the writer or anchorman leads them to interpret facts in accordance with his own agenda. History textbooks - especially modern politically-correct texts, and even those written by people in whom we have confidence - usually contribute to trust-and-parrot thinking. Students should be taught to learn about history and government by unabridged complete writings of those who made history and created government - and then forming their own opinions of the events. With a firm foundation in American government as it was created, the student is then well-prepared to study government as it is currently practiced and reported in the daily media. The difference is, of course, astonishing. The last and best hope for the long-term preservation of American freedom and the remarkable legacy of the constitutional republic created by our founding fathers is in the education of young Americans to think and learn for themselves the truth about government as it ought to be. Our predecessors have written and bequeathed to us a wonderful literature from which these can be learned. It is our duty to provide this literature to our children along with study habits and a study environment in which it can be effectively read and understood. Was this article helpful to you? Subscribe to Practical Homeschooling today, and you'll get this quality of information and encouragement five times per year, delivered to your door. To start, click on the link below that describes you: USA Librarian (purchasing for a library) Outside USA Individual Outside USA Library
<urn:uuid:df030e07-e06f-404a-822a-5a9367f7612a>
CC-MAIN-2015-11
https://www.home-school.com/Articles/government-as-it-ought-to-be-taught.php
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936465456.40/warc/CC-MAIN-20150226074105-00207-ip-10-28-5-156.ec2.internal.warc.gz
en
0.970033
1,214
3.125
3
As college students return to classrooms in St. Louis this week, many will find that lesson plans have been hastily revised to include sensitive issues of race and policing that were ignited by the fatal shooting on August 9 of an unarmed black teenager by a white police officer in the suburb of Ferguson, Mo. On Monday, as thousands of mourners gathered nearby for Michael Brown’s funeral, area college students were engaging in conversations about racial profiling, the use of force, and tensions caused by economic disparities. The links were obvious in fields like criminal justice and sociology, where professors were able to put a familiar face on their case studies. But faculty members in education, English, history, and a wide range of other disciplines also saw teaching opportunities in a tragedy that has gripped the nation and prompted calls for change. The Chronicle talked with local professors about how they planned to tackle such issues in the classroom. Following are four examples of their plans, in their own words. Daniel Isom, professor of policing and the community at the University of Missouri at St. Louis and police chief of St. Louis from 2008 to 2012 Courses: "Policing" and "Introduction to Criminology and Criminal Justice" I’d like to work with the class to build a case study on how you would handle a highly charged police shooting. How would you deal with a protest situation, what are the steps you go through as a law-enforcement agency in terms of managing a crowd and releasing information to the public? We’ll also be talking about community policing as it relates to Ferguson. This became a buzzword in the 1990s as a way to build better relationships with the community. I want to look at a broader model of community policing that goes beyond neighborhood meetings and foot patrols. We’ll examine cities, like Cincinnati, that have collaborative agreements in which citizens have a voice in the hiring process and in the promotion and selection of the chief. We’ll also consider whether a more-diverse force might have been able to quell some of the unrest in Ferguson or build a better understanding and communication with the community. We need to have a mix of people in law enforcement, and I hope more students of diverse backgrounds will see this as a career path. There’s a lot we can learn from this situation about de-escalating tensions and the legal justifications for using force. Would people feel more confident if citizens could review use-of-force cases? When you have problems in the neighborhood, do you go to the community and say, "These are the strategies we have in our toolbox. What do you think we should do?" That way, when an incident happens, the response is something the community has agreed is appropriate. Clarissa Rile Hayward, associate professor of political science at Washington University in St. Louis Courses: "Power, Justice, and the City" and "History of Political Thought II: Legitimacy, Equality, and the Social Contract" In the first course, we look at theories of power and justice through the lens of the contemporary metropolis, with sections that examine power and racial injustice, resistance to power in urban America, and power and justice in American suburbs. In every case, Ferguson will be very relevant. A local alderman, Antonio French, published a series of vines (short videos) in which he captured much of the police violence on film. We’ll use that to talk about the role of new media, including Twitter, in political communication and mobilization. One of the key concepts in my history-of-thought class is legitimacy. On our first day, we will think about this concept using the Ferguson case. We’ll ask what it is about governance and the exercise of power in Ferguson that seems illegitimate. Two-thirds of the population is African-American, but the mayor, the entire school board, and all but one member of the City Council are white. It raises the question: Does this body of elected officials share the perspectives of their constituency? How are local elections structured, and how might that contribute to the imbalance? In my class on the history of political thought, we study social-contract theory. We read Hobbes, Locke, and Rousseau, and focus on the idea of government legitimacy being founded on consent, on the will of the people. I want students to think about why these political theories are relevant today. What’s happening in Ferguson grounds these issues in something concrete and urgent. I’m so far behind where I usually am at this point, but I’m also feeling energized. I often feel like scholarship and teaching are done in the quiet of the office and involve mostly reflection. I hope that continuing the conversations about racial injustice that we’re having around campus in the classroom will highlight the relevance of political theory to political life. Norman A. White, associate professor of criminology and criminal justice in the School of Social Work at Saint Louis University Courses: "Externship in Criminology" and "Criminology and Professional Practice" Three years ago, we decided we needed to change the way we looked at offenders and the justice system, and we coined a phrase, human justice, to emphasize the goal of providing dignity to everyone. We’ve been finding ways to get students into the community more to interact with people they might not otherwise meet, to see that they’re just like them. You can’t be an effective criminal-justice professional without understanding the lives of the people you may come in contact with. We’re looking at how issues like poverty, unemployment, and single-parent households increase the possibility of young people engaging in problem behavior. What’s happening in Ferguson is putting this work more front and center, and it’s opened the door to conversations about economic inequality and the constitution of the police force that needed to happen. We’ve been creating relationships with middle-school kids through tutoring and other activities in a place called the Sanctuary, which is located in a St. Louis neighborhood with historically high crime rates. Given what’s been happening lately, I sent my students a letter with a series of questions, mainly about how they felt about my asking them to go out and do this work. Some of my students are younger, and I also wanted to reassure their parents that they wouldn’t be in danger. Because we’re a Jesuit institution, we have students who want to serve the community, and they’re eager for these opportunities. Sometimes my colleagues talk about these neighborhoods as laboratories, but I think about them as places where people live. Cindy Epperson, professor of sociology at St. Louis Community College at Meramec Courses: "Introduction to Sociology" and "Crime and Society" I’m working on diagrams to show how all of this started with the shooting and killing of an 18-year-old man just two weeks ago and how that led to all of a sudden having National Guard troops stationed in our streets and people rioting. One diagram will show Michael Brown and the groups that surround him—the grieving family and the grieving community—and how his death connected him to a community of strangers. We’ll talk about how the life and death of this young man will lead to social change. We’ll also talk about debunking stereotypes and myths. Most of the looters shown in the media were black, so people who believe this is what black people do are going to say, "See, I told you so." But what we do in sociology is look at how many people were there and how many were not looting. How many were opportunists whose actions had nothing to do with the death of Michael Brown? My colleagues and I have spent time with the protesters in Ferguson, trying to get our heads around what’s happening. We want students to start thinking critically about how the events relate to each other and about possible solutions. Why are there only three African-American officers out of 53 when 63 percent of Ferguson is African-American? What kinds of attitudes might be preventing people from becoming police officers, and how can the college be part of the solution? Katherine Mangan is a national reporter for The Chronicle who covers community colleges, college-completion efforts, and work-force issues. Follow her on Twitter @KatherineMangan.
<urn:uuid:16b72993-1f19-411a-ad16-69fd3daf2997>
CC-MAIN-2015-11
http://chronicle.com/article/How-Professors-in-St-Louis/148479/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462141.68/warc/CC-MAIN-20150226074102-00288-ip-10-28-5-156.ec2.internal.warc.gz
en
0.968442
1,743
2.765625
3
Health News of Thursday, 7 August 2014 Source: Graphic Online A World Health Organisation (WHO)-constituted International Certification Team (ICT) has concluded that Ghana has met the criteria for the certification of Guinea worm disease (GWD) eradication. This means Ghana could soon be certified as a Guinea worm free country. The team comprised seven international health experts from Burkina Faso, Ethiopia, India, Nigeria, United States of America (USA) and Yemen, five national experts independent of the Ghana Guinea Worm Eradication Programme (GGWEP) and six national facilitators from GGWEP. The ICT visited all the ten regions of Ghana, 47 districts, 119 communities and 1,320 respondents following a request by the Ministry of Health to the WHO in May this year to certify Ghana free from Guinea worm disease. The Programme Manager of GGWEP, Dr Asiedu Bekoe, told the Daily Graphic in Accra on July 30 that the ICT observed that there was no active Guinea worm cases in the areas visited. He said thousands of rumoured and suspected cases were reported and investigated and none was found to be Guinea worm and the last reported case was a 41-year-old female from Diare Village in Savelugu-Nanton, reported in May 2010. In 2010, he said only eight cases were reported, all in Savelugu-Nanton, compared with 242 cases in 2009, representing a 97 per cent reduction. He, however, said all eight cases were contained, and since June 2010, no case had been reported. However, in spite of the new development, Dr Bekoe urged Ghanaians to continue to be on the lookout because visitors come in from countries that are Guinea worm endemic. The Guinea worm disease (Dracunculiasis) is a crippling parasitic disease caused by Dracunculus medinensis, a long thread-like worm. It is transmitted exclusively when people drink water contaminated with parasite-infected water fleas. Dracunculiasis is rarely fatal but infected people become non-functional for months. It affects people in rural, deprived and isolated communities who depend mainly on open surface water sources such as ponds for drinking water. Transmission, life-cycle and incubation About one year after the infection, a painful blister forms, 90 per cent of the time on the lower leg, and one or more worms emerge accompanied by a burning sensation. To soothe the burning pain, patients often immerse the infected area in water. The worm(s) then releases thousands of larvae (baby worms) into the water. These larvae reach the infective stage after being ingested by tiny crustaceans or copepods, also called water fleas. People swallow the infected water fleas when drinking contaminated water. The water fleas are killed in the stomach but the infective larvae are liberated. They then penetrate the wall of the intestine and migrate through the body. The fertilized female worm (which measures from 60–100 cm long) migrates under the skin tissues until it reaches the lower limbs, forming a blister or swelling from which it eventually emerges. The worm takes 10-14 months to emerge after infection. The disease has a long history in Ghana and infection was widespread in the 1950s. In 1985 when official records began, 4,060 cases were reported and a survey estimated about 70, 000 cases in the Northern Region alone. By 1989, the number of recorded cases had increased to 179,556 during a nationwide case each conducted by the GGWEP, established in 1988, following a declaration by the 39th World Health Assembly in 1986 urging all countries to eradicate the disease. From 2000, the Government of Ghana, development partners and the GGWEP had mobilised resources to support the national programme which led to significant reductions in an annual number of reported cases from 2004. A setback, however, occurred during the 2006-2007 transmission season when the Tamale Municipal water system in the Northern Region broke down, precipitating an outbreak in all the districts served by this system. In the period, the Savelugu-Nanton District reported the greatest number of cases. After that outbreak, the programme reported 501 cases nationwide in 2008, a reduction from the 3,358 cases reported the previous year, which was the largest one-year reduction in annual cases in its history. To be declared free of dracunculiasis, a country needs to have reported zero transmission and afterwards maintained active surveillance for at least three years. After this period, an international certification team visits the country to assess the adequacy of the surveillance system and to review records of investigations regarding rumoured cases and subsequent actions taken. Indicators such as access to improved drinking water sources in infected areas are examined and assessments are carried out in villages to confirm the absence of transmission. Risks of reintroduction of the disease are also assessed. Finally, a report is submitted to the International Commission for the Certification of Dracunculiasis Eradication (ICCDE) for review. Since 1995, the ICCDE has met nine times and on its recommendation, WHO has certified 197 countries, territories and areas (belonging to 185 member states) as free of dracunculiasis.
<urn:uuid:7a7f2e85-b16c-494e-81ee-c1a3d2c65869>
CC-MAIN-2015-11
http://www.ghanaweb.com/GhanaHomePage/health/artikel.php?ID=320216
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936465456.40/warc/CC-MAIN-20150226074105-00207-ip-10-28-5-156.ec2.internal.warc.gz
en
0.954181
1,080
2.703125
3
You wake on Saturday morning, drag your body out of bed and survey your home. You had entertained houseguests the night before, and it shows. Friends and family had filled your home, loud voices and much conversation echoed within your walls and everyone went home much later than you had planned. And now it is time to pay the piper. A full Saturday’s worth of dishwashing, floor scrubbing and shelf wiping stares you back in the face. Such is our common experience, something each of us can likely relate to. New research, however, suggests that your brain may feel the same way at the end of a long day of thinking. The brain is just like any other organ in the body in that the spaces in between its cells must be regularly swept clean to keep things running smoothly. Yet it has remained a bit of mystery how the brain accomplishes this task. See, in the rest of the body, the lymphatic system takes care of most of this cleaning of the spaces between cells. The brain, however, has no lymphatic system. In the summer of 2012, our research team reported in the journal Science Translational Medicine the discovery of a clever anatomical pathway by which the brain accomplishes this task of cleaning out the spaces between cells. Basically, it uses spaces on the outside of blood vessels as a dedicated set of plumbing that allows cerebrospinal fluid, or CSF, that surrounds the brain to wash through the brain, essentially flushing debris and waste out. This washing depended on water movement through support cells in the brain called “glial cells.” Thus we termed this brain-wide clearance pathway the “glymphatic system.” Anyone who has every pulled an all nighter, or has had young children, knows that after a night with little or no sleep, not only do you feel more tired, but your mind is foggier. Why a good night’s sleep leaves the mind clear and crisp, and indeed why we would need sleep at all (since it represents “wasted” time not doing something more productive), has been one of the persistent mysteries in neuroscience. In a study published last week in the journal Science, our team reported findings that may shed light on this question. By imaging the flushing of fluid through the brains of live mice that were awake or naturally asleep using a technique called 2-photon microscopy, we found that the rate of cleaning in the brain differed dramatically between the waking brain and the sleeping brain. When the brain is asleep, we found that its cells shrink in order to open up the spaces between them, which allows CSF to flush through the sleeping brain at about 20 times the rate seen in the waking brain. This translated to a doubling in the efficiency of waste clearance from the sleeping versus waking brain. These findings suggest that part of the function of sleep is restorative – that it provides the brain an opportunity to tidy up and clean out the day’s accumulated waste when the activities of waking life aren’t getting in the way. It’s like cleaning up on a Saturday after Friday night’s houseguests have left. These new findings do not simply illuminate a potential purpose of sleep, but may inform our understanding of the role of sleep disturbances in the setting of neurodegenerative diseases like Alzheimer’s disease. Alzheimer’s disease is believed to be caused by the buildup of plaques made up of a protein called amyloid beta in the aging brain. Two recent studies published in the journal JAMA Neurology have shown that in human patients that haven’t yet developed Alzheimer’s disease, poorer sleep quality is associated with greater buildup of amyloid beta plaques. Whether this is because bad sleep promotes amyloid beta accumulation, or whether low-level brain damage caused by amyloid beat promotes sleep disturbance has not been clear. However, our study suggests that one of the functions of sleep is the clearance of amyloid beta, and supports the idea that the inability to get proper sleep could promote the development of neurodegeneration. While this most recent study was led by Dr. Maiken Nedergaard at the University of Rochester Medical Center in New York, follow-on studies are currently underway here at OHSU. In January of this year, I was recruited from the University of Rochester to come to OHSU and establish a research program based in part upon my work in this brain-wide, waste-clearance pathway. Bringing this research here to OHSU was made possible in large part by the generous gift from Phil and Penny Knight establishing the Knight Cardiovascular Institute at OHSU, of which I am now a part. Using 2-photon microscopy and other approaches, we are working to define how this waste-clearance system becomes impaired in the aging brain and the contribution that damaged, aging blood vessels in the brain make to this process. The goal is to find key steps in this degenerative process that could be targeted with drugs to stop the failure of amyloid beta clearance and the accumulation of amyloid beta plaques in the brain. With a lot of smart people working together, we hope that the discoveries that we’ve made so far in mice will translate to new opportunities to change the course of Alzheimer’s disease in patients.
<urn:uuid:58bc7ffe-c1fb-4b31-b03c-1f1f7ad3d597>
CC-MAIN-2015-11
http://www.ohsu.edu/blogs/brain/2013/10/30/how-our-brains-wash-away-the-gunk-during-sleep/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463679.20/warc/CC-MAIN-20150226074103-00207-ip-10-28-5-156.ec2.internal.warc.gz
en
0.956377
1,103
3.140625
3
Ecolution: 15 (More) Future Wonders of Green Technology As the world increasingly focuses on sustainable initiatives, green architecture is a booming industry. Everything from single-family residences to giant 1.2-million-square-foot complexes complete with giant skyscrapers is getting the green treatment, and the innovation that iss going into these plans is more complex than ever. From spinning towers to seawater greenhouses, ome of these structures will debut as early as the fall of 2008 while others present a view of what 100 years from now may hold, but all represent amazing leaps in green technology that push the boundaries of what we’ve ever thought possible. (Then see more here: Green Art, Design and Technology). Architect David Fisher has proposed a plan for rotating towers that produce all of their own energy through wind power. The Rotating Tower would be built by stacking platters on a central concrete core with wind turbines located between each of them. Each floor will rotate 360 degrees about once every 90 minutes; as the floors will rotate independently, they will create a constantly changing silhouette in the sky. Inside the concrete core will be elevators, emergency stairs and lobbies. The Rotating Tower will be built in Dubai in the next six months. As water becomes an even hotter commodity in the future, engineers are looking for ways to ensure a continued supply of fresh water to meet the needs of the world’s growing population. Charles Patton is tackling this problem with his Seawater Greenhouse, a carbon-neutral desalination method which is being incorporated into the design of the Teatro del Agua. This Theater of Water will be a performing arts center in Spain’s Canary Islands. It works by coupling a series of evaporators and condensers such that the airborne moisture from the evaporators is then collected from the condensers, which are cooled by deep seawater.? The center will operate almost entirely on renewable energy. The Dice House is a zero carbon home, which can either stand alone or function as attached multiple dwellings. Designed by Sybarite, a British architecture firm, the Dice House is a 9 x 9 meter cube that sits on an octagonal plinth. Three levels inside the cube have large, plentiful windows to maximize views. A large thermoplastic umbrella on the garden roof of the house shades and insulates the house and collects solar energy. The new Las Vegas CityCenter is the largest privately financed development in North America. This $8 billion project is a joint venture between MGM Mirage and Dubai World. Designing the CityCenter will be renowned green architects including Pelli Clarke Pelli, Foster + Partners and Rafael Vinoly. MGM Mirage has trained over 10,000 construction tradesmen on green building practices to be put into place in the structures. CityCenter, which will house hotels, casinos, restaurants, retail space, entertainment space and a $40M public fine arts center, is touted by its developers as a model of sustainability. Recycling construction waste, using environmentally friendly materials, emphasizing natural light and incorporating an onsite co-generation power plant are just a few of the sustainability initiatives that will be put into place. Architect Sheila Kennedy has designed the Soft House, a structure that harvests energy through solar-energy-collecting textiles hung in the home like curtains. These thin-film photovoltaic textiles can create close to 16,000 watt-hours of electricity, providing about half of the home’s power. Though the high cost of this solar technology makes the Soft House unlikely to become reality any time soon, Kennedy hopes that the design will show others that renewable energy technologies can be incorporated into structures in creative and unexpected ways. The world’s first passive house museum is set to be built in Ulricehamn, Sweden, functioning as a visitor’s center. The building’s heat will be supplied entirely by the body heat of visitors and the equipment located inside. Solar cells on the roof will provide part of the energy used to run electrical equipment and heat water. The circular design of the structure will allow efficient circulation of air to enhance the passive heating and cooling of the building. The Chicago Spire is an ambitious project currently under construction in the Windy City. At 2,000 feet, the spire will be North America’s tallest free-standing structure and the tallest all-residential building in the world. Designed by Spanish architect Santiago Calatrava and managed by the Shelbourne Development Group, the Chicago Spire was designed to mimic the natural form of a nautilus shell. The structure is anticipated to have a LEED gold rating; it will be outfitted with rainwater harvesting systems, geothermal cooling and high performance glass designed to protect migratory birds. The Chicago Spire is set to be completed in 2011. Frasers Broadway, a commercial, residential and retail complex, will be Australia’s most sustainable building. The designers, including Pritzker Prize winners Foster & Partners and Ateliers Jean Nouvel, will incorporate such eco-friendly features as a gas-powered co-generation electricity plant, green rooftops, a wastewater recycling plant, smart metering and solar power into the design in an attempt to achieve carbon neutrality. The 250,000 square meter development will be located in the old Kent Brewery in Sydney. Pelli Clark Pelli architects recently got approval for their design for a new green Transbay Transit Center in San Francisco. The transit center will consist of a glass tower and a five-and-a-half acre public park, and will be packed with sustainable features like green roofs, passive solar shading, wind turbines, a rain and graywater recycling system and geothermal heating and cooling. The aim of the building is to centralize the region’s transportation system while also providing a community space. The center will be completed by 2014. China’s population is exploding while its industrial ventures are producing more pollution than ever – a combination that makes it difficult to be eco-friendly. A new sustainable housing project called Habitat 2020 aims to be one of the leaders in bringing environmental initiatives to this growing country. The Habitat 2020 building will feature an active skin: a membrane between the exterior and interior walls that will absorb air, water and light from outside and dispatch it inside as clean filtered water, natural air conditioning and electricity. The same funnels on the membrane that pull these resources in will also emit clean, CO2-free air from inside the building. This urban megalopolis is set to be complete in 2020. Another project that aims to act as a ‘living’ structure is the California Academy of Sciences museum set to open in San Francisco this fall. The museum will have a 2.5 acre, undulating green roof that will integrate it into the surrounding Golden Gate Park. The 400,000-square-foot, $484 million structure will likely be the first public building to achieve a platinum LEED rating. Designer Renzo Piano has incorporated a planetarium, a rainforest with free-flying birds, a coral reef home to 4,000 fish in a saltwater aquarium and a natural history museum into the building. Maul Dwellings designed the Landscape House, which won the AIA’s 2006 Committee on Design competition to design “a house for an ecologist”. The house not only features a double roof for enhanced air circulation, louvered shutters to harvest energy, a Water Pod to house efficient plumbing systems and a solar dehumidifier unit to capture moisture from the air for drinking water, it also is designed for deconstruction and reuse. Though this innovative structure wasn’t originally intended for widespread residential use, its intelligent eco-friendly features make it a great source of inspiration for future green homes. Kuwait will soon have its first LEED skyscraper. The Sabah Al Ahmed International Finance Center will be a 1.2 million square foot, 40-story tower that includes four stacked courtyard atriums ranging from 8 to 13 stories each. The tower will generate some of its own energy from a photovoltaic system as well as the wind turbines that will crown the roof. Inside will be office space and a 4-star business class hotel. The International Finance Center (ICF) has been precertified at the gold level under the LEED rating system. London-based Foster + Partners, who are also working on the aforementioned Frasers Broadway complex, have another green complex in store. This one will be located in Singapore City, measuring 150,000 square meters and set for multi-use functioning. The complex’s exterior will be covered with solar cells, and direct sunlight will also be harvested by tall ribbon-like canopies rising into the skyline. The slanted design of the facades will allow wind to flow into the building for a natural cooling effect, and vertical green spaces will provide ambient temperature moderation. The building will also be equipped with a rainwater harvesting system, geothermal heating, chilled beams and an ice storage system for cooling. The furthest-reaching green wonder of the future is IwamotoScott Architect’s vision of San Francisco in 2108. This stunning winner of the History Channel’s City of the Future competition shows what a totally eco-conscious San Francisco could look like 100 years from now, complete with algae-harvesting towers, geothermal energy mushrooms and fog catchers to distill fresh water from the city’s foggy atmosphere. Designed to make the most of the area’s microclimate and geology, Hydro-Net is a network of both above-ground and underground systems that takes the need for alternative energy sources in mind with a connected network of water, power collection and distribution systems. Carbon nanotube walls would collect and disperse hydrogen produced by algae, which would be used to hover-cars in underground tunnels.
<urn:uuid:2ff68494-cded-4dfe-b005-a5f4e29375da>
CC-MAIN-2015-11
http://weburbanist.com/2008/07/08/15-more-future-wonders-of-green-technology/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463411.14/warc/CC-MAIN-20150226074103-00142-ip-10-28-5-156.ec2.internal.warc.gz
en
0.931236
2,029
3.078125
3
Growing plants keeps your soil alive and well all year long. In the flower garden, plant annuals and perennials close together. The tops of perennials die back to the ground in fall and winter, but perennial roots stay active as long as soil temperatures are above freezing. Add cold-weather annuals such as pansies, sweet William, ornamental cabbage and kale to fading perennials to give life and color to the winter garden. They will also absorb nutrients already in the soil. Pansies provide a wide range of color and will bloom off and on all winter. Come spring, they will produce an abundance of blooms in late April lasting through May. Sweet William is bi-annual. If you plant it this fall, it will flower well in the coming spring and even more profusely in the spring of 2016. Caution: Rabbits love pansies. If you have rabbits, scatter mothballs under the leaves. If you have children, wrap the mothballs loosely in aluminum foil and cover them with a thin layer of mulch. In the vegetable garden, broccoli, cabbage and collard greens, kale and turnips are colorful, hardy and harvestable through much of winter. A green alternative is a soil-covering crop of winter rye. Winter rye grows a lush green carpet of grass. The perfect scavenger crop, rye grows roots deep in the soil, absorbing nutrients not utilized by the previous plants and protecting groundwater. On the surface, rye prevents your soil from being washed away by heavy rains or winds. Bulbs Planted Now Bring Spring Rewards Bulbs planted in October and November go to work now. In fall, they root quickly and absorb residual nutrients from the soil. In spring, they bring the garden to life. Plant tulip, narcissus or daffodils, hyacinths and crocus bulbs in October and November for April bursts of color. Plant garlic and long-day onions for spring and summer harvest. For flowering bulbs, dig deep. Excavate an area 12 inches deep and at least 12 inches wide. Add a four-inch-thick layer of equal parts by volume soil from your hole and good compost. Do not put sand under the bulbs. Place bulbs at least one inch apart on top of the blended soil with the flat side of the bulb against the wall of the hole. Planting this way will direct leaves to bend outward, giving the planting a more appealing appearance. Place a single bulb in the center. Cover the bulbs with eight inches of blended topsoil and compost. Don’t use a bulb-planting tool, which makes holes too shallow and compresses the soil along the walls of the hole, especially if the soil contains large amounts of silt or clay. Blend equal parts compost and topsoil and layer the soil four inches thick across the bottom of the hole before planting. Position the bulbs upright for uniform blooming in the first year. The compost will supply all of the nutrient needs through the first growing season. Narcissus … daffodils … or jonquils. Whatever you call them, these spring plants are perennials in Southern Maryland gladly blooming year after year. Plant now and you’ll have yellow blooms bursting through melting snow. Plant your daffodils deep and you can also plant hyacinth, crocus and more seasonal flowers above the daffodil bulbs without fear of damaging the bulbs with digging tools. Tulips are often an annual crop in Chesapeake gardens, as our warm springs disagree with them. Unlike daffodils and hyacinths, tulips produce a new mother bulb each year, plus possibly a few daughter bulbs. Because our springs are short — before long, hot summers — tulip foliage does not last long enough to build a new bulb equal to or larger than the original. The Netherlands and more northern states like Michigan enjoy optimum tulip climate: cool springs that last for several weeks. To get your tulips to flower more than one year, plant them by mid-October in a well-drained location in full sun. Early planting assures that the bulbs develop a large root system before soils cool with the arrival of winter. If you want your tulip bed to last many years, choose yellow tulips, which, for some unknown reason, perform better and last longer than red, white or pink cultivars. Caution: Deer love tulips; don’t plant them if deer visit. Onions and Garlic Garlic bulbs can be planted from early September until mid November. The plants need time to produce visible foliage before the ground freezes. Select a location in your garden that will receive maximum sunlight. Garlic planted in partial shade will not produce fully developed bulbs. Garlic grows best in well-drained soils rich in organic matter. To meet the organic requirements, spread about two inches of compost over the soil and spade or rototill as deeply as possible. A soil test will tell you your pH and how to achieve the garlic ideal of near 6.5. Plant each clove, pointed side up, in holes four inches deep and four inches apart in rows 10 inches apart. Just before the ground freezes in December, mulch with a one-inch layer of compost. Next spring, water thoroughly at least twice weekly. In May, cut the flowers just below the swollen part of the stem as they form so as to maximize the size of the bulbs. Just as soon as the leaves start to turn brown in early summer, dig using a forked garden spade to minimize damage to the bulbs. The short days of fall and winter are beloved by short-day onions. A short-day onion variety will form a bulb only when the days are short. Begin planting any time now so the plants become well established before the ground freezes. To give them the organic matter they want, amend your soil with an inch or two of compost prior to planting. After the ground freezes in winter, mulch the onions again one to two inches deep to help prevent the frost from pushing the onions out of the ground with repeated freezing and thawing. As soon as the plants resume growth in the spring, apply a water-soluble fertilizer to stimulate early active growth. Harvest begins in June.
<urn:uuid:3db27345-2bd7-4e9f-bd24-a428f6ae7035>
CC-MAIN-2015-11
http://bayweekly.com/articles/author/Dr.%20Francis%20Gouin?page=2
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936459277.13/warc/CC-MAIN-20150226074059-00140-ip-10-28-5-156.ec2.internal.warc.gz
en
0.927056
1,320
3.265625
3
Scripture Reference: Luke 4:14-31 Story Overview: For the first time in his ministry, Jesus preached at his home synagogue. At first, the listeners liked the message that Jesus preached. When the people began to disagree with God’s message, they got mad at Jesus and tried to throw him off of a cliff. Even though the whole crowd was trying to kill him, Jesus miraculously walked right through them and left. It can be difficult to share God’s message. Suggested Emphasis: Encourage those who preach the word of God. |Background Study||Way to Introduce the Story||The Story| |Review Questions||Craft and Activity Ideas||Online Resources| Jesus began to rise in popularity as he preached more and more. One Sabbath (most probably a year after he had started his ministry) Jesus was invited to speak at the synagogue in Nazareth. Although he was born in Bethlehem, he grew up in Nazareth. This was his hometown. The people who had watched Jesus grow up would have been excited that such a popular preacher had come from their town. It was the custom to allow visiting teachers to speak to the congregation with the special invitation of the synagogue leaders. Notice in verse 16 that it was Jesus’ custom to attend the synagogue every Sabbath. This is a lesson in itself that the children can relate to. Jesus read from the book of Isaiah. The custom was to read from the Hebrew and then he or someone else paraphrased it in Aramaic, one of the other common languages of the day. The scrolls were kept in a special place in the synagogue and handed to the reader by a special attendant. The passage Jesus read about the Messiah (Isaiah 61:1-2) may have been one he chose to read, or it may have been the assigned passage for the day. The verse tells of the Messiah’s ministry of preaching and healing—to meet every human need. Jesus was proclaiming liberation form sin and all its consequences. The Spirit of the Sovereign Lord is on me, because the Lord has anointed me to proclaim good news to the poor. He has sent me to bind up the brokenhearted, to proclaim freedom for the captives and release from darkness for the prisoners, to proclaim the year of the Lord’s favor and the day of vengeance of our God, to comfort all who mourn. Isaiah 61:1-2, NIV It was customary to stand while reading Scripture but to sit while teaching. In verses 26-27 Jesus refers to 1 Kings 17:1-15 and 2 Kings 5:1-14 to mention Gentiles who God helped. Jesus’ point was that when Israel rejected God’s messenger of redemption, God sent him to the Gentiles—and so it would be again if they refused to accept Jesus. This is the point when the Jews became so furious with the message that they tried to take Jesus to a cliff and throw him off. Verse 30 does not say whether Jesus escaped miraculously or whether he was able to simply walk through the crowd as a result of his commanding presence. In any case, his time to die had not yet come (John 7:30). Way to Introduce the Story: If possible have some pictures of someone preaching. Show the class and discuss what it must be like to get up in front of people and talk. Share your own experiences of making speeches and ask the children to share. “In the lesson today we will be talking about a time when Jesus preached in the town of Nazareth.” Jesus went to many places to tell people about God. After he had been doing that for a while he decided to go back to the town of Nazareth. Nazareth was the town where Jesus had grown up. That was the town where his old friends and teachers lived. People in Nazareth had heard about Jesus. They knew that he was a preacher and that lots of people liked him. They were proud of Jesus and were glad that he was from Nazareth. Maybe he would do a miracle in Nazareth. Jesus was in Nazareth on the Sabbath – the day of worship. Guess what Jesus did? Do you think he went to sport? Do you think he slept in or went to the beach? No, of course not! Jesus did what he did every Sabbath day. He went to the synagogue to worship. The leaders of the synagogue were so happy to see Jesus that they asked him to read a Scripture and then preach about it. Jesus stood up picked up the scroll where the Word of God was written. He unrolled the scroll and read from it. Then he sat down and began to preach. The Jews in the synagogue really liked what Jesus was preaching. They were glad that Jesus was a Jew like them. Some of them even thought that Jews were better than anyone else. Then Jesus said something that they did not like. He said that God loves everyone. God loves the Jews but God also loves the people that are not Jews. God wants everyone to learn about him. The Jews got very angry. They did not want anyone but the Jews to hear about God. Even though Jesus was preaching the truth, the people got mad at him. The people started pushing Jesus and telling him he had to leave. They followed him and kept pushing him forward until he got to a big cliff. There was nowhere else for Jesus to go. It seemed everyone was going to push him off of the cliff! Then something amazing happened. The bible said that Jesus just walked right through the crowd and left. How did he do that? How could he just walk right through a crowd that was trying to push him off of a cliff? He could do that because Jesus is the Son of God. He has the power of God. He can do anything! Jesus was not sorry that he preached the things that God wanted him to preach. He did it even if people did not like him. - In what city did Jesus preach a sermon in a synagogue? Nazareth - Did the crowd in the synagogue at Nazareth like Jesus’ sermon at first? Yes - What did the crowd at Nazareth try to do to Jesus when they did not like what he said in his sermon? They tried to throw him off of a cliff. - Make a scroll and write something about today’s lesson on it. - Ask a preacher to visit class and tell about the work he does. He could also give the class a tour of his office or library. - Make a gift for someone who preaches. Present it to them at the end of class or put it on the pulpit. - Talk about the special things a preacher’s family does to help him: wife encourages, feeds, mends clothes, and takes care of children while he preaches. Children sometimes don’t have him at home because he is preaching somewhere or helping someone. Write cards to the preacher’s family. - After the lesson let the children take turns getting behind a pulpit and “preaching a sermon” about today’s lesson. You could also let them do a puppet show and let the puppets “preach”. - Older children can learn how to take notes during a sermon. Provide paper to do this with in worship. - Colouring page and puzzle worksheets at http://www.calvarycurriculum.com/pdf/childrenscurriculum/NEW/CURR186.PDF - Craft: Make paper doll people for a preacher and audience. Children can use the dolls to act out listening to a sermon and encouraging the preacher. Lot’s of patterns to choose from at http://www.makingfriends.com/friends/f_themes.htm
<urn:uuid:947caea6-3454-4e32-add9-57e25dba0e90>
CC-MAIN-2015-11
http://missionbibleclass.org/1b0-new-testament/new-testament-part-1/life-of-christ-middle/jesus-preaches-in-nazareth/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464193.61/warc/CC-MAIN-20150226074104-00206-ip-10-28-5-156.ec2.internal.warc.gz
en
0.986495
1,618
2.859375
3
The Life of Pi in the Electronic Silk Road The Life of Pi presents an epic journey that a boy survives by maximizing spiritual strength in the most adverse circumstances. Called Pi, the boy harnesses curiosity, spirituality, and love to go through his adventurous “international” journeys through religions, cultures, and most notably nature with a stormy ocean. In his new book The Electronic Silk Road: How the Web Binds the World in Commerce, Anupam Chander also narrates an epic journey that we must embark on in the digital age. Skillfully written with elegant prose, the book explores complex challenges posed by culture, politics, and technology associated with trade in information services. As a boundless venue hosting trade in services, cyberspace turns out to be the ocean that Pi crossed. According to Anupam, it has enormous barriers blocking the freedom of trading information services in the global context. Culture matters. While some information services are totally fine in western societies, they may be seen as hostile to Islamic beliefs. Politics matters. It has resulted in information suppression in certain authoritarian countries. Technology matters. It facilitates the growth of information services. But it has been used to block trade in information services. The great firewalls that exist in the electronic silk road best illustrate the difficulty of promoting trade in information services. As mighty as the storm and waves that Pi suffered on the ocean, they are utilized by repressive regimes to monitor, filter, and even shut down the Internet. In 2010 Google withdrew its operations from mainland China. This incident, as I understand from reading Anupam’s book, is a shipwreck as serious as the one that Pi remembers as the darkest day of his life. But it is also a shipwreck similar to the one that Pi regards as a new journey into knowing himself, other beings with him, and the world or nature at large. On the one hand, Google’s retreat sounded the loudest alarm to the protection of freedom of information in repressive regimes. Nearly 1.3 billion Chinese citizens as well as many other fellow human beings are subject to cyberspace information suppression by authoritarian regimes. As Anupam bluntly reminds us, “[w]hen allied with willing Internet service providers, websites, software providers, and financial intermediaries, a government can gain an omniscience heretofore unknown.” In the digital age, it is the cross-border information services that supply state-of-the-art technologies and abundant financial resources to the authoritarian regimes. On the other hand, the Google incident calls for immediate and long-term interventions in order to reshape cyberspace as a sphere free of uncivilized surveillance. This journey to information freedom is, indeed, as arduous as the one that Pi experienced across the ocean and continents. Religion, language, imagination, dignity, and even capacity for love all play an important part contributing to Pi’s triumph. The same applies to the journey toward information freedom. After all, people subject to information suppression live with (or without) different religions and speak different languages. Therefore, the capacity for a concerted effort to empower human dignity and love to address information suppression varies significantly across the world. Toward the end of book, Anupam hints that the World Trade Organization, an international institution that governs global trade both in goods and services, might be of little help to resolve this issue. Without any competent international organizations charting the map, the journey to the heaven of information freedom is destined to be a long and tricky adventure. Reading The Electronic Silk Road together with The Life of Pi prompted me to think about issues that go beyond information suppression existing in repressive regimes. I realized that there are two major issues looming large in the digital age. While we enjoy the unprecedented freedom, convenience, and entertainment that digital technology can bring to us, we must ponder the dark side of digital technology and how the law should tackle it. First and foremost, we can identify and understand the ways in which the ubiquity of information services can spawn profound problems. The Life of Pi conveys problems of this kind: hostility toward another religion and culture; indifference to other human beings deemed as inferior; and unwillingness to reciprocate others’ good deeds (Richard Parker, the tiger who has a human name, runs into the nearby jungle without a glance back). All these problems remain for Pi, although he has miraculously made it to shore. Online information services have caused similar problems. For example, the websites hosting information services are rife with fraud. Shortly after I posted an advertisement on Craigslist for subleasing my apartment last fall, I received several emails through which the senders attempted to persuade me to deposit money into their bank accounts before they took over the lease. After doing a bit research about online fraud, I could not help asking myself why there are so many people who choose fraud as their jobs. Thus, digital technology is a double-edged sword. It promotes free flow of information and provides the social glue to bind many people together to wage revolutions against repressive regimes (e.g., the Jasmine Revolution). However, it also wields the power to alienate many people from the social network of direct interactions, leaving them increasingly alone in their spaces of egoism. Today, the majority of people on the subway spend much of their time using their smartphones or tablets. They appear in the tangible public spaces, but they confine themselves to those machines connected with the Internet, enjoying the private fun of checking Facebook or Twitter, playing electronic games, reading news, shopping online, or watching YouTube videos. Digital technology has facilitated widespread use of emails and text messages, further reducing the occasions for face-to-face conversations, greetings, or smiles. Thus, these trends raise the question whether digital technology promotes engagement with others or reinforces the individual quest for solitude. A new book by Sherry Turkle, Alone Together: Why We Expect More from Technology and Less from Each Other, has a comprehensive and nuanced discussion about this tangled issue. How should the law tackle the double-edged nature of digital technology? Law is critically important in this regard, because it informs people of what they can and cannot do. Anupam teaches us that core to the law regulating trade mediated via cyberspace is the protection of “the right of individuals to share and receive information.” This core right prioritizes the “delivery and consumption” of information “regardless of frontiers” (p.202). His novel proposal that combines globalization together with harmonization of laws serves the full realization of this right. But can celebration of the individual right to share and receive information offer means by which we can deal with the alienating effect of digital technology? In other words, does the language of rights really increase the consciousness of sharing information as it purports to? To some extent, it does. Anupam proves this with many vivid examples, particularly the Jasmine Revolution in which sharing information about freedom and democracy was the focal point. But as I discussed earlier and others’ works have proven, digital technology has also driven an increasing number of people to withdraw from traditional means of communication and confine themselves to an egoistic world of isolation. I believe the language of responsibility can play a big part in dealing with this problem. In my recent article entitled Copyright and Responsibility, I point out that law “regulates human affairs through rules that require people to enjoy their freedoms and exercise their rights in responsible ways.” Responsibilities always come together with rights. Without the infusion with responsibilities, rights are meaningless. Persons are not only individuals but also social members of communities, countries, and the whole world. As social members, persons must not single-mindedly pursue only the realization of their individual rights. Rather, they should also constantly ask what responsibilities they should take on and how they can fulfill them in their social membership. Anupam does mention the importance of responsibility. For example, he urges that Internet service providers follow the “Do No Evil” responsibility, which requires them not to collaborate with repressive regimes that suppress the free flow of information. Indeed, this responsibility is crucial. But should we also ask Internet service providers to take on more responsibilities to encourage people to spend slightly less time using computers, smartphones, or tablets and slightly more time interacting with others in various ways? In this sense, Internet service providers may have a responsibility to cultivate a healthy environment and culture for human interactions. A follow-up question is whether individuals should have the responsibility to spend slightly more time paying attention to others and their communities via computers, smartphones, or tablets. Both The Life of Pi and The Electronic Silk Road prompt me to think more about the problems in the human world. The Life of Pi teaches me how a person can grow and mature through overcoming tough challenges and even evils. Anupam’s The Electronic Silk Road teaches me how globalized human societies can continue to flourish through overcoming the obstacles caused by national boundaries and the self-centered energy embedded in each human being. Both The Life of Pi and The Electronic Silk Road celebrate the beauty of human spirituality and its power to deter selfishness and even evil.
<urn:uuid:43662407-1800-439e-b0a4-7c2b92aa53f8>
CC-MAIN-2015-11
http://concurringopinions.com/archives/2013/11/the-life-of-pi-in-the-electronic-silk-road.html/comment-page-1
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463606.79/warc/CC-MAIN-20150226074103-00189-ip-10-28-5-156.ec2.internal.warc.gz
en
0.944179
1,872
2.6875
3
When polled, 65 percent of U.S. citizens say they are willing to pay good money for better environmental protection, but at the same time most do not believe that environmental deterioration is a crucial issue in their own lives. This seeming contradiction may stem from the fact that it is difficult to recognize subtle and gradual environmental change. But it may also stem from another fact: that various sources, including conservative think tanks such as the Cato Institute and the Heritage Foundation, have been disseminating erroneous information regarding the true state of the environment. Adam Myerson, editor of the Heritage Foundation’s Policy Review, pretty much summed up this viewpoint in the journal when he maintained that “leading scientists have done major work disputing the current henny-pennyism about global warming, acid rain, and other purported environmental catastrophes.” A flood of recent books and articles has also advanced the notion that all is well with the environment after giving undue prominence to the opinions of one or a handful of contrarian scientists in the name of “sound science” and “balance.” With strong and appealing messages, these authors have successfully sowed the seeds of doubt among policymakers and the public about the reality and importance of phenomena such as overpopulation, global climate change, ozone depletion, and loss of biodiversity. If U.S. citizens were convinced that some changes could enhance their quality of life and that of their children, most would gladly oblige. But when the necessity of such changes is questioned, especially in the name of science and reason, it’s not surprising that most people are hesitant to embark on the necessary course to tackle environmental problems. What follows is a sampling of the myths, or fables, that the promoters of “sound science” and “balance” are promulgating about issues relating to population and food, the atmosphere and climate, toxic substances, and economics and the environment. By looking at them through the lens of the present scientific consensus, we aim to reveal the gross errors on which they are founded. Thus we may return to higher ground and engage in a crucial dialogue about how to sustain the environment. Fables about Population and Food There is no overpopulation today because the earth has plenty of room for more people. In fact, humanity has already overshot earth’s carrying capacity by a simple measure: no nation is supporting its present population on a sustainable flow of renewable resources. Rich agricultural soils are being eroded in many areas at rates of inches per decade, though such soils are normally formed at rates of inches per millennium. Accumulations of “fossil” fresh water, stored underground over thousands of years during glacial periods, are being mined as if they were metals-and often for low-value uses such as irrigating forage crops like alfalfa, for grazing animals. Water from those aquifers, which are recharged at rates measured in inches per year, is being pumped out in feet per year. And species and populations of microorganisms, plants, and other animals are being exterminated at a rate unprecedented in 65 million years-on the order of 10,000 times faster than they can be replaced by the evolution of new ones. We needn’t worry about population growth in the United States, because it’s not nearly as densely populated as other countries. The idea that the number of people per square mile is a key determinant of population pressure is as widespread and persistent as it is wrong. In Apocalypse Not, published by the Cato Institute, economist Ben Bolch and chemist Harold Lyons point out that if the 1990 world population were placed in Texas, less than half of 1 percent of earth’s land surface, “each person would have an area equal to the floor space of a typical U.S. home.” They also say: “Anyone who has looked out an airplane window while traveling across the country knows how empty the United States really is.” But the key issue in judging overpopulation is not how many people can fit into any given space but whether the earth can supply the population’s long-term requirements for food, water, and other resources. Most of the “empty” land in the United States either grows the food essential to the well-being of Americans and much of the world (as in Iowa), supplies us with forestry products (as in northern Maine), or, lacking water, good soil, and a suitable climate, cannot contribute directly to the support of civilization (as in much of Nevada). The point is that densely populated countries such as the Netherlands, Bermuda, and Monaco and cities such as Singapore, So Paulo, Mexico City, Tokyo, and New York can be crowded with people only because the rest of the world is not. We should have a bigger population for no other reason than that “people like to be alive.” One can respond to such statements by asking, “Would people like to be alive if they had to live like chickens in factory farms?” But such retorts are unnecessary. The best way to maximize the number of Americans (or Chinese or Nigerians) who live wouldn’t be to cram as many of them as possible into these countries in the next few decades until they self-destruct. Rather, it is to have permanently sustainable populations in those nations for tens of thousands, perhaps millions, of years.
<urn:uuid:f8c7d024-152b-4891-8e6b-2bbce7e31a10>
CC-MAIN-2015-11
http://www.technologyreview.com/featuredstory/400001/ehrlichs-fables/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463606.79/warc/CC-MAIN-20150226074103-00189-ip-10-28-5-156.ec2.internal.warc.gz
en
0.964476
1,114
2.609375
3
With new data suggesting that injectable contraceptives may double the risk both of acquiring and passing on HIV, how will this affect women’s contraceptive choices? What are the implications for family planning policy in countries with a high burden of HIV? Panellists on a teleconference on the topic, organised by AVAC last week, agreed that the data do not yet provide definitive answers and that healthcare providers need to avoid frightening women away from contraceptive methods they know and trust. Experts are mindful that the HIV-related risks need to be balanced with contraception’s benefits for maternal and child health. Family planning helps to prevent unintended pregnancies and the number of unsafely performed abortions, thereby reducing maternal deaths, disabilities and infertility. It can prevent high-risk pregnancies among adolescents, older women, women in poor health and women who have had many births or births spaced too closely together. Because it helps women to space births, child mortality rates are lower; mothers have more time to breastfeed, improving infant health; and women have more time to recover physically and nutritionally between births. Moreover, preventing unwanted pregnancies in women with HIV is also one component of strategies to reduce mother-to-child HIV transmission. At the International AIDS Society’s conference in Rome in July, Dr Renee Heffron of the University of Washington presented results from an analysis of data from the Partners in Prevention cohort in seven African countries. The results, reported on Aidsmap at the time, showed that HIV-negative women who were in a relationship with an HIV-positive man had twice the risk of acquiring HIV if they used hormonal contraception. Furthermore, HIV-positive women had twice the risk of transmitting HIV to their male partners if they used hormonal contraception. Whilst there was considerable interest in the study from conference delegates, it was only when the findings were published earlier this month in the journal Lancet Infectious Diseases that the mainstream media paid attention to the issue. Some news reports have been alarmist. News reports have also tended to ignore the long history of (inconclusive) research into the possible links between contraceptives and HIV transmission. Some studies have found a link, others have not. The studies have all been observational (rather than randomised control trials), meaning that the results could be biased by factors the researchers did not consider or measure. Also, the studies have tended to be secondary analyses of data that were collected for other purposes (in the case of Partners in Prevention, a study of the effect of herpes treatment on HIV transmission). Professor Jared Baeten of the University of Washington stressed that the Partners in Prevention researchers came to this issue with an open mind, determined to be “as careful and conscientious with the data as possible”. “We were frankly quite disappointed to see that we had a doubling of HIV risk,” Baeten said. “We analysed the data several ways, to be sure that we had confidence in the results.” One strength of the study is that the participants were all couples in which one partner had HIV, and the other did not. Only HIV transmissions which could be genetically linked to the primary partner were included. Rates of self-reported condom use were similar between those exposed to hormonal contraceptives and those who were not. The statistical analysis was sophisticated. On the other hand, critics say that the researchers don’t know enough about participants’ use of contraception, which is all based on self-report. The investigators did not ask participants for the brand names of their contraceptives, they have no data on adherence to contraception and they did not take into account switches between methods. Moreover, it is possible that there were differences in the sexual behaviour of hormonal contraceptive users (compared to non-users) that were not fully captured by the researchers. The World Health Organization (WHO) is convening an expert meeting in January in order to see whether it needs to revise the contraceptive guidance it provides in parts of the world where HIV is a major issue. Until now, WHO has concluded that overall, the weight of scientific evidence does not indicate that hormonal contraceptives increase the risk of acquiring or transmitting HIV. January’s meeting will consider new systematic reviews which will assess all the relevant studies on the topic. Depending on the reviews’ findings, WHO may decide to revise its guidance to women at risk of HIV infection and to women with diagnosed HIV. Previous research has tended to concentrate on women’s risk of acquiring HIV, rather than passing it on. The most recent study is the first one to look at transmission from HIV-positive contraceptive users to their male partners. It also identified a biological mechanism for the increased risk of onward transmission – higher viral loads in genital secretions. Nonetheless, other studies will be needed to confirm or refute these findings. And Dr Charles Morrison of the non-governmental organisation FHI 360 – which provides both HIV and family planning services – argues that because observational studies have inherent limitations, researchers need to set up a randomised controlled trial. This could, for example, randomise women either to use contraceptive injections (the method thought most likely to raise the HIV risk) or to use an alternative contraceptive, such as an intrauterine device or an implant. Women’s HIV acquisition rates would then be compared between the two groups. Such a study would take several years to provide results. Some experts also question whether women would be willing to take part and have their contraceptive choice determined by the randomisation process. In trying to make trade-offs between family planning and HIV prevention, health officials will also need to consider the connections between pregnancy and HIV transmission. Another analysis of the Partners in Prevention data set, by the same study team, suggests that HIV-positive women have double the risk of passing on HIV when they are pregnant than at other times. Therefore if the concerns about HIV transmission led women with HIV to stop using contraceptive injections and they did not switch to alternative methods, they would be more likely to get pregnant - and thus more likely to pass on HIV. Taken together, the findings on pregnancy and contraception do point to hormonal changes having an influence on HIV transmission. Contraceptive injections lead to a large surge of hormones at one moment, so they may have more impact on HIV transmission than other hormonal methods which provide a lower dose. Indeed, an important aspect of the most study is that four-fifths of those using hormonal contraceptives were using contraceptive injections, with the remainder taking oral pills. While women weren’t asked which injection they had received, by far the most popular injectable in the countries studied is DMPA (Depo-Provera), a progestogen-only contraceptive which protects against pregnancy for three months at a time. The associations between injections, HIV acquisition and HIV transmission were statistically significant, whereas they were not for oral contraceptives. Moreover, the study has no data in respect of implants, patches or hormonal intrauterine devices. It may therefore be unhelpful to lump all hormonal methods together and say that ‘hormonal contraception’ raises the risk of HIV transmission. The new data may suggest that the problem is specifically with DMPA injections. However in many African countries, DMPA is one of the most widely used contraceptives. Reasons for its popularity may include its long-lasting protection (particularly when healthcare facilities are difficult to access), the ability of women to take it without the knowledge of their sexual partners, a low failure rate, widespread availability and the preferences of healthcare providers. “We've allowed the method mix to shrink,” Professor Helen Rees of the Wits Reproductive Health and HIV Institute said. “Women’s choices have become limited to injectable contraceptives and combined oral contraceptives.” She argued that healthcare providers urgently need to expand the range of contraceptive options that are available to women – including lower dose hormonal products, intrauterine devices, implants and condoms. Women need to have alternatives and options available before a phasing out of DMPA could be considered. Jared Baeten argued for an integration of family planning and HIV services, with “the best counselling that we can provide to women on safe reproductive choices and safe HIV choices”. This should include explaining the possibility of an increased HIV risk with hormonal contraceptive use, especially injectable DMPA, and encouraging women to employ dual protection - effective contraception plus condoms to reduce the HIV risk.
<urn:uuid:2945aaca-e135-4784-b0cd-9f5cae552d8b>
CC-MAIN-2015-11
http://www.aidsmap.com/Contraceptive-injections-and-HIV-transmission-risk-what-happens-now/page/2115915/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463165.18/warc/CC-MAIN-20150226074103-00098-ip-10-28-5-156.ec2.internal.warc.gz
en
0.960749
1,721
2.953125
3
DefinitionTendons connect muscle to bone and help move joints. Tendinopathy is an injury to the tendon. These injuries tend to occur in tendons near joints such as knee, shoulder, and ankle. The injuries can include: - Tendonitis—An inflammation of the tendon. Although this term is used often, most cases of tendinopathy are not associated with significant inflammation. - Tendinosis—Microtears in the tendon tissue with no significant inflammation. - Achilles —back of heel - Patellar tendon , which is attached to the kneecap - Rotator cuff in the shoulder - Biceps in the shoulder - Wrist extensors near the elbow, on the outside - Wrist flexors near the elbow, on the inside - Quadriceps tendons - Ankle tendons |Copyright © Nucleus Medical Media, Inc.| CausesTendinopathy is caused by overuse of a muscle-tendon unit. The strain on the tendon causes very tiny tears that accumulate over time. There can also be inflammation.These tears cause pain and can eventually change the structure of the tendon. Risk FactorsTendinopathy is more common in women than in men. Factors that may increase your chance of getting tendinopathy include: - Overuse can be the result of doing any activity too much - Strenuous or repetitive activities - Physical labor - Physical problems - Muscle imbalance - Decreased flexibility - Advancing age - Alignment abnormalities of the leg SymptomsSymptoms may include: - Pain in the tenon or surrounding area, particularly with activity - Decreased motion of related joints - Local swelling DiagnosisThe doctor will ask about your symptoms and medical history. A physical exam will be done.If your symptoms are severe, your doctor may need some images of the tendon and bone. Imaging tests may include: TreatmentTreatment depends on: - Severity of symptoms - The tendon involved - Length of time symptoms have lasted - Rest for the affected tendon - Ice after activity - Avoiding the activity that is responsible - Cast or splint for immobilization of the affected area - Counterforce brace over the painful tendon - Reduce shock vibration on the joint with shoe inserts - Shoe orthotics for foot alignment problems MedicationTo manage pain or swelling, your doctor may recommend: - Over-the-counter pain relievers, such as acetaminophen or nonsteroidal anti-inflammatory medication (NSAIDs) - Prescription pain relievers - Topical pain relievers, such as creams or patches that are applied directly to the skin - A medication called cortisone. It can be injected into the sheath around the tendon. PreventionTo prevent tendinopathy: - Gradually work yourself into shape for a new activity. - Gradually increase the length of time and intensity of activities. - If you have a tendon that has been a problem, gradually stretch out that muscle/tendon unit. - Strengthen the muscle to which the tendon is attached. - If you have pain, do not ignore it. Early treatment can prevent the problem from becoming serious. - Learn to back off from activities if you are tired or not used to the activity. - Warm-up the affected area before activity. American College of Sports Medicine FamilyDoctor.org - American Academy of Family Physicians Canadian Orthopaedic Association Canadian Orthopaedic Foundation Exercise-induced leg pain. American College of Sports Medicine website. Available at: http://www.acsm.org/docs/current-comments/exercis-inducedlegpain.pdf. Accessed March 18, 2013. Mayor RB. Treatment of athletic tendinopathy. Conn Med. 2012;76(8):471-475. Patellar tendinopathy. EBSCO DynaMed website. Available at: http://www.ebscohost.com/dynamed. Updated November 3, 2012. Accessed March 18, 2013. Patellar tendon tear. American Academy of Orthopaedic Surgeons Ortho Info website. Available at: http://orthoinfo.aaos.org/topic.cfm?topic=A00512. Updated August 2009. Accessed March 18, 2013. 10/26/2010 DynaMed's Systematic Literature Surveillance. http://www.ebscohost.com/dynamed: Massey T, Derry S, et al. Topical NSAIDs for acute pain in adults. Cochrane Database Syst Rev. 2010;(6):CD007402. 4/24/2014 DynaMed's Systematic Literature Surveillance http://www.ebscohost.com/dynamed: Wise JN, Weissman BN, et al. American College of Radiology (ACR) Appropriateness Criteria for chronic foot pain. Available at: http://www.acr.org/~/media/ACR/Documents/AppCriteria/Diagnostic/ChronicFootPain.pdf. Updated 2013. Accessed April 24, 2014. - Reviewer: Michael Woods, MD - Review Date: 02/2014 - Update Date: 04/24/2014 Exercise during pregnancy has been associated with many benefits for mom and baby. This review supports the trend and finds that even one day of purposeful activity per week may reduce the need for cesarean birth. Maternal Caffeine Intake May Be Associated with Low Birth Weight Prevent Eczema in Kids with a Daily Dose of Moisturizer Broccoli Sprout Compound Associated with Reduction in Autism Symptoms
<urn:uuid:ec0196e5-65d1-4d99-9aae-c532c6a6127b>
CC-MAIN-2015-11
http://www.beliefnet.com/healthandhealing/content/11518/Tendinopathy.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463318.72/warc/CC-MAIN-20150226074103-00120-ip-10-28-5-156.ec2.internal.warc.gz
en
0.860298
1,203
3.28125
3
Philosophical foundations of globalisation – 1 The term globalisation is a complex phenomenon used to explain the integration of the entire world in various spheres of life but particularly in economics, politics, technology, ecology and culture generally. It is however its economic dimension of interdependence that most people are usually aware of. There is however no doubt that while free trade and economic liberalisation are the dominant face of globalisation, its political dimension of democracy and liberalism are no less important. The economic dimension, especially the mode of production has its concomitant of technological and economic resonance. The homogenized culture of the west has increasingly been exported to the rest of the world in films, music, fashion, religion and even cuisine. Never before than now has it become obvious and glaring that we live in global village. The complexity of the term is captured by Manfred B. Steger (Oxford University Press 2003) when he wrote. “Since its earlier appearance in the 1960s, the term globalisation has been used in both popular and academic literature to describe a process, a condition, a system, a force and an age. Given that these competing labels have very different meanings, their indiscriminate usage is often obscure and invites confusion.” P7 Globalisation marks a transformational period in human history manifesting in changed economic, political and social processes. For ease of treatment, this writer will focus on the economic and political philosophical origin of globalisation. Of course there is no way one can conceive of political and economic transformation without saying a word or two on the impact of these two broad processes on other areas of cultural and ecological aspects of life. Economic globalisation goes back to Adam Smith’s ideas contained in his seminal book The Wealth of Nations published on the eve of the American war of Independence in 1776. He argued against mercantilism by which the wealth of nations was hitherto judged by its colonies and high protective tariffs against foreign goods. Adam Smith had said free trade or lasissez-faire economics increased wealth of all nations because every nation should be able to contribute to the pool of wealth by exploiting its comparative advantage in production. This idea of free trade rooted in market capitalism is at the root of economic globalisation and economic interdependence. The prosperity of post American Independence Britain and largely free trading Western Europe particularly Germany more or less bore out Adam Smith’s advocacy of free trade. This idea of free trade is what is in contemporary times institutionalized in such organisation as the World Trade Organisation and other regional economic organisations like NAFTA and in a much more profound and deeper fashion in the European Union. Economic liberalism sometimes goes hand in hand with political liberalism. Political liberalism has a long history behind it. Starting from the Magna Carta (1215) the struggle against arbitrary government began in England and had repercussions elsewhere. The development of English Common Law and The Bill of Rights (1689) were important milestones in the history of fundamental human rights which constitutes and important pillar of democracy. This idea was further developed through the contributions of Hugo Grotius (The Law of Nations) J. J. Rousseau (The Social Contract) and John Locke (Popular Consent, Limit of Sovereignty). All these ideas were encapsulated in the American declaration of Independence in which the purpose of government was defined as guaranteeing “…life, liberty and the pursuit of happiness.” Later on it was assumed that democratic governments were peaceful on the idealistic basis that all men were good by nature and that given the opportunity to govern themselves they will live in peace with one another in what Emmanuel Kant called foedus pacificum or pacific federation. This idea that it is when there is no democracy that the “war party” of aristocrats and the bourgeoisie plunges state into war is embraced by socialists and Marxists to describe all wars as imperialistic wars fought to carve out markets and areas to invest surplus capital. It is this idea of democracy as means to peaceful interaction of states that has been the central motivating factor in western foreign policy in recent times. The demise of the Soviet Union and the embrace of state capitalism in China and Vietnam which continue at least to see themselves as socialist states encouraged the American historian Francis Fukuyama to prematurely declare the victory of liberal democracy and capitalism as the “end point of mankind’s ideological evolution” and the “final form of human government” in his famous book The End of History and The Last Man (1989). According to Fukuyama the end of the cold war represented the triumph of the liberal idea and in particular of capitalism. He asserted that there can be “no further progress in the development of underlying principles and institutions.” He continued that “there is a fundamental process at work that dictates a common evolutionary pattern for all human societies – in short something like a universal history of mankind in the direction of liberal democracy.” As if to bring Fukuyama to reality, Samuel P. Huntington an influential American political scientist (1927-2008) prophesied that western liberalism would eventually be challenged by global Islam in what he suggested would constitute “a clash of civilizations”. Al-Qaeda no doubt saw itself as a vanguard of this clash even though fundamentalist Islam did and does not always embrace the terrorism characteristic of the Al-Qaeda type of blind terrorism. Fukuyama’s thesis raises some fundamental questions about the implication of globalisation on national sovereignty. Rate this article A US-based Nigerian doctor, Ola Akinboboye has emerged as the new president of the Association of Black Cardiologists in the US, Empowered Newswire ... Full story
<urn:uuid:5da2223b-735e-4312-b958-022fe624a481>
CC-MAIN-2015-11
http://www.thenationonlineng.net/2011/index.php/columnist/thursday/jide-osuntokun/28162-philosophical-foundations-of-globalisation-%E2%80%93-1.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936535306.37/warc/CC-MAIN-20150226074215-00151-ip-10-28-5-156.ec2.internal.warc.gz
en
0.951199
1,160
3.03125
3
How can DNAAbbreviation for deoxyribonucleic acid; the polymer of nucleotides that constitutes the genetic material of chromosomes. and RNAAbbreviation for ribonucleic acid; a biological polymer of nucleotides that is involved in protein synthesis. molecules act as blueprints for the manufacture of proteins? The exact details were unraveled in the early 1960s mainly by Marshall Nirenberg (born 1927) at the National Institutes of Health and H. G. Khorana (born 1922) at the University of Wisconsin, workA mechanical process in which energy is transferred to or from an object, changing the state of motion of the object. which earned them the Nobel prize in 1968. They showed that each amino acidA carboxylic acid containing an amino group (-NH2). In an alpha amino acid, the amino group is attached to the carbon atom adjacent to the carboxyl group. in a protein is determined by a specific codonA three-base sequence in a molecule of messenger RNA; a codon contains genetic information that specifies which amino acid will be incorporated into a protein at a specific point. of three nitrogenous bases in the DNA or RNA chain. The details of this genetic codeThe rules that govern how a sequence of three-base codons in a DNA molecule can be translated into a sequence of amino acids in a protein. are given in the table below. As an example of how this code works, let us take the section of RNA shown in Fig.3 on Nucleic Acid Structure. This has the sequence UCAUGG. This is part of the instructions for building a polypeptideA polymer of many amino acids joined by amide linkages or "peptide bonds." chain containing the amino acid serine (UCA) followed by the amino acid tryptophan (UGG). The Genetic Code for RNA Note: (a) A termination codon is indicated by TERM. (b) AUG, the codon for methionine is also the initiation codon. All protein synthesisFormation of substances with more complicated sturctures than do their precursors. begins at this codon, though this initial methionine is often removed during post-transcriptional processing. Since each codon corresponds to three places in the nucleic acid chain and since there are four kinds of nitrogenous bases to fill each place, there are a total of 43 = 64 different possible codons. Since there are only 20 amino acids, the genetic code is degenerate—several different codons correspond to the same amino acid. This degeneracy acts as a safeguard against errors in reading the code. Thus UCU, UCC, UCA, and UCG all correspond to serine. If a mistake is made in reading the third base in this triplet, no harm is done since serine is still produced. On the molecular level transfer RNAs (tRNAAbbreviation for transfer RNA; the RNA that brings the correct amino acid to a ribosome where it is attached to a growing protein.), the molecules reading the codons and providing the correct amino acid, can pair with multiple codons. This only occurs in terms of the third base in the codon. For instance, G pairs with C, but is also capable of pairing with U. Some tRNAs even employ a fifth nitrogenous base, inosinate(I) which is capable of pairing with A, U or C. This use of multiple pairing with the third codon by tRNA is called the wobble hypothesis, and was first proposed by Francis Crick. Notice that while a tRNA can pair with multiple codon in the wobble hypothesis, it can only pair with codons for the same amino acid, and each codon is still specific to only one amino acid. There are three additional features of the genetic code. First, AUG, the codon for Methionine also serves as an initiation codon, and, with help from other signals, is where protein systhesis begins. A second feature is that reading RNA for protein synthesis goes from the 5' carbon end of the nucleic acid to the 3' carbon end. A final important feature of the genetic code is the existence of three termination codons. These correspond to an instruction for ending a polypeptide chain. How these features work is best illustrated by an example. EXAMPLE 1 Decode the RNA fragment 5' A C C U U A U G A C G C C U G U C C A U U A A C G A U 3' SolutionA mixture of one or more substances dissolved in a solvent to give a homogeneous mixture. First, we must decide which direction to read the RNA code. Synthesis goes from the 5' end to the 3' end, so this segment is read left to right. Had it been displayed 3' to 5', we would have needed to read it from right to left. Second, we need to look for an initiation codon, AUG. This codon appears starting at the sixth letter in. Thus, we can divide the sequence up like this, with the start codon bold: Third, let us see if there is a stop codon in this sequence. Sure enough, the fifth codon after the start codon, UAA is a stop codon. Thus, the entire sequence to be translated, in bold: which translates to the amino acid sequence: Notice in the example, that if we had not started with the initiation codon, an entirely different protein would have been formed. Look at what would have happened if we had simply started at the beginning of the sequence: a stop codon appears in a new place, and the translated protien is: This highlights the importance of the reading frame, the place where codons start being read. Notice that, since codons are 3 bases long, any sequence has three different reading frames. Without the initiation codon, there would be no way to identify the correct reading frame. In addition to the AUG initiation codon, other elementA substance containing only one kind of atom and that therefore cannot be broken down into component substances by chemical means. regulate initiation. In bacteria, a sequence of bases before the initiation codon, called the Shine-Dalgarno sequence precedes the AUG codon, specifying where to begin translation. A different set up occurs in eukaryotes. An initiation complexA central metal and the ligands surrounding it; also called coordination complex. forms, but instead of having a specific sequence connected to the initiation codon, the complex slides along the mRNAAbbreviation for messenger RNA; the RNA that conveys information from the genetic code on DNA to a ribosome where transfer RNA attaches the correct amino acid to a growing protein. strand, until it finds the AUG initiation codon.
<urn:uuid:017164b0-ff10-4f94-8fb7-b5af5bb80ca3>
CC-MAIN-2015-11
http://chempaths.chemeddl.org/services/chempaths/?q=book/General%20Chemistry%20Textbook/Molecules%20in%20Living%20Systems/1983/information-storage
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463956.95/warc/CC-MAIN-20150226074103-00202-ip-10-28-5-156.ec2.internal.warc.gz
en
0.929391
1,425
3.796875
4
Clean Air Lawn Care An Easy Going Approach to Lawn and Garden Care - What is Clean Air Lawn Care (CALC)? - Who does CALC benefit? - How does taking care of my yard affect air quality? - What are the health effects of ground-level ozone? - What can I do to reduce lawn and garden emissions? What is Clean Air Lawn Care (CALC)? Clean Air Lawn Care or CALC is a KDHE program under the Bureau of Air (BoA). The purpose of the program is to reduce emissions from lawn and garden equipment and introduce cleaner greener yard care practices. Who does CALC benefit? The program has 4 target audiences in Kansas, general public, lawn and garden retailers/equipment manufacturers, the professional landscape industry and large landscape customers such as government offices. We all benefit from cleaner air and we all contribute to air quality problems. The CALC program offers guidelines for reducing lawn maintenance equipment emissions and reducing the need for fertilizer and pesticides. How does taking care of my yard affect air quality? The choices we make in caring for our property can also affect our community by contributing to air pollution. Gasoline powered lawn and garden equipment creates more air pollution than any other non-road mobile source. Nitrogen oxides (NOx) and volatile organic compounds (VOCs) contribute to ground-level ozone formation in the presence of sunlight and high temperatures. Ground-level ozone is harmful to living things including people. What are the health effects of ground-level ozone? According to the Environmental Protection Agency (EPA) exposure to ground-level ozone may trigger a variety of health problems, especially in vulnerable populations such as children, the elderly, and those with pre-existing respiratory disease. - Ground-level ozone can irritate lung airways and cause inflammation; - Repeated exposure to ozone pollution for several months may cause permanent lung damage; - Even low-level exposure can result in aggravated asthma, reduced lung capacity, and increased susceptibility to respiratory illnesses; and - Studies have linked hospital admissions and emergency room visits to ground-level ozone exposure. Ground-level ozone pollution can damage vegetation and ecosystems within and downwind of cities. - Ground-level ozone interferes with the ability of plants to grow and store food. - Damages the foliage of trees and other vegetation, tarnishing the visual appeal of ornamental species and urban green spaces. Ground-level ozone transported downwind of cities reduces crop and forest yields and increases susceptibility to disease, insects, other pollutants, and harsh weather. What can I do to reduce lawn and garden emissions? We contribute to air quality right problems in our own backyards. The following suggestions will help us do our part for clean air in Kansas: Plant Native (No Need to Mow, Watch ‘em Grow) Decreasing the amount of time your gasoline powered equipment is running decreases emissions that contribute to ground-level ozone. Consider dedicating a part of your lawn for planting native flowers, ornamental grasses and shrubs. Native plants such as purple coneflowers, prairie phlox and sunflowers require less maintenance, less watering, and no fertilizer or pesticide compared with grass. All plants remove pollution from the air, native plants look great and are naturally adapted to Kansas changeable weather. Save time mowing, save money on chemical treatments, simply sit back and enjoy. Professional horticulturalists recommend keeping grass length no higher than 3.5”. This practice chokes out weeds like crab grass. Taller grasses are less susceptible to erosion and drought. This practice requires less clean up time, requires less fertilizer/pesticides, and saves water. Grass-cycling, the simple process of leaving grass clippings on the lawn when mowing, saves time, money, and protects the environment. Mowing time is reduced because the bagging and disposal of clippings is eliminated. Grass clippings add beneficial organic matter to the soil. Keep ‘em Tuned Regular maintenance of lawn and garden equipment can reduce ground-level ozone forming emissions and reduce gasoline usage. Just like an automobile, schedule filter changes for oil, air, and fuel according to the owner’s manual. Maintenance should also include sharpening mower blades and checking tire pressure. These practices increase efficiency and reduce the time the energy must run. Thus emissions are reduced and air quality improved. Plan to mow later in the day Ground-level ozone forms from VOCs and NO x when weather conditions are hot and sunny. Consider mowing in the evening when it is cooler and emission from the mower will form less ground-level ozone. Check the daily Skycast if you live in the Kansas City area. Ozone alert days (orange and red) are ozone action days and it is best not to do yard work when ground-level ozone is elevated. Other cities in Kansas can check the forecast at AirNow. Consider an alternative to gasoline powered equipment Consider battery-powered or electric lawn and garden equipment. These are light and maneuverable, saving you time and energy and work great on smaller yards. Best of all they emit no air pollution. The use of a reel mower can burn considerable calories in addition to being quiet and gentle to grass. If this is not an option choose 4-cycle engine lawn equipment over 2-cycle. Be sure to use the correct gas/oil mixture in 2-cycle equipment according to the manufacturer (EPA). Avoid fuel spills Americans spill gasoline while refueling lawn and garden equipment. Gasoline also evaporates from loosely capped gas cans and leaks from old containers. Gasoline loss is a large contributor to air pollution. A spill-proof gas container will help avoid spills and evaporation. When fueling lawn and garden equipment use a funnel and pour slowly. Cap regular gas containers tightly and close the vents. Check for leaks each time you mow and never leave any gas can outside in the sun.
<urn:uuid:8a9204a8-a345-4a60-93d1-839e06312232>
CC-MAIN-2015-11
http://www.kdheks.gov/bar/air_outreach/calc.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463318.72/warc/CC-MAIN-20150226074103-00120-ip-10-28-5-156.ec2.internal.warc.gz
en
0.917441
1,240
3.078125
3
With spring well and truly in the air and the tough winter months behind us, it’s amazing how the world seems bigger, brighter and fresher – not least thanks to the fact that, for those of us with gardens, we now have a whole new space to relax and play in. At Eureka! learning about the world we live in automatically includes helping children understand about the environment and the importance of plants and wildlife, which is precisely how Our Global Garden gallery initially came about. But we also want children to enjoy the outdoors simply for what it is – a fantastic, free outdoor space in which to play, learn and feel close to nature – hence the development in 2010 of our outdoor Wonderwalk which helps children explore the sights, smells and textures of nature. Great outdoors or great big yawn? However, it seems perhaps that for many children these days the great outdoors has become the great big yawn. Research last year by Play England and antiseptic brand Savlon startlingly revealed that 1 in 3 children between the age of 6 and 15 have never climbed a tree and that 60%would prefer to play computer games than venture outdoors. However, the good news is that at least 40% would like to be outside, and 2 out of 3 children have actually experienced the fun of climbing a tree. It just seems as if games consoles, tablet PCs and mobiles seem to have won the battle for their attention – at least for the time being. But its not just children that seem distracted by technology – Social media-embedded games that replicate the great outdoors, such as Farmville, have attracted a staggering global adult audience of 100m users! That’s 100m grown ups that could be engaging with children in the garden, growing plants from seed even – just like a real farm! Interestingly, the Royal Horticultural Society (RHS) also sees great benefit from engaging children in the garden and, and as well as launching next week’s National Gardening week, launched a campaign in 2010 for school gardens to be reintroduced as part of a wider programme of curriculum-related activities. Its research found that, as well as helping children lead happier, healthier lives, gardening helped them acquire the essential skills they need to fulfil their potential in a rapidly changing world and make a positive contribution to society as a whole. So, top marks to the RHS for leading on a campaign which, in effect, not only recognises the importance of gardening (no surprise there then) but also sees the garden as another learning space – a classroom even. Hoorah! Does bacon come from sheep? This brings us on to another important lesson for a sedentary generation of children who remain transfixed by their technological gadgets and, as a consequence, are less aware than previous generations as to where it comes from. Only two years ago, a survey conducted by the Home Grown Cereals Authority on behalf of the National Farmers Union found that 26% of children thought bacon came from sheep while 29% claimed oats were grown on trees! Whilst we’re not advocating that every parent and child should convert their gardens into fully working farms, it’s not difficult to want to endorse National Farmers Union president Pete Kendall who said “Everyone should know where primary foods like cereals are grown and the importance they play in helping us achieve a healthy balanced diet.” And for us, even the most rudimentary of lessons in the garden could start with a 50p packet of seeds, a patch of soil and a watering can. Who knows where this might lead? A generation disconnected from nature Only last week The National Trust published A Natural Childhood a compelling report written by Stephen Moss, in which it draws attention to Nature Deficit Disorder, a growing phenomenon based on evidence which shows that society, and particularly children, are becoming increasingly disconnected from nature. Whilst the report notes that fewer than 10% of children play in wild outdoor places, compared to 50% a generation ago, the good news is that there are still parents and grandparents who can remember the pleasures of outdoor play and can help to reverse the current trend. The challenge is to get them to make it happen. Eureka! Playscape and Play 20 campaign Back at Eureka! a key aspect of our future development strategy is the creation of an outdoor playscape which will be designed to re-engage children and families with the endless possibilities of playing outdoors, exploring and quantifying elements of risk through play and simply being active in a way that isn’t dependent on technology, a phone app or a games console. We’ve also launched our Play 20 campaign to increase inter-generational play, including ideas for play at the park (or garden!) and which will feature additional, seasonal outdoor play ideas throughout the year. The ultimate benefit from playing in the garden or outdoors is that it gives everyone a healthy regard for being active – and who knows, we might just help buck the long term prediction that (on current trends) 6 out of 10 children will be overweight or obese by 2050. Surely it’s worth a try?
<urn:uuid:02c3c1d5-632b-4cbe-b91b-587065c10a29>
CC-MAIN-2015-11
http://experts.eureka.org.uk/2012/04/04/learninginthegarden/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936460576.24/warc/CC-MAIN-20150226074100-00144-ip-10-28-5-156.ec2.internal.warc.gz
en
0.967693
1,046
2.796875
3
Composting is an inexpensive, natural process that transforms your kitchen and garden waste into a valuable and nutrient rich food for your garden. It's easy to make and to use. This guide will show you how to get started and provide you with useful tips on how to use your finished compost. Do your bit to reduce the amount of waste sent to landfill. Even for households that are already composting, new research has found that almost half of the food waste in their rubbish bins could have been put in the compost bin. Did you know, composting at home for just one year can save global warming gases equivalent to all the CO2 your kettle produces annually, or your washing machine produces in 3 months? We're often asked "Why do I need to compost when my waste will break down in landfill anyway?" When waste is sent to landfill, air cannot get to the organic waste. Therefore as the waste breaks down it creates a harmful greenhouse gas, methane, which damages the Earth's atmosphere. However, when this same waste is composted above ground at home, oxygen helps the waste to decompose aerobically which means no methane is produced, which is good news for the planet. And what's more, after nine to twelve months, you get a free fertiliser for your garden and plant pots to keep them looking beautiful. The key to good compost lies in getting the mix right. You need to keep your greens and browns properly balanced. If your compost is too wet and gives off an odour, add more browns. If it's too dry and is not rotting, add some greens. Air is essential to the composting process and by mixing material up, as you fill your bin, it will create air pockets and help keep your compost healthy. Like any recipe, your compost relies on the right ingredients to make it work. Good things you can compost include vegetable peelings, fruit waste, teabags, plant prunings and grass cuttings. These are considered "greens." Greens are quick to rot and they provide important nitrogen and moisture. Other things you can compost include cardboard egg boxes, scrunched up paper and small twigs. These are considered "browns" and are slower to rot. They provide fibre and carbon and also allow important air pockets to form in the mixture. Crushed eggshells can be included to add useful minerals. Certain things should never be placed in your bin. Do not put in... Putting these in your bin can encourage unwanted pests and can also create odour. Also avoid composting perennial weeds (such as dandelions and thistles) or weeds with seed heads. Remember that plastics, glass and metals are not suitable for composting and should be recycled separately....back to top The time for putting that finished compost to use has arrived. Before starting you'll want to find out if it actually is ready to go. You can do this by making sure your compost is dark brown and smells nice and earthy. It should also be slightly moist and have a crumbly texture. It probably won't look exactly like the compost you buy at the shops and it's very likely that yours will still have twigs and eggshells in it! Don't worry… it's still perfectly good to use! Simply sift out any larger bits and return them to your compost bin. Your fresh compost is nutrient-rich food for your garden and will help improve soil structure, maintain moisture levels, and keep your soil's PH balance in check while helping suppress plant disease. It has everything your plants need including nitrogen, phosphorus and potassium and it will help buffer soils that are very acidic or alkaline. Compost improves your soil's condition and your plants and flowers will love it!...back to top Help your new plants and flowers bloom by digging a 10cm layer of compost into the soil prior to planting. If your flowers have already been planted you simply need to spread a thin layer of compost-enriched soil around the base of the plants. Nutrients will work their way down to the roots and your plants will enjoy the healthy boost compost provides. It is important that you leave gaps around any soft stemmed plants. ...to enrich new borders The borders of your garden will also greatly appreciate your compost. Spread up to a 5cm layer of compost over the existing soil. Worms will quickly like getting to work mixing it in for you! Otherwise you can dig your finished compost into the soil prior to planting. It is important that you leave gaps around any soft stemmed plants. Using your compost as mulch is a great idea. By using 'rough' compost (where not everything has completely broken down) over flowerbeds and around shrubs, helps prevent soil erosion and will replenish much needed nutrients. A layer of about 5cm should do the trick. Make sure you leave a gap around any soft-stemmed plants. Adding mulch after it has rained will help keep the moisture in the soil. Compost is great for your trees. Spreading a 5-10cm layer around the roots will provide them with important nutrients and can protect against drought and disease. Avoid the base of the tree and do not spread too close to the trunk. Your trees will also benefit from less weeds growing around them. Doing this once or twice a year will help your trees grow taller and bushier in no time at all. ...to replenish pots Give your potted plants and containers an extra boost by removing the top few centimetres of existing soil and adding your freshly made compost. Leave a gap around soft stemmed plants.This will provide food for your plants and flowers and is a great way to make them more healthy and robust. ...in patio containers You can mix home compost with regular soil or leafmould to create your own healthy potting mixture for patio containers. Your plants and any new plants from seeds will enjoy the additional nutrients and minerals that your compost enriched potting mixture contains, and outdoor container plants will love it too. About a third of the mix should be compost, slightly less when you are planting seeds. The reason for this is that home made compost is too strong to use on its own for planting into. ...healthier herbs & vegetables Compost is excellent for growing herbs such as chives, parsley and mint. Simply crumble it around the base of the plants for healthier, leafier herbs. Your vegetables will also grow better with compost added to their soil. Apply compost with each rotation - it's exceptionally good for planting potatoes and carrots. ...feeding your lawn Dressing your lawn with compost helps young grass take root and can make your garden healthier and greener. First, you'll need to sieve the compost and remove any large twigs or eggshells. Next, mix it with an even amount of sharp sand to compost as this will allow it to spread more easily. You'll want a layer of about 2.5cm. Mature lawns can really benefit from this little extra kick of nutrients but be aware that newly seeded or turfed lawns can be scorched by it....back to top Q.I seem to have a lot of small black flies in my compost bin. Is this good for the compost or should I get rid of them? A. Fruit flies do not carry disease and do not harm your compost. However, if you find them unpleasant you can reduce their numbers by ensuring that the organic waste destined for your bin is always covered in the kitchen or wherever it is stored. You can eradicate them by keeping the lid off your bin for 3 or 4 days, thus allowing the predator beetles to gain access and kill them for you; and by covering the compost surface with about an inch of soil to prevent the hatching flies from being able to escape. They are not an indicator of a failing bin. Q. Why does my bin smell? A. You need to introduce more oxygen in your compost bin so that your waste can break down aerobically. By mixing bulky items such as toilet roll tubes, cardboard or scrunched up or shredded paper into your bin you can introduce pockets of air. Q. I've waited a while but I still don't have any compost at the bottom of my compost bin. Why is this? A. Don't forget it takes 9-12 months to make finished compost. Keep adding a good balance of greens and browns and the creatures will keep composting everything down. Q. Why do I get a lot of ants in my bin? A. Ants are part of the home composting process but it could mean that your bin is too dry. For a quick fix, add some cold water to your bin. Over time, you need to add more 'green' nitrogen rich items such as grass cuttings and kitchen peelings to keep moisture levels up. Q. Do compost bins attract rats? A. Some people worry that having a compost bin could attract rats. But in fact there are many other reasons why rats may already be in the vicinity of your garden. For example if you live near water, farm land/open countryside or derelict buildings, you are likely to have rats living around the local area. They may be attracted into your garden, like other animals, to look for a dry place to shelter, for example under a shed or decking or to find food. One common source of food is over-feeding wild birds (leaving excess food exposed). A rat is only likely to seek out a compost bin in the garden if incorrect waste items have been composted, making the bin a source of food as well as a shelter. However, a compost bin that is used a lot will deter them....back to top For all the latest information and advice on home composting, why not visit www.recyclenow.com and make the most of their excellent resource.
<urn:uuid:afbf067b-2921-44b6-b698-c3cb48b58da6>
CC-MAIN-2015-11
http://www.sunderland.getcomposting.com/Pages/How_To_Use_A_Composter.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464840.47/warc/CC-MAIN-20150226074104-00210-ip-10-28-5-156.ec2.internal.warc.gz
en
0.953482
2,042
3.765625
4
Every day, people download millions of songs without paying for them. It’s a practice known as online piracy and the music industry has been demanding tougher laws to combat it since the rise of Napster in 1999. On the surface, the industry’s claims make sense. Copyright law stipulates that it is illegal to download music without the permission of the author, but the record industry has no way to enforce this. Millions of people download content online each year from overseas websites and while the music industry can sue each downloader individually, it has no ability to sue the overseas sites. The Recording Industry Association of America (RIAA) believes it deserves “selective legal efforts when rogue businesses ignore the law and attempt to profit on the backs of music creators.” However, copyright law is not supposed to protect the recording industry’s profits, but ensure that artists are incentivized to create quality works. The quality and quantity of music released each year has not decreased since the rise in online piracy, demonstrating that artists still have incentives to create music. In fact, online piracy has lead to greater opportunity for smaller artists and labels throughout the industry. The RIAA will certainly continue to lobby Congress for stricter laws, but online piracy of music is simply not a problem. Copyright law is meant to create an economic bargain between artists and the public. Article I, Section 8, Clause 8 of the Constitution (the Copyright Clause) says, Congress shall have Power … To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries. The Constitution gives artists a limited monopoly over their work in return for the eventual dedication of it to the public domain. The law is not meant to protect artists’ profits or revenue. As long as the quality and quantity of music is not dropping, Congress has no reason to further incentivize artists. By definition, the incentives are already there. Harvard economist Felix Oberholz-Gee and Kansas business professor Koleman Strumpf summed it up best in their 2010 paper on file sharing and copyright law published in the National Bureau of Economic Research: [T]he original intent of copyright protection was conceived not as a welfare program for authors but to encourage the creation of new works. We know that stronger copyright protection can increase the market value of companies. But these gains are a mechanism to raise social welfare, not the intended consequence. Copyright law may increase profits for artists, but that is so that artists are incentivized to continue creating new works. Profit is not the ultimate goal. The RIAA would like Congress to treat intellectual property the same as physical property. Under such a scenario, Congress would pass laws that prevent all illegal downloading. The main goal of such laws would be to prevent theft and to protect the music industry’s profits. But digital music is different than physical property; it’s intellectual property and thus governed by the Copyright Clause. If the rise of online downloading had caused a drop in the quantity of music and artists were no longer entering the industry, then Congress would have a reason to crack down on online piracy. The evidence points in the opposite direction. The quantity of music, including both new albums and new artists, has not decreased with the advent of digital music and the rise of online piracy. According to Nielsen SoundScan, the authority on music industry statistics, artists released 38,857 new in 1999 when Napster debuted and not once from 1992-2002 were there more than 40,000 albums released in a year. In 2008, the number of albums released reached an all-time high at 106,000. As the recession hit the following year, the number dropped to 96,000 and then dropped again, in 2010 to 75,000. But in 2011, it rebounded to 77,000 new releases, nearly double the number released in 1999. However, examining new album releases is not necessarily a good way to judge the supply side of the industry. It’s never been easier to release an album. Before high-powered computers and widely available recording software, artists faced large costs to produce a CD, but computers have changed this process entirely. A musician can create an album quickly and cheaply. As soon as he or she sells a single album, Nielsen counts that album as a new release. In his 2011 paper in the National Bureau of Economic Research, economics professor Joel Waldfogel found “no evidence that recent changes in appropriability have affected the quantity of new, acclaimed recorded music or new artists coming to market.” Waldfogel examined more than just album release numbers. He established thresholds for the quality of music released to discover if the surge in new albums is a result of a rise in poor-quality albums. He found no evidence of a drop off in quality: Using indices collectively covering the period since 1960, we document that the annual number of new albums passing various quality thresholds has remained roughly constant since Napster, is statistically indistinguishable from pre-Napster trends, and that album supply has not diverged from song supply since iTunes’ revival of the single format in 2003. There are no incentive problems. In fact, there are probably more incentives for individuals to produce an album now than ever before. Smaller labels and smaller artists have seen significant benefits from online piracy. Waldfogel’s study also found that the percentage of independent labels in the Pitchfork Top 100, a measure of the Top 100 tracks each year, rose from 50 percent in the 1980s and 1990s to 60 percent in the 2000s. A 2007 study in Management Science found that albums by artists with smaller labels last longer on the Billboard Top 100 in the era of digital than before it and another study (pdf) in 2004 found that file sharing provides increased exposure for new artists and leads to income redistribution throughout the music industry. In addition, a just-released study found that online file sharing has led to increased concert revenue for artists as online piracy has dispersed artists’ music more widely and given them a greater following. All of this leads to the conclusion that copyright law is too tough right now and should be laxer. File sharing on its own is relaxing the law by illegal means, but is nevertheless doing so. The RIAA claims that this “is a real, ongoing and evolving challenge.” That may be true for the music industry’s profits. As for the fundamental goals of copyright law, it’s working exactly as planned. Feed the Political AnimalDonate Washington Monthly depends on donations from readers like you.
<urn:uuid:f591fa4d-59ad-40ec-b541-90e0a482c07a>
CC-MAIN-2015-11
http://www.washingtonmonthly.com/ten-miles-square/2012/08/online_piracy_isnt_a_problem039015.php
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463104.7/warc/CC-MAIN-20150226074103-00076-ip-10-28-5-156.ec2.internal.warc.gz
en
0.955947
1,358
2.96875
3
Fighting Serious Erosion? Time To Call NRCS FOR IMMEDIATE RELEASE: May 25, 2012 For More Information , State Public Affairs Specialist, Jody Christiansen, Public Affairs Specialist (217) 353.6627 Farmers in Douglas Creek Watershed face changing weather patterns that increase erosion Champaign, IL—Nestled in the Douglas Creek Watershed, Richard Neff farms several hundred rolling acres in St. Clair County. Neff also manages a large hog finishing operation. His land has been farmed since his grandfather, Peter Neff obtained it nearly 100 years ago. “We’re not a Centennial Farm, but we’re close!” Neff explains. Richard finished planting corn and soybeans last Saturday night. Besides a planting season that came unusually early and unusually warm, Rich made a special trip into Belleville this spring. He met with District Conservationist for USDA’s Natural Resources Conservation Service, John Harryman because he needed help combating erosion problems he’s faced over the last few years. Like many farmers, Neff experienced minor erosion issues on the farm before. “It was never erosion that was too severe or too damaging. It wasn’t ever anything you couldn’t work out or restore on your own in the spring,” Neff said. But according to Neff, recent weather and storm events, particularly in St. Clair and surrounding areas have been heavier, more frequent, and of greater intensity. Since 2008, after every rain event Neff finds more and more sizable and impassable gullies that wash his soil away. With more rainfall, degraded water quality from erosion and sediment, and increased urban storm water runoff, Neff realized he needed technical guidance and assistance from the erosion professionals: NRCS. According to Harryman, this was the perfect time for Richard to hook up with NRCS—especially since water quality issues in the Douglas Creek Watershed were just selected for a special conservation program. In Illinois, the new Water Quality Initiative will direct funds to address resource problems in three watersheds: Douglas Creek, Lake Vermilion, and Crooked-Bonpas Creek. Neff and Harryman began working together to investigate all details for the parcels with the most pressing erosion-related concerns. Neff’s rolling landscape may benefit from new terraces, water and sediment control basins, or a number of other conservation solutions to protect and stabilize the ground. Survey work and detailed plans will be ironed out over the next few weeks. Together, they will develop a conservation plan with ideal conservation practices needed to keep Neff’s soils productive and where he needs them: in his fields. Neff and Harryman will also look at available funds that can help offset the costs of needed conservation practices. As Neff considers using NRCS’ Environmental Quality Incentives Program, known as ‘EQIP,’ he will receive helpful guidance and conservation incentive payments to help cover costs of designing and installing key practices. “Local weather patterns have changed lately. And that’s changed the on-the-ground realities where these guys farm. With NRCS help and conservation practices, we will get all that water under control,” adds Harryman. Both Richard and father Anthony have incorporated conservation practices in the past, namely no-till and several grassed waterways but now, more is needed. Neff says his goal for this project with NRCS is simple—he needs to stop the erosion. “I want to leave this farm for my kids and I want it in better condition than when I got it. That’s what this is really all about,” adds Neff. Neff’s entire family, which includes wife Karen, mom Arlene, and daughter Amanda are eager to see the plan come to life and start solving problems. Grandparents Peter and Cecilia would be proud as well. Other farmers or landowners in the area who are experiencing similar erosion problems can contact NRCS in St. Clair County to learn more. For landowners located in the Douglas Creek Watershed, the deadline for this special opportunity ends June 15, 2012 so call (618) 235-2500 today. For more information about the Water Quality Initiative and NRCS’ programs, initiatives and services in Illinois, visit NRCS online at www.il.nrcs.usda.gov. Boundary for Douglas Creek Watershed in St. Clair County, Illinois. Farmers with land in this area who are interested in applying for special Water Quality Initiative EQIP funds should contact District Conservationist John Harryman in the NRCS office in Belleville at (618) 235-2500, extension #3 or email@example.com. Terrace systems and other conservation practices help landowners manage and control water on agricultural fields in order to reduce erosion and improve water quality. NRCS photo. USDA is an equal opportunity provider, employer and lender. To file a complaint of discrimination, write: USDA, Director, Office of Civil Rights, 1400 Independence Avenue, SW, Washington, DC 20250-9410 or call (800) 795-3272 (voice) or (202) 720-6382 (TDD). NRCS - Helping People Help the Land An Equal Opportunity Provider and Employer
<urn:uuid:a9e5f44c-70f9-47b0-844a-36efc1376e39>
CC-MAIN-2015-11
http://www.nrcs.usda.gov/wps/portal/nrcs/detail/il/newsroom/releases/?cid=NRCS141P2_031416
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936460576.24/warc/CC-MAIN-20150226074100-00143-ip-10-28-5-156.ec2.internal.warc.gz
en
0.935046
1,122
2.578125
3
(Saturday, 28th Feb, 2015) Facts and myths about cocaine use The National Drugs Awareness Campaign, as part of its current campaign highlighting the dangers of cocaine, has published a list of facts and myths about the effects of the use of this drug: Myth-cocaine isn’t addictive. Fact-while not regarded as physically addictive, cocaine can produce severe psychological dependence because of the strong cravings it produces, leading to compulsive patterns of use. As tolerance develops, users take larger and more frequent does to maintain 'the high'. In addition, there is no recognised pharmacotherapy (chemical treatment) for cocaine dependence similar to methadone for heroin users. However, psychotherapies and counselling are said to be effective in the management of cocaine dependence. Myth-cocaine is a clean,safe drug. Fact-despite its ‘clean/safe’ image, common physical effects include sweating, loss of appetite, damage to the inside of the nose, increased heart and pulse rate. Some people experience nausea, headaches, irritability, paranoia and hallucinations. Cocaine (even taken on its own) can affect heart rhythms, leading to possible heart attacks, raised blood pressure, respiratory failure and strokes. Myth-there is no 'hangover' with cocaine. Fact-the short term after-effects of use include fatigue and depression. The ‘crash’ or ‘low’ that follows the ‘high can be severe, and can lead to depression and suicidal thoughts. Hyperactivity, insomnia and weight loss can also result from frequent use. Chronic use can lead to paranoia, hallucinations, anxiety attacks and agitation. Aggressive and violent behaviour are another common result of increased cocaine use. Myth-cocaine use improves sexual desire and performance. Fact-increased sexual desire immediately after taking the drug often leads to unsafe sexual behaviour, risking unplanned pregnancy and leaving users susceptible to HIV, Hepatitis B and sexually transmitted infections. Following prolonged use, male cocaine users can experience difficulty achieving or maintaining an erection. Long-term use may result in reduced sexual drive, development of breasts in men and impotence. Are you a Health Professional? Log on to IrishHealthPro for more... |Anonymous Posted: 20/07/2005 12:14| |Fact, Cocaine we can buy on the streets contains only a small amount of cocaine and the rest is other substances such as novacaine and whatever else is thrown in to make profit...surely the unknown substances are just as bad for your health as the cocaine its self....we should all be aware of street drugs...because you just never know what your taking. Thet don't come with a list of ingredients. Keep safe!!| |Anonymous Posted: 24/10/2006 19:17| |yes, but cocaine is addictive, it makes your body want more. if you throw in other substances as well, arent you just putting more chemicals into your body? it cant be that healthy at all| |vtboy35 Posted: 23/02/2009 06:29| it only makes your body want more WHEN you are doing it. highs and lows work on alcohol, smokes and sex as well. all far more addictive. in my opinion, it is not physically addictive as much as mentally, which I speak from through experience. the greatest issue is that most that enjoy that high can not control not having that high. they can't afford more or better quality to keep the same state, so they move "down" to crack - and the slide begins. i've been a user off and on for quite a long time. if you have the choice, never start! it can affect your mind over long term and, most certainly, your wallet. and not everyone can walk away or limit themselves to searching out a cheaper and more powerful substitute. once you walk through that door, it's unlikely you will turn back. |briz Posted: 24/04/2009 20:20| I think cocaine is a horriable drug. Even no I'll prob get some soon. I wish I never EVER started it has fucked with my life my body I'm 105 pounds but stand very short it hasn't effected my face or teeth yet.. I want reason to quit really but I have no job no kids and my spouse is the same!!!! So I'm stuck .. here don't touch it . |Healthy60 Posted: 13/09/2009 17:09| Every thing that is on this earth, that is not poison, can be used in moderation, problem is, too many do not. I am a very compulsive addictive personality. Be it Ciggs, Diet Coke, Food, whatever. I have no control I had not used Cocaine since 1979, as I joined the Army. I did not use any street drugs, but chancing it and smoking some hash a few times while stationed in Germany. Now almost 50, I have no connections, just an old man who stays at home with his very straight wife. I ran across some people and I heard them talking and I started talking to them, after an hour or so, I asked if I could get some of that stuff (coke) I heard them talking about. Since I had no connections, this was probably a one time chance, I asked for an Oz. Thinking I could control myself, after all, I am very mature. The first time, I was able to stay under half a gram over a two day period. Unfortunately, the second time, four days later, I wanted to do more and I was up for two days, sitting in my living room. each time the rush of two lines would ware off, I was back at it. two nice lines about every 30 minutes for 40 hours.. When I went through the hassle of coming down, slept for a few hours, woke up and looked at myself in the mirror and said what are you doing. I washed it down the sink, all 20 grams that were left. Even at 50, I see I still have no control. So it is just an occassional Joint for me and that is where it ends. |To join the discussion, register by clicking here|
<urn:uuid:674b23ff-c09e-41ed-8aab-18ca4e9fd041>
CC-MAIN-2015-11
http://www.irishhealth.com/article.html?id=7819
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461988.0/warc/CC-MAIN-20150226074101-00244-ip-10-28-5-156.ec2.internal.warc.gz
en
0.964603
1,299
2.734375
3
I often wonder what makes some people espouse strong beliefs more than others or what it is that makes an individual, a group or a society attached to a particular belief system. More importantly, why, when faced with a difference of opinion or a different belief system, the reaction is very strong, often emotional and even physical as well as violent. For example, some people are actually demanding that the atheist civil servant from West Sumatra should be beheaded for committing blasphemy. Which is basically saying that they honestly believe that in a society that demands you to conform to an unquestioning belief in a supernatural being, atheism is a real and physical threat to the unity of the society and therefore must be eradicated. As a matter of fact, we ourselves, often feel a negative reaction when we encounter opinions and views that greatly differ to ours on practically any topic, from religion, politics, to favourite celebrities and football teams; whether at the dinner table that turns into a shouting match, or in the boardroom during meetings that degenerate into clashing arguments of stubbornly held views. Personally it has always been a mystery to me why, for instance, when even though nine out of ten people agree with my views, it is that one person who disagrees with me that I fixate upon and ends up getting on my nerves. Why is it so important for me and my sense of who I am that others share my particular view point? What is it that makes me defensive of my beliefs? The other day, while browsing through the Internet, I found the answer. It is posted on Youtube under the heading Athene’s Theory of Everything. I advice you to check it out. Once you get past the rather strange accent of the narrator, the documentary, with good visuals and music, purports to relate through recent scientific breakthroughs in neuroscience, everything from life, death and the origin of the universe. Including my question, why we don’t like it when other people have a different opinion from us. I learn that the human brain is a network of a hundred billion neurons, and depending on what get stimulated or ignored, neurons can get stronger or weaker. A talent for example, can be trained by continually stimulating the relevant neurons, say, by continuous practice. Rationality and emotional resilience too are neural connections that can be strengthened. This is where how we think and how we deal with our thoughts come into play. The reason why we get attached to our views and opinions is because ‘specific neurons and neurotransmitters such as norepinephrine trigger a defensive state when we feel our thoughts have to be protected from the influence of others. If we are then confronted with differences in opinion, the chemicals that are released in the brain are the same ones that try to ensure our survival in dangerous situations.’ So that’s why some fundamentalists who are so attached to their belief system tend to react violently. It’s in the neurons. And if this type of response sounds primitive, it is, because it uses the primitive part of our brain. ‘In this defensive state, the more primitive part of the brain interferes with rational thinking and the limbic system can knock out most of our working memory, physically causing narrow-mindedness.’ I suppose this is why, even though I know rationally that my view or idea is actually wrong, I still get annoyed and defensive and would happily slap my critic if I could get away with it. I cannot at this moment rationally process the truth and beauty of that other idea. My brain tells me I’m under attack! But what happens when people agree with our opinions and appreciate how brilliant our ideas are? These ‘defense chemicals decrease in the brain and dopamine neurotransmission activates the reward neurons, making us feel empowered and increasing our self-esteem...’ Isn’t that fascinating? That we are actually mere expressions of these billions of neurons firing off different things at the same time? Which leads us to the question of who is this ‘I’, this identity that we form about ourselves and how others see us? Actually we are a lot of things at the same time, depending which of our ‘mirror neurons’ are at play. These are the neurons leading to emphatic emotions. They connect us through our imagination, to other people, allowing us to feel what others feel. Giving us a sense of both identity and a part of society. ‘We are in constant duality between how we see ourselves and how others see us.‘ ‘Our beliefs have a profound impact on our body chemistry. Self-esteem or self-belief is closely linked to the neurotransmitter serotonin. Lack of it causes depression, self destructive behaviour and suicide.‘ This is where the need for society and social validation comes in. When we get social validation, it actually increases the levels of dopamine and serotonin in the brain, allowing us to become more self-aware; so we don’t act in blind, impulsive and random manner that are both frustrating and negative. Hence, self-awareness is the key to controlling which neurons in our brain that we need to release and the thoughts we want to have. Why? Because ‘self-observing profoundly changes the way our brain works. It activates the self-regulating neo-cortical regions, which gives us an incredible amount of control over our feelings.‘ So there you go. By the way, I also read somewhere that eating dark chocolate can actually increase the level of serotonin in the brain. Now I know the recipe for peace of mind. Chocolate and staying well away from critics. (Desi Anwar: First Published in The Jakarta Globe)
<urn:uuid:9f51f26f-dc56-4a98-9989-7c2212cd0d50>
CC-MAIN-2015-11
http://www.dailyavocado.net/writers-block/92-writers-block/824-its-in-the-neurons.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463318.72/warc/CC-MAIN-20150226074103-00119-ip-10-28-5-156.ec2.internal.warc.gz
en
0.949832
1,180
2.515625
3
Radiation in Your Children’s Water Radiation now pollutes the drinking water in Tokyo, far from the scene of the ruined power plants. Could that happen in the United States, with our 104 active nuclear power plants, the most of any nation in the world? In fact, it’s already happened, and goes on still, not the outcome of a unique triple catastrophe but just from business as usual. It’s not only major calamities such as Japan’s but also the day-to-day operating problems of nuclear energy production that threaten our children’s health. At dozens of nuclear plants across the country, tritium, a radioactive atom, leaks into the millions of gallons of ground water and ends up in the supplies that the near-by communities use for drinking, bathing and cooking.(1) Yet the Nuclear Regulatory Commission (NRC), which is supposed to regulate nuclear power, does not require nuclear plant operators to test groundwater. It's a voluntary initiative. The owners of the Vermont Yankee plant even denied the existence of the underground pipes that were leaking. Nor are radioactive leaks the only commonplace dangers. Last year, 2010, the NRC reported finding significant “near misses” of one variety or another, after making 14 special inspections. (2) In addition, the mining of uranium and the debris left from making nuclear fuel release radioactive gases which spew radiation and other pollutants into the air and drinking water of near-by communities (3) and blow clear across the country. Do such day-to-day radioactive toxins cause harm? After fifty years of nuclear energy production and a flawed study done 11 years ago, last year the NRC took steps to find out. It asked the National Academy of Sciences (NAS) to study whether people who live near NRC-licensed nuclear facilities are at an increased risk for cancer. Sarah Sauer and her parents spoke last year at one of the public meetings the National Academy of Science’s expert committee is holding across the country. Sarah, who has survived the brain tumor found when she was seven, lived then with her family near two nuclear power plants in Grundy County, Illinois. These plants, operated by Exelon, our nation’s largest supplier of nuclear energy, had leaked tritium into the surrounding community for a long but unknown time. Addressing the NAS, Sarah asked them to remember that she is one of the statistics they are studying; her parents spoke of the numerous and serious leaks from the Exelon plants and the health concerns these leaks raise. Sarah and her parents plan to return to talk to the committee. But there’s a problem built into the study design: science currently measures radioactive harm by using as its “reference man” a male, Caucasian, between 20 to 30 years old, weighing 154 lbs, standing 5’7” tall, living in a temperate climate. The study will not inform us about harm to children because children’s bodies are vastly more susceptible to all kinds of environmental exposures than adults. It’s also logical to ask a related second question about potential dangers: If nuclear plant operators not infrequently fail to protect their facilities from commonplace accidents, isn’t it inevitable that, sooner or later, they will fail to prevent a major disaster? That’s exactly what the Tokyo Electric Power Company’s history indicates. No need, though, to look for warning parallels anywhere but in our own backyard. Think of our nation’s financial disaster of 2008, even termed a “meltdown.” Recall the BP oil calamity. Remember Enron, its lying top mangers and the lying auditors who were supposed to be its safeguards. Look at the coal mining industry’s record. The same web of malfeasance runs through them all. The executives pursue huge and quick personal gain, the companies choose a good-looking if fake bottom line. The governmental bodies that are supposed to regulate and protect instead become captive to the very industries they were founded to control. (One example: The NRC successfully fought a law that would have required potassium iodide, an antidote to radiation exposure, to be stockpiled to protect people living near nuclear reactors.) The top executives of the regulatory agencies come out of the industry for a few years, then return to their old buddies to earn even higher remuneration. Huge and ever huger corporate donations pollute the entire political system. Exelon spent a bit more than $3.7 million on lobbying last year.(5) Companies and unions related to the nuclear industry spent more than $650 million on lobbying and campaign contributions from 1999 through 2008, and $84 million in the first three quarters of 2009 alone.(6) Members of Congress vote for laws that protect their donors’ interests. The parallel between nuclear and other industries extends to the use of tax-payer money. Just as we the people paid to bail out the banks, the nuclear industry wants government guarantees. After five decades of operation, why are private investors unwilling to take the risk? Why did President Obama seek $36 billion of taxpayer money for loan guarantees for a proposed 20 new nuclear plants? If accidents occur, federal laws cap the industry’s liability for damage to people and property; in contrast, other energy providers must carry full private insurance. The corporate owners of nuclear facilities have already written off tens of billions of dollars in cost overruns.(7) As always, when our children are harmed by an industry’s pursuit of profit over safety, families and taxpayers end up paying the financial and human cost. The conclusion must be, that safe energy sources such as solar, wind and geothermal, despite their shortcomings, are the only way to power the future and protect our children.---- Resources for Parents Nuclear Information and Resource Service, www.nirs.org Wise Uranium Project, www.wise-uranium.org/edusa.html Physicians for Social Responsibility’s Safe Energy Program, www.psr.org Public Citizen, www.citizen.org/cmep Union of Concerned Scientists, www.ucsusa.org 1. Groundwater Contamination (Tritium) at Nuclear Plants, www.nrc.gov/reactors/operating/ops-experience/grndwtr-contam-tritium.html 2. “The NRC and Nuclear Power Plant Safety, www.ucsusa.org/nuclear_power/nuclear_power 3. Poisoned for Profit, Philip and Alice Shabecoff, Chelsea Green Publishing, 2010, pp 215-22. 6. “Nuclear Industry Working Hard to Win Support,” Judy Pasternak, http://investigativereportingworkshop.org/investigations/nuclear-energy-lobbying 7. “Nuclear Power Still Not Viable with Subsidies,” www.earthtrack.net _ _ _ _ Alice Shabecoff is the co-author with her husband Philip of Poisoned for Profits: How Toxins Are Making Our Children Chronically Ill, which includes the story of Exelon and the Sauer family.
<urn:uuid:d55f92db-4c6b-4876-8550-99e1ff0a5d88>
CC-MAIN-2015-11
http://www.momsrising.org/blog/radiation-in-your-children%E2%80%99s-water/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462141.68/warc/CC-MAIN-20150226074102-00289-ip-10-28-5-156.ec2.internal.warc.gz
en
0.938132
1,503
2.75
3
Writer: Jane Moorman, 505-249-0527, firstname.lastname@example.org ALBUQUERQUE – Three 4-H clubs in Albuquerque are discovering the challenging fun of competing in FIRST Lego League, where they research innovative solutions to a problem and build a LEGO autonomous robot to accomplish set tasks. “With STEM being such a major focus right now, we thought robotics would be a great way to integrate science, technology, engineering and math into a fun activity where the kids do hands-on projects and research,” said Brittany Grube, urban 4-H agent with New Mexico State University’s Bernalillo County Cooperative Extension Service. FIRST – For Inspiration and Recognition of Science and Technology – Lego League is an international program that engages youth in playful and meaningful learning while helping them discover the fun in science and technology. “Currently we have two FLL teams for youth ages 9-14 – Cyborgs and Storm Defense Team –and one high school FIRST Tech Challenge team,” Grube said. “Our plan is to continue growing the program and we would like to double our teams next year.” Brett Webb, 4-H leader and coach of the Storm Defense Team, said 4-H and FIRST Lego League fit together well. “There is a lot of overlap in the two organizations’ philosophies,” he said. “They both believe in having the kids do the work and the adults are there as guides. It allows the kids to really get involved and make the decisions while working as a group.” This is the first year the 4-H clubs participated in the FLL program. “When I heard we were going to do FLL, I thought it was either going to be really simple or really complicated,” said Cyborgs member Isaac Bryson. “I like how they put it in a way where it takes some thinking, but you can still have fun and learn how to program robots.” Besides building and programming a Lego autonomous robot to accomplish as many tasks as possible in a set amount of time, the teams conduct research to resolve a challenge. Each year, FLL sets a challenge on which each team will conduct research, determine a problem and create an innovative solution for the problem. This year, the challenge was titled “Nature’s Fury” and the teams studied natural disasters such as storms, fires and earthquakes. They addressed what can be done when intense natural events meet the places people live, work and play. Both Albuquerque teams addressed issues associated with wildfires. The Cyborgs realized the environmental impact of ash left by the fires. “Ash can cause property damage, poison waterways and can hurt the environment,” Bryson said. “We thought what would be the best way that we could use ash and get money from it to help victims of wildfires.” Their solution was to recycle the ash by making soap. “In the olden days, they would use the woodstove ash to make soap,” Bryson said. “There are companies that sell ash soap, but it’s made with ash from domestically burned fires, not wildfires. Our plan would clean up the ash to help the environment recover from the fire.” Since wildfires and floods are common in New Mexico, SDT addressed the danger for a person caught in these natural disasters. They developed Saf-T-Bubble, an inflatable sphere that a person could be inside while they ride out the danger. “Our research found that the existing fire shelters are cumbersome and there really isn’t anything to help a person caught in a flood,” said team member Ian Webb. “The Saf-T-Bubble is a huge inflated sphere made of fire-resistant plastic.” A person in danger would climb inside the plastic bubble, which has an inflation fan and air purifier filter, a walkie-talkie with GPS to call for help, LED lights circling the sphere to help rescue teams find the sphere, and a window for the person to look through. “When we showed the diagram of the Saf-T-Bubble to a forest ranger, she said it was a really great idea and that it could help save lives of forest rangers and firefighters,” said teammate Coleman Boyle. In the robot game, the team programs an autonomous robot to attempt a variety of tasks during the two-and-a-half minute match. Those tasks included retrieving pets, people and supplies; moving various vehicles, including a supply truck and an ambulance; releasing three cylinders representing tsunami waves and a cargo plane on a flight line; and driving the robot over obstacles of house and tree debris. SDT members Ian Webb, Eli Brown, Angelina Anastasio, Carina Anastasio, Kyle Allis, Coleman Boyle and Dominic Boyle received the Robot Design Award at the New Mexico FLL state competition. “We had a trailer with motorized treads to carry all of the supplies instead of carrying them on the robot,” Ian Webb said. “The treads also helped the robot climb over the obstacles on the challenge table.” While Ian Webb has four years of FLL experience, this was the first year for Cyborgs members Isaac Bryson, Noah Bryson, Hanna Bryson, Kabody Bryson, Sean Burns, Cas Shrader and Kyle Chacon, and their coaches Jon Bryson and Christy Bryson. “We started later than most teams, so it was mostly a learning experience,” Isaac Bryson said. “We learned a lot of different things that we need to prepare for next year.” © 2013 New Mexico State University Board of Regents NMSU - All About Discovery!
<urn:uuid:1e49bedc-186b-4b73-948c-174be04e4b4c>
CC-MAIN-2015-11
http://newscenter.nmsu.edu/Articles/view/10298/albuquerque-4-h-clubs-join-first-lego-league-robotics-competition
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464840.47/warc/CC-MAIN-20150226074104-00210-ip-10-28-5-156.ec2.internal.warc.gz
en
0.956907
1,218
2.53125
3
On Thin Ice How global warming is changing our world Global warming grips Greenland, leaves lasting mark: (10/12/08) ILULISSAT, GREENLAND-- Beyond the howl of sled dogs echoing across this hilly coastal village is the thunderclap of ancient icebergs splitting apart, a deafening rumble you feel in your bones.There's no mistaking its big, loud, and powerful boom, a sound that can work up to a crescendo like rolling thunder. Or be as sudden as a shotgun blast. Lifelong Greenland resident Karen Jessen Tannajik said people who live in Ilulissat -- an Inuit word for icebergs -- notice more about what's been calved by the village's nearby Sermeq Kujalleq glacier than sights and sounds. Scientist defies danger, goes deep for answers on receding ice sheet: (10/12/08) With his mountaineering gear, ropes, and a buddy system that keeps him anchored, Konrad Steffen rappels down cracks into the heart of Greenland's ice sheet.One mistake and he's dead. The crevices he enters, called moulins, are like vertical caves, or deep wells. Or Arctic versions of black holes, some of them plunging to depths of 500 feet and consisting of ice more than 100,000 years old. They are an unforgiving master of the laws of physics, ready to suck unprepared intruders down to wherever gravity will take them in one of the most slippery, remote, and harrowing places on Earth. Ohio State facility holds eons of atmospheric history: (10/12/08) Scott Hall on Ohio State University's west campus is an unlikely place to find some of the world's top climate-change research.A nondescript building that's about a 20-minute stroll from one of college football's most glorified stadiums, Scott Hall is home to the Byrd Polar Research Center. For nearly 50 years, the center - named after explorer Admiral Richard E. Byrd - has brought together climatologists, glaciologists, and oceanographers to study opposite poles of the Earth. The center's star attraction is its collection of ice cores. Climate change called certain and most predictions are bad: (10/13/08) If the threat of more West Nile virus, smog, contaminated water, higher food prices, invasive species, toxic algae, lake level declines, and deaths from heat waves isn't enough to wake up people to problems associated with climate change, consider this: Ohio might lose its namesake nut to arch rival Michigan.That's right. The buckeye. Some fear the buckeye tree won't be able to handle the state's warming climate and will instead adapt to a more moderate climate in Michigan, a cruel fate of irony for Ohio's official tree. But that may be the least of the region's concerns if other predictions about climate change come true - forecasts that go well beyond reduced opportunities for skiing, snowmobiling, ice fishing, and other forms of winter recreation. Warming likely to affect fishing, shipping industries: (10/13/08) Walleye and yellow perch -- the backbone of the Great Lakes region's multibillion dollar recreation and tourism industry -- will likely be harder to catch as the lakes warm. Algae will proliferate, sucking more oxygen from the water. Walleye and yellow perch are two cool-water species that likely will be out-competed for food by warm-water fish. Lake trout and brook trout are two others. The devastation, though, could be overshadowed by what happens to the shipping industry if lake levels become chronically lower, as predicted under the current regime of climate-change scenarios. The two issues could work in tandem to wreak havoc on the region's economy. Politics, money blur climate change picture: (10/14/08) Achieving meaningful reductions in greenhouse gases that cause global warming could result in higher taxes and electric bills while also driving up costs for everything from food to electronics.By how much? That's one of the great unknowns, though many of the world's top climate scientists believe that failing to act is a foolhardy risk that could irreversibly harm the planet and cost more in the long run. This year's presidential election is historic. It is the first time both major parties are fielding a presidential candidate who vows to tighten rules on coal-fired power plants specifically to cut back on heat-trapping carbon dioxide and other emissions warming the Earth's climate. Summit looks to update Kyoto treaty: (10/14/08) Two months from now, leaders from 189 countries should know what their chances are of modernizing an 11-year-old climate treaty that strives to take on global warming from a global perspective.More than 8,000 people are expected to attend a Dec. 1-12 summit in Poland that, if all goes as planned, will be a preamble to a historic treaty that emerges from negotiations in Denmark at the end of 2009. At stake is the future of the Kyoto Protocol, a controversial treaty that 38 industrialized countries signed in Japan in 1997. The Kyoto accord sought to achieve meaningful - though costly - reductions in greenhouse gases on a global scale. Midwest has lots at stake in 'clean coal': (10/14/08) Coal is king when it comes to generating electricity in the United States, producing nearly half of the nation's power.Industry-heavy Ohio gets about 80 percent of its electricity from coal-fired power plants. Michigan consumes slightly less energy than Ohio but is still among the nation's leaders for industry and is also heavily reliant on coal. Because it is the largest emitter of greenhouse gases, coal's future has become one of the world's largest policy issues. Can it be pulverized and burned in the traditional way without releasing so much heat-trapping carbon dioxide into the atmosphere? Is it worth the cost of replacing old coal-fired power plants with newer ones? Energy independence possible, but elusive goal: (10/15/08) It would be nice to think more people could do what Ralph Semrock did. The Ottawa County man built a three-story, 2,440-square-foot house out in the country that's earth-bermed and creates its own electricity. It also uses energy so efficiently he is able to sell his surplus power to FirstEnergy Corp. His dream is to someday wean himself off the region's electrical grid. Located 10 miles east of Oregon, the house has energy-efficient windows, extensive foam insulation, a rain garden, and heat radiating from below a 7-inch concrete basement floor, as well as its own wind turbine and solar panels. It was designed by Mr. Semrock, an Owens Community College professor who owned a solar energy business from 1978 to 1981. Options for replacing coal are few, costly:(10/15/08) Efforts to curb greenhouse gases that cause global warming have sparked interest in new technologies, rejuvenated pleas for energy conservation, and resulted in development of co-generation projects in which steam from one industrial facility is captured and used to generate electricity at another. But when it comes to replacing coal-fired power plants that are the country's biggest source of greenhouse gases, there are not many viable options. At least for now.
<urn:uuid:d2dec678-e624-47a8-a63a-28fda326d5f3>
CC-MAIN-2015-11
http://www.toledoblade.com/onthinice
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463028.70/warc/CC-MAIN-20150226074103-00071-ip-10-28-5-156.ec2.internal.warc.gz
en
0.9424
1,507
2.859375
3
The Other Half of the Sky Photographs by Lili Almog Photographer Lili Almog presents an intimate look at women in today's China, and explores how this society is grappling with the challenge of blending modernity with deeply embedded cultural traditions. Almog traveled through rural Central China, photographing women in their domestic and work environments, and examined how the rapid modernization of Chinese society is changing women's economic opportunities along with their cultural traditions. Photographs by Lili Almog Women's Changing Roles in China The Communist Revolution, with its vision of the nobility of physical labor and emphasis on gender equality, left its mark on women's personal identities in a changing China. The Communist Party came to power in 1949 with, among many other utopian resolves, the vow to liberate Chinese women from millennia of "feudal" subordination. Female citizens were to be equal partners with men in a redeemed land where opportunities to serve the collective good would be abundant and women would have legal rights identical to those of men. As Mao Zedong famously stated, "Women hold up half the sky." Women in Communist China would be true partners to men. Reality, of course, was a different matter. Within the Party--with such notable exceptions as Mao's fourth wife, the former Shanghai actress Jiang Qing, head of the powerful Gang of Four--women labored dutifully but seldom attained high rank. Granted, many gender abuses of the past were curtailed or eliminated (foot binding, domestic servitude, concubinage), yet the freedom that women attained was primarily that of working side by side with men of low or middling station. Politically, women have not made the inroads that the Party once promised. No women serve in the Political Bureau of the Chinese Communist Party, a regression from the previous 40 years and an indication that women's voices are not being heard at these upper levels of government. However, greater equality in education did pave the way for a higher level of self-sufficiency in the post-Mao economic upsurge of the past 30 years. Socially, many women in today's China have returned to more traditional practices. Duty to family and the social pressure to marry and reproduce remain paramount for most Chinese women. And the one-child policy, instituted in 1979 to slow population growth, has somewhat dampened their independence and self-worth. The ingrained preference for a male heir has fostered countless abortions and the widespread abandonment of female infants, many of whom have been adopted in the West. Because of these policies and practices, men now outnumber women in China by 20 million. The Other Half of the Sky: Women in Rural China Today Knowing the background of women in China, I wanted to depict the individualism of Chinese women in both domestic and work environments. Although previously my photographic practice has focused on women and their private spaces, given the nature of China today, and the conflict between the private self and society, I wanted to present intimate portraits of the "unseen women"--the culture of minority women--as an expression of the dignity and heroism of the private self reflected through time and culture. The women I photographed are mostly part of ethnic subcultures in rural central China. In this region, agriculture is the main industry, and women are fully expected to work in the fields. Most of them work with very basic tools, using only animals or simple hand tools to farm the land. Most of the areas that I visited in Western China were closed territories until the late 1980s, and many of the people (both men and women) were essentially peasants before the Communist revolution in the 1940s: most were illiterate, had no formal education, and lived without electricity. Since then, change has come slowly. It took until the 1990s for children to begin attending regional school, and most villages now have electricity but still lack running water. There are more and more signs of contemporary and traditional cultures overlapping: Many homes have television sets, traditional religious dresses are worn over Levis and Keds, and cell phones are ubiquitous. Because of the lack of economic opportunity, many young people from the villages leave and move to bigger cities in order to work and support their family. It is obvious that this culture is changing rapidly, and it's only a matter of time before this world catches up with the West. I also focused on the everyday lives of minority religious women with an emphasis on the extraordinary situation of Muslim women in China. As a multi-national country, China presents a rich tapestry of minority cultures of women. Each nation has a traditional culture of its own. In Yunnan (western China), the province with the highest number of minorities, there is tremendous mutual support and inspiration among the women of different nationalities. The women I photographed expressed their individualism in the clothing they choose to wear. The images of minority women in my photographs create an intimate portrait of Chinese female identity. Chinese Muslim women are one such minority group: In China, Islam is unique from Islam in other countries, especially in its treatment of women. A unique feature of Islam in China is the power and presence of female imams who lead women-only mosques. Female imams (Nu Ahong) and exclusively female mosques (Nu Si) play a distinctive role in China. In the province of Ningxia, the heartland of Islam in China, Muslim women pray and celebrate together, and female imams teach other women the Koran. In both group and solitary moments, Chinese Islamic women are passionately traditional, yet firmly enmeshed in modern society. Their religious and domestic expressions have resulted in images that are vibrant and colorful and also profoundly moving. Another minority group that I met was the Mosuo. These women most clearly embody the effects of modernity upon a traditionally isolated society. My portraits of Mosuo women reveal women who are extremely traditional, yet firmly enmeshed in modern society. Their religious and domestic appearance is a blend of modern components mixed with expressions of traditional values. Although their living conditions are humble, these women exhibit a sense of self-empowerment and exude confidence. The Mosuo women come from a unique matriarchal society situated by the beautiful Lugu Lake in Western China. Up until the mid 1980s, the Mosuo people were completely isolated from western society. There is no marriage system within the Mosuo people. Open relationships are widely accepted, and the children that are born into these relationships stay with their mother. In this society, the women hold the property and authority and the family structure is based entirely on mother power. Although it may sound bizarre to a Westerner, anthropologists say that because the men in this society control no land, have no power, and play subservient sexual roles, they have nothing to fight over, making this one of the most harmonious societies in the world. The Mosuo people, an ethnic population of about 50,000 in western China, have no word for war, murder, rape, and jail. But this world is changing rapidly. It is not going to take much longer for these minority women to change their appearance and move to regular apartments; they are completely open to technology and the flow of communication with the western world. But creating new "modern" values will take longer and will be much more difficult and confusing. Discarding or altering traditions is a long and uneven process. Looking at these portraits, part of me that does not appreciate this change, and would like to leave "the rough and pastoral picture" the way it is. I suspect some of these women may feel the same way.
<urn:uuid:a741d0e8-26f6-4d9a-bcc3-4ca703e0ef7f>
CC-MAIN-2015-11
http://imow.org/economica/stories/viewStory?storyId=4799
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461612.31/warc/CC-MAIN-20150226074101-00200-ip-10-28-5-156.ec2.internal.warc.gz
en
0.965071
1,553
3.046875
3
Peer production (also known as mass collaboration) is a way of producing goods and services that relies on self-organizing communities of individuals. In such communities, the labor of a large number of people is coordinated towards a shared outcome. Peer production is a process taking advantage of new collaborative possibilities afforded by the internet and has become a widespread mode of labor. Free and open source software and open source hardware are two examples of peer production. One of the earliest instances of networked peer production is Project Gutenberg, a project in which volunteers make out-of-copyright works available online. Examples include Wikipedia, an online encyclopedia, and Linux, a computer operating system. For-profit enterprises mostly use partial implementations of peer production, and would include such sites as Flickr, Etsy, Digg, and Delicious. Peer production can also be utilized by sharing open source hardware designs to be replicated with digital manufacturing technologies such as RepRap 3-D printers. The number of such designs is growing exponentially on free design sites such as Youmagine. As such open designs can be replicated for approximately the cost of materials they provide enormous value to commons. Peer production refers to the production process on which the previous examples are based. Commons-based peer production is a subset of peer production. Peer production occurs in a socio-technical system which allows thousands of individuals to effectively cooperate to create a non-exclusive given outcome. These collective efforts are informal. Peer production is a collaborative effort with no limit to the amount of discussion or changes that can be made to the product. However, as in the case of Wikipedia, a large amount, in fact the majority, of this collaborative effort is maintained by very few devoted and active individuals. Crowdsourcing products such as community cookbooks are a form of peer production. Gooseberry Patch has used its customer/friend community to create its line of exclusive cookbooks for over 18 years. Peer production has also been utilized in producing collaborative Open Educational Resources (OERs). Writing Commons, an international open textbook spearheaded by Joe Moxley at the University of South Florida, has evolved from a print textbook into a crowd-sourced resource for college writers around the world. Massive open online course (MOOC) platforms have also generated interest in building online eBooks. The Cultivating Change Community (CCMOOC) at the University of Minnesota is one such project founded entirely on a grassroots model to generate content. In 10 weeks, 150 authors contributed more than 50 chapters to the CCMOOC eBook and companion site. The Peer to Peer University has applied peer production principles to online open learning communities and peer learning. Several critics have challenged the prevailing optimism with which peer production is viewed. Daniel Kreiss, Megan Finn, and Fred Turner criticize the consensus perspective on peer production as utopian. Asserting that this new mode of production challenges the traditional form of bureaucracy, they reference Max Weber’s analysis of modern bureaucracy and urge that this analysis be applied to peer production. They argue that bureaucracy is better equipped to handle social problems than peer production, which they consider unsustainable. As bureaucracy promotes a rationally organized, rule-oriented functioning of society, Kreiss, Finn, and Turner claim that peer production undermines this aspect due to its tendency to encourage individual behavior based on private morality. This tendency, they argue, degrades autonomy by “collapsing public and private boundaries,” allowing people’s professional lives to extend into their private domains. Other critics claim that the participatory nature of peer production is apt to generate misinformation and products of inferior quality. In his book The Cult of the Amateur, Andrew Keen assesses peer-produced content on the Internet and asserts that it exists as a “smokescreen” which emptily promises more truth and deeper knowledge, but actually leading to the disappearance of truth. According to Keen, the Internet advocates peer production to a questionable degree by permitting anyone to post information freely. This form of peer production, he cautions, leaves room for people to plagiarize ideas and distort original thoughts, which he says ultimately creates an uncertainty in the validity of information. Another critic, Jaron Lanier, cites Wikipedia as an example of how dependence on mass collaboration may result in unreliable or biased information. He warns that websites like Wikipedia promote the notion of the “collective” as all knowing, and that this concentrated influence stands in direct contrast to representative democracy. In addition to these adversarial views, some critics assert that peer production does not perform as well in some contexts as it does in others. Paul Duguid suggests that peer production works less efficiently outside of software development, stating that continued reliance on peer production in various domains of information production will necessitate a search for new ways to guarantee quality. Yochai Benkler similarly proposes that peer production may produce functional works like encyclopedias more proficiently than creative works. Despite the valuable potential of peer production, several critics continue to doubt extensive collaboration and its ability to yield high quality outputs. - Anti-rival good - Carr-Benkler wager - Citizen science - Cognitive Surplus – a book - Collaborative software development model - Crowdsourcing software development - Decentralized planning (economics) - Distributed manufacturing - Gift economy - Knowledge commons - Motivations of open source programmers - Nonformal learning - Peer review - Production for use - Open business - Open innovation - Open Music Model - Open-source-appropriate technology - Social peer to peer processes - Common ownership - Benkler, Yochai (April 2003). "Freedom in the Commons: Towards a Political Economy of Information". Duke Law Journal 52 (6): 1245. Retrieved 28 November 2011. - Duguid, Paul (2006-10-02). "Limits of self-organization: Peer production and "laws of quality"". First Monday 11 (10). ISSN 1396-0466. Retrieved 2014-09-26. - RepRap stands for self replicating rapid prototyper and the design of the printer itself is an example of peer production. - B.T. Wittbrodt, A.G. Glover, J. Laureto, G.C. Anzalone, D. Oppliger, J.L. Irwin, J.M. Pearce (2013), Life-cycle economic analysis of distributed manufacturing with open-source 3-D printers, Mechatronics, 23 (2013), pp. 713-726. http://dx.doi.org/10.1016/j.mechatronics.2013.06.002 open access - Pearce, J.M. (2015) Quantifying the Value of Open Source Hardware Development. Modern Economy, 6, 1-11. doi: 10.4236/me.2015.61001. open access to the full text - Benkler, Yochai and Nissenbaum Helen, "Commons based Peer Production and Virtue" - Huberman, Bernardo A, Wilkinson, Dennis M, Wu, Fang "Feedback loops of attention in peer production" - "Gooseberry Patch". Gooseberry Patch. - Debbie L. King, Adegboyega Babasola, Joseph Rozario, and Joshua M. Pearce, “Mobile Open-Source Solar-Powered 3-D Printers for Distributed Manufacturing in Off-Grid Communities,” Challenges in Sustainability 2(1), 18-27 (2014).open access - D.J. Pangburn, How 3D Printers Are Boosting Off-The-Grid, Underdeveloped Communities - MotherBoard available at http://motherboard.vice.com/read/how-3d-printers-are-boosting-off-the-grid-underdeveloped-communities Nov. 7, 2014. - "About.""Writing Commons". CC BY-NC-ND 3.0. Retrieved 11 February 2013. - Anders, Abram (November 9, 2012). "Experimenting with MOOCs: Network-based Communities of Practice.". Great Plains Alliance for Computers and Writing Conference. Mankato, MN. Retrieved February 11, 2013. - "About.""Cultivating Change Community". CC BY-NC 3.0. Retrieved 11 February 2013. - Kreiss, Daniel; Finn, Megan; Turner, Fred. "The limits of peer production". Sage Journals. Sage. pp. 243–259. Retrieved 24 May 2014. - Keen, Andrew (2007). The Cult of the Amateur: How Today's Internet Is Killing Our Culture (3rd ed.). Crown Business. - Lanier, Jaron (2010). You Are Not a Gadget: A Manifesto (1st ed.). New York: Alfred A. Knopf. - Benkler, Yochai; Shaw, Aaron; Mako Hill, Benjamin. "Peer Production: A Modality of Collective Intelligence". Retrieved 24 May 2014. - TED: Ideas worth spreading - Yochai Benkler introduces peer production. - The Emergence of Open Design and Open Manufacturing Michel Bauwens, We Magazine Volume 2 - Quality Management of Peer Production (eLearning) - Writing Commons (open textbook)
<urn:uuid:9e25e381-7157-481b-a0ea-2db34b2b89a3>
CC-MAIN-2015-11
http://www.digplanet.com/wiki/Peer_production
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461612.31/warc/CC-MAIN-20150226074101-00201-ip-10-28-5-156.ec2.internal.warc.gz
en
0.882525
1,921
3.609375
4
Killing Jesus: A History From the chilling artwork on the book’s jacket to the verbal depiction in its final pages, KILLING JESUS is exactly what the title infers. Bill O’Reilly and Martin Dugard have put together a history of Jesus’ death --- from the instance of his birth, to stories from His early years, ministry and final days. Readers familiar with the Bible will recognize the accounts, most of which are told in chronological order. But the authors have given us a deeply researched work in which facts are taken from a wide range of sources. Biblical scholars, historical students of the Roman Empire, the Four Gospels, extensive research on the act of crucifixion, studies of Roman soldiers, personal observation, and reliance on experts in Hebrew and Roman history provided the base used in KILLING JESUS. Lack of specific details in Jesus’ life frustrated the authors, allowing for major gaps in the storytelling. They are up front with readers when details become fuzzy but honestly state that deductions are based on the best available evidence. Roman historians kept impeccable records of events during his lifetime, but Jesus’ closest friends are the best recorders of his last few years. KILLING JESUS is not a religious book, but rather the story of a Hebrew man who preached a philosophy of peace and love in a violent society of Roman rule. Largely, the Roman rulers paid little attention to the everyday activities of their Jewish populace, allowing them to observe their own holy days and feasts, so long as tribute was paid to Rome in the form of taxes. "O’Reilly and Dugard have produced a historical treatment, well-documented by research, that will impress both Christian and non-Christian readers alike." The first chapter, following an extensive introduction to the reader, begins in Bethlehem, Judea, in March, 5 B.C. The current monarch Herod, half-Jewish and half-Arab, believes that a baby has been born, reputed to be the next King of the Jewish people. Soldiers march with orders to kill all Hebrew baby boys born in Bethlehem. Herod has survived numerous plots to overthrow his brutal reign but is obsessed by the prophecy of a new King. Five specific occurrences are purported to be fulfilled: 1) a great star will rise; 2) a baby will be born in Bethlehem, the birthplace of the great King David; 3) the baby will be a direct descendant of David; 4) powerful men will travel from afar to worship him; and 5) the child’s mother must be a virgin. Herod knows that the first two are true and is unaware that all have come to pass. The child has been named “Yeshua ben Joseph,” or Jesus, meaning “the Lord is salvation.” Herod receives the Magi, three diviners (astronomers) who carry a treasure chest filled with gold and sweet spices to honor the newly born King of the Jews. He decrees that they locate the infant and then return to Jerusalem so he can venture to see him. They never come back. Herod has ordered the slaughter of more than a dozen innocent babies, but Joseph, Jesus’ father, awakes from a terrifying dream, a vision of the slaughter. In the dead of night, the family escapes. Footnotes reveal that the most insightful facts regarding Jesus’ birth and early ministry history come from the Gospel writers Matthew, Mark, Luke and John, forming the Synoptic Gospels. KILLING JESUS contains more than 18 maps, illustrations and drawings, placed precisely in the chapters where they expand the information given. Views of Jerusalem, the Jewish temple, drawings of the Temple complex, and artists’ renderings of John the Baptist and Jesus as a boy, teaching his elders in the Temple, lend credibility to the histories told. A Last Supper painting gives focus to Jesus’ ministry and the impact He had on all who followed Him. Paranoia, greed, lust for power and worldly status fill the pages with depictions of both the Roman officials ruling Judea at the time and the Hebrew leaders who served to please them. Sacrifice of ordinary Hebrews, by both taxation and obligatory laws, formed the society they oversaw. Sadducees and Pharisees were as corrupt as the Roman leaders they pleased. Pilgrimages to Jerusalem formed a large part of the worship that engaged ordinary Jews. Moneychangers sat in the temple, gathering the coins for taxation and purchase of animal sacrifice during these feast times. During the feast at Passover, the newly baptized Jesus confronts the moneychangers by overturning their tables, throwing coins on the floors. He next releases sacrificial animals from their cages, raging that his father’s house had been turned into a market. Now challenged by Temple officials to show more miracles, Jesus replies, “Destroy this Temple and I will raise it up in three days.” He leaves, with many thinking him insane and others revering him for the stand against Temple officials. His notoriety has begun. The following chapters detail the prophecy that John the Baptist has fulfilled, the growing celebrity of Jesus as he preaches to the masses, the increasing unrest among Temple priests who see him as a threat to their powers, further goading by the Pharisees to trap him into avowing himself as King of the Jews. KILLING JESUS shows a well-researched scenario of the events leading directly to his trial, both by Jewish leaders and the Roman ruler, Pontius Pilate. Graphic details of the crucifixion, Jesus’ removal from the cross, his entombment and disappearance round out the final chapters. Extensive credits, thanks and follow-up by historical references finish the story. O’Reilly and Dugard have produced a historical treatment, well-documented by research, that will impress both Christian and non-Christian readers alike. I highly recommend KILLING JESUS. Reviewed by Judy Gigstad on October 25, 2013
<urn:uuid:8af280ea-9652-4a83-b201-11142b85554f>
CC-MAIN-2015-11
http://www.bookreporter.com/reviews/killing-jesus-a-history
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936460576.24/warc/CC-MAIN-20150226074100-00144-ip-10-28-5-156.ec2.internal.warc.gz
en
0.961327
1,236
2.671875
3
I’m looking at the National Research Council’s final report on the detection of near-Earth objects, the culmination of the study that produced the NRC’s interim report last year. Let’s recall the context: It was in 2005 that Congress mandated that NASA find 90 percent of NEOs with a diameter of 140 meters or greater, such discovery to be concluded by 2020. The interim report, discussed in an earlier Centauri Dreams story, concluded that NASA couldn’t meet this goal because funds for the survey had never been appropriated. Now we have a final report with suggestions on what NASA could do to finish the survey as soon as possible after the original 2020 deadline. Two possibilities emerge: A space-based telescope working in tandem with a ground-based telescope could finish the job the fastest. But if cost-cutting is necessary, the space option will have to be abandoned in favor of ground-based equipment. Gratifyingly, the NRC stands up strongly to defend Arecibo, whose role in asteroid observation is crucial, and also voices strong support for radar observations at the Goldstone Deep Space Communications Complex. From the report: …the complementary radar systems at Arecibo and Goldstone are powerful facilities for characterization within their reach in the solar system, a maximum of about one-tenth of the Earth-Sun distance. Arecibo, which has a maximum sensitivity about 20-fold higher than Goldstone’s, but does not have nearly so good sky coverage as Goldstone, can for example, model the three-dimensional shapes of (generally very odd-shaped) asteroids, and estimate their surface characteristics, as well as determine whether the asteroid has a (smaller) satellite or satellites around it, all important to know for planning active defense. Radar can also accurately determine orbits of NEOs, from a few relatively closely spaced (in time) observations, which has the advantage of being able to quickly calm public fears (or possibly, in some cases, show that they are warranted). Thus this recommendation: Immediate action is required to ensure the continued operation of the Arecibo Observatory at a level sufficient to maintain and staff the radar facility. Additionally, NASA and NSF should support a vigorous program of radar observations of NEOs at Arecibo and NASA should support such a program at Goldstone for orbit determination and characterization of physical properties. Image: Renderings of binary near-Earth asteroid 1999 KW4 showing its satellite making one orbit. The figure shows three-dimensional models in shaded relief, reconstructed from a set of radar images obtained at Arecibo and Goldstone in 2001. The models are shown in their proper orientation as viewed from Earth. Radar imaging has shown that ~15 percent of NEOs larger than 200 meters in diameter have one (or sometimes two) satellites. SOURCE: S.J. Ostro et al., Radar reconnaissance of near-Earth asteroids, pp. 143-150 in Near Earth Objects, Our Celestial Neighbors: Opportunity and Risk (A. Milani et al., eds.), Proceedings of the 236th Symposium of the International Astronomical Union, Prague, Czech Republic, August 14-18, 2006, Cambridge University Press, Copyright 2007 International Astronomical Union. The asteroid or comet that struck the Yucatan some 65 million years ago is estimated to have been about ten kilometers in diameter, the kind of object that strikes the Earth only once every 100 million years on average. An object 140 meters in diameter, the size mandated by the survey requested of NASA, would cause regional damage, with impacts happening on average every 30,000 years, according to the report. What to do if an NEO is discovered on a collision course with the Earth? The alternatives include using a ‘gravity tractor’ or other ‘slow push’ methods to move the object, but these are more practical for smaller objects (up to 100 meters in diameter) and would require decades of warning time. Changing a NEO’s orbit by flying a large spacecraft into it might also require warning times longer than we would necessarily have. Larger NEOs (with diameters greater than one kilometer) would demand the nuclear option: …current technology allows us to deliver payloads for mitigation to NEOs in a wide range of orbits. However, in cases of short warning (under, say, a decade), payloads are likely to be severely limited in mass, but may often be sufficient to deliver a nuclear device. The development of the next generation of heavy-lift launch vehicles will considerably improve the situation. The development of advanced engines for in-space propulsion will considerably improve our capability for delivering rendezvous payloads (for characterization, to act as gravity tractors, or to emplace surface explosives) when the warning time is decades. Image: Approximate outline of the regimes of primary applicability of the four types of mitigation (see report for the many caveats associated with this figure). Image Courtesy of Tim Warchocki. The problem we face is that while these methods may work on paper, we’re not ready to put any of them to work on short notice. We also lack basic information about the kind of target we would be trying to deflect or destroy. Because of this, the report recommends a new program dedicated to more fully dealing with the hazards of NEOs: The United States should initiate a peer-reviewed, targeted research program in the area of impact hazard and mitigation of NEOs. Because this is a policy driven, applied program, it should not be in competition with basic scientific research programs or funded from them. This research program should encompass three principal task areas: surveys, characterization, and mitigation. The scope should include analysis, simulation, and laboratory experiments. This research program does not include mitigation space experiments or tests which are treated elsewhere in this report. We’re left, too, with the question of how small an NEO can be before we safely disregard it. The 1908 impact at Tunguska devastated more than 2000 square kilometers of forest. And while earlier estimates for the size of this object have been around 70 meters in diameter, there is recent research indicating the object could have been as small as 30 meters in diameter. That conclusion is, the report notes, preliminary, but because smaller objects are more numerous than larger ones, the likelihood of such an impact event is approximately once every three centuries. We also need to learn more about airbursts from impactors in this size range and whether they can cause tsunamis that damage coastlines. Because recent studies of meteor airbursts have suggested that near-Earth objects as small as 30 to 50 meters in diameter could be highly destructive, surveys should attempt to detect as many 30- to 50-meter objects as possible. This search for smaller-diameter objects should not be allowed to interfere with the survey for objects 140-meters in diameter or greater. Space missions like NEAR Shoemaker and Hayabusa have given us information on two NEOs, and what we’ve learned is that Eros and Itokawa are dissimilar in many ways. From these missions and ground-based observations, we’ve learned that NEOs have a wide range of internal structures and more complex surfaces than had been realized. It’s clear that we need to learn more about these properties through further dedicated space missions if we’re to develop the strategies that will ensure we can move or destroy a NEO. You can get a copy of the NRC report “Defending Planet Earth: Near-Earth Object Surveys and Hazard Mitigation Strategies” through the National Academies Press. It’s absorbing reading as we consider the problem of how to deal with a threat that may be exceedingly rare but potentially catastrophic. Our technology is only now getting to the point where we have the capability of affecting the trajectory of an incoming asteroid, depending upon its mass and the amount of advance warning we have. My belief is that a space-based infrastructure developing over the next century will come to play an essential role in safeguarding our planet.
<urn:uuid:5ba2afd2-978a-44ae-884f-bb3a7e290c2b>
CC-MAIN-2015-11
http://www.centauri-dreams.org/?p=11135
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462555.21/warc/CC-MAIN-20150226074102-00028-ip-10-28-5-156.ec2.internal.warc.gz
en
0.94301
1,658
3.03125
3
What this means is that a special individually-made serum was created using small amounts of allergens (proteins against which the person reacts) and this person periodically receives injections with gradually increasing amounts of allergens until a maintenance level is reached. Usually some kind of scratch test in the skin is used to determine what the best ingredients for the serum will be. It may seem odd that injecting someone with proteins we think they are allergic to would be helpful but it is. All other therapies for airborne allergies basically aim to suppress the symptoms; allergen-specific immunotherapy is the only therapy that actually works against the immunological disease. WHAT TO EXPECT FROM IMMUNOTHERAPY Approximately half the dogs receiving immunotherapy will have an excellent response. About 25% will have a so-so response. About 25% will not have any response at all. It can easily take a year to determine if the pet is responding. Many people go marching off to the veterinary dermatologist with their itchy pet with the idea that immunotherapy will have an immediate effect and nothing could be further from the truth. Immunotherapy takes weeks to months to work and is something one plans for “next season” rather than for problems going on this allergy season. Immunotherapy is not going to help a patient with a food allergy. A patient with a food allergy needs a food trial, not allergy shots. When immunotherapy is combined with other forms of itch relief, even better results are obtained. IT STARTS WITH AN “ALLERGY TEST” The term "allergy test" is something of a misnomer. By the time the patient gets to this stage, we are already pretty sure he or she has an airborne allergy (atopic dermatitis) based on clinical presentation. The testing we are about to describe is not a test to determine if a patient has allergies or not. In fact, it is even something of a leap to say that the patient is allergic to the substances that create reactions. Testing is done to assess the immunologic reactions in the skin so as to determine what substances would make the best ingredients for an allergy serum and/or what substances would be best to avoid. When a substance generates reaction in the skin during the test or correlates to a high amount of antibody in the blood, that does not necessarily translate to an itchy dog. Testing can be done by either "intradermal skin testing" or by “in vitro” (blood testing). For skin testing ("IDST"), the patient must be referred to a specialist or at least to someone who performs enough skin testing to maintain an appropriate collection of allergens for testing. The patient must be held off anti-itch medications for a period of time (how long will depend on what the medications are and what the particular dermatologist recommends), an area of skin is shaved, and a grid of dots drawn on the skin to mark where the allergens go. Sedation is generally not necessary but that depends on the patient, of course. Small amounts of allergens are injected into the skin (the selection of allergens varies by region and community depending on what pollens and plants are common) along with a saline control (which will define what no reaction looks like) and a pure histamine sample (which will define what a strong reaction looks like). After an incubation time of several minutes, the reactions in the skin are graded. The allergens creating the strongest reactions will be selected for the serum. In vitro testing does not involve special equipment such as an allergen collection. Instead a blood sample is sent to a laboratory for analysis and generally it is not necessary to withhold anti-itch medications. The laboratory tests the blood for antibodies of the "IgE" class as these are the antibodies that generate allergy symptoms. The blood is tested for IgE antibodies against different pollens, grasses, dust mites and other airborne substances. Substances that have generated the highest amounts of IgE are selected for the serum. What test method is best is highly controversial. Many dermatologists perform both skin and blood tests on patients in order to decide what allergens should be included in the hyposensitization serum. Some specialists feel the skin test is best and certainly the skin test is traditional. Others feel strongly about the "in vitro" (blood) tests. One would think that either test should produce the same results but this is rarely the case. Regardless of which test is used, a special company is enlisted to make the serum vial for the individual patient. It should be noted that neither skin testing nor blood testing produces meaningful results with regard to food allergies. For evaluation of food allergy, a diet trial is necessary and demonstrating IgE in the blood against a food substance does not indicate the presence of a food allergy against that substance. Allergen doses are reflected in units called PNU (protein nitrogen units). The initial vials of serum to be used will be the weakest (maybe 1,000-2,000 PNU per ml). The patient will receive an increasing amount of allergen over time and will finally end with a maintenance vial that might be as concentrated as 20,000 PNU per ml.) Typically, injections start twice a week and eventually can be given every two weeks. There are many dosing protocols that may be selected. Ideally the owner will be giving the injections at home but if this is not possible, the pet can be brought to the hospital for allergy shots. The owner will receive a schedule showing when to give each injection and how much to give. The amounts will increase until it is time to move up to the next vial where the concentration of allergens in greater. video showing how to give injections to a dog Expect to be thoroughly educated in the art of giving injections at the time the serum is prescribed. It may seem daunting at first but is very simple. It is helpful if the pet receives a special reward after injections. Used needles can be disposed of in the regular trash but it is helpful if they are placed inside a plastic or metal container (like a liquid laundry detergent bottle or closed coffee can) so as not to cause an accidental puncture. SPECIAL RULES FOR CALIFORNIA As of September 1st, 2008 it has been illegal to dispose of used syringes in the regular trash even if they are in a thick plastic container. You must instead return used needles to a special needle disposal center or use a special “mail-in” sharps container. In California, medical wastes must go to special medical waste landfills. In most cases, bringing the needles to the veterinarian's office for disposal is acceptable. Injections should be timed in such a way that the pet can be observed for 30-60 minutes post injection so as to watch for reactions. Any reactions should be reported to the veterinarian before giving the next injection. Serious reactions are rare (less than 1% of patients have them) but you should still be able to recognize them. Not So Serious Reactions Which Still Require Reporting Swelling at the injection site Loud Stomach/Intestinal Gurgling Reactions are likely to lead to some kind of adjustment of the protocol. Be sure you understand when you are supposed to return for any rechecks. ASIT is the preferred treatment of atopic dermatitis and has the greatest potential for long-lasting effectiveness with rare side effects. OTHER VERSIONS OF ALLERGEN SPECIFIC IMMUNOTHERAPY: RUSH THERAPY: Traditional allergen specific immunotherapy can take six months to a year before one can even tell if it is working. What if the patient simply can't wait that long? With Rush Therapy, the first 12 injections are given over six hours instead of over six weeks. The patient must be watched closely in the hospital for reactions during this time (hives, itching, swelling or even something as serious as anaphylactic shock is possible and the doctor must be there to promptly reverse any reactions with medication). After the "rush" period, the patient an jump into maintenance therapy in a week or two. While the risk of reaction is increased giving allergens to intensively to a sensitive patient, the procedure appears to be safe and is actually the method of choice in some dermatology specialty practices. If you are interested in this version of allergen specific immunotherapy, check with the doctor overseeing your pet's serum preparation. SUBLINGUAL IMMUNOTHERAPY ("SLIT"): While this version of immunotherapy has been available to human allergists for some time, it is new to veterinary practice. In this situation an oral product is applied daily, sometimes several times daily, and there is no tapering schedule as there is with injections. This method has been shown to be helpful to dogs who did not respond to injectable immunotherapy (50% of dogs who failed traditional injectable therapy were able to respond well to sublingual therapy). The sublingual technique might also be preferable to owners who are not comfortable using needles. The risk of anaphylactic shock appears reduces with the sublingual technique compared to traditional injections. SLIT vials do not require refrigeration, unlike vials for injection. It is important that the patient not swallow the SLIT allergens so the product cannot be given in food and the pet cannot be fed for a time after the product is given.
<urn:uuid:937dd9ff-bcac-4cfd-86d3-c5948a6efeba>
CC-MAIN-2015-11
http://www.marvistavet.com/html/body_immunotherapy.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463028.70/warc/CC-MAIN-20150226074103-00071-ip-10-28-5-156.ec2.internal.warc.gz
en
0.942998
1,946
2.765625
3
In order to solve problems involving vectors and their resultants and dot products, it is necessary to A typical problem involving vectors which can be solved by adding and/or subtracting vectors, using a dot product, or applying the Law of Sines or Law of Cosines to give us information about vectors that form a non-right triangle. Usually you are asked to find information about unmeasured components and angles. Note that we will represent vectors either by using bold type v or by using the vector notation Let's look at two introductory examples of this type of problem. First we make a diagram in standard position. The attempted flight path of the plane is vector OX . Notice that the angle shown is 50° because the 40° bearing is measured clockwise from North. The vector XY represents the wind from the South. The vector OY is the resultant path of the plane, affected by the wind. In the diagram shown below, the known magnitude and angle are labeled. It is useful to put such a diagram in “standard position” with North being at the top of the vertical axis. We then measure a bearing clockwise from North to label the measurement of an angle. We need to find vector OY (ground speed) which is the vector sum of OX (air speed) and XY (wind speed). One way to do this is to add the components of OX and find the magnitude and direction of OY , their resultant..We have the following : given above could also have been written as: We find the magnitude of OY, the plane’s ground speed, using the Pythagorean Theorem: makes with the horizontal axis in the diagram can be found as follows: has been pushed (54.194° - 50º) = 4.194º off its attempted path if no corrections are made for the wind. The plane's new bearing is 90° – 54.194° = 35.806° The final bearing and ground speed of the plane are 35.806° at 439.479 mph. We first make a vector diagram in standard position. made by vector OY with the horizontal axis is 50° because bearings are measured clockwise from North. The new bearing is the direction the plane should take in order to allow the wind to push it upward to the desired 40° bearing, which is the angle made by vector OY with the vertical (North) axis. We do not know the angle formed by the vector OX and the horizontal axis, labeled as (50º - θ) in our diagram. In our diagram, we labeled angle YOX as angle θ. Using triangle YOX, we can apply the Law of Sines as follows: must therefore aim 4.6° East of the desired 40° bearing, or at a new bearing of (40º + θ) = 44.6° To find the magnitude of vector OY , we must first know the measure of the angle in the triangle OXY. To do this, we will start with the fact that the sum of the angles in triangle equals 180º. Note that angle b = 40º due to vertical angles ÐOXY = 180° - b - θ = 180 - 40° - 4.6° = 135.4° We will now use the Law of Sines once again to find the magnitude of the vector OY Remember that when working vector problems that involve currents the vector equation is: air speed + wind speed = ground speed OX + XY = OY In order to reach its desired destination, our plane will fly with an air speed of 400 mph on a bearing of 44.6º. His resultant ground speed will be 436.9 mph at a bearing of 40º. Now that we can determine the components of the vectors OY we can use their dot product to check our calculations and verify that the angle YOX (θ in our diagrams) is 4.6º. OY = (436.9cos(50°), 436.9sin(50°)) = (280.8, 334.7) OX = (400cos(45.4°), 400sin(45.4°)) = (280.9, 284.8) Recall that in general, if v ) and u ), are two vectors, their dot product can be expressed as either represent the magnitudes of vectors v Applying the second formula to our situation results in the formula Since this is a cumbersome calculation, you should use a calculator. Entering this into a calculator is shown in the screen below. The result is cos(θ) 0.9967788785. This gives θ In some situations, the Laws of Sines and Cosines work very well. In other situations, it might be necessary to first calculate the vector
<urn:uuid:5a038e3d-8784-4b2f-a0f1-f6b6ea1c1bd3>
CC-MAIN-2015-11
http://www.algebralab.org/Word/Word.aspx?file=Trigonometry_ResultantsDotProducts.xml
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461988.0/warc/CC-MAIN-20150226074101-00244-ip-10-28-5-156.ec2.internal.warc.gz
en
0.897777
1,052
4.46875
4
Mineral Water Springs & Wells in Texas Used with permission from The Handbook of Texas Online. From the early days of the Republic of Texas, mineral-water springs and wells attracted health seekers. Sam Houston bathed his wounds in the waters of Sour Lake in Hardin County and in the sulfur springs of Piedmont in Grimes County. Davy Crockett is said to have visited the Texas Sour Wells in Caldwell County. A German geographer and philosopher, Ernst Kapp, established a hydropathic institute in Sisterdale, Kendall County. Springs and wells varied in location, topography, vegetation, and properties such as temperature, mineral composition, and origin. About 100 years ago the appropriation of mineral waters for medicinal purposes grew so popular that thousands of people visited springs and wells yearly. More than 100 places developed into well-known resorts. In 1888 more than 6,000 baths were taken at Hanna Springs, a small, relatively undeveloped spring in Lampasas. In the early 1900s visitors to Mineral Wells, a town of 8,000 residents, numbered 150,000 annually. In the 1930s, 80,000 people visited Marlin annually. Texas resorts also attracted celebrities: Teddy Roosevelt visited Hot Sulphur Wells outside San Antonio, and Mineral Wells hosted, to name a few, Clark Gable, Tom (Thomas Edwin) Mix, Douglas Fairbanks, and J. P. Morgan. Texas spas were unique among Texas towns and also different from resorts in the East. Daily life at these resort towns revolved around the waters. Architecture reflected the tradition. Pavilions and drinking fountains became gathering places for local citizens, depots attracted bands and drummers to meet trains, bathhouses set the scene for private ablutions, and large hotels employed big bands for entertainment. Other diversions included domino games, burro rides, picnics, and dances. Bathers overcame the fears attendant upon the theory of miasma-that harmful vapors association with swampy waters cause disease-to seek the sanative pleasures of the springs and wells. Osmotic exchanges with the water were supposed to benefit the body. Rheumatism, arthritis, and skin diseases were reportedly relieved more often than any other condition. The use of mineral springs for therapeutic purposes declined for several reasons. Many hotels burned or were washed away by floods, and rebuilding them seemed inappropriate because medicine had begun to change. With the rise of “germ theory” and the discovery of sulfa drugs and antibiotics, the belief in the usefulness of mineral water diminished. Many doctors supported water cures, but some began to eschew balneology, the science of bathing, because of some resorts’ extravagant claims. In Marlin the tradition lasted into the 1960s, primarily because the medical profession appropriated the practice and transformed it into a tool for physical therapy. Other factors, such as war and depression, also hurt resorts. The railroad guaranteed the success and demise of some resorts. Tioga was founded where railroad workers stopped to drink the water. Hanna and Hancock Springs boomed after the railroad arrived at Lampasas, but when the terminus moved farther west, the popularity of the springs began a precipitous decline. The waters specifically influenced the settlement of certain towns. Mineral Wells, Tioga, Sutherland Springs, and Wootan Wells owed their existence to their waters. Economies of other towns, such as Marlin, San Antonio, and Lampasas, partly depended upon the fact that people considered them healthful places to visit. “Taking the waters” was a site-specific activity, but it also included consumption away from the resort. Many waters that are now sold commercially come from Texas springs. Tioga, Wootan Wells, and Marlin bottled their mineral waters. In 1910 Mineral Wells was the largest shipping point for mineral water in the South, with yearly shipments of more than three million bottles to cities in the South and Midwest. In 1914 fifteen companies bottled Texas mineral water. One company still bottled the water of Mineral Wells in 1990, and some people continued to believe in its health-promoting qualities. Taking the waters may not be as popular in Texas as it once was, but the practice still exists. People do it at Stovall’s Hot Wells in Jack County and Kingston Hot Springs in Presidio County. Visitors to Big Bend National Park often sit in the ruins of J. O. Langford’s bathhouse beside the Rio Grande, where hot springs continue to flow. BIBLIOGRAPHY: Mamie Wynne Cox, A Love Story in Mineral Wells (Mineral Wells, Texas: Index, 1932). Ross Estes and Robert Duncan, eds., I Remember Things: An Informal History of Tioga, Texas (Quanah, Texas: Nortex, 1977). William Edward Fitch, Mineral Waters of the United States and American Spas (Philadelphia: Lea and Febiger, 1927). Anne Fox and Cheryl Lynn Highley, History and Archeology of the Hot Wells Hotel Site (Center for Archeological Research, University of Texas at San Antonio, 1985). S. W. Geiser, “Dr. Ernst Kapp, Early Geographer in Texas,” Field and Laboratory 14 (January 1946). Marlin Chamber of Commerce, Marlin: 1851-1976 (Waco, 1976). A. F. Weaver, Time Was in Mineral Wells (Mineral Wells, Texas, Heritage Society, 1975).
<urn:uuid:02ec4ce4-8b6b-42c6-9bcb-53f46f6e7c6a>
CC-MAIN-2015-11
http://www.marlintexas.com/mineral-water-springs-and-wells-in-texas/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461612.31/warc/CC-MAIN-20150226074101-00200-ip-10-28-5-156.ec2.internal.warc.gz
en
0.937658
1,122
3.171875
3
Photo by Dean Forbes New research helps explain why infection with herpes simplex virus-2 (HSV-2), which causes genital herpes, increases the risk for HIV infection even after successful treatment heals the genital skin sores and breaks that often result from HSV-2. Scientists, led by Drs. Lawrence Corey and Jia Zhu, of the Hutchinson Center, and Dr. Anna Wald, of the University of Washington, uncovered details of an immune-cell environment conducive to HIV infection that persists at the location of HSV-2 genital skin lesions long after they have been treated with oral doses of the drug acyclovir and have healed and the skin appears normal. The findings appear in the Aug. 2 advance online edition of Nature Medicine. “The findings of this study mark an important step toward understanding why HSV-2 infection increases the risk of acquiring HIV and why acyclovir treatment does not reduce that risk,” said Dr. Anthony Fauci, director of the National Institute of Allergy and Infectious Diseases. “Understanding that even treated HSV-2 infections provide a cellular environment conducive to HIV infection suggests new directions for HIV prevention research, including more powerful anti-HSV therapies and ideally an HSV-2 vaccine.” One of the most common sexually transmitted infections worldwide, HSV-2 is associated with a two- to three-fold increased risk for HIV infection. Some HSV-2-infected people have recurring sores and breaks in genital skin, and it has been hypothesized that these lesions account for the higher risk of HIV acquisition. However, recent clinical trials, including an NIAID-funded study completed last year, demonstrated that successful treatment of such genital herpes lesions with the drug acyclovir does not reduce the risk of HIV infection posed by HSV-2. The current study sought to understand why this is so and to test an alternative theory. “We hypothesized that sores and breaks in the skin from HSV-2 are associated with a long-lasting immune response at those locations, and that the response consists of an influx of cells that are a perfect storm for HIV infection,” said Corey, co-director of the Center's Vaccine and Infectious Disease Institute and head of the Virology Division in the Department of Laboratory Medicine at the UW. “We believe HIV gains access to these cells mainly through microscopic breaks in the skin that occur during sex.” The research team took biopsies of genital skin tissue from eight HIV-negative men and women who were infected with HSV-2. These biopsies were taken at multiple time points: when the patients had genital herpes sores and breaks in the skin, when these lesions had healed, and at two, four and eight weeks after healing. The researchers also took biopsies from four of the patients when herpes lesions reappeared and the patients underwent treatment with oral acyclovir. The scientists continued to take biopsies at regular intervals for 20 weeks after the lesions had healed. For comparison, the investigators also took biopsies from genital tissue that did not have herpes lesions from the same patients. Previous research has demonstrated that immune cells involved in the body’s response to infection remain at the site of genital herpes lesions even after they have healed. The scientists conducting the current study made several important findings about the nature of these immune cells. First, they found that CD4+ T cells—the cells that HIV primarily infects—populate tissue at the sites of healed genital HSV-2 lesions at concentrations 2 to 37 times greater than in unaffected genital skin. Treatment with acyclovir did not reduce this long-lasting, high concentration of HSV-2-specific CD4+ T cells at the sites of healed herpes lesions. Second, the scientists discovered that a significant proportion of these CD4+ T cells carried CCR5 or CXCR4, the cell-surface proteins that HIV uses (in addition to CD4) to enter cells. The percentage of CD4+ T cells expressing CCR5 during acute HSV-2 infection and after healing of genital sores was twice as high in biopsies from the sites of these sores as from unaffected control skin. Moreover, the level of CCR5 expression in CD4+ T cells at the sites of healed genital herpes lesions was similar for patients who had been treated with acyclovir as for those who had not. Third, the scientists found a significantly higher concentration of immune cells called dendritic cells with the surface protein called DC-SIGN at the sites of healed genital herpes lesions than in control tissue, whether or not the patient was treated with acyclovir. Dendritic cells with DC-SIGN ferry HIV particles to CD4+ T cells, which the virus infects. The DC-SIGN cells often were near CD4+ T cells at the sites of healed lesions—an ideal scenario for the rapid spread of HIV infection. Finally, using biopsies from two study participants, the scientists found laboratory evidence that HIV replicates three to five times as quickly in cultured tissue from the sites of healed HSV-2 lesions than in cultured tissue from control sites. All four of these findings help explain why people infected with HSV-2 are at greater risk of acquiring HIV than people who are not infected with HSV-2, even after successful acyclovir treatment of genital lesions. The study was funded mainly by the NIAID with support from the Eunice Kennedy Shriver National Institute of Child Health and Human Development, both part of the National Institutes of Health. [Adapted from a news release from the NIAID.]
<urn:uuid:d06a135e-65fb-4f29-a03e-67585d15cd88>
CC-MAIN-2015-11
https://www.fredhutch.org/en/news/center-news/2009/08/HIV-herpes-lesions.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461988.0/warc/CC-MAIN-20150226074101-00244-ip-10-28-5-156.ec2.internal.warc.gz
en
0.964871
1,179
2.921875
3
|About the Mission | About the Spacecraft and Impactor| |About the Comet | About Comets in General | About the Encounter| - What are the possible effects of a comet hitting the earth? - How do astronomers know which asteroids or comets pass by us? - Do we really know where comets and asteroids go once they leave our space? - I am writing a report on comets and need more information. - After water ice sublimates off the comet, what happens to it in the vacuum of space? - I understand that the components of water, OH and H can be detected with ultraviolet spectra. Will the collision of the impactor spacecraft onto Tempel 1 cause any change in the fluorescent lines of OH? - If the buried frozen gases and water-ice inside a comet nucleus are "electrically neutral" until ejected into the strong UV radiation coming from the sun, could there be electrical activity (lightning) occuring on comet nuclei? - How did earlier cultures know when a comet returned? - What is the difference between the nucleus of a comet and its core? The effects of an asteroid or comet impacting the earth depends on the size and composition of the impactor. There is literally tons of material hitting the earth every day! Most of it is just dust and burns up in the atmosphere as shooting stars. On October 9, 1992, a fireball was seen streaking across the sky from Kentucky to New York. At least 14 people captured part of the fireball on videotape. Larger pieces may survive their fiery passage through the atmosphere to hit the ground. It is believed that a 10km wide rock hitting the earth 65 millions of years ago was responsible for the extinction of the dinosaurs. Astronomers know which comets and asteroids pass by us by observing the path or orbit these objects take around the sun. Just like the planets and moons, asteroids and comets have orbits which can be mathematically calculated based on observations. These elliptical (egg-shaped) orbits are relatively unique. When a new asteroid or comet is discovered, astronomers have to observe it enough times to be able to determine the orbit. There are certain numbers they use to define the orbit and we call those numbers 'orbital elements.' We can use the orbital elements to predict the future positions of comets and asteroids within the solar system. All of the asteroids and comets that we currently know of have orbits that keep them in the solar system so they never really leave 'our space.' Although we would like to (in theory) make this website the most complete website on comets, we recognize our limitations. Plus there are already several very good sites on comets in general. A good place to start is on Small Solar-System Bodies. The Planetary Society maintains a list of comet missions. There also info about comet missions at the NSSDC. Another NASA site that has lots of information and pictures of comets is the Comet page at JPL. For some interesting activities try Amazing Space's Comets page. Finally, there is Gary Kronk's great website Cometography.com/. Good question. Water vapor in the vacuum of space and when exposed to sunlight further breaks down in a process called photodissociation, into H atoms and OH molecules. The OH molecules fluoresce in the presence of sunlight and is detected with spectrometers sensitive to Ultraviolet light. In fact, we can measure the abundance of water in a comet's nucleus by measuring the intensity of the emission bands and applying some scaling factors. I understand that the components of water, OH and H can be detected with ultraviolet spectra. Will the collision of the impactor spacecraft onto Tempel 1 cause any change in the fluorescent lines of OH? Indeed, one of the products of water dissociation is OH, which produces emission bands in the near-ultraviolet portion of the spectrum by fluorescence. As seen from Earth, these bands would be expected to brighten following the projectile's impact with Tempel 1 similar to changes in any species' emission bands due to a change in the amount of gas in the coma. To first approximation, the intensity of the band is simply proportional to the number of molecules available to fluoresce. Whether the increase due to the impact is detectable depends on how much new water is dissociated compared with the on-going release of water from the rest of the comet's surface. (Thanks to Dr. David Schleicher of Lowell Observatory, Flagstaff, AZ) If the buried frozen gases and water-ice inside a comet nucleus are "electrically neutral" until ejected into the strong UV radiation coming from the sun, could there be electrical activity (lightning) occuring on comet nuclei? PI Mike A'Hearn responds... "Not likely - that phenomenon should not be significantly different from normal comets, for which there is no indication of lightning. The ionization happens so far from the nucleus that the voltage gradient is tiny. The separation between electrons and positive ions in the outer coma is relatively small, so that the overall coma is electrically neutral. Recombination doesn't happen because the density is so low, which also inhibits the electrical conductivity even if the material were totally ionized." Prof. Chris Russell of UCLA's Institute of Geophysics and Planetary Physics and PI for the DAWN mission responds... "Lightning on Earth arises due to the charging up of water droplets and the separation of droplets of different size (and therefore charge) by the convection of droplets upward in clouds. Thus gravity in maintaining an atmospheric pressure gradient is also a needed factor in terrestrial lightning generation. Since on comets gravity is weak, and the pressure and temperature of the gas is not right for water droplet formation we do not expect lightning to occur. However, nature often surprises us. So one should be vigilant." Actually, early cultures where not even aware of comets as being icy bodies in the Solar System. So every comet they saw was a 'new' demon in their belief system. It wasn't until the late 1600's that astronomers thought that some comets that had been observed through the centuries might be the same comets seen over and over. In fact, the "first" comet that is defined as periodic, meaning that it is seen on a regular basis, is comet Halley. It is named after Edmund Halley who noticed that every 76 years there was a comet visible. He was able to predict when that one comet would return. Unfortunately, he died before he could see his prediction come true, but the comet was still named after him. How was he able to predict the return of this comet? Well, every comet has a very distinctive orbit or elliptical path around the sun. That orbit can be defined with a set of numbers that we refer to as "orbital elements." Since the path of the comets (and the planets) are in three dimensional space, we need at least 3 numbers to orient that path, a few others to define the size and shape, and a few to define the position in the orbit. Using these orbital elements, we can then calculate a comet's past and future positions to predict when it will next be observable. If a comet is found by chance, one has to observe it long enough to trace its path on the sky, fit it to an ellipse to determine the orbital elements, then compare those values to a table of known comet orbital elements to identify it. The nucleus of the comet is its solid part that is embedded in a cloud of gas and dust called the coma. The term arises from our perception of the comet as an observational phenomenon, of a fuzzy ball of light with a tail. The nucleus would then be the center of the phenomenon. Until 1986 when the Giotto spacecraft flew past Halley's comet, we had never seen the nucleus of any comet. Now that we can get close to a comet and study it in more detail, we start to talk about the parts of a nucleus going into its interior. We ask if there is a 'crust' of the nucleus which is the top layer that has been processed by devolatilization (the removal of icy materials). Is there a 'mantle', which is a layer that is denser than the crust. Since the layering implies some processes involving heat and alteration of material, we then can hypothesize a cometary 'core', which is the very center of the solid part of the nucleus. We don't know the nature of the crust, mantle or core of the comet or even if they exist. In the Deep Impact mission we plan on finding out if layering exists and if it does, to study the crust and mantle of the comet. |Hi-Res JPEG (134 KB)|
<urn:uuid:107ef7e6-913f-4fca-8b7e-715ce9edd675>
CC-MAIN-2015-11
http://deepimpact.umd.edu/faq4.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462141.68/warc/CC-MAIN-20150226074102-00289-ip-10-28-5-156.ec2.internal.warc.gz
en
0.947794
1,806
3.953125
4
Managing Diabetes During Cold and Flu Season Cold and flu season can complicate your plan for managing diabetes. Try these self-care tips when cold-weather illnesses set in. and flu season is challenging even for healthy people, but when you’re also managing diabetes, it can have more serious consequences. Cold medications, dehydration, irregular eating schedules, and your body’s response to infection can all make managing diabetes more challenging, which can lead to higher or lower blood sugar than you might ordinarily expect. It’s important to pay attention to the heightened risk of diabetes complications during this time, which can range from dehydration people with diabetes can get severely ill with a cold or the flu,” says endocrinologist Debra Simmons, MD, a professor of medicine at the University of Utah in Salt Lake City. “Blood sugar can become harder to control, and you might not be able to keep fluids down.” Taking Care of Yourself During Cold and Flu Season Get your flu “Everybody with diabetes is supposed to get a flu shot,” Dr. Simmons says. It’s one of your best defenses along with washing hands regularly and avoiding people who are sick. pneumonia vaccine. This adult vaccination, called pneumovax, can protect you against a number of pneumonia strains. Unlike the flu shot, which is given annually, you can get it once and then forget about it for a few years. Have a sick-day plan in place. If you haven’t already discussed your “sick day rules” with your doctor, do so now. Ask what medications you can safely take to treat cold and flu symptoms, how to adjust your own medications if necessary, and when to call him or her if you get really sick and need more help. Buy diabetes-friendly cold products. The cough syrups most people rely on during cold and flu season tend to be sugary, so check labels carefully to make sure the ones you buy are flavored only with sugar-free syrups. Avoid decongestants because ingredients like pseudophedrine or phenylephrine can make diabetes harder to control. If your nose is stuffy, try a saline nasal spray instead. Also, look for alcohol-free medications because alcohol can affect blood sugar. Pay attention to other possible drug interactions. Just as syrupy medications can upset your blood sugar, certain cold and flu medications can increase blood pressure. If, like many people with diabetes, you’re also on blood pressure medication and aren't sure what cold products are best for you, talk to your doctor or pharmacist, and bring along a list of all your medications for this discussion. Ask for help if you need it. If an illness becomes severe, taking care of yourself can be difficult, Simmons says. If you can’t manage all the demands of diabetes and a cold, ask a friend or family member to check in on you regularly until you feel better. He or she should know how and when to call your doctor. sugar levels often. Typically you may test your blood sugar just once or twice a day when you’re well, but if you’re sick, aim for every 2 to 4 hours until the cold or flu has on schedule. Even if you're having trouble eating and keeping food down, take your diabetes medications on schedule. If you have any doubts about when to take them or how much to take, especially insulin doses, call your doctor. regularly. Make sure you stay hydrated. If you’re having trouble eating, ask your doctor about trying a small amount of a sweetened drink, such as half of a cup of soda or a sports drink. You’ll need 45 to 50 grams of carbohydrates every 3 to 4 hours. Consider ice chips or an ice pop if you’re having a hard time keeping fluids Test your urine for ketones. If your blood sugar goes over 240 mg/dL, test your urine for ketones, substances that build up in the urine or blood when your body is not getting or using blood sugar properly. This can be dangerous, so inform your doctor if your ketone test is positive. Prep your pantry. When you’re sick, you may not have the energy to get to the store. Keep a variety of items on hand just in case, such as canned soups, fruits, and vegetables. Consider having some ginger ale (regular, not diet) on hand in case you need fluids with Keep a log. Write down what medications you’re taking and when, as well as the results of blood sugar tests, ketone tests, your temperature, what you've eaten, and whether you've had any bouts of diarrhea or vomiting — all stats your doctor will need to know if your symptoms get worse. When to Call you get sick, you or a loved one should call your doctor if: cold or flu symptoms don’t start to get better in about 72 hours or if they get blood sugar levels are too high (over 250 mg/dL) or too low (70 mg/dL) and you aren't able to adjust them. have ketones in your urine. have abdominal pains. have a fever of 101.5 or higher. have ongoing diarrhea or are vomiting. experiencing shortness of breath, dizziness, or any loss of consciousness. having a hard time thinking clearly or staying awake. you have diabetes, cold and flu season can be extra challenging. But with some preparation and a plan, you can make it through while keeping your diabetes in check. This section created and produced exclusively by the editorial staff of EverydayHealth.com. © 2015 EverydayHealth.com; all rights reserved.
<urn:uuid:46d52e68-91ab-429e-81ba-d56d01c62a67>
CC-MAIN-2015-11
http://www.everydayhealth.com/health-report/type-2-diabetes/managing-diabetes-during-cold-flu-season.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461216.38/warc/CC-MAIN-20150226074101-00156-ip-10-28-5-156.ec2.internal.warc.gz
en
0.907989
1,258
2.75
3
Return to: MREC Home Page Return to: MREC Research Index C.A. Conover, Ph.D.* University of Florida/IFAS Central Florida Research and Education Center Research Report RH-96-2 During foliage plant production, growers often monitor certain factors affecting plant growth in order to produce high quality crops. One factor indirectly affecting plant growth is pH of the growing medium. A pH of 7 is considered neutral, a lower pH is acidic and a pH above 7 is alkaline; but producers of container grown plants need to understand just what these numbers represent and how the pH of the growing medium can indirectly influence foliage plant growth. We know that pH is defined as the measurement of the negative log of the hydrogen ion [H+] or hydroxyl ion [OH-] concentration. If we compared the pH of two potting mixes and one had a pH of 4.5 and the other a pH of 6.5, we would know that the medium with the lower pH contained more [H+]'s. Since pH is a logarithmic scale, the difference in the number of [H+]'s between soils with pH's of 4.5 and 5.5 is much greater (one hundred times greater) than the difference in the number of [H+]'s between soils with pH's of 5.5 and 6.5. Therefore, many more [H+]'s are needed to lower the pH from 5.5 to 4.5 than are needed when lowering pH from 6.5 to 5.5. Most growers who notice a decrease in medium pH of container grown foliage plants may wonder what causes this and why it can sometimes happen so rapidly. The main cause of decreasing pH of the "soilless" growing media favored by the foliage plant industry is related to the fact that these media are organic in nature. Decomposition of organic matter results in the formation of both organic and inorganic acids. These acids cause the basic ingredients of the potting medium, such as calcium, to dissolve and eventually leach out, which then results in lowered growing medium pH. Fungi, which utilize the organic components (carbon) of potting medium as their food source, also significantly contribute to acid formation. Often, another major source of acids are the fertilizers applied for plant growth, with different nutrient sources responsible for eventually causing high or low acidity. For example, one 20-20-20 fertilizer needs 597 lbs of CaC03/ton to neutralize its acidity, while a 20-7-9, a fertilizer with different nutrient sources, requires only 273 lbs. Most fertilizers utilized in the foliage industry are acid forming, and the higher the fertilizer application rate used, the more acidity created. Although most plants will grow within a wide pH range, 3.5 to 8.0, for many years the suggested range of pH values for growth of good quality foliage plants was 5.5 to 6.5. This recommendation originated back when most ornamental plants were grown in mineral or organic soils or soil-containing mixtures. In soils, this is the pH range where nutrients required for foliage plant growth, such as nitrogen, phosphorus, potassium, sulfur, calcium and magnesium, are most available for plant uptake. In addition, within this pH range, potentially harmful micronutrients these soils may contain, (iron, manganese and zinc, as well as the element aluminum) are mostly insoluble or only slowly become soluble and, therefore, less available to plants. As growing medium pH decreases, the compounds containing these micronutrients dissolve and basic components such as calcium are leached, so that the amount of aluminum and the micronutrients iron, manganese and zinc available to plants is greatly increased. However, soil is rarely a component of the various types of modern media used to produce foliage plants. Aluminum is not a significant component of artificial growing media and additions of iron, manganese and zinc are specifically controlled when artificial media are produced. The chance of a micronutrient toxicity problem developing as pH decreases is unlikely for plants grown in a good quality artificial growing medium. When micronutrient products are applied to foliage crops at the rates recommended by manufacturers, micronutrient levels in the medium are sufficient for healthy plant growth, but below levels needed to create toxicity problems. We have conducted a large number of experiments over the years on various aspects of growing medium pH. For many years, we have suggested that dolomite be incorporated into peat and peat-bark based potting mixes before use, at the rate of 7 lbs/yd3, to help adjust and maintain the growing medium pH at the recommended level and to provide calcium and magnesium needed for healthy growth. None of the research we have conducted indicates these dolomite incorporation rates should be changed, especially in view of the fact that our research has shown that it is very difficult to increase pH of media already being used to grow a foliage crop without damaging plants. Use of higher dolomite incorporation rates is widespread in the industry, but we feel that this may cause more problems than it helps. Further additions of dolomite produce little change in pH but do create a much higher base saturation of the medium, which often results in decreased availability of necessary micronutrients. When most foliage crops were grown in soil, the recommended pH range was 5.5 to 6.5. This recommendation is still a valid recommendation for any producers still using soil to produce foliage plants. As the industry shifted from use of soil to various artificial media, use of artificial media also increased at our research facilities. For the past twenty years, most plants used in our research were grown in artificial media. To reflect this change we recommended a pH range of 5.0 to 6.5 as best for foliage plants (Conover and Poole, 1990). However, during research on nutrition of foliage plants, pH has often been observed to decrease over time. Often, at the end of a crop production schedule or termination of the experiment, pH would be lower than 5.0. Media pH's as low as 2.9 have been observed, and a range of 3.5 to 4.5 has not been uncommon and has been associated with foliage plant crops of high quality. In examining our data, we have not been able to associate any problems with pH's as low as 3.5 to 4.5 at the end of the crop cycle, and therefore we are revising our suggested pH range for foliage plants from 5.0 to 6.5 to a new range of 4.0 to 6.5. We have previously published information on suggested levels of dolomite for use in artificial media as well as ways to raise pH of media containing growing plants. The data found in these publications on dolomite levels, as well as ways to safely raise pH, if desired, are still valid. In addition, in two recent reports we have made available results of new research on adjusting pH and effects of using different dolomite sources. The primary purpose of this report is to inform growers that we have not observed plant problems due to a pH range of as low as 3.5 to 4.5 occurring at the end of the crop cycle on foliage plants used in our research, when plants were grown in various types of peat, bark or peat-bark based artificial media. We feel that growers using such media need to reconsider their attempts to adjust pH's below 5.0 but above 3.5, especially if these efforts might negatively affect marketability of the foliage crop. * Professor of Environmental Horticulture and Center Director (Retired 7/96), Central Florida Research and Education Center, 2807 Binion Road, Apopka, FL 32703-8504. . - Conover, C.A. 1995. Effects of lime source on pH of growing medium during production of Dieffenbachia maculata 'Camille'. Univ. of Fla., IFAS, CFREC-Apopka Res. Rpt. RH-95-5, 8p. - Conover, C.A. and R.T. Poole. 1990. Light and fertilizer recommendations for production of acclimatized potted foliage plants. Nsry. Dig. 24(10):34-36, 58-59. - Conover, C.A., R.J. Steinkamp and K. Steinkamp. 1995. Effects of Dolomite Source, Dolomite Rate and Fertilizer Rate on Change in pH of Growing Medium Leachate. Univ. of Fla. IFAS, CFREC-Apopka Res. Rpt. RH-94-4. 17p. - Poole, R.T. 1985. Changing pH of a potting medium. Fol. Dig. 8(7):6-8. - Poole, R.T. and C.A. Conover. 1992. Changing medium pH with hydrated lime. Univ. of Fla. IFAS, CFREC-Apopka Res. Rpt. RH-92-1, 7p. - Poole, R.T. and C. A. Conover. 1981. Soils and potting mixtures. In: Foliage Plant Production, J.N. Joiner, ed. Prentice-Hall, Englewood Cliffs, NJ.
<urn:uuid:1808a6ea-a6bb-42ee-a613-74f53659f6e4>
CC-MAIN-2015-11
http://www.mrec.ifas.ufl.edu/Foliage/Resrpts/rh_96_2.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461848.26/warc/CC-MAIN-20150226074101-00222-ip-10-28-5-156.ec2.internal.warc.gz
en
0.941514
1,950
2.9375
3
no spam, unsubscribe anytime. At The Literacy Site, we hope to foster a love of reading in our children through education and awareness as well as the simple act of providing books to children in need. You and our charitable partners are doing a big part of the work. When you click the "Fund Books for Kids" button and see our sponsors' ads, funds are generated to distribute books for children around the world. But what of the future? With a good understanding of the practical use and the sheer joy books can provide, our children can do even more to learn crucial skills and to help others around the world. Help students get involved. Below are a list of lesson plans that are unique to The Literacy Site, created by our caring staff. We hope that students and teachers alike will find these lessons exciting and useful. Feel free to tailor them to your classroom's needs, and spread hope, literacy, and awareness to the next generation. It's Not What You Say (click to download) Subject: Language Arts & Communication Grade Level: Tailor to elementary or secondary (click to download) Subject: Literature & Creative Writing Grade Level: Secondary Pertinent and engaging information about teaching literacy effectively, as well as book lists, strategies for struggling students, and more. A rich collection of information for teachers and students. Be inspired by a wealth of innovative and deeply informative resources from multiple subject areas and grade levels, perfect to explore at home or in the classroom. First Book provides book lists, resources for parents, and more. A public resource that includes facts and statistics about countries all over the world. (children's picture book) Jon J. Muth. Scholastic Press, 2005 Addy, Michael, and Carl are three ordinary children with an extraordinary new neighbor. When a giant panda named Stillwater moves in next door, he brings with him a fresh and intriguing way to look at everyday life - sharing classic zen stories with his new friends. (children's picture book) Maurice Sendak. Harper & Row, 1963 When a child explores the world of his imagination, a jungle comes to life, and it's filled with monsters. (children's picture book) Dr. Seuss. Random House Books, 1971. Classic children's parable. A boy learns the story about the mighty trees and wonderful animals that once lived around his home and the Lorax, a creature who spoke for them. Now the trees and creatures are gone, but the boy is given a gift for the future. (children's poetry) Shel Silverstein. Harper Collins, 1974. Short, fun, irresistible poetry that's all about kids and imagination — from giants to boa constrictors to brothers for sale. Children will get a kick out of these imaginative rhymes. (early-middle) Roald Dahl. Jonathan Cape Publishing, 1983 Real witches exist, and their nefarious leader is unleashing a plot to rid the world of detestable children forever. Can a single boy and his witch-expert grandmother stop them? (middle) Madeline L'Engle. Farrar, Straus & Giroux, 1962. Evil is a presence in the universe, and with the help of three unusual ladies, Charles Wallace, Meg, and Calvin plunge headlong into the battle against it. Science mixes freely with emotion in this fantastic tale of one small family that can change the world. (middle-secondary) Cynthia Voigt. Harper Collins, 1981. When Dicey Tillerman and her younger siblings are abandoned by their mother, they must find a way to survive and stay together. They walk a long and perilous road in search of a place to call home and a family to call their own. (secondary) S.E. Hinton. Viking Press, 1967 The classic story of a boy who lives with his older brother in a city steeped in gang rivalries and prejudices. He fights impossible odds to overcome the darkness around him and become stronger and wiser for the struggle. (secondary) Cornelia Funke. Scholastic Chicken House, 2003 When Meggie and her father discover that the things that make a good story can also make reality terrifying. Together, they struggle to rid the world of what should have been a fictional evil. (secondary) Robert Cormier. Laurel-Leaf Books, 1986 T.S. Eliot asked, "Do I dare disturb the universe?" At Trinity, a catholic high school, a reign of terror structured by students in control and teachers who turn aside is upset by a single student who dares to act on his personal beliefs. (non-fiction) Mike Rose. Random House Books. Collier Macmillan, 1989 Inspiring, touching, and instructive vignettes about teaching literacy with greater understanding and compassion to America's underprivileged. (non-fiction) Rafe Esquith. Viking Adult, 2007 An eloquent collection of stories and advice from the field about teaching with passion and with compassion to get through to your students.
<urn:uuid:2c0e759a-356f-4de5-bc8b-b97cdf283c3d>
CC-MAIN-2015-11
http://theliteracysite.greatergood.com/clickToGive/lit/teacher-resources
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464193.61/warc/CC-MAIN-20150226074104-00206-ip-10-28-5-156.ec2.internal.warc.gz
en
0.933658
1,053
3.046875
3
- The scope of astronomy - The techniques of astronomy - Impact of astronomy - History of astronomy In the Latin West the level of scientific learning had sunk to a low level. None of the Greek works most important for ancient astronomy and cosmology—Aristotle’s On the Heavens and Ptolemy’s Almagest, Handy Tables, and Planetary Hypotheses—were available. The teaching of astronomy was based on a number of low-level Latin accounts. Book II of Pliny the Elder’s Naturalis historia (Natural History, 1st century ce) contained a summary of astronomical matters. In the 4th century Martianus Capella wrote an allegorical poem, De nuptiis Philologiae et Mercurii (The Marriage of Philology and Mercury). In the two introductory books, Philology, personified as a maiden, is wed to Mercury, patron god of learning. In the following seven books, each of the Liberal Arts, including Astronomy, personified as a handmaid to Philology, steps forward to give an account of her art. Martianus’s Marriage was widely admired in the early Middle Ages as a compendium of all useful learning. In the 12th and 13th centuries, two developments were key to the revival of astronomy in the Latin West. The translation movement rapidly made available key works of Greek astronomy that had long been out of reach. One of the most important translators was Gerard of Cremona. As his students later wrote of him, he had learned everything that was known to the Latins, but for love of the Almagest, which he had heard of but which was unavailable in Latin, he went to Spain and learned Arabic well enough to translate it. Thus, one could maintain that a major reason for the revival of learning in the West was one man’s desire to be able to read Ptolemy. Gerard translated from Arabic versions not only Ptolemy’s Almagest but also Aristotle’s On the Heavens, Euclid’s Elements, and about two dozen other works of astronomy and geometry. In a single generation most of the key works of ancient astronomy became available. The second important development was the foundation of the European universities, starting with those of Bologna, Paris, and Oxford. Because astronomy figured among the liberal arts, it had a place in the university core curriculum. Of course, the astronomy of the liberal arts curriculum was at a rudimentary level. The students might be taken though an introduction to the celestial sphere—for example, the De sphaera mundi (“On the Sphere of the World,” c. 1230) by Johannes de Sacrobosco, which might be followed by the anonymous Theorica planetarum (“Theories of the Planets”), a superficial introduction to eccentrics and epicycles. Nevertheless, in every university town there had to be someone charged with teaching astronomy. In the 1270s a new set of astronomical tables was compiled in Spain under the patronage of the Christian king Alfonso X of Léon and Castile. These were based on standard Ptolemaic astronomy, with some differences in the treatment of precession (now considered to occur at a variable speed). By 1320 the Alfonsine Tables had reached Paris, where they were reworked by several Parisian astronomers. From there they spread all over Latin Europe, and for more than two centuries they were the standard. Though “oracle bones” exist from the late 2nd millennium bce that mention observations of lunar and solar eclipses as well as the appearance of a new star (nova), astronomical reports begin to be fairly numerous only from about 200 bce. In China astronomy had an imperial function. The emperor was considered the Son of Heaven. Thus, the regulation of the calendar, as well as the success or failure of his astronomers to predict an eclipse, reflected either well or badly on him. Many different astronomical summaries were written in conjunction with the ascent of a new emperor. Usually these emphasized the lunisolar calendar, but later they also included tables for predicting the motions of the planets, as well as eclipses. Chinese predictive astronomy used repeating arithmetical cycles and was thus more like Babylonian astronomy than like Greek astronomy. Perhaps because the Chinese were less tied up with cosmological theories and “laws” of nature than the Greeks and their medieval European successors were, the Chinese astronomers were much more interested in singular events, such as comets, novae, meteor showers, solar eclipses, and sunspots (which the Chinese discovered before the Europeans), and they kept detailed records of them. European astronomy regained the level of the ancient Greeks only with the publication in 1496 of Epytoma in Almagestum Ptolemaei (“Epitome of Ptolemy’s Almagest”) begun by mathematician and astronomer Georg von Peuerbach and completed by his student Regiomontanus (the Latin name of Johannes Müller von Königsberg). Regiomontanus’s chapter-by-chapter commentary helped the next couple of generations learn their Ptolemy. He sometimes criticized Ptolemy—for example, pointing out that the twofold variation in the distance of the Moon implied by Ptolemy’s lunar theory greatly exceeded the variation in distance implied by the Moon’s variation in apparent size. Although this variation had been known in Arabic astronomy, this was its first mention in the Latin West.
<urn:uuid:845588f0-ccfe-40fa-a073-11b190fefb81>
CC-MAIN-2015-11
http://www.britannica.com/EBchecked/topic/40047/astronomy/314021/Medieval-Europe
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463165.18/warc/CC-MAIN-20150226074103-00097-ip-10-28-5-156.ec2.internal.warc.gz
en
0.962916
1,159
3.390625
3
The moral basis of Vegetarianism Navjivan Publishing House, Ahmedabad Excerpts from Chapter 1: Food Values Whilst it is true that man cannot live without air and water, the thing that nourishes the body is food. Hence the saying, food is life. Food can be divided in to three categories: vegetarian, flesh and mixed. Flesh foods include fowl and fish. Milk is an animal product and cannot by any means be included in a strictly vegetarian diet. In medical language it is classified as animal food. A layman considers milk as vegetarian food and eggs as a flesh food. It is not wholly true. Nowadays, sterile eggs which would never develop into a chick are also produced. So, milk and eggs come under the same category. Medical opinion is mostly in favour of a mixed diet even though some anatomical and physiological facts favour man as a vegetarian. His teeth, stomach, intestines etc. seem to prove that nature has meant man to be a vegetarian. Vegetarian diet includes grains, pulses, edible roots, tubers, leaves, fruits (both fresh and dried). Dry fruits include almonds, pistachio, walnut, cashew etc. Experience has taught me that in order to keep perfectly fit, vegetarian diet must include milk and milk products like curd, butter, ghee etc. I excluded milk from my diet for six years. In the year 1917, I was suffering from dysentery, became weaker, and was reduced to a skeleton. Yet, I stubbornly refused to take milk or buttermilk. A medical friend suggested me to take goat's milk as my vow not to take milk is constrained only to cow's and buffalo's milk. My wife supported him and I agreed. All animal milks have practically the same composition and goat's milk was produced immediately for me. It seemed to bring me the new life. I picked up rapidly and was soon able to leave the bed. In my opinion, there are definite drawbacks in taking milk or meat. In order to get meat we have to kill. And, we are certainly not entitled to any other milk except the mother's milk in our infancy. Over and above the moral drawback, there are others, purely from the point of view of health. Both milk and meat bring with them the defects of the animal from which they are derived. Domesticated cattle are hardly ever perfectly healthy. What applies to the milch cattle applies to a much greater extent to the animals slaughtered for meat. So long as some selfless scientist does not, as a result of patient research work, discover a vegetable substitute for milk and meat, man will go on taking meat and milk. Man requires food which can supply tissue building substances (proteins) to provide for growth and daily wear and tear of the body. The animal proteins obtained from milk or meat, being more easily digestive and absorbing, are much more valuable than vegetable proteins. Milk is superior to meat. The medicos tell us that in case where meat cannot be digested, milk is digested quite easily. For vegetarians, milk is the only source of animal proteins. The proteins in raw eggs are considered to be the most easily digestible of all proteins. Contrary to the popular belief, skimmed milk is a very valuable article to diet. There are times when it proves even more useful than whole milk. Skimming while it practically removes the fat, does not affect the proteins required for tissue building and tissue repairing. Cereals come in the second place in my list of nourishment. Wheat, rice, juwar, bajiri etc. are used as the staple diet. Different provinces in India use different variety of cereals. All these varieties supply starch mainly, and it is better not to mix more than one variety of cereals. Wheat is considered as the king of cereals as many parts of the world produce it in large quantities. The cereals should be properly cleansed, ground, and the resulting flour used as it is. Sieving of the flour should be avoided. It is likely to remove the bhushi or the pericarp which is a rich source of salts and vitamins. The pericarps also supply roughage which helps the action of the bowels. Rice grain being very delicate has an outer covering or epicarp. This is not edible. In order to remove this inedible portion, rice has to be pounded slightly. But machine pounding not only removes the outer skin, but polishes the rice by removing the pericarp. Polishing helps preservation and hence it is done widely. The pericarp of rice and wheat can be cooked and made in to cakes or chapatis. Most of us eat chapatis without adequate mastication. Mastication is the important step in the process of digestion, especially of starch. Mastication ensures a thorough mixing of food with saliva in the mouth that facilitates digestion. After the starch supplying cereals, come the protein supplying pulses. Pulses like lentils, beans form the essential constituent of the diet. Those who do hard work and those who cannot afford milk cannot do without pulses. I can say without any hesitation whatsoever that those who follow sedentary occupations as for instance, clerks, businessmen, teachers, lawyers, doctors and those who afford to use milk, do not require pulses. Pulses are generally considered to be difficult to digest, and are eaten in a much smaller quantity than cereals. Out of all the pulses, peas, haricot beans and grams are the most difficult to digest whereas the moong, lentils are the least difficult to digest. Vegetables and Fruits: Vegetables and Fruits should come in the third on our list. They are generally considered to be delicacies meant for the city people. One should expect them to be cheap and easily available in India. But it is not so. In the village, fresh vegetables are a rarity and in most places fruits are not available. This shortage of greens and fruits is a slur on the administration of India. Among fresh vegetables, a fair amount of leafy vegetables should be taken everyday. Potatoes, sweet potatoes, suran etc. are starch supplying vegetables and must be kept in the same category as that of cereals. Certain vegetables such as cucumber, tomatoes, mustard and cress need not be cooked. They must be eaten in raw after being washed properly. Our daily diet should include the fruits of the season e.g. mangoes, jambu, guava, grapes, and papayas - The best time for taking fruits is early in the morning. A breakfast of fruits and milk should give full satisfaction. Milk and bananas make a perfect meal since bananas are rich in starch. Ghee and Oil A certain amount of fat is also necessary. This can be had in the form of ghee or oil. It is difficult to digest and is not so nourishing as pure ghee. An ounce and a half of ghee per head per day should be considered ample to supply the needs of the body. Those who cannot afford it should take enough oil to supply the need for fat. Sweet oil, groundnut oil, and coconut oil should be given preference. If available, it is better to use hand-pressed oil. It is far better to do without ghee or oil altogether than to eat rancid oil and adulterated ghee. As in the case of fats, a certain amount of sugar is also necessary. There is no harm in taking one to one and half ounces of sugar, white or brown in a day. City folks eat lots of sweets and other delicacies in a country where the millions do not even get an ordinary full meal. This is equivalent to robbery only. And, this is true with the ghee and oil. It is purely an extravagance to use ghee in making puris and laddus. Those who are not used to such food cannot eat these things at all. For instance, Englishmen on their first coming into our country cannot eat our sweets and fried foods. Some who ate them had fallen ill. A hungry man will eat a dry piece of bread with the greatest relish, whereas one who is not hungry will refuse the best of sweetmeats. How often and How much to eat? Food should be taken as a matter of duty - even as a medicine - to sustain the body, never for the satisfaction of the palate. Because of our own wrong habits and artificial ways of living, very few people know what their bodily system requires. The habits and the ways of living of the parents influence the children to certain extent. Every child gets a wrong training in taking food from its infancy from its mother's milk to whatever she herself may be eating. Habits once formed are difficult to shed. But, one must realize that he is the bodyguard of his body. A list of various foods required by an ordinary man is given below: Cow's milk - 2 Lbs. (wheat,rice, bajri, in all) - 6 Oz Vegetables leafy - 3 Oz. Vegetables others - 5 Oz. Vegetables raw - 1 Oz. Ghee or Butter - 1.5 Oz. Gur or white sugar - 1.5 Oz. Salt - as per one's taste Fresh Fruits - 1 or 2 Lime juice in hot or cold water - 2 Lbs Many people take two meals a day. The general rule is to take three meals: breakfast early in the morning and before going out to work, luncheon at midday and supper in the evening or later. There is no necessity to have more than three meals. Some people keep on nibbling from time to time which is very harmful. The digestive apparatus requires rest.
<urn:uuid:0f794fc6-5384-4f68-8fe8-d68ff2c91ece>
CC-MAIN-2015-11
http://www.gandhitopia.org/profiles/blogs/chapter-1-food-values
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463028.70/warc/CC-MAIN-20150226074103-00071-ip-10-28-5-156.ec2.internal.warc.gz
en
0.965892
2,030
2.859375
3
There are a number of factors that can affect how your body handles cholesterol, not the least of which is your genetics. However, there are some things you can do to help raise your HDL (good cholesterol) levels and keep those LDL (bad cholesterol) and total cholesterol levels at a lower number. Having good cholesterol can lead you to a healthier, longer life. Part 1 of 2: Lifestyle Habits 1Maintain a healthy weight. If your BMI (body mass index) is higher than 25 and especially if it is over 30, you probably need to trim down. This one step will help all of your numbers to improve. - You don't need to lose a ton of weight to see a difference in your HDL levels. Even just a few pounds could do the trick. Your HDL levels could increase by 1 mg/dL (0.03 mmol/L) with just a 6-lb (2.7 kg) weight loss. 2Exercise aerobically at least 3 times a week for 30 minutes. 5 times a week is even better. Be sure to check with your doctor before beginning any aerobic program. In addition to improving your numbers, aerobic exercise will improve your mood as your brain chemistry changes for the better. - Examples of brisk, aerobic exercise include walking, running, cycling, swimming, playing basketball and raking leaves — anything that increases your heart rate. You can also break up your daily activity into three 10-minute segments if you're having difficulty finding time to exercise. 3Stop smoking. Most people already know that smoking is bad for your health, but it also may decrease your HDL levels and increase your LDL levels, causing you to be at greater risk for coronary artery disease and heart attack. - By just kicking the habit, your HDL can increase by up to 10 percent. Talk with your doctor about the best ways to quit and be open to trying several strategies at once. Part 2 of 2: Diet 1Drink moderately. 1-2 drinks of red wine per day will help raise HDL levels significantly. Before you drink, however, make sure you don't have a health condition, such as cirrhosis. Drinking could then be harmful to you. Also, if you're a tea teetotaler, this is not a good reason to start drinking; there are many problems associated with excessive alcohol consumption. - For women of all ages and men older than 65, one drink a day is all that will score you benefits. Young men, however, can get away with 2. But if you don't drink, don't start. 2Reduce saturated fats in your diet. They're the kind that's solid at room temperature. Instead, choose more monounsaturated fats, such as those found in olive and canola oil, nuts and avocado. Omega-3 fats are good, too. These can be found in sardines, salmon, omega-3 eggs, flax seed, chia seed and walnuts. - Don't go completely no-fat. A heart-healthy diet should actually have about 30% of its intake of calories from fat; however, the saturated kind should only account for 7% or less. 3Limit or eliminate trans-fats in your diet. Trans fats are found in many processed foods including cookies, crackers, fried foods and margarine and other vegetable spreads. Check the label for "hydrogenated" fats before buying packaged foods. - In general, processed foods should be a no-go. Foods that say they're fat-free usually have a huge dose of chemicals, including artificial coloring and preservatives. These additives are known to be carcinogens. They are also usually loaded with high-glycemic carbs. Be sure to read the label before you go about choosing anything packaged. 4Choose colorful fruits and vegetables. These contain phytochemicals, which seem to have a protective effect against heart disease. There is some evidence that drinking cranberry juice will help raise your HDL levels, and this is most likely due to the phytochemicals in this tart, red berry. - Fruits and veggies are also a great source of fiber and have a low "glycemic load." That's code for not spiking your blood sugar levels. Both benefits can also be found in legumes, whole grains, oats, and seeds. 5Reduce consumption of added sugars. A recent study showed that people who got at least 25 percent of their daily calories from any type of sweetener had more than triple the normal risk of having low HDL levels than those who got less than five percent of their calories from sweeteners. - Change out sodas for orange juice. If you drink three cups of OJ a day, your levels could increase around 20% in about a month, a small British study says. It's a lot of calories though, so keep that in mind. You could go directly to the source (the orange), but this is a good alternative. We could really use your help! - Take time to educate yourself about fats, added sugars and food labels. - Know what the numbers mean. Talk to your doctor about a healthy target for you. - Consult with your doctor before starting an exercise regimen. Sources and Citations - ↑ 1.01.11.21.3http://www.mayoclinic.com/health/hdl-cholesterol/CL00030/NSECTIONGROUP=2 - ↑ Hansen AS, Marckmann P, Dragsted LO, Finné Nielsen IL, Nielsen SE, Grønbaek M. Effect of red wine and red grape extract on blood lipids, haemostatic factors, and other risk factors for cardiovascular disease. Eur J Clin Nutr. 2005 Mar;59(3):449-55. - ↑ http://www.mercksource.com/pp/us/cns/cns_krames_template.jspzQzpgzEzzSzppdocszSzuszSzcnszSzcontentzSzkrameszSz1292_01zPzhtm. - ↑ http://www.metabolic-syndrome-handbook.com/content/why-processed-food-is-bad - ↑ 5.05.1http://www.webmd.com/heart/how-to-boost-your-good-cholesterol?page=2 - Healthy Eating Support Original source. Used with permission. In other languages: Português: Como Aumentar os Níveis de Colesterol HDL, Español: Cómo subir los niveles de colesterol HDL, Italiano: Come Alzare i Livelli di Colesterolo HDL, Deutsch: Den HDL Cholesterin Spiegel erhöhen, Русский: поднять уровень холестерина ЛПВП, Français: Comment augmenter le taux de votre HDL cholestérol, 中文: 提高高密度脂蛋白(HDL)胆固醇水平, Bahasa Indonesia: Menaikkan Kadar Kolesterol HDL Thanks to all authors for creating a page that has been read 58,086 times.
<urn:uuid:f249be47-0da1-456c-ba6c-225f15c419fc>
CC-MAIN-2015-11
http://www.wikihow.com/Raise-HDL-Cholesterol-Levels
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461359.90/warc/CC-MAIN-20150226074101-00178-ip-10-28-5-156.ec2.internal.warc.gz
en
0.918012
1,566
2.734375
3
OXON HILL, Md. — In a large room in the Gaylord National Conference Center at the end of March, an epic battle took place. Teams of middle and high school students sat at computer banks around the room, speaking in whispers and staring intently at their screens. Once in a while a teen sprang into action, typing furiously. It may not be much of a spectator sport, but those students were fighting a war. They were fighting off hackers, who in this case were a team of experts trying to break in to the students’ secure computer network. The students were competing in the national finals for the Air Force Association’s CyberPatriot competition. Out of over 1,500 teams across the country, these 28 school groups made it to the final round. Officially known as the National Youth Cyber Defense Competition, the contest hopes to inspire students to enter science, technology, engineering and math. “We wanted to get kids excited about STEM,” Bernie Skoch says. He’s a leader of the CyberPatriot program and a Brigadier General in the Air Force. When the Air Force Association was trying to come up with ways to get students interested in STEM fields, he explains, “we thought about contests with rockets and model airplanes. But then, we realized we could attract kids with cybersecurity.” The cybersecurity competition teaches students how to keep computer networks secure from those on the outside, no previous experience required. “It’s cool stuff,” Skoch says. “There’s not a day you turn on the news that you see someone else got hacked.” Over 3,000 companies in the United States, including big names like Target, had their computers systems hacked in 2013, costing them and their customers up to $100 billion. Most people don’t realize that every day, their computers are in danger. “There are lots of unsecure things,” says Ian Hurd, a 16-year-old at El Segundo High School in El Segundo, Calif., and a member of the finalist team Net Eagles. “Maybe all the passwords are the same, there are people who are using the computer who are not supposed to be there or programs running that shouldn’t be.” Hacking into computer systems might seem like the cool thing to do. But the students at CyberPatriot know they are training to be the good guys. “We’re here to stop people from getting hacked, and to stop people from doing bad things,” says Henry Smith, 16, a finalist from El Segundo. “Computers are huge in our lives now so understanding how to keep them safe is important to how we live.” The students also know that defense is more of a challenge. “These kids know it takes more work to be a defender than to be a bad actor,” says Diane Miller, the program director of CyberPatriot at the competition’s major sponsor, The Northrop Grumman Foundation. “You are always on the watch, you can’t let anything through.” Any high school group, public, private or homeschooled, can form a team and sign up for the program online. The website gives teachers access to a school years’ worth of materials that will teach them everything they need to know about cybersecurity, from how to write code in different systems to how a virus works. As they learn, teams can compete in their region in virtual competitions, fixing the security gaps in a network for points. The most successful teams advance to the finals, where they compete face to face against professionals. Each team has a teacher as a coach. William Beckman points out that the students are usually self-starters. “They got themselves into it,” says Beckman, information technologist and coach of a middle school team from the Marine Military Academy in Harlingen, Texas. “My job is just to teach them how to secure computer systems and inspire an interest in the cyber security field.” But the teachers, just like the students, don’t have to be security experts. Instead, CyberPatriot links teams up with mentors, adults who work in cybersecurity-related fields near their schools. Jennifer Cho, a high school engineering and math teacher at El Segundo, pulled in Ronald Chu, the father of one of the team members and an information technology specialist with the County of Los Angeles, to act as a mentor for their team. “I teach them the ‘how-to,’” Chu says, “it’s more coaching than teaching, the details of how to fix things or set up a secure network.” Maxime Dowla, 14, said that he learned more than he ever thought he could. “All I knew about computers before what that I could play games on them,” says the middle school finalist from the Marine Military Academy team Leathernecks. “But then I joined CyberPatriot and I liked it, it’s more interesting and will pay off in the long run.” It could also pay off right now. The winners of the competition take home thousands of dollars in scholarships. Some of them will even get internships in cybersecurity. This year’s trophies went to North Hollywood High School in North Hollywood, Calif., and Clearfield High School in Clearfield, Utah. CyberPatriot also held its first middle school division competition, where the Beach Cities Cadet Squadron from San Pedro, Calif., took home the trophy. For teens who are really excited about computing, registration is already open for next year’s competition. Follow Eureka! Lab on Twitter: @eureka_labs Code (in computing) A set of instructions for running a computer. Computer software is composed of code. cyber Relating to computers or computer networks. defense Military and other measures taken to protect a country against attack. hack To break into a lock or a locked system. hacker A person who uses computers without approval to view, alter or steal data belonging to another. information security Actions aimed at guarding information and the computer systems that manage that information from illegal access, use, disclosure, disruption, modification or destruction. mentor An individual who lends his or her experience to advise someone starting out in a field. In science, teachers or researchers often mentor students, helping them refine their research questions. network (in computing) Two or more computers linked as a system, usually through use of a wireless router. programming The process of writing computer code, which provides exact instructions on how a computer is to operate, or process, data. virus (in computing) Small software programs that can infiltrate (infect) and damage computers or computer systems. E. Niler. “Cyber Warriors.” Science News for Students. Nov. 14, 2013. C. Gaidos. “Cool Jobs: The science of secrets.” Science News for Students. Oct. 31, 2012. Visit the home page for CyberPatriot, the premier national high school cyber defense competition. A listing of international cybersecurity contests, from the Department of Homeland Security
<urn:uuid:c157c8fa-0377-427a-b18b-ddac399c9629>
CC-MAIN-2015-11
https://student.societyforscience.org/blog/eureka-lab/students-compete-stop-cyber-crime
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463165.18/warc/CC-MAIN-20150226074103-00098-ip-10-28-5-156.ec2.internal.warc.gz
en
0.959611
1,514
2.59375
3
BI projects benefit from aggregate and rank window functions SQL Server 2005 introduces the notion of a window, which is a user-specified selection of rows that divides a result set into partitions.You can use these partitions to perform certain calculations in relation to the current row. The current row might be a summary row or contain row-ranking values. For this reason, there are two groups of functions that you can apply to windows: aggregate window functions and ranking window functions.You can use these new window functions in business intelligence (BI) projects.To demonstrate how to use them, I created a table called Employee, which Table 1 shows.You can download the T-SQL code that creates this table from the SQL Server Magazine Web site. Aggregate Window Functions You use the OVER clause to specify all window functions.This clause groups the result set of a query in partitions so that each row from a partition displays separately. For example, the OVER clause in Listing 1 specifies that the corresponding aggregate function (SUM) is a window function. In this case, the result set is partitioned into four groups by the department ID (dept_id). After that, the sum of salaries is calculated for each partition. Table 2 shows the results. Note that the main difference between using the OVER clause and GROUP BY clause is that the OVER clause displays each row of a partition separately, whereas the GROUP BY clause displays only one row for each group. You can use aggregate window functions for more complex calculations. For example, you can use two columns in a table to build separate partitions, as the query in Listing 2 shows.This query has one partition for the values in the job column and another one for the values in the dept_id column. The former calculates the sum of salaries in relation to the different types of jobs.The latter calculates the average salary by department. Table 3 shows the results of the query in Listing 2. Aggregate window functions can be especially useful when you use them in a subquery and subsequently apply the subquery in a comparison. For example, suppose you want to find the employee with the highest salary in each department. Listing 3 shows this query, and Table 4 shows the results. Using the MAX aggregate window function, the subquery in the FROM clause determines the maximum salary value (max_sal_dept) for each department. The query then compares each department member's salary against this value. As this example shows, the OVER clause lets you use the summary row at the same time as the detailed rows in each partition. The query in Listing 4 finds the employee with the highest salary in each job type as well as the highest salary in each department.To do so, the query uses two columns (job and dept_id) from the employee table to build two partitions.The query uses the same aggregate window function but applies it separately to the two partitions.Two applications are necessary because the highest salary in each job has nothing in common with the highest salary in each department. Table 5 shows the results of the query in Listing 4. Ranking Window Functions SQL Server 2005's new ranking window functions return a ranking value for each row in a partition. T-SQL supports three such functions: RANK, DENSE_RANK, and ROW_NUMBER. You can apply the RANK function to partitions to display the rank of the row in the result set. For example, the query in Listing 5 uses the RANK function to specify the rank of the three highest-paid employees in each department. As you can see by comparing the SELECT statements in Listing 4 and Listing 5, the only difference between the aggregate window functions and the RANK function is that the RANK function determines the ranking of rows within a window partition. The RANK function uses logical aggregation—that is, when two or more rows in a result set have the same value in the ordering column, they'll have the same rank.The subsequent row will have a rank that is one plus the number of ranks that precede the row. For example, in Table 6, there are two employees (Austin and Peters) in department 20 with the same salary. Therefore, these two employees have the same rank (1). The rank of the other employee (Kimes) from that department is 3. Because of logical aggregation, the RANK function displays numbering gaps when two or more rows have the same rank. If you don't want to display row rankings with gaps, you have to use the DENSE_RANK function. The query in Listing 6 shows how to use this function, and Table 7 shows the results.The difference between the DENSE_RANK and RANK functions can be seen in the row that displays the data for the employee named Kimes. The dept_dense column in Table 7 ranks Kimes as 2 (as opposed to 3 in the dept_rank column in Table 6), so the gap has been eliminated. The query in Listing 6 demonstrates how to use not only the DENSE_RANK function but also the ROW_NUMBER function.The ROW_NUMBER function returns the sequential number of a row within a result set, starting at 1 for the first row. As callout A shows, the ROW_NUMBER function can use an OVER clause that doesn't include the PARTITION option. In that case, the entire table is treated as one partition. Note that the value of 9 in the dept_row# column is missing. That row contains information for the employee named May (employee_id 1119 in Table 1), who works in department 30. This employee's information isn't included because it doesn't meet the condition in the WHERE clause of the SELECT statement (i.e., the employee isn't one of the three highest paid employees in that department). A Standardized Solution The introduction of the aggregate and ranking window functions in SQL Server 2005 isn't an afterthought. Microsoft implemented them to adhere to the SQL:1999 standard. IBM DB2 and Oracle databases also implement these functions, which means you can use them with any of these three database systems.
<urn:uuid:7cf2aba5-9907-4965-b572-83b3d6ba2264>
CC-MAIN-2015-11
http://sqlmag.com/t-sql/open-windows-opportunity
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462141.68/warc/CC-MAIN-20150226074102-00288-ip-10-28-5-156.ec2.internal.warc.gz
en
0.901453
1,264
2.5625
3
How Normal Is Normal? Using a Q-Q Plot Q: How can I determine if my data comes from a normal distribution? A. A quantile-quantile, or Q-Q, plot can be used to examine if a data set is approximately normal. A lion’s share of statistics interpretation and associated decision making are based on the assumption that the universe from which the limited data set is obtained, or the statistics calculated from the data set, can be adequately represented (modeled) by the Gaussian, which is more commonly known as the normal distribution. There is a plethora of techniques that can be used to validate the reasonableness of this normal assumption. Most techniques will require a commercial statistical software package to carry out the necessary computations and plots. This article describes a graphic technique that can be used to visually determine if the data are approximately normally distributed. The technical name for this technique is the Q-Q plot. The Q-Q plot is a graphical method for studying how well the underlying distribution from which the dataset is collected can be approximated by the normal model. It is equivalent to the classical normal probability plot but, unlike the latter, no specialized scale or probability paper is required. This plot can be easily implemented in a spreadsheet tool such as Excel using the NORMSINV function. The data can be deemed to be “adequately” normal if most of the points in the plot lie roughly along a straight line. In addition to judgment of data normality, other salient features associated with the Q-Q plots are: - The y-axis is in the original units of the data, - Potential outlier(s) can be visually identified as the point(s) that deviate significantly from the approximate straight line along which most of the data lie, - The y-intercept of the approximate straight line is the median of the data set, and - The slope of the approximate straight line is an indication of the magnitude of the data set standard deviation, where a steep slope represents a large standard deviation and a shallow slope represents a small standard deviation. A simple description of how to construct a Q-Q plot is outlined below. The Q-Q plot procedure is as follows: 1. Order the data from smallest to largest (n = total number of observations). 2. Create an index i next to the ordered data where i will take on values from 1 through n, with the lowest value assigned i = 1 and the highest assigned i = n. 3. Calculate fi = (i - 0.5)/n for each observation. This is a rank plotting position for the Q-Q plot. 4. Obtain from the cumulative distribution version of a standard normal distribution table (μ = 0, σ = 1) the value of zi for each fi. An easier approach is to use the Excel spreadsheet function NORMSINV function to compute the zi values as shown in Table 1. Pair it to the observation with index i for plotting later. Table 1 — Data for Q-Q Plot |Original Data||Ordered Data||Index i||fi=(i-0.5)/n||zi=NORMSIN(fi)| 5. Plot each observation value on the y-axis against its zi value obtained in step 4 on the x-axis using ordinary linear graph paper. This creates the Q-Q plot (see Figure 1). |Figure 1 - Q-Q Plot of Ordered Data* versus Zi**| *Ordered Data is second column from left in Table 1. **Zi is fifth (last) column from left in Table 1 The next step is to visually examine the plot for approximate linearity. If the Q-Q plot pattern is linear, or nearly so, the data distribution is well approximated by the normal model. Significant deviation from linearity should serve as a signal for potential failure of the normality assumption. Interested readers are referred to ASTM D6299, Practice for Applying Statistical Quality Assurance and Control Charting Techniques to Evaluate Analytical Measurement System Performance, for a detailed description of the Q-Q plot as well as how to calculate an associated A-D (Anderson-Darling) statistic to assess data normality. Alex T.C. Lau, TCL Consulting, Whitby, Ontario, Canada, is chairman of Subcommittees D02.94 on Quality Assurance and Statistics and D02.01.0B on Precision,, which are part of ASTM Committee D02 on Petroleum Products and Lubricants. An ASTM International fellow, Lau is also a member of Committees E11 on Quality and Statistics, E36 on Accreditation and Certification, and F08 on Sports Equipment and Facilities. Dean V. Neubauer, Corning Inc., Corning, N.Y., is an ASTM International fellow, chairman of E11.90.03 on Publications and coordinator of the DataPoints column; he is immediate past chairman of Committee E11 on Quality and Statistics. Go to other DataPoints articles.
<urn:uuid:0e05f6af-b64c-4672-9439-32a2c734c693>
CC-MAIN-2015-11
http://www.astm.org/sn/data-points/how-normal-is-normal-mj14.html?gateway=Standards%20Development%20Tips
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462141.68/warc/CC-MAIN-20150226074102-00289-ip-10-28-5-156.ec2.internal.warc.gz
en
0.875159
1,049
3.8125
4
Purchased farm inputs have brought new technology and greater productivity to farming. But relying more on purchased inputs could mean greater financial risks for farmers, according to Forrest Stegelin, University of Georgia agricultural economist. Many purchased inputs — such as minimum-tillage, genomics and plant breeding and herbicide-resistant varieties — have introduced new technology and made farming more efficient, he says. “But, relying more on purchased inputs means greater financial risks to farmers because input prices have advanced more than output prices,” states Stegelin in the 2004 Georgia Farm Outlook and Planning Guide. With 2004 being an election year, politics may influence the pricing and availability of purchased inputs, as well as production decisions for 2005 and beyond.” A typical discussion of farming inputs focuses primarily on those things that come with written instructions — machinery and equipment, seed, feed, fertilizer and chemicals. But those items without written instructions — management, labor and capital — are equally important, and can mean the difference between success and failure, he says. “Errors in decision making and usage of factors such as management, labor and capital can truly aggravate the success of a farming business,” says Stegelin. Many factors, he adds, enter into a farmer's management decisions on production options and their specific farming system, including: Knowledge base, personal preferences and management skills. The amount of a farmer's time available in a year. Physical features of the land base — amount of land, soil characteristics, layout and topography. Location factors — length of growing season, weather, logistics. Environmental pressures — soil loss, nutrient loss, water and air quality, threat of regulation. Availability of technology and technical support. Peer or group pressure, including landowner preferences. Economic factors — market opportunities, equity, financing availability, expected net returns. Prices of purchased agricultural inputs always have shown steady increases, says Stegelin, usually at an annual average rate of the cost-of-living increases. “Of course, some items have recorded large spikes, such as energy and petroleum-based products. But rarely are these due to agricultural demand, whereby price rations supply,” he days. In the past decade, many of the price increases for agricultural inputs were the result of the massive number of mergers, acquisitions, joint ventures, strategic alliances or collaborations and divestitures that occurred in several of the input industries, says the economist. “For instance, structural changes in the seed industry alone numbered more than 100, as companies reorganized and realigned their brand names, trademarks and product copyrights. As a result, industry consolidation — resulting in highly concentrated agricultural input markets — has occurred. Farmers, as purchasers of these inputs, have witnessed an erosion of competition, ‘inefficient’ markets, and higher prices paid.” Industry leaders, says Stegelin, contend that the technological leaders with successful research and development projects — especially in bioengineering and biotechnology — now can offer new or improved products that enhance the farmer's own productivity and efficiency. “An advantage gained through successful research and development can be maintained as long as a technological leader can stay ahead of the competition, sometimes with protection from intellectual property rights such as patents and plant variety protection certificates. “In some cases, the economic drawbacks of concentrated, non-competitive markets are compensated by the long-term productivity growth associated with technological change.” Consequently, he adds, the industry consolidation features the emergence of “life science” conglomerates — large companies able to apply investments in research and development to both agricultural and pharmaceutical applications. “However, inevitable subsequent divestiture calls the long-term viability of these conglomerates into question,” he says. Purchased farmer inputs account for nearly three-fourths of total expenditures, says Stegelin, with non-purchased agricultural inputs representing the remaining value of costs. “The shares of pesticides, seed, fertilizer, energy and credit in the total value of inputs rose over the past decade, while machinery and equipment's share has stabilized.” Total fertilizer use has been steady in the United States at about 50 million tons annually, says Stegelin. Application rates per acre now are much higher than 20 years ago, but below the record highs associated with earlier farm bills. “Less favorable fertilizer-crop price ratios have been the scapegoat,” he says. “The United States is a net importer of fertilizers for agriculture except for phosphate, as foreign producers have taken advantage of their lower-cost supplies of natural gas, a nitrogen feedstock. No price shocks are foreseen for the upcoming planting season.” Although some in the industry view the growth of the herbicide-resistant seed varieties occurring at the expense of the chemical input companies, a very strong demand exists for pesticides by farmers, notes Stegelin. Federal regulation, patent protection, and new pesticide technology were major forces influencing pesticide demand and supply over the past 20 years, he continues. “Granted, the share of major crop acreage treated with insecticides and herbicides has declined as a result of new seed varieties, farmers still find these chemicals to be cost-effective substitutes for some labor and machinery inputs.” Shifts within the industry occur annually, he says, as pesticides come on or off patent or are canceled by the FDA and EPA. The resulting substitutions of one pesticide for another can lead to localized price hikes, particularly if an affected crop has a large production acreage, he adds. While the food and fiber sector accounts for 10 to 15 percent of all U.S. energy consumption, it has very little influence on energy prices, says Stegelin. “Farm production uses less than 5 percent of the U.S. energy supply. Price shocks have occurred during the past few winters for natural gas — some shocks resulted from deregulation while others resulted from supply constraints. “Poultry and egg, greenhouse production, cotton ginning, grain storage and other enterprises that require heating are most vulnerable to seasonal price increases anticipated during the winter months.” Major changes, says Stegelin, have occurred in the kinds of livestock feeds produced as well as in the feed marketing industry, with vertical integration leaning towards raising livestock. Feed firms, he says, continually respond to demand for more supplements, super concentrates, pre-mixes, pelletized feeds and exotic animal rations. “Feed output is expanding into the Southeast and Pacific states, while companies are improving the nutritional efficiency of their feeds and expanding on-farm animal feeding. With feed grain harvest complete, animal feed manufacturers see no supply shortages of either bagged or bulk feeds for poultry, swine or beef producers in Georgia. Prices will remain nearly constant through the winter and spring of 2004.” A few animal health pharmaceutical firms have ventured into the manufactured feeds business, notes Stegelin. “Many of the feeds - especially for pets — include as ingredients many of the animal health additives that otherwise would be administered separately to the animal. Much consolidation of the animal pharmaceutical industry has occurred in the past few years, due primarily to the high cost of research and development and the product liability concerns. Consequently, animal health products have seen a steep rise in expenditures, while veterinarians have been faced with absorbing the price hikes among their total service charges.” Farm machinery production, says the economist, has risen as an index value - calculated by the Equipment Manufacturers Institute — although total per-unit sales actually have declined during the past 10 years. Manufacturers of farm machinery have seen inventories of unsold equipment swell alarmingly, revenues cut in half, debt rise sharply with respect to assets and use of plant capacity fall to about 40 to 50 percent, he says. “A smaller U.S. farm machinery industry is evolving, dominated by three large firms, and they're out-sourcing parts and components from foreign suppliers. Dealerships are becoming larger with multiple brands, and they're offering more credit, services and products to farmers. “Year-to-year sales figures show that 2003 will be a year worth remembering, as numbers or units sold increased in virtually every category of new farm machinery and equipment. Inventory awaits at reasonable prices, even as farmers diversify their enterprises and production activities.”
<urn:uuid:fd27deb9-2c9a-4cce-93cf-d929783af307>
CC-MAIN-2015-11
http://southeastfarmpress.com/print/purchased-inputs-raise-risk-levels
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462555.21/warc/CC-MAIN-20150226074102-00028-ip-10-28-5-156.ec2.internal.warc.gz
en
0.946679
1,737
3.03125
3
User Interfaces for Headless Embedded Systems Modern embedded systems with operating systems often have TFT displays with touch screens. There is a class of devices though, where this type of user interface is not possible: data loggers or control devices, that are only seldom used usually do not economically warrant such a user interface. Nevertheless there is also demand for modern user interfaces in these areas. Since almost all system-on-chip processors today offer an integrated Ethernet controller, another mode of interaction presents itself: the web interface. All necessary technologies are provided by the Linux operating system and thus also for cost-effective processors such as the 200 MHz ARM926 to 1 GHz Cortex-A8 class. The advantage of web technologies: the back end application is run by the low-performance ARM, while the possibly much more expensive GUI technology runs in a web browser on a much faster PC. This way also fancy GUI features can be realised without having to employ costly PC-style hardware within the embedded devices. The Web 2.0 Principle |Conventional Web 1.0 Application||AJAX Web 2.0 Application| In Web 1.0 applications, updates (e. g. of measuring data) require a full reload of the respective web page and all new data have to be provided and preprocessed by the embedded system exactly when the new data are requested by the client. In Web 2.0 applications, however, application and GUI are run independently and only exchange small amounts of data asynchronously. Thus, when updating measuring data, only the real data are submitted, not the visualisation elements based upon them. This will take considerable load off the embedded system. The Linux Software Stack Thanks to Linux, embedded Web 2.0 applications can draw on the full range of Open Source Technologies. When installing "Linux" on a PC, this usually means a complete distribution, which consists of a set of software components, which provide a platform for the actual software development. The different layers abstract the system on different levels. The following section presents the individual components of the software stack: OS Layer: the Linux Kernel's first and foremost task is abstracting the hardware. With this it makes no odds to the application programmer whether he works on an ARM or an x86 processor; all peripherals are exclusively accessed by means of drivers. Furthermore the OS layer includes the glibc library, which provides APIs for the POSIX standard. Given the Kernel and glibc it is already possible to develop simple applications. System Layer: for modern applications there is a layer of system services which encapsulate recurrent functionalities. This includes a parameter management service (dconf), the infrastructure library glib as well as the message bus D-Bus. Middleware Layer: on top of the system services a number of additional services provide different high-level functionalities: - Network Services: management of wired/wireless network ports and static or dynamic allocation of IP addresses. - Control Services: automation devices can be integrated by means of an actor based process data service. This includes real time as well as non-real time process data and field buses. - Internet Services: devices with a local display can be provided with an integrated web browser. - Visual Services: the framework for native GUIs is Qt. In web applications the JSON-D-Bus-Bridge is used. - Media Services: if multimedia functionalities are needed these can be realised based on GStreamer (e.g. for cameras, codecs, audio, etc.). The Linux software stack is the foundation for the development of applications, whereas, depending on requirements and resources not all components of the stack have to be installed on the embedded system. Applications without a native GUI can for instance omit QT's GUI libraries, if no multimedia functionalities are required, GStreamer is not installed and so on. Embedded Web 2.0 Application Development Pengutronix develops embedded Web 2.0 applications using components from the Linux software stack. These applications usually consist of one or several back ends in which the application logic is encoded. On Linux these back ends are run as daemons, which means as background processes. These back ends offer their services via the D-Bus message bus, which facilitates functional tests. On the browser's end the GUI components are realised using a modern web tool kit. Back end and front end communicate by means of an RPC middleware. Connection to Process Data Additionally to the control and logic functionalities many industrial application require access to process data. Pengutronix realises this by means of an actor-based process data model. This facilitates modular access to a number of different I/Os. In doing so, it makes no difference whether "real" field bus data are concerned, local IOs from ADCs, which are connected to the CPU, GPIOs, or peripheral chips on an SPI or I2C bus. |Presentation Project Idea||Customer presents a rough overview of the project, Pengutronix presents possible solutions. If there is a requirement specification, preparation of a budgetary offer. If not, support in preparation of a requirement specification (Consulting).| |Requirements Workshop||Customer presents project, discussion of all functional requirements, presentation of possible hard- and software solutions. Preparation of written minutes.| |Requirement Specification and Functional Specification||Customer prepares requirement specification, Pengutronix prepares functional specification. Discussion of possible solutions and requirements.| |Estimation and Order||Pengutronix prepares estimation as foundation for offer. Customer orders project.| |Preparation Platform||Development of a BSP (boot loader, kernel, drivers, libraries and services) according to specification by Pengutronix Kernel/Platform Team.| |Iteration 1||Realisation of work packages by Pengutronix Application Team, documentation, delivery of results (via RCS), test and initial operation, if necessary adjustment of specifications.| |Acceptance||Joint acceptance of a release version.| |Outlook||Discussion of further possible functionalities and development steps.| Standard Software and "Embedded has different requirements" - this assumption has often been claimed in earlier years and led to the development of specialised software components for embedded projects. The line of reasoning for this often went along arguments of low computing resources. Contrary to this are requirements of quality: standard components which are also used on servers and desktop computers usually have a much better test coverage. This is why Pengutronix relies as much as possible on components, which are also used in "big" desktop and server applications. This approach is additionally supported by recent developments on the chip market: current embedded projects already employ large DDR RAMs and NAND Flashes which make fretting over every last kilobyte of memory unnecessary. - Kontact: Mr. Robert Schwebel
<urn:uuid:aa11558f-1c59-4c5b-a04b-50fe77a83f24>
CC-MAIN-2015-11
http://www.pengutronix.de/development/web/index_en.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936459277.13/warc/CC-MAIN-20150226074059-00139-ip-10-28-5-156.ec2.internal.warc.gz
en
0.875462
1,420
3.015625
3
The Encyclopedia features over 1,700 biographies, 300 thematic essays, and 1,400 photographs and illustrations on a wide range of Jewish women through the centuries -- from Gertrude Berg to Gertrude Stein; Hannah Greenebaum Solomon to Hannah Arendt; the Biblical Ruth to Ruth Bader Ginsburg. Born into a family with a strong Zionist tradition and pioneer spirit, Ruth Sperling has kept this thread firmly woven through a life dedicated to scientific research. Ruth Sperling's most important scientific achievement was her co-discovery, with her husband, of the 3-D structure of spliceosomes, the cell's "machinery" for chopping up and re-attaching pieces of DNA to create its requisite assortment of functional proteins. Nancy Spero was a figurative artist concerned with difference and the representation of the body. The Spewacks’ early plays—Poppa, Spring Song, and War Song—deal with a variety of social issues, among them problems facing new immigrants, some of whom are Jewish. They focus on the clash of cultures, the effect of Americanization on traditional ways, and disenchantment with the elusive American dream. Who better than Bella Spewack, who has “seen it all,” to write about such things? Dora Spiegel rendered distinguished service in many fields: in the organization of league sisterhoods, in education, and in publications that stimulated women’s loyalty to the synagogue and the Jewish home. She helped found the Women’s Institute of Jewish Studies at the Jewish Theological Seminary of America and influenced the lives of countless Jewish women and children. A native of America, yet educated in Europe, Spiegelberg was a nineteenth-century settler of New Mexico and a twentieth-century progressive reformer in New York City. Sabina Spielrein, a pioneer active in the early stages of the birth of psychoanalysis who made significant contributions to the field, was the first person to propose the thesis about instinctual life, which Freud later adapted. As a sixteen-year-old ballet dancer at the Royal Ballet School in London, Phyllis Spira was hailed as a future Alicia Markova. On the brink of a successful career abroad, however, she elected to return to her home in South Africa where for many years she came to occupy center stage as South Africa’s prima ballerina. Spirituality can be defined as life lived in the presence of God. It embraces not only traditional and formal modes of religious expression, but also more informal individual and communal efforts to remain mindful of the sacred in all aspects of experience. A leading member of the Law Department of the City of New York for seventy years, Edith Spivack served as a pioneer female lawyer and a role model for generations of women. Constance Amberg Sporborg was a career clubwoman who dedicated her life to the advancement of women’s rights, immigrant settlement, international organizations, and world peace. While it was no easy task for women to integrate successfully into the world of modern competitive sports, there is currently a marked increase in the number of competitive women athletes throughout the world. A similar development, though slower and with more modest achievements, has also occurred in Jewish sports. From the 1890s, despite fierce resistance, German women increasingly participated in gymnastics, games and other sporting activities. The ways in which females participated in sporting life within both the immigrant and the wider culture reveal how women’s sports activities at times promoted assimilation yet also generated discord within the generational, gender, class and ethnic context of their lives in the United States. Dawn Steel's merchandising prowess became legendary and attracted the attention of studio head Michael Eisner, who offered her a chance to produce films. In 1982 Steel set out to persuade her employers to allow her to produce Flashdance. This huge success would be the first of a long line of successes that resulted in Steel’s ascent to President of Production when Eisner left the studio. She became the second female studio production head in studio history. Alicia Steimberg’s novels deal humorously with difficult personal topics and the social and economic chaos in her country. Alicia Steimberg’s life forms the framework and informs the themes of her satirical and irreverent novels and short stories. Mollie Steimer, a leading anarchist and advocate for the rights of political prisoners, was a codefendant in one of the most publicized antiradical trials in American history. Gertrude Stein, the American modernist writer, was an international celebrity, an artistic iconoclast, and a self-proclaimed genius. As a self-proclaimed feminist and a Jewish professional who looked beyond her own people, Stein’s influence was felt by Jewish and non-Jewish individuals in needy communities throughout the western world. Gloria Steinem, who exemplifies the Second Wave of American Feminism, began her career as a journalist writing under a man's name. She went on to co-found Ms., the first feminist periodical with a national readership. An advocacy journalist, she writes passionately about issues of women's empowerment and gender, racial and economic equality. A suffragist who encouraged newly enfranchised women to go to the polls together to avoid harassment, Pauline Perlmutter Steinem was the first woman elected to the Toledo Board of Education. Her legacy of social activism can be seen in her granddaughter, Gloria Steinem. Judith Steiner-Freud, herself a graduate of the Henrietta Szold Hadassah School of Nursing, became the director of her alma mater, as well as deputy dean of nursing in the medical faculty of Hadassah and the Hebrew University of Jerusalem, and thus had an important influence on the development of nursing education and practice in Israel. The process of projecting ideas and fantasies is called stereotyping. Scholars have repeatedly demonstrated that stereotypes, in fact, have more to teach about the “stereotyper” than the “stereotyped.” In relations between minorities and majorities, particularly when a dominant group suppresses and limits another, those stereotypes play a crucial role in rationalizing the rights of the powerful over the powerless and in justifying why a group is despised. The eminent physiologist and biochemist Lina Solomonovna Stern's curriculum vitae is testimony to her vigor and her incredible energy and immense working ability. In September 1954, an inaugural class of thirty-two students enrolled at Stern College for Women, as Yeshiva University opened the first liberal arts college in America for women under Jewish auspices. Bessie Cleveland Stern is most recognized for her work as statistician for the Maryland Board of Education. She collected and interpreted data about the Maryland school system from 1921 through 1948, and school officials turned to her for information to support appropriations measures and proposed changes in state laws relating to the schools. How to cite this page Jewish Women's Archive. "Encyclopedia." (Viewed on March 2, 2015) <http://jwa.org/encyclopedia/toc>.
<urn:uuid:9af14289-a1fb-42cb-8f32-39c19cd4d531>
CC-MAIN-2015-11
http://jwa.org/encyclopedia/toc?page=69
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463028.70/warc/CC-MAIN-20150226074103-00071-ip-10-28-5-156.ec2.internal.warc.gz
en
0.955962
1,488
2.96875
3
Excerpt from Beginning Ajax What is Ajax? by Chris Ullman Ajax is the catchy term coined by Jesse James Garrett in his 2005 article for "Adaptive Path" called "Ajax: A New Approach to Web Applications," which can still be found at http://adaptivepath.com/publications/essays/archives/000385.php. You should read this article if you haven't already! Ajax is also an acronym, but for the same reasons, let's defer explaining just what it stands for right now. Ajax didn't exist before this article, but the features the article described certainly did. In short, Ajax is a set of programming techniques or a particular approach to Web programming. These programming techniques involve being able to seamlessly update a Web page or a section of a Web application with input from the server, but without the need for an immediate page refresh. This doesn't mean that the browser doesn't make a connection to the Web server. Indeed, the original article paints a slightly incomplete picture in that it fails to mention that server-side technologies are often still needed. It is very likely that your page, or data from which the page is drawn, must still be updated at some point by a rendezvous with the server. What differs in the Ajax model is that the position at which the page is updated is moved. We'll look at the two models in more detail shortly. Garrett's article envisaged a world where Web applications could be mirrored Windows applications in their functionality. "Richness," "responsiveness," and "simplicity" were the key words involved. He envisioned a new breed of applications, one that would close the gap between the worlds of Windows and Web applications. He cited Gmail, Google Suggest, and Google Maps as key exponents of this new approach. The article — and even the term "Ajax" — polarized people. While plenty of people loved it and took up its creed, many developers criticized aspects from the name "Ajax," calling it banal, to the techniques described, which weren't (by any stretch of the imagination) new. There was definitely a hint of the modern art hater's typical criticism about abstract art — "Hey, I could do that and so could my 10-year-old" — about the complaints. Just because people could have been using these techniques to create their Web pages and applications didn't mean they had been. Unfortunately, jealousy and backbiting reigned. Ajax: The Acronym To reiterate an earlier point, Ajax is "a set of programming techniques," "a particular approach to Web programming." It isn't rigid; it isn't like a members-only club, if you don't use one technique then it isn't Ajax; it's an overall guiding philosophy. How you achieve these objectives on the client is up to you. The objectives, though, prove a good starting point. Jesse James Garrett mentioned in the article "several technologies . . . coming together in powerful new ways." Here are the technologies he specifically mentioned: - XHTML and CSS - The Document Object Model (DOM) - XML and XSLT You'll also probably need a server-side language to handle any interaction with the server. This is most typically one of the following three: - ASP.NET (Visual Basic.Net/C#) When building a Web page, you'll probably have encountered many or most of these technologies, but perhaps not all, so it's worth having a quick reminder of what each one is and does, its role in Web development, and how it pertains to Ajax. XHTML and CSS You will be familiar with HyperText Markup Language (HTML), the lingua franca of the Web, but perhaps not so familiar with its successor, eXtensible HyperText Markup Language (XHTML). XHTML is the more exacting version of HTML. In fact, it is the HTML standard specified as an XML document. The main difference with this is that whereas HTML has been fairly easygoing and the browser will make a reasonable attempt to display anything you place in tags, XHTML now follows XML's rules. For example, XML documents must be well formed (tags are correctly opened and closed, and nested), and so must XHTML pages. For example, the following is correct nesting: <div> <h1> This is a correctly nested H1 tag </h1> </div> The following is incorrect nesting: <div> <h1> This is an incorrectly nested H1 tag </div> </h1> Although it might seem to go against the grain of HTML's easygoing and easy-to-code nature, if a page isn't correctly constructed, then you won't be able to perform the kind of Ajax techniques discussed in this article. To use the DOM, the page has to be correctly formed. Otherwise, you won't be able to access the different parts of the page. Cascading Style Sheets (CSS) are the templates behind HTML pages that describe the presentation and layout of the text and data contained within an HTML page. CSS is of particular interest to the developer because changes made to the style sheet are instantly reflected in the display of the page. The style sheets are linked into the document commonly with the HTML <link> tag, although it is possible (but not preferable) to specify style attributes for each individual HTML tag on a page. You can also access CSS properties via the DOM. In the design of any Web site or Web application, you should make the division between the content/structure of the page and the presentation as clear as possible. Suppose you have 100 pages and you specify the font size on all 100 pages as a style attribute. When you're forced to change the font size you will have to change it on each individual page, instead of changing it just once in the style sheet. Having a style sheet isn't 100 percent essential, but to keep good organization, style sheets are an indispensable aid. The Document Object Model (DOM) The DOM is a representation of the Web page as a hierarchy or tree structure, where every part of the page (the graphics, the text boxes, the buttons, and the text itself) is modeled by the browser. document.form1.button.value = "Click Me"; Or, you can use methods that can access the specific elements or subsets of elements on the page, such as the document.getElementById method, which will return a specific instance of an element that matches the criteria: var myTextBox = document.getElementById("myTextbox"); You can then assign values to the variable you have created to alter the values. To make the text box invisible, you could call the following: myTextBox.style.visibility = "visible"; Another related method is the getElementsByTagName method. The getElementsByTagName method will return an array of elements on the Web page of type NodeList, all with a given tag name, even if there is only one occurrence of that element on the page. The following code will return all the image elements on the page: var imageElements = document.getElementsByTagName("img"); It is also possible to assemble the page by adding new sections to the document known as nodes. These can be elements, attributes, or even plain text. For example, you could create a span tag that contains a short message and add it to the page as follows: var newTag = document.createElement("span"); var newText = document.createTextNode("Here is some New Text. Ho Hum."); newTag.appendChild(newText); document.body.appendChild(newTag); A fair amount of Ajax code will deal with handling cross-browser code and handling errors if and when they arise, unless you can guarantee that your target audience will only ever use one browser (such as on a local intranet). This is an unfortunate set of circumstances that even new versions of IE and Firefox are not able to rectify. Later chapters of Beginning Ajax address both of these dilemmas.
<urn:uuid:1b2ecc61-0ee1-451a-bc60-f592f1b499fd>
CC-MAIN-2015-11
http://www.wrox.com/WileyCDA/Section/id-303217.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462839.81/warc/CC-MAIN-20150226074102-00058-ip-10-28-5-156.ec2.internal.warc.gz
en
0.927109
1,702
3.5
4
Tiny Planet SIM "We are witnessing the birth of a new observational science: the discovery and characterization of extrasolar planetary systems." –G. Marcy, UC Berkeley Even though astronomers have discovered more than 100 planets around stars other than the Sun in recent years, the "holy grail" of the search — an Earth-sized planet capable of supporting life — remains elusive. The main problem is that an Earthlike planet would be much smaller than any of the gas giants detected so far. |SIM, scheduled for launch in 2009, will determine the positions and distances of stars several hundred times more accurately than any previous program. Credit: NASA / JPL Planets orbiting other stars are too dim to be observed directly, but scientists infer their presence by the tiny gravitational "wobble" they induce in their parent stars. Observed from tens of light years away (one light-year is 5.88 trillion miles), this movement becomes very tiny indeed. The smaller the planet, the less the star parent wobbles. To detect the stellar wobble caused by a planet as small as Earth, scientists need an instrument of almost unbelievable sensitivity. Let’s say there’s an astronaut standing on the moon, wiggling her pinky. You’d need an instrument sensitive enough to measure that movement from Earth, a quarter million miles away. In order to do that, the instrument needs to be a "ruler" accurate to within just one-tenth the width of a hydrogen atom. That’s about 1 millionth of the width of the thickest human hair. Is such precision possible? After a six-year struggle, engineers at the Jet Propulsion Laboratory recently proved that the answer is yes. Such sub-atomic measurements were conducted for the first time ever within a vacuum-sealed chamber called the Microarcsecond Metrology Testbed. By doing this, the engineers proved they can measure the movements of stars with an astonishing degree of accuracy never before achieved in human history. The testbed, which resembles a shiny silver submarine, is jammed with mirrors, lasers, lenses and other optical components. Because even small air movements can interfere with the measurements, all air is pumped out of the chamber before each experiment is run. Laser beams, moving mirrors and a camera are used to help detect movements of an artificial star, which simulates the light that would be emitted by a real star. The MAM interferometer includes all the functionality of the flight system in a reduced-scale experiment, enabling MAM to pathfind the ground performance testing methodology for the flight instrument. The MAM optics, metrology system, and artificial star are placed in a vibration-isolated, thermally stabilized vacuum chamber. This eliminates index of refraction fluctuations in air to achieve the goal of 50-picometer optical path measurement accuracy. The instrument that engineers have demonstrated in the laboratory will become the heart of a revolutionary new space telescope known as the Space Interferometry Mission. |Animation: Click on the image above for a description of Interferometry. "Six-and-a-half years ago, this technology was unproven and unsubstantiated," said Brett Watterson, the mission’s deputy project manager. "It was just a remote possibility that we could do it. It was through ingenuity, insight, leadership and sheer perseverance that the team was able to overcome these difficult technological challenges." SIM will be an interferometer, which means it will combine interacting light waves from its three component telescopes. This interaction, called interference, makes the individual telescopes, which are separated from each other on the spacecraft, act as though they were a single, larger telescope with greater light-gathering ability. SIM, in solar orbit, won’t actually see Earth-sized planets. Instead, it will use astrometry, measuring the angle between two stars (as viewed from the spacecraft, which will form the third point of a triangle). By repeatedly measuring the angle between a target star and each of several more distant background stars, SIM will be able to determine whether the target star wobbles periodically because of gravity from orbiting planets, including planets as small as Earth. NASA recently gave the go-ahead for the second stage of development for the mission, which will not only be able to search for Earth-like planets around other stars, but will also measure cosmic distances several hundred times more accurately than currently possible. SIM’s primary mission will be to measure distances to stars with 100 times greater precision than now is possible. This will improve estimates of the size of the universe and help astronomers determine the true brightness of stars, and thus learn more about their chemical composition and evolution. Scheduled to launch in 2009, it will scan the heavens for five years and provide astronomers with the first truly accurate road map of our Milky Way galaxy. |Giant Red Spot in background, one of Jupiter’s moon in foreground with eclipse shadow cast on gas giant. The scale of gas giants greatly exceeds what a rocky inner planet might offer optically for detection. Credit: NASA/JPL Cassini| "This is a historical time that we’re intimately involved with," Watterson said. "Unlike any other culture in history, we have the technological means, the budget, and the will to determine the occurrence of Earthlike planets orbiting other stars. Everyone on the team is aware of their role in this pivotal stage in the search for life elsewhere in the universe." Scientists hope to launch six new space-borne missions over the next few years to search for terrestrial planets. They include France’s small-scale COROT, NASA’s more-ambitious Kepler mission, the European Space Agency’s (ESA) Eddington and NASA’s Space Interferometry Mission (SIM). The French COROT mission, approved and due for launch in late 2004, will study asteroseismology, or oscillations within stars, and likely will be the first orbiting telescope to search for extrasolar planets.It will look at 50,000 to 60,000 stars and should find a few dozen terrestrial planets and several hundred close-in gas-giant planets during a two- to three-year mission, says Pierre Barge, an astronomer at the Laboratory of Astrophysics in Marseille and leader of COROT’s exoplanets group. COROT – for Convection, Rotation and Planetary Transits – is a mission of CNES, the French National Center for Space Studies, in partnership with ESA, Italy, Belgium and Germany. When searching for extrasolar planets, COROT’s 27-centimeter (10.6-inch) telescope will use a method called photometry, in which sensitive light detectors look for a slight drop in a star’s brightness as a small planet "transits" the star (crosses the face of the star as viewed from COROT). The Kepler mission is scheduled for launch into solar orbit in October 2006. Kepler will simultaneously observe 100,000 stars in our galactic "neighborhood," looking for Earth-sized or larger planets within the "habitable zone" around each star – the not-too-hot, not-too-cold zone where liquid water might exist on a planet. To highlight the difficulty of detecting an Earth-sized planet orbiting a distant star, Borucki, Kepler’s principal investigator, points out it would take 10,000 Earths to cover the Sun’s disk. One NASA estimate says Kepler should discover 50 terrestrial planets if most of those found are about Earth’s size, 185 planets if most are 30 percent larger than Earth and 640 if most are 2.2 times Earth’s size. In addition, Kepler is expected to find almost 900 giant planets close to their stars and about 30 giants orbiting at Jupiter-like distances from their parent stars. Because most of the gas giant planets found so far orbit much closer to their stars than Jupiter does to the Sun, Borucki believes that during the four- to six-year mission, Kepler will find a large proportion of planets quite close to stars. If that proves true, he says, "We expect to find thousands of planets." In 2008 or later, the European Space Agency hopes to launch the Eddington mission (named for the late British astronomer Arthur Eddington). Eddington primarily would study stars’ interior structures and the processes that govern how stars evolve, but it would spend three years scanning 500,000 stars for planets, including terrestrial planets in habitable zones. Like Kepler and COROT, Eddington would use a camera with a large optical telescope, in this case a wide-field 1.2-meter (47-inch) one, to detect planetary transits using photometry. Also due for launch in 2009 is the almost $1 billion NASA-ESA Next Generation Space Telescope, or NGST [James Webb Space Telescope], a near-infrared telescope that will succeed the Hubble Space Telescope. Planet hunting will be "a minor part of its job, " says Penny. Like Hubble, NGST will be a general-purpose telescope with an emphasis on cosmology. But it will investigate stars with dusty disks – the early stage of planet formation – and may also be able to study Jupiter-size planets.
<urn:uuid:c53e2685-af25-4cfa-976b-61ac1aa969e2>
CC-MAIN-2015-11
http://www.astrobio.net/topic/solar-system/meteoritescomets-and-asteroids/tiny-planet-sim/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463606.79/warc/CC-MAIN-20150226074103-00189-ip-10-28-5-156.ec2.internal.warc.gz
en
0.930294
1,920
3.921875
4
Wind has been used for a variety of purposes for grinding grain and pumping water to powering large sailing ships. The contribution of the American farm windmill in this century demonstrates what a valuable commodity wind energy can be when captured in a dispersed system of small machines. There are an estimated 30,000 operating farm windmills in the Southern Great Plains today; the average power of each windmill is about 0.25 kW and collectively they provide an average power of around 5 megawatts. The extractable wind power potential for the United States has been estimated as over 2 million megawatts with the major wind areas in the Great Plains Region, along with the coasts, off-shore and the coasts of Alaska, and Hawaii. Texas is one of the best regions in the US for utilization of wind energy. The capturable wind power in Texas was calculated to be 250,000 megawatts from 10-12 years of data taken at National Weather Service Stations in Texas. This figure is about 5 times the total installed electrical generating capacity in the State, and is the annual energy equivalent of 1.3 billion barrels of crude oil. Roughly 40% of this wind power potential is in the Panhandle and another 10% is along the Gulf Coast. Use of even a few percent of this resource would obviously have a beneficial impact on the States economy. Types of Wind Machines A wide variety of types and sizes of wind machines exist today. Wind turbines are classified into two general types, drag and lift. On a drag device the wind pushes the blade forcing the rotor to turn about its axis; the most common example of a drag device is the farm windmill. Drag devices characteristically produce high starting torque and are well suited to pumping water in low volumes, however they are limited in the amount of energy they can extract from the wind. Wind turbines that use lift have only a few (two, three or four) blades in contrast to the multiple blades of a drag device. One blade rotating very fast can extract as much energy as many blades rotating slower. Lift devices use slender airfoils for blades, whose shape is the same as an airplane wing. Lift devices are much more efficient than the drag devices, thus the blade area can be reduced considerably. Lift devices are further classified by axis type: horizontal (HAWT) and vertical (VAWT). Wind Power Map The map delineates the wind energy regions of the State. Since power and energy are closely controlled by wind-speed, the power at a particular location is dependent on local terrain and obstructions. Those regions enclosed by contour lines are suitable for the installation of wind turbines. Of course, wind turbines located at sites with higher wind-speeds will produce more energy. wind-speed also increases with height, therefore the average wind-speeds are for a height of 20 meters (66 ft), a common tower height for small wind machines. Use of Wind Energy Kinetic energy in the wind can be transformed by the Wind Energy Conversion Systems (WECS) into other forms of energy; electrical, mechanical, and thermal. Most of the WECS are for the generation of electricity. The stand alone systems of the 1930’s which were generally DC at 6 to 32 volts, became obsolete when inexpensive electricity became available from rural electric cooperatives. Today, manufacturers are again producing WECS which use DC generators, but the most common usage is 60 cycle AC. DC can be converted to AC by an inverter, or the WECS can be connected directly to the utility grid by use of an induction synchronous generator. If more power is produced by the WECS than is needed on site, the excess power is fed into the utility grid — under this operation the utility grid acts as a large storage. The Public Utility Regulatory Policies Act (PURPA) states that regulated utilities have to accept private generator systems on their grid and they have to pay the avoided cost for energy fed back into the grid (as a minimum the fuel adjustment cost). In 1990, world wide there were around 20,000 wind turbines with an installed capacity of 2,000 megawatts. In 1989, they produced 2.6 billion kwh of electricity, which was the equivalent of 4 million barrels of oil. Eighty percent of the electricity generated was by wind turbines located in wind power plants in California. Applications of WECS for producing mechanical power are being tested for pumping water; wind assist systems for irrigation water, stand alone systems, and air lift pumping. The use of WECS in producing heat is being tested by electrical resistance heating and by direct conversion in water churns. Although the fuel is free, installing and operating a wind turbine can be expensive. Manufacturers are producing WECS with ratings from less than 1kW to 500kW. In general, installed costs for small WECS (less than 100kW) are around $3,000 per rated kW, which translated to around $0.15/kWh. As installed costs drop to $1,000 per rated kW, small WECS will generate electricity at around $0.10/kWh. In Texas, wind and solar devices are exempt from property and sales tax. WECS of 50kW or less connected to the utility line can use Net Energy Billing. Sources of Information - A Siting Handbook for Small Wind Energy Conversion Systems - Order No.: PNL-2521 - May 1978, 132 p. - Available form NTIS, US Department of Commerce, 5383 Port Royal Road, Springfield, VA 22161 - Wind Machines - Frank Eldridge. Van Nostrand, 1980 - Wind Power for Home and Business: Renewable Energy for the 1990s and Beyond - Paul Gipe. Chelsea Green .Publishing Co., Box 130, Rt. 113, Post Mills, VT 05058, 1993 - Wind Power for the Homeowner - Donald Marier. Rodale Press, 1981 - Wind Turbine Engineering Design - David Eggleston & Forrest Stoddard. Van Nostrand Reinhold Books, 1987 Information Available From the Alternative Energy Institute - Introduction to Wind Energy - Wind Energy and Wind Turbines - Wind Water Pumping - Sources of Information for Building Your Own Wind System
<urn:uuid:b5d556fa-90dc-48f3-80a9-4c5882cc9e25>
CC-MAIN-2015-11
http://www.windenergy.org/multimedia/?page_id=169
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464193.61/warc/CC-MAIN-20150226074104-00206-ip-10-28-5-156.ec2.internal.warc.gz
en
0.938901
1,290
3.484375
3
Today we are all aware of the two famous ancient universities of India which also are one of the ancient universities in the WORLD. first is Takshashila University (Taxila) and Second is Nalanda University.Education has always been given great prominence in Indian society since the times of the vedic civilization, with gurukul and ashrams being the centers of learning. And with evolving times, a large number of centers of learning were established across ancient India of which Takshashila and Nalanda are the most famous ones known today. Below is a list of major ancient universities that flourished across ancient India. Takshashila University established around 2700 years ago was home to over 10500 students where the students from all across the world used to come to attain specialization in over 64 different fields of study like vedas, grammar, philosophy, ayurveda, agriculture, surgery, politics, archery, warfare, astronomy, commerce, futurology, music, dance, etc. Famous graduates of this University include the ones like Chanakya, Panini, Charaka, Vishnu Sharma, Jivaka etc. This is the world’s oldest university. Nalanda University was established by Shakraditya of Gupta dynasty in modern Bihar during early 5th century and flourished for 600 years till 12th century. Nalanda was the world’s first university to have residential quarters for both students and teachers. It also had large public lecture halls. Students from countries like Korea, Japan, China, Tibet, Indonesia, Persia and Turkey came to study in this university. Recently the parliament of India passed a bill approving the plans to restore the ancient Nalanda University as a modern Nalanda International University dedicated for post-graduate research. Vikramashila University was established by Dharmapala of Pala dynasty during late 8th century and flourished for 400 years till 12th century. Vikramashila University was located in the Bhagalpur district of modern day Bihar. Vikramashila University gave direct competition to Nalanda University with over 100 teachers and over 1000 students listed in this University. This university was well known for its specialized training on the subject of Tantra (Tantrism). One of the most popular graduates from Vikramashila University was Atiśa Dipankara, a founder of the Sharma traditions of Tibetan Buddhism who also revived the Buddhism in Tibet. Valabhi University was established in Saurashtra of modern Gujarat at around 6th century and it flourished for 600 years till 12th century. Chinese traveler Itsing who visited this university during the 7th century describes it as a great center of learning. Gunamati and Sthiramati, the two famous Buddhist scholars are said to have graduated from this University. This University was popular for its training in secular subjects and students from all over the country came to study in this University. Because of its high quality of education, graduates of this University were given higher executive posts. Pushpagiri University was established in ancient Kalinga kingdom (modern day Odisha) and was spread across Cuttack and Jajpur districts. It was established in 3rd century and flourished for the next 800 years till 11th century. The university campus was spread across three adjoining hills – Lalitgiri, Ratnagiri and Udayagiri. This was one of the most prominent centers of higher education in ancient India along with the universities of Takshashila, Nalanda and Vikramashila. The Chinese traveler Xuanzang (Huien Tsang) visited this university in 639 CE. Lalitgiri is said to have been commissioned by early 2nd century BCE itself and is the oldest Buddhist establishments in the world. Recently a few images of Emperor Ashoka have been discovered here, and it has been suggested that the Pushpagiri University was established by Emperor Ashoka himself. Odantapuri University was established by Dharmapala of Pala dynasty during late 8th century in Magadha (which is in modern day Bihar) and flourished for 400 years till 12th century. The famous Acharya Sri Ganga who was a professor at the Vikramashila University was a graduate of this Odantapuri University. According to the ancient Tibetan records there were about 12,000 students studying at this University. Ancient Tibetan texts mention this as one among the five great Universities of its time, the other four being Vikramashila, Nalanda, Somapura and Jagaddala Universities – all located in ancient India. Somapura Mahavihara was established by Dharmapala of Pala dynasty during late 8th century in Bengal and flourished for 400 years till 12th century. The University spread over 27 acres of land of which the main complex was 21 acres was one of the largest of its kind. It was a major center of learning for Bauddha Dharma (Buddhism), Jina Dharma (Jainism) and Sanatana Dharma (Hinduism). Even today one can find ornamental terracotta on its outer walls depicting the influence of these three traditions. Courtesy By :- hitxp.com
<urn:uuid:478576ba-d2d5-4d0b-b15a-0aa5ce7ca124>
CC-MAIN-2015-11
http://www.classteacher.com/blog/index.php/tag/takshashila-university/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463318.72/warc/CC-MAIN-20150226074103-00120-ip-10-28-5-156.ec2.internal.warc.gz
en
0.972719
1,077
2.703125
3
DefinitionGenital warts are soft growths on the skin and mucus membranes of the genitals. They may be found on the penis, vulva, urethra, vagina, cervix, and around and in the anus.Genital warts are a sexually transmitted infection (STI). Alternative NamesCondylomata acuminata; Penile warts; Human papilloma virus (HPV); Venereal warts; Condyloma; HPV DNA test; Sexually transmitted disease (STD) - warts; LSIL-HPV; Low-grade dysplasia-HPV; HSIL-HPV; High-grade dysplasia HPV; HPV Causes, incidence, and risk factorsThe virus that causes genital warts is called human papilloma virus (HPV). More than 70 different types of HPV exist. Certain types of HPV can lead to precancerous changes in the cervix, cervical cancer, or anal cancer. These are called high-risk types of HPV.Not all types of HPV cause genital warts. Other types of HPV cause warts on other parts of the skin, such as the hands. This article focuses on warts on the genitals.HPV infection around the genitals is common. Most people have no symptoms. In women, HPV can spread to areas inside, on the walls of the vagina and cervix. They are not easy to see without special procedures.Important facts about HPV:HPV infection spreads from one person to another through sexual contact involving the anus, mouth, or vagina. You can spread the warts even if you do not see them.You may not see warts for 6 weeks to 6 months after becoming infected. You may not notice them for years.Not everyone who has come into contact with the HPV virus and genital warts will develop them.You are more likely to get genital warts and spread them more quickly if you:Have multiple sexual partnersDo not know if you had sex with someone who had STIsAre sexually active at an early ageUse tobacco and alcoholHave a viral infection such as herpes and are stressed at the same time Are pregnantHave a weakened immune system due to an illness or medication If a child has genital warts, you should suspect sexual abuse as a possible cause. SymptomsGenital warts can be so tiny, you cannot see them.The warts can look like:Flesh-colored spots that are raised or flatGrowths that look like the top of a cauliflowerIn females, genital warts can be found:Inside the vagina or anusOutside the vagina or anus, or on nearby skinOn the cervix inside the bodyIn males, genital warts can be found on the:PenisScrotumGroin areaThighsInside or around the anusGenital warts can also occur on theLipsMouthTongueThroatOther symptoms are rare, but can include:Increased dampness in the genital area near the wartsIncreased vaginal dischargeGenital itchingVaginal bleeding during or after sex Signs and testsThe health care provider will perform a physical exam.In women, this will include a pelvic examination. Magnification (colposcopy) is used to spot warts that cannot be seen with the naked eye. Your doctor may place watered-down vinegar (acetic acid) on the area. This helps better see any warts.The virus that causes genital warts can cause abnormal results on a Pap smear. If you have these types of changes, you will probably need more frequent Pap smears for a while.An HPV DNA test can tell if you have a high-risk type of HPV known to cause cervical cancer. This test may be done:As a screening test for women over age 30In women of any age who have a slightly abnormal Pap test result TreatmentGenital warts must be treated by a doctor. Do NOT use over-the-counter medicines meant for other kinds of warts.Treatment may include:A skin treatment done in the doctor's officePrescription medicine that you apply at home several times per week Prescription medicines include:Imiquimod (Aldara)Podophyllin and podofilox (Condylox)Trichloroacetic acid (TCA) The warts may be removed with surgery, including:CryosurgeryElectrocauterizationLaser therapySurgical excision (cutting them out)If you have genital warts, all of your sexual partners must be examined by a health care provider and treated if warts are found. Even if you do NOT have symptoms, you must be treated to prevent complications and spreading the condition to others.You will need to return to your health care provider after treatment to make sure all the warts are gone.Regular Pap smears are recommended if you are a woman who has had genital warts, or if you partner had them. If you had warts on your cervix, you may need to have Pap smears every 3 to 6 months after the first treatment.Women with precancerous changes caused by HPV infection may need further treatment. Expectations (prognosis)Many sexually active young women become infected with HPV. In many cases, HPV goes away on its own.Most men who become infected with HPV never develop any symptoms or problems from the infection. However, they can pass it on to current and sometimes future sexual partners.Even after you have been treated for genital warts, you may still infect others. ComplicationsSome types of HPV have been found to cause cancer of the cervix and vulva. They are the main cause of cervical cancer.The types of HPV that can cause genital warts are not the same as the types that can cause penile or anal cancer.The warts may become numerous and quite large, requiring more extensive treatment and follow-up procedures. Calling your health care providerCall your doctor if:A current or past sexual partner has genital wartsYou have visible warts on your external genitals, itching, discharge, or abnormal vaginal bleeding. Keep in mind that genital warts may not appear for months to years after having sexual contact with an infected person.You think a young child might have genital wartsWomen should begin having Pap smears at age 21. PreventionNot having sexual contact is the only way to avoid genital warts and other STIs. You can also decrease your chance of getting an STI by having a sexual relationship with only one partner who you know is disease-free.Male and female condoms cannot fully protect you. This is because the virus or warts can be on nearby skin. Condoms reduce your risk and you should still use them at all times. HPV can be passed from person to person even when there are no visible warts or other symptoms. Praticing safer sex can help prevent you from getting HPV. Two vaccines are available that protect against four of the HPV types that cause most cervical cancers in women. The vaccine is given as a series of three shots. It is recommended for girls and women ages 9 to 26.One of the two vaccines protects against genital and anal warts in boys and men. The vaccine is given as a series of three shots. It is recommended for boys and men ages 9 to 26.Ask your health care provider whether the HPV vaccine is right for you. ReferencesAdvisory Committee on Imunization Practices (ACIP). Recommendations on the use of quadrivalent human papillomavirus vaccine in males. MMWR2011;60(50):1705-1708.Diaz ML. Human papilloma virus: prevention and treatment.Obstet Gynecol Clin North Am. 2008;35(2):199-217.Mayrand MH, Duarte-Franco E, Rodrigues I, Walter SD, Hanley J, Ferenczy A, et al. Human papillomavirus DNA versus Papanicolaou screening tests for cervical cancer. N Engl J Med. 2007;357:1579-1588.Kahn JA. HPV vaccination for the prevention of cervical intraepithelial neoplasia. N Engl J Med. 2009;361:271-278.
<urn:uuid:582fa20d-fb8f-47f7-bab9-d6924f467803>
CC-MAIN-2015-11
http://stelizabeth.com/adam/adamdetail.aspx?id=4062
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463658.66/warc/CC-MAIN-20150226074103-00193-ip-10-28-5-156.ec2.internal.warc.gz
en
0.923173
1,691
3.40625
3
Galt is the hero and main character of Atlas Shrugged, because his principles drive the action and the conflict of the story. The book explores what occurs when the thinkers go on strike. Galt conceives of the strike, initiates it, sustains it, and carries it to a successful resolution. Part of the fascination of Atlas Shrugged is that its dominant character works behind the scenes, his existence unknown to the reader, for the first two-thirds of the novel. The question invoking his name lends a legendary quality to his character, as if he were, in part, a mythological being. In a universe populated with giants, his is the character of greatest stature. The mystery shrouding the story's unfolding conflict results from the choices he makes. The strike is necessarily secretive, so the disappearance of the world's great thinkers must be a mystery to everyone outside of Galt's circle. Galt realizes, during the implementation of communist principles at the Twentieth Century Motor Company, that the only hope of ending the mind's exploitation is by means of a strike. His insight has the potential to usher in a new historical period — to be "epoch-making." Ayn Rand presents Galt as a man of epic proportions. She stated that the goal of her writing was the presentation of an ideal man, and that goal is reached with the figure of John Galt. He is a man of prodigious intellectual gifts — a physicist who brings about a revolution in man's understanding of energy, a philosopher who defines a rational view of existence, and a statesman who leads a strike that transfigures the social systems of the world. Two characteristics make possible the enormity of his intellectual achievements. One is his unique genius. The other is a trait that men can replicate: his unswerving rationality. Galt describes himself as "the man who loves his life," which is accurate. But above all, he is the man who perceives reality — the man who allows nothing to interfere with his cognitive apprehension of the facts. He is characterized by reference to his "ruthlessly perceptive eyes" — the eyes that honor facts and see reality for what it is, regardless of Galt's feelings about that reality. In a signature scene, Galt tells Dagny — the woman he has loved and watched for years — what he did and felt upon learning that she was Hank Rearden's mistress. He went to observe Rearden at an industrialists' conference. Rearden had everything that Galt wanted and could have had if he hadn't chosen to strike. Rearden had his mills, his invention, his wealth, his fame, and his love relationship with Dagny. For one moment, Galt felt a tearing sense of loss. He saw what would have been his if he hadn't abandoned his motor. But Galt felt that loss for only a moment, because he then recognized the full set of facts defining the situation. He saw the burdens that Rearden carried, the impossible demands, and the forces stifling and enslaving him. He saw Rearden struggling in silent agony, striving to understand what Galt alone had understood. He saw Rearden for what he was — the symbol of the strike, the great unrewarded hero whom Galt was to liberate and validate. The scene that he describes to Dagny provides the key to understanding Galt's character. He feels intense emotion and suffers when he experiences loss, but he doesn't permit his emotions to interfere with his cognitive grasp of reality or with his actions based on that cognition. He knows that the strike is right, and no pain resulting from its consequences can defile the purity of his cognition. What makes Galt unique is his method of using his mind — his unflinching commitment to facts, even if they are unpleasant, painful, or frightening. He functions rationally, holding an undeviating allegiance to reality that his most honest judgment grasps. Galt's life embodies a proactive eagerness to seek out truth and an inviolable willingness to accept it, no matter its content. He recognizes that man can only achieve success and happiness by revering reality. He doesn't consider facing reality a duty or something that requires tight-lipped stoicism. Instead, he celebrates reality, joyously recognizing that consistent adherence to reality is at the core of self-interest. He knows that a willful departure from reality is the essence of self-destruction. John Galt is a hero representing the best of modern civilization — its science, its medical research, its technological progress, and its application of intellect in service to human life. He embodies the novel's essential theme: Only by means of the mind can human beings achieve prosperity on earth. Because of the towering achievements of his intellect, it's easy to overlook the other aspects of Galt's life: his light, effortless way of moving; his passionate love for Dagny; the tenderness and concern he shows for his lifelong friends, Francisco d'Anconia and Ragnar Danneskjöld; and his respect for his teacher/spiritual father, Hugh Akston. The special bond that Galt shares with these four people shows Rand's rejection of the conventional split between reason and emotion, which holds that an individual can be either rational or emotional — he cannot be both. The poignant, understated intensity of Galt's relief on seeing Ragnar after a year of ceaseless dangers is a simple but eloquent example of a rational man's emotional life. Because Galt values the mind and its achievements, he must give his love to exalted individuals. A man of reason cannot look unmoved upon such noble souls as Francisco, Ragnar, and Dagny. A true man of the mind experiences the most intense emotional bond to such individuals because he is a man of the mind. In the character of John Galt, Ayn Rand shows that reason and emotion can and should be integrated in the human being's life.
<urn:uuid:7078c557-0fdf-4d4d-80a3-1bd2dd188da2>
CC-MAIN-2015-11
http://www.cliffsnotes.com/literature/a/atlas-shrugged/character-analysis/john-galt
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462426.4/warc/CC-MAIN-20150226074102-00007-ip-10-28-5-156.ec2.internal.warc.gz
en
0.977883
1,216
2.640625
3
When a bilingual child attends a Japanese school, nurturing the English side of the child’s language ability requires a whole range of efforts. In 16 Tips for Raising a Bilingual Child in Japan and 12 More Tips for Raising a Bilingual Child in Japan, I offered a variety of ideas to help address this challenge. In this article, though, my focus is solely on reading, the area that I feel has had the most powerful impact on the language development of my children and the children I have worked with over the years as a teacher of bilingual kids. It seems hard to believe that something so simple, so pleasurable, could have as much influence on language development as the practice of reading aloud, and yet all my experience as a parent and teacher—as well as all the research I’ve seen on the subject (see The Read-Aloud Handbook by Jim Trelease and The Power of Reading by Stephen Krashen for persuasive proof)—point to the enormous impact of this humble activity. It’s honestly hard for me to overstate the importance of reading aloud—for all children—but it’s particularly vital when it comes to nurturing the minority language of a bilingual child. This means reading aloud every day, from day one, with the newborn on her back and the parent cuddled close with a stack of suitable books. You needn’t—and shouldn’t—wait until the child is any older. Begin right from birth and continue reading just as long as you possibly can, even after the child has begun reading on her own. If you make reading aloud the bedrock of your efforts—at least 15 minutes a day, day in and day out—this routine will not only fuel the growth of the target language, the child will come to associate books and reading with the warmth and pleasure of your time together. Reading aloud—picture books, poetry, chapter books, novels, and nonfiction, too—has long formed the core of my efforts to promote language development and a love of literacy. Building a home library Of course, in order to maintain this regular read-aloud practice, the other challenge—in addition to your firm commitment—involves obtaining a steady supply of suitable children’s books. In my experience, this is the other obstacle that parents must make a special effort to overcome. No matter how tight your budget, building a home library of books in English should at least be a small part of it. In the long run, the money you spend on books will be a modest investment with a substantial payoff: your child’s English ability, and interest in reading, will be much stronger. It’s a question of priority, in the same vein as making the time to read each day: if you have to cut back on some other aspect of your current lifestyle in order to free up funds for books, it’s an adjustment worth making, in my opinion. I also suggest a practice of giving books as gifts for birthdays, Christmas, and other special days. Giving books as gifts—and encouraging others to do the same for your kids—is another way to add to your home library while also elevating books as “special things.” At the same time you’re building your home library, the local library may be another source of children’s books in English. If such books are available, head there regularly with your child. You could also extend the effort to exchange the books you own with similar families in your area. It’s vital, as well, that you seek out books which closely fit your child’s age and interests. After all, if you find the time, but not the right books, your read-aloud effort won’t be as effective and enjoyable as it should be…and could even be abandoned. So you must be willing to invest additional time in searching for books that suit your child, which can easily be done online. (A wealth of recommended titles can also be found in The Read-Aloud Handbook and How to Get Your Child to Love Reading.) Subscribing to one or more children’s magazines that your child would enjoy receiving regularly is another effective way to enrich your home with appropriate material. Reading with your children Once your child has begun to read in English, you should read with them daily, taking turns, page by page—this “shared reading” is in addition to your ongoing read-aloud time. Because the child’s listening comprehension will be considerably higher than her reading ability, up until an older age, you’ll now be working with two different kinds of books: easier books for shared reading; harder books for reading aloud. When your child is about 3 or 4, you can add “chapter books” to your read-aloud routine (while continuing to read picture books and poetry). This is an important development, because chapter books—those that come in a series of 5 or 10 or even 20 or more books and feature familiar characters and plot lines—are a wonderful way to help hook a child on books and literacy. (See How to Get Your Child Hooked on Books for a list of such books.) For shared reading, the early books will consist of simple picture books, which can then slowly increase in difficulty as proficiency grows. Eventually, when the child is ready, you can “graduate” to suitable chapter books—particularly the chapter book series that you’ve already read aloud. Since the child has already heard these stories once (or even several times—it’s fine to reread favorite books), this should help ease her move into chapter books. Children reading on their own Although reading aloud should be maintained throughout childhood (both fiction and nonfiction at increasingly sophisticated levels), over time the amount of shared reading can decrease as the child reads more on her own. All children are different, of course, and some will eagerly read by themselves. Others, however, are less inclined to pick up a book, particularly when there are already heavy demands on their time in connection with Japanese school. In order to increase the odds that your child will read independently in English, there are several strategies you might try: 1. Make use of captive reading. What I call “captive reading” is the idea of posting reading material in a location in the home (like the bathroom), where the child’s eyes will be automatically drawn to it. In fact, the use of captive reading can start when the child is just beginning to read by putting a small whiteboard in the bathroom and writing simple messages and riddles on it. As the child’s reading proficiency grows, you can eventually post short fiction and nonfiction texts, and even write your own “serial stories” with the child as the main character. (See Turn Your Kids into Eager Readers with This Fun, Simple Strategy.) 2. Match books with interests. Whatever interests your child exhibits, or concerns they may express, you can likely match that interest or concern with a suitable English book. If you’re proactive about this, and locate appealing titles, the child will be far more likely to spend time reading on her own. 3. Use reasonable incentives. There are various views when it comes to “rewards,” but I’ve found that offering reasonable incentives for reading in English—like a small prize or treat—can help heighten enthusiasm and maintain motivation. Put reading at the heart of your efforts Put reading at the very heart of your daily efforts and you’ll not only be more effective at nurturing your child’s English ability, you’ll also be establishing an early love for books and literacy that will serve your child well throughout her lifetime.
<urn:uuid:2d328463-012e-46a8-af63-0f4f243024fe>
CC-MAIN-2015-11
http://injapan.gaijinpot.com/live/family-schools/2013/02/05/the-power-of-reading-in-raising-a-bilingual-child/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463028.70/warc/CC-MAIN-20150226074103-00071-ip-10-28-5-156.ec2.internal.warc.gz
en
0.955341
1,618
3.109375
3
Definitions for slopesloʊp This page provides all possible meanings and translations of the word slope slope, incline, side(noun) an elevated geological formation "he climbed the steep slope"; "the house was built on the side of a mountain" the property possessed by a line or surface that departs from the horizontal "a five-degree gradient" slope, incline, pitch(verb) be at an angle "The terrain sloped down" An area of ground that tends evenly upward or downward. I had to climb a small slope to get to the site. The degree to which a surface tends upward or downward. The road has a very sharp downward slope at that point. The ratio of the vertical and horizontal distances between two points on a line; zero if the line is horizontal, undefined if it is vertical. The slope of this line is 0.5 The slope of the line tangent to a curve at a given point. The slope of a parabola increases linearly with x. The angle a roof surface makes with the horizontal, expressed as a ratio of the units of vertical rise to the units of horizontal length (sometimes referred to as run). For English units of measurement, when dimensions are given in inches, slope may be expressed as a ratio of rise to run, such as 4:12 or an an angle. The slope of an asphalt shingle roof system should be 4:12 or greater. A person of Chinese or other East Asian descent. To tend steadily upward or downward. The road slopes sharply down at that point. To try to move surreptitiously. I sloped in through the back door, hoping my boss wouldn't see me. To hold a rifle at a slope with forearm perpendicular to the body in front holding the butt, the rifle resting on the shoulder. The order was given to "slope arms." Origin: From aslope. an oblique direction; a line or direction including from a horizontal line or direction; also, sometimes, an inclination, as of one line or surface to another any ground whose surface forms an angle with the plane of the horizon in a sloping manner to form with a slope; to give an oblique or slanting direction to; to direct obliquely; to incline; to slant; as, to slope the ground in a garden; to slope a piece of cloth in cutting a garment to take an oblique direction; to be at an angle with the plane of the horizon; to incline; as, the ground slopes to depart; to disappear suddenly Origin: [Formed (like abode fr. abide) from OE. slipen. See Slip, v. i.] In mathematics, the slope or gradient of a line describes its steepness, incline, or grade. A higher slope value indicates a steeper incline. Slope is normally described by the ratio of the "rise" divided by the "run" between two points on a line. The line may be practical - as set by a road surveyor : or in a diagram that models a road or a roof either as a description or as a plan. The rise of a road between two points is the difference between the altitude of the road at those two points, say y1 and y2, or in other words, the rise is = Δy. For relatively short distances - where the earth's curvature may be neglected, the run is the difference in distance from a fixed point measured along a level, horizontal line, or in other words, the run is = Δx. Here the slope of the road between the two points is simply described as the ratio of the altitude change to the horizontal distance between any two points on the line. In mathematical language, the slope m of the line is The concept of slope applies directly to grades or gradients in geography and civil engineering. Through trigonometry, the grade m of a road is related to its angle of incline θ by As a generalization of this practical description, the mathematics of differential calculus defines the slope of a curve at a point as the slope of the tangent line at that point. When the curve given by a series of points in a diagram or in a list of the coordinates of points, the slope may be calculated not at a point but between any two given points. When the curve is given as a continuous function, perhaps as an algebraic formula, then the differential calculus provides rules giving a formula for the slope of the curve at any point in the middle of the curve. British National Corpus Rank popularity for the word 'slope' in Nouns Frequency: #1610 lopes, olpes, poles, Poles Translations for slope From our Multilingual Translation Dictionary - منحدر, مَيْلArabic - svah, stoupání, sklonCzech - Steigung, Hang, Schlitzauge, Ableitung, Gradient, SchlitziGerman - εφαπτομένη, συντελεστής διεύθυνσηςGreek - cuesta, inclinación, pendiente, ojo chueco, chuequito, desnivelSpanish - kaltevuus, jyrkkyys, [[tehdä]] [[kallistus]], livahtaa, [[pitää]] [[olka, rinne, kulmakerroin, gradientti, viettää, kallistaa, vinosilmä, hiipiäFinnish - pente, inclinaisonFrench - fána, sléim, ardú, caitheamh le fána, céim fhánaIrish - meredekség, emelkedő, lejtő, ferdeszeműHungarian - inclinazione, muso giallo, pendio, pendenzaItalian - 勾配, 坂道, 傾斜率, 傾斜, スロープ, 坂, 傾斜角Japanese - эңкейиш, эңкейүүKyrgyz - panaunga, tahataha, harapaki, tāwhatinga, aupakiMāori - steilte, glooiing, glooien, helling, spleetoog, richtingscoëfficient, sluipenDutch - bakke, oppoverbakke, helling, skråning, nedoverbakke, stigningNorwegian - skarpa, stok, zboczePolish - ladeira, declive, gradiente, inclinação, inclinar, amarelo, olho puxadoPortuguese - скат, наклон, склон, откос, уклон, узкоглазый, косоглазыйRussian - о̀бронак, падина, pàdina, косѝна, косооки, нагиб, òbronak, nagib, kosìna, kosookiSerbo-Croatian - sklon, stúpanie, svahSlovak - strmina, klanec, naklonSlovene Get even more translations for slope » Find a translation for the slope definition in other languages: Select another language:
<urn:uuid:6de5bd7c-8a8a-4238-a1a0-541bede86caf>
CC-MAIN-2015-11
http://www.definitions.net/definition/slope
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461359.90/warc/CC-MAIN-20150226074101-00179-ip-10-28-5-156.ec2.internal.warc.gz
en
0.819004
1,725
3.359375
3
A randomised placebo-controlled study by the University of Oxford suggests that higher levels of omega-3 DHA, the group of long-chain fatty acids found in algae and seafood, are associated with better sleep. The researchers explored whether 16 weeks of daily 600 mg supplements of algal sources would improve the sleep of 362 children. The children who took part in the study were not selected for sleep problems, but were all struggling readers at a mainstream primary school. At the outset, the parents filled in a child sleep questionnaire, which revealed that four in ten of the children in the study suffered from regular sleep disturbances. Of the children rated as having poor sleep, the researchers fitted wrist sensors to 43 of them to monitor their movements in bed over five nights. This exploratory pilot study showed that the children on a course of daily supplements of omega-3 had nearly one hour (58 minutes) more sleep and seven fewer waking episodes per night compared with the children taking the corn or soybean placebo. The findings are due to be published in the Journal of Sleep Research. The two-phased study looked at sleep in 362 healthy 7-9 year old UK school children in relation to the levels of omega-3 and omega-6 long-chain polyunsaturated fatty acids (LC-PUFA) found in fingerstick blood samples. Previous research has suggested links between poor sleep and low blood omega-3 LC-PUFA in infants and in children and adults with behaviour or learning difficulties. However, this is the first study to investigate possible links between sleep and fatty acid status in healthy children. At the start of the study, parents and carers were asked to rate their child's sleep habits over a typical week (using a three-point scale). Their responses to the well-validated Child Sleep Habits Questionnaire indicated that 40 percent of the children had clinical-level sleep problems, such as resistance to bedtime, anxiety about sleep and constant waking in the course of the night. The study finds that higher blood levels of the long-chain omega-3 DHA (the main omega-3 fatty acid found in the brain) are significantly associated with better sleep, including less bedtime resistance, parasomnias and total sleep disturbance. It adds that higher ratios of DHA in relation to the long-chain omega-6 fatty acid AA (arachidonic acid) are also associated with fewer sleep problems. Lead author Professor Paul Montgomery of Oxford University said: 'To find clinical level sleep problems in four in ten of this general population sample is a cause for concern. Various substances made within the body from omega-3 and omega-6 fatty acids have long been known to play key roles in the regulation of sleep. For example, lower ratios of DHA have been linked with lower levels of melatonin, and that would fit with our finding that sleep problems are greater in children with lower levels of DHA in their blood.' Co-investigator Dr Alex Richardson of Oxford University said: 'Previous studies we have published showed that blood levels of omega-3 DHA in this general population sample of 7-9 year olds were alarmingly low overall, and this could be directly related to the children's behaviour and learning. Poor sleep could well help to explain some of those associations. 'Further research is needed given the small number of children involved in the pilot study. Larger studies using objective sleep measures, such as further actigraphy using wrist sensors, are clearly warranted. However, this randomised controlled trial does suggest that children's sleep can be improved by DHA supplements and indicates yet another benefit of higher levels of omega-3 in the diet.' For more information, please contact the University of Oxford News and Information Office at firstname.lastname@example.org or +44 (0) 1865 280534. Alternatively, contact Paul Montgomery on 07771 800898 or email@example.com/ Alex Richardson on 07957 870085 or firstname.lastname@example.org Notes for Editors - The paper titled 'Fatty acids and sleep in UK children: Subjective and pilot objective sleep results from the DOLAB study - a randomised controlled trial' is due to be published online this week by the Journal of Sleep Research. For the full study, see DOI: 10.1111/jsr.12135. The research was carried out as part of the DHA Oxford Learning and Behaviour (DOLAB) study involving researchers in the Centre for Evidence Based Intervention at the University of Oxford, in association with Oxfordshire Local Authority. For more information, see http://www. spi. ox. ac. uk/ research/ centre-for-evidence-based-intervention/ dolab-studies. html The DOLAB studies are sponsored by the University of Oxford, with funding from DSM Nutritional Products, who provided the algal-source DHA supplements used in the treatment trial and also carried out the blood fatty acid analyses.'
<urn:uuid:2cce1983-93c5-4bbf-b17b-dbc580581856>
CC-MAIN-2015-11
http://www.eurekalert.org/pub_releases/2014-03/uoo-ssh030614.php
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462232.5/warc/CC-MAIN-20150226074102-00310-ip-10-28-5-156.ec2.internal.warc.gz
en
0.942865
1,042
3.171875
3
We’ve all had the painful experience of being handed a brochure that was “designed” with Word Art (or the slightly less painful Pages). The “designer” (we’ll call him Larry) beams, happy to see that his arched, distorted, glowing type is burning holes in your hands. You wouldn’t make those mistakes, would you? Of course not! You are an experienced designer, right? Right. That’s what Larry says. Some of the best designers have been tripped up by simple mistakes when designing for print. Obviously, we aren’t just talking about WordArt. We’re talking about a design that looks great on the screen, but it sits next to Larry’s best when you try to transfer it to paper. These are some common mistakes that many designers unknowingly make when coming to the print world. 1. Designing in RGB It is important to know that printers have eyes. Well… Sort of. Printers interpret data that is sent to them from an application or a device. That application or device outputs using a certain language, called a color space. The printer interprets the output, and then prints. So let’s say your Macbook Pro and CS4 are speaking Spanish, but your printer is speaking English. What basically happens: the printer listens, hears the Spanish, and tries its best to interpret it. Now, despite the fact that your printer may have taken AP Spanish in high school, it still doesn’t know every word in the dictionario. Fortunately, it’s fairly easy to fix this problem. On the first opening screen in Photoshop and Illustrator, you have the choice of working in RGB or CMYK. Pick CMYK if your design will ever make it to the print world. Photoshop settings for print design A word about color spaces… Without going much into detail, RGB refers to two different color gamuts (sRGB and Adobe RGB), both based on modeling light to produce colors. Red, green, and blue light can theoretically be added together to create any color of light, the “100%” mixture resulting in white. The natural “blank canvas” of RGB is black, or an absence of light. On the other hand, CMYK is based on mixing four colors (cyan, magenta, yellow, and “key,” an old printing press term for black) to theoretically reproduce any color. The natural blank canvas for CMYK is paper. Unfortunately, there are colors that cannot be reproduced in the gamut of CMYK that exist in the gamut of RGB, particularly brighter colors, especially in the cyan area. This is where we run into our problem. Simply put, RGB speaks better spanish than CMYK. There’s tons of literature on color management available online or in print. (Note: CMS, in the print world, stands for color management system.) 2. Forgetting to use Rich Black If there is an unforgivable sin, this would be it. Again, a simple understanding of CMYK is needed. A printer takes the CMYK info it is sent and puts out ink according to that info. CMYK value refers to a set of 4 numbers between one and 100 representing the amount of each color mixed in to achieve the desired color. So you would immediately guess that k=100 would mean black, right? Larry said so. K=100 produces a dark grey that is definitively not black. Once again, easy fix; use values for rich black. Rich black mixes in some cyan, magenta, and/or yellow to darken the 100% Key. There are many different opinions on what is best, but there are basically two kinds; warm and cool. Generally accepted values (in order of CMY) are 70, 50, 30 (known as “designer black”), 60, 40, 40 (cool black) and 40, 60, 40, (warm black). All of these are mixed with k=100. Some people say that a “C” value of 40 and a k value of 100 does the trick just fine; the point is to add some kind of extra into your blacks to make them… well, black. Do NOT use rich black for smaller text; registration problems (where one cmyk ink prints slightly in the wrong place) will make your text unreadable. And no one wants that. Usually using k=100 for black text is readable enough. Another neat trick: if your text is large enough that you want to use rich black, but is just small enough that registration may pose a threat, outline your text with .5 or 1 pt of k=100. This will take care of the registration problems. Note: the outline should be on the inside and should replace the original area it lays over, so that your text is not improperly displayed. 3. Using the wrong resolution A low resolution will show pixelation both on screen and in print Using high-resolution images ensures clarity Using the wrong resolution in your works can be detrimental to your final outcome. It is important to know the final destination of your work so that you can design at the correct resolution. Most printers print at about 300dpi (dots per inch), some even at 600dpi or above. The resolution of a monitor is 72ppi (pixels per inch), and is a default setting in Photoshop and Illustrator for RGB design. A few things to note… So let’s talk about some basic differences between dpi and ppi, and then decide what is best to use for different projects. Simply put, pixels are square, dots are… well, dots. They consist of one color. Obviously, the more dots or pixels per inch, the more detailed and accurate your picture will be. It is important to design at 300ppi so that when you print on a 300 dpi printer, each pixel is translated as a dot. It is okay to design at a higher ppi than your printer’s dpi, but be careful designing below 300ppi. Unless you are designing something huge, the magic number for print design is… you guessed it, 300dpi. Generally, anything that you can hold in your hands should be designed at or above 300dpi. It is especially important to note that though you can go down in dpi, you cannot go up without quality loss (when working with rasterized elements). Therefore, as long as your processor can handle it, it is best practice to work at 300 dpi or the maximum for your specific printer. Depending on the size of a particular piece, you may have to design for perspective resolution. In other words, a billboard, from the road, appears to be a couple of inches wide, so therefore the dpi can be much lower (often around 18-20 dpi). There are a million more mistakes that can be made in print design, but these are three of the most-often committed sins of print design. Last tip: to avoid mistakes, ALWAYS proof your prints, even if it costs you a little extra. That’s all for this post! Make sure you subscribe to FYC!
<urn:uuid:1eadb6c7-80d7-4712-808a-4fedf9dc06a1>
CC-MAIN-2015-11
http://www.fuelyourcreativity.com/3-deadly-sins-of-print-design/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462839.81/warc/CC-MAIN-20150226074102-00058-ip-10-28-5-156.ec2.internal.warc.gz
en
0.933824
1,522
3.0625
3
Why aren’t there more women in STEM? Girls and boys take math and science courses in roughly equal numbers from elementary school through high school, but far fewer women pursue science and engineering majors in college. Why? A new report says that despite gains by women, social and environmental factors still play a big role in maintaining a gender gap in the science and engineering fields. The report by the American Association of University Women is called “Why So Few? Women in Science, Technology, Engineering and Mathematics” and it analyzes the findings of dozens of studies on this subject. It concludes that the stereotype that boys are better than girls in math and science still negatively affects the performance of girls in these fields. Gender differences in self-confidence in STEM subjects starts in middle school and increases thereafter, with girls being less confident in their math and science abilities. But when teachers and parents tell girls that their intelligence can expand with experience and learning, the report says, they do better on math tests and are more likely to say they want to continue to study math in the future. Workplace bias is another factor, according to the report. Colleges and universities still don’t do enough to create environments in which women faculty feel comfortable; research shows that that women are less satisfied with the academic workplace and are more likely to leave earlier than their male counterparts. Institutions of higher education could attract more female students in the fields of physics and computer science departments by making small improvements, such as providing a broader overview of the field in introductory courses. How underrepresented are women in the fields of science, technology, engineering and math? The report quotes the National Science Foundation, which estimates that about 5 million people work directly in science, engineering and technology, just over 4 percent of the U.S. workforce. Workplace projections for 2018 by the Labor Department show that nine of the 10 fastest-growing occupations that require at least a bachelor’s degree will require significant scientific or mathematical training. Some of the largest increases will be in engineering- and computer-related fields in which women now hold one-quarter or fewer of the jobs. For many years boy outperformed girls in math, but now there is no longer a difference in average math performance between them in the general school population. And girls are earning high school math and science credits at the same rate as boys. On high-stakes standardized math tests, boys still outscore girls, though the gap has narrowed. Fewer girls than boys take Advanced Placement exams in STEM-related subjects, and girls who do generally earn lower scores. A few decades ago, the ratio of boys to girls in a very select group of seventh and eighth graders who scored higher than 700 on the SAT math section (1 in 10,000 students) used to be 13:1. But in recent years it has closed to about 3:1. The swift change, the report says, occurred much faster than it would take a genetic change to travel through the population. What about differences in cognitive skills between boys and girls? Five years ago Harvard University President Lawrence H. Summers upset the academic world by suggesting that the country’s shortage of elite female scientists might stem in part from "innate" differences between men and women. Critics accused him of saying that women are not genetically capable of doing math and science as well as men; Summers said he was misunderstood. The report says that researchers have found different cognitive strengths and weaknesses among boys and girls. Boys generally perform better on tasks that involve spatial orientation and visualization and on certain quantitative tasks that rely on those skills. Girls outperform boys on tests that rely on verbal skills, as well as on some tests that involve memory and perceptual speeds. The report cites one research study in which first-year engineering students took a course to improve their spatial-visualization skills. More than three-quarters of the females who took the course remained in the school of engineering, compared with about one-half of the women who did not take the course. Ultimately, the study makes a convincing case that “biology is not destiny.” Follow my blog all day, every day by bookmarking washingtonpost.com/answersheet And for admissions advice, college news and links to campus papers, please check out our new Higher Education page at washingtonpost.com/higher-ed Bookmark it! | March 23, 2010; 9:15 AM ET Categories: Math, Research, Science, Technology | Tags: AAUW report, gender gap in STEM Save & Share: Previous: Ravitch's NCLB book an unexpected best seller Next: One teacher’s cure for senioritis Posted by: shadwell1 | March 23, 2010 10:24 AM | Report abuse Posted by: cgallaway2000 | March 23, 2010 12:03 PM | Report abuse Posted by: cgallaway2000 | March 23, 2010 12:15 PM | Report abuse Posted by: bkmny | March 23, 2010 2:14 PM | Report abuse Posted by: eaglechik | March 24, 2010 7:38 AM | Report abuse Posted by: shadwell1 | March 24, 2010 11:41 AM | Report abuse Posted by: eaglechik | March 25, 2010 7:38 AM | Report abuse Posted by: pattyl11 | March 25, 2010 3:28 PM | Report abuse The comments to this entry are closed.
<urn:uuid:4dc89915-af83-4235-9574-5e97d2e9f37b>
CC-MAIN-2015-11
http://voices.washingtonpost.com/answer-sheet/science/why-arent-there-more-women-in.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462232.5/warc/CC-MAIN-20150226074102-00310-ip-10-28-5-156.ec2.internal.warc.gz
en
0.957572
1,136
3.328125
3
A horse's emotions depend on her surroundings and the emotions of her human counterpart. Some horses have a tendency to spook, while others are naturally nervous and over-reactive. When your horse acts up in your presence, give her a nice rub on the neck and back. This way the horse will know you are there and and start to feel safe again. Forming a trusting bond with your horse is the best way to keep her calm. 1Get ahold of yourself. If you are feeling nervous or upset, calm yourself down because it will only make the situation worse. Try to maintain a non-threatening posture by looking at the ground and turning slightly to the side(predators always look a horse in the eye), keeping your arms relaxed and at your sides, avoiding sudden movements also speak softly and calmly.Ad 2Yawn,sigh, smile or laugh. This will show your horse that you are not concerned. It will eventually become an instinct that whenever your horse gets scared you will relax! 3Identify and remove the cause of the distress, unless you're planning on "desensitizing" the horse to the situation. 4Allow the horse to do some things he instinctively wants to do. - Ask your horse to lower his head to the grazing position. - Rub the horse's withers and neck to imitate mutual grooming. - Give the horse something to eat. A hay net is best but treats can also work well. - Allow the horse to see around him and investigate objects. - Allow the horse some movement, by walking or release him into an enclosed area, if it’s safe to do so. 5If you can get your horse to hold its head still, carefully place your face close to its nose and exhale out of your mouth in time with the horse's breathing pattern. DO NOT BLOW. If you blow, the horse may find it ticklish and bite you.Ad We could really use your help! getting more involved? making money through chores? laundry and cleaning? - Never whip a horse for being scared. It is only reacting to its natural instinct, therefore always remember that horses are fight or flight animals. - Learn what scares or overexcites your horse, and try to anticipate these situations. - If the horse's fear is something common and everyday like a bicycle, for example, then before you go out on a hack where there will be lots of them, instead slowly get him used to the cycle. Place one outside the school/arena, pass it carelessly allowing him to notice it, that way when you do go out on a hack he'll think 'Oh yes, I've seen one of them before!'and will not react in an extreme way making it dangerous for himself and the rider. - Don't expect results straight away. It takes time with horses and you've got to be willing to be patient - If your horse is spooked easily, take the time to get him accustomed to these sounds, for example a door slamming. - To quickly regain your horses attention after a spook, or to distract your horse from scary things, keep it busy! Bending and flexing, serpentines, circles, etc. It always works for ANY horse. - If your horse rears while you are walking him, do not pull on the lead rope for this will cause him them to 1) retaliate or 2) cause injury. - By the same token, know the difference between a spooking horse and a lazy one- some horses will run out of a jump if they don't feel like their rider is committed. If that is the case, it is acceptable for you to give them a tap with the crop to teach them they have to jump. - No matter what you should never put yourself in danger. Your safety always comes first! - If your horse spooks face him toward where the sound came. - Consider contacting a trainer to help your horse overcome his fear. - Always keep a calm demeanor no matter what the situation. The horse can pick up on emotions like a magnet. - To avoid this problem, it is best to be with a horse who is good for your level of expertise. Green horses should never go with green riders. If you are a novice rider, it is best for you to be with older horses, who are less likely to spook and be high strung. - Protective clothing should be worn when handling horses. - You should never ride or be around horses with Tennis shoes or any other casual shoes, you should always wear boots with a small heel, never just flat bottoms. - Often, if a horse is so scared that he becomes dangerous (i.e. bucking, kicking or taking off), it is the best idea to simply dismount and get yourself out of danger. - Have an adult to watch you so nothing happens. - If you have a jacket with a zipper always have it zipped, many horses are afraid of a hanging zipper. It might rattle a little or gleam from light. Categories: Horse Care In other languages: Thanks to all authors for creating a page that has been read 139,217 times.
<urn:uuid:d30b9773-08c2-44ce-a088-aad5b226d086>
CC-MAIN-2015-11
http://www.wikihow.com/Calm-Your-Horse-Down-Quickly
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463460.96/warc/CC-MAIN-20150226074103-00185-ip-10-28-5-156.ec2.internal.warc.gz
en
0.949866
1,084
2.984375
3
Since its creation by the National Science Foundation (NSF) and the state of Illinois in 1986, the National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign (UIUC) has been a leader in the development and deployment of new computing and software technologies for the scientific and engineering community. Many recent NSF reports have stressed the need for a national cyberinfrastructure for science and engineering with tools, services, and resources far beyond those currently available. To meet the needs of scientists and engineers in the 21st Century, NCSA will: - Create cyberenvironments for science and engineering to enable scientists and engineers to take full advantage of the resources available in the national cyberinfrastructure. - Provide cyber-resources for science and engineering to ensure that the most demanding scientific and engineering problems can be solved in a timely manner. - Explore innovative systems for science and engineering to define the pathway to petascale computing and beyond. In addition, NCSA staff intends to collaborate with faculty and staff at UIUC and other universities to move cyberenvironments into the classroom. This will bring the benefits of the national cyberinfrastructure are made available to educators and students throughout the country. In this overview, we will discuss all of these issues. In December 2004 Thom H. Dunning, Jr. was appointed director of the National Center for Supercomputing Applications and Distinguished Chair for Research Excellence in the Department of Chemistry at the University of Illinois at Urbana- Champaign. He was formerly director of the Joint Institute for Computational Sciences, Distinguished Professor of Chemistry and Chemical Engineering at the University of Tennessee, and Distinguished Scientist in Computing and Computational Sciences at Oak Ridge National Laboratory. Before taking that position, Dr. Dunning was responsible for supercomputing and networking for the University of North Carolina System and a professor of chemistry at the University of North Carolina at Chapel Hill. Dr. Dunning was Assistant Director for Scientific Simulation in the Office of Science at the U.S. Department of Energy in 1999-2001, on leave from Pacific Northwest National Laboratory. In that position, he was instrumental in creating DOE’s new scientific computing program, Scientific Discovery through Advanced Computing. Dr. Dunning joined PNNL as Associate Director for Theory, Modeling & Simulation in the Environmental Molecular Sciences Laboratory in August 1989. In EMSL, he established a world-class research program in theoretical and computational molecular science and founded the Molecular Science Computing Facility. In February 1994, Dr. Dunning was appointed Director of the Environmental Molecular Sciences Laboratory. As Director, he oversaw the construction of the EMSL as well as the development of its research instruments and scientific research programs—a $230 million project—for DOE. In October 1997, Dr. Dunning was appointed the first Battelle Fellow at PNNL, establishing the highest scientific and engineering position in the Laboratory. Dr. Dunning has authored nearly 150 scientific publications on topics ranging from advanced techniques for molecular calculations to computational studies of the spectroscopy of high power lasers and the chemical reactions involved in combustion. Five of his papers are "Citation Classics" with over 1,000 citations each (one has over 5,000 citations, another over 4,000). He has organized symposia and workshops for the National Research Council, the American Chemical Society, the U.S. Department of Energy, the National Science Foundation, and many other organizations. Dr. Dunning was the scientific leader of DOE's first "Grand Challenge" in computational chemistry, which, along with the EMSL Project, led to the development of NWCHEM. NWCHEM is currently the only general computational chemistry code available for massively parallel computers, and has dramatically extended the range and accuracy of molecular calculations. Dr. Dunning is a member of the American Chemical Society, and a Fellow of the American Physical Society and of the American Association for the Advancement of Science. He has served on numerous national advisory committees, including NRC's AFOSR Chemistry Review Committee (1987-1990), NSF’s Advisory Committee for Chemistry (1991-3), and DOE's Council on Chemical Sciences (1996-9). He was the founding vice-chair of NRC's Chemical Sciences Roundtable (1996-1999) and organized its first two workshops. In April 1997, Dr. Dunning received DOE's E. O. Lawrence Award for "seminal contributions to the development and application of theoretical and computational chemistry" and, in February 2001, he was presented with DOE’s Distinguished Associate Award for his research, management, and leadership in the chemical, molecular, and computational sciences for the Department. Dr. Dunning received his B.S. in Chemistry in 1965 from the University of Missouri- Rolla and his Ph.D. in Chemical Physics from the California Institute of Technology in 1970. He was awarded a Woodrow Wilson Fellowship in 1965-66 and a National Science Foundation Fellowship in 1966-9. Previous positions include group leader of the Theoretical and Computational Chemistry Group at Argonne National Laboratory (1978-1989) and staff member and Associate Group Leader of the Laser Theory Group at Los Alamos National Laboratory (197378). These positions were preceded by postdoctoral appointments at the California Institute of Technology (1971-3) and Battelle Memorial Institute (1970-1). Cite this work Researchers should cite this work as follows: Stewart Center, Room 314
<urn:uuid:dc712010-6859-4813-b7f4-813a39dcdb1c>
CC-MAIN-2015-11
http://nanohub.org/resources/1266?rec_ref=1275
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462426.4/warc/CC-MAIN-20150226074102-00007-ip-10-28-5-156.ec2.internal.warc.gz
en
0.938649
1,115
2.578125
3
The New York Times, March 31, 2007 In Japan, a Historian Stands by Proof of Wartime Sex Slavery gThe Japanese military itself newly built this system, took the initiative to create this system, maintained it and expanded it.h IT was about 15 years ago, recalled Yoshiaki Yoshimi, a mild-mannered historian, when he grew fed up with the Japanese governmentfs denials that the military had set up and run brothels throughout Asia during World War II. Instead of firing off a letter to a newspaper, though, Mr. Yoshimi went to the Defense Agencyfs library and combed through official documents from the 1930s. In just two days, he found a rare trove that uncovered the militaryfs direct role in managing the brothels, including documents that carried the personal seals of high-ranking Imperial Army officers. Faced with this smoking gun, a red-faced Japanese government immediately dropped its long-standing claim that only private businessmen had operated the brothels. A year later, in 1993, it acknowledged in a statement that the Japanese state itself had been responsible. In time, all government-approved junior high school textbooks carried passages on the history of Japan's military sex slaves, known euphemistically as comfort women. gBack then, I was optimistic that this would effectively settle the issue,h Mr. Yoshimi said. gBut there was a fierce backlash.h The backlash came from young nationalist politicians led by Shinzo Abe, an obscure lawmaker at the time in the long-ruling Liberal Democratic Party, who lobbied to rescind the 1993 admission of state responsibility. Their goal finally seemed close at hand after Mr. Abe became prime minister last September. Mr. Abe said he would adhere to the 1993 statement, but he also undercut it by asserting that there was no evidence showing the militaryfs role in forcing women into sexual slavery. His comments incited outrage in Asia and the United States, where the House of Representatives is considering a nonbinding resolution that would call on Japan to admit unequivocally its history of sexual slavery and to apologize for it. To Mr. Yoshimi, Mr. Abefs denial sounded familiar. Until Mr. Yoshimi came along 15 years ago, the government had always maintained that there were no official documents to prove the militaryfs role in establishing the brothels. Mr. Abe was now saying there were no official documents to prove that the military forcibly procured the women ? thereby discounting other evidence, including the testimony of former sex slaves. gThe fact is, if you canft use anything except official documents, history itself is impossible to elucidate,h said Mr. Yoshimi, a history professor at Chuo University here. The emphasis on official documents, according to Mr. Yoshimi and other historians, has long been part of the governmentfs strategy to control wartime history. In the two weeks between Japanfs surrender on Aug. 15, 1945, and the arrival of American occupation forces, wartime leaders fearing postwar trials incinerated so many potentially incriminating documents that the Tokyo sky was said to be black with smoke. Even today, Japan refuses to release documents that historians believe have survived and would shed light on Japanfs wartime history. Although Mr. Yoshimi found official documents showing the militaryfs role in establishing brothels, he is not optimistic about unearthing documents about the militaryfs abduction of women. gThere are things that are never written in official documents,h he said. gThat they were forcibly recruited ? thatfs the kind of thing that would have never been written in the first place.h John W. Dower, a historian of Japan at the Massachusetts Institute of Technology, said Mr. Yoshimifs gextremely impressiveh work has gclarified the historical record in ways that people like Prime Minister Abe and those who support him refuse to acknowledge.h MR. YOSHIMI grew up in Yamaguchi Prefecture in western Japan, in a household with fresh memories of the war. He traces his interest in history to a junior high school lecture on the nationfs American-written, pacifist Constitution and its guarantee of human rights. He was impressed that the Constitution geven had something to say about a kid like me in the countryside.h After completing his studies at the University of Tokyo, Mr. Yoshimi concentrated on Japanfs postwar democratization. It was while searching for documents related to Japanfs wartime use of poison gas in the Defense Agencyfs library that he first stumbled upon proof of the militaryfs role in sexual slavery. Mr. Yoshimi copied the document but did not publicize his finding. At the time, no former sex slave had gone public about her experiences, and awareness of wartime sex crimes against women was low. But in late 1991, former sex slaves in South Korea became the first to break their silence. When the Japanese government responded with denials, Mr. Yoshimi went back to the Defense Agency. Of the half-dozen documents he discovered, the most damning was a notice written on March 4, 1938, by the adjutant to the chiefs of staff of the North China Area Army and Central China Expeditionary Force. Titled gConcerning the Recruitment of Women for Military Comfort Stations,h the notice said that garmies in the field will control the recruiting of women,h and that gthis task will be performed in close cooperation with the military police or local police force of the area.h In another document from July 1938, Naosaburo Okabe, chief of staff of the North China Area Army, wrote that rapes of local women by Japanese soldiers had deepened anti-Japanese sentiments and that setting up gfacilities for sexual comfort as quickly as possible is of great importance.h Yet another, an April 1939 report by the headquarters of the 21st Army in Guangzhou, China, noted that the 21st Army directly supervised 850 women. Mr. Yoshimi went public by telling Asahi Shimbun, a national daily newspaper. The attention led to years of harassment from the right wing, he said, including nightly phone calls. These documents had survived because they had been moved 25 miles west of central Tokyo before the end of the war, Mr. Yoshimi said. The postwar American occupation forces had then confiscated the documents, eventually returning them to Japan in the 1950s. DESPITE the governmentfs efforts to hide the past, Mr. Yoshimi succeeded in painting a detailed picture of Japanfs wartime sexual slavery: a system of military-run brothels that emerged in 1932 after Japanfs invasion of Manchuria, then grew with full-scale war against China in 1937 and expanded into most of Asia in the 1940s. Between 50,000 and 200,000 women from Japan, Korea, Taiwan, China, the Philippines, Indonesia and elsewhere were tricked or coerced into sexual slavery, Mr. Yoshimi said. Thousands from Korea and Taiwan, Japanese colonies at the time, were dispatched aboard naval vessels to serve Japanese soldiers in battlefields elsewhere in Asia. Unlike other militaries that have used wartime brothels, the Japanese military was the gmain actor,h Mr. Yoshimi said. gThe Japanese military itself newly built this system, took the initiative to create this system, maintained it and expanded it, and violated human rights as a result,h he said. gThatfs a critical difference.h Mr. Yoshimi said he was unsurprised by the most recent moves to deny the wartime sex slavery. He said they were simply the culmination of a long campaign by nationalist politicians who have succeeded in casting doubt, in Japan, on what is accepted as historical fact elsewhere. In 1997, all seven government-approved junior high school textbooks contained passages about the former sex slaves. Now, as a result of the nationalistsf campaign, only two out of eight do. gMr. Abe and his allies led that campaign,h Mr. Yoshimi said, gand now they occupy the center of political power.h YOSHIMI Yoshiaki , Co-chairperson of the Center for Research and Documentation on 's War Responsibility (JWRC) Japan To the home page of the Center for Research and Documentation on Japan's War Responsibility To the home page(Japanese)
<urn:uuid:f85585d0-7269-4e7f-b1ce-0534225952fa>
CC-MAIN-2015-11
http://space.geocities.jp/japanwarres/center/english/appeal04.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464193.61/warc/CC-MAIN-20150226074104-00206-ip-10-28-5-156.ec2.internal.warc.gz
en
0.965207
1,699
2.59375
3
CLEVELAND, Ohio -- At least 16 people at Ohio State University have fallen ill with mumps, a highly contagious respiratory disease caused by a virus, according to public health officials. While no one has been hospitalized, those who are infected are isolating themselves at home or on campus and Columbus Public Health is trying to figure out what caused the outbreak. (UPDATED March 25: Outbreak spreads to community, 63 cases total) OSU isn't the only university handling a mumps outbreak this winter. Fordham in New York City had 13 cases in late February, according to the city's public health department. All of the infected students there had been vaccinated against mumps, which is delivered in two doses as part of the measles, mumps, rubella (MMR) immunization series in childhood. At least 14 of the 16 who fell ill at Ohio State had received vaccinations as well, said Columbus Public Health spokesman Jose Rodriguez. The department is still waiting for information on the remaining two people, he said. Complicating the Columbus outbreak is Ohio State's spring break this week, which has sent home students who are potentially ill but not yet showing symptoms. The incubation period for mumps, or the time between exposure to the virus and when a person first shows symptoms, is between 14 and 25 days. Here's what you need to know about the mumps outbreak if you're a student, parent, or are just concerned about the disease: 1. Outbreaks happen. The vaccine against mumps is effective, but it's not fail-safe. Two doses of the vaccine, which are usually delivered first at a year old and again at 4 to 6 years old, confer about 80 to 90 percent protection against the disease, according to the Centers for Disease Control and Prevention. People who have received only one dose, those who received both doses but did not mount an adequate immune response to the virus, and those who are not vaccinated serve as a sufficient population to maintain mumps outbreaks, particularly in settings where people live in close quarters, such as colleges and the military. "This is a very contagious disease, a respiratory disease that's spread like the cold or the flu," said Dr. Frank Esper, an infectious disease expert at University Hospitals Rainbow Babies & Children's Hospital. "We see substantial transmission on college campuses where you bring numerous people together from a wide geographic area in a small space." The last large-scale mumps outbreak was in 2009-10, when a boy traveled to the United Kingdom, where the disease is more common, and then spread the illness throughout a summer camp in New York. More than 1,500 people were eventually infected. "Usually the source is from some traveler who has gone outside the U.S.," Esper said. Rodriguez said the Columbus Public Health department is working to investigate connections between the 16 students to identify the first case, though he said it's possible the department may never know where the outbreak started. "One third of cases never show symptoms," Rodriguez said, which means the person who brought the illness to campus may have never gone to the doctor. 2. Outbreaks don't mean the vaccine's useless. Even though most of the people who have mumps at Ohio State were vaccinated against the disease, it doesn't mean the MMR shot isn't working. In fact, Esper said, outbreaks like the ones at Ohio State and Fordham universities would likely have been much worse if fewer people were fully vaccinated. "The reason that you're seeing 16 cases instead of 1,600 is because so many people are vaccinated," he said. In the United Kingdom, there have been sustained outbreaks of measles and repeated outbreaks of mumps because of large numbers of unvaccinated children in the population. As the CDC explains it, it may seem like a high percentage of people who are vaccinated get the disease in the United States, but it's only because there are many more of these people in the population. "The fact is that vaccines provide substantive protection against contracting and spreading the virus, but nothing in life is 100 percent," said Esper. 3. Watch out for symptoms. If you're a student, parent of a student, or have contact with Ohio State students on campus or during break, it's best to be aware of the symptoms of mumps and get in touch with your doctor if you notice them. Fortunately, most people with mumps recover completely after a few weeks. The most common symptoms are similar to those of the flu: high fever, aches and fatigue. The virus can also cause a tell-tale swelling of the parotid glands in the jaw, called parotitis, which can be painful and make swallowing and eating difficult. "The vast majority of people don't have anything more than a mild illness," Esper said. Rare complications can include hearing loss, inflammation of the testes or ovaries, or inflammation of the lining of the brain. Death is extremely rare. In the 2009-10 outbreak, there were no deaths among the more than 1,500 infections. If you do feel sick or notice symptoms, call your doctor right away, said Rodriguez. It's important that the disease be evaluated and reported, he said. It's also possible that swelling of the jaw can become bad enough to make eating and drinking impossible, making IV fluids necessary, Esper said. Rodriguez said some of the people with mumps at Ohio State have required visits to the emergency room, but no one has been hospitalized. 4. Isolation matters. The best thing you can do to help prevent the spread of the disease is to stay home and stay away from other people, officials said. The Ohio State students are either isolated at home or on campus now, Rodriguez said. "That's critical in a highly contagious disease like mumps that's transmitted like the flu," he said. "Isolation comes fairly easy when you're very sick." Rodriguez and Esper also recommend basic hand hygiene and cold and flu etiquette -- washing hands frequently, using hand sanitizer, covering coughs with the elbow -- to cut down on the spread of the virus. 5. Students should get the MMR shot(s) if they haven't already. Ohio State students are due to return to campus next week, which may make it more difficult to maintain isolation and quell the outbreak. The long incubation period of the virus also makes it more difficult, Rodriguez said. "That's one of the challenges that mumps presents," he said. The Columbus Public Health department is recommending that students who have not received their two MMR vaccinations do so before returning to campus. The department is talking to state and federal public health officials about the possibility of offering a third "booster" shot to students, though it's not currently recommended by the CDC.
<urn:uuid:fe8bb76c-2a32-4ef5-9453-070c4994240f>
CC-MAIN-2015-11
http://www.cleveland.com/healthfit/index.ssf/2014/03/mumps_outbreak_at_ohio_state_f.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461359.90/warc/CC-MAIN-20150226074101-00179-ip-10-28-5-156.ec2.internal.warc.gz
en
0.975918
1,405
2.9375
3
What is Phenadoz?Phenadoz is an antihistamine used to treat the symptoms of seasonal and year-round allergies, non-allergic runny nose, conjunctivitis ("pink eye") due to inhalant allergens and foods, or allergic skin reactions. In addition, Phenadoz is used to prevent or control pain or nausea and vomiting during and after surgery, and it is used for the treatment and prevention of motion sickness. It is also used to help produce light sleep. Phenadoz is available as a suppository. What is the most important information I should know about Phenadoz?Phenadoz can cause drowsiness and impair mental or physical abilities. Do not drive or operate machinery until you know how Phenadoz affects you. Do not drink alcohol or take certain medicines that can cause drowsiness (such as sedatives and tranquilizers) without speaking to your doctor. Phenadoz should not be used in children less than two years of age. Serious and sometimes fatal breathing problems can occur when Phenadoz is used by children in this age group. Neuroleptic malignant syndrome (NMS) (a life-threatening brain disorder) can occur if you take Phenadoz. Tell your doctor immediately if you develop a fever, stiff muscles, fast or irregular heartbeat, or sweating. Phenadoz should be used with caution if you have a seizure disorder, are taking other medications that can increase your risk for seizures, have a breathing problem or lung disease, or have bone marrow depression. Who should not take Phenadoz?Do not take Phenadoz if you are allergic to it or any of its ingredients. Also, do not take Phenadoz for the treatment of lower respiratory (lung) tract symptoms, including asthma. Children less than two years of age should not take Phenadoz. What should I tell my doctor before I take the first dose of Phenadoz?Tell your doctor about all prescription, over-the-counter, and herbal medications you are taking before beginning treatment with Phenadoz. Also, talk to your doctor about your complete medical history, especially if you have central nervous system (CNS) problems, bone marrow depression, asthma or lung disease, glaucoma (high pressure in the eye), stomach or intestinal disorders, urinary problems caused by enlargement of your prostate gland or blockage of your bladder, heart problems, liver problems, Reye's syndrome (a potentially fatal disease of the brain and liver that most commonly occurs in children after a viral infection, such as chickenpox), alcoholism, are pregnant, plan to become pregnant, or are breastfeeding. What is the usual dosage?The information below is based on the dosage guidelines your doctor uses. Depending on your condition and medical history, your doctor may prescribe a different regimen. Do not change the dosage or stop taking your medication without your doctor's approval. Adults and children ≥2 years: Your doctor will prescribe the appropriate dose for you based on your age and condition. How should I take Phenadoz?Take Phenadoz exactly as prescribed by your doctor. Phenadoz suppositories are for rectal use only. What should I avoid while taking Phenadoz?Do not drive or operate machinery until you know how Phenadoz affects you. Do not drink alcohol or take certain medicines that can cause drowsiness without consulting your doctor. Do not expose yourself to the sun for a long time. Phenadoz can make you become more sensitive to sunlight. What are possible food and drug interactions associated with Phenadoz?If Phenadoz is taken with certain other drugs, the effects of either could be increased, decreased, or altered. It is especially important to check with your doctor before combining Phenadoz with the following: alcohol, anticholinergics (such as atropine or ipratropium), certain medicines that can cause drowsiness (such as alprazolam, diazepam, or oxycodone), epinephrine, or monoamine oxidase inhibitors (MAOIs), a class of drugs used to treat depression and other psychiatric conditions (such as phenelzine). What are the possible side effects of Phenadoz?Side effects cannot be anticipated. If any develop or change in intensity, tell your doctor as soon as possible. Only your doctor can determine if it is safe for you to continue taking this drug. Side effects may include: allergic reactions, blurred vision, breathing difficulty, changes in your blood pressure or heartbeat, confusion, disorientation, dizziness, drowsiness, dry mouth, faintness, hallucinations, involuntary muscle movements, nausea, NMS, overly excited, rash, seizures, sensitivity to light, sleepiness, vomiting, yellowing of your skin or whites of your eyes If you experience symptoms of NMS, contact your doctor immediately. Can I receive Phenadoz if I am pregnant or breastfeeding?The effects of Phenadoz during pregnancy and breastfeeding are unknown. Tell your doctor immediately if you are pregnant, plan to become pregnant, or are breastfeeding. What should I do if I miss a dose of Phenadoz?If you miss a dose of Phenadoz, take it as soon as you remember. However, if it is almost time for your next dose, skip the one you missed and return to your regular dosing schedule. Do not take two doses at once. For certain conditions, Phenadoz should be given under special circumstances determined by your doctor or given only as needed. How should I store Phenadoz?Store in the refrigerator.
<urn:uuid:16d3cebe-18bd-4f09-a9fd-80a4a85aa1dd>
CC-MAIN-2015-11
http://www.pdrhealth.com/drugs/phenadoz
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936465456.40/warc/CC-MAIN-20150226074105-00207-ip-10-28-5-156.ec2.internal.warc.gz
en
0.903074
1,162
2.59375
3
A Nineteenth Century Law Library: William Ferguson Colcock,son of Charles Jones Colcock, was born in 1804, in Beaufort, South Carolina. He received his early education at home, through the services of private tutors (1) and then attended a classical preparatory school in Charleston, run by Martin Luther Hurlburt. In 1823, he graduated from the South Carolina College, first in his class. (2) Daniel Walker Holllis, in his history of the University of South Carolina, said “The small but able class of 1823 included future Congressman William F. Colcock, long prominent in South Carolina politics, and future Chief Justice Franklin Israel Moses.” (3) Colcock was admitted to the Bar in 1825 and began his practice in the Beaufort District Court at Coosawhatchie. (4) In 1834, he was elected to the South Carolina General Assembly as representative from Prince William Parish. The Greenville Mountaineer wrote of him: “He commands in a very high degree the respect of the House. As a debater, he speaks well, fluently, and always on the subject. He is rather small and possesses quite a youthful appearance. His manners are those of a polished gentleman.” (5) In a memorial tribute, Joseph Daniel Pope, the first Dean of the Law School at the University of South Carolina, described the success of his long time friend, W. F. Colcock, at his chosen profession. He at once rose into a lucrative practice; in the Court of Sessions, particularly, he was constantly engaged for the defense, and he jumped from one jury to another, wringing from them successful verdicts in favor of his clients. The truth is, the young man was pleasing and popular; he aspired to the name, the honors and the emoluments of a successful advocate; and these he undoubtedly won. … . It cannot be said of him that he was a profound or scientific jurist. … . But this much can be truly said of him: in the Court House, in the heat of the conflict, in the conduct of his case, he was the equal of any; he had for ready use and at his fingers’ ends the rules of evidence; he was skilful [sic] and careful in putting his case upon paper according to the subtle forms that then obtained; he understood and was readily familiar with the rules of Common law practice; and armed with these weapons he was often the master of an adversary who was his superior in Black Letter lore. Mr. Colcock was a sound equity lawyer, but we think he preferred personally, the sharp, subtle, and logical refinements of the common law and certainly preferred the animated conflict of the Jury trial. And naturally so; because before the jury he was well-nigh irresistible … . (6) His skill as an attorney was admired even by opposing parties. He is mentioned in several entries in the journal of Thomas B. Chaplin (1822-1890), owner of Tombee Plantation. (7) Chaplin had been sued and the plaintiffs were represented by W.F. Colcock, William Ferguson Hutson, and James L. Petigru. The entry for February 27th reads: “Friday. Rained nearly all day, & very cold. Our case was called just before sunset, 2 bills were read & the court adjourned. Baker [the plaintiff] looks a little alarmed. His strong man Hunt [Benjamin Faneuil Hunt] has not come to defend him. He will have to trust to Colcock & Hutson.” (8) The next entry, for February 28th, describes the arguments of counsel at the court in Gillisonville. Our case took up the whole day from 10 o’clock until dark. It was very interesting. Baker was completely used up, and looked like a sheep-stealing dog. Pope [Joseph Daniel Pope], in his speech, called him a good for nothing bankrupt druggist from Broad Street, and Baker looked as though he could eat him up. Hutson spoke first, followed by Pope, Colcock & Treville. The three latter made splendid speeches. Colcock did well but he had a bad case, the evidence was too much against his client. The case will no doubt be decided in our favor. The judge was heard to say that his mind was made up before Baker’s side was heard, after hearing the bills & answers made, & the evidence given in. I suppose we will get the written decision in a few weeks. (9) In 1841, Colcock was elected Speaker of the House and remained Speaker until he was elected to the United States Congress in 1848. (10) He served in Congress for two terms, during which time he became a regent of the Smithsonian Institution, serving on the board with two future Presidents, Millard Fillmore (USA) and Jefferson Davis (CSA). It was an “appropriate appointment based on his consistent support of educational projects.” (11) In 1853, he became Collector of the Port of Charleston, an office he held under the Federal and Confederate governments. (12) Possibly because Colcock had served for many years on the Education Committee of the House, he was appointed in 1853 to a commission to investigate and report on the state of South Carolina College. (13) Several years later, he was championed as a possible president of the college by the Charleston Mercury, but the position was offered to Augustus Baldwin Longstreet. (14) After the conclusion of the Civil War, in 1866, he retired as Collector and returned to the Beaufort area to practice law. The U.S. Government sued him on his bond as Collector, for the recovery of fees collected during the conflict. The entire Bar of Charleston offered their services in his defense. (15) He opened an office with his cousin and son-in-law, Charles Jones Colcock Hutson, in 1866, with an office at Gillisonville Court House, practicing under the firm name of Colcock and Hutson. Four years later, Colcock’s son, Cornelius J. Colcock joined the firm. In 1872, the firm of Colcock and Hutson was dissolved, with W.F. Colcock and Cornelius Colcock practicing under the name Colcock and Son, and Charles J.C. Hutson practicing under his own name. He died in 1889, at home, at Ocean plantation. William Ferguson Hutson, cousin of William Ferguson Colcock, was born in 1815, at Jericho Plantation, his family’s lands on the Combahee River, outside of McPhersonville, South Carolina. He was a prominent lawyer in Beaufort district, with an office in Pocotaligo. (16) He appeared in court often with his cousin, W.F. Colcock, in the years before the Civil War. He was among the attorneys mentioned in Thomas Chaplin’s journal. He was a member of the “Secession” convention of 1860, the principal author of the Ordinance of Secession, (17) and a signer of the Ordinance. He served as a colonel in the Reserves during the Civil War. Although McPhersonville was largely destroyed by Sherman’s army, W.F. Hutson’s law office may have survived. His son remembers seeing “the bullet holes in my father’s law office.” (18) For a while, he owned Inverness Plantation, which he purchased from his cousin, W.F. Colcock, (19) but his “law practice was more fruitful of dollars than the plantation and at last he sold it [the plantation] … .” (20) Hutson moved his family to Orangeburg “shortly after the close of the Civil War, from his home in the Low Country about half way between Charleston and Savannah.” (21) He died there in 1881. |701 Main Street · Columbia, SC 29208 · 803-777-4155 · email@example.com||© University of South Carolina Board of Trustees|
<urn:uuid:1be7ac8a-2e03-4fc0-8d25-4b5ee189416a>
CC-MAIN-2015-11
http://www.law.sc.edu/colcock-hutson/the_people/generation_3.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463956.95/warc/CC-MAIN-20150226074103-00202-ip-10-28-5-156.ec2.internal.warc.gz
en
0.985284
1,710
3
3
Issued jointly by the Ohio Department of Aging, the Ohio Department of Health and the Ohio Older Adults Falls Prevention Coalition COLUMBUS - The Ohio Departments of Aging and Health will join the Ohio Older Adult Falls Prevention Coalition to observe Friday, Sept. 23 as Falls Prevention Awareness Day in Ohio and encourage all Ohioans to use the autumn season to educate themselves and their loved ones about the risk of falls and fall-related injuries that increases as we age. Aging and public health agencies and advocates across the state are spreading the word that many falls are preventable through five easy steps. "Falls are the leading cause of injury-related hospitalization and death among Ohioans age 65 and older. Falling can rob an elder of mobility and functional independence, and the fear of falling can lead to depression, isolation and feelings of hopelessness," said Bonnie Kantor-Burman, director of the Department of Aging. "The good news is that most falls are preventable. The Department of Aging is proud to be a part of the statewide coalition dedicated to raising awareness of falls and helping Ohioans identify risks and prevent injury." "Falls represent a critical public health threat to older adults," said Ted Wymyslo, M.D., director of the Ohio Department of Health. "An older Ohioan falls every two and a half minutes on average, resulting in two deaths per day, two hospitalizations per hour, and an emergency room visit every eight minutes. These preventable injuries cost Ohioans more than $4.8 billion each year. Yet, falls are not a normal part of aging. This myth must be dispelled so older Ohioans can live independent, productive and healthy lives." Five ways individuals and families can reduce the risk of falls: - Increase your physical activity. Simple exercise, like walking or swimming at least 15 minutes a day can help build muscle strength and improve balance, which can prevent falls. Exercise programs like Tai Chi that increase strength and improve balance are especially good. - See your eye doctor once each year. Age-related eye diseases, such as cataracts, macular degeneration and diabetic retinopathy, can increase the risk of falling. Early detection is key to minimizing the effects of these conditions. - Review your medications. Talk to your doctor or pharmacist about the medicines you are taking and whether they may cause drowsiness or dizziness. Discuss things you can do to ensure you are taking your medicines safely. - Remove environmental hazards. Look around the house for anything that could increase the risk of falls, including poor lighting, loose rugs, slippery floors and unsteady furniture. Remove or modify these hazards. - Think, plan and slow down. Many falls are caused by hurrying. Slow down and think through the task you are performing. Be mindful of possible falls risks and act accordingly. Individuals and families also can contact their area agency on aging or local health department to learn about available trainings and resources designed to reduce the risk of falls. Call toll-free 1-866-243-5678 to be connected to the area agency serving your community. More information on local health departments can be found on the ODH Web site at www.odh.ohio.gov. Facts about falls and older Ohioans: - According to the Centers for Disease Control and Prevention, 30 percent of adults age 65 and older living in the community fall each year. - Falls are the leading cause of injury-related deaths and the most common cause of nonfatal injuries and hospital admissions for trauma in older adults. - An older adult falls in Ohio every 2.5 minutes on average, resulting in two deaths each day, two hospitalizations each hour and an emergency department visit every eight minutes. - Older adults account for a disproportionate share of fall-related injuries. While Ohioans age 65 and older make up 13.7 percent of our population, they account for more than 80 percent of fatal falls. - According to the Ohio Department of Health, fatal fall rates increased 125 percent from 2000 to 2009. - The total estimated annual cost of fatal falls in Ohio is $646 million, while non-fatal, hospital-admitted falls cost more than $4.2 billion annually. - More than half of all older adults who live in residential care facilities or nursing homes will fall each year. - Most fractures among older adults are caused by falls. - The risk of falling increases significantly after age 75. - Falls account for more than 90 percent of all accidental hip fractures. - Fall-related emergency room-visit and inpatient hospitalization rates are higher for falls than all other injuries combined. - For about 1 in 3 older Ohioans, falls lead to injuries that resulted in a doctor visit or restricted activity. - The causes of falls vary with contributing factors including lack of strength in the lower extremities, the use of four or more medications, reduced vision, chronic health problems and unsafe home conditions. - Many people who fall, even those who are not injured, may develop a fear of falling, leading them to limit their activities, which in turn, may increase their risk for falls. About the Ohio Older Adult Falls Prevention Coalition - Comprised of professionals from health, aging and public safety agencies throughout the state, the coalition identifies statewide priorities for reducing the incidence of falls among older Ohioans and helps communities address the issue at a local level. They promote education and awareness, aid with falls prevention infrastructure building, help shape policy, develop interventions and risk assessments, and monitor trends. To join the coalition, visit www.healthyohioprogram.org/vipp/oafpc/oafpc.aspx or call 614-466-2144. Read more press releases...
<urn:uuid:5cd1ef8a-62d5-4752-b16b-5ad4c03852b5>
CC-MAIN-2015-11
http://www.aging.ohio.gov/news/pressreleases/2011/20110915.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463318.72/warc/CC-MAIN-20150226074103-00119-ip-10-28-5-156.ec2.internal.warc.gz
en
0.939366
1,185
2.671875
3
“Almost one in 10 of the nation’s 1,230 Superfund toxic waste sites have not yet been cleaned up enough to guarantee that people and drinking water supplies won’t become contaminated,” reported the Associated Press. “Environmentalists said those figures show the Bush administration is failing to protect public health, and Congress and the White House should reinstate a special tax to help fund the Superfund program,” the AP continued. But this election-year attack on President Bush by environmental extremists rings hollow, which becomes clear once the Superfund program’s dirty secrets are revealed. Superfund is the federal program providing for the clean-up of so-called toxic waste sites. The law was hastily passed after the 1980 elections by a lame-duck Congress and signed into law by a lame-duck President Carter. And all that lame-ness became part-and-parcel of the Superfund program. Clean-ups of Superfund sites were begun regardless of actual risks to local residents and environment, and regardless of cost. The Environmental Protection Agency infamously compelled site clean-ups base on unrealistic future scenarios such as a child consuming a teaspoon of the most contaminated soil from the middle of a landfill every day for years. Sites originally selected to be cleaned up, the so-called National Priorities List, were not selected on the basis of threat to the local community or environment but on spreading the wealth. The National Priorities List was established so that every state could have a Superfund site, no doubt because the clean-up program was more about local jobs than environmental protection. Businesses and landowners were forced to pay for clean-ups regardless whether they were responsible for disposing wastes at the sites and even if the disposals were done according to the existing law at the time. Superfund clean-up became a booming industry with about $50 billion in revenues by the mid-1990s. The Government Accounting Office projected in 2001 that as much as $300 billion will be required to clean up government-owned Superfund sites alone. And so we come to the most important but least known of Superfund’s “dirty” secrets — there has never been a single shred of evidence and not a single documented case of anyone ever becoming ill, getting cancer or dying because of contaminants at a Superfund site. That is based on my personal review of, and subsequent testimony to Congress in 1995 about, the records of more than 1,300 Superfund site histories prepared by the EPA. I have not seen any evidence or heard of any credible claim since that would change that. Despite all the hype and hysteria about the supposed dangers posed by dreaded “toxic” waste sites, the actual casualty toll at Superfund sites according to the EPA’s records amounted to the following: some “number” of pine trees, a few thousand fish, fewer than 100 cattle, six birds and three ponies. Even at the headline-grabbing Love Canal site or the Woburn, Mass., site featured in the John Travolta-movie “A Civil Action,” multiple studies have subsequently been unable to link the sites with any actual health effects in local populations. Another dirty secret of the Superfund program is that, while there is no evidence anyone has been harmed by the contamination at Superfund sites, perhaps thousands of workers and others have been killed or injured as a result of construction and traffic accidents related to clean-ups. According to a 1994 study by researchers at the National Safety Council, the likelihood of a fatality associated with excavation at a Superfund site is nearly 15 percent. Workers have been killed removing and cleaning underground storage tanks. A man was killed and 87 others injured when a backhoe dislodged a gas pipeline and gas flowed into an adjacent senior citizens’ home in Allentown, Pa., in 1994. Hospital attention was required by 116 factory workers in 1986, when a truck containing hazardous waste mistakenly spilled its contents into the factory ventilation system. There are also numerous examples of hazardous wastes being spilled during transport to landfills and incinerators. None of this advocates nonremediation of sites contaminated with wastes or sites where wastes are improperly disposed. They should be cleaned up, but only to that extent that makes sense — something not possible under the current Superfund law. Environmental extremists now want to reimpose a tax on businesses to pay for the Superfund program. Because the Superfund program and the EPA were messes themselves, Congress wisely let the tax expire in 1995 and has not come close to re-enacting it since. Over the last 24 years, the Superfund program has killed and injured more people, wasted more money and accomplished less than any domestic federal environmental program. Congress should incinerate Superfund, dump its ashes in a landfill with an impermeable liner, and pave over the landfill to ensure the program never comes back. Where toxic waste sites are a legitimate problem, we need a program that cost-effectively cleans up truly hazardous sites and that does not penalize (or kill) innocent parties.
<urn:uuid:33fc1f90-cc5d-440a-b94a-1cc62dd1ffb4>
CC-MAIN-2015-11
http://www.cato.org/publications/commentary/toxic-super-wasteful
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463104.7/warc/CC-MAIN-20150226074103-00075-ip-10-28-5-156.ec2.internal.warc.gz
en
0.961316
1,059
2.78125
3
Key: "S:" = Show Synset (semantic) relations, "W:" = Show Word (lexical) relations Display options for sense: (gloss) "an example sentence" - S: (n) stopping point, finale, finis, finish, last, conclusion, close (the temporal end; the concluding time) "the stopping point of each round was signaled by a bell"; "the market was up at the finish"; "they were playing better at the close of the season" - S: (n) conclusion, end, close, closing, ending (the last section of a communication) "in conclusion I want to say..." - S: (n) finale, close, closing curtain, finis (the concluding part of any performance) - S: (v) close, shut (move so that an opening or passage is obstructed; make shut) "Close the door"; "shut the window" - S: (v) close, shut (become closed) "The windows closed with a loud bang" - S: (v) close up, close, fold, shut down, close down (cease to operate or cause to cease operating) "The owners decided to move and to close the factory"; "My business closes every night at 8 P.M."; "close up the shop" - S: (v) close (finish or terminate (meetings, speeches, etc.)) "The meeting was closed with a charge by the chairman of the board" - S: (v) conclude, close (come to a close) "The concert closed with a nocturne by Chopin" - S: (v) close (complete a business deal, negotiation, or an agreement) "We closed on the house on Friday"; "They closed the deal on the building" - S: (v) close (be priced or listed when trading stops) "The stock market closed high this Friday"; "My new stocks closed at $59 last night" - S: (v) close (engage at close quarters) "close with the enemy" - S: (v) close (cause a window or an application to disappear on a computer desktop) - S: (v) close (change one's body stance so that the forward shoulder and foot are closer to the intended point of impact) - S: (v) close, come together (come together, as if in an embrace) "Her arms closed around her long lost relative" - S: (v) close (draw near) "The probe closed with the space station" - S: (v) close (bring together all the elements or parts of) "Management closed ranks" - S: (v) close (bar access to) "Due to the accident, the road had to be closed for several hours" - S: (v) close, fill up (fill or stop up) "Can you close the cracks with caulking?" - S: (v) close up, close (unite or bring into contact or bring together the edges of) "close the circuit"; "close a wound"; "close a book"; "close up an umbrella" - S: (v) close (finish a game in baseball by protecting a lead) "The relief pitcher closed with two runs in the second inning" - S: (adj) close (at or within a short distance in space or time or having elements near each other) "close to noon"; "how close are we to town?"; "a close formation of ships" - S: (adj) close (close in relevance or relationship) "a close family"; "we are all...in close sympathy with..."; "close kin"; "a close resemblance" - S: (adj) near, close, nigh (not far distant in time or space or degree or circumstances) "near neighbors"; "in the near future"; "they are near equals"; "his nearest approach to success"; "a very near thing"; "a near hit by the bomb"; "she was near tears"; "she was close to tears"; "had a close call" - S: (adj) close (rigorously attentive; strict and thorough) "close supervision"; "paid close attention"; "a close study"; "kept a close watch on expenditures" - S: (adj) close, faithful (marked by fidelity to an original) "a close translation"; "a faithful copy of the portrait"; "a faithful rendering of the observed facts" - S: (adj) close, tight ((of a contest or contestants) evenly matched) "a close contest"; "a close election"; "a tight game" - S: (adj) close, confining (crowded) "close quarters" - S: (adj) airless, close, stuffy, unaired (lacking fresh air) "a dusty airless attic"; "the dreadfully close atmosphere"; "hot and stuffy and the air was blue with smoke" - S: (adj) close, tight (of textiles) "a close weave"; "smooth percale with a very tight weave" - S: (adj) close (strictly confined or guarded) "kept under close custody" - S: (adj) close (confined to specific persons) "a close secret" - S: (adj) close, snug, close-fitting (fitting closely but comfortably) "a close fit" - S: (adj) close (used of hair or haircuts) "a close military haircut" - S: (adj) cheeseparing, close, near, penny-pinching, skinny (giving or spending with reluctance) "our cheeseparing administration"; "very close (or near) with his money"; "a penny-pinching miserly old man" - S: (adj) close, closelipped, closemouthed, secretive, tightlipped (inclined to secrecy or reticence about divulging information) "although they knew her whereabouts her friends kept close about it" - S: (adv) near, nigh, close (near in time or place or relationship) "as the wedding day drew near"; "stood near the door"; "don't shoot until they come near"; "getting near to the true explanation"; "her mother is always near"; "The end draws nigh"; "the bullet didn't come close"; "don't get too close to the fire" - S: (adv) close, closely, tight (in an attentive manner) "he remained close on his guard"
<urn:uuid:75698cac-d69b-490e-95fc-93315c5b4f84>
CC-MAIN-2015-11
http://wordnetweb.princeton.edu/perl/webwn?o2=&o0=1&o8=1&o1=1&o7=&o5=&o9=&o6=&o3=&o4=&s=close
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462555.21/warc/CC-MAIN-20150226074102-00028-ip-10-28-5-156.ec2.internal.warc.gz
en
0.925537
1,401
2.9375
3
A slender young male appears anxious sitting on the couch as you approach. He is awake and alert, acknowledging your presence by looking at you and saying, “Hey.” The dispatch information sent to you was for a 24-year-old male with a “racing heart.” Beginning your assessment, you feel warm skin and a rapid, irregular pulse. The patient confirms his chief complaint is a racing heart, and he feels hot and dizzy. He adamantly denies drug use and tells you this has never happened to him before. He says he caught a “bug” and has had a sore throat for several days along with feeling hot all the time. He reports having no energy for the past week and has been experiencing frequent diarrhea. He attributes all his symptoms to his recent illness. Today, however, his racing heart and dizziness have him concerned. Your physical exam reveals a healthy appearing young male. He’s anxious but responding appropriately. His skin is hot to the touch and breath sounds are clear. His pulse rate is weak and irregular at a rate of 160 beats per min. His blood pressure is 96/68 and respirations are 20 per minute. The pulse oximetry is 98% on room air and the capnogram has a good waveform with an end-tidal carbon dioxide reading of 28 mmHg. The cardiac monitor shows rapid atrial fibrillation. Your partner establishes an IV while you continue your physical exam. A blood glucose evaluation reads 210 mg/dL. He denies a diabetic history. The patient’s anterior neck is tender to palpation, and you notice a red spider-like mark on the patient’s cheek. He denies recent trauma. The patient denies chest pain or shortness of breath but remains aware of his rapid heart rate. He agrees that being transported for evaluation is a good idea. During transport, you administer a fluid bolus of 250 mL with a change in blood pressure to 100/70. The patient remains anxious and requests a window be opened because he’s so hot. The patient is delivered to the emergency department with no further changes. You let the receiving physician know you’re slightly perplexed about the patient’s presentation. The physician tells you she has a good idea but will run some tests and let you know. Following up with the emergency physician later that day, you learn that the patient’s symptoms were secondary to hyperthyroidism, most likely triggered by a viral infection. The thyroid gland is located below the larynx, anterior to and on each side of the trachea. It secretes thyroxine commonly known as T4 and triodothyronine more commonly referred to as T3. T4 is the most prevalent hormone secreted from the thyroid and almost all of the T4 is then converted to T3 in the body. Thyroid secretion is regulated primarily by thyroid-stimulating hormone (TSH) also known as thyrotropin, which is released by the anterior pituitary gland. As the levels of T3 decrease, there’s an increase of TSH. This causes an increase in secretion of T4 and T3. As T3 levels increase either by direct thyroid secretion or from conversion from T4, TSH levels decrease. These hormones are intimately involved in metabolism. A decrease in thyroid function (hypothyroidism) can cause a decrease in metabolic rate up to 50%. An increase in thyroid function (hyperthyroidism) can increase metabolic rate more than 60%.1 The patient in this case had hyperthyroidism, which is an elevation of circulating thyroid hormone. Specific diagnoses, such as thyrotoxicosis or thyroid storm, are subjective. Most of these patients have a history of Graves’s disease, which is chronic hyperthyroidism. It may be more plausible just to identify patients as being symptomatic secondary to elevated thyroid hormones. A virus is a common cause of acute hyperthyroidism. Hyperthyroidism presents with general signs of increased metabolism, including weight loss and heat intolerance. In addition, acute hyperthyroidism can cause anxiety, abdominal pain, increased defecation and diarrhea, palpitations and such arrhythmias as atrial fibrillation and dyspnea, and double vision and neck tenderness. Hyperthyroidism can also cause an increase in blood glucose levels and spider angiomas, which are red spider web-like areas on the skin. Severe presentations are rare, accounting for less than 10% of hyperthyroid cases.2 When severe cases present, patients can have acute heart failure and be comatose. These cases can be referred to as thyroid storms. Prehospital care is mostly supportive. Consider other causes of the patient’s symptoms, such as myocardial infarction and toxic ingestions. Support the patient’s blood pressure with fluid or cardiac rhythm management. In the case of extreme anxiety, the administration of a benzodiazepine is appropriate. Beta blockers can be administered to relieve the effects of the elevated thyroid levels. Long-term care will be focused on the cause of the hyperthyroidism. Although not a common call for EMS, it’s important to remember the role of the thyroid gland and include alterations in thyroid function as part of our differential. 1. Guyton A: Textbook of Medical Physiology. WB Saunders: 2000. 2. Nayak B, Burman K. Thyrotoxicosis and thyroid storm. Endocrinol Metab Clin North Am. 2006;35(4)663–686.
<urn:uuid:931444f4-3f4e-4351-8e28-5ffbdeddb2d4>
CC-MAIN-2015-11
http://www.jems.com/print/23729
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461359.90/warc/CC-MAIN-20150226074101-00178-ip-10-28-5-156.ec2.internal.warc.gz
en
0.945556
1,158
2.6875
3
Viewers: in countries Watching now: Whether it’s a short story, a product catalog, a technical manual, or a business report, every document needs a compelling format. Although the content and the length may differ, long documents have similar formatting challenges. In Word 2007: Formatting Long Documents, David Rivers uses his 20 years of training expertise to demonstrate efficient methods of formatting entire documents and making changes to specific sections and pages. He covers the details of how to use field codes and building blocks to streamline the workflow, and shares best practices for producing printed documents with a professional look. Exercise files accompany the course. In Word 2007, you have several options at your disposal for the way you can view a document you are working with. Depending on the type of document, the content, the eventual output for that document, certain views are more advantageous than others depending on the scenario. In this movie, we are going to focus in on the default view, which is known as Print Layout View, a useful view for working with long documents that are going to be printed. You can see I have already opened up the document we are going to work with in this lesson. If you have got the exercise files and you want to follow along with me, go to the Chapter 2 folder and open up PTBarnum2a. I'm on Page 3. The first page where we actually see some text and I'm in the default view, by default it's known as Print Layout View and my Zoom Level is set to 100%. So let's talk about that first. Print Layout View is definitely the best view for viewing the document the way you can expect to see it when it comes out on paper from your printer. But the zoom levels can allow you to look at content versus page layout depending on the setting. So let's go up to our View tab up here, one way to select the Zoom Level. We will all start at 100%. So if you are not looking at your document in full view, 100%, also known as normal size, give the 100% button a click. Now you can see the size of the paper, the contents on that paper, the way it's going to appear when it prints, actual size. Now down at the bottom in the bottom right hand corner of your screen you also have a Zoom slider. You have got a Minus sign and a Plus sign at either end and in between you have got this little slider button. You will see the level you are at, 100% just left of that Minus sign. So if you want to increase the size, zoom in to get more detail on the content or zoom out, you can slide to the left by clicking and dragging the slider, eventually you will slide right out to. There is two pages for example. And I'm looking at up to six pages and more. You will always see the level right here left of that Minus sign. Let's go back up to our View tab here in the Zoom section and click 100% to return to that view. Now there are some shortcuts up here as well. If I want to see a single page on my screen to give me a great idea of the page layout, the look and feel of the document, not necessarily the content, I can go to One Page. We have seen this before. To see facing pages side by side, the way I would see them in a book, that could be useful with a long document. I might select Two Pages. If I'm working on the content, another option is Page Width. When I click on Page Width, you will see that this is different from One Page or 100%. I can see the full width of my document but if you look down below, the Zoom Level is actually at 159%. I'm zoomed in past the normal size, but I can still see both sides of my page. I can't see the top and bottom without using the scroll bar to scroll up and down. You can see my document is zoomed in to a fairly high level. I'm going to go back to 100%. Now I want you to see over here on the left hand side that Print Layout is selected. We didn't have to do that. It is the default view. You also have these options, Full Screen Reading, Web Layout, Outline and Draft views. You will find those down here as well, next to your Zoom slider and the first button is selected. It appears that way Print Layout. As I hover over these icons there is Full Screen Reading, Web, Outline and Draft. I'm going to move back into my document up here. In Print Layout View we have some additional options available to us here from the View tab on the Ribbon. Notice that we have got the Show and Hide section. One option is to Show Thumbnails down the left hand side to help you navigate through a long document. Choosing Thumbnails, opens up a pane on the left hand side. Here you can see thumbnail representations of the various pages. The one that we are currently viewing over here to the right is shaded over here on the left. Now I can use this scroll bar to scroll through the various pages and when I click on a page, I see that page over here on the right hand side. Now I can increase or decrease the width of this pane if I want, by clicking and dragging the border. Now I can see more pages. Here you can see them side by side. So if I go to page 11 for example, I can see that's Chapter 1. I can scroll up and down, go back to Page 3 by clicking it here. I can adjust width of this pane. Bring it back down. Now we are down to single pages and when I'm done with this, I have two options. I can close it by clicking the X up here in the top right corner or deselect it from the Show/Hide section out of my View tab on the Ribbon. Just one handy feature while in Print Layout View that will allow us to navigate, especially with longer documents saving us a little bit of time, searching through page after page. Now the Document Map we will save for a little bit later on. It allows you to show a map of the various headings in your document. We will save that for later on when we start working with Styles and Headings and now it's time to move on to our next View. In the next movie, we will explore Full Screen Reading, another helpful view when it comes to working with long documents. There are currently no FAQs about Word 2007: Formatting Long Documents. Access exercise files from a button right under the course name. Search within course videos and transcripts, and jump right to the results. Remove icons showing you already watched videos if you want to start over. Make the video wide, narrow, full-screen, or pop the player out of the page into its own window. Click on text in the transcript to jump to that spot in the video. As the video plays, the relevant spot in the transcript will be highlighted.
<urn:uuid:165776b1-3c38-4726-b10a-63e5834868bc>
CC-MAIN-2015-11
http://www.lynda.com/Word-tutorials/Print-Layout-view/752/46928-4.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462555.21/warc/CC-MAIN-20150226074102-00028-ip-10-28-5-156.ec2.internal.warc.gz
en
0.936944
1,454
2.625
3
Posted October 6, 2012 in Moving Beyond Oil, Solving Global Warming, U.S. Law and Policy Federal officials at the Environmental Protection Agency (EPA) have pulled the curtain behind Enbridge’s effort to greenwash its tar sands pipeline spill into Michigan’s Kalamazoo River. On the same day that Enbridge told its investors that its tar sands spill and cleanup had made the Kalamazoo River cleaner, EPA ordered the Canadian tar sands pipeline company to resume its cleanup of the Kalamazoo River after finding that submerged oil “exists throughout approximately 38 miles of the Kalamazoo.” EPA’s findings, based on technical analysis from prominent scientists from the international oil spill response and recovery community, stand in stark contrast with the alternate reality that Enbridge is selling to investors and the public. Enbridge’s legacy in Kalamazoo was outlined by federal investigators as a company whose poor safety practices and failures to learn from past mistakes which resulted in the most expensive onshore pipeline disaster in U.S. history. The Canadian tar sands company’s recent attempt to gloss over this reality with a public relations campaign reveals the company has yet to learn this basic truth – simply saying something doesn’t make it so. EPA issued Enbridge with an enforcement action requiring the pipeline company to resume its two year cleanup in three sections of the Kalamazoo River. In these areas, totaling over five and a half miles of the Kalamazoo River, there is so much submerged oil that the river is spontaneously generating oil sheen and oil globules and in danger of spreading. Even with EPA’s new order, Enbridge will still be leave oil contamination in over 32 miles of the Kalamazoo River, where officials believe that the dredging necessary to recover the oil would cause more damage than benefit. That means that after Enbridge finishes the cleanup that EPA has ordered, the company will leave tar sands in place throughout over 30 miles of the Kalamazoo River. Enbridge’s attempt to greenwash its impact on the Kalamazoo River speaks for itself. In a presentation to investors this week, the company provided three quotes from anonymous local residents, fisherman and river enthusiasts, who gush about what Enbridge’s tar sands spill has done for the community. Focus on Operations, Presented in Enbridge’s 14th annual investment community conference October 3, 2012 Who are these people and where do they come from? As part of our Voices Against Tar Sands, we talked to folks in Marshall, Michigan. The people we talked to have names and stories to tell. It’s worth listening to what folks like Susan Connolly and Debbie Miller have to say about what Enbridge’s tar sands spill has done to their community. This isn’t the first time that Enbridge has opted to obscure a problem rather than address it. For instance, Enbridge’s plan to ship tar sands in super tankers through British Columbia’s sensitive inner coastal waters – a treacherous maze of tightly packed rocky islands and reefs - has generated a public uproar in the province. Enbridge’s solution? The company broadened the Douglas Channel by erasing 400 square miles of offending islands on a map which it then promoted in a public relations campaign. Even if you look closely at the supertanker on Enbridge’s map, it’s hard to tell whether its run aground on Hawkesbury Island or if it is still in Devastation Channel. Enbridge’s version of the Douglas channel compared to a scientists version, provided by SumOfUS During the Kalamazoo River tar sands spill, Enbridge initially denied that tar sands was spilled. As Congressional and federal investigations began to uncover additional details on the spill, Enbridge CEO Patrick Daniel backtracked, saying: “No, I haven't said it's not tar sand oil. What I indicated is that it was not what we have traditionally referred to as tar sands oil. ... If it is part of the same geological formation, then I bow to that expert opinion. I'm not saying, ‘No, it's not oil sands crude.' It's just not traditionally defined as that and viewed as that.” Patrick Daniels, August 12, 2010 It was tar sands diluted with volatile natural gas liquid condensate, technically referred to as diluted bitumen. And recently, a Canadian newspaper broke another Enbridge flip flop. During hearings before Canadian officials in May, Enbridge pitched the reversal of its line 9 pipeline as a means to provide conventional crude to Eastern Canada. In June, Enbridge officialsresponded to opposition to plans to build establish the Trailbreaker pipeline system to ship tar sands through New England, saying ‘we have been absolutely clear that the company is not pursuing the Trailbreaker Project… I’m not sure what more we can say or how clearly we can say this.” Belying Enbridge’s denials, this week a U.S. Freedom of Information Act (FOIA) request by the Natural Resources Council of Maine uncoveredthat the Canadian Consulate has made presentations to the governor of Maine to promote the arrival of tar sands in New England. Is it possible that Enbridge doesn’t traditionally view the Trailbreaker project the way the rest of the world does? It’s no wonder communities in the Midwest, New England, and British Columbia are balking at Enbridge’s plans to build and expand its tar sands pipeline network through their groundwater and rivers.
<urn:uuid:2ac878be-f494-4846-b535-a53eddf0bff3>
CC-MAIN-2015-11
http://www.tarsandsfreene.org/blog/federal-officials-interrupt-enbridges-greenwash-of-kalamazoo-river-tar-sands-spill
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463956.95/warc/CC-MAIN-20150226074103-00202-ip-10-28-5-156.ec2.internal.warc.gz
en
0.954272
1,150
2.734375
3
India is blessed with abundant sunshine and wind, and though the government is implementing one of the world's largest programmes in renewable energy, this will hardly reduce the anticipated shortfalls generated under conventional energy sources. Budgetary allocations for the promotion of renewable energy are still too low (0.8 percent of total funds allocated to the energy sector in the Eighth Five-Year Plan from 1992 to 1997) compared to conventional energy sources that operate with huge government subsidies. The realisation that the potentially huge market for renewable energy in India remained untapped due to lack of availability, affordability and reliability of renewables, and working to address this situation, has been the key to the trust\'s success. AuroRE is situated in Auroville, in Pondicherry, Tamil Nadu, which has been committed to the concept of sustainable energy since it was set up in 1968. The township itself is a remarkable demonstration of the application of renewable energy technologies. Residents of Auroville established the Centre for Scientific Research (CSR) on the premises in 1984. The CSR has pioneered various renewable energy technologies, including solar water pumping systems, home lighting kits, solar water heaters, PV powerplants, biogas plants, wind pumps and hybrid wind-solar systems. Having experimented with these technologies, the centre set up the AuroRE Trust to promote their commercial application in 1997. \"It's dynamics. We learn what works in Auroville, we take it out to other parts of India, where we learn new lessons which, in turn, help us improve what we are doing here,\" says Hemant Lamba, a manager at AuroRE. \"There were times when I thought we'd bitten off more than we could chew. We had to install 219 pump sets in three months over a huge area -- from a border village in Punjab to a place in West Bengal, from Kanyakumari on the southern tip of India to the northernmost village in Gujarat -- and we were beginning from scratch. We had no office up there, no technicians, no nothing!\" Since its creation, the trust has aimed to progressively introduce renewable energy technologies in India by interacting with product manufacturers, financial intermediaries, donor agencies and end-users. Its strategy to achieve this goal includes: - Developing into an Energy Service Provider (ESCO) to provide reliable energy supplies to rural and urban end-users. Facilitating the setting up of similar ESCOs throughout India. - Acting as a system integrator and installer, providing high-quality renewable energy systems to rural and urban populations in developing countries. - Providing innovative financial solutions to mitigate high-entry cost barriers for renewable technologies. - Operating as a maintenance and service company, providing proper and prompt maintenance service as well as advice to end-users. AuroRE has succeeded where others have failed mainly because it has concentrated on identifying and tackling the obstacles to the widespread use of solar power. For example, it uses bulk purchasing power to obtain bulk discounts, and works with micro-credit institutions to draw up special finance deals. Its approach has been to create \'solar entrepreneurs\' -- seeding businesses which can become self-sustaining, whether it\'s hiring out solar lanterns to market traders (and so replacing polluting and expensive kerosene lamps) or supplying and installing solar water pump sets to small farms. AuroRE\'s projects include installing 1,025 solar water pump sets to farmers in 11 Indian states, providing solar lanterns to street hawkers in Chennai and coordinating a rural electrification project in Ladakh using 8,700 solar home kits and 6,000 lanterns. \"No fumes, no startup problem, no trouble getting diesel, no night shift waiting for power from the grid. The solar pump has made our lives easier,\" says Punjab farmer Baljinder Singh, succinctly summing up the benefits of solar power. The installation of solar pump sets has made small and medium-sized farming viable. Farmers no longer have to rely on the notoriously blackout-prone state grid, and are able to save the Rs 35,000 they spend on diesel annually. The pumps are easier to operate and require less maintenance. AuroRE has also promoted the use of alternative lighting sources by providing solar lanterns to hawkers in Chennai. \"We are saving five litres of kerosene every month after taking a solar lantern on rent,\" says Murugan, a hawker. \"Our dependency on private drinking water suppliers is gone. After installing a solar pump we have been freed from the bondage,\" says Saraben, woman sarpanch of a village where a solar pump has been installed. \"People have a community life in the evening, after the installation of solar lights. Women at home have a better environment and children can study for longer hours,\" says Dhariya, a coordinator with Sahjeevan, a local network partner of AuroRE. AuroRE aims to set up a whole chain of \'local energy entrepreneurs\' by effectively providing the managerial, technical and financial back-up for new small businesses supplying solar energy. Under the leadership of Lamba the AuroRE team has developed trained manpower to ensure the quality and maintenance of their products. And, for the continuing success of its work, AuroRE has developed a network of sustainable enterprises among economically deprived communities, including training at least 250 people in the installation and maintenance of solar photovoltaic systems. In recognition of its success in popularising solar energy technology and its many uses, AuroRE, along with seven other developing country projects, has made it to the final shortlist of the Ashden Awards 2004, for sustainable energy initiatives, to be announced later this month. Contributed by InfoChange. Reprinted with permission from InfoChange India. To read another Global Envision article about how communities are working to protect the environment, see A Raindrop Cleans the Wetlands. Return to top
<urn:uuid:fe867391-d358-4af3-bc7e-9828355da69e>
CC-MAIN-2015-11
http://www.globalenvision.org/library/1/650
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462035.86/warc/CC-MAIN-20150226074102-00266-ip-10-28-5-156.ec2.internal.warc.gz
en
0.939837
1,226
2.734375
3
The siege of Barcelona of August-17 December 1808 was one of the great missed opportunities of the Peninsular War. The French had seized Barcelona on 29 February 1808, but had failed to secure the lines of communication back to Spain, most notably by not occupying the city of Gerona. This had not mattered in the early days of the French occupation, but in the spring of 1808 large parts of Spain had risen up against the French. The French commander at Barcelona, General Duhesme, found himself dangerously isolated from the main French armies around Madrid, while Spanish-occupied Gerona blocked the main road back to France. In an attempt to restore the situation, Duhesme made two attempts to capture Gerona. His first attempt to besiege Gerona, on 20-21 June 1808, ended after two unsuccessful assaults on the city. The second siege, which lasted from 24 July-16 August, was a much more serious affair. The besieging force was made up of most of the garrison of Barcelona, reinforced by a second French army under General Reille, which had advanced west from Perpignan. Gerona would soon be besieged by a French army 13,000 strong. Duhesme had made a very risky move. Barcelona was now defended by 3,500 Swiss and Italian troops under the command of General Lecchi. While his position was only threatened by the local somatenes (the Catalan militia, named after the bells used to summon them), this would not matter, for Barcelona was protected by the citadel of Monjuich, but on 23 July, on the day before Duhesme reached Gerona for the second time, the Marquis of Del Palacio landed at Tarragona at the head of a division of regular troops from the garrison of the Balearic Islands. Del Palacio was appointed Captain-General of Catalonia. His first move was to put in place a blockade of Barcelona, first by attacking the French outposts outside the city. On 31 July the last of these outposts, the castle of Mongat, surrendered to Lord Cochrane, who was assisting the Catalans. Lecchi now began to send panicky messages to Duhesme requesting urgent help and claiming that he was surrounded by 30,000 Catalans, who were attacking his outposts. The second siege of Gerona came to an unsuccessful end on 16 August. Duhesme was harassed all the way back to Barcelona, finally regaining the safety of the city of 20 August, but only after abandoning most of his supplies. 20 August is one of several dates often given as a start date for the siege of Barcelona, but at this point the Spanish were conducting a blockade rather than a regular siege. Del Palacio placed the Conde de Caldagues in command of the blockade, and gave him 4,000-5,000 of the local mountain militia and 2,000 regular infantry to defend a line up to fifteen miles long. Duhesme was still able to send out large columns to gather supplies, but they always ran a risk of being destroyed – the last such column was sent on 12 October, and was caught at San Culgat while attempting to make their way back to the city. It was during September and October that the Spanish missed their best chance to capture Barcelona. French reinforcements were on their way, but were too far away to intervene, while Duhesme had no more than 10,000 men in Barcelona and was outnumbered by at least three-to-one, while the population of Barcelona was ready to rise against the French at any moment. Unfortunately Del Palacio was not up to the task, remaining inactive at Tarragona, until eventually the Junta of Catalonia had him replaced by General Vives, previously the commander of the garrison on the Balearic Islands. He took command on 28 October. He was a little more active than Del Palacio had been. On 6 November he moved to the Llobregat River, just to the west of the city, and on 8 November even attacked the French outposts. He then remained inactive until 26 November, this time forcing the French to withdraw within the walls of Barcelona. By that date the best chance to liberate Barcelona had passed. Napoleon had begun to form a new army to reinforce the troops in Catalonia on 10 August, but it had taken until the end of October for the last of the forces allocated to this new army to reach Perpignan. On 5 November this force, now 23,680 strong, under the command of General St. Cyr, was finally under way. His first target was the town of Rosas, ten miles inside Spain on the coast road. The siege of Rosas lasted from 7 November-5 December 1808, and gave the Spanish one last chance to capture Barcelona, but once again Vives missed the chance. St. Cyr was still faced with a formidable task. The coast road to Barcelona had been destroyed by the Spanish guerrillas, while the inland road was blocked by Gerona. St. Cyr did not have enough time to besiege Gerona, and so St. Cyr decided on a very risky move. On 11 December he sent his supply train back towards Rosas, and plunged into the mountains with food for six days, enough ammunition for sixty rounds per man and no ammunition. If he had been forced to fight more than a handful of skirmishes, or more than one major battle, then the expedition would have ended in failure. By now food was running short inside Barcelona. If Vives had been able to delay St. Cyr for any length of time, then the city might still have fallen, and there were plenty of places on the road from Rosas to Barcelona where Vives’ field army could have held off the French, but once again he failed to move. Only on 12 December, after the French had bypassed Gerona, did he finally dispatch a division under General Reding to Granollers. After a dramatic march through the mountains, on 15 December St. Cyr’s army reached the main road at San Celoni, east of Barcelona. That evening he marched through the pass of the Trentapassos, the last strong natural barrier outside Barcelona. Only now did Vives move, but even now he refused to use his entire army, taking a single brigade to join Reding. On the morning of 16 December St. Cyr’s army was between four Spanish forces. To its right was a force of miqueletes, under the command of General Milans. Behind it was the garrison of Gerona, which had left the city, under the command of Marquis of Lazan, to follow the French, but they were miles to the north. Between them these two forces contained 9,000 men. Around Barcelona were 12,000 regular troops under the command of General Caldagues. Finally, at Cardadeu was Captain-General Vives at the head of 9,000 men. Only this final force would take part in the decisive battle of Cardadeu (16 December 1808). That battle ended in a French victory. When news of this reached Caldagues, in the lines outside Barcelona, he abandoned all of his positions east of the city, and pulled back to Molins de Rey, west of the Llobregat River. On 17 December St. Cyr’s army marched into Barcelona, ending the siege. St. Cyr was still not entirely secure, for the bulk of the Spanish army was still intact and close to the city. This soon changed, for on 21 December St. Cyr attacked the Spanish at Molins de Rey, inflicting a second defeat on them and driving the Catalan army away from Barcelona. |The Spanish Ulcer, A History of the Peninsular War, David Gates. An excellent single volume history of the Peninsular War, which when it was published was the first really good English language history of the entire war since Oman. This is a well balanced work with detailed coverage of those campaigns conducted entirely by Spanish armies, as well as the better known British intervention in Portugal and Spain.| |A History of the Peninsular War vol.2: Jan.-Sept. 1809 - From the Battle of Corunna to the end of the Talavera Campaign, Sir Charles Oman. Part two of Oman's classic history falls into two broad sections. The first half of the book looks at the period between the British evacuation from Corunna and the arrival of Wellesley in Portugal for the second time, five months when the Spanish fought alone, while the second half looks at Wellesley's campaign in the north of Portugal and his first campaign in Spain. One of the classic works of military history.|
<urn:uuid:a73d66ab-246a-4bec-9873-fc42be4e247f>
CC-MAIN-2015-11
http://www.historyofwar.org/articles/siege_barcelona_1808.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936459277.13/warc/CC-MAIN-20150226074059-00140-ip-10-28-5-156.ec2.internal.warc.gz
en
0.981907
1,785
3.40625
3
Technology and improved teaching and learning strategies are changing education as we knew it. A 2013 review conducted by David Cook of more than 1,000 individual studies with more than 50,000 participants revealed that “technology-enhanced simulation is consistently associated with large, statistically significant benefits in the areas of knowledge, skills and behaviors.” And “for direct patient effects, such as major complications, mortality, or length of stay, the benefits are smaller but still significant.” These findings, published by the Agency for Healthcare Research and Quality, underscore what many nursing educators and students have experienced firsthand. The ability to provide students with standardized clinical experiences on demand is a radical change in clinical education that allows the participant to assess, intervene in and re-evaluate a simulated patient’s condition and response to treatment. When health care simulation is combined with a theoretical framework, specific objectives developed and a briefing strategy identified, it can yield a unique and positive immersive learning opportunity. More impressive is that an overwhelming majority of today’s technically savvy students react positively to the experience when skilled facilitators set expectations before simulation and establish a trusting environment. Health care simulation is used in a variety of settings for student and employee orientation, physiologic assessment, deliberate practice, on-demand clinical experiences, reflective exploration, competency validation, communication and teamwork development, remediation, and high-stakes testing. The beauty of simulation-enhanced learning is that it uniquely and deliberately allows participants to make mistakes at the bedside in a controlled environment with no risk to a patient. Health care simulation shouldn’t replace all clinical experiences. However, specific and purposeful integration of simulation can be an incredible process to witness. Further, the subsequent debriefing, whether at the bedside or in a formal debriefing room, allows participants and peers to safely discuss competent practice, rehearse peer-to-peer communication, identify and correct errors and explore the implications for patients, apply clinical practice protocols, and examine clinical reasoning with a knowledgeable facilitator. Personally, I enjoy seeing the “light go on” in the face of the participants when they really “get it.” The rapid discussion of how they made the connection from their reading or didactic education to clinical application is the key. They are excited, and it is contagious. That’s when I know we have had a positive experience. Keys to successful simulation training experiences Successful simulation requires planning and practice. A programmatic framework with specific steps is essential to support successful repeatable outcomes. The process may include a theoretical framework, orientation to the simulator, an explanation of the facilitator and participant roles and expectations, and preselection of specific achievable and measurable objectives. Participants should understand this process. The participant should lead and be empowered through pre- and post-briefing to achieve true change in practice through discovery learning. Often administrators, staff, novice facilitators, course managers, clinicians and even participants may underestimate the preparation needed. In the educational environment, where you may have multiple groups repeating the same simulation, I am an advocate for a simulation expert and facilitator-led “dry run” of all simulations before implementation with participants. The dry run without participants allows the facilitator to see the experience from the participants’ perspective and ensures selection of a pre- and post-simulation process, especially when there are different facilitators within a course for each clinical group. This deliberate planning provides a vital opportunity for selection of learning preparation assignments, didactic coordination, review of and emphasis on objectives, coordination of vital equipment and medications, altering of the scenario, and agreement on a scenario stopping point. Most important, it verifies the presence of all physical and verbal cues that enable the participants to follow the clinical reasoning. Without these, simulation may not be aspirational or improve patient outcomes. Several vital components of a successful simulation learning program are dedicated simulation staff, effective coordination and scheduling, and an experienced debriefer — one who can guide the participants in discovery learning and not steal the “aha” moment. In fact, once a facilitator sees that light come on for the participants, he or she may never want to lecture again. National and state regulation Be aware that rules and regulations are being considered in various states regarding the use of simulation. In fact, in June 2013, the National Council of State Boards of Nursing (NCSBN) completed data collection for a three-year multisite study on the use of simulation in prelicensure programs. The results are being released Aug. 13 at the NCSBN annual meeting in Chicago. I encourage you to periodically check with your state boards for specific updates. As a simulation advocate, I am inspired by what the future of education holds and envision increased implementation into advanced practice with further development of advanced practice simulations, development of simulators that will allow more specific incorporation of advanced skills, and more independent interaction along with increased applications for development of products that will enable participant-led exploration of treatment interventions. While we have come a long way in the ability to provide on-demand clinical experiences, there is more to come. The future of simulation education is limited only by our collaboration with other disciplines, time for innovation and our imaginations. I truly believe advancements in health care simulation will continue to positively influence patient safety, increase competent practice, bring to life clinical education and encourage lifelong learning. — Lori Lioce is a clinical associate professor at The University of Alabama in the Huntsville College of Nursing, where she serves as simulation coordinator. She is vice president of operations for INACSL and is an Alabama State Nurses Association member. Standards for best practice With the rapid expansion in the field of health care simulation, standards for best practice have become increasingly important for quality, consistency, outcomes, and improvement of simulation programs and learning strategies. In 2011, the International Nursing Association for Clinical Simulation and Learning (INACSL) published the seminal work Standards of Best Practice: Simulation. This document includes seven standards, and each standard includes specific criteria, outcomes and rationales. The standards provide a vital framework for decreasing clinical variability, planning strategically, initiating research and providing faculty development. Four new standards, identified in 2013, are currently being prepared for publication in 2015 to address simulation design, research, standardized patients and interprofessional education. In 2013, the standards were updated and guidelines were added to assist implementation of the standards. These standards and guidelines are providing a framework for developing institutional policies and procedures. They are crucial to aid advancement of simulation programs, support the science of clinical simulation and standardize terminology while sharing evidence-based best practices. As health care education moves toward higher-stakes testing with simulation and health care facilities increase implementation of this teaching methodology to improve teamwork and decrease medical errors, the Standards of Best Practice: Simulation will continue to be a vital component of success. Agency for Healthcare Research and Quality WebM&M site: http://webmm.ahrq.gov/perspective.aspx?perspectiveID=138 To order a copy of the Standards of Best Practice: Simulation, go to www.inacsl.org. OJIN: Simulation in Nursing Practice:
<urn:uuid:44182f37-0a13-4708-8b9f-980e12918d55>
CC-MAIN-2015-11
http://www.theamericannurse.org/index.php/2014/09/02/new-validation-for-simulation-education/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464840.47/warc/CC-MAIN-20150226074104-00209-ip-10-28-5-156.ec2.internal.warc.gz
en
0.9181
1,472
2.578125
3
Kazunomiya: Prisoner of Heaven Discussion Guide - Grades: 6–8 About this book To the Discussion Leader For more than twenty years Japan had been isolated under its Chained-in Country policy. Foreigners were not to be trusted and virtually all foreign trade was prohibited. In 1846, Princess Kazunomiya was born into this world of international isolation. As the princess matures, her own sense of being isolated in the cloistered world of Japanese royalty mirrors her country’s Chained-in policy. Kazunomiya’s diary tells her story of royal intrigue, arranged marriages, and family loyalty set in a world of ceremony where beauty and literature are celebrated. As Kazunomiya matures, she feels more and more like a pawn with no control over her own destiny. Her arranged marriage to a young prince she has fallen in love with is canceled, and a new husband is chosen for her to cement the connection between her royal family and the army. When she is forced to move from the city of her birth and relocate miles and miles away, her poetry recalls her deep sadness and longing for the beauty of her home. For her fifth book in the Royal Diaries series, Kathryn Lasky presents young readers with an inside look at Japan in the 1800s with a special focus on the Emperor of Japan and his constant struggle for power in a world where foreigners and some of his own countrymen were constantly trying to wrestle away power and open Japan to the whole world. “I don't feel like doing anything and usually this is my favorite time of year,” writes twelve-year-old Princess Kazunomiya on the rice paper pages she keeps in an embroidered case. It is spring, 1858, in Kyoto, Japan, and Kazunomiya, half-sister of the Emperor, feels something is not right within the Imperial Palace where she lives. She has been promised in marriage to Prince Arisugawa since she was four years old, and her birthday has been changed in order to be compatible with his. Now Kazunomiya overhears plans being made for her to be married instead to young Tokugawa Yoshitomi (Yoshi), next in line to be shogun, Japan 's powerful warlord. When she learns that this marriage to Yoshi is strictly for political reasons, to strengthen the position of the Emperor with the shogun, Kazunomiya is confused and angry. Meanwhile, presumably to cheer her, Kazunomiya's lady-in-waiting, the elderly Auntie Umi, arranges for her to secretly meet Prince Arisugawa on several occasions. The young couple become very fond of each other and send many waka poems back and forth when they're apart. On a moon viewing night and at a formal tea ceremony, Kazunomiya is introduced to Yoshi, and she is not impressed. “He was perfectly nice, but so dull.” Later, Yoshi confronts her informally and reveals that he knows she favors Arisugawa, and he, too, has “another who has captured (his) heart.” He asks if they could, perhaps, become good friends. Kazunomiya is surprised and delighted, and she says, “How wonderful it is that he is so completely honest. It is so rare, so rare in this court full of deceit and treachery.” The old shogun dies, and Yoshi becomes his successor. At this time, an American ship enters a Japanese harbor, something that had never been permitted before. The fact that the shogun allows this to happen indicates that he may not be devoted to the Emperor. Kazunomiya writes, “Whatever happened to those who shouted, 'Revere the Emperor, Expel the Barbarians.'? What is to happen to my marriage to Yoshi? I have many mixed feelings about this. Arisugawa is my true love, but I certainly do not want Yoshi to be my brother's enemy.” Kazunomiya knows Yoshi didn’t allow the ship to enter Japan. It is the work of Ii Naosuke, his adopted father, and it disgusts her. She states, “Yoshi is but a puppet and if we do marry he shall be a puppet husband and I shall be his puppet wife in a puppet marriage where Ii Naosuke will pull the strings. That is no life.” As the family is traveling to their summer villa, Auntie Umi falls ill. The doctor is summoned along with a genza to exorcise what evil spirit might be causing her illness. With the genza is an eta, a spirit-catcher girl of the lowest rank of society. Neither the physician nor the genza is successful, and Auntie dies. Kazunomiya writes, “I shall miss Auntie, but I am not exactly sad. She led a long life with a deep sense of harmony and beauty and she was no one's puppet — no, never — for she was a true spirit.” Later, Kazunomiya sees Yoshi in disguise with the very eta who had been at Auntie's sickroom. Kazunomiya is outraged that Yoshi's true love is a girl of such low social status. Plans escalate toward the marriage of Kazunomiya to the new shogun. Decisions are being made without her consent: her birthday must again be changed to match that of Yoshi, her teeth blackening, coming-of-age ceremony, is scheduled without allowing her mother to choose the date, and her engagement to Arisugawa seems forgotten. Kazunomiya angrily writes, “They can try and make me their puppet…(but) no matter how they cut me to serve their purposes, within me there shall always remain a little spirit…. Perhaps it is the spark of the Fire Horse.” With the help of the women of the court, Kazunomiya has a secret teeth blackening ceremony on a day chosen by her mother. It is a memorable time with special gifts, and it is done according to tradition and not in compliance with the power hungry Empress Mother's agenda. Kazunomiya ends her diary temporarily as she waits for new part of her life to begin. Three years later, she is looking forward to her future as she writes, “My birthday is still my birthday. I keep in my heart my secret love for Arisugawa. But now on the eve of my wedding I prepare to go…to the capital city of Edo, where my friend, Yoshi, waits for me." Thinking About the Book - On the book cover, Princess Kazunomiya is called "Prisoner of Heaven." What does that mean? Do you think that is a good name for her? Why or why not? - Kazunomiya was born in the year of Fire Horse. Why does she write that this is bad? Does she have Fire Horse in her? - Describe the tradition of the “Princess Tree.” - What is the teeth blackening ceremony and why is it so important to Kazunomiya and her mother? - Why was the person chosen for Kazunomiya to marry changed to another groom? - Identify the following: Admiral Matthew Perry - At the wrestling matches Kazunomiya’s beloved Auntie tells her that sumo wrestling is a mental game more than a physical one. “Much of life is that way my children.” What does Auntie mean? - What is Japan ’s “Chained-in Country” policy? - Tell the story of the mirror and the rose. What is its connection to Kazunomiya and her life? Kazunomiya's opinion of people changes from her first impression of them. For example, she first thinks Yoshi is dull. What makes her change her mind? Also, she has a low opinion of the eta, Yukiko, whom Yoshi loves. Why does she change her opinion of Yukiko? Recall an instance when your first impression of someone or something changed. Tell about it. - One of Princess Kazunomiya's tasks is to learn to play the koto, a stringed musical instrument. Find out what this ancient Japanese instrument looks and sounds like. - The Japanese celebrate many festivals. Two very popular ones are Girl's Day (March 3) and Boy's Day (May 5). Learn about these celebrations. - How did Kazunomiya and her family celebrate these holidays? How are they celebrated today? - Kazunomiya writes waka poetry — a short form which as she says, “must have: something about the seasons, a sense of quiet and an underlying feeling of mystery.” Waka can run longer than three lines and is made up of alternating lines of five to seven syllables. Look at some of the poems Kazunomiya wrote. Try writing your own waka poetry. Share your poems with members of your Discussion Group. - Find out about the following: - Kazunomiya refers to various days by events that happen in nature. For example, March 15 is “The Time That the Frog Eggs Begin to Float,” and July 6 is “The Time of the Hot Winds.” Suppose you could name a month of the year with a new name describing what happens during that time. What would you call it and why? Discussion Guide written by Richard F. Abrahamson, Ph.D., Professor of Literature for Children and Young Adults, University of Houston and Eleanore S. Tyson, Ed.D., Clinical Associate Professor, University of Houston, Department of Curriculum and Instruction, Houston, Texas.
<urn:uuid:338f494a-88df-4365-96f6-0935f75700f2>
CC-MAIN-2015-11
http://www.scholastic.com/teachers/lesson-plan/kazunomiya-prisoner-heaven-discussion-guide
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463028.70/warc/CC-MAIN-20150226074103-00071-ip-10-28-5-156.ec2.internal.warc.gz
en
0.967245
2,035
2.703125
3