text
stringlengths
205
677k
id
stringlengths
47
47
dump
stringclasses
1 value
url
stringlengths
15
2.02k
file_path
stringlengths
125
126
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
47
152k
score
float64
2.52
5.16
int_score
int64
3
5
Ever wondered if Ridley Scott’s Alien anatomy is grounded in fact or just completely made up? Acid blood and a strong exoskeleton might sound implausible but there’s actually some basis for certain aspects of the Xenomorph design in the animal kingdom. With the release of Alien: Covenant this week (in the UK, the US have to wait until next week), we talked to the curator of Zoology at the National Museum of Ireland, Paolo Viscardi, to find out just how plausible the Aliens’ biology actually is. After all, a second set of jaws could come in handy. Could the host-parasite relationship actually happen? “It’s not uncommon for species to have multiple hosts in the real-world. There’s a species of liver fluke, for example, that goes from slugs to ants, then the ants get eaten by cows, the cows get eaten by people, and the people then poo out the eggs. They can’t do anything [to procreate] without the hosts – it’s an essential part of their developmental process. “How did something like that evolve? What you tend to find with evolution is you get increasing complexity, not because things are striving to get more complex, but because as you evolve a certain set of traits, that provides a bedrock for more traits to develop. So a species can start with quite a straightforward way of managing reproduction, but then somewhere along the line there’s an adaptation that has conferred an advantage. That’s what it’s all about really – small adaptations based on what you’re already doing that mean you do it better, and you produce more offspring.” Can eggs lay dormant indefinitely? “Seeds can last hundreds of years for some species of plants, but for eggs in animals, longevity isn’t quite so extreme – generally you wouldn’t be looking at years. Certain species can actually stay dormant for reasonably long periods of time, and you will find some waiting for certain conditions before the developmental process gets started. Nature’s quite good at developing mechanisms that get things to coordinate to have a better chance of survival. It’s not unrealistic to expect something to allow a species to have eggs with a very long lifespan, that are then triggered by an external influence. “For example, a lot of insects will lay eggs at the end of the year, and they won’t become viable until there’s been a really cold snap. That’s actually what gets the developmental process started, because it usually indicates the coldest part of the winter, and after that the embryo starts developing and reaches a point where it should be hatching about the right time for spring – it’s a timing mechanism to make sure you can avoid the worst of the weather.” Do any parasites take on the traits of their hosts? “You don’t really see that in the more complex multi-cellular animals – basically there’s too much to go wrong – but you do get lateral gene transfer in some bacteria and things like viruses. It’s a way of sharing genetic information without it coming from your own species – it can come in from elsewhere instead. For example, they might pick up things like being able to disguise themselves from a host’s immune system.” Is it possible to have a second set of jaws? “There are quite a few species that have mouth parts which kind of open and hinge outwards. Dragonfly larvae, for example, have this big hinged plate that sits under their mouths and shoots forward and grabs prey – the Alien’s mouth is actually very similar to that. Anything which increases your ability to increase your reach and your ability to grab prey unexpectedly is a bonus.” What about a big exoskeleton? “The trouble with an exoskeleton is you can’t grow in it, so you have to shed it – and that’s really the limiting factor. You can’t add new material to it without basically growing a new one underneath, shedding the old one, inflating the new one and then letting it harden off – it’s how lobsters and insects grow. Once you get to a larger size [like a Xenomorph], however, it gets quite difficult to do all that. As you get bigger, gravity and scaling factors mean you can’t keep your structures in the right position and your organs functioning while also maintaining the internal pressure that will harden off the exoskeleton. This is one that might be more problematic, though if you’re in space and dealing with lower gravity situations, then it might be more plausible.” Could a chestburster grow to adulthood in a few hours? “You need a source of material that you’re able to metabolise and pull into the growth process. Speed of growth is limited by metabolic rate, the amount of material available and the growth processes, and the metabolic processes would just take too long. I don’t think this would work.” Is acid blood even a thing? “With the Aliens, although it’s referred to as blood, is it blood or is it some kind of chemical substance which is being produced under the exoskeleton to act as a defence mechanism, while the blood’s something else somewhere else in the body? “There are certainly species that use blood as a defence mechanism. It’s generally things like lizards, which squirt acrid blood to deter predators. The acidic blood thing is problematic for other reasons, because generally if your blood’s that acidic it’ll probably denature any nutrients around your system. “But stomach acid’s a great example that very strong acids can be made in nature. Something as acidic as alien blood is not impossible to make – it’s very difficult and requires quite involved manufacturing processes, but that doesn’t mean that nature couldn’t do it. Nature’s pretty amazing!You’ve got things like bombardier beetles which make a little explosive and set it off in their backsides to deter predators, so there are some pretty crazy defence systems out there.”
<urn:uuid:82cf1359-8354-4135-b8ba-f007d4638bb0>
CC-MAIN-2023-50
https://www.gamesradar.com/wait-could-the-xenomorphs-in-alien-covenant-actually-exist/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.940446
1,316
3.125
3
The solar energy park The main elements of the energy park comprise the solar photovoltaic (PV) panels, the battery energy storage system (BESS) infrastructure and an onsite substation. The PV panels will convert the sun’s energy into electricity for storage on-site, then being exported to the grid via a cable connection. The principal components comprise: - Solar photovoltaic (PV) panels and modular ground-mounting structures - Supporting infrastructure – inverters, combiner box, transformers – converting the direct current to alternating current and stepping up the voltage so it can be exported to the national grid - On-site substation to export electricity from the energy park to the national grid; including a control building with an office, welfare space and storage - A battery energy storage system (BESS) storing electricity on-site then releasing it into the national grid when it’s needed most. It may also enable energy to be imported from the national grid so it can be stored until it is needed - On-site cables connecting the solar PV modules and energy storage system to inverters which, in turn, connect to the transformers - Fencing enclosing the operational areas of the site, with security measures including pole mounted internal facing closed circuit television (CCTV) around the site perimeter - Access tracks to the site during construction and for routine maintenance when the energy park is operational - New planting around the site perimeter and within the solar PV area to enhance biodiversity and improve the landscape - During construction in addition to the main construction compound, up to three temporary construction compounds will be required, as well as temporary roadways, to enable access to all the land within the energy park boundary - Opportunities for landscaping and habitat management will be explored in areas around the energy park equipment and other land within the DCO site to contribute to achieving Biodiversity Net Gain (BNG) Our updated concept masterplan shows our current indicative proposals for the design and layout of the solar energy park. Additional project design factors Solar PV and energy storage technologies are rapidly evolving. The parameters of the DCO application we submit will therefore maintain the flexibility to allow us to use the latest technology available at the time of construction subject to consent being granted. Our DCO application will however seek a consent that restricts those aspects of the solar energy park which have potential environmental impacts including: - Height of the solar panels - Dimensions of infrastructure such as the BESS and on-site substation - Location of solar panels in the energy park
<urn:uuid:3d41b1c6-bf08-4a9c-84c9-6577bad953ad>
CC-MAIN-2023-50
https://www.gateburtonenergypark.co.uk/the-project/solar-energy-park/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.898368
530
2.640625
3
When your eyes become bloodshot due to allergies or other causes, your first impulse may be to try whitening eye drops to soothe the irritation and restore the brightness of your eyes. Whitening eye drops are also known as redness-relieving eye drops. Several types are available, each differing in their chemical makeup, and thus the way they work. Whatever whitening eye drops you choose, read the instructions carefully. Using too much may actually make your red eyes redder or cause other unwanted side effects in the long run. Read on to find out how whitening eye drops work, tips for keeping your eyes bright and healthy, and more. Whitening eye drops mainly work in one of these two ways to make your eyes whiter: - Narrowing blood vessels. Some redness-relieving drops include medications that cause the blood vessels in the eyes to narrow (constrict). This makes the blood vessels less visible, reducing the red hue in the sclera (white part of the eyes). - Adding moisture. Other eye drops contain lubricants to prevent dryness and moisturize the whites of your eyes to make them feel better, and in some cases look whiter in the process. Keep in mind that some causes of red eyes may need more than whitening eye drops to clear things up. A bacterial infection, for example, may require antibiotic eye drops prescribed by a doctor. But for treating routine causes of red eyes, the following ingredients for eye drops may be helpful. Most of the widely used eye drops — both prescription and over-the-counter (OTC) varieties — contain decongestants or antihistamines. Decongestant eye drops work by narrowing the blood vessels in the eyes. When blood vessels widen, they can sometimes be visible, making the eyes look bloodshot. Other times, they give the sclera a red or pinkish hue. Decongestant eye drops include tetrahydrozoline (Visine) and phenylephrine ophthalmic (Prefrin). Antihistamines block the action of a chemical called histamine, which is released by cells in response to an injury or allergic reaction. Histamine, which triggers an inflammatory reaction in the body, can cause many symptoms, including itchiness, sneezing, and red eyes. Examples of antihistamine eye drops include ketotifen (Zaditor) and azelastine (Optivar). Some eye drops contain both a decongestant and antihistamine, such as the combination naphazoline/pheniramine (Naphcon-A). Originally FDA-approved as a drug to treat glaucoma, brimonidine ophthalmic (Lumify) also helps reduce swelling of blood vessels in the eyes. It’s in a class of drugs called alpha-adrenergic agonists, and it works by reducing fluid levels in the eye. Also known as artificial tears, lubricating eye drops are most helpful when your eyes are dry and irritated, such as from exposure to a dry or windy climate or looking at a computer screen for a prolonged period. Active ingredients in lubricating eye drops are somewhat similar to those in actual tears. The OTC product Refresh contains carboxymethyl cellulose, a compound that has the ability to remain on the eye for a longer period than more watery eye drops. OTC and prescription eye drops are generally safe to use, though you want to make sure any product you put in your eye has been approved by the Food and Drug Administration (FDA). If you try eye drops and your eyes feel irritated or uncomfortable, tell your doctor. You may need to try another brand or cut back on how often you use the product. Many labels for eye drops suggest placing one to two drops in each eye, up to four times a day. According to the American Academy of Ophthalmology, if you need to apply eye drops that frequently over a few days to treat redness, you should have your eyes examined by an ophthalmologist. This eye care specialist can determine what’s causing your symptoms. The effects of eye drops that cause blood vessels to narrow can wear off, and the eyes can become redder than they were before drops were used. This side effect is called rebound redness, and it can worsen over time. So you may want to consider using lubricating eye drops first to see if they’re sufficient for making your eyes look and feel better. In general, redness-relieving eye drops shouldn’t be used for more than 72 hours. If redness or other symptoms linger after 3 days, you should see an eye doctor (ophthalmologist or optometrist) for an evaluation. If you have narrow-angle glaucoma, you shouldn’t use redness-relieving eye drops made from decongestants. They can worsen your condition and cause the development of angle-closure glaucoma, which is a medical emergency. Glaucoma is treated with a variety of medications, including prescription eye drops that help reduce pressure inside the eye. A word on tinted eye drops Popularized by celebrities and a lot of media coverage in 2016, blue-hued eye drops are supposed to temporarily counteract any yellow or red in the sclera to make eyes seem whiter and brighter. A French product called Collyre Bleu Eye Drops, for example, contains ingredients such as boric acid and a blue dye called C1420651. The FDA found this blue dye ingredient, also known as methylene blue, unsafe and potentially toxic. Sale of these eye drops in the United States has since been banned. You can take other steps besides using eye drops to help avoid redness and eye irritation. Here are a few tips to try: - Stay hydrated and avoid dry air. Like every part of your body, your eyes rely on healthy fluid levels to work and feel their best. But exposure to indoor or outdoor environments that are too dry can easily rob your eyes of some of their moisture. - Take 20-second eye breaks every 20 minutes if you work at a computer or are watching television. Allow your eyes to rest to avoid eye strain, which can lead to redness, dry eye, and eye fatigue. - Make sure your diet includes sources of key vitamins, including vitamins A, C, E, and B complex. Nutrients such as lutein, zeaxanthin, and omega-3 fatty acids also support eye health. - Get at least 7 to 8 hours of sleep per night to allow your eyes to rest. - Wear sunglasses with ultraviolet (UV) ray protection. Whitening eye drops can provide some fast-acting results, reducing redness caused by allergies or certain other triggers. If the cause of eye redness is something like conjunctivitis (pink eye), you need medicated eye drops to treat the problem. When eye redness is likely caused by dry air or allergies, give lubricating eye drops a try first, and then consider drops with medication. And if you find you’re also having pain or any other eye symptoms, see an eye care professional soon.
<urn:uuid:4b53151c-71b5-4881-9e01-eb4dfe322058>
CC-MAIN-2023-50
https://www.healthline.com/health/eye-health/whitening-eye-drops
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.92618
1,506
2.984375
3
This essay focuses on the political, economic, and cultural history of Ireland and Northern Ireland. It is written for the participants in Stanford Travel/Study’s program, Ireland: Food, Culture, and Politics, March 28-April 8, 2022. I begin with ancient and medieval Ireland (7000 BCE-1170 CE) – original settlement, Celtic conquest, and Viking influences. I next look at British Ireland (1170-1921) and review Anglo- Norman settlement, English crown colonization, and the causes and impacts of the Great Irish Famine (1845-1849). For independent Ireland (1921-present), I ask how Irish politics evolved and why Ireland had slow economic growth until 1973 and then became Europe’s fastest-growing economy. In 1921, Northern Ireland chose to remain part of the UK instead of joining independent Ireland. In the final part of the essay, I examine political and economic transitions in Ulster during the past century, focusing especially on the Troubles (1969-1999) – the violent struggle between Protestant unionists and Catholic republicans. I append a time line, a bibliography for Ireland, and a description of sites that I visited in Ireland. Ancient and Medieval Ireland, Settlement of Ireland, Early Christian Ireland, Viking Incursions in Ireland, Norman and British Ireland, Anglo-Norman Ireland, Colonial Ireland, Ireland in the United Kingdom, Irish Free State and Republic of Ireland, Irish Free State and Ireland, Republic of Ireland – Political Evolution, Republic of Ireland – Economic Transformation, Northern Ireland, Protestant Province, The Troubles, Autonomy, Brexit,
<urn:uuid:12bebfed-6263-4054-8b03-eb3f9cf730f1>
CC-MAIN-2023-50
https://www.historyfortravelers.com/ireland
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.902746
326
3.359375
3
This essay focuses on the Italian Renaissance in Tuscany between 1300 and 1600. I wrote these lectures for two Stanford Travel/Study’s Tuscany Family Adventures Program – June 26-July 8, 2012 and June 26-July 7, 2016. I begin with a review of the Roman Empire, since the Renaissance was in part an attempt to return to Greek and Roman values and styles. I then look at artistic creativity, political control, and economic change in Renaissance Florence during that fascinating period. In particular, I seek insights into the evolving sources of Tuscan wealth – agriculture, foreign trade, and regional conquest. I try to understand how Florence rose to power, became Europe’s richest city, and then declined and was taken over by Austria. I attempt to identify the central legacies – ideas, technologies, art, and architecture – of the Tuscan Renaissance. My ultimate goal is to point out how and why Renaissance Tuscany contributed importantly to the foundation of Western culture. I append a time line, a bibliography, and a description of the sites that I visited in Tuscany. Tuscany Family Adventures Program, Gargonza, Siena, Arezzo, Pienza and Montepulciano, Lucca, Florence,
<urn:uuid:703ca0aa-370e-48ac-8378-3b5e10383667>
CC-MAIN-2023-50
https://www.historyfortravelers.com/tuscany
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.940899
259
2.859375
3
Mod 01-6 Philosophy and Principles - Level I Epistemology: Theory of Knowledge – The Basis of Functional Learning - Bacon and the Birth of Modern Science - Goethe and Newton - Functional Thinking - Two Ways of Knowing The process of learning is critical to your ability to become an effective practitioner. Heilkunst depends on the development of your various organs of knowledge, tapping into your power of intuition, imagination and inspiration on the basis of scientific principles, so that you can increase your powers of observation and assessment. Current methods of learning are too intellectual and abstract and are not grounded in nature. This Module provides you the solid basis for extracting the maximum benefit from the succeeding Modules. You will be challenged to change your way of seeing nature, health and disease that amounts to what Thomas Kuhn called a “paradigm shift,” or a new way of looking at both old and new facts to gain new knowledge. The Basic Principles of Homeopathy and Heilkunst - Law of Similars and Law of Opposites - Similar and Dissimilar Diseases - Artificial and Natural Disease - Constant and Variable Diseases - Dynamic Nature of Disease - Wesen and Geist - Dual Nature of the Living Principle - Hahnemann and the Natural Healing Power - Initial and Counter-action This Module introduces you to the basic concepts and principles underlying the practice of Homeopathy and Heilkunst. These concepts provide you with the foundation for the more intensive and extended exploration provided in subsequent Modules. Hahnemann’s Discovery of the Dynamic Nature of Disease - Historical Study of the Development of the Principles of Homeopathy and Heilkunst. In this Module you will be guided through the fascinating historical development of the basic principles of Homeopathy and Heilkunst (using the original texts), thus providing you with a concrete foundation and an appreciation for the logic, timelessness and consistency of these principles and their development out of Hahnemann’s direct observation of nature. In particular, the module contains the most complete explanation to date of the development of the dual remedy concept, which underlies much of the content of subsequent modules and is critical to the proper application of medicine. Disease – A Comprehensive View - Hahnemann’s Disease Categorisation - Two Ways of Identifying Disease - State and Condition - True Diseases and False Diseases - Disease Origins and Dimensions - Temporality of Disease - Members of the Human Being - Self-Limiting and Protracted Diseases - Natural Diseases and Spiritual Diseases The first responsibility of the true physician is to identify disease. This requires a profound appreciation for, and knowledge of, what actually constitutes a true disease. This Module provides you with a systematic exploration and exposition of the structure of disease to that end and provides the underpinnings for the later study of effective means of treating disease, as well as of the various homeopathic remedies and medicines used (Materia Medica). The Pathic Approach to Identifying Disease (Homeopathy) - Totality of Characteristic Symptoms of a Given Disease - Disease Gestalt and Disease Image - Complex and Totality - Disease Condition - Kent’s Repertory - Boenninghausen’s Repertory - Computer Repertories In this Module you will learn how to identify and treat disease by looking at the totality of characteristic symptoms of a given disease (pathic or variable Wesen diseases, on which much of traditional homeopathic prescribing is based) and the benefit and limitations of this method. The Module covers the use of the various homeopathic repertories developed to analyze the patient’s case in terms of their disease image, the differences between the repertories (when each is most effective), as well as an introduction to the main computer repertories and how they are used. The Tonic Approach to Identifying Disease - Disease Nosology - Elements of Disease: Feeling, State, Impression, Sensation - Dimensions of Disease - Genesis of Disease This is one of the most ignored or undeveloped aspects of Hahnemann’s system of remediation, involving the tonic diseases (of constant Wesen, meaning there are constant remedies for these constant diseases). Knowledge of these diseases provides you with an extremely powerful tool to ascertain these deeper diseases, often lying latent in the human organism, and then to quickly identify the relevant remedy for that disease. Prescribing in complex cases is made easier and treatment effectiveness is greatly enhanced by your knowledge of the tonic diseases and the remedies that cure them.
<urn:uuid:6c146863-10f7-45fa-8e30-83091693790a>
CC-MAIN-2023-50
https://www.homeopathy.com/college-academics/35/academics-diploma-programs-homeopathy-and-heilkunst-dhhp-philosophy-and-principles-level-iii
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.888625
967
2.96875
3
A description of the Kolb Brothers’ experience river-running the Green River through Lodore Canyon in late September, 1911. In Lodore Canyon Emery and Ellsworth Kolb quickly learned that a wild river made for a perilous journey. The Green River in this section is noted for its narrow channel, abundant boulders, and difficult rapids. Dropping 420 feet in twelve miles, the hydrologic forces funneled through this cut in the Uintah mountains are immense, measured at 9,000 cubic feet per second. At any moment, their wooden boats, laden heavy with supplies, were subjected to a force comparable to releasing five Olympic-sized swimming pools into a typical bedroom. Not only did several hundred rolls of motion picture film add weight, they were a logistical nightmare as they had to be kept secure and dry. The brothers hoped this added burden would pay out in years to come with a motion picture and photography show covering their exploits. The cold and rainy weather added to the difficulties of the trip. The arduous task of filming the journey compounded the typical trials of an already challenging whitewater expedition. On September 22nd, 1911, Emery and Ellsworth entered Lodore Canyon, a remote and rough stretch of river. The next day Emery’s boat, The Edith, struck a boulder and began filling with water, forcing them to unload supplies and make an emergency camp. Discouraged by the blunder and damaged plates, the brothers lined their boats —pulled them by rope— down Lower Disaster Rapid. Considering the canyon is only twenty-one feet wide and the river drops fifty feet into an undercut bank, Emery was probably correct in stating later in his book about the trip, that it “would be certain death to try and run it.” Disaster struck on September 27th, when the river pinned Ellsworth’s boat against a rock and ejected him from the craft as it filled with water. Their assistant, James Fagan, retrieved the soaked gear downstream while Emery rescued his brother. As they waited for gear to dry, the brothers tried their luck fishing. Surprisingly, the cold muddy Green sustained an abundant population of fish, and the trio reeled in fourteen in under half an hour. They needed those calories shortly, as the final and largest hurdle in Lodore lay just around the bend; the notorious rapids of Triplet Falls and Hell’s Half Mile. Despite wisely choosing to line their boats and portage their gear through this stretch, it was by no means easy. In the depths of the 2,800 ft. gorge, it took them nearly three hours, nine trips, and a 100-foot climb just to move The Edith and its gear. More rain followed, leading Fagan to break down in tears. Having successfully negotiated their first test of will power and technical skill, Ellsworth and Emery proved themselves to be competent rivermen. The fruit of their labor was the finest and earliest film ever produced of Lodore Canyon, and confidence that would be necessary for the many miles ahead.
<urn:uuid:2fdfa945-5aea-4aec-a9fb-04ac833225ea>
CC-MAIN-2023-50
https://www.intermountainhistories.org/items/show/67
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.972975
628
2.78125
3
By Robert Laxalt The National Geographic Magazine December 1974 Volume 146 – number 6 Published by the National Geographic Society He must have been tall in his youth. One could see that in the sweep of shoulders beneath his high-collared mountain jacket and the long-boned hands that clasped the rustic shepherd’s staff. Age and hard work had shrunk him in body, but there was enduring strength in his weathered face. In a low-lying part of Gascony they had warned me against the Aragonese shepherds who roam the high Pyrenees, saying they were a hostile lot. But I have found that mountain folk are much the same everywhere —and that flatland people are prone to confuse reticence with hostility. Leaving our car in the valley, my wife, Joyce, and I had hiked up to a grassy knoll to picnic on cheese, bread, and wine. A breath of wind had brought to us the faint tinkle of bells, and we followed the sound, clambering up hillsides and over moss-covered rock. The mountain where we met him lay almost astride the meandering Pyrenean frontier dividing France and Spain. It was a green mountain sprinkled with the golden buttercups of June and gashed along its flank by a torrent of frothing water. Peaks jagged as primitive spearpoints surrounded us, and a profusion of waterfalls dropped in white plumes to the valley floor. This is the wild heart of the Pyrenees, the mountain chain that stretches for 270 miles from the Bay of Biscay on the Atlantic side to the Mediterranean Sea. Raised by shifting landmasses and shaped by Ice Age glaciers, the Pyrenees encompass about 21,000 square miles and boast 40 peaks exceeding 10,000 feet. Thrusting out of the Maldives massif, the 11,168-foot Pico de Aneto towers over all. “Up here, at last,” the shepherd said, “it’s beautiful country. But I’m not so sure about what’s happening down there,” His arm swung out in the unconfined gesture of a mountain man, sweeping over the valley beneath us. Long and narrow, the Vallée d’sure in the central French Pyrenees testifies to the breakdown of the centuries-old isolation of the mountains. The shepherd’s gesture took in brightly painted new chalets and resort hotels. These stood on the outskirts of medieval hamlets with gray stone houses, guarded by the turrets of fortified churches. Ski lifts soared to the high peaks. Gigantic water pipes, two abreast, plummeted down the hillsides to a hydroelectric station. Once-secluded meadows bloomed with the blue and yellow and red tents of campers. Money once lured the young away. . . Though Aragonese Spanish was his native tongue, the shepherd spoke in meticulous but distinctly accented French. “ Before the tourist came, we were tranquil and content here. But our children saw their shiny cars and fancy clothes, and they imagined that everybody outside of our valley lived that way. They told us our life was one of hard work and poverty and little joy.” He shook his head, and I knew then what caused the sadness in his gray eyes. “I lost my two sons in progress,” he said. “ They went away to the big cities for money.” The shepherd turned away from us to follow his sheep. “Times are changing,” he said over his shoulder. “ But I don’t know why they should.” As Joyce and I descended the mountain, a ragged fringe of clouds began to obscure the sharp peaks, singling an approaching storm. We passed rude stone farmhouses and newly mown fields. Men and women hurried to gather hay before it was soaked by rain. A black-shawled grandmother, perched atop a wagon with wooden wheels, speed the hay that others pitched up to her. Urging us toward the car, rain lashed our faces and thunder and lightning bounced among those tight mountains in a deafening cannonade. Then I realised what was missing in the hayfields: the presence of sons. …But now it keeps them home I spoke of the shepherds’s sadness with Maurice Jeannel, a montagnard with alert, hazel eyes and strong hands. Historian and author, he has the reputation of knowing the fastnesses of the Pyrenees better perhaps than any other living man. We talked on a street in the nearby village of St. Lary —a street thronged with vacationists, trout fishermen, and city children whose faces were flushed by the fresh mountain air. “Until a few years ago,” Jeannel said, “that shepherd’s lament could be heard in villages from one end of the Pyrenees to the other. But the exodus of out young in St. Lary has begun to reverse itself. The ones who are now growing up now rarely leave.” He pointed to the street, crowded with visitors. “All these people need accommodation. Our young may not choose to work on the farms, but they find good jobs in hotels and restaurants, as carpenters in construction, as alpinists and hiking guides in the summer, and as ski instructors in the winter.” He shrugged philosophically, “Progress works changes, but it has its benefits, too. There is prosperity here now.” Because the peaks intercepts storms from the north, the Pyrenean slopes facing France are drenched with moisture, while the Spanish uplands are arid. Another division of this region is political: the boundary between France and Spain. Yet Jeannel spoke of the Pyrenees as if they were one region. “The Treaty of the Pyrenees that France and Spain signed in 1659 created the frontier,” he said. “Illogically it divided ancient peoples of common stock and language who share both sides of these mountains. In this part of the Pyrenees, as an example, we belong politically to France but have cultural ties with Aragon. After centuries of isolation, a recent thing like a boundary means very little. Even the advent of modernism will simply add another layer of civilisation without erasing our old essence.” Historic corridor to conquest My own ancestral race, the Basques of the western Pyrenees, was divided by that arbitrary frontier. Yet these oldest and purest of Pyreneans, whose language and blood type hint at an ancestry totally different from that of other European peoples, were bound by ties no boundary could divide. The same holds true for the more numerous Catalans, at least 6 million, who spend across a generous third of the chain from northeast Spain through the tiny principality of Andorra and over the mountains into France. Of the local languages of the Pyrenees, Basque is a unique tongue whose roots still mystify philologists, while Catalan stems from Latin. Both languages have incorporated influences of Spanish and French, which, even though the use of Catalan increases, are becoming the common means of communication throughout the Pyrenees. Despite their forbidding aspect, the Pyrenees have seen the great surges of European history. They were a passageway for the Celts, for the conquering armies of Hannibal and Ceasar, and, in the dark days of the Roman Empire, for the invading hordes of Vandals and Visigoths. After these intruders came the Arabs, who swept out of North Africa early eighth century, conquering most of Spain and penetrating as far north into France as Poitiers, where they were checked in 732. This massive invasion occupied only a few years, but nearly eight centuries passed before the Moors were defeated in Spain by Ferdinand II of Aragon and Isabella of Castile in 1492. The long-lasting Moors laid their imprint only lightly on the remote mountain valleys of the Pyrenees, so that very little physical evidence remains of their presence. After crossing the old invasion routes and the new passes over the mountains, I wondered if the modern rush to the Pyrenees was not changing the life of these mountains more swiftly that all that had gone before. One of the places where changes are particutary evident is aristocratic old Biarritz on the Bay of Biscay, at the western extreme of the Pyrenean chain. The gnarled trees by the sea still bend to the westerly breezes there, and the long combers still crash white against the monstrous rocks in the bay, filling crusted pockets that gush as if bleeding from a hundred wounds. Lovers watch the sea from protected hollows in those rocks. But while standing aloof from the restless turmoil of the sea, Biarritz on the land attests to a collision between the traditional and the modern. Vividly coloured hotels and apartment houses brashly intrude beside the staid facades of the grand old hotels that witnessed the comings and goings of Empress Eugénie, Napoleon III, Bismarck, and Queen Victoria. The famous hotel Victoria appears abandoned, its ornate balconies empty, its gabled windows shuttered. Villagers unfazed by innovations At the other end of the Pyrenean chain, in Gerona Province, the leisurely tempo of old Spain still holds sway. All along the route from La Molina in the region of Catalonia to the Province of Huesca in Aragon, villages of brown-walled houses with roofs of red tile like lie like caps over hilltops that command the valleys below. They seem to wait for invasions that will come no more. Women hang out their washing on balconies in the hot, dry sun. Shepherds graze sheep and goats on hillsides of little forage, and nut-brown children with sunny smiles drive mule carts on dusty roads. They seem oblivious to furious activity near La Molina, in the pine-forested mountains above them. I went to see the manifestations of all that activity: a growing cluster of hotels and, on the slopes above La Molina, 80 miles of ski runs and lifts. One of the prime movers in this development is former Spanish Olympic skier Felipe Rigat Tortorici. In his late thirties, he seems young to be an entrepreneur. But his athletic frame cannot contain a Catalan enthusiasm for what he and his associates have wrought. “We Catalans initiate almost everything of importance in Spain,” he says proudly. “In three years we hope to have facilities to accommodate 20,000 people winter and summer.” He guided us through the luxurious rooms and gourmet restaurant of his Rigat Palace Hotel. They had a Catalan flavour of burnished wood and gleaning tile. “Have you ever seen such elegance in tourist resorts anywhere?” He did not seek an Aswer. Bucolic road leads to Bedlam La Molina has some way to go to equal the changes that have been wrought in nearby Andorra. Nowhere has development so altered the old character of the Pyrenees as in that fabled principality that embraces fewer than 190 square miles. The Approach to Andorra, howerer, is deceiving. From the drab French valley rising beyond Foix, we mounted toward Port d’ Envalira, coming upon rough stone villages and enjoying the fragrance of fresh-cut hay. At the edge of the sinuous road, precipitous drop-offs were hidden in thick mist. When there was a rent in this curtain, one could glimpse green mountains and horses grazing near early-summer snowbanks. At the top of the 7,904-foot pass we came upon a flock of sheep and a young Andorran shepherd, who turned to look at us with startled eyes. With his blade face, long wooden stocking cap, and draping leather cape, he seemed a figure from the past. In an instant the mist that had enveloped everything gave way to brilliant sunlight, and far below us a valley was shimmering with dew and veined with a silver stream. As we descended along the road, stone walls laced the hillsides, enclosing solitary farmhouses. Scattered villages huddled under their rooftops. It was as if we had come upon a story-book kingdom. Then our route led down to the valley floor. Here the roads were clogged with diesel trucks belching black fumes. Steam shovels and graders gouged the meadow grass. Bulldozers toppled old stone buildings. Finally reaching the capital, Andorra la Vella, we found a traffic jam of monumental proportions. A lone policeman with curling mustachios tried vainly to cope. “Andorra is fully involved with progress,” said Casimir Arajol Duro, a gentle white-haired Catalan who is president of the local tourist office. “The population has more than doubled in ten years to 25,000 people, and it will probably double again in less time. There are already 215 hotels in Andorra, and three of four new hotels and dozens of new businesses come into existence each year. Andorra is poor no more.” He paused, then added hesitantly, “Perhaps we have gone too fast in this business of change. But we are moving now to preserve our old villages.” Many Frenchmen and Spaniards, as well as tourists from everywhere, travel to Andorra to shop at bargain prices; Andorra imposes only modest duties. Stores bulge with radios and cameras from Japan, cigars from Brazil, peasant skirts from Afghanistan, and liquors from all points of the compass. Actually a principality, under the protection of the Bishop of Seo de Urgel in Spain and the President of France, Andorra employs but 25 policemen and has no army, since it has never had war. Catalan is the official language. Political campaigns for membership on the ruling General Council are unknown. A candidate who files for office is simply assessed by the citizenry in casual cafe conversations. Andorra captivated Europe’s conqueror A short drive from the capital took us to the village of Santa Coloma and its 12th century Romanesque chapel. A shy, dark boy, whose family was entrusted with the key, led us into the sanctuary, which held a rare primitive statuette of the Virgin. Child-size, of carved wood, and about as old as the little chapel, it is one of only a handful of such pieces that still exist. I asked our young guide if we could go up into the tower, an Andorran landmark. “It’s a little dangerous, “ he said, “All right, I will show yuo.” We inched around a spiral stairway, brushing aside veils of cobwebs, and climbed up rotting wooden rungs, some of which gave way beneath our feet. From the belly I looked out upon the old Andorra that Napoleon is sits to have found so incredible he wanted it preserved as a museum piece. In the distance rose an encircling ring of mountains under snow. At lower elevations were deep forests, tobacco fields in young growth, and, along the Valira River, stately poplars. At our feet was revealed an intimate view of Santa Coloma, a view that had been denied us by the high courtyard walls that shouldered the winding streets. Through open doorways we could see women in their kitchens. Children laughed at play, men worked in little vegetable gardens, and chickens and pigs wandered at will. That view leaped unexpectedly into my consciousness in another village. But this time the experience was painful. Situated on a high knoll in the dry Spanish badlands of Aragon, medieval Terms has seen the passing of a hundred generations. Once its women paused to visit at the fountain and men conversed there after returning from the fields below at the end of the day. Today weeds sprout in the streets. Houses stand empty with broken windows. Leaning in dark entranceways are straw brooms no housewife will ever wield again. The church that was the core of life totters in neglect. Of Tiermas’s 800 inhabitants, only a handful remain. At the fountain in the square, I talked to an old man in tattered garments, and with pathetic remnants of shoes on his feet. “Do you see that reservoir down there?” he asked. “ Seventeen years ago it was a fertile valley. It was where we raised the crops that were our existence. Then the government decided they needed a reservoir there to irrigate the dry plains beyond. They bought our farmland and paid our people for their houses, and then located them somewhere else.” “There must have been sadness when the people of Tiermas had to go away,” I said. “Yes’” he answered. “But for the young, money managed to change that. In my case, I am very poor, and also very old, It is much too late for me to think of leaving.” I turned to watch a crippled man prodding a burro with a stick. The man continued: “We are all that’s left—the old who don’t want to leave their homes and the crippled who are afraid to go out into the world.” I left him standing alone by the fountain. Animals take over a village at dawn Joyce and I went down the rocky road and took the highway past the man-made lakes that provide precious water to the parched lower regions. We had seen a classic confrontation between the old and new — but one that was, in all times, inevitable. Days later, in the central French Pyrenees, our road climbed a river-cut chasm towards Gavernie, famed for its awesome bowl-like cirque, carved by a glacier long melted. It was evening when our car pulled into the village of Gavernie, which seemed almost as quiet as deserted Tiermas. Our room in the inn held an iron bed with a feather quilt. Dinner was a feast of trout fresh from a local stream, roast lamb, and the robust wine of the house. Afterwards we explored the silent streets. I was awakened at dawn by a commotion outside and threw open the shutters to a sight I shall never forget. The village was still locked in the shadow of the peaks, but the streets were filled with horses and donkeys trotting to hitching posts, where they would be hired by sightseers bound for the Cirque de Gavernie or into the mountains. Fully 300 animals clip-clopped along without guides. All seemed to know where they were going, except a young gray donkey that was turning in circles. A girl darted out of the shadows, caught him by the head, whacked him resoundingly on the rump, and sent him in the right direction. Home of the eagle and the izard When the sun cleared the peaks, we rented two little short-coupled horses. Crossing a low bridge and following a swift stream, we tool the climbing path toward the cirque, which is in France’s National Park of the Pyrenees— 142,000 acres along the frontier. A few miles across the border lay Spain’s National Park of Ordesa. The parks shelter rare flowers, birds, and such animals as the izard, the goat like antelope also known as the chamois. The immense amphitheatre of the Cirque de Gavernie burst into your view, and I understood why Victor Hugo called it “ the Colosseum of nature.” Only nature could have shaped this two-mile wide-bowl. The brutal rock wall reared a mile above the floor. On the upper reaches, snowy patches reflected the morning sun in blinding shafts of light. Standing beneath that overpowering mass, I knew what it was to feel diminished to the size of an ant. Several years ago, on a trip to the Basque region in the west, my wife and I climbed above the timberline and saw shaggy ponies running free on the high plateaus. Called Pottokak by the Basques, these animals are believed to be descendants of certain races of prehistoric horses painted on the walls of caves such as Lascaux in France. When I first saw the pottokak, their numbers had been reduced to 4,500 by hunters, who killed them for meat to be used in salami. Then Paul Dutournier, the honorary Mayor of Sae in the Basque Provice of Labourd, waged a successful campaign to provide the ponies with refuge. The mountain of La Rhune, looming ghostlike behind the old fishing port of St. Jean de Luz on the French side of the frontier, is today one of the principal pottakak reserves. From the Col de St. Ignace we mounted La Rhune on a funicular that passed over tangled forests of beech and oak. On the soft green plateaus above, we now saw colts gamboling through purple lupine while their slate coloured mothers browsed. In the span of a few years, the herd has grown almost tame; no longer do they flee at man’s approach. I like to think it a proper coincidence that descendants of prehistoric horses should find a home on La Rhune, a mountain that perhaps played a role in the ancient history of the Basques. Here their warriors ancestors hay have engaged in pagan worship and fertility dances; isolated, fiercely resisting change, they were belated converts to Christianity. In 1609 their tenacious hold on primitive beliefs brought about one of the bloodiest chapters in Basque history. Hatred of Basques led to burnings From La Rhune’s summit we looked down upon St. Pée our Nivelle, where Pierre de Lancre conducted sorcery trials. “De Lancre was a fanatical man, driven by a hatred of all things Basque,” historian Eugène Goyheneche told me in nearby Ustaritz. “Appointed by Henry IV of France to investigate sorcery, de Lancre convinced the king that the Basques practised devil’s rites on La Rhune. By torture and bribery, he turned neighbour into informer against neighbour. Before his reign of terror was done, he had burned hundreds of men, women, and children at the stake— thus adding to the large numbers of victims of the sorcery trials that swept through Europe.” On the outskirts of St. Pée our Nivelle stands the crumbling chateau where Pierre de Lancre stayed during the trials. We wandered through its dark interior, where the very walls seem to shriek of agonies suffered there. A lizard of mottled green and black scurried up a wall and watched us from a ledge, sending a chill up my spine. When we quit that sanctuary of evil, sunshine had seldom been so welcome. Pagan monuments survive in the mountains In some remote mountain villages of the Basque country, Catholic masses on certain feast days still are celebrated to the accompaniment of ceremonial dances from pagan times. Pagan monuments have been found throughout the region. Our search for one of the pagan ritual sites took us on a tortuous pilgrimage up a hill that rises in the old Basque Province of Soule. Through mist so thick the way was almost invisible, we went to road’s end by car, then continued afoot. At the top stood the chapel of the Madeleine. Recently reconstructed, the chapel enshrines a Christian altar. But it also contains an almost undecipherable stone marker inscribed in Latin and cloaked in time-dimmed mystery. The most likely explanation: it was dedicated to Heraus, “goddess of the red dust,” and was part of a pagan sanctuary maintained by the Romans on the hill of Madelaine two thousand years ago. It is strange to find such relics only sixty miles by road from one of Christendom’s most venerated shrines. In spring and summer the streets of Lourdes are jammed. Priests, nuns in habits of black, blue, or white, and monks in sandals mingle with tourists from far corners of the world. The air is alive with many tongues. It was at the grotto of Massabielle in 1858 that young Bernadette Soubirous, of an impoverished family, saw visions of the blessed virgin, Bernadette said the Virgin had caused a spring to flow from the cave, and wished processions to be made there. Today pilgrims stand patiently in line before fountains whose water, many testify, have helped to work cures. Old women in black scarves sit on stone benches, clutching rosaries. But the most moving spectacle at Lourdes is of hundreds of sick and crippled people on stretchers and in wheelchairs. They look with beseeching eyes at the white-robed statue of the Virgin in her rock niche, and the sound of prayers is like the rustle of autumn leaves in the wind. From the tower of the Chateau of Lourdes we witnessed a candlelight procession. Legend tells that from an earlier tower at this site, Moors looked out upon the besieging soldiers of Charlemagne in 778. Within the battlements of the present fortress, staircases and sentry walkways, now deeply worn, knew the tread of other armies that surged across the Pyrenees. Today the castle houses the Pyrenean Museum, whose collections—furniture, costumes, and examples of architectural styles— are unmatched elsewhere in the mountain realm. Many of the old styles have changed, of course, and some have disappeared. But other Pyrenean manifestations endure. One is the character of the people. The Aragonese are often described as stubborn. Catalans speak of their pragmatism. In the region of Béarn, hotelier Jean Touyarot, who guided us through the sprawling chateau in Pau where Henry IV was born, told me the Béarnais are romantics with a positive outlook. “ Our old dictum stills applies.” he said. “ A man who cannot at least promise to do something for a friend is a very poor man indeed.” Secrecy an inviolable tradition Among the Basques, restraint and the guarding of village secrets are living traditions. The code of silence was demonstrated in 1970 during the trial of young Basque revolutionaries in Spain. Two days before the trial began, a West German consul accredited to Spain was kidnapped in San Sebastian. The consul was spirited over the mountains by other revolutionaries to a French Basque village, and held hostage against the chance that the youths would be sentenced to death. One of the villagers told me: “Many of us in the village knew he was here— even the location of the house where he was held prisoner. We were disturbed, but the revolutionaries promised they would not kill him. That satisfied us, so we ignored the whole affair. In time, they drove the consul to Germany and released him unharmed.” The man shrugged. “ It never occurred to us in the village that our secret was anybody else’s business, or particularly the government’s.” Even now my informant is not pleased that I am telling this four-year-old tale; the code of silence still holds. Such an attitude towards government has long made it easy for smugglers to operate between Spain and France. As a result of a simple courtesy —giving a man a ride— I learned much about this vintage enterprise. We had taken the road to Roncesvalles, one of the great pilgrimage routes to the tomb of St. James in Santiago de Compostela in Spain. At Puerto de Ibañeta a footpath led us down to the narrow defile where, according to legend, Charlemagne’s rear guard, commanded by the heroic Roland, was massacred in 778. The battle inspired the French epic poem, the song of Roland, which alleges that Saracens did the deed. But most accounts of the engagement agree that Basques, not Saracens, were actually the attackers. Strict code guides contrabandistas Along the road we noticed a man on foot and offered him a ride. Upon reaching his village, he insisted that he reciprocate with coffee and brandy. He took us to a bar of whitewashed walls and bare tables, around which men were talking in conspiratorial tones. Our companion explained casually that they, like he, were smugglers of such traditional Pyrenean contraband as livestock and Spanish lace. Two Spanish policemen in green uniforms and black leather belts were drinking by a window. As I glanced at them apprehensively, our companion explained, “ They police villagers, not the frontier, so the business of contraband is not their concern.” The contrabandista took no offence at my curiosity after he learned I was of Basque blood, and therefore, as he put it, could be trusted to protect his name. “To be a good smuggler,” he said, “one must have these characteristics: strong legs and sound wind, the eyes and ears of a cat, and, of course, an elastic conscience.” I asked how a smuggling operation worked. He bend over his drink and said: “It is really very simple. Say that I and my comrades want to smuggle 50 Spanish mules, which because of their strength are much in demand in France, across the frontier. Knowing that the frontier guards are unhappy about going out in storms, we naturally wait until a stormy night. We dress in dark clothes and choose the most difficult route over the mountains. One man goes ahead about 400 yards to keep an alert for the guards. The rest follow at intervals of 30 paces, each leading three or four mules. If all goes well, we make 16 miles by midnight to a rendezvous with our counterparts on the French frontier. It is all very simple.” He grinned. “But what if the frontier guards see you?” His grin faded. “ Well, now, that part is not so simple.” He bent forward again and said, “ You must understand that after all these years, we have had to reach an understanding with the law. It is this: If a frontier guard sights us, he shoots his pistol once into the air. That is our signal to leave the mules and run. The guards confiscate the mules, which is all they really care about anyway.” “What if you try to fight them for possession of the contraband?” He waged his finger at me. “ That is bad, very bad. One hothead beat a guard nearly to death with his walking stick. We could not protect him because he had broken the accord. The guards had the right to shoot him.” He added laconically, “Which they did.” When I asked if the smugglers dealt in narcotics, he replied heatedly, “Never! No business of little packages for us. If one were to try it, we would ensure his arrest ourselves.” Once a year Pamplona goes wild By design my wife and I arrived in Pamplona, the capital of Navarra, when the gay ten-day Fiesta de San Fermín was officially over. For most of the year this old walled city is a place of reserved demeanour. But during the fiesta in July, Pamplona honours its patron saint by throwing off restraint like a winter coat and immersing itself in wild abandon. Twice before I had participated in the dancing, singing, and running of the bulls. Now I simply wanted quiet. But the sidewalk cafes were filled. Around the bandstand in the park people danced alternately to rock music and the fandango. A weary man in a wine-spattered shirt explained that the fiesta was indeed over: “But you must understand that a week is required for the excitement to run itself out.” Formerly a time of mingling for the people of the Basque country, the July fiesta in Pamplona now draws visitors from half of Europe. Not nearly so well known, but to my mind far more representative of festivals in the Pyrenees, is the spirited Bastille Day celebration at St.Jean Pied de Port in the French Province of Base Navarra. We reached the town on the eve of July 14, and with good fortune found a room in the Central Hotel. Typically Nasque, the little inn was immaculately clean. The windows sparkled and the wide oak boards of the floor, hand-rubbed with beeswax, gave off a soft, warm glow. Our dinner was Basque too, beginning with the pork pâté of the hotel, followed by pipérade, an omelette with tomatoes, mild peppers, and crisp slices of bacon. The main course was a Basque delicacy, milk-fed lamb, with meat so tender that it flaked away from the bone. A bottle of Irouléguy, the vin rosé of the region, was one of the most delightful wines we had ever tasted. Explosion heralds a holiday Next morning Bastille Day began literally with a bang. In the hotel I was leaning against the open window, my eyes casually sweeping rooftops where pigeons dozed in the gentle run. An explosion of firecrackers in the town square shattered the stillness. The pigeons flew straight up. The day was filled with contest between villages in jai alai and handball, tugs-of-war between veritable brutes of mountain men, and harrowing woodchopping with the axmen balanced on logs. Most spectacular of all was the somersaulting of young men over the horns of charging wild cows. Some ran forward to meet the animal, leaping at the last possible instant. Others stood stock-still, then sprang high as the cow passed beneath them. A miscalculation of a split second and the daring somersaulted could have been mortally battered by the impact. The evening throbbed with contests between troubadours, the vibrant singing and staccato dancing of the Aragonese, intricate steps of the Catalans, and stylised ritual dances of the Basques. Then participants and spectators alike swarmed to the main square for dancing and revelry that continued until first light of dawn. My ears rang with the sound of music and the piercing Basque battle cries that Roman legions and barbarian invaders had heard in these mountains more than a thousand years ago. My historian friend Maurice Jeannel had been right. Progress may alter the face of the Pyrenees, but it will be a long time before it erases the essence of its peoples.
<urn:uuid:87bba0b6-7c37-44d1-87ba-acaf8a84f577>
CC-MAIN-2023-50
https://www.international-club-andorra.com/andorra-club-intercomm/andorra-history-stories/enduring-pyrenees-national-geographic-1974/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.967589
7,285
2.5625
3
In the poem, Dulce et Decorum est the writer Wilfred Owen focus’ on experiences faced by the soldiers in World War I. Owen describes the horrific realities in the trenches and on the battlefield of France during WWI. Owen is trying to share with us his personal experience of War. He uses language features such as; similes and metaphors to stir readers emotions. In the first line of the poem Owen uses a simile “bent double, like old beggars under sacks”, this is used to intensify the readers emotions about the realities of war. This simile makes the reader feel sad as our emotions are stirred right from the start of the poem. Soldiers in WWI were around 17 years old and are being compared to those of old ‘broken-down beggars’. This stirs readers emotions as we think about these young men who were once full of life but were taken from this to become an old beggar, who is crippled …show more content… This shows how the men were so tired that it seemed as if they were walking in their sleep. The soldiers have become so drowsy as they fought tirelessly and continuously. Even when they could get some sleep, they had to sleep on the damp, smelly ground surrounded by rodents and spiders crawling around their heads as they slept. There was always the possibility that they wouldn’t wake up again, therefore sleep was rare and a precious gift. It made me think about the type of terrain they fought in day after day with no sleep, I know that I would not be able to keep fighting after everything they were forced to suffer through. This metaphor stirred me to feel unhappy about the war as I began to think about the those that went to war with big hearts to fight for their country but came home with an empty heart of regret. If they were fortunate enough to return home. The war left mark on every soldiers life therefore this metaphor stirred my emotions as it showed me the futility of war and that the effort was for Click here to unlock this and over one million essaysShow More It illustrates when troops are back from the war their are considering taking their lives because their feel like murders since; they took someone else’s life and all the killing that happens within the war. For example, when one of their comrade’s is killed they feel guilty, and it will lead them to feel like their should have done a better job protecting each other. As a result, what they experience during the war can cause trauma to the brain, trigger the memory system and every man’s life This passage shows how the soldiers are emotionally and mentally drained by the horrors of war, and how they feel disconnected from the world they once knew. The Soldiers typically lacked sympathy for what they went through from society ignoring the trauma they brought back from the Vietnam War. The following quote from the article presents the thought process of most soldiers to us: “By forgetting, he said he could prove that he was strong and could master his anxieties… by remembering, he felt he was admitting that he was weak and no longer in control” (Penk and Robinowitz 3). The previous quote shows how the soldiers felt that forgetting made them appear strong rather than letting their emotions weaken them, and this is why we see a soldier’s inner conflict as they force themselves to remember in the poem. In this quote from the poem the soldier has come to the monument for remembering those who passed in the war and as he looks at those names his first thought is: “No tears. Hi Andrea, When I first read the poem I assumed it was talking about war because of the line “nightmare fighters.” I learned about war being harsh on soldiers and especially fallen ones but I never thought this would happen. I did not think that the soldiers did not care but they just need a way to get the body out fast for another solider to takeover the machine. This is shown in the metaphor used to compare war to a “game” as it strongly suggests the poet’s message of war being fun and carefree. This metaphor is also important to the main message as it is used to persuade and encourage men that seeked adventure and glory. This was due to the lack of soldiers England had in the war by 1916, resulting in the call for volunteer soldiers. Due to the media, social pressure and shame men would receive from their community about their cowardliness and lack of masculinity, a vast majority of unknowing men volunteered for Dulce et Decorum Est: Romance vs. Reality World War I lasted from July 28, 1914 to November 11, 1918, a time when young men were pressured into going to war. Many fifteen to eighteen year old boys were encouraged to go and sacrifice their lives as if it was an enchanting task. In the poem, Dulce et Decorum Est by Wilfred Owen, portrays to readers that war is not an easy and beautiful thing to partake in. Owen conveys the harsh reality of war through his strong diction, figurative language, and imagery. When protesting war, authors use an immense amount of imagery to describe what happened. They sometimes describe the soldiers as “knock-kneed, coughing like hags”(Owens 2) after the soldiers left a fight. These soldiers were tired from a long where they could have died, which may have been dwelling on their minds. Some were forced to go to war and died like Wilfred Owen utilizes imagery in his poem “Dulce et Decorum Est.” Owen uses visual and auditory imagery. Visual imagery is in line one of the poem: “Bent double, like old beggars under sacks.” Owen uses this to let the reader visualize how the how the soldiers looked while they were carrying their heavy packs through the fields and trenches of World War One. The first part of the quotation “bent double” lets the reader visualize that the soldiers backs were giving out form carrying the heavy packs. There are plenty of literatures and works of art portraying what war is like. The genre ranges from personal memoirs to novels, and from poetries to journals. As far as I concerned the several work of art we have studies, Wilfred Owen’s Dulce et Decorum Est best illustrates what war is like because of three reasons. The poem aims to glorify soldiers and certain aspects of war, it goes on to prove that in reality there really isn 't good vs bad on the battlefield, it 's just a man who "sees his children smile at him, he hears the bugle call, And only death can stop him now—he 's fighting for them all.", and this is our hidden meaning. Approximately ten million men died fighting in World War 1. Nothing can quite capture the horrific, putrid scenes, lingering guilt, and heavy memories of these hellish seven years as well as poems have. John McCrae, Laurence Binyon, Wilfred Owen, and Siegfried Sassoon are just several of the poets who have endured the war and lived to write of its horrors. They all use metaphorical descriptions and imagery to depict their grief and respect for those who’ve died. The poems selected have left their readers in remembrance and grief over what has happened over 50 years ago. Reflection for DULCE ET DECORUM EST Vedanshi Patel 10E DULCE ET DECORUM EST is a poem written by Wilfred Owen describing the horrors of war. In the poem Owen questions the old saying, “It is sweet and honourable to die for one’s country” and contemplates whether facing the horrors of war is worth the risk for achieving fame and glory for their country. Through the uses of a variety of poetic devices and figurative language, Owen successfully communicates his message about the gruesomeness of war. The theme of the poem is that war is a tragedy and one that all the soldiers of the war have been scarred with. This metaphor displays his uncertainty as per his crucial part in that moment in time. The soldier pictures himself as the hand on a clock, subject to the inevitable force of a clockwork motor that cannot be slowed or quickend. He realises that he does not really know why he is running and feels “statuary in mid-stride”. However, towards the end of the poem, all moral justifications for the existence of war have become meaningless- “King, honour, human dignity, etcetera Dropped like luxuries in a yelling alarm”, which is extremely dismissive of all the motives people provide for joining the army, explicitly stating that those motives do not justify and do not withstand the war. Disorientation is also highlighted in the line “Stumbling across a field of clods towards a green hedge That dazzled with rifle fire” where the confusion between the natural world and man-made world is expressed. Owen creates a stark contrast between the past and the present by emphasizing the deteriorated relationship between the veteran and women, as well as the veteran 's altered perspective of his surroundings. Owen also emphasizes the contrast through the use of literary techniques, such as irony, symbolism, and similes, and he also writes using a distinct structure. Women are used to highlight the way the soldier is treated before and after his disability. We are given an example in the second stanza when Owen writes "Now, he will never feel again how slim Girls ' waists are ... All of them touch him like some queer disease."
<urn:uuid:d47d5f7f-3540-4469-81c3-7bd2619ceb24>
CC-MAIN-2023-50
https://www.ipl.org/essay/Wilfred-Owens-Dulce-Et-Decorum-Est-ADAD500C68EB6E59
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.977478
1,976
3.625
4
A measurement error is the uncertainty with which a displayed measured value is afflicted and deviates from the actual value of the measurand. A distinction is made between absolute and relative measurement errors. An absolute measurement error results from the difference between the measured value and the actual value. The relative measurement error is related to a quantity. It is dimensionless and is calculated from the quotient of the measured value to the reference value. The reference quantities can be the correct value, the displayed value or the full scale value. Relative measurement errors are expressed in percent, in parts per million( ppm) or with a power of ten (`10^-3`). Measurement errors have many causes, which lie in the measurement procedure, the measured object, the accuracy of the measuring instruments, the reading accuracy or external influences. Accordingly, measurement errors can be systematic or random. Systematic measurement errors are those in which all measurements have the same systematic errors. These can be errors in the measurement setup such as an incorrect ground connection or a ground loop, or the internal resistance of the measuring instrument falsifies the measurement result. The measurement error remains with all measurements. In contrast, random measurement errors tend to occur sporadically and are only noticed by the person performing the measurement when a different measurement result is displayed for the same measurement.
<urn:uuid:94c085fe-fc18-4e50-aa5f-f80a75f02196>
CC-MAIN-2023-50
https://www.itwissen.info/en/measuring-failure.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.901468
268
3.875
4
THE SILENT TAKER : HOW TOXINS, MOLD AND HEAVY METALS IMPACT THYROID DISORDERS In the pursuit of holistic health, it is imperative for us to recognize the intricate connections between environmental factors and the delicate balance of our body's systems. Among these, the thyroid gland plays a pivotal role in regulating metabolism, energy production, and overall well-being. However, the presence of toxins, mold, and heavy metals in our environment can silently undermine the optimal functioning of the thyroid, leading to a spectrum of disorders. Toxins and Thyroid Function: Toxins are ubiquitous in our modern world, found in pollutants, pesticides, and even everyday products. These toxic substances can disrupt the endocrine system, causing imbalances in hormone production and utilization. The thyroid, being a key player in this system, is particularly vulnerable. Certain toxins, known as endocrine disruptors, interfere with the synthesis and activity of thyroid hormones. Bisphenols, found in plastics, and phthalates, present in many personal care products, are notorious culprits. These disruptors can mimic or block thyroid hormones, leading to hypothyroidism or hyperthyroidism, depending on the nature of the interference. Mold and Thyroid Dysfunction: Mold exposure is another insidious threat to thyroid health. Mycotoxins produced by molds can enter the body through inhalation or ingestion, triggering inflammation and compromising immune function. The thyroid, susceptible to inflammation, may respond by decreasing hormone production, resulting in hypothyroidism. Additionally, mold exposure can contribute to autoimmune thyroid conditions, such as Hashimoto's thyroiditis. The immune system, activated by mold-related inflammation, may mistakenly attack the thyroid tissue, exacerbating thyroid dysfunction. Heavy Metals and Thyroid Compromise: Heavy metals, including mercury, lead, and cadmium, are pervasive environmental pollutants. These metals can interfere with thyroid function at multiple levels. For instance, mercury inhibits the conversion of inactive thyroid hormone (T4) to its active form (T3), leading to hypothyroidism. Moreover, heavy metals can accumulate in the thyroid gland itself, impairing its ability to produce hormones. This accumulation may trigger an autoimmune response, exacerbating the risk of thyroid disorders. Some of Origin Healings approaches for Thyroid Health: Given the interconnectedness of environmental factors and thyroid function, holistic approaches are crucial for maintaining thyroid health. This includes: 1. Detoxification: Regular detoxification practices, such as sauna therapy and targeted nutritional support, can aid in eliminating toxins and heavy metals from the body. 2. Mold Remediation: Identifying and addressing mold sources in living and working spaces is paramount. Proper ventilation, humidity control, and professional mold remediation can mitigate the impact on thyroid health. 3. Nutritional Support: Ensuring a nutrient-rich diet with essential minerals like selenium and zinc is vital for supporting optimal thyroid function. These minerals play key roles in the synthesis and conversion of thyroid hormones. 4. Mind-Body Practices: Stress management through practices like meditation and yoga can positively influence the endocrine system, including the thyroid. Its all around us Toxicity, mold exposure, and heavy metals represent silent threats to thyroid health in our modern environment. Understanding these connections empowers individuals to adopt holistic strategies that encompass lifestyle, nutrition, and environmental awareness. By taking proactive steps to minimize exposure and support the body's natural detoxification processes, one can pave the way for a healthier, balanced thyroid and overall well-being. Get in touch to find out how you can detox successfully to produce a more energetic vibrant you.
<urn:uuid:1331ddfe-3587-4c97-9993-872bbed0b118>
CC-MAIN-2023-50
https://www.joinoriginhealing.com/learn/the-silent-taker-%3A-how-toxins%2C-mold-and-heavy-metals-impact-thyroid-disorders
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.891096
760
2.765625
3
What we covered In our upcoming session, "Understanding the Physiological Effects of Stress," we will delve into the complex interplay of bodily changes that occur when experiencing stress. This will include exploring the fight-or-flight response, the release of stress hormones, and the impact on various bodily systems. This knowledge can help us better understand and manage our body's reactions in high-pressure situations. When you encounter a stressful situation, your body prepares to either confront the challenge or flee from it. This response, known as the fight-or-flight response, triggers a series of physiological changes aimed at helping you deal with the perceived threat. Your heart rate and breathing quicken, your muscles tense, and your senses sharpen, all in preparation for action. It's a primal response that served our ancestors well in life-threatening situations, and the remnants of this survival mechanism persist in our modern lives, often triggered by non-life-threatening stressors. Release of Stress Hormones The fight-or-flight response is accompanied by the release of stress hormones, particularly cortisol and adrenaline, to fuel the body's response to stress. These hormones increase your heart rate and blood pressure, boost energy levels, and enhance the brain’s alertness. While these physiological changes can be helpful in the short term, prolonged exposure to stress hormones can have detrimental effects on your physical and mental health, making it important to understand how to manage and reduce stress levels. Impact on Various Bodily Systems The physiological effects of stress extend beyond the immediate fight-or-flight response. Prolonged or chronic stress can impact various bodily systems, including: Cardiovascular System - Increased heart rate and blood pressure during stress can strain the cardiovascular system over time, increasing the risk of heart disease and other cardiovascular issues. Immune System - Chronic stress can weaken the immune system, making you more susceptible to illnesses and infections. Digestive System - Stress can disrupt digestion, leading to issues such as indigestion, irritable bowel syndrome (IBS), and other gastrointestinal problems. Nervous System - Prolonged stress can contribute to anxiety, depression, and other mental health concerns. Understanding how stress impacts these bodily systems can empower individuals to take proactive steps to manage their stress levels and prioritize their mental and physical well-being. Managing Your Body's Reactions in High-Pressure Situations Equipped with a deeper understanding of the physiological effects of stress, you can take proactive steps to manage your body's reactions in high-pressure situations. Here are a few strategies to consider: Mindfulness and Relaxation Techniques - Engage in mindfulness practices, deep breathing exercises, or progressive muscle relaxation to counteract the physiological effects of stress and promote relaxation. Physical Activity - Regular physical activity can help mitigate the impact of stress on your body by promoting the release of endorphins, the body's natural mood elevators. Healthy Coping Mechanisms - Identify and adopt healthy coping mechanisms, such as maintaining a strong support network, practicing time management, and setting realistic goals to minimize stress. Seeking Support - Utilize available resources, such as Panda's digital group sessions and content on managing stress, to gain valuable insights and tools for handling high-pressure situations in the workplace. By leveraging these strategies and incorporating the knowledge gained from understanding the physiological effects of stress, you can proactively manage your body's reactions in high-pressure situations and promote your overall well-being. Understanding the physiological effects of stress is an essential step in cultivating resilience and taking care of your mental and physical health, especially in the context of the workplace. We encourage you to join us in the upcoming session to deepen your understanding of stress and equip yourself with practical strategies for managing its impact on your body.
<urn:uuid:861f24fd-7aa2-49f5-8b05-8d1e26a6daa1>
CC-MAIN-2023-50
https://www.joinpanda.com/content/read/forest/how-your-body-reacts-under-pressure
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.900214
778
3.453125
3
On average, 90% of our time is spent indoors – sleeping, at work in offices, at school, etc. The air we breathe indoors can expose us to pollutants that derive from activities, products and materials we use every day. Asthma, one result of poor indoor air quality, affects 23 million people, including 6.8 million children. Asthma accounts for nearly 1.7 million physician office visits and nearly 2 million emergency room visits each year. GREENGUARD Environmental Institute (GEI) Founded in 2001 with the mission of protecting human health and quality of life through programs that reduce chemical exposure and improve indoor air quality. In keeping with that mission, GEI oversees third-party certification programs that identify acceptable product emission standards and certify low-emitting products.
<urn:uuid:dcb02c94-e8f2-49ab-8751-7a9dd5c050f3>
CC-MAIN-2023-50
https://www.jsifurniture.com/about-us/sustainability/greenguard/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.932268
160
2.78125
3
What level is your kid at now? Have they started learning the alphabet? If they have, maybe they can now tell the difference between small letters and uppercase letters. In this worksheet, your kids will need to find the uppercase letters S, T and U. First, ask them if they can tell you some words that begin with these letters. Then, help them look among the mix of small letters, numbers and uppercase letters to find and circle the uppercase letters S, T and U. First, ask your kids if they can identify the letters in this worksheet. If they can, ask them to give you some examples of words that begin with these letters. Now, they must look carefully through this worksheet. Ask them if they can spot the uppercase letters V, W and X hidden amongst the lowercase letters and numbers in this printout. Help your little ones circle these uppercase letters. Find and circle the uppercase letters in this downloadable worksheet. Learning the alphabet is one of the first things your young one will need to successfully complete before learning to read and write. So, it is extremely important that your youngster has an accurate and proper understanding of the alphabet. This includes understanding and identifying the difference between uppercase and lowercase letters. Try Kids Academy for FREE! You are almost done! Follow these three easy steps below Choose a payment method Create an account Download the App
<urn:uuid:9bae4402-461d-4dec-9b26-84de5d978c19>
CC-MAIN-2023-50
https://www.kidsacademy.mobi/lesson/naming-uppercase-letters-s-z-34243299/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.914249
300
4.15625
4
History of coffee: Where did coffee originate and how was it discovered Coffee was introduced to India during the late seventeenth century. The story goes like, an Indian pilgrim went to Mecca known as Baba Budan he smuggled seven beans back to India from Yemen in 1670 (it was illegal to take coffee seeds out of Arabia at the time) and planted them in the Chandragiri hills of Karnataka. The Dutch helped spread the cultivation of coffee across the country, but it was with the arrival of the British Raj in the mid-nineteenth century that commercial coffee farming fully flourished. Initially Arabica was widespread, but huge infestations of coffee leaf led many farms to switch to Robusta or Arabica/Liberica hybrids. Where Did Coffee Originate? Where did coffee originate? Well, that’s the easy bit. At the very beginning, it came from Ethiopia. But how the bean made it to every corner of the globe? That’s what we are going to dig into. After a slow discovery in Africa, coffee went west into Europe to be discovered and coveted by the newer civilizations as well as east into Asia where it was planted and harvested.There’s a lot to cover, so grab a cup of coffee and read on. The World’s Coffee Growing Regions In halo’s abridgedtake on the world atlas of coffee, An informational guide that take coffee lovers on a global coffee tour of coffee growing regions we will explore, explain and guide readers to enjoy the best coffees from around the world. The Bean Belt Globally there are three primary coffee growing regions – Central and south America, Africa and southeast Asia. These regions are all located along the equatorial zone between the tropic of cancer and the tropic of Capricorn widely known as the bean belt. Central And South America Coffee Regions At the top of that Bean belt, is central America most coffee beans in the region come from Guatemala, Nicaragua, EI Salvador, Honduras and Costa Rica. Costa Rica in particular has superior condition for growing exceptional coffee with incredibly Aromatic flavours. Central America coffee beans as a whole are exceptionally well-balanced, medium-bodied, and mild. They have medium acidity and a clean, bright taste and are enjoyed in almost every speciality coffee shop around the world. The south America coffee region encompasses Brazil, Colombia, Bolivia, and Ecuador. Colombia coffee is one of the most talked about and popular coffees but its Brazil that produces by far the highest coffee volume in the world- a title that the country has held the past 150-year, Brazil boasts the total production of green coffee and arabica coffee, owing to its perfect climate and superior growing conditions. Africa And the Middle East Coffee Production The African coffee region encompasses a handful of countries, Namely Kenya, Ethiopia, and Tanzania. Other participating countries include Rwanda, Burundi, and Uganda. This African region produces a unique and complex morning fix with a sweet, fruity, and delicate floral aroma. Most African coffee originate from Kenya on the slopes of Mount Kenya and their beans are often full-bodied and full of sprit-lifting fragrance. Ethiopia is also a significant producer in the African coffee region accounting for around 3% of the world coffee market, with approximately 60% of Ethiopia’s foreign income coming from coffee production alone. Since the seventeenth century, Coffee has been grown and consumed in southeast Asia: particularly famous for Vietnamese and Indonesian Coffee beans. The Indonesian Island of Sulawesi, Java, and Sumatra Produce distinct, full-bodied, rich and earthy beans, commonly used in blends. Beans produced here have clean, smooth characteristic, with a juicy fruit taste and nutty Aroma. Vietnam is the world’s second largest coffee exporter, producing mild, Delicate-flavoured, and medium bodied beans. Several varieties of coffee are grown in Vietnam micro-climates, including Robusta and Arabica. It’s not just Indonesia and Vietnam that produces excellent coffee. Sumatra’s reputation for producing coffee cannot be beaten with its low acidity, Earthy and rich dark chocolate tasting beans. What’s the Difference Between Arabica and Robusta Coffee? Arabica and Robusta are two words that get mentioned a lot in the coffee world. But what do they mean? Arabica and Robusta are two species of coffee. Take a moment to think back to middle school and high school biology classes. Remember Kingdom, Phylum, Class, Order, Family, Genus, Species? Arabic and Robusta are both part of the Coffea genus, which is in the Rubiaceous family Arabica makes up about 70% of the global production of coffee, and is descended from the original coffee trees found in Ethiopia. Because of what arabica beans need to grow — elevation and a mild climate — and their lower yield than Robusta, arabica takes a higher price on the global coffee market. Arabica beans are known for being mild and aromatic, the kind of thing that specialty roasters go for. Of course, just because a coffee is arabica does not mean it’s going to be great; there is plenty of arabica produced that does not make the specialty coffee cut. In terms of taste, Robusta beans have a stronger, harsher taste than arabica. As a crop, Robusta is more resistant to disease and parasite, and it can grow in warmer climates. Robusta beans are also higher in caffeine, and are commonly found in blends and instant coffees. In other words, your average supermarket coffee. Arabica vs. Robusta Arabica and Robusta beans also look a little different. Arabica beans have a larger, more elliptical shape, while Robusta beans are smaller and rounder. Their chemical makeup is different, too. As mentioned, arabica has a lower caffeine content, but the species also has 60% more lipids and twice the concentration of sugars as Robusta. If you ever have the chance to get your hands on unroasted Arabica and Robusta, you would notice a difference in smell, too; arabica is sweeter and more floral, while unroasted Robusta beans are said to have a scent of grains or nuts. Now you can drink that morning cup of coffee with just a little more knowledge of exactly what’s in it.
<urn:uuid:0d85be0b-fcde-474d-b0aa-a32f54f48d66>
CC-MAIN-2023-50
https://www.kingscoffeeindia.co.in/blogs/news/history-of-coffee-where-did-coffee-originate-and-how-was-it-discovered
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.945823
1,365
2.84375
3
When you’re constantly out on the water, under the blazing sun and bright blue sky, watching the aquatic wildlife swim below you, you develop a special appreciation and respect for the environment. It’s hard not to feel a duty to protect and preserve the natural world around you when you spend so much time reaping its benefits. As an angler, there are a number of steps you can take to help sustain fish populations, marine habitats, and the ecosystem in which you fish. Start with these five habits to help you become a more environmentally responsible fisherman! 1) Responsible boating If you prefer fishing from a boat to a spot on the shore or pier, be conscious of how your boat can impact the ecosystem you’re traversing. In shallow waters, a propeller can destroy underwater vegetation that fish rely on for food and habitat, as well as stir up sediment that blocks light transmission. Avoiding or minimizing propeller use when boating in these areas will reduce disruption to the ecosystem. You can also make your boat eco-friendlier by installing a stainless steel propeller to reduce drag and an electric motor to increase fuel efficiency and decrease carbon emissions. 2) Catch & release fishing Practicing catch and release fishing is one of the most effective ways to reduce the impact of sport fishing on native fish populations. Releasing fish back into the water allows them to continue growing and reproducing more robust offspring—which is why we practice catch and release for all trophy-size fish at Lawrence Bay Lodge. Make sure you use the right equipment and handle fish carefully to give them the best chance at survival. If you’re adhering to catch and release guidelines, the only time you wouldn’t want to let a fish back into the water is if you catch an invasive species that threatens the native ecosystem. 3) Safe gear & technique Another way to practice sustainable fishing is to use angling techniques and gear with minimal negative impact on the environment. You can, for example, opt to use a rod and reel for hook-and-line fishing that quickly releases bycatch and prevents overfishing by allowing only one fish to be caught at a time. A few other sustainable habits you can adopt are to clean your gear when switching between locations (to avoid introducing foreign plant life or bacteria), refrain from dumping baitfish that will compete with native populations for resources, and use lead-free equipment and non-toxic sinkers. You should also take care to retrieve all of your litter and whatever lost equipment you can—lines, sinkers, etc.—when you’re finished so it does not harm any area wildlife. 4) Follow area guidelines Regional fishing rules and regulations are in place to protect the local environment. When fishing in a new area, prep for your trip with a little research into area guidelines, so you can adapt your practices accordingly. Pay attention to signs posted in the area as well that might prohibit or restrict fishing and/or boating in specific locations. Something else to keep in mind is that, although it may be annoying to pay for a license every time you fish in a new spot, the money you spend will go towards maintaining and caring for aquatic life in that area. 5) Responsible fish use It’s understandable that sometimes you’ll want to take home a few of the fruits of your labor after a long afternoon spent reeling in fish. When you do plan on keeping a fish, you can still practice sustainability by ensuring none of it goes to waste. In other words, use all of what you catch. If you’re bringing home a fish, chances are you plan on eating it—which is great! But did you know you can still make use of the bones and other inedible parts? If you compost them with other organic materials, such as sawdust, wood chips, bark, etc., you can use the product as a rich fertilizer. Since 1981, Lawrence Bay Lodge has been practicing sustainable catch and release fishing for larger fish to help preserve and protect local populations. This also ensures that everyone who fishes with us has a chance at a trophy catch year after year. Additionally, our guides help make use of the small fish you catch by cooking them up for your delicious shore lunch at midday. Contact us today to book a first-rate fishing trip you can feel good about!
<urn:uuid:8369041b-c045-4d99-bedf-2618eb36d797>
CC-MAIN-2023-50
https://www.lawrencebay.com/5-ways-you-can-practice-sustainable-fishing/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.932238
902
3.109375
3
This The Constitution lesson plan also includes: - Join to access all included materials Sixth graders examine and identify the Articles of the /constitution. They analyze them to determine details and structures of the government. Students discover the ideas of separation of power and checks and balances. In pairs, 6th graders also take a "Constitutional scavenger hunt." - This resource is only available on an unencrypted HTTP website.It should be fine for general use, but don’t use it to share any personally identifiable information
<urn:uuid:7cc72319-0523-482a-8105-db10a3fdadb2>
CC-MAIN-2023-50
https://www.lessonplanet.com/teachers/lesson-plan-the-constitution
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.890055
109
4.21875
4
Once your children are six years old, they are required to go to school, since school attendance is compulsory in Germany. Most German schools are run by the state and there is no charge for your children to attend. In addition, there are private and international schools which charge fees. The individual states are responsible for education policy. This means that the school system will to some extent depend on the region where you and your family are living. Children do not always have the same curriculum in every state, and textbooks may differ as well. Individual states also have different types of schools. Generally, the German school system is structured as follows: Grundschule (primary school): Normally, six-year-olds begin their school careers at primary school, which covers the first four grades. Only in Berlin and Brandenburg does primary school continue up to sixth grade. At the end of primary school, you and your child's teachers will decide which secondary school your child will attend, considering your child's academic performance. Weiterführende Schulen (secondary schools) – the most common types are: - Hauptschule (secondary general school for grades 5 through 9 or 10) - Realschule (more practical secondary school for grades 5 through 10) - Gymnasium (more academic secondary school for grades 5 through 12 or 13) - Gesamtschule (comprehensive school for grades 5 through 12 or 13) Hauptschule and Realschule: Young people who have successfully completed the Hauptschule or Realschule are eligible for vocational training, or can transfer to the Sekundarstufe II/Oberstufe (≈ sixth form) at a Gymnasium or Gesamtschule. Gesamtschule: Combines the Hauptschule, Realschule and Gymnasium and offers an alternative to the tripartite school system. Gymnasium: At the end of the 12th or 13th grade, students take examinations known as the Abitur and if successful graduate from secondary school with a certificate of advanced secondary education, entitling them to study at a university or at a university of applied sciences. However, they may also choose to undergo vocational training and enter the job market directly.
<urn:uuid:3f0a9c15-2ddb-4212-b52f-762ea322f7e8>
CC-MAIN-2023-50
https://www.make-it-in-germany.com/en/living-in-germany/family-life/school-system
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.951885
481
3.125
3
Flow cytometry is one of the essential techniques for cell analysis. This article describes the basic mechanics of flow cytometry, measurement devices using flow cytometry, how flow cytometers work, and how they can be used. Flow Cytometry is a technique for cell analysis that was introduced in the 1950s. Fluid-containing cells flow at high speed through a capillary with an observation window. The cell then passes in front of the observation window, and this single cell is observed. Flow cytometry can measure cell characteristics such as cell size, cell count, and cell cycle. This provides information on individual cells from a heterogeneous cell population. A flow cytometer is a cell analysis device that uses flow cytometry technology. Among flow cytometers, those with the ability to separate cells are called cell sorting, cell sorters, or FACS (Fluorescence Activated Cell Sorter). In recent years, cell sorters have increasingly been used in a similar sense to flow cytometers. The cell sorter is a device that separates and collects the cells analyzed by flow cytometry. This classification and collection is called sorting. Flow cytometers consist of two major components. The first is a fluid system for flowing and handling cells. The other is an optical system that includes a light source, a signal detector, and a processor for data acquisition. In a fluid system, cells are arranged one by one in a row in a buffer called a sheath fluid by the flow of the fluid. In the optical system, a laser beam is shone on a row of cells, and the scattered light and fluorescence are measured by Photomultiplier Tubes (PMTs). This is the mechanism by which information on each cell can be obtained. The cell sorter charges the target cells with this information. The cells are then separated by a high-voltage polarizer. Because cells are measured in an undisturbed flow (laminar flow), it is possible to measure cells without damaging them. Flow cytometers are used for cell cycle evaluation based on DNA content, as well as cell surface marker analysis using fluorescently labeled antibodies and intracellular introduction analysis of fluorescently labeled macromolecules. It is also used for sorting specific cells. When conducting cell biology research experiments using flow cytometry, the first step is to plan what color fluorescent dye to assign to each antibody. To prevent color mixing during analysis and to avoid confusion as to which cells are which, dyes are assigned while taking into consideration the maximum excitation wavelength, maximum emission wavelength, and luminance, as well as the type of laser used in the flow cytometer. Next, follow the steps in the cell staining protocol. Cell staining can be done by direct staining, indirect staining, or intracellular staining. The staining method is selected according to the type of cell to be measured and the item to be measured. After fluorescent dye assignment and staining, the specimen is filtered to remove cell clumps and strands (aggregates). This is because flocculence clogs the flow path and interferes with measurement. After filtration, perform flow cytometry and analyze the results. Flow cytometers are used in the study of cell biology as well as molecular biology. In particular, fluorescent molecules are used to analyze the function of cell surfaces and inside cells and make cell functions visible. Flow cytometers are used to detect specific cells for molecular beacons and protein fluorescent labeling when conducting molecular biology studies. This measurement makes it possible to examine the immune system, etc. Compared to fluorescence microscopy, analysis using a flow cytometer has the following features: "multiple parameters can be analyzed simultaneously," "quantitative analysis is possible," and "analysis speed is fast.
<urn:uuid:8a5e2381-7a3e-4833-a33c-b7ac8ae97c96>
CC-MAIN-2023-50
https://www.matsusada.com/column/facs.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.930518
778
3.984375
4
Not by Bread Alone January 1, 1946 Arctic explorer and anthropologist Vilhjalmur Stefansson spent years living with indigenous Inuit and Eskimo people. He noted their general healthiness (and good teeth), and an absence of many of the diseases that plagued western cultures, such as scurvy, heart disease, and diabetes. Observing their dietary habits, he determined that their primary food was meat, both lean and fatty, and that their diets were very low in sugary or starchy carbohydrates. Was this meaty diet the key to their good health? Stefansson’s classic Not By Bread Alone chronicles a 1928 scientific experiment, conducted by the Russell Sage Institute of Pathology at Bellevue Hospital in New York, in which Stefansson and his colleague Dr. Karsten Andersen ate a meat-only diet for one year. The two men stayed healthy and fared very well, leading him to claim that we should reexamine our notion of what foods constitute a healthy diet. Later chapters promote the benefits of pemmican, a compact, portable, and high-energy food consisting of a concentrated mix of fat and protein made from dried lean bison meat, sometimes mixed with berries. Pemmican is like the original energy bar, and Stefansson spent considerable time and energy urging the military to adopt it for emergency rations. This book is essential reading for anyone who wishes to eat an all-meat diet or wants to learn more about the health benefits of a low-carbohydrate diet of meat and fish. ABSOLUTELY REQUIRED READING!
<urn:uuid:9eb74dfd-53ac-4eea-b458-dd51ab8bbbdb>
CC-MAIN-2023-50
https://www.meatrition.com/booklist/not-by-bread-alone
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.959175
330
3.328125
3
Biocompatibility failures and complications can occur from contaminates on medical devices. These can come from cleaning, disinfection, or manufacturing operations. Manufacturers should set acceptable residue levels based on device use and patient contact. Residual testing is a method of analysing the chemical residues that may remain on a medical device after it has been exposed to a sterilisation process. Residues can affect the biocompatibility, functionality and safety of the medical device, and potentially harm the patient or user. Therefore, it is important to ensure that the residues are within acceptable limits according to the relevant standards and regulations. Residual testing is important because it helps to ensure the safety and quality of medical devices that are sterilised by different processes. Residual testing can detect and measure the chemical residues that may remain on the device after sterilisation, and can help to reduce or eliminate them if they are above the acceptable limits. Residual testing can also help to comply with the relevant standards and regulations that govern the sterilisation industry. Residual testing is a vital part of quality control and validation for medical devices that are intended for patient contact. There are two different methods for EO residual testing: simulated-use extraction and exhaustive extraction. ✔ Simulated-use extraction is a method that mimics the actual use of the device by extracting the residues with a suitable solvent under specified conditions. This method is used to determine the amount of residues that may be released from the device during its intended use. ✔ Exhaustive extraction is a method that removes all the residues from the device by using multiple solvents under extreme conditions. This method is used to determine the total amount of residues that are present on the device after sterilisation. The most common analytical technique for measuring EO and ECH residues is gas chromatography (GC) or headspace analysis (HS). 👉 GC is a technique that separates and quantifies the components of a gas mixture by passing it through a column with a detector. 👉 HS is a technique that analyses the vapour phase of a sample by heating it in a sealed vial and injecting it into a GC system. Both techniques can provide accurate and sensitive results for EO and ECH residues. ISO 10993-7 (2008) is an international standard that specifies the allowable limits for residual ethylene oxide and ethylene chlorohydrin in individual EO-sterilized medical devices, as well as the procedures for the measurement and compliance of these residuals. Ethylene oxide (EO) is a gas that is widely used to sterilize medical devices, but it can also leave behind harmful residues that can cause irritation, inflammation, or allergic reactions in patients. Ethylene chlorohydrin is a by-product of EO sterilization that can also have toxic effects. Therefore, it is important to ensure that the levels of these residuals are within safe limits before using the sterilized devices. ISO 10993-7 (2008) provides guidance on how to determine the allowable limits for different types of devices, based on factors such as the device category, the exposure duration, the body weight, and the surface area of the patient. It also describes methods for sampling, testing, and reporting the results of EO sterilization residuals. The standard is intended to help manufacturers, regulators, and users of EO-sterilized medical devices to ensure the safety and quality of their products. In 2019, we’ve seen an amendment to this standard, which specifies the allowable limits for residual ethylene oxide and ethylene chlorohydrin in individual EO-sterilized medical devices, as well as the procedures for the measurement and compliance of these residuals. The amendment clarifies the applicability of the allowable limits for neonates and infants. It states that the allowable limits for neonates and infants are the same as those for adults, unless there is a specific justification based on a risk assessment. The amendment also provides some guidance on how to perform such a risk assessment, taking into account factors such as the device category, the exposure duration, the body weight, and the surface area of the patient. The amendment aims to harmonize the requirements for EO sterilization residuals with other international standards and regulations, such as those from the European Union and the United States. The amendment is effective since December 2019 and applies to all EO-sterilized medical devices that are intended for use in neonates and infants. ✔ Medistri GMP Accredited In-House Laboratory in Switzerland is certified with ISO 17025. 👉 ISO 17025 is a standard that sets the criteria for testing and calibration laboratories to ensure their quality and reliability. It is useful for biocompatibility testing of medical devices, as it helps laboratories to follow the specific ISO standards, such as ISO 10993-7. Residual testing is an essential part of quality control and validation for the sterilisation industry. It helps to ensure that the medical devices are safe and effective for their intended use and patient contact. Medistri can perform Ethylene Oxide Residual Analysis in our GMP Accredited In-House laboratory in Switzerland to analyse and demonstrate the safety of your sterile medical device. 🎯 To learn more about Medistri’s Residual Testing, visit on our website here or directly contact our team at firstname.lastname@example.org. - The Medistri Team
<urn:uuid:be169e6b-b9f2-4e65-8f4a-2e4f5b7720e4>
CC-MAIN-2023-50
https://www.medistri.ch/en/blog/residual-testing
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.932714
1,119
3.296875
3
|Back to Back Issues Page| Midbrain-Activation Tips, Issue #041 November 01, 2014 MIDBRAIN ACTIVATION Nov. 02 -2014 Quote of the Week "It is paradoxical that many educators and parents still differentiate between a time for learning and a time for play without seeing the vital connection between them." -- Leo Buscaglia Welcome to our weekly newsletter. Welcome to our new members Please feel free to pass this on to your list THE BACK ISSUES ARE AT... * PERIPHERAL VISION EXPANSION: Developing Your Child's "Outside Vision"What is peripheral vision, and why is it important in Right Brain Education? PERIPHERAL VISION Copyright (c) 1998, 2013 Right Brain Kids, LLC. Peripheral vision is an important part of our Wink Eye Exercise program. While basic eye exercises increase visual scanning speed, peripheral vision activities increase the amount of data retrieved while scanning. We believe that children have three primary modes of intake: (1) Direct -- Information a child sees consciously, with direct focus = conscious (2) Peripheral -- Information that a child scans quickly within his field of vision = subconscious (3) Spherical -- Frequency-based information that is absorbed via some type of intuitive intake = superconscious The more we maximize input through these avenues, the more connections we're able to build in the mind of a child. What would you do if you could see more? What would you do with all the extra information? Peripheral vision expansion allows you to increase the breadth of focus of what you see every moment. In addition to putting peripheral objects in focus, these exercises actually have the potential to enlarge your whole field of vision. EXPAND YOUR VISIONHere's a fun way to increase clarity in your peripheral vision. --- Peripheral Vision Game: "KNOCK, KNOCK. WHO'S THERE?" --- You will need: - A set of items: Choose five or six toys or everyday items you may have around the house -- such as a wooden spoon, a cotton ball, a candle, a cup, a slipper, a glove... whatever is handy! 1. Explain that you are going to play "Knock, Knock. Who's There?" You'll be hiding an object behind his back, slowly bringing it into his view path. As soon as he can see what it is, he can shout it out and hold the item as a reward. 2. Have your child look straight ahead at a central focus point. (You can encourage him to look at a spot on the wall, or affix a temporary sticker, or post it note shape, straight ahead.) 3. Stand behind him with your first object, such as a toy stuffed lion. 4. Have your child say, "Knock, Knock!" 5. Say, "Who's there?" while slowly bringing the object out from behind him, around to the right side. 6. As soon as he can see the object, have him say what it is! Give him the object to hold in his lap. 7. Continue with another object, only this time on the left side. 8. Continue with the rest of the objects, alternating from right to left. While peripheral vision activities WIDEN the field of vision, constant use of computers and tablets and small game screens NARROW it down considerably. SPHERICAL VISION: SEEING WITH YOUR RIGHT BRAINSometimes when playing "Knock, knock. Who's there?" a child will identify the object while it is still behind his back! We've seen it in the classroom again and again, particularly with the youngest age groups. How is this possible? When children "see" objects without the use of sight, we call it "right brain seeing." This is a natural, and common occurrence using the right brain's ability to recognize energy frequencies and the magnetic fields around every living and nonliving object. Infants are especially good at this. --- Story: MATH SPOTS --- In our busy household, we try to make the most of every learning opportunity. So one day while our baby was in the bath with his older brother (then four years old), we flashed some math flashcards. The cards had blue dots on them to represent number quantities -- "4" had four dots, "5" had five dots, etc. Meanwhile, our four-year-old son was busy pouring water from one cup to another, totally engrossed with his play, not paying any attention to our flashcards fun. I held up two cards and asked Baby, "Which one is three?" He looked at the "3" card. I said, "Yes! That's right." I held the next card in my hand, but before I could bring it forward, our older son called out, "15!" without looking up from his play. I looked down. Indeed, the card I held was "15" -- that is, it had fifteen dots on it. This understanding helps us to relax when presenting flashcards and bits of information. We know that we can simply show the flashcards, play the classical music or foreign languages, and that the child's impressionable mind will soak it up. We hope you enjoy your right brain lessons with your child! AWAKEN THE THIRD EYEFREE COURSE DO YOU HAVE A PROGRAM RELATING TO EDUCATION?If you conduct classes or programs or workshops on whole brain development, right brain education, multiple intelligence etc. and would like world-wide exposure, please WANTED DYNAMIC PROMOTERSREAD MORE ABOUT THIS OPPORTUNITY MIDBRAIN ACTIVATION IN SRI LANKA/INDIACLICK HERE FOR DETAILS For Feedback, Suggestions,Comments and Questions =========================== General & Unsubscribe Info MIDBRAIN ACTIVATION © Copyright 2012, RUWAN ASSOCIATES, except where indicated otherwise. All rights reserved worldwide. Reprint only with permission from copyright holder(s). All trademarks are property of their respective owners. All contents provided as is. No express or implied income claims made herein. Your business success is dependent on many factors, including your own abilities. Advertisers are solely responsible for ad content. Please feel free to use excerpts from this newsletter as long as you give credit with a link to our page: www.midbrain-activation.com MIDBRAIN ACTIVATION is an opt-in ezine available by subscription only. We neither use nor endorse the use of spam. |Back to Back Issues Page|
<urn:uuid:0a652b90-a918-4570-b34c-cefd85eedf85>
CC-MAIN-2023-50
https://www.midbrain-activation.com/MidbrainActivation_Tips-ezine041.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.93489
1,408
2.71875
3
Expected Fielding Independent Pitching (xFIP) xFIP finds a pitcher's FIP, but it uses projected home-run rate instead of actual home runs allowed. The home run rate is determined by that season's league average HR/FB rate. For example: In 2002, Randy Johnson had a 2.66 FIP and a 2.44 xFIP -- the difference being that he allowed a 12.9 percent HR/FB rate, when the league average stood at 10.7 percent. Where "FIP constant" puts FIP on the same plane as league-average ERA: ((Fly balls / league average rate of HR per fly ball x 13) + (3 x (BB + HBP)) - (2 x K)) / IP + FIP constant. Why it's useful Like its cousin, FIP, xFIP can be used to portend future performance (as opposed to simply evaluating past results). However, xFIP and FIP differ in how they penalize pitchers for home run allowance. xFIP is predicated on the notion that pitchers have more control over how many fly balls they allow than how many of those fly balls leave the park. As a result, xFIP substitutes a pitcher's homer tally with an estimation of how many long balls that pitcher should have permitted given the number of fly balls he induced. To determine the latter part of the equation, xFIP assumes a pitcher should have allowed a league average HR/FB rate, which was 15.3 percent in 2019. This assumption is drawn because HR/FB rate can fluctuate a lot from year to year, with pitchers often regressing back toward the league average rate.
<urn:uuid:cc3601de-c32c-45cc-bc20-8beb6e7753b8>
CC-MAIN-2023-50
https://www.mlb.com/glossary/advanced-stats/expected-fielding-independent-pitching
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.942108
352
2.578125
3
A healthy blanket bog relies on a high water table for its unique and boggy conditions. Every year, volunteers measure the depth of the water table in hundreds of locations. This is known as Moors for the Future Partnership’s dipwell campaign. The data has been analysed by Partnership scientists, and interesting results have surfaced. The benefits of restoration were unusually visible in 2018 (a drought year), with water tables much higher than they would have been without the restoration work. The rising of the water table was less visible in 2019 as all the locations were very soggy due to the wet autumn of 2019. But even with the wet autumn clouding the results, the initial results from this year’s campaign generally show that water tables are continuing to rise. The bogs are becoming wetter even in the face of hot, dry summers. This improves their resilience to drought and reduces opportunities for devastating wildfires to burn uncontrollably. These datasets underpin all the work the Partnership does by evidencing the effects of its conservation works. They were made possible by the brilliant volunteers who headed out each week in autumn, in often gruelling conditions, to collect this valuable data. 900 measurements were manually taken across the South Pennines Special Area of Conservation, adding richness and depth to this long-term dataset. Long-term datasets are vitally important for conservation work as landscapes often take time to respond to changes made by conservationists. Observing and recording the effects of conservation actions informs researchers and land managers on how best to approach moorland restoration, by providing insight into what has worked to make the landscape healthier and what hasn’t. Full analysis will be published in the final report on completion of the MoorLIFE 2020 project in 2021.
<urn:uuid:9ac81844-c5b4-4f11-88fc-2ded78f29e1b>
CC-MAIN-2023-50
https://www.moorsforthefuture.org.uk/the-latest/moorlife-2020-news/the-results-have-been-pooled-for-the-ninth-annual-dipwell-campaign
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.970445
356
3.375
3
Maintain a clean environment to deter spraying. Learn how a clean litter box and home can reduce your cat's urge to spray. The benefits of spaying and neutering. Learn how these procedures can significantly reduce spraying in cats. Effectively manage your cat's territory. Implement strategies to help your cat feel secure in their space. Reduce stress triggers for your cat. Identify stressors and implement techniques to create a calm environment. Retrain your cat's behavior. Discover positive reinforcement techniques to discourage spraying. When all else fails, seek professional guidance. Your vet can provide tailored solutions to address cat spraying. Summarize the key strategies for preventing and managing cat spraying. Enjoy a harmonious home with your feline friend.
<urn:uuid:de183d7b-b12b-44d1-9f9f-a9bbc5d703d9>
CC-MAIN-2023-50
https://www.mrvendryes.com/web-stories/best-solutions-for-cat-spraying-problems/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.876842
152
2.671875
3
Declines in bee populations across the world threaten food security and ecosystem function. It is currently not possible to routinely predict which specific stressors lead to declines in different populations or contexts, hindering efforts to improve bee health. Genomics has the potential to dramatically improve our ability to identify, monitor and predict the effects of stressors, as well as to mitigate their impacts through the use of marker-assisted selection, RNA interference and potentially gene editing. Here we discuss the most compelling recent applications of genomics to investigate the mechanisms underpinning bee population declines and to improve the health of both wild and managed bee populations. This is a preview of subscription content, access via your institution Open Access articles citing this article. Gene expression in bumble bee larvae differs qualitatively between high and low concentration imidacloprid exposure levels Scientific Reports Open Access 09 June 2023 Development of a multiplex microsatellite marker set for the study of the solitary red mason bee, Osmia bicornis (Megachilidae) Molecular Biology Reports Open Access 01 November 2021 Apidologie Open Access 22 January 2021 Access Nature and 54 other Nature Portfolio journals Get Nature+, our best-value online-access subscription $29.99 / 30 days cancel any time Subscribe to this journal Receive 12 print issues and online access $189.00 per year only $15.75 per issue Rent or buy this article Prices vary by article type Prices may be subject to local taxes which are calculated during checkout Steffan-Dewenter, I., Potts, S. G. & Packer, L. Pollinator diversity and crop pollination services are at risk. Trends Ecol. Evol. 20, 651–652 (2005). Klein, A.-M. et al. Importance of pollinators in changing landscapes for world crops. Proc. R. Soc. Lond. B Biol. Sci. 274, 303–313 (2007). Williams, P., Colla, S. & Xie, Z. Bumblebee vulnerability: common correlates of winners and losers across three continents. Conserv. Biol. 23, 931–940 (2009). Grixti, J. C., Wong, L. T., Cameron, S. A. & Favret, C. Decline of bumble bees (Bombus) in the North American Midwest. Biol. Conserv. 142, 75–84 (2009). Colla, S. R., Otterstatter, M. C., Gegear, R. J. & Thomson, J. D. Plight of the bumblebee: pathogen spillover from commercial to wild populations. Biol. Conserv. 129, 461–467 (2006). Allen-Wardell, G. et al. The potential consequences of pollinator declines on the conservation of biodiversity and stability of food crop yields. Conserv. Biol. 12, 8–17 (1998). Gallai, N., Salles, J., Settele, J. & Vaissière, B. E. Economic valuation of the vulnerability of world agriculture confronted with pollinator decline. Ecol. Econ. 68, 810–821 (2009). Hunt, G. J. & Page, R. E. J. Linkage map of the honey bee, Apis mellifera, based on RAPD markers. Genetics 139, 1371–1382 (1995). Hunt, G. J., Page, R. E. J., Fondrk, M. K. & Dullum, C. J. Major quantitative trait loci affecting honey bee foraging behavior. Genetics 141, 1537–1545 (1995). Dogantzis, K. A. & Zayed, A. Recent advances in population and quantitative genomics of honey bees. Curr. Opin. Insect Sci. 31, 93–98 (2019). Grozinger, C. M. & Flenniken, M. L. Bee viruses: ecology, pathogenicity, and impacts. Annu. Rev. Entomol. 64, 205–226 (2019). Lozier, J. D. & Zayed, A. Bee conservation in the age of genomics. Conserv. Genet. 18, 713–729 (2017). Weinstock, G. M. et al. Insights into social insects from the genome of the honeybee Apis mellifera. Nature 443, 931–949 (2006). Zayed, A. Bee genetics and conservation. Apidologie 40, 237–262 (2009). Liczner, A. R. & Colla, S. R. A systematic review of the nesting and overwintering habitat of bumble bees globally. J. Insect Conserv. https://doi.org/10.1007/s10841-019-00173-7 (2019). Darvill, B., Knight, M. E. & Goulson, D. Use of genetic markers to quantify bumblebee foraging range and nest density. Oikos 107, 471–478 (2004). Carvell, C. et al. Bumblebee family lineage survival is enhanced in high-quality landscapes. Nature 543, 547–549 (2017). This study provides an excellent example of how population genetics can be combined with landscape data to understand the habitat requirements of at-risk pollinators. Jha, S. & Kremen, C. Urban land use limits regional bumble bee gene flow. Mol. Ecol. 22, 2483–2495 (2013). Kent, C. F. et al. Conservation genomics of the declining North American bumblebee Bombus terricola reveals inbreeding and selection on immune genes. Front. Genet. 9, 316 (2018). Beadle, K. et al. Genomic insights into neonicotinoid sensitivity in the solitary bee Osmia bicornis. PLoS Genet. 15, e1007903 (2019). Manjon, C. et al. Unravelling the molecular determinants of bee sensitivity to neonicotinoid insecticides. Curr. Biol. 28, 1137–1143 (2018). Hayward, A. et al. The leafcutter bee, Megachile rotundata, is more sensitive to N-cyanoamidine neonicotinoid and butenolide insecticides than other managed bees. Nat. Ecol. Evol. 3, 1521–1524 (2019). Sponsler, D. B. et al. Pesticides and pollinators: a socioecological synthesis. Sci. Total. Env. 662, 1012–1027 (2019). Nazzi, F. & Le Conte, Y. Ecology of Varroa destructor, the major ectoparasite of the western honey bee, Apis mellifera. Annu. Rev. Entomol. 61, 417–432 (2016). Martin, S. J. & Brettell, L. E. Deformed wing virus in honeybees and other insects. Annu Rev Virol. https://doi.org/10.1146/annurev-virology-092818-015700 (2019). Wilfert, L. et al. Deformed wing virus is a recent global epidemic in honeybees driven by Varroa mites. Sci. 351, 594–597 (2016). Arbetman, M. O., Meeus, I., Morales, C. L., Aizen, M. A. & Smagghe, G. Alien parasite hitchhikes to Patagonia on invasive bumblebee. Biol. Invasion 15, 489–494 (2012). Harpur, B. A., Minaei, S., Kent, C. F. & Zayed, A. Admixture increases diversity in managed honey bees. Reply to De la Rúa et al. (2013). Mol. Ecol. 22, 3211–3215 (2013). Schneider, S. S., DeGrandi-Hoffman, G. & Smith, D. R. The African honey bee: factors contributing to a successful biological invasion. Annu. Rev. Entomol. 49, 351–376 (2004). Zayed, A. & Whitfield, C. W. A genome-wide signature of positive selection in ancient and recent invasive expansions of the honey bee Apis mellifera. Proc. Natl Acad. Sci. USA 105, 3421–3426 (2008). Francoy, T. M., Goncalves, L. S. & De Jong, D. Rapid morphological changes in populations of hybrids between Africanized and European honey bees. Genet. Mol. Res. 11, 3349–3356 (2012). Harpur, B. A. et al. Population genomics of the honey bee reveals strong signatures of positive selection on worker traits. Proc. Natl Acad. Sci. USA 111, 2614–2619 (2014). Chapman, N. C. et al. A SNP test to identify Africanized honeybees via proportion of ‘African’ ancestry. Mol. Ecol. Resour. 15, 1346–1355 (2015). Harpur, B. A. et al. Assessing patterns of admixture and ancestry in Canadian honey bees. Insect Soc. 62, 479–489 (2015). Requier, F. et al. The conservation of native honey bees is crucial. Trends Ecol. Evol. https://doi.org/10.1016/j.tree.2019.04.008 (2019). Muñoz, I. et al. SNPs selected by information content outperform randomly selected microsatellite loci for delineating genetic identification and introgression in the endangered dark European honeybee (Apis mellifera mellifera). Mol. Ecol. Resour. 17, 783–795 (2017). Henriques, D. et al. Developing reduced SNP assays from whole-genome sequence data to estimate introgression in an organism with complex genetic patterns, the Iberian honeybee (Apis mellifera iberiensis). Evolut. Appl. 11, 1270–1282 (2018). Harbo, J. R. & Harris, J. W. Heritability in honey bees (Hymenoptera: Apidae) of characteristics associated with resistance to Varroa jacobsoni (Mesostigmata: Varroidae). J. Econ. Entomol. 92, 261–265 (1999). Koffler, S., Kleinert, A. d. M. P. & Jaffé, R. Quantitative conservation genetics of wild and managed bees. Conserv. Genet. 18, 689–700 (2017). Stanimirovic, Z., Stevanovic, J., Aleksic, N. & Velibor, S. Heritability of grooming behaviour in grey honey bees (Apis mellifera Carnica). Acta Vet. 60, 313–323 (2009). Decanini, L. I., Collins, A. M. & Evans, J. D. Variation and heritability in immune gene expression by diseased honeybees. J. Hered. 98, 195–201 (2007). Wilfert, L., Gadau, J., Baer, B. & Schmid-Hempel, P. Natural variation in the genetic architecture of a host-parasite interaction in the bumblebee Bombus terrestris. Mol. Ecol. 16, 1327–1339 (2007). Wilfert, L., Gadau, J. & Schmid-Hempel, P. The genetic architecture of immune defense and reproduction in male Bombus terrestris bumblebees. Evolution 61, 804–815 (2007). Nino, E. L. & Cameron Jasper, W. Improving the future of honey bee breeding programs by employing recent scientific advances. Curr. Opin. Insect Sci. 10, 163–169 (2015). Ibrahim, A. G., Reuter, M. & Spivak, M. Field trials of honey bee colonies bred for mechanisms of resistance against Varroa destructor. Apidologie 38, 67–76 (2006). Spivak, M. & Gilliam, M. Hygienic behaviour of honey bees and its application for control of brood diseases and Varroa. Part I. Hygienic behaviour and resistance to American foulbrood. Bee World 79, 124–134 (1998). Baudry, E. et al. Relatedness among honeybees (Apis mellifera) of a drone congregation. Proc. Biol. Sci. 265, 2009–2014 (1998). Behrens, D. et al. Three QTL in the honey bee Apis mellifera L. suppress reproduction of the parasitic mite Varroa destructor. Ecol. Evol. 1, 451–458 (2011). Behrens, D. & Moritz, R. F. QTL-mapping of individual resistance against American foulbrood in haploid honeybee drone larvae (Apis mellifera). Apidologie 45, 409–417 (2014). Guzman-Novoa, E., Hunt, G. J., Uribe, J. L., Smith, C. & Arechavaleta-Velasco, M. E. Confirmation of QTL effects and evidence of genetic dominance of honeybee defensive behavior: results of colony and individual behavioral assays. Behav. Genet. 32, 95–102 (2002). McCarthy, M. I. et al. Genome-wide association studies for complex traits: consensus, uncertainty and challenges. Nat. Rev. Genet. 9, 356–369 (2008). Korte, A. & Farlow, A. The advantages and limitations of trait analysis with GWAS: a review. Plant Methods 9, 29 (2013). Wallberg, A., Schöning, C., Webster, M. T. & Hasselmann, M. Two extended haplotype blocks are associated with adaptation to high altitude habitats in East African honey bees. PLoS Genet. 13, e1006792 (2017). Wallberg, A., Pirk, C. W., Allsopp, M. H. & Webster, M. T. Identification of multiple loci associated with social parasitism in honeybees. PLoS Genet. 12, e1006097 (2016). Wragg, D. et al. Whole-genome resequencing of honeybee drones to detect genomic selection in a population managed for royal jelly. Sci. Rep. 6, 27168 (2016). Harpur, B. A. et al. Integrative genomics reveals the genetics and evolution of the honey bee’s social immune system. Genome Biol. Evol. 11, 937–948 (2019). In this study, the combined use of artificially selected lines and population genomics allows the researchers to unravel the complex genetics of social immunity in honeybees. Avalos, A. et al. A soft selective sweep during rapid evolution of gentle behaviour in an Africanized honeybee. Nat. Commun. 8, 1550 (2017). Broeckx, B. J. G. et al. Honey bee predisposition of resistance to ubiquitous mite infestations. Sci. Rep. 9, 7794 (2019). Kruglyak, L. The road to genome-wide association studies. Nat. Rev. Genet. 8, 314–318 (2008). Wu, Y., Zheng, Z., Visscher, P. M. & Yang, J. Quantifying the mapping precision of genome-wide association studies using whole-genome sequencing data. Genome Biol. 18, 86 (2017). Guarna, M. M. et al. Peptide biomarkers used for the selective breeding of a complex polygenic trait in honey bees. Sci. Rep. 7, 8381 (2017). This study provides a clear demonstration of the use of marker-assisted selection in honeybees. Zanni, V., Galbraith, D. A., Annoscia, D., Grozinger, C. M. & Nazzi, F. Transcriptional signatures of parasitization and markers of colony decline in Varroa-infested honey bees (Apis mellifera). Insect Biochem. Mol. Biol. 87, 1–13 (2017). Brutscher, L. M., Daughenbaugh, K. F. & Flenniken, M. L. Virus and dsRNA-triggered transcriptional responses reveal key components of honey bee antiviral defense. Sci. Rep. 7, 6448 (2017). Shi, T. F., Wang, Y. F., Liu, F., Qi, L. & Yu, L. S. Sublethal effects of the neonicotinoid insecticide thiamethoxam on the transcriptome of the honey bees (Hymenoptera: Apidae). J. Econ. Entomol. 110, 2283–2289 (2017). Corby-Harris, V., Jones, B. M., Walton, A., Schwan, M. R. & Anderson, K. E. Transcriptional markers of sub-optimal nutrition in developing Apis mellifera nurse workers. BMC Genom. 15, 134 (2014). Azzouz-Olden, F., Hunt, A. & DeGrandi-Hoffman, G. Transcriptional response of honey bee (Apis mellifera) to differential nutritional status and Nosema infection. BMC Genom. 19, 628 (2018). Amsalem, E., Galbraith, D. A., Cnaani, J., Teal, P. E. & Grozinger, C. M. Conservation and modification of genetic and physiological toolkits underpinning diapause in bumble bee queens. Mol. Ecol. 24, 5596–5615 (2015). Torson, A. S. et al. Physiological responses to fluctuating temperatures are characterized by distinct transcriptional profiles in a solitary bee. J. Exp. Biol. 220, 3372–3380 (2017). Durant, D. R., Berens, A. J., Toth, A. L. & Rehan, S. M. Transcriptional profiling of overwintering gene expression in the small carpenter bee, Ceratina calcarata. Apidologie 47, 572–582 (2016). Ankley, G. T. et al. Adverse outcome pathways: a conceptual framework to support ecotoxicology research and risk assessment. Env. Toxicol. Chem. 29, 730–741 (2010). Barron, A. B. Death of the bee hive: understanding the failure of an insect society. Curr. Opin. Insect Sci. 10, 45–50 (2015). Amdam, G. V., Fennern, E. & Havukainen, H. in Honey Bee Neurobiology and Behavior (eds Galizia, C., Eisenhardt, D., & Guirfa, M.) 17–29 (Springer, 2012). Alaux, C. et al. Measuring biological age to assess colony demographics in honeybees. PLoS One 13, e0209192 (2018). In this study, molecular markers are used to measure the ‘biological age’ of individual honeybees and evaluate the impacts of different stressors and management regimes. Dainat, B., Evans, J. D., Chen, Y. P., Gauthier, L. & Neumann, P. Predictive markers of honey bee colony collapse. PLoS One 7, e32151 (2012). Ricigliano, V. A. et al. Honey bee colony performance and health are enhanced by apiary proximity to US Conservation Reserve Program (CRP) lands. Sci. Rep. 9, 4894 (2019). Schmehl, D. R., Teal, P. E., Frazier, J. L. & Grozinger, C. M. Genomic analysis of the interaction between pesticide exposure and nutrition in honey bees (Apis mellifera). J. Insect Physiol. 71, 177–190 (2014). Vaudo, A. D., Tooker, J. F., Grozinger, C. M. & Patch, H. M. Bee nutrition and floral resource restoration. Curr. Opin. Insect Sci. 10, 133–141 (2015). Mao, W., Schuler, M. A. & Berenbaum, M. R. Honey constituents up-regulate detoxification and immunity genes in the western honey bee Apis mellifera. Proc. Natl Acad. Sci. USA 110, 8842–8846 (2013). Di Prisco, G. et al. Neonicotinoid clothianidin adversely affects insect immunity and promotes replication of a viral pathogen in honey bees. Proc. Natl Acad. Sci. USA 110, 18466–18471 (2013). De Smet, L. et al. BeeDoctor, a versatile MLPA-based diagnostic tool for screening bee viruses. PLoS One 7, e47953 (2012). Massuti, B., Sanchez, J. M., Hernando-Trancho, F., Karachaliou, N. & Rosell, R. Are we ready to use biomarkers for staging, prognosis and treatment selection in early-stage non-small-cell lung cancer? Transl Lung Cancer Res. 2, 208–221 (2013). Adnane, M., Kelly, P., Chapwanya, A., Meade, K. G. & O’Farrelly, C. Improved detection of biomarkers in cervico-vaginal mucus (CVM) from postpartum cattle. BMC Vet. Res. 14, 297 (2018). Brutscher, L. M., Daughenbaugh, K. F. & Flenniken, M. L. Antiviral defense mechanisms in honey bees. Curr. Opin. Insect Sci. 10, 71–82 (2015). Kunieda, T. et al. Carbohydrate metabolism genes and pathways in insects: insights from the honey bee genome. Insect Mol. Biol. 15, 563–576 (2006). Claudianos, C. et al. A deficit of detoxification enzymes: pesticide sensitivity and environmental response in the honeybee. Insect Mol. Biol. 15, 615–636 (2006). Doublet, V. et al. Unity in defence: honeybee workers exhibit conserved molecular responses to diverse pathogens. BMC Genom. 18, 207 (2017). This article describes a meta-analysis of several transcriptomic studies that identified genes that responded either to several or to only one of the pathogens or parasites tested, indicating that host transcriptional responses can be used to diagnose the particular pathogen or parasite that is infecting a bee. Wheeler, M. M. & Robinson, G. E. Diet-dependent gene expression in honey bees: honey vs. sucrose or high fructose corn syrup. Sci. Rep. 4, 5726 (2014). Alaux, C., Dantec, C., Parrinello, H. & Le Conte, Y. Nutrigenomics in honey bees: digital gene expression analysis of pollen’s nutritive effects on healthy and varroa-parasitized bees. BMC Genom. 12, 12–496 (2011). Wu, M. C., Chang, Y. W., Lu, K. H. & Yang, E. C. Gene expression changes in honey bees induced by sublethal imidacloprid exposure during the larval stage. Insect Biochem. Mol. Biol. 88, 12–20 (2017). Wang, L. et al. Metabolomics-based biomarker discovery for bee health monitoring: a proof of concept study concerning nutritional stress in Bombus terrestris. Sci. Rep. 9, 11423 (2019). Raymann, K. & Moran, N. A. The role of the gut microbiome in health and disease of adult honey bee workers. Curr. Opin. Insect Sci. 26, 97–104 (2018). Dharampal, P. S., Carlson, C., Currie, C. R. & Steffan, S. A. Pollen-borne microbes shape bee fitness. Proc. Biol. Sci. 286, 20182894 (2019). Galbraith, D. A. et al. Investigating the viral ecology of global bee communities with high-throughput metagenomics. Sci. Rep. 8, 8879 (2018). In this study, metagenomics is used to characterize the viruses infecting 12 bee species in populations collected from nine countries. Ryabov, E. V. et al. Recent spread of Varroa destructor virus-1, a honey bee pathogen, in the United States. Sci. Rep. 7, 17447 (2017). Ray, A. M. et al. Distribution of recently identified bee-infecting viruses in managed honey bee (Apis mellifera) populations in the United States. Apidologie (in the press). Cornman, R. S. Relative abundance of deformed wing virus, Varroa destructor virus 1, and their recombinants in honey bees (Apis mellifera) assessed by kmer analysis of public RNA-Seq data. J. Invertebr. Pathol. 149, 44–50 (2017). Singh, R. et al. RNA viruses in hymenopteran pollinators: evidence of inter-taxa virus transmission via pollen and potential impact on non-Apis hymenopteran species. PLoS One 5, e14357 (2010). Schoonvaere, K., Smagghe, G., Francis, F. & de Graaf, D. C. Study of the metatranscriptome of eight social and solitary wild bee species reveals novel viruses and bee parasites. Front. Microbiol. 9, 177 (2018). Piot, N. et al. Establishment of wildflower fields in poor quality landscapes enhances micro-parasite prevalence in wild bumble bees. Oecologia 189, 149–158 (2019). Li, J. L. et al. Systemic spread and propagation of a plant-pathogenic virus in European honeybees, Apis mellifera. mBio 5, e00898-13 (2014). Roberts, J. M. K., Ireland, K. B., Tay, W. T. & Paini, D. Honey bee-assisted surveillance for early plant virus detection. Ann. Appl. Biol. 173, 285–293 (2018). Fung, E. et al. De novo assembly of honey bee RNA viral genomes by tapping into the innate insect antiviral response pathway. J. Invertebr. Pathol. 152, 38–47 (2018). Ryabov, E. V. et al. A virulent strain of deformed wing virus (DWV) of honeybees (Apis mellifera) prevails after Varroa destructor-mediated, or in vitro, transmission. PLoS Pathog. 10, e1004230 (2014). Zheng, H., Powell, J. E., Steele, M. I., Dietrich, C. & Moran, N. A. Honeybee gut microbiota promotes host weight gain via bacterial metabolism and hormonal signaling. Proc. Natl Acad. Sci. USA 114, 4775–4780 (2017). Kwong, W. K., Mancenido, A. L. & Moran, N. A. Immune system stimulation by the native gut microbiota of honey bees. R. Soc. Open Sci. 4, 170003 (2017). Moran, N. A. Genomics of the honey bee microbiome. Curr. Opin. Insect Sci. 10, 22–28 (2015). Motta, E. V. S., Raymann, K. & Moran, N. A. Glyphosate perturbs the gut microbiota of honey bees. Proc. Natl Acad. Sci. USA 115, 10305–10310 (2018). Raymann, K., Shaffer, Z. & Moran, N. A. Antibiotic exposure perturbs the gut microbiota and elevates mortality in honeybees. PLoS Biol. 15, e2001861 (2017). Raymann, K., Coon, K. L., Shaffer, Z., Salisbury, S. & Moran, N. A. Pathogenicity of Serratia marcescens strains in honey bees. mBio 9, e01649-18 (2018). Steele, M. I., Kwong, W. K., Whiteley, M. & Moran, N. A. Diversification of type VI secretion system toxins reveals ancient antagonism among bee gut microbes. mBio 8, e01630-17 (2017). El Khoury, S. et al. Deleterious interaction between honeybees (Apis mellifera) and its microsporidian intracellular parasite Nosema ceranae was mitigated by administrating either endogenous or allochthonous gut microbiota strains. Front. Ecol. Evol. https://doi.org/10.3389/fevo.2018.00058 (2018). Bascompte, J. & Jordano, P. Networks: the architecture of plant-animal mutualistic biodiversity. Annu. Rev. Ecol. Evol. Syst. 38, 567–593 (2007). Vaudo, A. D., Patch, H. M., Mortensen, D. A., Tooker, J. F. & Grozinger, C. M. Macronutrient ratios in pollen shape bumble bee (Bombus impatiens) foraging strategies and floral preferences. Proc. Natl Acad. Sci. USA 113, E4035–E4042 (2016). Cane, J. H. & Snipes, S. in Plant-Pollinator Interactions: From Specializations to Generalization (eds N. M. Wasser & J. Ollerton) 99–122 (University of Chicago Press, 2006). Couvillon, M. J., Schurch, R. & Ratnieks, F. L. Waggle dance distances as integrative indicators of seasonal foraging challenges. PLoS One 9, e93495 (2014). Greenleaf, S. S., Williams, N. M., Winfree, R. & Kremen, C. Bee foraging ranges and their relationship to body size. Oecologia 153, 589–596 (2007). Richardson, R. T. et al. Rank-based characterization of pollen assemblages collected by honey bees using a multi-locus metabarcoding approach. Appl. Plant Sci. https://doi.org/10.3732/apps.1500043 (2015). Richardson, R. T. et al. Quantitative multi-locus metabarcoding and waggle dance interpretation reveal honey bee spring foraging patterns in Midwest agroecosystems. Mol. Ecol. 28, 686–697 (2018). This promising study shows the power of metagenomics and barcoding in providing quantitative data on the diversity and abundance of pollen collected by honeybees. Bell, K. L. et al. Pollen DNA barcoding: current applications and future prospects. Genome 59, 629–640 (2016). Pornon, A., Andalo, C., Burrus, M. & Escaravage, N. DNA metabarcoding data unveils invisible pollination networks. Sci. Rep. 7, 16828 (2017). Gous, A., Swanevelder, D. Z. H., Eardley, C. D. & Willows-Munro, S. Plant-pollinator interactions over time: pollen metabarcoding from bees in a historic collection. Evol. Appl. 12, 187–197 (2019). Sickel, W. et al. Increased efficiency in identifying mixed pollen samples by meta-barcoding with a dual-indexing approach. BMC Ecol. 15, 20 (2015). Hawkins, J. et al. Using DNA metabarcoding to identify the floral composition of honey: a new tool for investigating honey bee foraging preferences. PLoS One 10, e0134735 (2015). Bengtsson-Palme, J. et al. Metaxa2 Database Builder: enabling taxonomic identification from metagenomic or metabarcoding data using any genetic marker. Bioinforma. 34, 4027–4033 (2018). Bell, K. L. et al. Quantitative and qualitative assessment of pollen DNA metabarcoding using constructed species mixtures. Mol. Ecol. 28, 431–455 (2019). Hollingsworth, P. M., Li, D. Z., van der Bank, M. & Twyford, A. D. Telling plant species apart with DNA: from barcodes to genomes. Philos. Trans. R. Soc. Lond. B Biol. Sci. https://doi.org/10.1098/rstb.2015.0338 (2016). Garbian, Y., Maori, E., Kalev, H., Shafir, S. & Sela, I. Bidirectional transfer of RNAi between honey bee and varroa destructor: varroa gene silencing reduces varroa population. PLoS Pathog. 8, e1003035 (2012). Li, W. et al. Silencing the honey bee (Apis mellifera) Naked Cuticle gene (nkd) improves host immune function and reduces nosema ceranae infections. Appl. Env. Microbiol. 82, 6779–6787 (2016). This study demonstrates the utility of RNAi in controlling pathogen and parasite populations in bees. Yang, D. et al. Diverse factors affecting efficiency of RNAi in honey bee viruses. Front. Genet. 9, 384 (2018). Taning, C. N. T., Van Eynde, B., Yu, N., Ma, S. & Smagghe, G. CRISPR/Cas9 in insects: Applications, best practices and biosafety concerns. J. Insect Physiol. 98, 245–257 (2017). Kohno, H., Suenami, S., Takeuchi, H., Sasaki, T. & Kubo, T. Production of knockout mutants by CRISPR/Cas9 in the European honeybee, Apis mellifera L. Zool. Sci. 33, 505–512 (2016). Roth, A. et al. A genetic switch for worker nutrition-mediated traits in honeybees. PLoS Biol. 17, e3000171 (2019). This study demonstrates the use of gene editing with CRISPR–Cas9 to characterize the function of candidate genes. Chaverra-Rodriguez, D. et al. Targeted delivery of CRISPR-Cas9 ribonucleoprotein into arthropod ovaries for heritable germline gene editing. Nat. Commun. 9, 3008 (2018). Mattila, H. R. & Seeley, T. D. Genetic diversity in honey bee colonies enhances productivity and fitness. Science 317, 362–364 (2007). Meixner, M. D. et al. Honey bee genotypes and the environment. J. Apicult. Res. 53, 183–187 (2014). This study summarizes a series of honeybee genotype–environment studies conducted in Europe. Danforth, B. N., Minckley, R. L., Neff, J. L. & Fawcett, F. The Solitary Bees: Biology, Evolution and Conservation. (Princeton University Press, 2019). Beye, M., Hasselmann, M., Fondrk, M. K., Page, R. E. & Omholt, S. W. The gene csd is the primary signal for sexual development in the honey bee and encodes a new SR-type protein. Cell 114, 419–429 (2003). Harpur, B. A., Sobhani, M. & Zayed, A. A review of the consequences of complementary sex determination and diploid male production on mating failures in the Hymenoptera. Entomol. Exp. Appl. 146, 156–164 (2013). Zayed, A. Effective population size in Hymenoptera with complementary sex determination. Heredity 93, 627–630 (2004). Zayed, A. & Packer, L. Complementary sex determination substantially increases extinction proneness of haplodiploid populations. Proc. Natl Acad. Sci. USA 102, 10742–10746 (2005). Lopez-Uribe, M. M., Jha, S. & Soro, A. A trait-based approach to predict population genetic structure in bees. Mol. Ecol. 28, 1919–1929 (2019). Packer, L. et al. Conservation genetics of potentially endangered mutualisms: reduced levels of genetic variation in specialist versus generalist bees. Conserv. Biol. 19, 195–202 (2005). Romiguier, J. et al. Population genomics of eusocial insects: the costs of a vertebrate-like effective population size. J. Evol. Biol. 27, 593–603 (2014). Murray, E. A., Bossert, S. & Danforth, B. N. Pollinivory and the diversification dynamics of bees. Biol. Lett. https://doi.org/10.1098/rsbl.2018.0530 (2018). Pinto, M. A. et al. Genetic integrity of the dark European honey bee (Apis mellifera mellifera) from protected populations: a genome-wide assessment using SNPs and mtDNA sequence data. J. Apicult. Res. 53, 269–278 (2014). Research in the laboratory of C.M.G. is supported by funding from the US National Science Foundation and the US Department of Agriculture. Research in the laboratory of A.Z. is supported by a Discovery Grant from the Natural Sciences and Engineering Research Council of Canada, Large Scale Applied Research Projects (BeeOMICs and BeeCSI) from Genome Canada and a York University Research Chair in Genomics. Nature Reviews Genetics thanks D. de Graaf, K. Raymann and the other, anonymous, reviewer(s) for their contribution to the peer review of this work. The authors declare no competing interests. Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Packer lab Bee Galleries: https://www.yorku.ca/bugsrus/resources/resources The BeeCSI project: http://beecsi.ca US National Honey Bee Pest and Disease Survey: https://www.aphis.usda.gov/aphis/ourfocus/planthealth/plant-pest-and-disease-programs/honeybees/survey Structural but not necessarily functional enzyme variants that migrate at different rates during electrophoresis, which are the result of genetic changes in the enzyme-encoding gene. - Restriction fragment length polymorphisms Genetic variations that create or abolish a restriction enzyme recognition site, leading to variation in DNA fragment sizes following digestion by restriction endonucleases, as revealed by gel electrophoresis. Stretches of repetitive DNA with a core motif (typically two or three bases) that is repeated many times. Microsatellites have high mutation rates, leading to many alleles segregating within populations. Because of their polymorphic nature, they are naturally suited for DNA fingerprinting applications. A genetic system in which females are diploid and males are haploid. - Population genomics Analysis of genetic diversity at a genome scale in populations to estimate population genetic parameters or to link genotype with phenotype. Analysis of transcripts within specific tissues using microarrays or RNA sequencing. Analysis of DNA or RNA from communities of organisms using high-throughput sequencing approaches. Metagenomics does not require isolation of specific species or strains from collected samples before sequencing and thus can be used to identify all species or variants within a sample using bioinformatics. - Marker-assisted selection Artificial selection programmes using predictive genetic markers to select individuals for breeding - Genome-wide association studies (GWAS). Studies that investigate the association between genotypes across the genome and their influence on phenotypic traits in natural populations. - Effective population size The size of an ‘ideal’ population (a random mating population of constant size with Poisson variation in family sizes) that would have the same genetic parameters as the actual population under study. - RNA interference (RNAi). The application of double-stranded RNA molecules to reduce or silence the expression of target genes. - Single-nucleotide polymorphism (SNP). A point mutation in a DNA sequence that introduces variation between individuals of a group or species. - Positive selection An evolutionary force that increases the frequency of beneficial mutations within populations. - Selective sweeps Processes by which strong positive selection on a mutation results in reduced genetic diversity at nearby linked loci. Pertaining to genomes that have been generated by hybridization of typically distinct genomes. - Extinction via hybridization The loss of naturally distinct evolutionary lineages as a result of hybridization with other — typically managed — populations. - Narrow sense heritability The proportion of phenotypic variance attributed to additive genetic variance. - Quantitative trait loci (QTLs). Genomic loci that contain variants influencing a quantitative trait. Quantitative traits exhibit continuous variation within populations, such as height in humans or the amount of pollen collected by bee colonies. - Haplotype blocks Stretches of DNA characterized by high levels of linkage disequilibrium. - Thelytokous parthenogenesis A form of asexual reproduction found in honeybees from the Cape region of South Africa. Worker bees have the ability to lay unfertilized diploid eggs that develop into daughter workers. - Adverse outcomes pathway A conceptual framework that links a molecular phenotype (such as a change in gene expression or level of activity of a receptor) to a phenotypic change at another level of biological organization (such as physiology or behaviour) that is associated with a particular end point of interest (such as changes in survival, population demography or size). Adverse outcomes pathways are developed and refined using empirical data and are commonly used in ecotoxicological research. A metagenomic method in which specific genomic regions (rather than whole genomes) are amplified and sequenced. These regions are selected to show high interspecific variation and low intraspecific variation, allowing identification of the different species within the sample. Metabarcoding is often used to minimize sequencing costs or to investigate fairly well-characterized communities. - Corbicular loads Pollen loads that are carried on the modified pollen basket (that is, the corbicula) of some bees of the subfamily Apinae. The taxonomic analysis of pollen grains. Pertaining to genetic loci that affect two or more phenotypic traits. About this article Cite this article Grozinger, C.M., Zayed, A. Improving bee health through genomics. Nat Rev Genet 21, 277–291 (2020). https://doi.org/10.1038/s41576-020-0216-1 This article is cited by Gene expression in bumble bee larvae differs qualitatively between high and low concentration imidacloprid exposure levels Scientific Reports (2023) Development of a multiplex microsatellite marker set for the study of the solitary red mason bee, Osmia bicornis (Megachilidae) Molecular Biology Reports (2022) Nature Reviews Genetics (2020) Nature Reviews Genetics (2020)
<urn:uuid:dc1a6dbf-46c9-4694-8d7c-c21465d06abf>
CC-MAIN-2023-50
https://www.nature.com/articles/s41576-020-0216-1?error=cookies_not_supported&code=45f7f5a9-286d-4cb5-8161-78d3abccba34
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.719001
9,484
3.09375
3
Treatment for Diarrhea In this section: - How can I treat my acute diarrhea? - How can I treat my child’s acute diarrhea? - How do doctors treat persistent and chronic diarrhea? - How can I prevent diarrhea? - How can I treat or prevent dehydration caused by diarrhea? - How can I treat or prevent my child’s dehydration caused by diarrhea? How can I treat my acute diarrhea? In most cases, you can treat your acute diarrhea with over-the-counter medicines such as loperamide (Imodium) and bismuth subsalicylate (Pepto-Bismol, Kaopectate). Doctors generally do not recommend using over-the-counter medicines for people who have bloody stools or fever—signs of infection with bacteria or parasites. If your diarrhea lasts more than 2 days, see a doctor right away. When you have acute diarrhea, you may lose your appetite for a short time. When your appetite returns, you can go back to eating your normal diet. Learn more about eating when you have diarrhea. How can I treat my child’s acute diarrhea? Over-the-counter medicines to treat acute diarrhea in adults can be dangerous for infants, toddlers, and young children. Talk to a doctor before giving your child an over-the-counter medicine. If your child’s diarrhea lasts more than 24 hours, see a doctor right away. You can give your child his or her usual age-appropriate diet. You can give your infant breast milk or formula as usual. How do doctors treat persistent and chronic diarrhea? How doctors treat persistent and chronic diarrhea depends on the cause. Doctors may prescribe antibiotics and medicines that target parasites to treat bacterial or parasitic infections. Doctors may also prescribe medicines to treat some of the conditions that cause chronic diarrhea, such as Crohn’s disease, irritable bowel syndrome, or ulcerative colitis. How doctors treat chronic diarrhea in children also depends on the cause. Doctors may recommend probiotics. Probiotics are live microorganisms, most often bacteria, that are similar to microorganisms you normally have in your digestive tract. Researchers are still studying the use of probiotics to treat diarrhea. For safety reasons, talk with your doctor before using probiotics or any other complementary or alternative medicines or practices. If your doctor recommends probiotics, talk with him or her about how much probiotics you should take and for how long. How can I prevent diarrhea? You can reduce your chances of getting or spreading infections that can cause diarrhea by washing your hands thoroughly with soap and warm water for 15 to 30 seconds - after using the bathroom - after changing diapers - before and after handling or preparing food Rotavirus, which causes viral gastroenteritis, was the most common cause of diarrhea in infants before rotavirus vaccines became available. The vaccines have reduced the number of cases of rotavirus and hospitalizations due to rotavirus among children in the United States.1 Two oral vaccines are approved to protect children from rotavirus infections: - rotavirus vaccine, live, oral, pentavalent (RotaTeq). Doctors give infants this vaccine in three doses: at 2 months of age, 4 months of age, and 6 months of age. - rotavirus vaccine, live, oral (Rotarix). Doctors give infants this vaccine in two doses: at 2 months of age and at 4 months of age. For the rotavirus vaccine to be effective, infants should receive all doses by 8 months of age. Infants 15 weeks of age or older who have never received the rotavirus vaccine should not start the series. Parents or caregivers of infants should discuss rotavirus vaccination with a doctor. To reduce the chances of getting travelers’ diarrhea when traveling to developing countries, avoid - drinking tap water - using tap water to make ice, prepare foods or drinks, or brush your teeth - drinking juice or milk or eating milk products that have not been pasteurized—heated to kill harmful microbes—viruses, bacteria, and parasites - eating food from street vendors - eating meat, fish, or shellfish that is raw, undercooked, or not served hot - eating raw vegetables and most raw fruits You can drink bottled water, soft drinks, and hot drinks such as coffee or tea made with boiling water. If you are worried about travelers’ diarrhea, talk with your doctor before traveling. Doctors may recommend taking antibiotics before and during a trip to help prevent travelers’ diarrhea. Early treatment with antibiotics can shorten a case of travelers’ diarrhea. You can prevent foodborne illnesses that cause diarrhea by properly storing, cooking, cleaning, and handling foods. How can I treat or prevent dehydration caused by diarrhea? To treat or prevent dehydration, you need to replace lost fluids and electrolytes—called rehydration therapy—especially if you have acute diarrhea. Although drinking plenty of water is important in treating and preventing dehydration, you should also drink liquids that contain electrolytes, such as the following: - caffeine-free soft drinks - fruit juices - sports drinks If you are an older adult or have a weak immune system, you should also drink oral rehydration solutions, such as Pedialyte, Naturalyte, Infalyte, or CeraLyte. Oral rehydration solutions are liquids that contain glucose and electrolytes. You can make oral rehydration solutions at home (PDF, 184KB) . How can I treat or prevent my child’s dehydration caused by diarrhea? To treat or prevent dehydration, give your child liquids that contain electrolytes. You can also give your child an oral rehydration solution, such as Pedialyte, Naturalyte, Infalyte, or CeraLyte, as directed. Talk to a doctor about giving these solutions to your infant. This content is provided as a service of the National Institute of Diabetes and Digestive and Kidney Diseases (NIDDK), part of the National Institutes of Health. NIDDK translates and disseminates research findings to increase knowledge and understanding about health and disease among patients, health professionals, and the public. Content produced by NIDDK is carefully reviewed by NIDDK scientists and other experts.
<urn:uuid:b5959a51-d211-49b6-a4a7-bc7e1f818252>
CC-MAIN-2023-50
https://www.niddk.nih.gov/health-information/digestive-diseases/diarrhea/treatment
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.91459
1,313
3.09375
3
The Encyclopedia of Oklahoma History and Culture TERRITORIAL DEPARTMENT OF PUBLIC INSTRUCTION. In December 1890 the Oklahoma Territorial Legislature provided for the gubernatorial appointment of a superintendent of public instruction (and ex officio territorial auditor) and a Territorial Board of Education, thereby joining other U.S. territories and states in assigning supervision and oversight of public education. Comprised of superintendents from the seven original counties of Oklahoma Territory and the territorial superintendent, the board was modified in 1893 when the county superintendents were replaced by the presidents of Territorial Normal School (now the University of Central Oklahoma) and Territorial University (now the University of Oklahoma) and one city and one county superintendent. After an assistant superintendent, stenographer, and clerks were hired in the superintendent's office, the framework for the Department of Public Instruction was formed. The board addressed topics such as the development of teachers' examinations, textbook adoptions, the manner of paying teachers' wages, standards and qualifications for teaching certificates, courses of study, and the creation of normal schools and county institutes. Separate from his board duties, the territorial superintendent apportioned the territorial school fund income and annual school taxes, interpreted the provisions of the school laws for the county and city superintendents, published the school laws every other year, prepared and distributed the forms necessary for collecting data, visited each county at least annually, and submitted a biennial report to the governor. These reports, both narrative and statistical in nature, provided the superintendent a forum to inform the legislature about necessary statutory changes and the public about the progress and the expansion of the educational system. With this delineation of duties, the major responsibility for the governance of the schools lay with the county and city superintendents. At statehood in 1907, school was held for at least three months of the year in 3,648 schools operating in 3,441 districts of the twenty-six counties of Oklahoma Territory. More than thirty-six hundred teachers were employed to teach the 167,803 pupils enrolled, an increase from 438 teachers and 9,395 students in 1891. All seven territorial superintendents were college graduates, and five had previously held education positions. James H. Lawhead, who served as the first superintendent from December 1890 to August 1892, had worked as Kansas state superintendent. Joseph H. Parker (1892–94) was a teacher and principal in Vermont and a Congregationalist minister in Oklahoma. Evan Dhu Cameron (1894–96) was a Methodist minister, and Albert O. Nichols (1896–97) was assistant auditor. Stuart N. Hopkins (1897–1901) worked in Iowa as a teacher, principal, and county superintendent before becoming superintendent in El Reno. Louis W. Baxter (1901–06) was superintendent of the Guthrie schools, and James E. Dyche (January–November, 1907) was a teacher, principal, and superintendent in Kansas. The superintendent's office was not free of controversy. Parker was forced out for allegedly devoting too much time to his ministry, Nichols was charged with unfair purchasing practices relating to a textbook company, and Hopkins' tenure ended when the legislature adjourned without confirming his reappointment. However, the political climate did not keep these men from working to build a solid foundation for the supervision of the schools during the Territorial Era. A. Kenneth Stern, "Laying Groundwork for the Future: The Oklahoma Territorial Superintendency and Superintendents of Public Instruction," The Chronicles of Oklahoma 77 (Fall 1999). Browse By TopicEducation The following (as per The Chicago Manual of Style, 17th edition) is the preferred citation for articles: A. Kenneth Stern, “Territorial Department of Public Instruction,” The Encyclopedia of Oklahoma History and Culture, https://www.okhistory.org/publications/enc/entry?entry=TE016. © Oklahoma Historical Society
<urn:uuid:ed85043a-a261-4cdc-af46-b9319832cda4>
CC-MAIN-2023-50
https://www.okhistory.org/publications/enc/entry?entryname=TERRITORIAL%20DEPARTMENT%20OF%20PUBLIC%20INSTRUCTION
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.953081
811
2.9375
3
Amputation can severely impact the quality of life and hamper a person’s earning ability. There are numerous causes of amputations. Some people require amputations due to diseases, while others go through or deal due to avoidable or preventable accidents. Amputation has significant long-term financial impacts that can be addressed through legal actions. Legally speaking, amputation injuries frequently place a heavy financial burden on the victim in the form of medical expenses and lost wages. The victim might need continuous medical treatment, counseling, rehabilitation, and expensive prosthetics or other assistive equipment. Additionally, the victim might become permanently or momentarily unable to work, which would result in lost income and possible financial instability. You should hire an attorney for calculating the compensation for your amputation injury and filing a lawsuit if you or a loved one has been hurt in an accident. The following are some long-term consequences of an amputation injury; The effect an amputation injury can have on the victim’s physical health is one of the most important long-term effects. The extent and area of the amputation will determine whether the victim continues to feel agony, has phantom limb sensations or has mobility problems. They might need continuous medical attention, counseling, rehabilitation, and costly prosthetics or other aids. Several long-lasting changes are imminent after a severe accident resulting in amputation. You must now get used to your new situation as an amputee. You might have trouble trying to fit in with some social groups or become uncomfortable around individuals you do not trust. Amputees must overcome the pressures of dealing with social limitations to keep their mental health in check. Amputations are handled differently by various people. While some people can deal with losing a limb, others become extremely irritated about it. Their peers and family become concerned about their emotional issues. They might attempt self-medication or therapy to deal with their problems. The emotional anguish is also caused by mounting medical debt and the inability to pay it. While some people only get a partial amount from an insurance claim, others might not get any reimbursement at all. Body Image Issues Another long-term mental effect of amputation is problems with body image. Many victims struggle to accept their new bodies, develop self-consciousness about their appearance, or question their self-worth as a result. Today’s world is more concerned about body image than mental health. As a result, an amputee does not only have to deal with their mental health but their body image as well, which can take its toll on them. Victims of amputation accidents may experience long-term serve effects. Their lives may be affected in several ways, including in the physical, emotional, psychological, financial, and social spheres. As a result, it is crucial for those who have suffered amputation injuries to get all the assistance they need to overcome these obstacles and improve the quality of their lives. Whether it was a doctor or a driver, you have the legal right to file a lawsuit against the party who was responsible for your amputation injury. The best course of action is to employ a personal injury lawyer who focuses on cases involving car accidents, medical malpractice, and other amputation injury-related issues. A skilled lawyer will help you file a lawsuit and guide you through the legal processes to recover at least the financial damages.
<urn:uuid:c25d9625-3864-498d-9295-c230e0d66139>
CC-MAIN-2023-50
https://www.orangemarigolds.com/the-long-term-consequences-of-an-amputation-injury/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.965816
687
2.609375
3
Security is a significant concern in the open source software world. In fact, security is the measure of assurance and guarantee that open source software is safe from potential risks and dangers. We’ll be discussing the security threats and the solutions that can be used to protect open source software. We’ll also be discussing the benefits of open source software. Open source software security is defined as the guarantee, or freedom of risk that an open source program offers. This assurance is what gives the software its trustworthiness and confidence. Open source software security is determined by many factors. Users are often most concerned about code integrity. Amazon and other companies have pledged $30 million each to help fund a 10-point plan to improve the security of open-source software. The plan is expected to help reduce the time it takes to discover vulnerabilities, speed up the patching process, and improve the quality of open source software. It will also encourage digital signatures use and improve security awareness. Open source software is safer than proprietary software. But, it does have its problems. An attacker can easily exploit security flaws in open-source code because it is often reused. Even the most secure software may be vulnerable if not properly protected. Equifax was the victim of a security breach recently when hackers exploited an Apache Struts flaw. Open-source software vulnerabilities are widespread. They can affect millions. These vulnerabilities can even be exploited by inexperienced hackers. Although industry-wide efforts have been made to make open source software safer, organizations must still develop their own cybersecurity policies to protect it. Open source software security should be a top priority for every organization. Visibility of open source parts is one of the main problems. Developers have a lot of control over open source environments thanks to security tools that can automatically inventory and evaluate components. These tools can be found in CI/CD pipelines and can help identify components that are vulnerable. Security tools can also be used to scan code as it is being written in a development environment. Open source security can become complicated due to the different levels of dependencies between open-source code and the source code. This allows developers to minimize risk by securing both their code as well as the open-source components that it uses. Open-source software at risk Open source software has many concerns. Bad actors could gain access to it. Hackers can access source code using a variety of methods. These methods are often faster than going through millions of lines code. One method is to track open source vulnerability. Hackers can exploit these vulnerabilities because they are publicly available. Many open source projects make the code public, so hackers can easily identify and flag potential vulnerabilities. This can help open-source project managers fix any issues before the vulnerability becomes public. Hackers can attack any organization that has not been capable of patching their software once a vulnerability is made public. Another method is code auditing to find vulnerabilities. One study found open source vulnerabilities in 78 per cent of codebases. 54 percent were considered to be high risk. Open source software can be a great way for people to save time and money, but there are security risks. These vulnerabilities can impact an organization’s data and operations. Options for securing Open Source Software There are many options for securing opensource software. One of the biggest benefits of open source software is its ability to be reviewed by third parties, which makes it more secure that closed software. There is also a community that works together to fix bugs or security vulnerabilities. The process of patching an open source application should be seamless and trouble-free, and developers should have an incentive to fix security flaws as quickly as possible. Another option is to include a digital signature for software releases. Software-based digital signings is the name of this process. Software components can be validated by organizations like Chainguard, TestifySec and OSSIG. Developers can also learn how to reduce vulnerabilities. A good idea is to replace a nonmemory-safe language such as Rust or C++ with a memory-safer language like Python. Another option is to use an open source management software. These systems continuously scan open sources repositories, cross-reference vulnerability databases, and constantly scan them. Open source management systems can alert users about known vulnerabilities and the release of new patches by doing this. These tools can be purchased commercially or open-source. A good security management software will be able protect open source software from security threats. Companies are becoming more aware of the importance of open source security. The federal government is pushing software companies and developers to comply with the NIST Secure Software Development Framework. Open Source Security Foundation, (OSSF), recently launched a new initiative to improve security for open source software. The Security Mobilization Plan is designed to protect open source software supply chains. The open source community is doing a great deal to secure open source projects. However, the problem with vulnerabilities is that there is no central repository of information about them. It’s scattered across many resources and difficult to find. This is a problem for developers as they don’t know the name of the component. Fortunately, open source software projects are generally able to patch vulnerabilities quickly. Unpatched vulnerabilities are still possible, but they can be fixed quickly. Developers will usually fix vulnerabilities quickly if they are publicly disclosed. You can still take steps to protect your open source code, such as disabling vulnerable functionality and setting hardware or software to not use vulnerable features. Benefits of open source software Open source software offers many advantages for businesses. It improves employee satisfaction and business processes. It also reduces operational overhead. What are the benefits of open-source software exactly? These benefits will be highlighted in the following. These are the three major benefits. These are some of the key benefits of open source for enterprise software. Open source software offers flexibility and freedom. Businesses can customize it and make it work for them. A platform without license restrictions allows them to avoid vendor lock-in. Open source software makes it easy to customize and maintain and allows business owners the freedom to make changes to best suit their needs. It helps businesses stay ahead in the market. Open source offers stability and security. Open source projects are often updated frequently, so bug fixes and new features are usually available quickly. Contrary to proprietary software, which can take several months to fix a single bug. Also, open source software allows users to try out new features early in the development cycle, which means organizations can adopt the latest version more quickly. Creativity is a key component of open source projects. They help employees to improve their problem-solving and programming skills. They expose employees to a wide variety of languages and libraries, and they have the opportunity to network with other developers. This allows employees to develop a skill set that will benefit them in the long run. Cost-effectiveness: Open-source solutions are often cheaper than proprietary solutions. Enterprise companies can scale quickly to save money. Open source solutions often are available online for free. Open source software is also free to update or enhance. Open source software is a great way to save money for your business. It can save you up to PS50 Billion annually. Customization: Organizations have the ability to customize open-source software to create their own business tools. Businesses can modify, scale, and modify the source code readily available. This allows businesses to better balance their workloads while keeping up with changes in market. Hello, My name is Shari & I am a writer for the ‘Outlook AppIns’ blog. I’m a CSIT graduate & I’ve been working in the IT industry for 3 years.
<urn:uuid:e97b6c38-c185-44e9-9c54-6852eaee7d2f>
CC-MAIN-2023-50
https://www.outlookappins.com/computer-internet/is-open-source-software-secure/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.944255
1,561
3.3125
3
Write short notes on Ancient Indian coin and Rock art. Ancient Indian coins: Although a good number of coins and inscriptions has been found on the surface, many of them have been unearthed by digging the study of coins in called numismatics. Ancient coins were made of metal copper, silver, gold or lead. Coin moulds made of burnt clay have been discovered in large numbers. Since there was nothing like the modern banking system in ancient times, people kept money in earthen ware and also in brass vessels. They are preserved mostly in museums at Calcutta, Patna, Lucknow, Delhi, Jaipur, Bombay and Madras. Coins of the major dynasties have been cataloged and published. Our earliest coins contain a few symbols, but the later coins mention the names of kings, gods or dates. The areas where they are found indicate the region of their circulation. Rock paintings and carvings also give us an insight into the subsistence pattern and social life of the Palaeolithic people. The earliest paintings belong to Upper Paleolithic age. Bhimbetka located on the Vindhyan range, is well known for continuous succession of paintings of different periods. Period belongs to Upper Palaeolithic stage and paintings are done in green and dark red colors. The paintings are predominantly of biscons, elephants, tigers, rhinos and boars. They are usually large, some measuring two-three meters in length. There is need to work out the frequency of the different types of animals to have more precise idea about the hunting life of Paleolithic people. The paintings and engravings found at the rock shelters which the Mesolithic people used give us considerable idea about the social lfie and economic activities of Mesolithic people. Sites like Bhimbetka, Azamgarh, Pratapgarh and Mirzapur are rich in Mesolithic art and paintings. Hunting, food-gathering, fishing and other human activities are reflected in these paintings and engravings. Bhimbetka is extremely rich in paintings. Many animals like, boar, buffalo, monkey and nilgai are frequently depicted.
<urn:uuid:704b59fa-ed08-4ff9-b40c-6c01b4492e80>
CC-MAIN-2023-50
https://www.owlgen.in/write-short-notes-on-ancient-indian-coin-and-rock-art/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.970061
438
3.4375
3
A Time of Transformation This is a time of transformation - a time when the human being is beginning to learn to become adult, and but as yet is very awkward at it. Adolescents are genetically programmed for social interaction, and so the Montessori environment makes this possible, as well as constructive to their learning. Whatever discipline they study, collaborative work is part of the process - no matter the subject, have opportunities for research, song writing, story, poetry composition and appreciation, dialogue, drama, performance. The adolescent is eager to be part of society in all its aspects - this is when the human being is most interested in how people earn a living, the organisation of politics, the morality of actions. The 12-18 year old is extremely idealistic and driven to change the world. While traditional education usually subjects this age to memorizing meaningless facts they cannot see as relevant to human life outside the classroom, the Montessori adolescent program offers learning about real life. Lessons have practical applications that enable students to see how they can make an impact on the community.
<urn:uuid:a1008b6d-64df-438b-a1c9-9bbeb326f104>
CC-MAIN-2023-50
https://www.philippinemontessori.com/pmc-highschool
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.957664
218
3.25
3
Malapert and Shakespeare Malapert debuted in English in the 14th century, was a favorite of Shakespeare, and is still used sporadically today. The prefix mal-, meaning "bad" or "badly" and deriving from the Latin malus, is found in many English words, including "malevolent" and "malefactor." The second half of "malapert" comes from the Middle English apert, meaning "open" or "frank." "Apert" further derives from the Latin word"apertus" ("open"), which gave us our noun "aperture" (meaning "an opening"). Putting the two halves together gives us a word that describes someone or something that is open or honest in a bad way-that is, a way that is bold or rude. The noun "malapert" also exists, and means "a bold or impudent person." Reason why convert Ann Barnhardt and other convert ladies should shut the hell up: The women among the heretics in times past were so shameless, & malapert, that they took upon them to dispute, and to reason of matters of religion: & they helped foreward the Heresy, by teaching, preaching, prating, wrangling, jangling, prophesying, and by all means possible. And do not, I pray you, the women amongst the Protestants the like, following therein their father Luther's advise, who licensed them to do such things, & namely to Preach? The above lesson is taken from Catholic Tradition & Church Fathers as set down by a Catholic Priest in the year of our Lord 1600. Ann Barnhardt is a dangerous woman. Her means of spreading her heretical doctrine: - Pod Cast Barnhardt makes no personal appearances - because she is not a Catholic - but a fraud. And if anyone were to witness Barnhardt attending Latin Mass in Public one would be dismayed at her lack of reverence and piety. She is one of Luther's daughters Remember she used the Luther's version of the Our Father for well over a year on her blog before I called her out on it.
<urn:uuid:49cbc8cd-5918-4ea5-b8c9-13faaa81c204>
CC-MAIN-2023-50
https://www.priestshavebecomecesspoolsofimpurity.com/2017/09/why-malapert-convert-ann-barnhardt.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.962385
440
3.125
3
The demand for cars is rising rapidly in Doggerland. Two rival car companies Sunbeam and Hillman are each considering building a new plant to supply the growing market. Each company is aware that the potential profitability of their new plant will depend in part on the decision made by their competitor. The choices facing each company are shown below, as are the potential profits from each decision 1. Use the information provided above to create a pay-off matrix to show the joint outcomes from the decisions made by the two companies. From the payoff matrix identify the Nash equilibrium and explain why this would be the outcome of the game. 2. Now use the same information to create a decision tree, assuming that Sunbeam will make their decision first. Analyse the resulting decision tree and explain the decision that will each company will make. 3. Compare and contrast the outcomes from the payoff matrix and the decision tree. 4. Assess the methods that are available to Sunbeam and Hillman to reduce the uncertainty around the decisions created by their interdependence?
<urn:uuid:75f8c8a5-7bd7-4c94-b67a-ed3b6848f18f>
CC-MAIN-2023-50
https://www.qualifiedwriters.com/samples/1-use-the-information-provided-above-to-create-a-pay-off-matrix-to-show-the-joint-outcomes-from-the-decisions-made-by-the-two-companies-from-the-payoff-matrix-identify-the-nash-equilibrium-and-explain-why-this-would-be-the-outcome-of-the-game/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.953329
212
3.203125
3
Angiographic Catheter Types Angiographic catheters are essential tools in the field of interventional cardiology and radiology. These specialized catheters are used to access blood vessels, visualize the vascular system, and perform various diagnostic and therapeutic procedures. In this blog, we will explore the different angiographic catheter types available, with a focus on the SCW Medicath brand. The Role of Angiographic Catheters Before delving into the types of angiographic catheters, let's briefly understand their significance in medical procedures. Angiographic catheters are designed to: Access Blood Vessels: They provide a pathway to access blood vessels, allowing physicians to introduce contrast agents and diagnostic or therapeutic devices. Image Blood Vessels: Angiographic catheters enable the injection of contrast media, which enhances the visibility of blood vessels under fluoroscopy or X-ray imaging. Perform Interventions: These catheters facilitate various minimally invasive procedures, including angioplasty, stent placement, embolization, and more. Types of Angiographic Catheters Diagnostic Angiographic Catheters SCW Medicath Diagnostic Angiographic Catheters: These catheters are designed for the visualization of blood vessels and are often used in angiography procedures. The SCW Medicath brand offers a range of diagnostic catheters known for their exceptional image quality and precise navigation within the vascular system. SCW Medicath Guide Catheters: Guide catheters serve as a conduit for introducing other interventional devices, such as guidewires and balloons, to specific target locations within the vascular system. SCW Medicath's guide catheters are known for their flexibility and support in navigating complex anatomies. Catheter Shapes and Configurations Angiographic catheters come in various shapes and configurations to suit different clinical scenarios. These include straight catheters, curved catheters, and specialty catheters like pigtail and multipurpose catheters. The choice of catheter shape depends on the specific diagnostic or interventional procedure and the anatomical site being accessed. Advantages of SCW Medicath Angiographic Catheters As a reputable brand in the medical industry, SCW Medicath is known for producing high-quality angiographic catheters that offer several advantages: Precise Navigation: SCW Medicath catheters are designed for precise navigation within blood vessels, ensuring accurate placement during procedures. Enhanced Imaging: These catheters are compatible with advanced imaging technologies, providing clear and detailed visualization of the vascular system. Durability: SCW Medicath catheters are constructed using durable materials, ensuring their longevity and reliability during procedures. Wide Range of Options: The brand offers a wide range of catheter types and configurations to accommodate various clinical needs and preferences. In conclusion, angiographic catheters play a crucial role in modern medical procedures, enabling clinicians to diagnose and treat vascular conditions with precision and minimal invasiveness. The SCW Medicath brand, known for its commitment to quality and innovation, offers a comprehensive range of angiographic catheter types that meet the demands of medical professionals in interventional cardiology and radiology. Whether for diagnostic imaging or therapeutic interventions, these catheters are trusted tools in the pursuit of better patient outcomes and improved healthcare practices.
<urn:uuid:317d1450-e804-4d44-b7e8-a1351ebfd46a>
CC-MAIN-2023-50
https://www.scwmedicath.com/angiographic-catheter-types.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.885038
703
2.75
3
The muscle groups and angle range of movement of the fingers are very small, so the fingers are the most vulnerable joints in the human body. In general, the normal range of motion of the fingers is as follows: the opening and closing degree of the thumb is about 50-60 degrees (Figure A-1); The opening and closing degree between the remaining four fingers is generally not more than 35 degrees (Figure A-2); The four-finger dorsal hand is upturned, generally between 10 degrees and 30 degrees (Figure A-3); Flexed into a fist can reach 80 degrees to 90 degrees (Figure A-4). Therefore, we implement the finger grappling technique, which is to follow the direction of the enemy’s finger range of motion maximum, exert force to force the enemy’s knuckles beyond the limit of the normal range of motion mentioned above, and be oppressed and hit by the superphysiological limit, resulting in severe pain and having to give in and beg for mercy. Sorted out 12 sets of knuckle grappling techniques and shared them with you. First, pout your thumb The enemy points and provokes us with his right hand in front of us; Seeing the opportunity, we grasp the enemy’s right thumb with our right hand, clench it with four fingers, clasp the enemy’s metacarpophalangeal knuckles with our little finger, clasp the wrist downwards and pull back the enemy’s thumb that is pressed down, causing severe pain in the thumb and begging for mercy (Figures 1-1, Figs. 1-2). 2. Pouting index finger (1) The enemy’s palms are facing down, ready to poke us in the throat; Our side quickly grabbed the enemy’s index finger, and the side of our little finger pressed the metacarpophalangeal joint of the enemy’s index finger, first moved forward, then pressed down and dragged back, so that the enemy’s index finger turned up beyond its limit and was painful, so as to bow down and catch (Figures 2-1, Fig. 2-2). 3. Pouting index finger (2) The enemy’s palm strikes us, and we use our hand to grasp the enemy’s index finger extending from the palm, turn the wrist inward, and force the enemy’s palm upward; Immediately after our side, we press the metacarpophalangeal joint of the enemy’s index finger with the middle section of the index finger, press down and push forward with the thumb, then shake the wrist upward, stretch the arm up, and pout the enemy’s index finger downwards to force the enemy to submit (Fig. 3-1, Fig. 3-2). 4. Thumb pressure Our side pretends to shake hands with the enemy, when our hand just touches the enemy’s hand, we slightly lift the elbow wrist outward, the thumb presses the metacarpophalangeal joint on the side of the enemy’s thumb, the index finger is extended forward, the thumb is pressed down hard, the upper end of the enemy’s thumb is jammed with the index finger and reversed, and then the entire wrist is rolled to the side forward and down, forcing the enemy to fall to the ground and catch (Figure 4-1, Figure 4-2). 5. Double buckle finger When the enemy reaches out to us, we will aim at the enemy’s mouth and snap our index finger forward. Immediately, our wrist was lifted upwards, twisted the enemy’s thumb back with thumb pressure, and took advantage of the enemy’s pain to separate the four fingers, and used the tiger mouth of the other hand to aim at the enemy’s little finger, move the front thumb back, and kickback the index finger of the back hand, and at the same time drag the wrist down to submit the enemy to the enemy (Fig. 5-1, Fig. 5-2). 6. Flip your fingers When the enemy reaches out to us, we first hold the enemy’s hand and twist it back, clasp the enemy’s little finger with four fingers and little finger at the same time, immediately exert force, flip the enemy’s wrist clockwise, and at the same time tightly clasp the metacarpophalangeal knuckle of the enemy’s little finger with the middle knuckle of the four fingers, sit on the wrist and pout the finger, and submit the enemy (Fig. 6-1, Fig. 6-2). 7. Oblique fingering The enemy punches us in the chest with a straight right fist; We block the defense with our left arm and grab his right wrist, while our right thumb and index finger clasp the little finger of the enemy’s right hand, and our left thumb and index finger press the enemy’s right thumb. Immediately, our right hand clasped the enemy’s right little finger down, and the left hand pushed his thumb diagonally up, causing severe pain and giving in (Fig. 7-1, Fig. 7-2, Fig. 7-3). 8. Clamp the elbow and pull the finger From behind the enemy’s flank, we grasp the ring finger and little finger of the enemy’s left hand with our right hand, and press the thumb against its metacarpophalangeal joint. We put the enemy’s big arm in the crook of our elbow, push the enemy’s elbow joint with the left hand, push the enemy’s metacarpophalangeal joint with the thumb of the right hand, and pull the enemy’s finger back to cause severe pain and yield (Fig. 8-1, Fig. 8-2). We can force the enemy to submit and capture by grabbing the enemy’s fingers with both hands and tearing them to the sides (Figs. 9-1, Fig. 9-2). If the enemy stops us from behind, we can also tear the enemy’s fingers to free us (Figure 9-3). 10. Pressure arm sub-finger We grasp the enemy’s ring finger and little finger from the enemy’s side, roll our fingers and raise our arms to press the enemy’s elbow joint, support the enemy’s wrist with the left hand, and continue to flex the wrist with the right hand, while using the big arm to force down the enemy’s elbow joint to make the enemy fall to the ground (Figure 10-1, Figure 10-2-Figure 10-3). 11. Positive pressure finger (1) If our wrist is caught by the enemy, we should first penetrate the wrist from the bottom out and then upwards, so that the enemy’s mouth turns downward. Immediately, we clasped the enemy’s wrist with the four fingers of the other hand, and the thumb firmly held the enemy’s thumb, causing the enemy’s thumb to abduct beyond its activity limit and cause pain, so as to give in and capture (Figures 11-1, Fig. 11-2). 12. Positive pressure finger (2) The enemy’s left hand grasps our left wrist; With our right hand, we grab the enemy’s left big arm, lean down, and press the enemy’s thumb with the left wrist to submit the enemy (Fig. 12-1, Fig. 12-2).
<urn:uuid:a0de7ee3-e217-4990-9a6e-e2e2416314c7>
CC-MAIN-2023-50
https://www.sharekungfu.com/these-12-sets-of-finger-grappling-techniques.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.857408
1,596
3.390625
3
Operating in the outer reaches of the solar system, far from the Sun, JUICE uses large solar arrays around the size of a badminton court - 85 m2 - to generate energy. Divided into ten panels each measuring 2.5x3.5m, JUICE's solar wings will produce energy during its long journey to Jupiter. The solar energy will enable JUICE to carry out 35 fly-bys of Europa, Ganymede and Callisto and generate the 800 watts of power needed to operate the ten scientific instruments on board. Airbus manufactured the panel structures and the deployment mechanism. Both have been subjected to robust testing to ensure they are ready to face the extremes of temperature the mission will encounter, from -230C at Jupiter up to +110C during Venus flyby, the hottest surface of the spacecraft reaching +250C. Blowing hot and cold JUICE's thermal control system is designed to minimise the impact of the external environment on the spacecraft, through the use of high efficiency Multi-Layer Insulation (MLI). MLI will moderate the external temperature during the spacecraft's closest approach to the Sun. It must also limit heat leakage in the cold Jupiter environment, in order to minimise demand for power from the spacecraft's heaters while its instruments are operating. Managing power will be a crucial factor throughout JUICE's mission, given the limited power generated by the spacecraft's solar panels. Jupiter is so far from the Sun that the solar energy it receives is 25 times lower than on Earth. Aiming for utmost accuracy With five billion kilometres to cover throughout the mission, four fly-bys to perform and 30 observation overflights, the complexity of the JUICE mission requires accurate navigation. The conventional technique is to improve standard radiofrequency navigation with a camera to take pictures of various objects (planets, stars). These images are returned to Earth for a cross-check. A ground team then tracks and plots the probe's precise trajectory, aiming the spacecraft's instruments toward areas of interest for science. However this approach is not ideal for the JUICE mission. This is for two reasons: the true position of the moons during their orbit around Jupiter is not known with sufficient accuracy for ground teams to plot a course and it takes JUICE too long to communicate with Earth. A round-trip radio signal takes about one hour and 40 minutes, which prevents the ground team from adapting the probe's trajectory before flying by the moons. This is why the "EAGLE" autonomous navigation technology which uses images taken by the 'Navcam' camera in real-time was developed. Instead of sending pictures of Jupiter's moons back to the team on Earth to aim the instruments, the JUICE NavCam is able to process them on board, thanks to algorithms based on detection of the edge of the moons. With this information, JUICE can independently refine the viewing angle of its instruments. One of Jupiter's mysteries is the planet's enormous magnetic field. The magnetosphere rotates with the planet, capturing swarms of charged particles. This fast rotation creates a natural particle accelerator, causing the particles to release radio waves which can reach Jupiter's icy moons. It's hoped that by investigating the moons' electrical and magnetic environment, the JUICE mission can increase our knowledge of how this harsh environment 740 million kilometres from the Sun shaped, and continues to shape, the conditions on their surface. The sensitive instruments on board the probe, including a magnetometer, are designed to record data about Jupiter's magnetic field. However, to make the measurements as accurate as possible, JUICE must ensure that it is 'squeaky clean', in that its own presence and emissions do not disturb the instruments. To produce such a 'clean' spacecraft was a huge challenge. In order to reduce electric and magnetic emissions and electrostatic interference with the instruments, most of the electronics are installed in two special housings on each side of the probe that help seal in emissions. Additionally, these housings protect the equipment itself from space radiation. A ten-metre long arm, named Magboom, will keep the most sensitive sensors away from the probe and any electromagnetic interference it may generate while taking measurements. Airbus engineers have also designed a unique layout for the 23,560 solar cells in JUICE's solar panels to minimise the magnetic field generated by the cells themselves. A conductive layer of indium tin oxide also sits on top of the solar cells to avoid electrostatic disturbances. The 'reaction wheels', which allow the probe to orient itself in space, are also custom-designed for the mission. They emit 100 times less magnetic energy than wheels that have flown before. Finally, all of the probe's cables - totalling an amazing 15 kilometres - are wrapped in several layers of aluminium to avoid electrical interference. As shown in this article, science missions are always the most challenging of space missions, but often the most rewarding for the teams who turn them into reality. |Subscribe Free To Our Daily Newsletters| Rocket Lab launches new constellation-class star tracker Russia will use International Space Station 'until 2028' NASA Boosts Open Science through Innovative Training Orion stretches its wings ahead of first crewed Artemis mission Elon Musk forms X.AI artificial intelligence company SpaceX will try to launch most powerful rocket ever Monday China bans ships from area north of Taiwan Sunday due to 'falling rocket wreckage' SpaceX prepares for rehearsal, test flight of Starship rocket Curiosity gets a major software upgrade Ingenuity Mars Helicopter completes 50th flight NASA unveils 'Mars' habitat for year-long experiments on Earth Slip and Pivot: Sol 3797 China's inland space launch site advances commercial services China's Shenzhou XV astronauts complete 3rd spacewalk China's Shenzhou-15 astronauts to return in June China's space technology institute sees launches of 400 spacecraft 'The Space Economy' - an Essential Guide for Investors and Entrepreneurs| Viasat confirms ViaSat-3 Americas set to launch Taiwan seeks satellite solutions after undersea cables cut Safran to provide GNSS simulation solutions for Xona's LEO constellation Intelsat to Extend Life of Satellite with new Mission Extension Pod 3D-printed rocket maker to focus on bigger vehicle for commercial launches Tendeg selected by Lockheed Martin as strategic supplier of deployable antennas SatixFy and Presto Engineering test rad-hard space-grade ASICs HD 169142 b, the third protoplanet confirmed to date Do Earth-like exoplanets have magnetic fields New paper investigates exoplanet climates JWST confirms giant planet atmospheres vary widely Europe's JUICE mission blasts off towards Jupiter's icy moons Juno Marks 50 Orbits Around Jupiter A Jovian journey to the icy worlds of a Gas Giant Guiding JUICE to Jupiter |Subscribe Free To Our Daily Newsletters|
<urn:uuid:54fcab6e-ca05-4327-99aa-51acbbb60432>
CC-MAIN-2023-50
https://www.spacedaily.com/reports/Guiding_JUICE_to_Jupiter_999.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.89862
1,446
3.671875
4
Why Latex Self Levelling Compound? I’m Andy Parkin, Managing Director of the Multi-Award Winning Speed Screed. In this article, I am going to take a look at latex self levelling compound. Firstly, calling something ‘self levelling’ can be a little misleading because the screed will not level itself. In reality, the screed should be called self-smoothing. However, it is more commonly known as self-levelling within the industry. Latex self levelling compound differs from the usual self screeds The difference between ordinary screed and the latex self-levelling variety is that it contains a latex additive. Instead of using water to mix, this is replaced with latex. There is no need to add any additional water to this screed. The latex floor screed will then provide a good, level surface on which to lay carpet, vinyl, tiles or other final flooring solutions. With the additional latex comes added flexibility, so if there is any type of movement in the base layer or substrate the compound can adjust and allow for that movement. This makes the latex screed perfect for bonding to materials that may be problematic for other types of screed, like plywood, for example. Latex self levelling compound/floor screed is used for a variety of projects so it is worth looking at the type of applications it is most useful for: Bonded screed layer – this is perfect for self levelling latex screed because the compound needs to form a good bond with the base layer. Unbonded screed layer – the screed is not best suited for this type of construction because of the presence of a membrane between the substrate and screed. Floating screed layer – this is used for sound or heating installations and because the screed sits of an insulation layer it is not a suitable form of construction. Latex Self levelling Compounds: Preparation of the Substrate When using latex screeds the key factor is the strength of the bonding process. The substrate must be completely solid without any cracks, crumbling areas or other problems with integrity. If the latex screed is placed on a suboptimal substrate it is likely to crack or delaminate. Always take care to make sure that the substrate is free from any contaminants. This can mean dust, oil, grease or anything that can get into the screed. Any contamination must be removed before the latex self levelling compound is applied and this can be done mechanically by shot blasting or grinding the area. Any paint present on the substrate should also be removed. Once mechanical cleaning is completed the area should be vacuumed to remove any remaining dust or dirt and a primer applied to help the latex self-levelling screed to bond firmly. Some types of latex self levelling compounds do not need the primer – always refer to the manufacturer’s instructions. Each manufacturer has their own guidelines for thickness. As a rough guide, the minimum depth for this type of screed is around 2-3mm, with the maximum depth at 10-15mm. However, with some products thickness can be increased to around 30mm by adding in bulking aggregates following manufacturer’s guidance. Latex self levelling compounds are usually used to help smooth the surface of a concrete or screed layer so that a thin floor covering can be laid. When properly applied it should stop any imperfections in the base showing through the final floor coverings. If you need any more information about latex self levelling compounds, please get in touch with our helpful and experienced office team.
<urn:uuid:f20d31dc-15e8-4d3b-a781-6f442e70fad5>
CC-MAIN-2023-50
https://www.speed-screed.com/knowledge-centre/latex-self-levelling-compound/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.930048
755
2.640625
3
What affects the burning velocity of oil&gas fired boilers The oil&gas fired boiler,as one kind of environmentally friendly industrial boiler,is widely used in food industry,pharmaceuticals industry, hotels ,schools, etc.We should understand the factors affecting its burning velocity to help us organize and control the burning processes better.The factors mainly consists of the following aspects: The influence of temperature on the burning velocity is extremely significant.The combustible element in the fuel and oxygen is also carrying on the slow oxidation reaction at room temperature,but we cannot feel the temperature rise,when the temperature is higher,the chemical reaction is very fast,high temperature flue gas is produced continuously,this is burning.The burning velocity and temperature perform the exponential function relationship.Therefore, the higher the temperature inside the furnace,the more intense the burning is,if the furnace temperature is low,the burning will be slow,even the stable combustion can’t be guaranteed. Concentration and pressure The combustion of liquid fuel and gas fuel in the furnace belongs to chemical reaction process,when the concentration of reactant (fuel and air) increases,the chemical reaction will quicken because of the increase of molecule collision.In addition, the change of pressure can also cause the change of concentration,so,the pressure has a direct effect on the burning velocity. Mixture of fuel and oxidizer A certain mixing ratio of fuel and oxidizer can make the chemical reaction rate reach the highest value.Due to the combustion temperature is also associated with the mixture ratio,the effect of mixing ratio on the chemical reaction rate is more increased. Other inert ingredients in the mixture The inert ingredients such as nitrogen not only reduce the concentration of the reactants,but also reduced the effective collision of the reactants,which leads to the decline of chemical reaction speed, the addition of inert gas will also cause the decline of combustion temperature,which will further reduce the chemical reaction speed. According to the above analysis, it is easy to understand,oxygen-enriched or pure oxygen combustion will greatly improve chemical reaction speed. Romiter Machinery generally can run for more than 10 years because of scientific product design,advanced processing technology and strict quality control,customers’ satisfaction is our unremitted pursuit,they are ideal industrial boilers to provide hot water or steam,please feel free to contact us for more details!
<urn:uuid:62932fa7-6bf8-44d8-8f33-8062245fdcfa>
CC-MAIN-2023-50
https://www.steam-generator.com/what-affects-the-burning-velocity-of-oilgas-fired-boilers/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.869808
538
2.90625
3
Helping parents and carers Need someone to talk to? Call our confidential helpline or send us an anonymous message.Find out more Working together to prevent child sexual abuse We work with parents and carers to protect all children from sexual abuse. We also offer child sexual abuse prevention courses to children’s centres, parents’ networks, schools and other agencies. Contact the team if you are interested in finding out more. Find a project to help you We run a number of projects in Wales designed specifically for parents and carers and for the wider public, including schools and children’s centres, to build their understanding of child sexual abuse. Conwy Borough country Families First project Conwy Borough County Families First has funded us to deliver protective sessions for families and professionals. We are keen to build on our strong local links in Conwy to help more families in the area. - Organisations in Conwy who would like to book a session can download our English Conwy flyer (pdf) or the Welsh Conwy Flyer (pdf). Parents Protect learning programme This 12-part child sexual abuse learning programme aims to answer questions and give adults the information, advice and support to help them: - understand potential risks - recognise the warnings signs of abuse in children and adults - build the confidence to prevent abuse - realise why children don’t talk about abuse - know where they can go for support if they have concerns The programme is available in both English and Welsh. Early Intervention Project We provide two types of early intervention for vulnerable or at-risk families in Wales. This work is funded by the Welsh Government. One for small groups of parents and the second for vulnerable or at-risk families. Download the English Early Intervention Project Leaflet (pdf) or the Welsh Early Intervention Project Leaflet (pdf) for more information.
<urn:uuid:53d85cb4-8073-4532-9ea9-56435712b1b1>
CC-MAIN-2023-50
https://www.stopitnow.org.uk/stop-it-now-wales/helping-parents-and-carers/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.894214
388
2.6875
3
Only after completing Developmental and Educational Psychology or a similar course. This course aims to examine adolescent development from a neuroscientific perspective. Adolescence is a period of vast changes in the biological, cognitive, and social domains. During the seven lectures within this course we will focus on social, emotional, and cognitive changes across adolescence and their links with biological and neural development. The course will provide an introduction to social developmental neuroscience, with a special focus on structural and functional magnetic resonance imaging methods and brain development, and will further focus on the links between brain development and socio-emotional development across adolescence. Most recent models of brain development will be used to extend our knowledge of current theories of adolescent development and to inform our understanding of the mechanisms behind social and emotional changes in adolescence. By doing so, this course offers a unique neuroscience background to understanding child and adolescent development. The following fundamental questions will be examined during this course: What are patterns of brain development across adolescence? Which brain regions are related to increased sensitivity to affective and social influences across adolescence? What is the ‘social brain’? Which brain networks are involved in social and emotional functioning? How can we explain changes in (social) behaviour in adolescence, including prosocial behaviour and risk taking, by using mechanisms of brain development? To explain adolescent development from a neuroscientific perspective, bridging neural and social-emotional and cognitive development To use neuroscientific theories to explain adolescent behaviour To critically evaluate experimental designs based on knowledge gained on neuroscience research methods For the timetables of your lectures, workgroups, and exams, select your study programme. Psychology timetables Students need to register for lectures, workgroups and exams. Instructions for registration in courses for the 2nd and 3rd year Elective students have to enroll for each course separately. For admission requirements contact your study advisor. For admission requirements, please contact your exchange coordinator. Students are not automatically enrolled for an examination. They can register via uSis from 100 to 10 calendar days before the date; students who are not registered will not be permitted to take the examination. Registering for exams Mode of instruction 7 2-hour lectures The course grade will be determined by a final written examination. The written examination will be composed of open-end essay questions. The Institute of Psychology uses fixed rules for grade calculation and compulsory attendance. It also follows the policy of the Faculty of Social and Behavioural Sciences to systematically check student papers for plagiarism with the help of software. Disciplinary measures will be taken when fraud is detected. Students are expected to be familiar with and understand the implications of these three policies. Papers will be announced on Blackboard. Bianca Westhoff, MSc. email@example.com
<urn:uuid:2e796c1a-dd95-46a2-a38c-a483f7b28088>
CC-MAIN-2023-50
https://www.studiegids.universiteitleiden.nl/en/courses/92387/the-adolescent-brain
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.893259
577
2.96875
3
The week of September 23-30 is national Take a Child Outside Week – and I can’t think of a better place to take a child outside than the zoo! This special week aimed at connecting children to nature was founded in 2007 by the North Carolina Museum of Natural Sciences, and has since spread to over 250 parks, nature centers, zoos and museums around the country. Friends of the Zoo joined this effort as a partner by pledging to offer opportunities for young people to be outside in nature, engage in nature play and appreciate the natural world. When we built our Explorer’s PlaySpace in 2016, we did so for all these reasons – and because imaginative nature play is good for everyone, especially young children. Nature play spaces encourage children to engage in unstructured play that involves using their senses, imagination and creativity interacting with the natural world. Child development studies indicate that nature play improves cognition and thinking, increases focus, decreases anxiety, builds confidence and helps prevent childhood obesity. It also helps develop a sense of wonder about the natural world that translates into a connection to and respect for green spaces, natural resources and wildlife. For our part, the zoo will offer guided tours of our outdoor Wildlife Trail on Tuesday, September 24 and Thursday, September 26 at 10:30 a.m. – followed by facilitated play at our Explorer’s PlaySpace. The tour is suitable for all ages; meet at the gazebo in the zoo courtyard at 10:30 a.m. both days, weather permitting. And of course, the PlaySpace is open and available for children to engage in nature play all year during zoo hours — So I invite you to Take a Child Outside at the zoo this week – and every week — as often as time and the weather allow. Janet Agostini President + CEO Friends of the Zoo
<urn:uuid:def0035b-9b01-497b-b83b-945a556c3f89>
CC-MAIN-2023-50
https://www.syracusezooevents.org/post/take-a-child-outside
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.951919
379
2.671875
3
Public Involvement in Research Research with, not just about women Involving the public in the MAMMI study is an important step in ensuring that the real life experiences of women are considered when decisions are being made about the research we do. Womens involvement in MAMMI Public involvement in research is defined as conducting research ‘with’ or ‘by’ members of the public rather than doing research ‘to’, ‘about’ or ‘for’ them, helps to ensure the quality and relevance of the research, and is underpinned by democratic principles of citizenship, accountability and transparency. The MAMMI study was set up in 2011 to become a study ‘with and for women’, not just to do research 'about' women.During the study’s development phase, pregnant and postpartum women were consulted on the acceptability of the study documents and surveys, and the validity of the content, and their opinions and input shaped the final documents. In 2017, a group of women, participants in the study, contributed to the development of the follow-up study surveys and documents, and several are willing to be involved with the research on a long-term basis. This initiative will enable women to identify and prioritise research studies that are important to them and, ultimately, influence future services for childbearing women and mothers. Dr. Deirdre Daly Deirdre is a midwife with over 20 years experience working with mothers and families in maternity care services in Ireland and the UK. Deirdre first came up with the idea of setting up a study to examine maternal health in Ireland when she experienced the lack of conversation about maternal health issues, and the extent to which women's health problems remained hidden, with women suffering in silence from health problems that are treatable and curable and, if treated early enough, could prevent some of these problems from persisting into later life.
<urn:uuid:8155d173-e2f4-45fd-8e4f-0dc4c9003746>
CC-MAIN-2023-50
https://www.tcd.ie/mammi/public_involvement.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.963718
401
2.796875
3
Stress is all around us. It was present before COVID-19, and during the pandemic, I’m certain you have experienced even more stress than usual. Stress impacts mental health, and the ability to manage stress in healthy ways absolutely impacts mental health. Here are some stress management techniques which may be helpful for improving your mental health in terms of the body, mind and spirit. Stress causes a reaction in our body that includes a hormone cascade to assist us in addressing the stressor. This process is meant to heighten our abilities for a short period of time with the expectation that once the stressor is removed, our bodies can return to a relaxed state. But, when we experience chronic stress, our bodies do not have the chance to return to that calmer state. We can only sustain this heightened response for so long before being impacted, usually in negative ways. Here are a few suggestions to mitigate the stress response and improve mental health in the process: Exercise – 30 minutes, 4-5 times per week is recommended. Exercise generates the “feel good” chemicals in the body, which helps to offset those generated by the stress response. Food – When stressed we often reach for salty or sugary foods that give us a quick boost of “feel good” hormones. But, our body will likely crash once that quick-fix ends. The better choice is to increase vegetable intake, cut back on sugar, fried foods and junk foods, and eat healthier overall. This helps to regular blood sugar and prevents spikes and crashes. Water – Even mild dehydration can impact our ability to think clearly. Water is important to help flush out toxins created in the body by stress and keep our organs working well. An easy recommendation to follow is to divide your weight in half and drink that number of ounces of water every day (180 pounds/2=90 ounces of water). Cutting back on sugary drinks and caffeine will also help. Sleep – Getting enough sleep and good quality sleep is so important for our bodies and minds to repair, restore and renew. Strive for 7-8 hours of sleep each night. We all have an internal dialogue of some kind. And many of us struggle with a bent toward negative thinking patterns. Here are a couple of helpful tips to cultivate healthy thinking: Challenge your thoughts – Scripture instructs us to take every thought captive into the obedience of Christ (2 Corinthians 10:5). Not every thought you have is truthful. Sometimes we can get stuck in negative or self-destructive patterns of thinking. Challenging your thoughts is one of the best ways to break unhealthy thinking patterns. Ask yourself questions like – Is this thought true? Is this thought helpful? Where does this thought come from? Then, take steps to replace any faulty thinking patterns with truth from God’s Word. Take a break – Sometimes our brain just needs to take a break from problem-solving or decision-making. Allow yourself some downtime, optimally a few minutes several times a day, so your brain can rest. Meditation is a great tool to use and actually energizes your brain so that you can re-engage problem-solving or work tasks with more focus and energy. Chronic stress and a prolonged sense of suffering or despair can have a negative impact on our spirit as well. Here are some ideas to address this issue and increase a sense of hope and motivation: Scripture – The Word is full of verses that uplift and offer hope. Write some of your favorites down on sticky notes or note cards and place them in areas where they will frequently be seen to remind you of God’s love, hope and salvation. You could also listen to sermon podcasts that you find encouraging. Prayer – Lifting your praises and burdens to the Lord can be a great source of strength and hope. Make time in your schedule for regular communion with God through prayer. Solitude – Make time every week for moments of solitude where you can turn off the “noise” of technology devices, social media, news cycles, etc. Even a couple of minutes each day can be very helpful. Music – Make a playlist of music that you find calming, inspirational or joyful and listen as you have time each day. Nature – For some, being in nature is a great way to connect with God and renew the spirit. Make time to walk or sit outside and just be – listen to the noises of nature, take in the beauty of God’s creation, breathe in the fresh air and feel the breeze or sun on your skin. Gratitude - Practicing gratitude is a great way to lift your spirits and redirect your focus on God. Every night before you go to bed, identify three things you are grateful for, from the day. Start where you can. Don’t think of this as a to-do list and stress yourself over all the things you aren’t doing or don’t have time to do. Pick 2-3 of these strategies that you can start incorporating into your life, and when you’ve developed a habit of doing them on a regular basis (which usually takes about 3 weeks), then consider adding in a couple more. Through implementing some of these ideas, you can learn to reduce stress and you can improve your mental health. Summing it all up, friends, I’d say you’ll do best by filling your minds and meditating on things true, noble, reputable, authentic, compelling, gracious—the best, not the worst; the beautiful, not the ugly; things to praise, not things to curse. (Philippians 4:8, The Message) To learn more about Texas Baptists Counseling Services visit txb.org/counseling. Texas Baptists is a movement of God’s people to share Christ and show love by strengthening churches and ministers, engaging culture and connecting the nations to Jesus. The ministry of the convention is made possible by giving through the Texas Baptists Cooperative Program, Mary Hill Davis Offering® for Texas Missions, Texas Baptists Worldwide and Texas Baptist Missions Foundation. Thank you for your faithful and generous support. Subscribe to receive stories like this one directly to your inbox. We are more together.
<urn:uuid:75019763-d1f5-4123-b228-abcbc4eaa81d>
CC-MAIN-2023-50
https://www.texasbaptists.org/article/improving-your-mental-health-during-stress-filled-times
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.934673
1,294
2.75
3
What is Oxytocin? Oxytocin is a peptide hormone and neurotransmitter produced in the hypothalamus and secreted by the posterior pituitary gland. It is often referred to as the “love hormone” or “cuddle hormone” due to its association with social bonding, trust, and attachment. Oxytocin plays a critical role in various physiological processes, including childbirth, lactation, and stress regulation. Childbirth and Lactation Oxytocin is essential for the process of childbirth, as it stimulates uterine contractions during labor and helps the uterus return to its normal size after delivery. Oxytocin also promotes lactation by stimulating the release of milk from the mammary glands in response to a suckling infant. Social Bonding and Trust Oxytocin is known to facilitate social bonding and attachment between individuals. It has been implicated in the formation of pair bonds between mates, parent-infant attachment, and the development of trust and empathy in social interactions. Oxytocin is involved in stress regulation and has anxiolytic (anxiety-reducing) effects. It can counteract the effects of stress hormones, such as cortisol, and promote relaxation and a sense of well-being. Autism Spectrum Disorder Research suggests that oxytocin may play a role in the development of autism spectrum disorder (ASD), a neurodevelopmental disorder characterized by social communication deficits and repetitive behaviors. Studies have found that individuals with ASD may have altered oxytocin signaling, and interventions targeting the oxytocin system may hold promise for improving social functioning in this population. Social Anxiety and Depression Alterations in oxytocin levels and signaling have been implicated in social anxiety disorder and depression. Oxytocin may have potential as a therapeutic target for these conditions, as it has been shown to promote social engagement and reduce anxiety in both animal models and human studies. Postpartum depression, a mood disorder that can affect women after childbirth, has been linked to disruptions in oxytocin signaling. Research suggests that interventions targeting the oxytocin system may help alleviate symptoms of postpartum depression and improve maternal-infant bonding. Oxytocin is a hormone and neurotransmitter involved in various physiological and psychological processes, such as childbirth, lactation, social bonding, trust, and stress regulation. Dysregulation of oxytocin signaling has been implicated in several disorders, including autism spectrum disorder, social anxiety, depression, and postpartum depression. Further research on oxytocin may lead to novel therapeutic approaches for these conditions.
<urn:uuid:c95c5a17-84a3-4edd-9040-ff757158174f>
CC-MAIN-2023-50
https://www.thebehavioralscientist.com/glossary/oxytocin
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.934358
529
3.375
3
Business Studies Key Terms Cards These cards were compiled to help with revision for the CAIE (0986) Business Studies IGCSE, and follows the Fisher et al 2016 and the Borrington and Stimpson Cambridge IGCSE Business Studies Coursebooks. These cards were put together for the 2018 summer exams, but I’ve come back to them with my youngest for the 2022 summer exams. Once we have gone through the entire course book, we use them by grouping the cards and putting them on a sheet of A1 in a configuration that makes sense to us – I always think of them like supermarket aisles, but you could equally do a mind map or similar. We then go through each card checking that my off-spring has fully understood each concept and discuss any blanks in knowledge. By having the cards grouped, it helps them to visualise what concepts should always be thought of together, e.g. quality and lean production. We then go on to use them when marking past papers, helping them pick out which cards would be relevant for the answer and what they could have put in the answer to maximise marks. We also take the cards out of their specific chapter groupings to make larger mind maps or chains of thinking, e.g. expansion → (increase) market share → economies of scale → (reduced) variable/fixed/total costs → (higher) profit Finally, I leave my child to try and memorise exact definitions for terms that come up in the 1 and 2 mark questions. The cards are in the files below, followed by how to make them, and then pictures of how we grouped ours together – just in case you are looking for inspiration. - Print out. (You may need to change the scale, depending on your computer. On mine the scale needs to be about 77% to fill an A4 sheet.) - Cut through the middle along the shortest length (there should be five card names and their definitions/accompanying text on each half). - Fold each half in half again, along the longest length, so that the card names are all on one side and the accompanying text is on the back. - Stick the two sides together and cut so that each card is separate from the other four. - Laminate if you think they are going to get heavy use, or just use as is.
<urn:uuid:75ef9d3a-a4f9-4a24-a388-50edd77a1038>
CC-MAIN-2023-50
https://www.thecambridgehomeeducator.com/business-studies-key-terms-cards/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.949524
490
3.265625
3
12 Reasons Why Wireframing is Important in Web Design Process You may have heard the term 'wireframing' at some point in designing and it is a very important thing to focus on while designing a website. Wireframing is a quick and effective way to identify usability issues before the design process. But what is wireframing? A wireframe is a very basic layout of a web page that includes no color, no imagery and, in some cases, no text. It allows you to determine the hierarchy of the design and it also makes it easier to plan the content and UX. Wireframing refers to the process in which web designers and clients discuss and determine the hierarchy of a webpage. Wireframing makes it easier to arrange the content. Wireframes are the simple layout of a webpage that outlines the placement of site elements, CTA areas, site features etc. You do not need to make any choices of colors, fonts logo etc. while designing wireframe. Wireframe entirely focus on website structure only. Here are 12 reasons why wireframing is so important in web design process: 1. What Makes Wireframing so Useful? Designers spend a lot of time in making wireframe because they know that without a strong foundation, the result will be inefficient. During wireframing, designers only focus on user experience only. User experience is the only thing that matters to everything on a website from conversion to customer trust. Without any distraction of colors, fonts & images, designers can work on the core design and important elements. By doing so, one can avoid any major and expensive changes in the long run. 2. Visually displays information hierarchy Wireframe displays exactly how the page and content will be in place on the website before you start designing. By laying down the structure beforehand, you can make adjustments as per client's request before you go ahead with a design. When wireframe created, designers can have an idea about which page and element are more important than others. So they can adjust the hierarchy on elements and pages in a manner that end result can be efficient enough. 3. Helps identify CTA’s and other information Don't think about colors and style at this stage. While designing a wireframe, think about what action you want the user to take on your website when they first land? What step further you want customers to take on a website? These question will help you determine the important aspects of a website. 4. Constructs the placement of content After knowing the important information about a website, you can move ahead with content. You can decide where to place the content and the CTAs'. There is always a long list of ideas about features and content in designer's mind. Wireframe helps them what to include and what to discard and the functionalities need to be in place on a website. Simply put, a wireframe allows designer and client to work together in creating website structure before implementation. 5. Helps you determine features In the early stages of web design, web designers and clients can discuss and work together on including potential features and attributes that might offer better usability/experience to the visitors and can boost conversion. You can also eliminate some of the features from wireframe if it doesn't add value to the goals of your website. Clients many times don't understand what you mean when you say “google map integration”, “lightbox”, “Masonry” and many other types features. Wireframing the features can help to understand their functions to the client. 6. Focusing on User Experience As we discussed above, wireframe eliminates all the distraction of color & design, designers can focus on the usability, functionality, and user experience of any website. Wireframes draw attention to basic structure and functions of any website and the elements that will have an impact on user experience. 7. Saving Time/Changes More Efficient Creating wireframes may seem like putting a lot of time into it. But it helps you save time in long run throughout the project lifecycle. You don't need to think about the flow and purpose of each page when you are designing. Wireframe saves a lot of time as the designs are already determined. Your client and developers become more clear about the design and content. Wireframes help avoid changes later in the process. 8. Saving Time/Changes More Efficient It takes a lot of time, effort and money to design a website. Designers invest a lot of time into designing and the same applies to clients from the cost point of view. Clients invest a lot of money into it. And when it comes to design changes, they are just inevitable. Designing a wireframe before designing web pages can help ease the process of design changes. We can review wireframes from both designer and client-side beforehand for eliminating the changes after designing the website. Changes can add up a lot to expense when they're made to a fully designed website. 9. Wireframes push usability to the forefront This is one of the most important points in the wireframing process. Maintaining the usability of a website is the most important thing. Placement of links, CTAs', navigation buttons etc increases the ease of use. Wireframe can highlight flaws in your website structure. 10. Wireframes help make the design process frequentative Wireframes help you ensure that you consider one element at a time while designing rather than combining the functions, layouts, creativity in one step. Omitting wireframe will increase the cost of making changes as the fully designed website will be reworked to implement changes. Wireframes help you take one element at a time while designing rather than mixing functionality, layout, and creative aspects in a go. 11. Wireframes make site navigation better The most important thing about a website is its navigation. If a user fails to find the service/product he is looking for, he will immediately leave your website. Content findability is the most important thing to focus on while designing navigation. Wireframes give an idea of how easy or difficult it will be to locate important pages on the website. And also to clarify that whether the navigation confuses the user or clarify. 12. Wireframes Help Web Developers Web developers don't need to think about the placement of individual functions, attributes, and content when they have wireframes handy. Wireframes eliminate a lot of questions and assumptions during the website building process. Wireframes give a clear idea to web developers about what to do in next step. It also helps take a better decision as what technologies, techniques, and process to use to achieve an excellent result. When you include wireframing in your design process, you win as the designer. This is not only the transition from wireframing to design. You can also eliminate the headache of the word and template changes later in the process. Once you are done with the wireframing and it gets approved you can start designing in the same file. Because everything is planned and measured you can simply apply styles and colors to the existing template design.
<urn:uuid:1341cc21-ee38-400b-a45e-261c129c34b5>
CC-MAIN-2023-50
https://www.themevault.net/reasons-why-wireframing-important-in-web-design-process
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.912573
1,463
2.578125
3
Cambodia Is Teaching the World How to Clear Land Mines The country’s history of bombardment has led it to develop expertise in the dangerous, delicate business of removing these hidden threats. Siem Reap, Cambodia—Before I signed the waiver, Sophie Schillings went over the rules. “Please don’t run in the minefield,” she said. “And don’t pick anything up.” This was my first time in a minefield. I was listening carefully. It was a misty morning in Cambodia, and although it was barely 10 am, the heat was already baking the air. I was about to enter a known minefield near the Trei Nhoar commune, less than an hour’s drive from Siem Reap, Cambodia’s second-largest city and the gateway to its legendary temples. The HALO Trust, a UK-based NGO and the world’s largest demining nonprofit, was working to clear the mines from the area, and Schillings, HALO’s deputy program manager for Cambodia, was judiciously advising me on what not to do in a minefield. I had come to Cambodia to observe the dangerous ballet of land-mine removal. More important, I had also come to learn how Cambodia has become a leading location for non-Cambodians to study the art and procedures of demining. Foreigners once flew over Cambodia to drop bombs; now foreigners fly to Cambodia to learn how to get rid of bombs. Practices and methods for mine clearance have been developed and refined here and exported to countries as far away as Ukraine, Angola, and Iraq. Why Cambodia, you might ask? The answer lies largely with history. The nation is afflicted with some of the highest concentrations of land mines on earth, owing to the protracted wars in Southeast Asia, multiple foreign invasions, the madness of its homegrown genocide under Pol Pot, and the country’s long, slow climb out of civil strife. The northwestern region along the border with Thailand hosts what’s known as the K5 mine belt, a 750-kilometer stretch of death-in-waiting, planted in the 1980s during the fighting between the Vietnamese-backed People’s Republic of Kampuchea and the Chinese- (and US-) supported Khmer Rouge. The east of the country is also riddled with unexploded ordnance (“UXO” in the professional lingo), mostly cluster munitions left over from the US carpet-bombing campaign under Richard Nixon and Henry Kissinger. It is estimated that from 1969 to 1973, the United States dropped at least 26 million cluster submunitions, also known as “bomblets,” on this country of just 6.7 million people—a third of which fell within one kilometer of villages. Experts believe that between 1.3 million and 7.8 million of these submunitions failed to explode (so-called “duds”). These unexploded bomblets became de facto land mines that continue to haunt this nation and hold its territory hostage. According to the Cambodian Mine Action and Victim Assistance Authority, a government agency, there were 65,028 casualties—including 19,821 deaths—from explosions of ordnance between January 1979 and July 2023. But what I learned was that demining doesn’t just protect you from the weapons of past wars; it can also lead you to take positions on present conflicts. The day after I was out walking with deminers near Trei Nhoar, the US announced that it would be sending cluster munitions to Ukraine. Oleksii Reznikov, Ukraine’s recently replaced defense minister, has said that Ukraine now holds the dubious distinction of being the most heavily mined nation on the planet, and the war came up often in my talks with the Cambodian demining community. Every Cambodian I spoke with thought the American decision to send cluster munitions to Ukraine was a big mistake. “Military leaders will demand one thing, but after the fighting it’s a completely different story,” Heng Ratana, the director general of the Cambodian Mine Action Center (CMAC), the government’s demining agency, told me as I sat in his office in Phnom Penh. “We have more than 200 cluster experts working in the field,” he said, “and we continue to discover cluster submunitions every day on the ground.” Ratana explained that dud rates are always higher than the manufacturers promise, with a 25 to 30 percent failure rate in Cambodia, and buried cluster submunitions continue to maim or kill people routinely there. Since they fall through the air, bomblets often end up embedded deeper in the earth than a soldier would lay a land mine. In soft ground, cluster bomblets can be found a meter deep, Ratana said, making them harder and more dangerous to discover. “From our own experience and the lessons learned here,” Ratana said, “we believe that to use cluster bombs in Ukraine hurts the Ukrainian people themselves.” Land mines are the unacknowledged legislators of the earth. They determine who can walk the ground or work the soil. And they do so silently, lying in wait with inhuman patience for months or years or even decades. When, one day, a land mine does explode, it can burst with all the fury and vengeance of a long-ago conflict. Yet we continue to design them, produce them, and deploy them, convincing ourselves of their imminent need while reassuring ourselves of our dominion over objects. But every time we bury them in the ground, fire them from rockets, or drop them from the sky, we enslave ourselves for the foreseeable future to a tyranny of our own creation. Like the hand grenade, the machine gun, and the armored warship, land mines were an invention of the US Civil War. Initially, the Confederacy improvised land mines out of a variety of artillery shells, but by 1863, a new science had been born. The Confederate States Congress allotted $100,000 to the Army Torpedo Bureau, “the world’s first institution devoted to landmine warfare,” according to Kenneth Rutherford, a historian of land mines. The bureau was headed by Brig. Gen. Gabriel Rains, the inventor of the Rains fuse, a sensor that would activate an artillery shell if someone stepped on it with a mere seven pounds of pressure. Confronted with this new reality, Union commanders would sometimes force Confederate prisoners of war to march in front of them as a rudimentary form of mine clearance. German engineers refined the Rains fuse just in time for World War I. During World War II, Britain, France, Germany, and Italy laid as many as 19 million land mines in North Africa alone. World War II also saw the extensive deployment of bounding fragmentation mines, the most infamous being the German S-mine, also known as the “Bouncing Betty.” When tripped, these mines shoot up about three feet into the air and then explode, spraying shrapnel in a 360-degree radius and killing or mutilating anything nearby. As for cluster munitions, the United States deployed them extensively during the Vietnam War. A 1972 US Air Force review of BLU-63 bomblets, over 1 million of which were dropped in Cambodia, showed that the Hoffman Electronics Corporation received a contract to provide almost 24 million units to the Air Force. The cost per bomblet? Thirty-five cents. Adjusted for inflation, 35 cents in 1972 equals $2.55 today. It’s often said in the demining community that a land mine costs as little as $1 to produce but $1,000 to remove. In the early 1990s, after the collapse of the Soviet Union and the dissipation—or so it seemed at the time—of the threat of global nuclear annihilation, the international human rights community turned to the problem of land mines. In 1991, Asia Watch (part of Human Rights Watch) and Physicians for Human Rights jointly published a report titled “Land Mines in Cambodia: The Coward’s War,” which detailed the terrible toll that land mines had taken on civilians there. A movement was building, and Cambodia and Afghanistan were repeatedly mentioned as the countries that were suffering the greatest devastation by this indiscriminate weapon. Globally, the most recognized activist fighting the scourge of land mines was Princess Diana, who in 1997 famously walked through a minefield in Angola that was being cleared by HALO. Later that year, the Anti-Personnel Mine Ban Convention was signed in Ottawa, Canada, taking effect on March 1, 1999. To date, 164 countries (including Ukraine) have joined the treaty. However, 32 countries—including the United States, Russia, China, Iran, Israel, India, Pakistan, and North and South Korea—have not. The US position is complicated: In June 2022, the Biden administration, like the Obama administration before it, pledged to forgo the use of antipersonnel land mines and destroy US stockpiles, except for those that it considers necessary to defend South Korea against an invasion by its neighbor—often called the “Korea exception.” At the same time, the US also provides significantly more funding for global demining efforts than any other nation. But the land-mine treaty does not ban the use, stockpiling, or production of every kind of land mine—only the victim-activated antipersonnel mine. Mines that are operated by remote control, for example, are not banned; neither are anti-vehicle and anti-tank mines. And cluster munitions are regulated by a different international treaty. The Convention on Cluster Munitions was adopted in 2008 and went into effect in 2010. That treaty has been signed by 124 countries, but 73 countries—including Ukraine, the US, Russia, China, Iran, Israel, India, Pakistan, and both North and South Korea—have not signed on. Popular“swipe left below to view more authors”Swipe → The “Hunt for Hamas” Narrative Is Obscuring Israel’s Real Plans for Gaza The “Hunt for Hamas” Narrative Is Obscuring Israel’s Real Plans for Gaza In Cambodia, the destructive force of land mines, cluster munitions, and other explosive remnants of war remains a terrifying reality in people’s daily lives. In Phnom Penh, I met Borin Bun, a 38-year-old mother of two who lost her right leg below the knee when she was a 10-year-old kid searching for mangoes; she didn’t receive a prosthetic limb until she was 18. That same year, she joined the Cambodian Handicraft Association, a small NGO that helps women who have been disabled by land mines or polio. I met Bun, who started as a weaver and is now a tailor, at the association’s workshop, a dimly lit sewing factory near the Tuol Sleng Genocide Museum that raises funds by selling handmade silk scarves and souvenirs. Land-mine discoveries and detonations continue to occur. The day before I visited the minefield near Trei Nhoar, a HALO deminer found an unexploded 60-millimeter mortar round nearby. The previous day, a 42-year-old farmer lost his right foot after stepping on a land mine as he was foraging for mushrooms near the Thai border. Though the first six months of 2023 saw a significant decline in explosive ordnance casualties compared with 2022, late June and early July saw five accidents (including two deaths) in 10 days, according to Miles Hawthorn, HALO’s program manager for Cambodia. When land mines don’t kill their victims, they often destroy a person’s ability to make a living. Before I suited up with the deminers in a Kevlar vest and a white helmet with a thick visor, Ran Tith, a field officer and 14-year HALO veteran, told me that the minefield I’d be visiting, laid by the Khmer Rouge, is considered low-density. Even so, Chinese-made 72-Alpha antipersonnel and Type 69 bounding fragmentation mines had been found there. And after someone was killed by a mine explosion in 1998, the land was deemed too dangerous to farm—an expensive loss for the three families on whose land the minefield sat and the village of 724 people nearby. In an agrarian society like Cambodia’s, so much really does depend on wheelbarrows. HALO (the acronym stands for Hazardous Area Life-Support Organization) began working in Cambodia in 1992, when the country, then governed by the United Nations Transitional Authority in Cambodia, was slowly rising from the ashes of its civil war. Since then, HALO—which began in 1988 in Afghanistan, where it is still active—has cleared nearly 5,000 minefields and destroyed more than half a million mines and other explosive ordnance in Cambodia. Its staff there is made up of 1,214 Cambodians and eight international workers, and 51 percent of its deminers are women. Six of its employees are victims of land mines, all injured prior to working at HALO. But the mission of HALO’s office here goes beyond Cambodia. HALO runs programs in 30 countries, including a new one in the Solomon Islands, established to remove the World War II munitions that still litter places such as Guadalcanal. Earlier this year, the Solomon Islands team came to Cambodia, as many other international teams have in the past, for instruction. And since 2006, HALO’s Cambodia office has been training people to become field officers for the organization’s other international operations. I met the latest class, made up mostly of young people with experience in the international humanitarian sector and a few older, ex-military types. Carlos Scull, a solidly built 37-year-old Venezuelan, was one of the students. Scull, who holds a master’s degree in public policy, told me that he and his classmates had “been learning from the Cambodians from the beginning of our training.” He didn’t know where HALO would place him after completing the program, but he hoped at some point in the future to bring his newly honed demining skills “back to Latin America.” The class had recently been out in the field demining for the first time, and Katie Robjent, a 29-year-old Briton, found two land mines. “I won’t lie,” she told me. “It was daunting.” The mines had been discovered in a small, parceled-out area and were buried only two to three centimeters in the ground. “It was a bit surreal,” Robjent said, “but also very satisfying and rewarding.” She was especially surprised by the loud sound and copious amount of smoke the mines produced when they were later destroyed by a controlled explosion. “It was an amazing feeling,” she said. “They were gone now. They can’t do any more damage.” The life of Ny Ra, a 55-year-old operations manager at HALO’s Cambodia office, illustrates some of the ways that demining skills among Cambodians have developed and traveled. After his father was killed by the Khmer Rouge in 1979, Ny Ra and his family fled the city of Sisophon for Thailand, where he lived as a refugee from the ages of 12 to 25. The camps there were prime recruiting grounds for armed factions opposed to the Vietnamese-installed People’s Republic of Kampuchea, and Ny Ra said he was press-ganged into firing mortar rounds as part of a crew with the Khmer People’s National Liberation Front. In 1996, unemployed and in search of a steady paycheck after the civil war ended, he began demining with HALO. It’s not impossible that at some point in his long career, Ny Ra may even have cleared some of the same mortar rounds that he had fired as a young conscripted soldier. He moved up through the organization and was one of the first employees trained to use the Handheld Standoff Mine Detection System, or HSTAMIDS. Developed by the US military, this specialized piece of equipment is a metal detector that also uses ground-penetrating radar. In 2008, Ny Ra was sent to Herat, Afghanistan, to teach Afghan deminers how to use HSTAMIDS. Later, he spent a year training deminers in Laos. Now back in Cambodia, he has trained demining teams from Colombia, Myanmar, and Ukraine. “This country is very experienced with land mines,” he told me. “We are like a demining university for others.” HALO is far from the only international NGO operating in Cambodia’s demining sector. Others include the Norwegian People’s Aid, the UK-based Mine Action Group, and the Belgian organization APOPO, which is famous for training African giant pouched rats to sniff out land mines around the world. (APOPO is a Dutch acronym for Anti-Persoonsmijnen Ontmijnende Product Ontwikkeling—Anti-Personnel Landmines Detection Product Development, in English.) APOPO’s training and research center is in Morogoro, Tanzania, where African giant pouched rats are indigenous, but the group has been working in Cambodia since 2014. Along with teams of specially trained technical survey dogs, APOPO has 59 mine-detection rats working in Cambodia. The rats, naturally endowed with an incredibly keen sense of smell, are taught in Tanzania to sniff out the TNT in an explosive. They can detect the smell of a mine buried up to about eight inches in the ground. Since the rats, which are slightly smaller than the average house cat, weigh less than three pounds, they are far too light to set off the device, and APOPO has never lost a single one to a land mine. Nocturnal by nature, the rats have an abbreviated work schedule. They are awakened at 4 am. Sunscreen is gently applied to their ears and tails, and they are transported to a minefield to commence work. A typical day lasts from 6 am to 9 am. Thus far, APOPO’s Cambodian program has cleared 799 cluster munitions, almost 2,000 antipersonnel mines, and a similar number of other dangerous remnants of war, such as unexploded mortar rounds. In Cambodia, I learned, the three most productive rats are named Ronin, Princess Diana, and Sharleen. Vankeng Dit took me around APOPO’s visitor center in Siem Reap one morning. There, I met and held Sofia, one of the rats, and watched another, Sharon, demonstrate her mine-detection abilities in the controlled environment of the center. Dit told me that since he began working with APOPO, he had given up eating rats, which are considered a delicacy in Khmer cooking. “The rats are our brothers and sisters,” he said. “We raise them as our children.” That family spirit also attaches to APOPO’s technical survey dogs. Outfitted with small backpacks that include advanced electronics such as a GPS, camera, and beacon, APOPO’s dogs have learned how to survey large swaths of land quickly to ensure that the area is mine-free or to detect any mines that might still be hidden. APOPO trains its dogs in Cambodia and then sends them and their handlers to other locations where APOPO works. Dogs have been sent to South Sudan and Turkey, and teams of dogs and rats have been sent to Nagorno-Karabakh. Next year, APOPO’s Cambodia operation expects to train six Ukrainian women in handling the technical survey dogs. (Ukrainian men between 18 and 60, needed for the war, are generally blocked from leaving the country.) The largest demining organization in Cambodia is CMAC, established by royal decree on June 10, 1992. Only Afghanistan has an older national mine action center, but the United Nations has always played the central role in Afghanistan’s demining. The work in Cambodia, on the other hand, has been independent of the United Nations since 1993. Over the years, CMAC has developed a number of specialized demining skills, including underwater explosives clearance, which is necessary because a vast number of bombs from the Vietnam War still sit at the bottom of the Mekong River. Explosive harvesting is another element of the agency’s work. The explosive components are cut out of the bombs while in place and then repurposed. CMAC provides the explosives to other demining organizations, such as HALO, so that they can conduct controlled explosions of the mines when they’re discovered, a common practice. CMAC also shares its expertise in mine clearance with other nations in a South-South cooperation program, which began in 2010 when Colombian deminers came to Cambodia to learn CMAC’s techniques and CMAC went to Colombia to help develop the training program there. Different countries will have different needs, Heng Ratana, the CMAC director general, told me. Iraqi teams have come to CMAC to be trained in IED disposal, he said, while teams from Laos come to learn about clearing cluster munitions. Through this Japanese-funded program, CMAC has also worked directly with demining teams from Afghanistan, Angola, Mozambique, Myanmar, and, most recently, Ukraine. The decades-long emergency of land-mine contamination in Cambodia has compelled the country to innovate. Cambodia’s political system, however, hasn’t been so agile. Many young Cambodians I met complained to me privately about political corruption and what is essentially one-party rule. Prime Minister Hun Sen ruled Cambodia for 38 years, and the elections this summer were widely seen as illegitimate, with the US declaring them “neither free nor fair.” Hun Sen, moreover, recently handed the prime minister’s post to Hun Manet, his eldest son, while promising that “if my son fails to meet expectations…I would reassume my role as prime minister.” Despite such political limitations, Cambodia’s demining sector remains internationally recognized for its professionalism. But all eyes, in Cambodia and around the world, are on Ukraine now. When the war there ends, what kind of future will Ukrainians face, considering the number of land mines buried in their soil? What lessons can Ukraine take from Cambodia’s example? The learning, in fact, is a two-way street. The problem in Ukraine isn’t only the spread of cluster munitions or the massive scale of land-mine contamination. Both Ukraine and Russia have laid antipersonnel mines, though Russia has used them far more extensively. Many military experts believe that Ukraine’s failure to advance in its latest offensive has been due to the Russian occupier’s extensive use of land mines. But the war in Ukraine has also created new types of land mines. In Ukraine, Russia is deploying never-before-seen mines, some of which it claims are equipped with artificial intelligence. Ny Ra, HALO’s operations manager, was one of several people who told me about these new mines—including the POM-3, a successor to the Bouncing Betty. The POM-3 is a bounding fragmentation mine; when it’s triggered, the deadly portion of the mine springs up to five feet into the air before exploding, spreading shrapnel within a lethal radius of around 50 feet. But the POM-3 is set off by a seismic fuse, which means that you don’t need to step on it for it to detonate. Merely approaching the mine is enough for it to explode, making it particularly difficult to find using traditional mine-detection procedures. Russia claims that AI technology gives the mine the ability to distinguish between friendly footsteps and enemy approaches, a feat dismissed as simply impossible by technology experts. It’s a brand-new mine that the world hasn’t experienced before, and for professionals like Ny Ra, it presents a rare opportunity to cultivate new skills. We were sitting in HALO’s board room, surrounded by displays of actual weapons that had been cut in half and a large variety of land mines and mortars, all stamped “FFE” (Free From Explosives). But there was no POM-3 in a display case. Ny Ra’s eyes sparkled as he described the mine to me. “I have asked my boss to go to Ukraine,” he said, smiling, “but we’ll see.” More from The Nation “That Was the Pilot’s Mission, to Destroy My Home”: Gaza War Diaries, Pt. 3 “That Was the Pilot’s Mission, to Destroy My Home”: Gaza War Diaries, Pt. 3 Atef Abu Saif's dispatches from the epicenter of the assault continue. On the 75th Anniversary of the Declaration of Human Rights On the 75th Anniversary of the Declaration of Human Rights How Eleanor Roosevelt's leadership made her the “First Lady of the World.” The “Hunt for Hamas” Narrative Is Obscuring Israel’s Real Plans for Gaza The “Hunt for Hamas” Narrative Is Obscuring Israel’s Real Plans for Gaza The US press and politicians are trying to fit the attacks on Gaza into a Zero Dark Thirty mold, but it’s something much simpler—and sinister.
<urn:uuid:9f184eb6-18d4-4cf4-afa9-4b6480380f70>
CC-MAIN-2023-50
https://www.thenation.com/article/world/cambodia-land-mine-clearance/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.962691
5,389
2.625
3
Fertilization and Fetal Development This video provides a pictorial overview of the developmental stages of pregnancy and the changes undergone by the female reproductive system. Pregnancy will result in a variety of changes in the female body that will lead to different types of pregnancy symptoms. Watch the biological processes involved in a week-by-week pregnancy beginning at conception and followed by the development of the placenta, the fetal organs, and early movements. Did you know that at 15 weeks the fetus will have developed adult taste buds? This means that the growing fetus can enjoy his mother's meals at this early stage.
<urn:uuid:19c83438-ada0-4970-ae58-9e9289e0ecd3>
CC-MAIN-2023-50
https://www.thepregnancyshow.com/fertilization_and_fetal_development.html?p=3
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.945892
124
3.046875
3
In today’s era safeguarding information is crucial. To ensure data and resource security organizations rely on Identity Access Management (IAM) services. IAM plays a role in managing and controlling user access within an organization’s infrastructure. This article explores the significance, functionalities, implementation and the evolving landscape of IAM in a changing environment. Understanding Identity Access Management (IAM) Identity Access Management (IAM) is a framework of policies, technologies and practices that enables organizations to manage and control access to their assets. These assets can include data, applications, systems and networks. IAM ensures that authorized users have access while preventing unauthorized entry. Key Components of IAM IAM services consist of components that work together to provide a comprehensive access control solution; Identity Management; At the core of IAM lies identity management. It involves creating, managing and authenticating user identities. This includes tasks such as user provisioning, and password management. Management of Access; Access management, also referred to as authorization, regulates the actions that a user can take once they have been authenticated. It involves defining user roles, permissions and access policies. User Verification; User verification is the process of confirming a user’s identity typically done through usernames and passwords. Multi factor authentication (MFA) has become increasingly prevalent to bolster security. Simplified Login (SSO); Simplified login (SSO) allows users to sign in once and gain access to applications and services without having to re enter their login credentials each time. This streamlines the user experience while maintaining security. Collaboration between Organizations; Collaboration between organizations enables users from entities to access resources within trusted organizations without creating identities for themselves. This is particularly valuable in business to business (B2B) and business to customer (B2C) scenarios.Visit here to know more about Identity Access Management Services. The Importance of IAM IAM services play a role in strengthening an organization’s security posture by ensuring that authorized users can access sensitive data and systems thereby reducing the risk of data breaches and cyberattacks. Unauthorized access is one of the causes of security breaches, which IAM helps mitigate. Compliance and Auditability Maintaining compliance is a concern for many organizations today. IAM solutions assist in meeting compliance requirements for data protection regulations such as GDPR, HIPAA, as various industry specific standards. IAM also offers audit logs, which facilitate tracking and reporting of resource access. This is particularly important, for meeting requirements and conducting security audits. Improved User Productivity IAM systems streamline the user experience with Single Sign On (SSO) which allows users to access resources using a single set of credentials. This does not enhance user productivity. Also minimizes issues related to passwords like resets and lockouts. Implementing IAM services requires consideration and following a series of steps to ensure an efficient solution. Here’s an overview of the process; Assessment and Planning The first step involves assessing the organization’s existing access control system and identifying goals and requirements for the IAM solution. This includes understanding user types required resources and authentication methods. User Identity Management The implementation starts with creating and managing user identities including provisioning and de provisioning users while defining their account attributes. It is crucial to establish authentication methods, like biometrics or multi factor authentication to secure user identities effectively. Role Definition and Policy Establishment Defining roles and access policies is an aspect of IAM implementation.Organizations must determine who should be granted access to resources and what actions they are allowed to perform. This involves establishing policies based on roles (RBAC) and implementing a grained control system (ABAC). Integration is crucial for IAM systems to seamlessly connect with an organization’s existing applications, systems and directories. This can be achieved through connectors and APIs ensuring a secure user experience. Access control mechanisms are implemented to enforce the defined roles and policies. This includes authentication, authorization and Single Sign On (SSO) functionalities. Access control should be flexible enough to accommodate adjustments as roles or policies change. Monitoring and auditing capabilities are fundamental for IAM systems. Robust monitoring involves collecting and analyzing access logs generating reports and promptly alerting administrators about any activity. Auditing plays a role in compliance adherence well as detecting security incidents. To ensure an IAM implementation training should be provided for both administrators and end users. Clear onboarding processes should guide users in navigating the system. Training ensures that the IAM system is utilized with proficiency while maintaining security. The landscape of IAM has evolved significantly due to the adoption of cloud computing. Cloud based identity and access management (IAM) solutions offer advantages, including scalability, flexibility and cost effectiveness. Many organizations are now transitioning from, on premises IAM systems to cloud based alternatives. Cloud IAM providers provide features like updates and built in redundancy making management and maintenance simpler. Integration with Mobile Device Management (MDM) Due to the increasing use of devices in the workplace IAM solutions are now integrating with Mobile Device Management (MDM) systems. This integration ensures that access controls and security policies also apply to devices. It helps prevent data breaches and safeguards access from smartphones and tablets. Embracing Zero Trust Security The concept of Zero Trust security is gaining traction in the field of IAM. Unlike the trust but verify” approach Zero Trust assumes that no one. Whether inside or outside an organization. Can be fully trusted by default. IAM plays a role in implementing Zero Trust by verifying the identity and security status of users and devices before granting access. Rise of Biometric Authentication Biometric authentication methods such as fingerprint scanning and facial recognition are increasingly being adopted within the realm of IAM. These methods offer a level of security while also providing convenience as users no longer need to remember passwords. However they also raise concerns about privacy and data protection which must be carefully addressed. Artificial Intelligence and Machine Learning Incorporating intelligence and machine learning into IAM systems is becoming more common to detect and respond to security threats. These technologies can identify user behavior helping to uncover security breaches. They are particularly valuable in addressing insider threats. Challenges and Considerations While IAM brings numerous benefits organizations must address the following challenges and considerations; Balancing User Experience and Security Finding the balance between security measures and user experience is a challenge. Strict security measures can hinder productivity while lenient security can expose the organization to risks. It is crucial for organizations to strike an equilibrium between usability and security. Safeguarding Data Privacy and Ensuring Compliance IAM systems often handle data, which raises concerns regarding data privacy and compliance with regulations. Organizations must ensure that their IAM practices adhere to regulations while effectively protecting user data. Navigating Integration Complexity Integrating IAM with existing systems and applications can be complex in organizations with legacy systems in place. Successful integration requires planning, thorough testing, well as collaboration among different departments. Keeping Pace with an Evolving Threat Landscape The threat landscape is constantly evolving, with new attack methods emerging. To counter these emerging threats organizations must keep their IAM systems up to date and adaptable. In today’s digital era organizations no longer consider Identity Access Management (IAM) services as optional but rather, as a requirement. These services play a role in safeguarding data, managing access and ensuring compliance with regulations. The dynamic nature of IAM necessitates staying updated with emerging trends such, as cloud based solutions, Zero Trust security and biometric authentication. Implementing IAM successfully involves planning, integration and continuous monitoring. Although challenges may arise along the way, the advantages of security, increased user productivity and regulatory compliance outweigh the efforts required to establish and maintain these systems. As organizations evolve and adapt to the changing landscape IAM will remain a fundamental component of their overall security strategy.
<urn:uuid:5da8f793-e1c9-430d-bdb5-6b4e7b146a36>
CC-MAIN-2023-50
https://www.tripgru.com/mastering-security-a-comprehensive-guide-to-identity-access-management-services/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.915397
1,637
2.578125
3
What is generation gap essay? Generation Gap is a term given to the gap or age difference between two sets of people; the young people and their elders, especially between children and their parents. Everything is influenced by the change of time- the age, the culture, mannerism, and morality. This change affects everyone. How to explain generation gap? A generation gap refers to the chasm that separates the beliefs and behaviors belonging to members of two different generations. More specifically, a generation gap can be used to describe the differences in thoughts, actions, and tastes exhibited by members of younger generations versus older ones. What are examples of generation gap? An example of a generation gap is the knowledge of the older baby boomers about computers versus the knowledge of young people born after the Internet had already exploded and taken off. What is the solution of generation gap? The best way to get people to accept each other’s differences is to get them to work together. This might be through coaching and mentoring or by ensuring diversity across project teams and committees. People naturally seek out the things they have in common, so this can be a very effective approach. Why is generation gap a problem? Generation gap occurs between parents and children or between in-laws. It also occurs between teachers and students but the degree of gap is less because they do not spend much time with each other. This problem leads to communication gap and the two parties are unable to understand the channel for communication. What are the reason for generation gap? Generation gaps are caused by increased life expectancy, rapid changes in society, and the mobility of society. Effects of the generation gap include conflict among family members of different generations and misunderstandings. What is the main cause of generation gap? What are the effects of generation gap? Generation gaps can impact relationships between family members of different generations. As younger generations are growing up in a mobile, fast-changing world, they experience changing values and attitudes that do not fit with the general traditions that are held by their parents or grandparents. What causes generation gap? Due to the responsibilities of being an adult and the stress that comes from work life, parents often find themselves too tired to spend enough time with their kids every day. This causes a lack of communication and interaction that widens the generation gap. What are the impact of generation gap? What is the conclusion of generation gap? Conclusion: If two generations do not match each other but if one generation imposes its views on the other generation then it is a loss from the generation gap. We should avoid doing this because doing so increases tensions between two generations and often leads to confrontations. What are the problem of generation gap?
<urn:uuid:33ce2b01-0ca5-4c8a-8657-4de7bf3d3fd6>
CC-MAIN-2023-50
https://www.true-telecom.com/what-is-generation-gap-essay/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.960569
559
3.46875
3
Silhouettes of a Leader Some of your students are, or will be leaders. But all of us take turns being followers. This activity will help students think about the attributes they want in a leader. Prepare by printing out an image of a silhouette for each student, and gathering magazines and newspapers for them to use to find words and images. - When it’s time, explain that for the next 15 minutes, you’re going to try to create the perfect leader. Tell them to think about the qualities they hope for in a leader. - Then give each student the silhouettes and ask them to use the magazines and newspapers to find words and images that describe their ideal leadership - Students then cut out words and images that describe either the kind of leader they want to be or the kind of leader they want to follow and glue those onto the silhouette. When there are 10 minutes left, invite anyone who wants to the chance to share their work. - Assorted magazines, newspapers - Glue sticks (because glue takes forever to dry) - Handouts with the silhouette of a head
<urn:uuid:8afd955b-7452-4880-ac03-46160e3f1e71>
CC-MAIN-2023-50
https://www.umcyoungpeople.org/lead/silhouettes-of-a-leader-a-crafty-tool-to-explore-acts-1
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.938513
228
3.5
4
Understanding Inventory Management Inventory management is the process of ordering, handling, storing, and using a company’s non-capitalised assets – AKA its inventory. For some businesses, this involves raw materials and components, while others may only deal with finished stock items ready for sale. Either way, inventory management all comes down to balance – having the right amount of stock, in the right place, at the right time. And this guide will help you achieve just that. Retail inventory management Retail is the general term used to describe businesses that sell physical products to consumers. While not exclusive to retail, inventory management tends to play more of a role in this industry than any other. We’ll therefore be focusing mainly on inventory management from a retail perspective within this guide. Retail can be split into several areas: Offline. Where a company sells via a brick-and-mortar store or physical location. Online. Where a company sells over the internet via an ecommerce website or marketplace. Multichannel. Where a company sells in multiple different places, usually a combination of online websites and marketplaces. Omnichannel. Where a company provides a unified, integrated experience for customers across all the different online and offline channels it sells on. A company’s inventory will therefore need to be managed in accordance with which of these retail models it operates within. Inventory management in action We’ve covered the broad definition of inventory management. But what’s actually involved when it comes to making good inventory management happen? You want to keep inventory levels balanced at all times without ever having too much or too little of each product in stock. This sounds simple, but rarely is. In reality, good inventory management all comes down to understanding: Types of inventory. So you know what type of inventory is where and can have full visibility over it. Inventory forecasting. So you know how much stock is needed to satisfy demand over an upcoming time period. Purchasing inventory. So you know when and how to create purchase orders to re-order new stock. Inventory storage. So you know how much of each inventory item can be suitably housed, and where to send it. Inventory analysis. So you can use metrics to make more informed decisions about your inventory as time goes on. Handling techniques. So you can quickly and efficiently book-in, put away, pick, pack and ship inventory as and when needed at your various locations. Multichannel tracking. So you have visibility on where exactly your inventory is as well as additions (purchases) and subtractions (sales & shrinkage), to give as close to a live stock figure as possible. Inventory accounting. So you can properly record your inventory on financial documents. Inventory management systems. So you can automate as much of the inventory management process as possible. Choosing An Inventory Management System These are the basic ingredients of quality inventory management. And you’ll need to take a systematic approach to them in order to best equip your business for long term growth. Luckily, we expand on each of these points in depth within the different chapters of this guide. The importance of inventory management Good inventory management is a vital part of running a retail company. Without inventory, the business is worthless as it no longer has any stock to generate revenue from. Good inventory management helps with providing a seamless customer experience, improving cash flow and maximizing profits, avoiding shrinkage and waste, and optimizing the fulfillment process. All making it an imperative task for serious retailers. A retail business is useless without its inventory. And so while it may not be the most exciting subject, inventory management is vitally important to your business’s longevity. Good inventory management helps with: Customer experience. Not having enough stock to fulfill orders may cause overselling and ultimately unhappy customers. Improving cash flow. Putting cash into too much inventory at once means it’s not available for other things – like payroll or marketing. Having a firm grip of your inventory levels is key to maintaining a good cashflow. Avoiding shrinkage. Purchasing too much of the wrong inventory and/or not storing it correctly can lead to it becoming ‘dead’, spoiled, or stolen. Optimising fulfilment. Inventory that’s put away and stored correctly can be picked, packed and shipped off to customers more quickly and easily. What are the four types of inventory? Work-in-progress (WIP) inventory. Maintenance, repair & operations (MRO) goods. We also include packing materials as a fifth type of inventory that an ecommerce retailer may need to keep track of. How do you track inventory? Inventory tracking can be done in a variety of ways, ranging from pen & paper, to online spreadsheet, to full blown inventory software like Veeqo. We cover each method in detail (including a spreadsheet template) in our dedicated chapter on inventory tracking. The more sales channels you sell on (and the more sales you make on each one), the tougher this practice becomes. So most growing multichannel retail businesses will be looking at some form of automated system to take care of inventory tracking for them. How do you manage inventory effectively? The first step is to commit to regular and well-organized forecasting. You need to have a solid idea of exactly how much inventory you have on hand and plan to sell in an upcoming period, so you can plan for replenishment needs. You’ll then need to purchase new inventory in a timely fashion, preferably based on specific reorder points. And also ensure you have the right organizational structure set up in your warehouse to allow for optimal storage, minimal shrinkage, and fast and systematic fulfillment. A well set-up spreadsheet or automated system is essential to manage inventory across multiple sales channels. This way, you know exactly where inventory is, how much you have on-hand, and minimize the chances of over or under-selling what you have. What are the methods of inventory management? Choose an appropriate fulfilment option. Take forecasting seriously. Set reorder points for each product. Use EOQ for optimal order quantities. Give each variant a dedicated warehouse bin. Sell older inventory first. Prioritise with ABC analysis. Always track your metrics. Verify accuracy with regular counts. Automate as much as possible. Key inventory management terms Inventory management is a complex subject. And there’s a lot of systems, processes and general pieces that go into the puzzle. Here’s a glossary of key terms you’re likely to come across: The average inventory on-hand over a given time period, calculated by adding Ending Inventory (EI) to Beginning Inventory (BI) and dividing by two. Average inventory cost An inventory valuation method that bases its figure on the average cost of items throughout an accounting period. Back order (BO) An order for a product that is currently out of stock, and so cannot yet be fulfilled for the customer. A device used to digitally identify items via a unique barcode, then perform inventory and fulfilment tasks like booking-in, picking, counts, etc. Beginning Inventory (BI) The value of any unsold, on-hand inventory at the start of an accounting period. A group of individual products in an inventory that are brought together to sell as one under a single SKU. The total costs associated with holding and storing inventory in a warehouse or facility until it is sold on to the customer. Cost of goods sold (COGS) Direct costs of purchasing and/or producing any goods sold, including everything that went into it – materials, labour, tools used, etc. Does NOT include indirect costs – like distribution, advertising, sales force costs, etc. Inventory that remains unsold for a long enough period of time for it to be deemed outdated and virtually unsellable. Ending Inventory (EI) The value of any unsold, on-hand inventory at the end of an accounting period. An inventory valuation method that assumes stock that was purchased first, is also the first to be sold. Also known as a stock take, this is the systematic process of taking a physical count of inventory in order to verify accuracy. Inventory shrinkage is an accounting term to indicate inventory items that have been stolen, damaged beyond saleable repair or otherwise lost between the point of purchase and point of sale. The process of giving unsold inventory a monetary value in order to show as a company asset in financial records. The variations of a single product that a company may hold in its inventory. For example, stocking a t-shirt in various colours and sizes. The ability of a person or business to see exactly where its inventory is and how it is being used. An inventory valuation method that assumes the most recent products added to your inventory are the ones to be sold first. The time it takes for a supplier to deliver new stock to the desired location once a purchase order has been issued. A retail model that sells in multiple different places, usually online via a combination of websites and marketplaces. A retail model that goes beyond multichannel to integrate all of a company’s online and offline sales channels into one, unified customer experience. The process of getting a customer’s sales order from your warehouse or distribution centre to it being in their possession. The systematic order management process behind organising, managing and fulfilling all the sales orders coming into a business. From receiving orders and processing payment, right through to picking, packing, shipping, handling returns and communicating with customers. Taking online orders for a product that turns out to be out of stock (usually through poor inventory management). Preventing overselling is key to providing a high-quality experience for online customers. Periodic inventory management A type of inventory system that involves using manual processes to periodically count and update on-hand stock levels. A type of inventory system that involves automating your inventory tracking so it stays perpetually updated in real-time. Any inventory that has not yet reached its final destination of a company’s warehouse shelves, but is currently ‘en route’ somewhere within their supply chain – e.g. currently being manufactured, or being shipped by the supplier. Purchase order (PO) A commercial document created by a business to its supplier, detailing quantities, items and agreed prices for new products to add to on-hand inventory. Sales order (SO) A document created when a customer makes a purchase, detailing which products are to be received and how much has been paid or is owed. Stock-keeping unit (SKU) A SKU is a unique alphanumeric code applied to each variant in a company’s inventory, helping to easily identify and organise a product catalogue. The complete flow a product or commodity takes from origin to consumer – including raw materials, to finished goods, wholesalers, warehouses and final destination. A retailer might only be directly responsible for certain chunks of this supply chain, but should still be aware of it in its entirety for the products they sell. Third-party logistics (3PL) Refers to the use of an external third party to handle warehousing, inventory, fulfilment and/or customer service on behalf of a retail company. Key inventory management formulas It’s not just common terminology you need to know when it comes to inventory management. There are some specific formulas to take note of too. We’ll be going into greater depth with how and when to use these formulas later on in this guide. But here’s a quick run through to use as a reference point: 1. Inventory turnover The inventory turnover ratio measures how many times your inventory is sold over a given time period. It’s, therefore, a critical analysis metric showing how effectively inventory is being managed overall. The formula takes cost of goods sold (COGS) over a specific period, and divides it by average inventory over the same period. Generally speaking, higher inventory turnover rates indicate better performance and efficiency. This is because the company would be getting through its inventory stocks more often – minimising carrying costs per unit. This gives an insight into the overall efficiency of a company and its inventory management processes. The higher the inventory turnover rate, the more efficient a business is at getting through its inventory. Inventory Turnover Calculator Cost of Goods Sold÷Beginning Inventory+Ending Inventory2 Enter your data above to calculate your results 2. Sell through rate Sell through rate takes the amount of inventory a retailer receives, and compares it against what is actually sold over a given period. It’s usually expressed as a percentage: This helps analyse if your investment in a particular product is working out well. Low sell through rates indicate you either overbought or priced too high, while high sell through rates indicate you may have under bought or priced too low. It’s a great way to make decisions on future purchase quantities for a product or from a particular supplier. 3. Days of inventory outstanding (DIO) Days of inventory outstanding (DIO) measures the typical number of days it takes for inventory to turn into sales. It’s hard to draw insights from just one calculation. But you should look into typical industry standards, and also keep track of whether you are trending up or down as time goes on. 4. Safety stock Safety stock is the backup stock needed to meet unexpected supply problems and/or sudden changes in demand. Bear in mind that you want to have enough safety stock to meet demand. But not so much that increased carrying costs puts a strain on cash flow. 5. Reorder point The reorder point helps determine when to order new inventory. It is a specific point in time that acts as a trigger to re-order as soon as stock has diminished to that certain level. It’s important to consider the lead time for new stock to be delivered when setting reorder points. Enough stock should be leftover to keep up with demand before the newly purchased inventory becomes available for sale. 6. Economic order quantity (EOQ) EOQ is a formula that helps calculate exactly how much inventory to order. It takes into account a company’s typical demand, ordering costs and carrying costs to provide the most economical figure possible: This is obviously quite a complicated formula to use. But we cover this in greater depth in Chapter 4: Purchasing Inventory. Inventory management software An inventory management software or system does all the heavy lifting for a retail business when it comes to its inventory. It tracks inventory additions and subtractions automatically, without relying on manual, paper or spreadsheet processes. Systems like this are becoming more and more popular among growing businesses as they tackle the challenges of modern multichannel and omnichannel retail. Choosing an inventory management system that’s right for your business can be a tricky process. But here are a few pillar features of good software: Real-time tracking. Syncs a live inventory figure across all sales channels and warehouses. Forecasting. Uses past sales data to project estimated inventory requirements into the future. Purchasing. Helps manage all suppliers and purchase orders for quick and easy stock replenishment. Rules & automations. Allows creation of inventory rules, e.g. to dictate how much stock shows on each sales channel. Cloud-based. Accessed from anywhere with data never being overwritten by team members making changes. Many systems (like Veeqo) will also help manage and automate a plethora of other operational tasks – like sales & wholesale orders, picking & packing, shipping, and returns. Free Inventory Management Software Veeqo provides powerful but easy-to-use inventory management software, and is free no matter how large your business and how many shipments you send. And, as an Amazon-owned company we are the best software if you sell through Amazon. Sign-up now to access our software and discounted shipping rates.
<urn:uuid:3c9b6d76-1944-4691-8b38-5fefea8610dc>
CC-MAIN-2023-50
https://www.veeqo.com/inventory-management
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.926875
3,367
2.5625
3
Subtitles section Play video Print subtitles In August 2016, a 6.2-magnitude earthquake struck a mountainous region of central Italy, killing 292 people and displacing more than two thousand. The picturesque towns were hit especially hard, as they’re made up of centuries-old buildings only accessible by small, winding roads. Roughly 20 major earthquakes occur every year, and while they always lead to some degree of devastation, some regions are more uniquely equipped than others. So, which countries are best able to withstand major earthquakes, and why? Well to start, a major earthquake is defined as anything above 7.0 on the richter scale. These seismic events have caused billions in damage and killed thousands of people, but primarily as a result of poor infrastructure and inefficient response, rather than the earth’s shaking. That said, one country that is highly prepared is Chile, which has suffered 13 earthquakes of magnitude 8 or above since 1906 - one of which was a 9.5 in 1960: the largest earthquake ever recorded. The country sits alongside the ring of fire, an area of the pacific ocean where roughly 90 percent of the world’s earthquakes occur. So to prepare for inevitable disaster, Chile has implemented regular earthquake emergency drills, strict building codes and a comprehensive early warning system, including sirens and mobile phone alerts. The country also maintains a disaster relief agency, which regularly practices evacuations, and trains rescue crews year-round. As a result, Chile’s most recent 8.3 major quake in 2015 only saw 13 deaths, compared to more than 1,600 in 1960 according to USGS. Earthquake preparedness is not unusual for developed countries, however implementation often slips through the cracks as a result of corruption and government negligence. For instance, many builders find it cheaper to pay a bribe to a public official than to comply with strict building codes. But this is not a common practice in Chile, where people reportedly take the potential threat of an earthquake very seriously. . Another country with exceptional earthquake preparedness is Japan, which, like Chile, has a long and deadly history of frequent, major earthquakes. All new buildings must be able to sway with the earth’s shaking, and many older buildings have been retrofitted to do the same. Even more advanced are Japanese homes, most of which have special foundations that fill with compressed air when the earth shakes so that the home actually levitates. In the likely event a major earthquake strikes, all bullet trains come to an immediate halt, and TV channels switch to live coverage of relief efforts, including maps of coastal areas that are at risk of tsunamis. In 2007, Japan launched a nationwide earthquake warning system that detects tremors, determines the quake’s epicenter and sends online warnings throughout the country. It is considered the most advanced early-warning system in the world. But not all small, fault-lining countries are so prepared. In 2010, Haiti suffered a magnitude 7.0 earthquake, resulting in more than 150,000 deaths. So why were they so unprepared? In a word, money. Haiti is one of the poorest countries on earth, while Chile and Japan have strong economies that are able to fund preparedness programs and emergency response measures, making a major earthquake somewhat manageable. In the end, when it comes to earthquakes, the greatest armor is wealth.
<urn:uuid:48e6360a-49b9-4b45-8519-9cd40b7d82d9>
CC-MAIN-2023-50
https://www.voicetube.com/videos/47084
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.962003
680
3.71875
4
What Causes Beach Closures? The pollution that causes beach closures and illness in humans comes from many different places on land, but ultimately gets into the water primarily through one of two pathways—discrete point sources and diffuse non-point sources. Point sources are single, identifiable inputs of polluted water that can often be monitored or controlled because they are readily identifiable. These generally include pipes or culverts pouring pollution directly into the water from a home or business. Non-point sources are diffuse flows passing over or through land (which might contain the pollution) before entering a water body. These are more difficult to detect, monitor, and control because they tend to be more variable, are often spread out over wide areas, and often invisible. Many of the most common pollutants come from one of two places: humans and animals. Human fecal matter in water bodies constitutes the greatest public health threat because humans are reservoirs for many bacteria, parasites, and viruses that are dangerous to other humans and can cause a variety of illnesses. Residential buildings are a primary source of many of these pathogens, and the cause of many problems can often be traced back sewage overflows or leaky residential septic systems. Runoff from agricultural land is also a serious health concern. Animal fecal waste may contain pathogens such as Cryptosporidium, or Salmonella. Likewise, pet waste can pose health threats to humans. A single dog feces contains more than 40 million enterocci bacteria (an indicator of other, more serious pathogens) and is equivalent to nearly 7,000 bird droppings. Water running off of nearby land is often a major source of problems and pollution that closes urban beaches. Even a moderate rain can send enough water storm drains to overwhelm older “combined sewer systems” that mix runoff and sewerage. When a rainfall adds enough extra water to the system that the treatment plant cannot process everything fast enough and the excess, untreated water to flows into a nearby river, lake, or coastal area. That is why many beach closures occur after rainstorms—and why many municipalities now close beaches in advance of heavy rain. Runoff from fields, lawns, parking lots, and streets can also wash directly into nearby waterways when it rains, carrying with it any pollutants that might have been on land. Even watering a lawn or washing a car can carry potentially harmful pathogens into the water. Leaky or malfunctioning septic systems, too, can cause potentially harmful pollution to seep slowly through the ground and into nearby lakes, rivers, and streams. Why are Beach Closures Important? In addition to disrupting a day at the beach, water pollution poses a serious health threat to beachgoers. The most common illness arising from contact with polluted beach water is gastroenteritis, an inflammation of the stomach and the intestines that can result in vomiting, diarrhea, cramps, and fever. Other minor illnesses include rashes and infections of the ear, eye, nose, and throat. People can contract some illnesses simply by getting polluted water on their skin or in their eyes and nose. In a few cases, swimmers develop infections when an open wound is exposed to polluted water. These usually require little or no treatment and have no long-term health effects, but should be treated as soon as they arise. In very polluted water, however, swimmers can be exposed to more serious diseases like dysentery, hepatitis A, cholera, and typhoid fever. Those with frequent exposure to water (such as surfers and divers), are most likely to get sick. Children, the elderly, people with weakened immune systems are most at risk of severe illness or of suffering complications from a wide range of illnesses contracted by exposure to water by any of a number of pathogens. What Makes You Sick? The infectious organisms found at the beach include bacteria, parasites, and viruses. The most common ones come from the stools of people or animals. Salmonella are a group of bacteria that pass from the feces of infected people or animals to other people or other animals and can cause diarrhea, abdominal cramps, and vomiting between eight and 72 hours after exposure. Salmonellosis, the infection caused by consuming food or water containing Salmonella, results in an estimated 1.4 million cases and more than 400 deaths annually in the U.S. Shigella are a group of bacteria that pass from the feces of an infected individual to other people and can cause diarrhea (often bloody), fever, and vomiting about a day after exposure. Approximately 14,000 cases of shigellosis, the infection caused by Shigella, are reported in the U.S. annually, though many more likely go unreported, as symptoms often resolve after a few days. Cryptosporidium is a microscopic parasite that can live in the intestine of humans and animals and is passed via feces to another person or animal. Cryptosporidiosis is a disease caused by infection by the Cryptosporidium parasite and is characterized by stomach cramps or pain, nausea, vomiting, fever and diarrhea lasting an average of one week, though individuals may remain infectious after symptoms cease and may experience recurrence of symptoms. Children, elderly, and people with weakened immune systems face additional complications. Norovirus are a group of highly contagious, related viruses that make up the most common cause of acute gastroenteritis in the U.S. Noroviruses are found in the stool and vomit of infected people, who generally recover in one to three days, but who can remain infectious for up to two weeks after symptoms cease. Non-polio enteroviruses are second only to virus that causes the common cold as the most widespread viral agent in humans, causing roughly 10 to 15 million symptomatic infections in the U.S. each year. Most people who are infected with a non-polio enterovirus experience no symptoms; those who become ill usually develop mild upper respiratory symptoms (a "summer cold"), a flu-like illness with fever and muscle aches, or a rash. Campylobacter are another group of bacteria that infect both humans and animals and are passed via fecal material. Symptoms of infection include diarrhea, cramps and fever, and they last for about a week. About 13 cases are diagnosed each year for each 100,000 persons in the U.S., but many more cases go undiagnosed or unreported. >em>Campylobacter is estimated to affect over 2.4 million persons every year. Giardia is a microscopic parasite that lives in the intestine of humans and animals, and spreads via fecal material. Symptoms of Giardia infections appear one to two weeks after infection are often mild in most people. The infection sometimes resolves without treatment in two to six weeks, but can include severe diarrhea, abdominal cramps, and nausea. What You Can Do? There are a few, basic practices you can follow to stay safe at the beach and reduce the chances that you or someone else will become sick after a trip to the beach. At the Beach Plan ahead. Find out if the beach you want to go to is monitored regularly and if it has had closures in the past. Look for good swim sites. In areas that are not monitored, choose swimming sites with good water circulation and exposure to open water. Avoid potential sources of pollution. Avoid swimming at beaches where you see discharge pipes or at urban beaches after a heavy rainfall. Practice basic hygiene. Wash your hands before you eat after digging in the sand and wash yourself with soap and clean fresh water after you swim or wade in the water. Clean up after your pet. Clean up after your pet, especially at the beach, but also at home, and obey pet bans at the beach. Conserve water. Even small amounts of extra water flowing over your lawn and down residential and storm drains can send large numbers of microbes and viruses to recreational waterways and beaches. Direct runoff to the soil, not the street. Create a rain garden or use rain barrels to direct rain gutters and downspouts to soil, grass or gravel areas rather than blacktop, cement, or other “impervious” surfaces. Sweep your driveway instead of hosing it down and increase the amount of natural, “permeable” surface wherever possible. Maintain your septic system. Even if you live miles from the beach, have your septic tank cleaned out regularly. Such maintenance prolongs the life of the system and can help prevent groundwater and beach contamination. Practice smart lawn and garden care. Reduce the amount of polluted runoff, by planting natural vegetation rather than lawn, which often require less fertilizer and herbicide. Do not allow water used to water your lawn and landscaping to run into nearby storm drains. What's Being Done? Scientists and health officials cannot easily monitor or detect all of the possible pathogens that might be in the water, and so test for what are known as “indicator organisms.” These include E.coli in fresh water and enterococcus in salt water. Both are generally not harmful, but because they are common in human and animal feces, their presence above a certain level indicates that a potential health risk exists. On Cape Cod, the Barnstable County Department of Health and Environment monitors fresh and marine waters weekly during the summer and officials use special culture media to grow and count colonies of the indicator organisms. The EPA recommends a water quality advisory be issued when the number of indicator bacteria colonies exceeds a certain level. For E. coli, this limit 235 colony forming units (CFU) in 100 milliliters of water; for enterocci, the recommended limit is 104 CFU in 100 milliliters. Within 24 hours of water from a particular beach failing to meet quality requirements, the Department of Health (or its authorized representative) must post signs at the entrance to the beach and each parking lot warning that the beach is closed and that swimming may cause illness. The sign must also contain the reason for the warning, the date of the posting, and the name and telephone number of the board of health. Most states also maintain websites that report the status of all monitored beaches in the state. As soon as the agency or organization in charge of monitoring finds a problem, they will immediately resample the water. Because it takes 24 hours to culture the samples, the beach will remain closed for at least a day. The beach will be sampled every 24 hours until the indicator bacteria falls below EPA limits. If the beach is closed, just because you stay out of the water does not mean you will be safe. High levels of indicator bacteria have been found in beach sands and one small-scale health study found an increase in gastroenteritis associated with digging in and being buried in beach sand (Heany et al, 2009). There are, however, currently no EPA standards or advisory recommendations regarding exposure to pathogens in beach sands. Current EPA methods for detecting indicator bacteria require at least 24 hours to provide results. Because of this, a beach closure actually reflects water quality from the day before. As a result, scientists are working on ways to provide more timely water quality results. Quantitative PCR (qPCR) is a method that looks for genetic material of the indicator organisms. It can provide results within four to five hours. Current work is attempting to understand the relationship between qPCR data and the risk of disease. Environmental Sample Processor (ESP) is an instrument that automatically samples and tests water for the DNA of specific target organisms. It is currently being used to watch for red tide and other harmful algae and a version might someday be able to monitor beach water quality. Alternative indicator organisms are being studied for use in water quality monitoring. These might be better correlated with the presence of pathogens and so reflect risk of disease. Research is also underway to identify organisms that specifically indicate the presence of human fecal contamination or the source of non-human fecal material. What About Shellfishing? Shellfishing is a separate, but related, topic. Safety standards for the harvest and consumption of shellfish are established separately by the U.S. Food and Drug Administration (FDA) and are administered by the National Shellfish Sanitation Program. Because of the differences between monitoring shellfish and bathing water, a swimming beach may be closed while nearby shellfishing areas remain open, and vice versa. Contact the town shellfish warden or similar authority to find out if shellfish are safe to eat when a nearby beach has recently been closed. News & Insights Beach parking lots across Cape Cod are closed to reduce the spread of COVID-19. As summertime approaches, will the beach crowds that normally show up after Memorial Day will be staying away this year? WHOI microbiologist Amy Apprill weighs in. From Oceanus Magazine WHOI biologist Rebecca Gast examines whether the recovered and thriving population of gray seals in Cape Cod waters has affected water quality off the beaches they frequent.
<urn:uuid:482f2265-1545-476c-8fc7-5ea059b39ad8>
CC-MAIN-2023-50
https://www.whoi.edu/know-your-ocean/ocean-topics/ocean-human-lives/pollution/beach-closures/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.949225
2,668
3.640625
4
Kupa, Kūpa, Kūpā: 31 definitions Kupa means something in Buddhism, Pali, Hinduism, Sanskrit, Jainism, Prakrit, the history of ancient India, Marathi, Hindi, biology. If you want to know the exact meaning, history, etymology or English translation of this term then check out the descriptions on this page. Add your comment or reference to a book if you want to contribute to this summary article. Purana and Itihasa (epic history)Source: archive.org: Shiva Purana - English Translation Kūpa (कूप) refers to a “well” (filled with water), according to the Śivapurāṇa 2.3.44 (“Menā regains consciousness”).—Accordingly, as Menā said to her daughter (Pārvatī): “O wretched daughter, what is it that you have done? This is extremely painful to me. You have given gold and brought a glass piece, O wicked girl. You have cast away sandal paste and smeared yourself with mud. You have driven away the swan and have held a crow in your hands. Setting aside the sacred river water you have drunk the well-water (kūpa-udaka). Losing the sun you have clung to the glowworm in all earnestness. [...]”.Source: Cologne Digital Sanskrit Dictionaries: The Purana Index Kūpā (कूपा).—A river of the Śuktimat.* - * Vāyu-purāṇa 45. 107. Kūpa (कूप) refers to the name of a Tīrtha (pilgrim’s destination) mentioned in the Mahābhārata (cf. ). Note: The Mahābhārata (mentioning Kūpa) is a Sanskrit epic poem consisting of 100,000 ślokas (metrical verses) and is over 2000 years old. The Purana (पुराण, purāṇas) refers to Sanskrit literature preserving ancient India’s vast cultural history, including historical legends, religious ceremonies, various arts and sciences. The eighteen mahapuranas total over 400,000 shlokas (metrical couplets) and date to at least several centuries BCE. Ayurveda (science of life)Source: archive.org: Vagbhata’s Ashtanga Hridaya Samhita (first 5 chapters) Kūpa (कूप) refers to “(water from) wells”, as mentioned in verse 5.13-14 of the Aṣṭāṅgahṛdayasaṃhitā (Sūtrasthāna) by Vāgbhaṭa.—Accordingly, “[...] as concerns (water from) wells [viz., kūpa], ponds, etc., one should know (if it comes) from jungle, swamp, or rock. No water or, in case of incapability, little (is) to be drunk by those suffering from weak digestion and visceral induration (and) by those suffering from jaundice, abdominal swellings, diarrhea, hemorrhoids, dysentery, and cutaneous swellings. Except in autumn and summer, even a healthy man shall drink only little”.Source: Shodhganga: Kasyapa Samhita—Text on Visha Chikitsa Kūpa (कूप) refers to a “well”, as taught in the Kāśyapa Saṃhitā: an ancient Sanskrit text from the Pāñcarātra tradition dealing with both Tantra and Viṣacikitsā—an important topic from Āyurveda which deals with the study of Toxicology (Agadatantra or Sarpavidyā).—The Kāśyapasaṃhitā mentions that snake-bites that happen in certain places [like an unused well (jīrṇa-kūpa)] are highly inimical to the victim. Āyurveda (आयुर्वेद, ayurveda) is a branch of Indian science dealing with medicine, herbalism, taxology, anatomy, surgery, alchemy and related topics. Traditional practice of Āyurveda in ancient India dates back to at least the first millenium BC. Literature is commonly written in Sanskrit using various poetic metres. Vastushastra (architecture)Source: OpenEdition books: Architectural terms contained in Ajitāgama and Rauravāgama Kūpa (कूप) refers to “well § 5.10.”.—(For paragraphs cf. Les enseignements architecturaux de l'Ajitāgama et du Rauravāgama by Bruno Dagens) Vastushastra (वास्तुशास्त्र, vāstuśāstra) refers to the ancient Indian science (shastra) of architecture (vastu), dealing with topics such architecture, sculpture, town-building, fort building and various other constructions. Vastu also deals with the philosophy of the architectural relation with the cosmic universe. Shaktism (Shakta philosophy)Source: Google Books: Manthanabhairavatantram Kūpa (कूप) refers to a “well”, according to the Manthānabhairavatantra, a vast sprawling work that belongs to a corpus of Tantric texts concerned with the worship of the goddess Kubjikā.—Accordingly, “[...] (May) those who are engaged in union (yoga) with the Yoginīs, the adepts (sādhaka) intent on (the observance of the) Rule, the Siddhas, apprentices, teachers and yogis intent on spiritual discipline, (the beings) in the town or village, in the forest, the confluence of rivers, or in a well [i.e., vāpī-kūpa], (at the foot of a) solitary tree or in a cremation ground, the Circle of Mothers and those who are of many forms as well as those who are born of the earth and everyone else, may they, well pleased, always accept the bali”. Shakta (शाक्त, śākta) or Shaktism (śāktism) represents a tradition of Hinduism where the Goddess (Devi) is revered and worshipped. Shakta literature includes a range of scriptures, including various Agamas and Tantras, although its roots may be traced back to the Vedas. Jyotisha (astronomy and astrology)Source: Wisdom Library: Brihat Samhita by Varahamihira Kūpa (कूप) refers to a “well”, according to the Bṛhatsaṃhitā (chapter 9), an encyclopedic Sanskrit work written by Varāhamihira mainly focusing on the science of ancient Indian astronomy astronomy (Jyotiṣa).—Accordingly, “If she [=Venus] should pass through the constellation of Hasta, the Kauravas and painters will suffer; there will be no rain; well-diggers and birds will suffer [i.e., kūpa-kṛt-aṇḍaja-pīḍā]. If she should enter the constellation of Citrā, there will be good rain. If she should enter the constellation of Svāti, there will be much rain; servants, merchants and boatmen will become wicked and lawless. If she should enter the constellation of Viśākhā, there will be good rain and tradesmen will suffer”. Jyotisha (ज्योतिष, jyotiṣa or jyotish) refers to ‘astronomy’ or “Vedic astrology” and represents the fifth of the six Vedangas (additional sciences to be studied along with the Vedas). Jyotisha concerns itself with the study and prediction of the movements of celestial bodies, in order to calculate the auspicious time for rituals and ceremonies. Shaivism (Shaiva philosophy)Source: Brill: Śaivism and the Tantric Traditions Kūpa (कूप) refers to “wells”, according to Kṣemarāja’s commentary on the Svacchandatantra verse 4.85.—Accordingly, “The mundane path is the observance according to śruti and smṛti. The sacred rites [consist of] such actions as bathing at a sacred site and giving away food. The meritorious acts are [the donations and setting up of] such things as wells (kūpa), tanks and monasteries for ascetics”. Shaiva (शैव, śaiva) or Shaivism (śaivism) represents a tradition of Hinduism worshiping Shiva as the supreme being. Closely related to Shaktism, Shaiva literature includes a range of scriptures, including Tantras, while the root of this tradition may be traced back to the ancient Vedas. Yoga (school of philosophy)Source: ORA: Amanaska (king of all yogas): A Critical Edition and Annotated Translation by Jason Birch Kūpa (कूप) refers to a “well”, according to the Vijñānabhairavatantra verse 115.—Accordingly, [while teaching contemplative techniques]: “Having stood above a great hole such as a well (kūpa), an immediate absorption of the mind clearly and completely arises for [the Yogin] whose mind is free of thoughts because of gazing [into it]”. Yoga is originally considered a branch of Hindu philosophy (astika), but both ancient and modern Yoga combine the physical, mental and spiritual. Yoga teaches various physical techniques also known as āsanas (postures), used for various purposes (eg., meditation, contemplation, relaxation). Mahayana (major branch of Buddhism)Source: Wisdom Library: Maha Prajnaparamita Sastra Kūpa (कूप) refers to a “well” (i.e., filled with water), according to Mahāprajñāpāramitāśāstra (chapter 21).—Accordingly, “The immoral person is not respected (satkṛta) by people; his house is like a cemetery into which people do not go; he loses all his virtues like a rotten tree that people despise; he is like a frozen lotus that gives people no pleasure to see; filled with evil thoughts, he is dreadful like a demon; people do not turn to him, no more than a thirsty man goes to a poisoned well (kūpa); his mind is always disturbed like a guilty man who always fears the approach of punishment; he is like a field (kṣetra) covered with hailstones over which nobody can venture; [...] Even though he is called Bhikṣu because he has a shaved head, the yellow robe and presents his ‘ticket’ in the proper order, in reality he is not a Bhikṣu”.Source: academia.edu: A Study and Translation of the Gaganagañjaparipṛcchā Kūpa (कूप) refers to “(hair) pores”, according to the Gaganagañjaparipṛcchā: the eighth chapter of the Mahāsaṃnipāta (a collection of Mahāyāna Buddhist Sūtras).—Accordingly as The Lord said: “O Śāriputra, in the buddha-field of the Tathāgata Ekaratnavyūha, there is a Bodhisattva, the great being Gaganagañja who is resplendent by the splendor of merit (puṇya-tejas), [...] who has proclaimed the dharma from all hair-pores (sarva-roma-kūpa-dharmākhyāna)) in accordance with individual suitabilities as adorned with the dharma, has attained all qualities of a buddha on the palm of his hand as adorned with manifestation, has illuminated all buddha-fields as adorned with splendor, [...]”.Source: De Gruyter: A Buddhist Ritual Manual on Agriculture Kūpa (कूप) refers to a “well” (suitable for performing offering ceremonies), according to the Vajratuṇḍasamayakalparāja, an ancient Buddhist ritual manual on agriculture from the 5th-century (or earlier), containing various instructions for the Sangha to provide agriculture-related services to laypeople including rain-making, weather control and crop protection.—Accordingly [as the Bhagavān taught the detailed offering-manual], “At the time of drought one should prepare a maṇḍala with clay and cow dung measuring three hastas on a mountain, in a forest, at a monastery, a spring, a pool, a tank, a well (kūpa), a lake, or the residence of the Nāgas. One should dig a hole measuring a hasta in the middle of the maṇḍalaka. [...]”. Mahayana (महायान, mahāyāna) is a major branch of Buddhism focusing on the path of a Bodhisattva (spiritual aspirants/ enlightened beings). Extant literature is vast and primarely composed in the Sanskrit language. There are many sūtras of which some of the earliest are the various Prajñāpāramitā sūtras. General definition (in Jainism)Source: The University of Sydney: A study of the Twelve Reflections Kūpa (कूप) refers to a “pit (of darkness)”, according to the 11th century Jñānārṇava, a treatise on Jain Yoga in roughly 2200 Sanskrit verses composed by Śubhacandra.—Accordingly, “Travelling living beings, fettered very tightly by numerous chains such as women, etc., fall into a deep pit of darkness (kūpa—andhamahākūpe) called life”. Jainism is an Indian religion of Dharma whose doctrine revolves around harmlessness (ahimsa) towards every living being. The two major branches (Digambara and Svetambara) of Jainism stimulate self-control (or, shramana, ‘self-reliance’) and spiritual development through a path of peace for the soul to progess to the ultimate goal. India history and geographySource: Cologne Digital Sanskrit Dictionaries: Indian Epigraphical Glossary Kūpa.—(Ep. Ind., Vol. VII, p. 46, note 8), an ordinary well; cf. vāpī which is a well with a flight of stairs. Note: kūpa is defined in the “Indian epigraphical glossary” as it can be found on ancient inscriptions commonly written in Sanskrit, Prakrit or Dravidian languages. The history of India traces the identification of countries, villages, towns and other regions of India, as well as mythology, zoology, royal dynasties, rulers, tribes, local festivities and traditions and regional languages. Ancient India enjoyed religious freedom and encourages the path of Dharma, a concept common to Buddhism, Hinduism, and Jainism. Biology (plants and animals)Source: Google Books: CRC World Dictionary (Regional names) Kupa in Nigeria is the name of a plant defined with Calotropis procera in various botanical sources. This page contains potential references in Ayurveda, modern medicine, and other folk traditions or local practices It has the synonym Apocynum syriacum Garsault (among others). Example references for further research on medicinal uses or toxicity (see latin names for full list): · Journal of Ethnopharmacology (2005) · Mediators Inflamm. (2005) · The Useful Plants of West Tropical Africa. (1985) · Species Plantarum, ed. 4 · Autonomic & Autacoid Pharmacology (2007) · Species Plantarum (1753) If you are looking for specific details regarding Kupa, for example side effects, chemical composition, diet and recipes, health benefits, extract dosage, pregnancy safety, have a look at these references. This sections includes definitions from the five kingdoms of living things: Animals, Plants, Fungi, Protists and Monera. It will include both the official binomial nomenclature (scientific names usually in Latin) as well as regional spellings and variants. Languages of India and abroad Pali-English dictionarySource: BuddhaSasana: Concise Pali-English Dictionary kūpa : (m.) a well; a cavity.Source: Sutta: The Pali Text Society's Pali-English Dictionary Kūpa, (m.) (Vedic kūpa, orig. curvature viz. (a) interior= cavity, cp. Lat. cupa, Gr. ku/pellon cup; also Gr. ku/mbh, Sk. kumbha;— (b) exterior=heap, cp. Ags. hēap, Ohg. heap, Sk. kūpa mast). 1. a pit, a cavity: akkhi° the socket of the eye M. I, 80, 245; DhsA. 306; gūtha° a cesspool D. II, 324; Sn. 279; Pv. II, 316; Pug. 36; miḷha° a pit for evacuations Pgdp 23, 24; loma° the root of the hair, a pore of the skin DA. I, 57; Vism. 262, 360; also in na loma-kūpamattaṃ pi not even a hairroot J. I, 31; III, 55; vacca°=gūtha° Vin. II, 141, 222. As a tank or a well: J. VI, 213; VvA. 305.—2. the mast of a boat J. III, 126; Miln. 363, 378. See next. Pali is the language of the Tipiṭaka, which is the sacred canon of Theravāda Buddhism and contains much of the Buddha’s speech. Closeley related to Sanskrit, both languages are used interchangeably between religions. Marathi-English dictionarySource: DDSA: The Molesworth Marathi and English Dictionary kupā (कुपा).—m (kutupa S) A glass bottle of a particular description. 2 A fissile stone, a kind of selenite or gypsum. --- OR --- kūpa (कूप).—m (Or kupaṇa or kumpaṇa) A hedge or fence gen. of an enclosure. Pr. kūpa jara śēta khāūṃ lāgalā tara māladhanī kāya karīla? If the keeper himself devour the property, what resource is left to the owner? --- OR --- kūpa (कूप).—m (S) A dug pit. Gen. understood in the sense of Well, i. e. the common round well without steps. See the compounds andhakūpa, jalakūpa, dhānyakūpa, śuṣkakūpa, śaucakūpa.Source: DDSA: The Aryabhusan school dictionary, Marathi-English kupā (कुपा) [-ppā, -प्पा].—m A glass bottle. A state fissile. --- OR --- kūpa (कूप).—m A dug pit; a well. A hedge. Marathi is an Indo-European language having over 70 million native speakers people in (predominantly) Maharashtra India. Marathi, like many other Indo-Aryan languages, evolved from early forms of Prakrit, which itself is a subset of Sanskrit, one of the most ancient languages of the world. Sanskrit dictionarySource: DDSA: The practical Sanskrit-English dictionary Kupa (कुप).—Ved. The beam or lever of a pair of scales. Derivable forms: kupaḥ (कुपः). --- OR --- Kūpa (कूप).—[kuvanti maṇḍūkā asmin, ku-pak dīrghaśca Uṇādi-sūtra 3.27] 1) A well; कूपे पश्य पयोनिधावपि घटो गृह्णाति तुल्यं जलम् (kūpe paśya payonidhāvapi ghaṭo gṛhṇāti tulyaṃ jalam) Bhartṛhari 2.49; so नितरां नीचोऽस्मीति त्वं खेदं कूप मा कदापि कृथाः । अत्यन्तसरस- हृदयो यतः परेषां गुणग्रहीतासि (nitarāṃ nīco'smīti tvaṃ khedaṃ kūpa mā kadāpi kṛthāḥ | atyantasarasa- hṛdayo yataḥ pareṣāṃ guṇagrahītāsi) Bv.1.9.; प्रोद्दीप्ते भवने तु कूपखननं प्रत्युद्यमः कीदृशः (proddīpte bhavane tu kūpakhananaṃ pratyudyamaḥ kīdṛśaḥ) Bhartṛhari 3.88. 2) A hole, cave, hollow, cavity; as in रोमकूप (romakūpa); Śiśupālavadha 7.74. 3) A leather oil-vessel. 4) A post to which a ship is moored. 5) A tree or rock in the midst of a river. 6) A mast. 7) A pore, root; हृष्यन्ति रोमकूपाणि (hṛṣyanti romakūpāṇi) Mahābhārata (Bombay) 6.112.16; Śiśupālavadha 13.13. -pī 1 A small well. 2) A flask, bottle. 3) The navel. Derivable forms: kūpaḥ (कूपः).Source: Cologne Digital Sanskrit Dictionaries: Shabda-Sagara Sanskrit-English Dictionary (-paḥ) 1. A well. 2. A hole, a hollow. 3. A mast. 4. A tree or rock in the midst of a river. f. (-pī) 1. A small well. 2. The navel. 3. A flask, a bottle. E. ku to sound, (frogs croaking in a well, &c.) and pa Unadi affix: the vowel is made long; also kūpaka.Source: Cologne Digital Sanskrit Dictionaries: Benfey Sanskrit-English Dictionary Kūpa (कूप).—m. 1. A pit, Mahābhārata 1, 716. 2. A well, [Mānavadharmaśāstra] 4, 202.Source: Cologne Digital Sanskrit Dictionaries: Cappeller Sanskrit-English Dictionary Kupa (कुप).—[masculine] beam of a pair of scales. --- OR --- Kūpa (कूप).—[masculine] hole, cave, well.Source: Cologne Digital Sanskrit Dictionaries: Monier-Williams Sanskrit-English Dictionary 1) Kupa (कुप):—[from kup] m. the beam or lever of a pair of scales, [Śatapatha-brāhmaṇa; Kātyāyana-śrauta-sūtra] 2) [v.s. ...] field-lark, [Nighaṇṭuprakāśa] 3) Kūpa (कूप):—m. ([from] 1. ku and ap?; cf. anūpa, dvīpa), a hole, hollow, cave, [Ṛg-veda i, 105, 17; Atharva-veda; Śatapatha-brāhmaṇa] etc. 4) a pit well, [Śāṅkhāyana-gṛhya-sūtra; Manu-smṛti; Mṛcchakaṭikā] etc. 5) a post to which a boat or ship is moored, [cf. Lexicographers, esp. such as amarasiṃha, halāyudha, hemacandra, etc.] 6) a mast, [cf. Lexicographers, esp. such as amarasiṃha, halāyudha, hemacandra, etc.] 7) a tree or rock in the midst of a river, [cf. Lexicographers, esp. such as amarasiṃha, halāyudha, hemacandra, etc.] 8) a leather oil vessel, [cf. Lexicographers, esp. such as amarasiṃha, halāyudha, hemacandra, etc.] 9) = mṛn-māna, [cf. Lexicographers, esp. such as amarasiṃha, halāyudha, hemacandra, etc.]Source: Cologne Digital Sanskrit Dictionaries: Yates Sanskrit-English Dictionary Kūpa (कूप):—(paḥ) 1. m. A well; a hole; a mast; a tree or rock in a river. f. (pī) Small well; flask; navel.Source: DDSA: Paia-sadda-mahannavo; a comprehensive Prakrit Hindi dictionary (S) [Sanskrit to German] Sanskrit, also spelled संस्कृतम् (saṃskṛtam), is an ancient language of India commonly seen as the grandmother of the Indo-European language family (even English!). Closely allied with Prakrit and Pali, Sanskrit is more exhaustive in both grammar and terms and has the most extensive collection of literature in the world, greatly surpassing its sister-languages Greek and Latin. Hindi dictionarySource: DDSA: A practical Hindi-English dictionary Kūpa (कूप) [Also spelled kup]:—(nm) a well; a deep pit; —[maṃḍūka] lit. frog of a well—a know-little, one confined within narrow limits of experience and knowledge. Kannada-English dictionarySource: Alar: Kannada-English corpus Kūpa (ಕೂಪ):—[noun] a man who loves (a woman); a lover. --- OR --- 1) [noun] a depressed part or place; a hollow; a depression. 2) [noun] a hole or shaft sunk into the earth to tap an underground supply of water, gas, oil, etc; a well. 3) [noun] a tall spar or, now often, a hollow metal structure, sometimes in sections, rising vertically from the keel or deck of a vessel and used to support the sails, yards, radar and radio equipment, etc.; a mast of a vessel. 4) [noun] (fig.) a filthy condition, entanglement, etc. Kannada is a Dravidian language (as opposed to the Indo-European language family) mainly spoken in the southwestern region of India. See also (Relevant definitions) Starts with (+84): Kupa-rope, Kupabila, Kupaca, Kupacakra, Kupachakra, Kupaciya, Kupaciyamaram, Kupacupa, Kupada, Kupadanda, Kupadardura, Kupadarshaka, Kupadha, Kupadijalasthanalakshana, Kupaiyam, Kupaja, Kupajala, Kupajalodvahana, Kupaka, Kupakacchapa. Ends with (+39): Akkhikupa, Amdhakupa, Andhakupa, Ankupa, Bekupa, Carmakupa, Catuh-samudrika-kupa, Chatuh-samudrika-kupa, Dharmakupa, Ekaromakupa, Gandakupa, Gayakupa, Guthakupa, Jalakupa, Jirnakupa, Kandarpakupa, Kanthakupa, Kanyakupa, Katikupa, Kavitamritakupa. Full-text (+139): Andhakupa, Pratikupa, Romakupa, Kupanga, Kupam, Tanukupa, Mahakupa, Kupakara, Lomakupa, Kupamanduka, Kaupa, Kupaka, Mrimana, Kupika, Kupakhanaka, Kandarpakupa, Kuparajya, Upakupajalashaya, Kupadanda, Kupakha. Search found 38 books and stories containing Kupa, Kūpa, Kūpā, Kupā; (plurals include: Kupas, Kūpas, Kūpās, Kupās). You can also click to the full overview containing English textual excerpts. Below are direct links for the most relevant articles: Garga Samhita (English) (by Danavir Goswami) Verse 6.15.9 < [Chapter 15 - The Glories of Nṛga-kūpa and Gopī-bhūmi] Verses 6.15.12-14 < [Chapter 15 - The Glories of Nṛga-kūpa and Gopī-bhūmi] Verse 4.17.8 < [Chapter 17 - Prayers to Srī Yamunā] Chaitanya Bhagavata (by Bhumipati Dāsa) Verse 1.9.120 < [Chapter 9 - Nityānanda’s Childhood Pastimes and Travels to Holy Places] Verse 3.3.249 < [Chapter 3 - Mahāprabhu’s Deliverance of Sarvabhauma, Exhibition of His Six-armed Form, and Journey to Bengal] Verse 3.3.237 < [Chapter 3 - Mahāprabhu’s Deliverance of Sarvabhauma, Exhibition of His Six-armed Form, and Journey to Bengal] Vastu-shastra (4): Palace Architecture (by D. N. Shukla) Bhakti-rasamrta-sindhu (by Śrīla Rūpa Gosvāmī) Verse 3.2.11 < [Part 2 - Affection and Service (dāsya-rasa)] Verse 2.1.237 < [Part 1 - Ecstatic Excitants (vibhāva)] Rig Veda (translation and commentary) (by H. H. Wilson) Kashyapa Shilpa-shastra (study) (by K. Vidyuta)
<urn:uuid:5a597d82-4e0d-4ee4-86f4-e78ebdb969fe>
CC-MAIN-2023-50
https://www.wisdomlib.org/definition/kupa
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.840386
7,408
3.453125
3
Schaff, Philip. History of the Christian Church (The Complete Eight Volumes in One). Amazon Kindle Edition, 2014. Volume 2, Ante-Nicene Christianity A.D. 100-325, “Chapter 8. Christian life in Contrast with Pagan Corruption.” Sections 88-103, Loc. 16158-17158. § 99. The Christian Family. Schaff asserts that the Christian faith considered family very differently from the world at large during late antiquity (Schaff 2014, Loc. 16825). Likewise the private virtues of Christianity can lead to public virtue. Schaff considers the Christian view of marriage to be so radically different than that of the broader society that celibacy may have been attractive to many. It could well have seemed easier than such a new marriage culture (Schaff 2014, Loc. 16830). Ideas such as chastity and fidelity were significant departures from Roman ideals. Schaff gives numerous examples of the honor accorded to women (Schaff 2014, Loc. 16845). At the same time, though, Schaff sees the elevation of celibacy to be excessive (Schaff 2014, Loc. 16850). This led to a devaluation of marriage. In the few writings we do have about marriage, the relationship of respect and a lifestyle of mutual prayer are seen as very important. The Christian unity in the marriage is of paramount importance (Schaff 2014, Loc. 16865). A religious solemnization of the marriage was common at an early time (Schaff 2014, Loc. 16875). Marriage between a Christian and an unbeliever was “unanimously condemned by the voice of the church in argreement with the Mosaic legislation, unless formed before conversion” (Schaff 2014, Loc. 16884). Remarriage, including of widows, was generally prohibited (Schaff 2014, Loc. 16894). Again, Schaff finds the elevation of celibacy to erode the dignity of marriage. Schaff notes that among Christians children were considered to have great dignity and value. It was not appropriate for a parent to act as a tyrant, to abuse, or to expose children (Schaff 2014, Loc. 16923). These principles also moved many Christians to care for poor and orphaned children.
<urn:uuid:636307ca-68c9-4552-93a0-4f5316febe31>
CC-MAIN-2023-50
https://www.wittenbergcomo.com/blog/the-christian-family-in-the-ante-nicene-period
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.941372
466
2.765625
3
Bergevin-Williams & Old Lowden Pipeline and DiversionNew BW/OL Diversion and screen. Bergevin-Williams & Old Lowden Pipeline and DiversionBergevin Williams old push-up gravel dam, a fish barrier when under low flow conditions. Bergevin-Williams & Old Lowden Pipeline and DiversionSteelhead spawning in a spring creek tributary to the Walla Walla River. Bergevin-Williams & Old Lowden Pipeline and DiversionPouring the base pad for the diversion structure. Bergevin-Williams & Old Lowden Pipeline and DiversionPlacement of the HDPE pipe in the trench going under the WW river. Bergevin-Williams & Old Lowden Pipeline and Diversion26" fusion-welded HDPE pipe staged to go under Hwy 12. Bergevin-Williams & Old Lowden Pipeline and DiversionAir-blast system cleaning debris off the new fish-friendly screen system. Some of the water rights for farms served by the Bergevin-Williams and Old Lowden (BW-OL) ditches date back to 1870 and are among the oldest in the region. These serve very productive farms that benefit the entire valley. So when Mid-Columbia Steelhead were listed as threatened under the Endangered Species Act, these irrigators readily accepted help from the Conservation District and the Washington Department of Fish and Wildlife in changing their operations. Read the Final Report – BW-OL Pipeline and Diversion for complete details on this project. Historically both Old Lowden and Bergevin-Williams irrigators had built gravel push up dams to divert water from the river. But changes in flow conditions sometimes led to fish passage obstructions and the possibility of fish stranding. After a new pneumatic dam and fish ladder were constructed for nearby irrigators (Lowden 2 and Garden City) it became possible to consider consolidating the BW-OL diversions and moving them to that site, thus eliminating the two gravel push-up dams. In addition, talks began of possibly piping the old inefficient earthen irrigation ditches. Water saved through increased efficiency could be set aside in the Trust Water Rights Program and left in the river for fish. The irrigators of the BW-OL ditches and the Conservation District began plans to build a consolidated irrigation diversion and to pipe the open ditches. Bonneville Power Administration provided funding to construct the diversion as it would eliminate two potential fish passage barriers. And, with an estimated 4.5 cubic feet per second of potential water savings, the Washington Dept. of Ecology (WA-DOE) agreed to provide funding to pipe the Bergevin-William/Old Lowden ditches. Farmers would benefit by having an updated, reliable irrigation water delivery system that allowed them to manage their water more efficiently and the public would benefit from improved fish passage and flows. The project was done in two phases. Installing the diversion came first, with the diversion and fish screen installed on the south side of the Walla Walla River at River Mile (RM) 31. The new diversion structure used the existing pneumatic dam serving the Lowden 2/Garden City ditches. A 213-foot long pipeline of 28-inch high density polyethylene (HDPE) fusion-welded pipe was installed from the new diversion structure to the north side of the Walla Walla River where it connected to the new piped irrigation water conveyance system. The second phase was the pipeline itself, consisting of approximately 9.6 miles of piping to serve 1,840 acres, with 18 new or modified pumping stations and 11 metering stations. The project saves an estimated 2,405 acre-feet of water. Both phases of the project faced some unique hurdles. For example, the BW-OL gravel push-up dams were located downstream of the pneumatic dam and fish ladder. Moving the diversion upstream, even to save water and benefit fish, meant water was taken out of the river upstream, reducing flows in a small section of the river. Regulators had to be convinced that the benefits for endangered fish species far outweighed this minor negative impact. Construction of the pipeline needed to be done during the winter months when irrigation was at its lowest point, leading to construction taking place in some of the wettest and coldest times of the year. But these and other hurdles were overcome, and today the BW-OL diversion and pipeline are in full operation, providing irrigation water to over 1800 acres of highly productive cropland and saving over 2,400 acre-feet of water each year, allowing for continued irrigation and water for fish. It is an impressive project testifying to the will of many parties, each with different priorities and objectives, coming together to create a system that benefits everyone. For the full story, with history, costs, and construction details, read the Final Report – BW-OL Pipeline and Diversion.
<urn:uuid:4d81abaf-480b-4273-851f-e4c3ecfb795d>
CC-MAIN-2023-50
https://www.wwccd.net/district-projects/bwol-pipeline-and-diversion/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.930888
1,022
2.90625
3
The human body is an excellent machine and the way it works and how it does it is a little bit weird but also wonderful. An old saying goes, “words hurt more than actions,” and that is because our tongues are the strongest muscles in our bodies. Over your lifespan, you would have produced enough saliva to fill a swimming pool twice over. So think of that next time you’re drooling over your favorite meal. Our hearing decreases when we overeat. Bet you didn’t know that! Like fingerprints, every human has a unique tongue print. And more germs are transferred shaking hands than kissing. Namaste! Our workhorse heart pumps blood and transports oxygen to all our cells, our skin renews itself every 27 days and our stomach produces acid powerful enough to dissolve razor blades – just for those interested! Among all these amazing weird and wonderful things our bodies do, there is one thing that sets us apart from all other living organisms. Next time you’re watching the tear-jerker “The Notebook” and you cry a little when Noah is reading to his dying wife (come on, we’ve all been there), remember this, we are the only animals to produce emotional tears. How special and unique is that, right? We all may be very different in our own unique ways but there are many fascinating biological similarities that we all share in common. Here is an interesting infographic by Vapester which features 30 weird and fascinating health & body facts. 30 weird and wonderful facts about our body
<urn:uuid:9560a86b-d9e6-4eec-9535-890f3854077b>
CC-MAIN-2023-50
https://yourmedguide.com/2018/01/30-weird-wonderful-facts-body.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00699.warc.gz
en
0.935338
326
2.546875
3