text
stringlengths
174
640k
id
stringlengths
47
47
dump
stringclasses
15 values
url
stringlengths
14
1.94k
file_path
stringlengths
125
139
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
49
156k
score
float64
2.52
5.34
int_score
int64
3
5
Chondroitin sulfate consists of repeating chains of molecules called glycosaminoglycans (GAGs). Chondroitin sulfate is a major constituent of cartilage, providing structure, holding water and nutrients, and allowing other molecules to move through cartilage—an important property, as there is no blood supply to cartilage. Where is it found? The only significant food source of chondroitin sulfate is animal cartilage. Chondroitin sulfate has been used in connection with the following conditions (refer to the individual health concern for complete information): Who is likely to be deficient? Because the body makes chondroitin, the possibility of a dietary deficiency remains uncertain. Nevertheless, chondroitin sulfate may be reduced in joint cartilage affected by osteoarthritis and possibly other forms of How much is usually taken? For atherosclerosis, researchers have sometimes started therapy using very high amounts, such as 5 grams twice per day with meals, lowering the amount to 500 mg three times per day after a few months. Before taking such high amounts, people should consult a doctor. For osteoarthritis, a typical level is 400 mg three times per day. Oral chondroitin sulfate is rapidly absorbed in humans when it is dissolved in water prior to ingestion. Approximately 12% of chondroitin sulfate taken by mouth becomes available to the joint tissues from the Are there any side effects or interactions? Nausea may occur at intakes greater than 10 grams per day. No other adverse effects have One doctor has raised a concern that chondroitin sulfate should not be used by men with prostate cancer. This concern is based upon two studies. In one, the concentration of chondroitin sulfate was found to be higher in cancerous prostate tissue as compared to normal prostate tissue.2 In the other study, it was shown that higher concentrations of chondroitin sulfate in the tissue surrounding a cancerous prostate tumor predict a higher rate of recurrence of the cancer after surgery.3 However, no studies to date have addressed the question of whether taking chondroitin sulfate supplements could promote the development of prostate cancer. Simply because a substance is present in or around cancerous tissue does not by itself suggest that that substance is causing the cancer. For example, calcium is a component of atherosclerotic plaques that harden the arteries; however, there is no evidence that taking calcium supplements causes atherosclerosis. To provide meaningful information, further studies would need to track the incidence of prostate cancer in men taking chondroitin supplements. Until then, most nutritionally-oriented doctors remain unconcerned about this issue. It is not known whether taking glucosamine sulfate and chondroitin sulfate in combination is a more effective treatment for osteoarthritis than taking either one by itself. At the time of writing, there were no well-known drug interactions with chondroitin sulfate. 1. Ronca F, Palmieri L, Panicucci P, Ronca G. Anti-inflammatory activity of chondroitin sulfate. Osteoarthritis Cartilage 1998;6(Supplement 2. De Klerk DP, Lee DV, Human HJ. Glycosaminoglycans of human prostatic cancer. J Urol 1984;131:1008–12. 3. Ricciardelli C, Quinn DI, Raymond WA, et al. Elevated levels of peritumoral chondroitin sulfate are predictive of poor prognosis in patients treated by radical prostatectomy for early-stage prostate cancer. Cancer Res
<urn:uuid:9fef0930-8fc0-4e9d-8954-f3740b7e4e53>
CC-MAIN-2013-20
http://truestarhealth.com/Notes/2828008.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710006682/warc/CC-MAIN-20130516131326-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.8852
799
3.453125
3
Cambrian predator had killer eyes View to a kill A fearsome predator that swam in the Cambrian oceans was in fact a metre-long arthropod with killer vision, say researchers. Palaeontologist Dr John Paterson, from the University of New England, and colleagues, have discovered the fossilised remains of compound eyes from a creature called anomalocaris. "The fact that each eye in anomalocaris would have had over 16,000 lenses, means it would have very, very good resolution," says Paterson, whose work is published today in the journal Nature. "When you consider that a modern housefly, for example, has about 3000 lenses, it's pretty impressive that an animal half a billion years old already has remarkable vision like this." Around 500 million years ago, during the Cambrian, large alien-like creatures began to resemble modern animals, says Paterson. "But you still had the odd freak swimming around," he says, referring to the metre-long free-swimming anomalocaris. "It's an animal that's on its way to becoming an arthropod from an evolutionary point of view," says Paterson. The creature would have propelled itself through the water by moving flaps down the length of its body in a wave-like pattern, he says. It had a soft shrimp-like exoskeleton and fierce grasping claws and would have dined on soft-bodied organisms such as worms. But anomalocaris has presented a bit of puzzle to scientists because while it looked like it might be an arthropod, it was missing certain attributes. Arthropods include animals with jointed legs such as insects, spiders, crustaceans and millipedes. "But when you look at anomalocaris, it doesn't actually have any jointed legs," says Paterson. Now, the discovery of fossilised compound eyes belonging to the animal has confirmed it is indeed an arthropod. "Compound eyes are actually a definitive arthropod characteristic or trait," says Paterson. The fossilised eyes were discovered alongside remains of the grasping claws and the body flaps in shale at Emu Bay on the northern coast of Kangaroo Island, off South Australia. The soft tissue of the compound eyes were slowly replaced by a mineral called pyrite in a low oxygen sediment, says Paterson. The discovery supports the idea that compound eyes evolved very early on in arthropod evolution, before the evolution of jointed legs or hardened exoskeletons. The surprisingly sophisticated eyes of anomalocaris are rivalled only by modern dragonflies, which can have up to about 28,000 lenses in each eye, says Patterson. "Dragonflies are known for their exceptional vision," he says. Lenses in a compound eye can be likened to pixels on a computer screen and the more lenses you have the better the resolution. The small size of the lenses in the anomalocaris eyes suggests the animal would have lived in well-lit waters and had a major advantage over its prey. "The little that we do know about the contemporaries of anomalocaris, they either had fairly poor eyesight or they were completely blind," says Paterson. He says the presence of anomalocaris would have driven the development of protective adaptations in prey animals, and in turn, counter adaptations in predators. Such an escalatory 'arms race' would have seen, for example, the evolution of such adaptations in prey as shells, camouflage and burrowing into sediments. Paterson now hopes to find the remains of even more Cambrian creatures in the Emu Bay Shale. "It would be great to find a hybrid that looked like anomalocaris but it had walking legs. That would be a beautiful missing link," he says.
<urn:uuid:173273e4-382f-474a-b8ea-b1937062a3bb>
CC-MAIN-2013-20
http://www.abc.net.au/science/articles/2011/12/08/3385661.htm?site=science&topic=latest&listaction=unsubscribe
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710006682/warc/CC-MAIN-20130516131326-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.971854
789
3.171875
3
A couple of months or so ago, I began talking about SQL functions and what they're used for. This article picks up where I left off. It defines the two types of functions, and begins to explain them in great detail. Poor Arnold; in addition to being vertically challenged, he was also beset with frequent ear infections, and never knew what his brother Willis was talking about. Fortunately for him, Mr. Drummond was looted up, and all Arnold really needed to understand was that money talks. And when Arnold wanted to count the oodles of money he would have once old man Drummond kicked the bucket, well...he could have used Aggregate functions to help with that. An aggregate function helps summarize large volumes (or even small ones, really) of data. If you have a collection of phone numbers you've collected and want to know how many you have (let's face it, you're a programmer, so you don't) or you want to get a count on the number of days you've spent alone and eating a giant bag of Doritos, you could do just that. (Just as a side note: the word "Doritos" is actually in the built-in spell check of Microsoft Word). Below is a list of some aggregate functions and what they can do: What it Does Gives you the average value of the column Counts the number of rows with data in a column Counts the number of selected rows Gives the value of the first record in a specified field Gives the value of the last record in a specified field Gives the maximum value in a column Gives the minimum value in a column Sums up the value of a column I don't have to tell you what average means; you've been that way your entire life. I mean come on, you're no James Marsden. And if you are, please don't sue me for using your name. The average function in SQL returns the average value of a given column. Let's say we have a table that lists a person's name, age, and salary and we want to see the average age of the employees listed in the database. Want to follow along? Okay, go ahead and create a table named Employees with the data below: King Kong Wong Clearly this company has an age discrimination suit waiting to happen. But never mind that for now. I think our table lists a realistic situation, don't you? Coincidentally, all names are fictitious, and any resemblance to real names is purely coincidental. Here's the code for the average age: Select AVG(Age) from Employees This would result in the answer: 45.75. Now let's say you are gearing up for that age discrimination lawsuit and need some more data to back you up. Let's say you want to see the average salary of anyone over 30 years old: Select AVG(Salary) From Employees WHERE Age>30 Your answer would be $31,000. You might also wish to see the average salary of those under thirty. To do that, simply reverse the criteria: Select AVG(Salary) From Employees WHERE Age<30 Which results in: $90,000. A clear case for age discrimination.
<urn:uuid:a3486fd2-46ef-4111-a3d9-9b592c351b8e>
CC-MAIN-2013-20
http://www.devshed.com/c/a/BrainDump/SQL-Functioning-in-the-Real-World/1/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710006682/warc/CC-MAIN-20130516131326-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.938403
679
2.78125
3
16. Granitic Intrusion, Chanaral, Chile The light-toned circular area at the right center of the photograph is a Paleozoic granodiorite exposed near the Pacific coast of Chile at Chanaral. The Humboldt current flowing northward along the coast gives rise to cool onshore breezes. As these move overland, they warm up, and are capable of carrying more water vapor; thus they have a very drying effect and are responsible for the long thin Atacama Desert, which extends all the way along the coast of South America from Central Chile to Ecuador. The desert is one of the driest in the world, and the absence of soil or vegetation makes it ideal for investigation using satellite remote sensing techniques. The pale tones of the intrusion contrast sharply with the darker tones of the metamorphic basement, enabling rapid mapping. A swarm of mafic dikes cuts the intrusion, and some of the larger dikes, with northeast trend, are just visible. The valley just south of the intrusion contains a stream draining from the large porphyry copper mine at El Salvador. The stream and the beach at Chanaral on which it debouches are grossly polluted with mineral residues. STS-8, August-September 1983. Picture #8-50-1798.
<urn:uuid:77afc505-9f76-48c5-bf38-4b198f81ca90>
CC-MAIN-2013-20
http://www.lpi.usra.edu/publications/slidesets/geology/sgeo/slide_16.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699273641/warc/CC-MAIN-20130516101433-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.906747
272
3.5
4
It took quite a bit of convincing before Mey Som agreed to be the first Cambodian to try the System of Rice Intensification (SRI) in 2000. But in the end, Som relented and, on a small plot of land, planted rice in a way that went against all his experience and instincts. Following the advice of the Cambodian Center for Study and Development in Agriculture, or CEDAC, Som abandoned his use of chemicals in favor of organic fertilizer. He planted fewer seeds and spaced them widely apart. He kept the soil moist—without flooding it. He transplanted the rice seedlings while they were young and took the time to weed. Halfway through that first season, Som noticed his rice plants were growing bigger and stronger. "The same seeds used to produce plants that came up to my knees," he said. "Now they reach above my head." Since Som's experiment, CEDAC has trained more than 60,000 Cambodian farmers to modify their farming techniques to correspond with SRI. Like farmers in Madagascar, China, and Bangladesh, they have increased their yields by 50 to 100 percent, and sometimes more. Yang Saing Koma, the president of CEDAC, better known as "Dr. Koma," calls it the "Root Revolution," and eventually he wants the majority of Cambodia's rice farmers to have joined in. "It's just a question of changing your attitude and thinking," he said. "Conventional agriculture just looks at the plant above ground. With SRI, you look at the roots—big, strong roots." A new method takes off Using grants from Oxfam America totaling about $222,000 since 2003, CEDAC has used SRI to build financial and food security in one of Southeast Asia's poorest countries. More than 70 percent of the workforce depends on agriculture to make a living—most of them, rice farmers. Dr. Koma says it's like a metaphor for human development. If you give people enough room to grow, they flourish. If you plant seedlings far enough apart, the seedlings sprout several stalks and the stalks produce hundreds of grains of rice. He first learned about SRI after reading a magazine article chronicling the experiences of farmers in Madagascar. Jesuit priest Father Henri de Laulanié spent 20 years working with Malagasy farmers, refining a set of practices that required less land, seed, water, and money. At first, the Cambodian farmers who are approached by CEDAC about trying SRI had trouble believing what they were hearing. Some even ridiculed the farmers who tried the new method. When So Tith began planting through SRI three years ago, his neighbors saw him pressing fewer seeds into the soil and pitied him, thinking he couldn't afford to buy more. "They offered to give me some of their seed," he said. Even after Tith's new stalks began to grow, his neighbors wouldn't attribute their sturdiness to SRI. They attributed it to "trickery" instead. But Tith didn't mind, for in a couple years these same doubters would end up changing their practices, and more important, their minds. Accustomed to using oxen and carts to take water to their fields, they now fill jugs and carry them on their shoulders to small plots of land near their homes. They plant during the wet and dry seasons, doubling their production and incomes. "Daily life is better than before," said Sorn Ton, another rice farmer who adopted SRI. "When we used to farm, there wasn't enough rice to support the family for the whole year. We had to borrow money to buy rice from others in the village. Now my family has enough to eat." The farmers use the extra profits to invest in more rice seed, send their children to school, and participate in the simple joys of everyday life—the religious and family ceremonies, the weddings and festivals. All this from a little bit of creative thinking informed by the people who work the land themselves. "Throughout Cambodia, the farmers who adopted SRI—they have more self confidence. They see what they can get from what they do," Dr. Koma said.
<urn:uuid:ea266eaf-7e12-4233-b523-15c37d3e800b>
CC-MAIN-2013-20
http://www.oxfamamerica.org/articles/feeding-a-nation
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699273641/warc/CC-MAIN-20130516101433-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.980812
874
2.515625
3
May 16, 2002 A region in the western tropical Pacific Ocean may help scientists understand how Venus lost all of its water and became a 900-degree inferno. The study of this local phenomenon by NASA scientists also should help researchers understand what conditions on Earth might lead to a similar fate here. The phenomenon, called the ‘runaway greenhouse’ effect, occurs when a planet absorbs more energy from the sun than it can radiate back to space. Under these circumstances, the hotter the surface temperature gets, the faster it warms up. Scientists detect the signature of a runaway greenhouse when planetary heat loss begins to drop as surface temperature rises. Only one area on Earth – the western Pacific ‘warm pool’ just northeast of Australia – exhibits this signature. Because the warm pool covers only a small fraction of the Earth’s surface, the Earth as a whole never actually ‘runs away.’ However, scientists believe Venus did experience a global runaway greenhouse effect about 3 billion to 4 billion years ago. "Soon after the planets were formed 4.5 billion years ago, Earth, Venus and Mars probably all had water. How did Earth manage to hold onto all of its water, while Venus apparently lost all of its water?" asked Maura Rabbette, Earth and planetary scientist at NASA Ames Research Center in California’s Silicon Valley. "We have extensive earth science data to help address that question." Rabbette and her co-investigators from NASA Ames, Christopher McKay, Peter Pilewskie and Richard Young, used atmospheric conditions above the Pacific Ocean, including data recorded by NASA’s Earth Observing System of satellites, to create a computer model of the runaway greenhouse effect. They determined that water vapor high in the atmosphere produced the local signature of a runaway greenhouse. At sea surface temperatures above 80 F (27 C), evaporation loads the atmosphere with a critical amount of water vapor, one of the most efficient greenhouse gases. Water vapor allows solar radiation from the sun to pass through, but it absorbs a large portion of the infrared radiation coming from the Earth. If enough water vapor enters the troposphere, the weather layer of the atmosphere, it will trap thermal energy coming from the Earth, increasing the sea surface temperature even further. The effect should result in a chain reaction loop where sea surface temperature increases, leading to increased atmospheric water vapor that leads to more trapped thermal energy. This would cause the temperature increase to ‘run away,’ causing more and more water loss through evaporation from the ocean. Luckily for Earth, sea surface temperatures never reach more than about 87 F (30.5 C), and so the runaway phenomenon does not occur. "It’s very intriguing. What is limiting this effect over the warm pool of the Pacific?" asked Young, a planetary scientist. He suggests that cloud cover may affect how much energy reaches or escapes Earth, or that the ocean and atmosphere may transport trapped energy away from the local hotspot. "If we can model the outgoing energy flux, then maybe we can begin to understand what limits sea surface temperature on Earth," he said. The Ames researchers are not the first to study the phenomenon, but no consensus has been reached regarding the energy turnover or the limitation of sea surface temperature. Rabbette analyzed clear-sky data above the tropical Pacific from March 2000 to July 2001. She determined that water vapor above 5 kilometers (3 miles) altitude in the atmosphere contributes significantly to the runaway greenhouse signature. She found that at 9 kilometers (5.6 miles) above the Pacific warm pool, the relative humidity in the atmosphere can be greater than 70 percent - more than three times the normal range. In nearby regions of the Pacific where the sea surface temperature is just a few degrees cooler, the atmospheric relative humidity is only 20 percent. These drier regions of the neighboring atmosphere may contribute to stabilizing the local runaway greenhouse effect, Rabbette said. It is important to note that the Ames team uses real climate information such as relative humidity and temperature–not hypothetical numbers–in the Moderate Resolution Atmospheric Radiative Transfer, or MODTRAN, modeling program. The program calculates how much energy escapes back to space from the top of Earth’s atmosphere. The researchers plan to experiment with the model to test the runaway greenhouse signature’s sensitivity to climate conditions. By varying the abundance of other greenhouse gases such as carbon dioxide and by adding clouds in the model, they will see the overall effect on the outgoing energy. The model may help researchers uncover why Venus experienced a complete runaway greenhouse and lost its water over a period of several hundred million to a billion years. The research may also help determine which planets in the so-called ‘habitable zone’ of a solar system might lack water, an essential ingredient for life as we know it. Other social bookmarking and sharing tools: Note: Materials may be edited for content and length. For further information, please contact the source cited above. Note: If no author is given, the source is cited instead.
<urn:uuid:3fb482ac-1425-4f4f-86d5-2eff0e862e7f>
CC-MAIN-2013-20
http://www.sciencedaily.com/releases/2002/05/020516080752.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699273641/warc/CC-MAIN-20130516101433-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.909667
1,032
4.1875
4
Since 1976, every U.S. president has designated February as Black History Month. From slavery to civil rights, and science to music, the following books for young readers honor the accomplishments of African Americans. On the Radar: Top Picks from the Editors at Junior Library Guild: K-8 Books on African Americans Who Inspire Show Way. DVD. 12 min. Weston Woods. 2012. ISBN 978-0-545-47811-3. 59.95. CD, ISBN 978-0-545-47810-6: $12.95; CD with hardcover book, ISBN 978-0545-47827-4: $29.95. Gr 2-5–A Show Way was a quilt that had messages stitched into it showing the family’s journey North to freedom, offering hope and a guide for slaves in the South. That theme of “leading the way” is a thread running through Jacqueline Woodson’s carefully woven story (Putnam, 2005). Soonie’s great-grandma was only a child when she was sold away [...] BOLDEN, Tonya. Emancipation Proclamation: Lincoln and the Dawn of Liberty. 120p. bibliog. chron. glossary. illus. index. notes. photos. reprods. Abrams. Jan. 2013. RTE $24.95. ISBN 978-1-4197-0390-4. LC 2012000845. Gr 5-9–After a dramatic opening description of abolitionists waiting for word that the Emancipation Proclamation had been signed, this title reviews the events that led up to the Civil War, examines Lincoln’s reasons for writing it, and details the role of abolitionists. Bolden makes excellent use of primary sources; the pages are filled [...] The Freedom Maze. By Delia Sherman. 8 CDs. 8:19 hrs. Prod. by Listening Library. Dist. by Listening Library/Books on Tape. 2012. ISBN 978-0-499-01463-9. $55. Gr 5-8–Sophie’s mother drops her off to spend the summer at her grandmother’s house in the Louisiana Bayou. Once a prolific sugar plantation, the property is derelict and overgrown. In the garden, Sophie discovers a maze, now in ruins, much like Sophie’s life since her parents’ divorce. It’s 1960, and the stigma of the divorce, combined with [...] Baseball season may be coming to an end, but a true fan’s enthusiasm for the sport never wanes. Reason enough to consider two new digital products for your iPad: Ryan Woodward’s Bottom of the Ninth and The Negro Leagues Baseball Museum. The first is an animated graphic novel, the second, a reference guide. Here’s what our reviewers had to say about these releases. My Hands Sing the Blues: Romare Bearden’s Childhood Journey. By Jeanne Walker Harvey. cassette or CD. 15 min. Recorded Books. 2012. cassette: ISBN 978-1-4640-0209-0, CD: ISBN 978-1-4640-0206-9. $15.75; hardcover book, ISBN 978-0-7614-5810-4: $17.99. K-Gr 3–In a first-person narrative that incorporates some of artist Romare Bearden’s phrases and ideas, and using his famous painting “Watching the Good Trains Go By” as her inspiration, Jeanne Walker Harvey gives voice to the history and experiences that inspired his famous collages. Born in North Carolina, [...]
<urn:uuid:7b7e47d8-9a0d-4eae-b06e-41682ffea156>
CC-MAIN-2013-20
http://www.slj.com/tag/african-american/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699273641/warc/CC-MAIN-20130516101433-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.847906
773
3.328125
3
Haga Palace. Drawing by Princess Eugenia (daughter of Oscar I and Queen Josefina). Gustav III's palace building - the ruin The history of Haga differs somewhat to that of the other Royal retreats. At Drottningholm, for example, the palace was built first and then surrounded by extensive grounds. At Haga, the original feature is the park, which over time has gradually been joined by buildings of various different characters. Gustav III's dream palace was never completed and today it is known as the ruin, with only the cellar and foundations finished. Gustav III's Pavilion. Photo: Charless Hammarsten, IBL. Gustav III's Pavilion Gustav III's Pavilion (originally the King's Pavilion) could be regarded as The King's private residence at Haga and was intended to complement the official palace that was never finished. Today this pavilion is an excellent example of Gustavian architecture and interiors. Haga Palace Gustav III's Pavilion in Haga Park was often used by Gustav III's son and successor, Gustav IV Adolf. Gustav IV Adolf ordered the construction of a second pavilion close by for his wife, Queen Fredrika, and their children. This building, which is now called Haga Palace, was erected between the years 1802 and 1805 according to plans drawn by the architect Carl Christoffer Gjörwell. Haga is slightly different in this respect as well. The palace was constructed as a home at Haga for the Queen and her children, and not as an official residence. It is also around the time of Gustav IV Adolf and his family that we get a first glimpse of family life in the modern sense. Italian villa style In terms of its style, the palace building is most like an Italian villa, where family life is focused around the central living room. The white colouring and the temple-like design of the central part, with its temple gables and classic columns, emphasise the Italian nature of the building Haga Palace and the Bernadotte dynasty Haga Palace has been a much-used and loved home for the Bernadotte dynasty. Oskar I and his family often stayed at Haga and for several years the palace was occupied by King Oskar's son, the 'song Prince' Gustaf. Prince Gustaf's youngest brother August and his wife Theresia lived at Haga for many years, and the first interior photographs from their home were taken during their time there in the late 19th century. These images convey a feeling of homeliness according to the ideal that was characteristic of the end of the 19th century. The Green salon at Haga Palace. Photo: the Royal Court The Haga princesses In 1932, heir presumptive Prince Gustaf Adolf married Princess Sibylla of Sachsen Coburg and Gotha and Haga Palace was renovated in order to function as their family home. The building underwent a transformation, which meant that the interiors reflected the more functional style of the time rather than the historical heritage of the early 19th century. Family photographs from Haga that were published in books and magazines, and perhaps even more so shown on cinema newsreels, spread the image of a royal family idyll at Haga. Guest house for Swedish government Haga Palace functioned as the Swedish government's guest house for distinguished visitors between 1964 and 2009. In 2009, the government transferred the royal right of disposal to Haga Palace back to H.M. The King and the palace was placed at the disposal of the Crown Princess Couple for use as a home following the wedding on 19 June, 2010. For further information about Haga Palace and Haga in general, see 'Haga: a Royal Cultural Heritage', from the book series, 'The Royal Palaces', published 2010.
<urn:uuid:a9f0e20e-8f58-4951-b1e7-478068b1acad>
CC-MAIN-2013-20
http://www.kungahuset.se/royalcourt/wedding/hagapalace.4.1a6f639212652d9b15a800015219.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703298047/warc/CC-MAIN-20130516112138-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973334
792
2.53125
3
This is the second part of two posts examining how North Korea fell behind South Korea. The previous part can be found here. As the previous post found, for several decades North Korea kept up with South Korea. Then, during the mid-1970s, the country started falling behind. Ever since then the gap between the two countries has widened. This post will explore several factors behind what caused North Korea to fall behind. There seem to be three main causes: the failed ideology of juche (self-reliance), the end of Soviet aid, and Kim Jong-Il’s incompetent rule. If one looks at Gapminder’s graphic, North Korea and South Korea are neck-and-neck until the mid-1970s: Then North Korea falls behind: What caused this? Well, in 1972 North Korea adopted the ideology of juche into the constitution. Juche stands for self-reliance. There’s a lot of fancy Marxist philosophical complexity behind the idea, but in its essence it seems to be basically a fancy form of protectionism. Juche was very harmful to the North Korean economy. Here is North Korea before the official adaptation of juche: As is evident, North Korea was progressing during this period. This is not to say that juche wasn’t part of the state’s ideology in these years. Rather, it seems to have played less of a role. A description on this website provides a good description of the progress during this time: The 1954-56 three year plan repaired the massive damage caused by the war and brought industrial production back to prewar levels. This was followed by the five- year plan of 1957-61 and the seven year plan of 1961-67. These plans brought about further growth in industrial production and substantial development of state infrastructure. By the 1960s North Korea was the second most industrialized nation in East Asia, trailing only Japan. While a number of internal limitations appeared, such as in the production of consumer goods, the national standard of living was considered by many third-world nations as an alternative to the capitalist model of development sponsored by the United States. Building upon the ruins left by the Korean War, the North Korean economy by the late 1960s provided its people with medical care, universal education, adequate caloric intake, and livable housing. Here is what happens after the official adoption of juche: The website continues with a description of North Korea’s economic decline. I will quote the discussion in full because it’s quite comprehensive: In the 1970s the expansion of North Korea’s economy, with the accompanying rise in living standards, came to an end and a few decades later went into reverse. A huge increase in the price of oil following the oil shock of 1974 hurt the economies of countries throughout the world, North Korea among them. North Korea has no oil of its own, and it had few export commodities of interest to the west. Compounding this was a decision to borrow foreign capital and invest simultaneously in the military and mining industries. North Korea’s desire to gain as much independence as it could from China and Russia prompted the expansion of its military power. They believed such expenditures could be covered by foreign borrowing and increased sales of its minerals in the international market. North Korea invested heavily in its mining industries and purchased a large quantity of extractive machinery and tools from abroad. However, soon after making these investments, the international prices of for many of these minerals fell, leaving North Korea with large debts and an inability to pay off the debts and provide a high level of social welfare to its people. Adding to the above, the centrally planned economy, which emphasized heavy industry, had reached the limits of its productive potential in North Korea. Juche repeated demands that North Koreans learn to build and innovate domestically had run its course as had the ability of North Koreans to keep technological pace with other industrialized nations. By the mid to late-1970s some parts of the capitalist world, including South Korea, were advancing into new phases of technology and economic development and phasing out the coal-and-steel-based economies of the earlier period. Kim ll-sung, trapped in an ideology that had once been highly successful, was unable to respond effectively to the challenge of an increasingly prosperous and well-armed South Korea, which undermined the legitimacy of his own regime. Having failed at their earlier attempt to turn to the market and conduct market-economy reforms such as those carried out in China by Deng Xiaoping, Kim opted for continued ideological purity. The DPRK by 1980 was faced with the choice of either repaying its international loans, or continuing its support of social welfare for its people. Given the ideals of Juche, North Korea chose to default on its loans, and by late 1980s its industrial output was declining. One should note that the images above are models of North Korea’s economic path rather than based on North Korean statistics. Since North Korea doesn’t reveal its GDP, people have to make educated guesses. The people on Gapminder put North Korea as slightly wealthier than South Korea in 1944 and then modeled equal economic growth rates until the mid-1970s. At that point they put 0% GDP per capital growth to model North Korea’s stagnation during that period. Finally, they use slightly more accurate estimates after the fall of the Soviet Union to model North Korea’s famine and its most recent years. Nevertheless, these models are based off what happened in real life. It’s undeniable that North Korea was stagnating during the late ’70s and ’80s. It’s also undeniable that there was a famine during the late ’90s. So while the graphic isn’t perfect, it’s a decent representation of reality. The End of Soviet Aid Juche seems to have been the main turning point in North Korean economic history. Nevertheless, it’s worth noting that there are in fact two “parts” of North Korean economic decline. The first part, during the late ’70s and 80s, is stagnation – when North Korea doesn’t go forward but doesn’t go backwards. The second part starts in the ’90s, when North Korea actually starts going backwards. What caused this? Well, for all of its economic history North Korea depended extensively on communist aid. The Soviets were determined to prove that their system was superior and, like the Americans, gave lots of aid to their allies. Eventually it turned out that their system was in fact not superior, and by the end the Soviet Union couldn’t really afford to give out that aid. In 1991 the Soviet Union collapsed and all Soviet aid withdrew. This hit North Korea hard: In fact, it eventually created a famine. This graphic shows North Korea after the fall of the Soviet Union. This is the second part of the country’s economic decline, when it actually starts going backwards. Soviet aid was particularly important because the Soviet Union sold North Korea oil at low prices. North Korea’s inefficient economy and agricultural system depended badly on petroleum, but it couldn’t afford to buy petroleum at market prices. When the Soviets stopped giving North Korea oil, North Korea collapsed. Here’s a comparison with South Korea: Kim Jong-Il’s rule was incompetent and terrible for North Korea. Let’s take a look at North Korea under his father Kim Il-sung, until his death in 1994. We see progress throughout most of Kim Il-sung’s rule. During his final years, however, stagnation and finally decline sets in. Nevertheless, one could say that Kim Il-sung did good for North Korea. What happens under Kim Jong-Il? Decline. Indeed, there’s a startling coincidence between Kim Jong-Il’s path to power and North Korea’s economic decline. Kim Jong-Il began taking power during the 1980s. During that time North Korea is well into stagnation. He takes over the armed forces in 1991. North Korea then begins going backwards. His father dies in 1994, leaving him in absolute control. North Korea then suffers a famine from 1994 to 1998. Here’s North Korea and South Korea during Kim Jong-Il’s rule: It seems that there were three main events that caused North Korea’s economic decline: juche, the end of Soviet aid, and the incompetence of Kim Jong-Il. Juche turned economic growth into stagnation. The end of Soviet aid turned stagnation into absolute decline. This backwards path gained momentum as Kim Jong-Il gained power and ruled incompetently. North Korea’s tale is fairly unique. It’s the story of a country which achieved a decent standard of living and high industrialization under communism. Then the strains of the system became apparent, such as the overreliance on petroleum, and it eventually collapsed. This is why one hears of a lot of North Korean factories that used to work but now don’t. One hopes that the new leader Kim Jong-un will turn things around for his people.
<urn:uuid:a3ea86cc-8e01-4e3e-8653-92ffa414420b>
CC-MAIN-2013-20
http://my.firedoglake.com/inoljt/tag/juche/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.97267
1,899
3.40625
3
The mendelschen laws became in the 60's 19. Century of the scientifically interested Augustinermönch Gregor Mendel by crossing attempts at Erbsenpflanzen determines and ina first little considered publication formulated. Only over 1900 was confirmed these innovative realizations, brought with the Chromosomentheorie the transmission in connection and to the common property of the classical genetic science. Table of contents the mendelschen the laws or rules the discoveries Mendels is based on statisticValues. Therefore they are called frequently also rules, with the reason that laws - differently than rules - would apply without reservation. Nevertheless they are well-known in the vernacular also as “Mendel pea equation”. 1. mendelsches law (uniformity law and/or.Reciprocity) if two individuals of a kind (“parents “or Parentalgeneration P called) to be crossed with one another, in a characteristic, for which it pure-bend (homozygot) are, differ, then are the descendants of the first generation (“children” or first branch generation F1called) uniformly, i.e. both genotypisch and related to the phenotype directly. It is irrelevant, which represents the two individuals nut/mother or father. (Exception: The characteristic is on a Geschlechtschromosom (Gonosom). Then it can be that thoseF1 is not really uniform!) 2. mendelsches law (splitting law) is crossed if the first descendant generation among themselves, then the individuals of the second generation (“grandchild “or second branch generation, F2) are no longer uniform, but point again thoseCharacteristics of the parents generation in certain numerical ratios up. There the uniformity is lost - concerns it thereby dominance rezessive transmission, then three quarters form the dominant factor and a quarter the rezessive variant out (relationship of 3:1). - of the 1 points second ) generation with intermediate transmission per a quarter of the descendants one of the two pure-curved variants and half of the individuals. Generation on (relationship by 1:2: 1). 3. mendelsches law (independence law/new combination law) of two characteristics is separately from each other left, whereby starting from the 2. Generation (“grandchild”) new, pure-bends combinations to arise can. This law applies however then only if forthe characteristics responsible persons of genes on different Chromosomen sit (polyhybride hereditary courses). If the genes lie on the same Chromosomen, they are left in groups of couplings. Mendel could do neither the term of the genes nor that of the Chromosomen. The actual nature of the hereditary factors was thus not well-known it. Only 1904 became by Suez clay/tone andBoveri the Chromosomentheorie of the transmission justifies. With the help of this theory the Mendelregeln can be explained without contradiction. The Chromosomen are the units on those the hereditary factors (genes) to be passed on. (This explains the groups of couplings.) in the body cells the Chromosomen arise in pairs.Thus humans possess 23 Chromosomenpaare thus 46 Chromosomen. One speaks of a double Chromosomensatz. The Chromosomen are present in pairs in the body cell, because a Chromosom from the father and one from the nut/mother come. These two Chromosomen become also ashomologous Chromosomen designates. In a body cell the hereditary factors per characteristic are thus always doubly present. With the formation of the sex cells the homologous Chromosomenpaare is separated. In an egg and/or one Spermium is thus only the simple Chromosomensatz. In a sex cellthe hereditary factors per characteristic are thus always once present. (The splitting rule becomes so understandable.) with fertilization thus the fusion of egg and Spermium to bring both sex cells in each case a hereditary factor per characteristic also. The body cell resulting from this fusion has thusagain the double Chromosomensatz. The hereditary factors can so again be combined. (Independence rule, free combination of the genes) With large homogeneity of the genes of respective parents: If A is dominance, each combination, which at least one A contains, has the appropriate characteristicthe parents AA. If AA stands for example for red blooms, and BB for blue blooms, and the gene for red blooms dominance is, have all “children” from AA and BB red blooms, but a quarter of the “grandchildren” again blue blooms.If none of the genes dominates, also mixtures develop - in this case possibly for lila blooms with the combination OFF. If several genes on different Chromosomen result in together a characteristic, also completely new results can develop - for z. B. yellow blooms.The same applies to mutations. The use of this recombination - thus the sexual Vermehrung - lies in the fact that more different gene combinations contribute to the evolution. Without sexual Vermehrung there would be only to a large extent identical copies from each organism. With sexual Vermehrung it givesa high range at descendants, and thus at survival strategies and - possibilities. To it comes that errors or weaknesses in hereditary property with sexual Vermehrung very much uneven on descendants distributed are - so that some descendants of clearly fewer problems have than their parents,and thus a reconciliation for errors when copying the heiress formations is created. Finally the sexual Vermehrung makes possible the assumption of the best characteristics of two occasionally separate populations into a common population and concomitantly a faster appropriation of abilities, those elsewherebefore already developed. the mendelschen laws are used in particular in the animal and plant breeding, e.g. with the breed of hybrids. They can be used also for descending appraisals, e.g. in order to prove that did not determine humansas parents of a certain child are applicable. DNA. which by Mendels theory not be explained could, became only understandably because of the Chromosomentheorie of the transmission. The genes for for example the stature height and fruit form of the tomatoes(A/a and/or. B/b) lie on the same Chromosom and therefore coupled to the germ cells are passed on. The germ cells can contain then only the combination OFF or off, not however off or off. 3. mendelsche rule must be limited therefore: Alleles are freely combinable, if the genes lie on different Chromosomen. - H. Frederik Nijhout: The context macht's! Spektrum der Wissenschaft, April 2005, S. 70 - 77 (2005), ISSN 1702971 - biology book six-form high school Baden-Wuerttemberg class 9-10. thus “everything” is written. (above in the text with reference)
<urn:uuid:f000983f-9125-4195-8dab-4b4bea4ea403>
CC-MAIN-2013-20
http://wikipedia.qwika.com/de2en/Mendelsche_Gesetze
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.876305
1,501
3.53125
4
The Nobel Prize in Chemistry 1945 Artturi Ilmari Virtanen Born: 15 January 1895, Helsinki, Russian Empire (now Finland) Died: 11 November 1973, Helsinki, Finland Affiliation at the time of the award: University of Helsinki, Helsinki, Finland Prize motivation: "for his research and inventions in agricultural and nutrition chemistry, especially for his fodder preservation method" Field: Agricultural chemistry Artturi Ilmari Virtanen was born in Helsinki on the 15th of January, 1895, as the son of Kaarlo Virtanen and Serafiina Isotalo. He was educated at the Classical Lyceum at Viipuri, Finland. After finishing school, he studied chemistry, biology, and physics at the University of Helsinki, where he took his M.Sc. in 1916 and obtained his D.Sc. in 1919. Subsequently he studied physical chemistry in Zurich in 1920 under G. Wiegner, bacteriology in Stockholm in 1921 under Chr. Barthel, and enzymology in Stockholm during 1923-1924 under H. von Euler. Since 1923, his interest turned to He was first-assistant of the Central Laboratory of Industries at Helsinki during 1916-1917, and chemist in the Laboratory of Valio, Finnish Cooperative Dairies' Association, during 1919-1920. In 1921 he became Director of this laboratory, and in 1931 of the Biochemical Research Institute at Helsinki. After having been docent in chemistry at the University of Helsinki since 1924, he was appointed Professor of Biochemistry at the Finland Institute of Technology at Helsinki in 1931, and at the University of Helsinki in 1939. Since 1948 he has been member and President of the State Academy of Science and Arts in Finland. Professor Virtanen is a member of the Finnish, Norwegian, Swedish, Flemish, Bavarian, and Pontifical Academies of Science, and of the Swedish and Danish Academies of Engineering Sciences. He is an honorary member of learned societies in Finland, Sweden, Austria, Edinburgh, and the U.S.A., and holds honorary degrees of the Universities of Lund, Paris, Giessen, and Helsinki, the Royal Technical College at Stockholm, and the Finland Institute of Technology. Numerous medals and other distinctions have been conferred upon him from Sweden, Finland, Belgium, and Italy. Virtanen established the indispensability of cozymase in lactic and propionic acid fermentations, as well as the phosphorylation of sugar (1924). In these works the similarity of different fermentation processes as to the first stages in the decomposition of sugar became apparent. Together with his collaborators he continued the fermentation experiments, special attention being paid to the mechanism of different bacterial fermentations. The fermentation of dioxyaceton to glycerol and glyceric acid in the presence of phosphates by the effect of Coli bacteria (1929) was the first sugar fermentation which was elucidated chemically from beginning to end. In this work attention was also paid to the adaptive formation of enzymes, which phenomenon his collaborator H. Karström treated in great detail in his doctor's thesis (constitutive and adaptive enzymes). The phenomenon of adaptation, and in connection with it the uptake of nutrients by cells, is still subjected to investigations in his laboratory. The concept that almost all proteins in bacterial cells are enzyme proteins led to investigations on the relation between the protein content and enzymic activity of cells. Since 1925, the biological nitrogen fixation which takes place in the root nodules of leguminous plants has been subjected to many-sided investigations in his laboratory. The importance of the red pigment, leghaemoglobin, in active root nodules for the fixation of nitrogen was proved. The formation of vitamins in plants, as well as the ability of plants to utilize organic nitrogen compounds as their nitrogen source, have been treated in many publications from his laboratory. Since the end of the 1940's, the chemical composition of higher plants has been given special attention in his laboratory. A large number of new amino acids have been isolated from different plants, and have been characterized chemically. Numerous organic sulphur compounds, which may be of importance for the nutrition of man and domestic animals, have also been isolated from vegetables and fodder plants. The application of biochemistry to agriculture and the dairy industry belongs to the practical activities of his laboratory. Among works performed in this field are the creation of a theoretical basis for the preservation of fresh fodder and the development of a practical method on this basis (the AIV method), with the aim to promote an effective utilization of protein-rich crops, and to produce milk of the same vitamin content in winter as that produced on summer pastures. Investigations aiming at the improvement of the quality of dairy products also have to be mentioned as belonging to the field of applied research. Virtanen married Lilja Moisio in 1920; they have two sons, Kaarlo and Olavi. From Nobel Lectures, Chemistry 1942-1962, Elsevier Publishing Company, Amsterdam, 1964 This autobiography/biography was written at the time of the award and first published in the book series Les Prix Nobel. It was later edited and republished in Nobel Lectures. To cite this document, always state the source as shown above. Artturi Virtanen died on November 11, 1973. Copyright © The Nobel Foundation 1945 MLA style: "Artturi Virtanen - Biography". Nobelprize.org. 25 May 2013 http://www.nobelprize.org/nobel_prizes/chemistry/laureates/1945/virtanen.html
<urn:uuid:eb9e356a-04a6-49a0-ad31-df2cd1664d0d>
CC-MAIN-2013-20
http://www.nobelprize.org/nobel_prizes/chemistry/laureates/1945/virtanen.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.952129
1,185
2.859375
3
Bronze Age use of a cave in the limits of the present village marks the earliest evidence for settlement in this area. The population appears to have flourished in Phoenician times, a fact revealed by the presence of a number of tombs found during this century at Hal-Qormi Beyond that, the history of this village remains obscure until it emerges as one of the first parishes in fifteenth century Malta. Despite a number of adverse events, the villagers managed to build the largest parish church in the countryside at the time. Inspired by the works of Sebastiano Serlio, an as yet anonymous architect managed to design a church which has a facade that combines elegance and grace with an underlying mannerist style. In the seventeenth century the church was crowned by a dome designed by Malta's foremost architect Lorenzo Gafa. Through the years the church managed to gather a number of paintings by the islandsí leading artists namely Stefano Erardi, Francesco Zahra, Giuseppe Cali and Joseph Briffa. The titular painting is a work by Mattia Preti. The village's population grew over the years and earlier this century the eastern part of the village was proclaimed as a new parish. A new church was built and dedicated to St. Sebastian. Imposing on the surrounding landscape, the church's interior has remarkable pieces of sculpture in local limestone. Qormi is known for its numerous bakeries which until recently supplied most of the southern side of the island. The life in the village is punctuated by a number of events. In Holy Week, one of the largest Good Friday processions occurs at Hal-Qormi, an event which attracts a large number of maltese people and tourists . In the summer months the Maltese celebrate a number of traditional festas. Hal-Qormi also makes its contribution. For two weeks the village's life rotates around celebrations dedicated to the two patron saints. Street and church decoration , fireworks and brass band marches make this occasion an unforgettable Contact author by E-Mail
<urn:uuid:f8b99a72-9e56-4a9e-8292-4c07aac57f23>
CC-MAIN-2013-20
http://www.reocities.com/Athens/Agora/5685/three.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.96278
422
2.53125
3
Alcohol abuse affects the whole family. The health effects of alcohol abuse can include heart disease, liver disease, and even cancer. Treatment consists of medical attention, prescription medications, or treatment centers. It's not clear why some people abuse alcohol or become addicted to it and others do not. Alcoholism often runs in families (genetic), but your drinking habits also are influenced by your environment and life situations, such as friends or
<urn:uuid:32de1e19-d1ae-468c-94c6-7ddaebc6d172>
CC-MAIN-2013-20
http://www.webmd.com/mental-health/alcohol-abuse/default.htm?src=rsf_full-1840_pub_none_xlnk
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.9549
92
2.90625
3
In a heartbreaking case of parental neglect, a 12-year-old girl in Scotland has been admitted to a hospital after a life-long vegan diet left her with the spine of an 80-year-old. Raised on meat- and dairy-free meals since birth, the young child is said to have developed a severe case of rickets (a degenerative bone condition) and numerous bone fractures as a result of her nutritional deficiencies. Sadly, this is not the first time a child has suffered a vegan-related health calamity. In a similar case five years ago, a 15-month-old child was taken into foster care after a strict vegan diet left her with internal injuries, broken bones, missing teeth, and rickets. And since then, at least two vegan children have died from similar complications. In one Florida case, a 5-month-old girl was still at newborn weight when she died from malnutrition. Her siblings were severely malnourished, and at least two had developed rickets. These grievous examples show how important it is to exercise caution when promoting vegetarian and vegan diets—especially for children. A New York Times columnist explained after a 6-week-old Atlanta vegan died last year: A vegan diet may lack vitamin B12, found only in animal foods; usable vitamins A and D, found in meat, fish, eggs and butter; and necessary minerals like calcium and zinc. When babies are deprived of all these nutrients, they will suffer from retarded growth, rickets and nerve damage. As animal activists tout the supposed superiority of meatless eating, it’s important to note that a vegan diet can be downright dangerous unless it’s undertaken with caution. Extra steps like vitamin supplements and careful planning are particularly crucial for kids, since their bodies are not fully developed. Yet vegan activists at PETA and the woefully misnamed Physicians Committee for Responsible Medicine (PCRM) continue to push vegan diets without emphasizing the special needs of growing children. That PETA aggressively markets its messages to children is nothing new. PETA activists have been instrumental in promoting the misleading idea that going vegetarian or vegan is a hip style statement, or a way to stay thin. Regardless of its (lack of) merits, that notion seems to be catching on. According to the American Dietetic Association, eleven percent of girls ages 13 to 17 identify themselves as vegetarian or vegan. But nowhere in today’s animal-rights propaganda will you find sufficient warning about the drawbacks, including protein and vitamin deficiencies. PCRM has been particularly irresponsible in promoting vegan diets for kids. Despite ample evidence to the contrary, the group’s psychiatrist president even insists that "vegan diets are not only good for kids, it’s a preferable diet for kids." As the recent news from Scotland so tragically illustrates, this advice is dangerously misleading. Vegan advocacy groups should stop glossing over the potentially disastrous details of their dietary agenda.
<urn:uuid:dec3d600-f093-4b24-86d7-cee44d9a59ee>
CC-MAIN-2013-20
http://www.consumerfreedom.com/2008/06/3655-childhood-veganism-a-problem-not-a-solution/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711005985/warc/CC-MAIN-20130516133005-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.951531
604
2.796875
3
A Probabilistic Relational Model (PRM), , , is a directed probabilistic graphical model used in the field of Statistical Relational Learning (SRL). PRMs define a language that can be used to describe the relationships - structural and probabilistic - between classes and variables, and thus allows representing dependencies between sets of objects. Heckerman et al. introduced the directed acyclic probabilistic entity-relationship (DAPER) model which is based on the entity-relationship model used to design relational databases. ProbReM is built on the DAPER specification of a PRM, thus it requires the data to be modelled with a entity-relationship diagram. The probabilistic structure defines the dependencies among the probabilistic attributes of the entity-relationship model. The parent and the child attribute of a dependency can be associated with different entities or relationships; Getoor et al. refer to the path from child to parent attribute the slotchain whereas Heckerman et al. associate a more general constraint with the dependency instead. The traditional slotchain is the most common constraint, ProbReM makes use of both expressions depending which one is more appropriate in the context. Relationships are either of type 1:n or m:n, therefore it is possible that attribute objects have multiple parent attribute objects for the same probabilistic dependency. Aggregation of the parent attribute objects is a common way to deal with this problem, ProbReM allows to define generic aggregation functions (avg, min, max). Different inference methods have been implemented, all of which are based on Markov Chain Monte Carlo methods. The section Using ProbReM illustrates the approach used in ProbReM, and the example model is a walkthrough with an applied example. For theoretical background, we recommend Introduction to Statistical Relational Learning by Lise Getoor & Ben Taskar for an excellent introduction to the different approaches introduced in the SRL field. For more background on using MCMC in graphical models, D. Koller & N. Friedman’s Probabilistic Graphical Models: Principles and Techniques is an excellent reference. - Numpy / Scipy - Matplotlib / Pylab It is hard to draw a line between the core functionality of the framework and the functionality needed by a specific ProbReM project. For this reason the source code will be provided as a folder and the framework has to be added to the PYTHONPATH of the ProbReM project. In the future it might be useful to create a proper Python package. The code is available as is on github. See Using ProbReM for how to start a new project.
<urn:uuid:a7fd1f4c-a983-4328-832f-bbed3a80ced4>
CC-MAIN-2013-20
http://www.cs.mcgill.ca/~fkaeli/probrem/about.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711005985/warc/CC-MAIN-20130516133005-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.868971
553
2.671875
3
Today, there’s a chance that the U.S. Senate will return to some semblance of a functioning legislative body. A majority of senators could vote to eliminate Rule XXII, which authorizes the notorious filibuster. Article 1, Section 6 of the Constitution, which gives to both houses of Congress the determination of “the rules of its proceedings,” offers that opportunity on the first day of each new Congress. The filibuster, which requires a supermajority to cut off debate, entered the Senate’s rules in 1807 as a courtesy to speakers. Since then, Rule XXII has metastasized into a procedural vise that threatens the democratic foundation of our government. The filibuster lost all semblance of being an aid to discussion in the middle of the 19th century, when some senators began using the rule to hold the floor for lengthy speeches to prevent voting on bills they didn’t like. Until 40 years ago, this partisan weapon was used sparingly — no more than 10 times in any two-year congressional session. Then, in the 1970s, frustrated by even that small number of interminable talkathons, senators introduced the concept of the “silent filibuster” which enabled members to merely indicate that they intended to filibuster to block a measure. Since 2007, the Republican minority has expanded the use of the filibuster beyond any recognizable procedural rule. In the 110th, 111th and 112th Congress, they filibustered 380 times. Today no legislation can be introduced, no nominations considered, no votes taken without a supermajority of 60 votes. This formidable, partisan tactic has become so common that bills like the Dream Act and the Paycheck Fairness Act have failed in the Senate despite having enough votes for passage because of the deadly filibuster. The Founding Fathers, rebelling against monarchy, were so partial to majority rule that they specified in the Constitution only five instances requiring a supermajority. They were: to override a presidential veto, to expel a member, to approve treaties, to convict in an impeachment and to propose a constitutional amendment. The Constitution does not require a supermajority for adopting the rules for Senate proceedings. When senators insist upon supermajority votes for rule-changes and filibusters, they are stealthily amending the Constitution. Two years ago, Sens. Tom Udall, Jeff Merkley and Tom Harkins mounted a campaign for rules reform. They succeeded in getting rid of the anonymous filibuster, an even more egregious practice. Now, after two additional years of accelerating legislative obstruction, Senate Majority Leader Harry Reid has finally called for ending the silent filibuster. Reid’s proposal would prevent the use of the filibuster to block the introduction of new measures. More important, it would require a senator to speak if he or she wished to halt a vote, instead of effortlessly indicating an intention to demand supermajority concurrence to continue any action. Newly elected Sens. Elizabeth Warren, Angus King, Heidi Heitkampf and Martin Heinrich have joined the filibuster’s foes, but the outcome of even Reid’s mild proposal is far from certain. Sen. Carl Levin is now assembling a bipartisan group to oppose any substantive change in the Senate’s rules. Far more promising than Reid’s “make them talk” effort is the lawsuit filed by the public advocacy group Common Cause. Contending quite correctly that the Senate’s arcane rule is actually threatening our democratic process, their case highlights the stake that we American citizens have in the filibuster issue. Suing on behalf of Reps. John Lewis, Michael Michaud, Hank Johnson and Keith Ellison and three young people hurt by the use of the filibuster to block the Senate from passing the Dream Act in 2010, Common Cause must demonstrate that its case does not fall under “the political question doctrine,” which posits that the judiciary can’t interfere with Congress’ procedures. Lawyers for Common Cause are arguing in the litigation that the Senate’s rule-making powers are not absolute, particularly when they violate actual constitutional law, in this case the principle of majority rule. Resistance to changing the pernicious rule that is stifling the will of the majority rests on a historical myth and both parties’ fear of being curtailed when they are in a minority. The myth teaches that the Senate was meant to counteract the democratic structure of the House. The opinions of the Founding Fathers tell otherwise. The so-called Great Compromise at the Constitutional Convention of 1787, which granted each state two Senate seats regardless of its population, reflected a concession, not a principle. Because there were far more small states in the original 13 than large ones, the arrangement proved necessary to getting the delegates in Philadelphia to agree on a draft constitution. As a consequence, Wyoming’s 180,000 registered voters have the same number of senators as California’s 18 million. Today’s filibustering senators are only furthering this imbalance. The Founders designed the Senate to be a steadying force in Congress, with six-year terms and a requirement that members be at least 30 years old, but no Founding Father ever spoke in favor of minority rule. James Madison, the father of the Constitution, recognized that majorities could err, but insisted persuasively that majority rule was far superior to any other mechanism for making legislative decisions. His views anticipated Winston Churchill, who noted that democracy might be considered the worst form of government except for all the others. The rationales for the filibuster are but fig leaves to hide the fact that substantial numbers of senators in both parties want an insurance policy against minority impotence, and they are willing to curb the workings of our democracy to get it. Now only an aroused public can get Democrats and Republicans in the Senate to see the damage that the filibuster is doing to our political order. Majority rule is the bedrock democratic principle. When we citizens of the United States elect a majority, we want it to govern. Wisdom, experience, and the Constitution are on our side; let’s hope that enough members of the Senate move there also by Jan. 3 when the opening of the 113th Congress gives them a chance to vote with their hopes instead of their fears. Joyce Appleby is an emeritus professor of history at UCLA and author of “The Relentless Revolution: A History of Capitalism.” She lives in Taos, N.M., and she wrote this for the Los Angeles Times.
<urn:uuid:dae711ed-6fe6-41d2-bc4b-be4fe0791df3>
CC-MAIN-2013-20
http://www.freep.com/article/20130103/OPINION05/130103039/-1/7daysarchives/Guest-commentary-Disarm-filibuster-
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711005985/warc/CC-MAIN-20130516133005-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.93447
1,337
3.3125
3
|The following information - excerpted from NutriBase Software - is a discussion about "desirable" body weights and "desirable" percentage body fat contents for men. (Information and body weight/fat charts for women are also available.) In 1942, Louis Dublin, a statistician at Metropolitan Life Insurance Company, grouped some four million people who were insured with Metropolitan Life into categories based on their height, body frame (small, medium or large) and weight. He discovered that the ones who lived the longest were the ones who maintained their body weight at the level for average 25-year-olds. These Metropolitan Life tables became widely used for determining recommended body weights. In 1942, the tables gave "ideal body weights." In 1959, they were revised and became "desirable body weights." And in 1983, they were revised once again, this time called "height and weight tables." The weights given in the 1983 tables are heavier than the 1942 tables because, in general, heavier people live longer today. Experts have criticized the validity of these tables for several reasons: Many experts say the 1942 tables are more accurate because they indicate lower "ideal weights." Many experts support the use of the 1983 tables, citing that these are the latest statistical sampling of such matters. The American Heart Association recommends using the 1959 tables rather than the newer tables that suggest somewhat higher weights. This Guide shows you the 1959 tables. Some experts criticize the Metropolitan Life tables stating that they are okay for persons in their forties, but that the numbers are too heavy for younger persons and too light for older persons. For this and other reasons, NutriBase shows you recommended body weights from four sources: the 1959 Metropolitan Life Insurance chart, the U.S. National Center for Health Statistics, North American Association for the Study of Obesity, and the U.S. Department of the Army. NutriBase displays the heights and weights from these charts, showing you the entries that are appropriate for your sex, height, frame size, and age. The Metropolitan Life chart is organized by sex and body frame size (small, medium, or large frame) and all the other charts are sex and age-graded except for the North American Association for the Study of Obesity, which lists weights by sex only. Weight Charts for Men Metropolitan Life Insurance Company, 1959 - Male US National Center for Health Statistics - Male North American Association for the Study of Obesity - Males US Army - Males Body Fat Content Chart for Men and Women
<urn:uuid:a769da76-59bc-4b23-8d08-269bdf81bd21>
CC-MAIN-2013-20
http://www.nutribase.com/fwchartm.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711005985/warc/CC-MAIN-20130516133005-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.935117
514
2.546875
3
Worksheets and activities If you want to support your child’s learning at primary school with some extra practice at home, TheSchoolRun has hundreds of resources for you to choose from. Our free English worksheets cover phonics, spelling, handwriting, grammar, reading comprehension and more. Our free maths worksheets for Reception, KS1 and KS2 offer activities and games to help with multiplication, division, fractions, decimals, times tables and all other areas covered in the national curriculum. Our free primary science worksheets will help you revise key science concepts with hands-on experiments. Browse through all our worksheets and filter your search by subject and year group to find the best resources for your child. These SATs past test papers can be downloaded for free and used to help with SATs revision. The Learning Journey is a guided revision programme for primary English and maths. Every week of the school year we suggest two activities to offer your child at-home practice; we'll also email you worksheet suggestions and teachers' tips to help you get the most from our resources. The Learning Journey is exclusive to TheSchoolRun subscribers. Find out more by watching our introductory video. Start your child's Learning Journey today! Fractions? Punctuation? Telling the time? Handwriting? If there’s a specific area of learning your child needs support with, our packs offer information, advice and plenty of engaging practical activities to help you. Written by teachers and experts and exclusively available to TheSchoolRun subscribers, learning packs (each 50+ pages long) are fun as well as practice-packed. About TheSchoolRun: If you’re passionate about helping your children achieve their full potential with fun but educational activities, TheSchoolRun.com is the parenting website for you. TheSchoolRun aims to demystify school for parents, giving you all the tools you need to understand what and how your child is learning at primary school. Our informative articles, packed with advice from experts and practical tips from teachers, help parents get to grips with new educational techniques and feel confident about supporting their kids’ schoolwork.
<urn:uuid:7769300f-d8f0-4fc0-84ea-7a2b9b9d3035>
CC-MAIN-2013-20
http://www.theschoolrun.com/theschoolrun-homepage?qt-worksheet_and_activity_finder=0
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711005985/warc/CC-MAIN-20130516133005-00006-ip-10-60-113-184.ec2.internal.warc.gz
en
0.937611
450
3.125
3
Thirty years ago, a summertime rain could produce huge gullies, badly eroded slopes dotted much of the region, and on average, a Tennessee farmer was losing almost 2,000 tons of soil per year. But that was before no-till farming. These days, thanks to extensive work by researchers with the University of Tennessee Institute of Agriculture, and educational forums like the Milan No-Till Field Day, those sights and stats are a thing of the past. In 2009, more than 70 percent of Tennessee farmers used no-till practices, and an additional 20 percent used some type of conservation tillage. The results can be seen in better production efficiency, cleaner water and air, and drastic improvements in our soils. When the 30th Milan No-Till Crop Production Field Day rolls around on July 22, most visitors to the AgResearch and Education Center will be familiar with no-till practices, but this event is about more than no-till education. It’s about helping farmers determine the best methods for agricultural production. “We’re proud of our heritage as the birthplace of Tennessee No-Till,” says Blake Brown, director of the AgResearch and Education Center at Milan, Tenn. “As no-till becomes the conventional tillage method in Tennessee, we hope to continue in the footsteps of those early no-till researchers whose main goal was to help the farmers of this state produce crops more efficiently and economically.” Visitors to Milan No-Till Field Day will have the opportunity to hear presentations on research involving every major row crop grown in Tennessee, delivered by leading crop experts from across the Mid-South. Tours will also feature workshops on weed, insect and disease management. Plus, sessions will be offered on topics like financial planning and emerging biofuels markets. In addition to the array of educational tours, visitors can also enjoy a large tradeshow or a walk through the West Tennessee Agricultural Museum, which features more than 20,000 agricultural antiques. As always, the field day will be held at the AgResearch and Education Center at Milan. The Milan No-Till Field Day begins at 7 a.m. on Thursday, July 22. Admission is free and open to the public. For more information, including directions to the AgResearch & Education Center, visit the website: http://milan.tennessee.edu or call (731) 686-7362. You can also check out the Milan No-Till page on Facebook for the latest updates. The UT AgResearch and Education Center at Milan is one of 10 outdoor laboratories operated by the Tennessee Agricultural Experiment Station system as part of the University of Tennessee Institute of Agriculture. In addition to its agricultural research programs, the UT Institute of Agriculture also provides instruction, research and public service through the UT College of Agricultural Sciences and Natural Resources, the UT College of Veterinary Medicine, and UT Extension offices in every county in the state.
<urn:uuid:72358377-646b-4cd3-a2c1-c47616f8a346>
CC-MAIN-2013-20
http://deltafarmpress.com/management/30th-milan-no-till-field-day-july-22
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.933703
616
3.046875
3
Debates about energy often get testy. That’s because the arguments are usually clouded by emotions. The number one reason people buy mileage efficient hybrid cars, for example, is that it makes them feel good about themselves; the purchase provides for a moral superiority especially over those who continue to drive gas guzzlers. The fact that the premium paid over a comparable non hybrid vehicle cannot be economically justified with gas prices at current levels is irrelevant. It’s the environment that’s important even though the ecological benefit of driving a hybrid cannot be quantified. As with hybrid cars, most arguments about energy are devoid of facts about cost. Politicians love to spout their support for alternative environmental friendly energy development, particularly ethanol, wind, and solar. They never mention the reality that these energy sources cannot be developed without enormous government subsidies and delivery consumption prices that will be a multiple of present energy costs. Add in other development problems such as land use, delivery unreliability, other adverse environmental effects and it obvious that these energy alternatives will never supply more than a fraction of our power needs. If energy independence and protecting the environment is truly important it is necessary to recognize that costs do matter as a conservation motivator. For example, higher gasoline prices-say $5.00 per gallon- would drive more people to hybrid and smaller more fuel efficient cars purchases than any environmental benefit factor. Of course few politicians would support a consumption tax on gasoline and oil companies and speculators would be vilified if market prices got that high. Needless to say, the public wouldn’t like it either. But there are other area where cost rationality is making progress. One example is the planned installation by utilities of smart meters in some 10 million homes and businesses. These devices are programmed to measure a customer’s use of electricity incrementally during the day, say every ten minutes or hour. This information is automatically forwarded to the utility which will charge different prices for energy depending on peak or non peak power demand. Customers opting for lower bills could reduce energy usage during the higher cost peak period. Ultimately, smart meters could directly control a household’s appliances making the home more energy cost efficient. This is real energy smarts.
<urn:uuid:99f54c3f-ffdc-4ca2-858b-3013dd0354da>
CC-MAIN-2013-20
http://www.marconews.com/news/2010/may/27/money-smarts-absorbing-energy-smarts/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.947423
452
2.625
3
Questions for Photo 1 1. This view is looking from the area around the railroad crossover up the tracks of the Memphis & Charleston Railroad. Locate this view on the map shown in Illustration 1. Can you identify Battery Williams (to the left of the tracks) and Battery Robinett (behind the tent camp on the right) in the photo? 2. What clues can you identify in the photo to suggest why the two batteries were located where they were? 3. The tent camp is located between Battery Robinett and Battery Williams, near the tracks. Why do you think that might be the case? 4. The objects next to the tracks on the right side of the photo appear to be wheels for railroad cars. Why do you think there are so many of them? What might they be used for? How do you think they would have been transported to Corinth? * The photo on this screen has a resolution of 72 dots per inch (dpi), and therefore will print poorly. You can obtain a larger version of Photo 1, but be aware that the file will take as much as 35 seconds to load with a 28.8K modem.
<urn:uuid:f58368fe-4f93-409c-b795-4cfb6345ae48>
CC-MAIN-2013-20
http://www.nps.gov/history/nr/twhp/wwwlps/lessons/113corinth/113visual5.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973862
236
3.25
3
Upper Level Low - Meteorological Physical Background by ZAMG and FMI Upper Level Lows are closed cyclonically circulating eddies in the middle and upper troposphere. They are sometimes also called "cold drops", because the air within an Upper Level Low is colder than in its surroundings. The development of a typical Upper Level Low goes through four stages, during which a bottom of an upper trough is detached from the main stream, until it finally fills up or merges with another trough: - Upper level trough - Final stage 1. Upper Level Trough stage The prerequisite of the forming of the Upper Level Low are unstable waves within the main stream, where the temperature wave is behind the geopotential wave. - There is cold advection within the trough and warm advection on the ridge of the geopotential wave. - The vertical axis of the trough has a backward-oriented inclination with height. - The amplitudes of the waves increase; the wavelenght can decrease. Cyan: 500 hPa geopotential height, green: 500 hPa temperature 2. Tear-off stage - The amplitudes of the waves increases further. - The isohypses form an inverse omega-shape and the cold air flows into the middle of this omega. - Often at the same time the ridge behind the main upper trough continues to move eastward quicklier than the trough, appearing to "fall - In the end of this stage the cold bottom of the trough is detached from the main stream. 3. Cut-off stage - The bottom of the upper trough is completely detached from the main stream forming a closed circulation. - If there is a strong forward-falling ridge behind, it may also separate from the main stream and form an upper level high (a counterpart for the upper level low). This happens in most of the ULL cases. - The cold core of the Upper level Low warms up slowly because of the diabatic warming of the sinking clod air. - If a cold Upper Level Low is situated over a warm surface, convection arises within the core. This occurs especially over the Atlantic Ocean (Canarian Isles) and over the Mediterranean in summertime. - Another location for convection is ahead of the low within the area of a thickness ridge. 4. Final stage Within an Upper Level Low there is convection, unless the surface is very cold. The air near the surface is warm and the circulation is slowed down by the friction. The convection brings warm air and friction upwards. Consequently, the Upper Level Low weakens slowly. - In most cases the Upper Level Low merges with the main stream before it has completely dissolved by the convection. Usually a large trough in the main stream approaches from the rear and catches the upper level low. - The Upper Level Low can also merge with another Upper Level Low. For an example see Key Parameters. If the Upper Level Low is far from the main stream, it can dissolve solely by convection. This kind of development occurs mostly in southern areas; in Europe they can be found over the Mediterranean. Upper Level Lows can be divided into two classes according to their size and lifetime: - small lows with a lifetime of 2-4 days - big lows with a lifetime of 5-14 days Big lows are slightly more common than small ones. Note that over land an Upper Level Low can also form when a surface low of an extratropical cyclone disappears due to friction. This is just a late stage of a cyclone development and the upper low fills up relatively quickly.
<urn:uuid:c339e705-48c2-47be-ae5a-bf00d6e80176>
CC-MAIN-2013-20
http://www.zamg.ac.at/docu/Manual/SatManu/CMs/ULL/backgr.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.919452
765
4.0625
4
There are so many ways that you can do extra research and investigate into many more aspects of Clare. Below are some ideas. Your local library is an excellent source for all the information you may need: it may have some maps you can look at. Perhaps you could do a project about aspects of Clare. There might be some more photographs or images related to Clare in the Media Bank. Maybe you need some tips on how to be a researcher? Click on one of the icons below. Ask Your Librarian or Teacher Ask your librarian or teacher if they can help you find out about Clare. Information you can look out for includes photos and media publications, such as old newspapers, which may provide you with interesting insights. Not sure exactly what you can ask the librarian for? Click on the icon for some suggestions. http://www.museum.ie has loads of artefacts and evidence from Ireland throughout the centuries, even before your grandparents were born.
<urn:uuid:cf86d721-9945-4fe3-a3be-ada18f364fa7>
CC-MAIN-2013-20
http://askaboutireland.ie/learning-zone/primary-students/looking-at-places/clare/aspects-of-clare/find-out-more/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.951363
200
2.640625
3
DIY Industrial Art Pieces Made from Rubbings I was in a used book store one day and I saw a book on art rubbings. Of course, I was familiar with the idea of putting a penny or leaf under a paper and running a pencil over the top to transfer the image, but this book was taking it to a whole new level. So we grabbed our art supplies and went outside to make some new art pieces from rubbings! - Paper … and plenty of it. I found that I like using very thin paper, personally. I bought a cheap sketchpad and I really liked the texture and thinness of the paper for this project. - Rubbing Materials. There are all sorts of rubbing materials you could use! Take a bunch with you and try them out to see what you prefer. Graphite, colored pencils, pastels, chalks, wax, you name it! Although I did not expect it, I ended up preferring crayons for larger pieces. Colored pencils were nice for more detailed/smaller items. - A Kneeling Pad. If you’re going to be crouching on sidewalks and streets making your rubbings, it’s a little more comfortable if you have something under your knees. - A Folder. Or something to put your finished rubbings in to prevent them from getting bent up and wrinkled. - Masking Tape. You need for need something to hold the paper still while making a rubbing, and I found masking tape to work very well. It’s especially helpful for working on vertical surfaces, of course, but even on a flat horizontal surface, it is a good idea. Be aware, though, that depending on the kind of paper you are using, the area with the masking tape may need to be trimmed away. This is usually fine because of the nature of rubbings, often the edges are not the most attractive part, anyway, and can be cut away. - Scissors. This is helpful to have so you can trim away the excess masking tape to prevent the papers from sticking together in the folder. - A Tote. Or something similar to carry all these supplies! You could do a variety of themes out of rubbings, such as a nature theme where you make rubbings of tree bark and feathers and other natural objects. But I wanted to do a more urban and industrial theme. Of course, this works best if you live in a fairly urban area. However, even in a small town we were able to find some interesting subjects for rubbings. Try man hole covers, engraved signs, and plaques for more definite rubbings, or try brick walls, metal plates and concrete for more textural subjects. Be aware, though, that you need to know what you are allowed to make rubbings of; it is illegal some places to make rubbings of gravestones, and, of course, you shouldn’t wander onto private property to make rubbings. Still, it is a unique way to wander around a town, looking for interesting spots to make into rubbings – you notice all sorts of things you would not have seen before. A few tips on making rubbings: - Look for a subject for the rubbing that has texture or relief to it, and tape the paper over the area you want to transfer to the paper. Choose which art medium you want to use for the particular rubbing. - Don’t use a sharp point of whatever art medium you are using, but rather use a blunt point or use it on an extreme angle as you begin to make the rubbing. - Move your pencil, or other rubbing tool, smoothly and evenly over the surface of the paper. Start out marking lightly. If you press too hard, you’ll just be drawing on top of the surface, not really picking up the texture. But if you start lightly and gradually get to darker/harder strokes, you’ll get a better feel for what works well. - While making the rubbing, try to keep your hand moving in the same plane. In other words, if you’re rubbing right to left, do not suddenly switch to up and down, or you will probably end up with some unattractive competing lines. - When you are finished, gently remove the paper from the surface and trim away the masking tape. Place the rubbing your folder for safe keeping. So try exploring your local area and think outside the box of what you can turn into rubbings! This tutorial is brought to you by April Starr. She likes to say that her motto is "living the amazement" She never wants to lose her sense of wonder and adventure. April Starr is a designer, writer, creative entrepreneur of FlourishCafe, lover of spicy food, amateur explorer and worth very little in the early mornings. Her husband and four year old daughter are always up for trying a new dish she has created, or working on a project together. She is learning, laughing, and living the amazement every day!
<urn:uuid:45e0ca9a-c163-49af-9632-4b10f61aef50>
CC-MAIN-2013-20
http://diy.lomography.com/projects/industrial-art
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.952326
1,060
2.53125
3
Examining the Sustainability Journey of Walmart Business researchers from the University of Arkansas and the University of South Carolina will be examining Walmart’s 7-year sustainability effort as a way to create a teaching tool for other businesses that hope to become more environmentally friendly. As researchers from the University of Arkansas and the University of South begin their project of examining Walmart’s efforts of becoming more sustainable for nearly a decade, they hope to find ways to help other businesses overcome certain obstacles in order to be more environmentally conscious. The project will consist of a series of cases that focus on a single topic and a single organization over a specific amount of time. “The strategy is to embed sustainability within the core business supporting the company’s vision for a more sustainable Walmart. Numerous initiatives, some of which are documented in the case series, are part of this strategy that led to international recognition of Walmart’s sustainability leadership,” said David Hyatt, clinical assistant professor in the Sam M. Walton College of Business. The cases explore a set of essential questions across three levels: societal, organizational and individual. For example, at the societal level, who should set standards for sustainability – government, society, consumers, scientists or companies? At the organizational level, who evaluates and measures sustainability, who should make decisions about strategy and how should the strategy be implemented? At the individual level, what does sustainability mean to the consumer or employee? The studies ask several other questions pertaining to each level. The first case study will look at former CEO Lee Scott’s “Leadership in the 21st Century” speech from 2005, in which he publicly announced Walmart’s sustainability goals. Other studies will include the examination of how the company planned certain goals and processes, implementing LED lights and environmentally friendly shopping bags, and other strategies that have already been used by Walmart.
<urn:uuid:93feaf50-9706-42f8-8ab8-075443762752>
CC-MAIN-2013-20
http://eponline.com/articles/2012/12/18/examining-the-sustainability-journey-of-walmart.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.935391
383
2.75
3
Figure. No caption available. Q My father has just been diagnosed with mild cognitive impairment. Will this eventually turn into Alzheimer's disease? DR. RONALD PETERSEN ADVISES: A Your father has been diagnosed with mild cognitive impairment (MCI) - a condition that indicates he is more forgetful than we would expect as part of normal aging, but that does not otherwise meet the clinical criteria for dementia or Alzheimer's disease. Despite significant forgetfulness, people with MCI retain their cognitive skills, such as reading, writing, calculating and problem-solving. And they are still quite functional in most of their daily living activities. But because they do not meet the criteria for dementia, they are in this intermediate zone characterizing MCI. People with MCI develop Alzheimer's disease more quickly than the general population - at an annual rate of 10 percent to 15 percent, compared to only 1 percent to 2 percent for people without an MCI diagnosis. Within four or five years, half the people with MCI will have developed Alzheimer's; nevertheless, it's likely that most of the rest of them will also develop the disease at some point in the future. There currently are no approved treatments for MCI, but several clinical trials have recently been completed. The most promising results came from a large trial studying donepezil (Aricept) and high-dose vitamin E. This study found that donepezil reduced the risk of developing Alzheimer's for up to 12 months in participants with MCI compared to those on placebo. However, by the end of the three-year study, there was no difference among people taking donepezil, vitamin E or placebo. Mild cognitive impairment is an area of active investigation, so we hope therapies will be developed in the near future.
<urn:uuid:eb581ff7-868a-4b9c-8f84-733a2e3eff76>
CC-MAIN-2013-20
http://patients.aan.com/resources/neurologynow/index.cfm?event=home.showArticle&id=ovid.com%3A%2Fbib%2Fovftdb%2F01222928-200602010-00012
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.966479
368
2.578125
3
One of Appleton’s early founders, Eleazar Williams, claimed he was the “lost Dauphin”—the rightful heir to the French throne. Maybe it was royal blood that inspired him to devise a lofty plan to lead an empire based in Wisconsin. In the 1820s he led a host of Native Americans from New York to settle in the Fox River Valley. His plans to become their emperor kind of fell through, but he did succeed in accidentally establishing the future location of Appleton and the Fox Cities. Local residents added a personal touch to Appleton from the very beginning. When the design for the city’s college building, Lawrence University, was sent from Boston, Wisconsin builders thought it lacked a certain je ne sais quois. To jazz it up a bit, they added a few gables—four, to be exact. According to one story, Mr. Lawrence was none too keen on their additions, but the college became a source of local pride all the same. Many paper companies call the Fox River Valley their home. In fact, the valley boasts the world’s highest concentration of paper-related companies, with a whopping 80 plants and 90 publishing companies. This is commemorated at the Paper Industry International Hall of Fame, located in Appleton. Imagine how many paper airplanes that is! Plenty of folks know that Houdini called Appleton home, but did you know that Appleton holds the secrets to some of his great tricks? AKA Houdini, an ongoing exhibit in the History Museum at the Castle, lets visitors get a first-hand taste of Houdini’s magic with hands-on activities. The exhibit won the 2005 American Association for State and Local History Award of Merit and has been featured on the Discovery Channel, the Learning Channel, the Arts and Entertainment Network and the BBC. How’s that for spellbinding? The Fox Cities have bred their share of local and national heroes, and the most prominent might be John Bradley. An Appleton native and graduate of Appleton West High School, Bradley helped raise the flag at Iwo Jima and was immortalized in the famous photograph of that event. After the war he returned to Appleton and married his sweetheart, Betty Van Gorp. Today an Appleton clinic and scholarship for college-bound high school seniors bear his name and continue his legacy. Appleton residents played a key role in preserving their city’s shocking heritage. Appleton was the home of the first commercial hydroelectric plant, as well as the first house in the world to be lit with hydroelectricity. That house, which later became known as the Hearthstone House, was set to be demolished by the city in 1986. A group of Appleton residents calling themselves “Friends of Hearthstone” raised enough money to save the house and then turned it into a museum where it continues to shed light on Appleton’s local history. There’s no better place to go through the looking glass—or rather, to go looking for glass than the Bergstrom-Mahler Museum in Neenah. Evangeline Bergstrom bought her first antique paperweight out of the nostalgia she felt for a similar object that her grandmother owned. Her collection grew to more than 200 weights, which were displayed alternately in museums like the Art Institute of Chicago and the Neville Public Museum. When Evangeline died in 1959, she left her collection and home to the city of Appleton, and the museum was born. The Appleton Fire Department sure has come a long way since its inception in 1854, when fire wardens were responsible for garnering volunteers any time they needed to put out a fire. In its early years, the fire department budgeted more than $800 to care for horses. Today the department operates six full-time career department districts with eight vehicles that respond to more than 3,000 calls each year—much more than the 89 calls that the department answered in 1895. Now that’s hot! Apples? We ain’t got no apples. Contrary to the way it sounds, Appleton is not a town named for its fruit production. In fact, the city was known as Grand Chute until the construction of the local Lawrence College. The Methodist Reverend Reeder Smith, himself paramount in Lawrence College’s establishment, named the town in honor of Mr. Lawrence’s wife, Sarah Appleton. Later, Smith and Lawrence convinced Samuel Appleton, a wealthy Boston philanthropist, that the town was named for him in hope of receiving a donation for the college. They were successful, and Samuel donated $10,000 for the school’s library. Before there were the Fox Cities, there was the fur trade. The Fox River played an important role as a channel for pioneers and fur traders alike. Today, the valley’s fur trading era is preserved in the Charles A. Grignon Mansion. Grignon built his mansion on the site of an early trading post as a gift to his Pennsylvania wife, Mary Meade. The mansion is staffed by costumed guides who transport visitors back to the time when Charles and his family lived there. Fur real! Did you already know these facts about Appleton and the Fox Cities? Check out our round up of Green Bay trivia.
<urn:uuid:10e68a06-806e-4d02-a069-a49776a0ea9f>
CC-MAIN-2013-20
http://www.dealchicken.com/appleton-wi/trivia
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973284
1,096
2.546875
3
Participants in the Getting Word project recalled varied experiences with racial prejudice. For some, experiences with discrimination only motivated them to work harder to achieve their goals. For others, the Jim Crow system thwarted their efforts to receive a quality education and pursue their chosen career. Types of discrimination experienced ranged from segregated movie theaters and hostility from whites to relatives privileging lighter skinned children over those with dark complexions. While growing up in Courtland, AL, Eliga Diggs was close with the white children who lived near him—“we were just like brothers”—but he recalls being segregated from them when they went into town together. When going to a movie, “They went downstairs. We went upstairs.” As a child, Diggs remembers not dwelling on discrimination, but realizing the injustice of the Jim Crow system as he got older. Once he began his own family, he was relieved that segregation had abated: “I'm glad my children did not have to grow up in that kind of atmosphere” In his interview, Woodson descendant James Wiley recalled how prejudice stymied his father’s career as an engineer. “It was the American dream gone sour,” he remembered. James Wiley graduated from the University of Pittsburgh in 1940 with a degree in physics, hopeful that he could get a job as an engineer. He soon realized that, as with his father, racial discrimination precluded him from following this career path and turned instead another of his interests—aviation. While logging flight training hours in Tallahassee, FL, Wiley experienced airplanes flown by African Americans “having all kinds of problems. Fuel leaks and things were coming apart on the airplanes. They were being sabotaged.” During a flight, Wiley saw fuel streaming out of his plane and ejected before the plane crashed. This terrifying experience left him more aware than ever that "there was a lot of Ku Klux Klan people around at that time." Aside from overt and even violent racism from whites, Getting Word participants recalled color discrimination in their own communities, and even families. Lucille Balthazar remembered her grandmother giving preferential treatment to her blond, blue-eyed brother, Billy. “When we came to visit her she always asked ‘Billy, now what would you like Grandmother to cook for you?’ And she made the best fried apple pies that she would make for him or doughnuts or whatever he asked her to make she would make it.” When Ann Medley was in elementary school, she experienced racial discrimination from both white and black children because of her light skin. “You’d get if from both ways,” she remembered. Medley’s daughter Patti Jo Harding experienced a similar type of discrimination: “The blacks don't like it because you're light skinned and the whites know you're black so you're just like stuck there.” "They had a little place in the back for us" Eliga Diggs describes how racial discrimination affected him growing up.
<urn:uuid:4ff3da47-078a-4ee4-b882-f23110960487>
CC-MAIN-2013-20
http://www.monticello.org/getting-word/stories/racial-prejudice
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.985522
626
3.65625
4
Below are the first 10 and last 10 pages of uncorrected machine-read text (when available) of this chapter, followed by the top 30 algorithmically extracted key phrases from the chapter as a whole. Intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text on the opening pages of each chapter. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages. Do not use for reproduction, copying, pasting, or reading; exclusively for search engines. OCR for page 212 Desalination: A National Perspective 8 A Strategic Research Agenda for Desalination As noted in Chapter 3, desalination is likely to have a niche in the water management portfolio of the future, although the significance of this niche cannot be definitively determined at this time. The potential for desalination to meet anticipated water demands in the United States is not constrained by the source water resources or the capabilities of current technology, but instead it is constrained by financial, social, and environmental factors. Over the past 50 years the state of desalination technology has advanced substantially, and improvements in energy recovery and declining membrane material costs have made brackish water and seawater desalination a more reasonable option for some communities. However, desalination remains a higher-cost alternative for water supply in many communities, and concerns about potential environmental impacts continue to limit the application of desalination technology in the United States. For inland desalination facilities, there are few, if any, cost-effective environmentally sustainable concentrate management technologies. Meanwhile, as noted in Chapter 2, there is no integrated and strategic direction to current federal desalination research and development efforts to help address these concerns. In this chapter, long-term research goals are outlined for advancing desalination technology and improving the ability of desalination to address U.S. water supply needs. A strategic national research agenda is then presented to address these goals. This research agenda is broadly conceived and includes research that could be appropriately funded and conducted in either the public or private sectors. The committee recognizes that research cannot address all barriers to increased application of desalination technology in regions facing water scarcity concerns; therefore, practical implementation issues are discussed separately in Chapter 7. Recommendations related to implementing the proposed research agenda are also provided in this chapter. OCR for page 213 Desalination: A National Perspective LONG-TERM RESEARCH GOALS Based on the committee’s analyses of the state of desalination technology, potential environmental impacts, desalination costs, and implementation issues in the United States (see Chapters 4-7), the committee developed two overarching long-term goals for further research in desalination: Understand the environmental impacts of desalination and develop approaches to minimize these impacts relative to other water supply alternatives, and Develop approaches to lower the financial costs of desalination so that it is an attractive option relative to other alternatives in locations where traditional sources of water are inadequate. Understanding the potential environmental impacts of desalination in both inland and coastal communities and developing approaches to mitigate these impacts relative to other alternatives are essential to the future of desalination in the United States. The environmental impacts of both source water intakes and concentrate discharge remain poorly understood. Although the impacts of coastal desalination are suspected to be less than those of other water supply alternatives, the uncertainty about potential site-specific impacts and their mitigation are large barriers to the application of coastal desalination in the United States. This uncertainty leads to stakeholder disagreements and a lengthy and costly planning and permitting process. For inland desalination, uncertainties remain about the sustainability of brackish groundwater resources and the environmental impacts from concentrate discharge to surface waters. Without rigorous scientific research to identify specific potential environmental impacts (or a lack of impacts), planners cannot assess the feasibility of desalination at a site or determine what additional mitigation steps are needed. Once potential impacts are clearly understood, research can be focused on developing approaches to minimize these impacts. The second goal focuses on the cost of desalination relative to the cost of other water supply alternatives. At present, costs are already low enough to make desalination an attractive option for some communities, especially where concentrate management costs are modest. In fact, desalination plants are being studied or implemented in at least 30 municipalities nationwide (GWI, 2007). The economic costs of desalination, however, as well as the costs of water supply alternatives, are locally variable. Costs are influenced by factors such as source water quality, siting considerations, potential environmental impacts, local regulations and permitting requirements, and available concentrate management op- OCR for page 214 Desalination: A National Perspective tions. Desalination remains a higher-cost alternative for many locations, and increasing awareness of potential environmental impacts is raising the costs of permitting and intake and outfall configurations in the United States. Inland communities considering brackish groundwater desalination may soon face more restrictions on surface water discharge and, therefore, will have fewer low-cost alternatives for concentrate management. Meanwhile, the future costs of energy are uncertain. If the total costs of desalination (including environmental costs) were reduced relative to other alternatives, desalination technology would become an attractive alternative to help address local water supply needs. STRATEGIC DESALINATION RESEARCH AGENDA The committee identified research topics as part of a strategic agenda to address the two long-term research goals articulated earlier. This agenda is driven by determination of what is necessary to make desalination a competitive option among other water supply alternatives. The agenda is broadly conceived, including research topics of clear interest to the public sector—and therefore of interest for federal funding—and research that might be most appropriately funded by private industry. The suggested research areas are described in detail below and are summarized in Box 8-1. Specific recommendations on the roles of federal and nonfederal organizations in funding the agenda are described in an upcoming section. BOX 8-1 Priority Research Areas The committee has identified priority research areas to help make desalination a competitive option among water supply alternatives for communities facing water shortages. These research areas, which are described in more detail in the body of the chapter, are summarized here. The highest priority topics are shown in bold. Some of this research may be most appropriately supported by the private sector. The research topics for which the federal government should have an interest—where the benefits are widespread and where no private-sector entities are willing to make the investments and assume the risk—are marked with asterisks. GOAL 1. Understand the environmental impacts of desalination and develop approaches to minimize these impacts relative to other water supply alternatives Assess environmental impacts of desalination intake and concentrate management approaches** OCR for page 215 Desalination: A National Perspective Conduct field studies to assess environmental impacts of brackish groundwater development** Develop protocols and conduct field studies to assess the impacts of concentrate management approaches in inland and coastal settings** Develop laboratory protocols for long-term toxicity testing of whole effluent to assess long-term impacts of concentrate on aquatic life** Assess the environmental fate and bioaccumulation potential of desalination-related contaminants** Develop improved intake methods at coastal facilities to minimize impingement of larger organisms and entrainment of smaller ones** Assess the quantity and distribution of brackish water resources nationwide** Analyze the human health impacts of boron, considering other sources of boron exposure, to expedite water-quality guidance for desalination process design** GOAL 2. Develop approaches to lower the financial costs of desalination so that it is an attractive option relative to other alternatives in locations where traditional sources of water are inadequate Improve pretreatment for membrane desalination Develop more robust, cost-effective pretreatment processes Reduce chemical requirements for pretreatment Improve membrane system performance Develop high-permeability, fouling-resistant, high-rejection, oxidant-resistant membranes Optimize membrane system design Develop lower-cost, corrosion-resistant materials of construction Develop ion-selective processes for brackish water Develop hybrid desalination processes to increase recovery Improve existing desalination approaches to reduce primary energy use Develop improved energy recovery technologies and techniques for desalination Research configurations and applications for desalination to utilize low-grade or waste heat** Understand the impact of energy pricing on desalination technology over time** Investigate approaches for integrating renewable energy with desalination** Develop novel approaches or processes to desalinate water in a way that reduces primary energy use** GOAL 1 and 2 Crosscuts Develop cost-effective approaches for concentrate management that minimize potential environmental impacts** OCR for page 216 Desalination: A National Perspective Research on Environmental Impacts The following research topics address Goal 1 to understand the environmental impacts of desalination and develop approaches to minimize those impacts relative to other water supply alternatives. Assess environmental impacts of desalination intake and concentrate management approaches As discussed in Chapter 5, the environmental impacts of desalination source water intake and concentrate management approaches are not well understood. Source water intakes for coastal desalination can create entrainment concerns with small organisms and impingement issues for larger organisms. For inland groundwater desalination, there are potential concerns regarding overpumping, water quality changes, and subsidence. The possible environmental impacts of concentrate management approaches range from effects on aquatic life in surface water discharges to the contamination of drinking water aquifers in poorly designed injection wells or ponds. Both site-specific studies and broad analyses of relative impacts would help communities weigh the alternatives for meeting water supply needs. The specific research needs are described as follows. 1a. Conduct field studies to assess environmental impacts of seawater intakes. Measurements and modeling of the extent of mortality of aquatic or marine organisms due to impingement and entrainment are needed. There have been numerous studies on such impacts of power plants, and extrapolation of such effects to desalination facilities should be performed. 1b. Conduct field studies to assess environmental impacts of brackish groundwater development. The general environmental interactions between wetlands, freshwater, and brackish aquifers for inland sources have not been documented under likely brackish water development scenarios. While site-specific evaluation of any location will be necessary for developing a brackish water resource, the lack of synthesized information is an impediment to the use of this resource for smaller communities with limited resources. 1c. Develop protocols and conduct field studies to assess the impacts of concentrate management approaches in inland and coastal settings. Comprehensive studies analyzing impacts of concentrate discharge at marine, estuarine, and inland desalination locations are needed. OCR for page 217 Desalination: A National Perspective Adequate site-specific baseline studies on potential biological and ecological effects are necessary prior to the development of desalination facilities because biological communities in different geographic areas will have differential sensitivity, but a comprehensive synthesis would be valuable once several in-depth studies have been conducted. Protocols should be developed to define the baseline and operational monitoring, reference sites, lengths of transects, and sampling frequencies. Planners would benefit from clear guidance on appropriate monitoring and assessment protocols. Environmental data should be collected for at least 1 year in the area of the proposed facility before a desalination plant with surface water concentrate discharge comes online so that sufficient baseline data on the ecosystem are available with which to compare postoperating conditions. Once a plant is in operation, monitoring of the ecological communities (especially the benthic community) receiving the concentrate should be performed periodically for at least 2 years at multiple distances from the outflow pipe and compared to reference sites. For inland settings, additional regional hydrogeology research is needed on the distribution, thickness, and hydraulic properties of formations that could be used for disposal of concentrate via deep-well injection. Much information is already available about the potential for deep-well injection in states such as Florida and Texas, although suitable geologic conditions may exist in other states as well. Inventories of industrial and commercial brine-disposal wells and producing and abandoned oil fields should be synthesized and used to develop a suitable protocol for further hydrogeological investigations, as appropriate. This research would provide valuable assistance to small communities that typically do not have the resources available to support extensive hydrogeological investigations. 1d. Develop laboratory protocols for long-term toxicity testing of whole effluent to assess long-term impacts of concentrate on aquatic life. Standard acute toxicity tests as defined by the U.S. Environmental Protection Agency (EPA) are generally 96 hours in duration and use larval or juvenile stages of certain fish and invertebrate species with a series of effluent dilutions and a control. The end point is whether the test organisms survive or not. Chronic tests, according to EPA, are typically 7 days in duration when using larval stages of fish and invertebrate species, and the end points of the tests are sublethal, such as growth reduction. Typical chronic toxicity protocols were designed for testing municipal or industrial wastewater treatment plant effluent, which typically contains higher levels of toxic chemicals than the concentrate from desalination plants. To assess the impacts of desalination effluent, a protocol should be developed to analyze the longer-term effects (over whole life cycles) on organisms that live in the vicinity of desalination plants (as opposed OCR for page 218 Desalination: A National Perspective to the standard species used in EPA-required toxicity testing). These laboratory-based tests should then be used to examine the impacts of whole effluent (and various dilutions) from different desalination plants on a variety of different taxa at numerous representative sites from key ecological regions. 1e. Assess the environmental fate and bioaccumulation potential of desalination-related contaminants. Desalination concentrate contains more than just salts and may include various chemicals that are used in pretreatment and membrane cleaning, antiscaling and antifoulant additives, and metals that may leach from corrosion. Some of these chemicals (e.g., antifoulants, copper leached from older thermal desalination plants) or chemical by-products (e.g., trihalomethanes produced as a result of pretreatment with chlorine) are likely to bioaccumulate in organisms. Investigations into the loading and environmental fate of desalination-related chemicals should be included in modeling and monitoring programs. The degree to which various chemicals biodegrade or accumulate in sediments should also be investigated. High priority should be given to polymer antiscalants, such as polycarbonic acids and polyphosphate, which may increase primary productivity. Corrosion-related metals and disinfection by-products should also be investigated. In conjunction with the field studies described earlier, representative species, preferably benthic infauna along the transects and from the reference (control) site, should be analyzed for bioaccumulative contaminants. Because little is known about the potential of some other desalination chemicals that can be discharged in concentrate to bioaccumulate (e.g., polyphosphate, polycarbonic acid, polyacrylic acid, polymaleic acid), research should be conducted into their toxicity and bioaccumulation potential. Develop improved intake methods at coastal facilities to minimize impingement of larger organisms and entrainment of smaller ones Although intake and screen technology is rapidly developing, continued research and development is needed in the area of seawater intakes to develop cost-effective approaches that minimize the impacts of impingement and entrainment for coastal desalination facilities. Current technology development has focused on subsurface intakes and advanced screens or curtains, and these recent developments should be assessed to determine the costs and benefits of the various approaches. Other innovative concepts could also be considered that might deter marine life from entering intakes. OCR for page 219 Desalination: A National Perspective Assess the quantity and distribution of brackish water resources nationwide Sustainable development of inland brackish water resources requires maps and synthesized information on total dissolved solids of the groundwater, types of dominant solutes (e.g., NaCl, CaSO4), thickness, and depth to brackish water. The only national map of brackish water resources available (Feth, 1965; Figure 1-1) simply shows depth to saline water. Newer and better solute chemistry data collected over the past 40 years exist in the files of private, state, and federal offices but are not generally organized for use in brackish water resources investigations. Using the aforementioned information, basin analyses, analogous to the U.S. Geological Survey Regional Aquifer System Analysis program for freshwater, could be developed, emphasizing regions facing near-term water scarcity concerns. These brackish water resource investigations could also be conducted at the state level. The data, once synthesized, could be utilized for desalination planning as well as for other water resources and commercial development scenarios. Analyze the human health impacts of boron, considering other sources of boron exposure, to expedite water-quality guidance for desalination process design Typical single-pass reverse osmosis (RO) desalination processes do not remove all the boron in seawater; thus, boron can be found at milligram-per-liter levels in the finished water. Boron can be controlled through treatment optimization, but that treatment has an impact on the cost of desalination. A range of water quality levels (0.5 to 1.4 mg/L) have been proposed as protective of public health based on different assumptions in the calculations. Because of the low occurrence of boron in most groundwater and surface water, the EPA has decided not to develop a maximum contaminant level for boron and has encouraged affected states to issue guidance or regulations as appropriate (see Chapter 5). Additional analysis of existing boron toxicity data is needed, considering other possible sources of boron exposure in the United States, to support guidance for desalination process design that will be suitably protective of human health. OCR for page 220 Desalination: A National Perspective Research to Lower the Costs of Desalination The following research topics address Goal 2 to develop approaches to lower the costs of desalination so that it is an attractive option relative to other alternatives in locations where traditional sources of water are inadequate. As a broadly conceived agenda, some of this research may be most appropriately supported by the private sector. The appropriate roles of governmental and nongovernmental entities to fund the research agenda are discussed later in the chapter. Improve pretreatment for membrane desalination Pretreatment is necessary to remove potential foulants from the source water, thereby ensuring sustainable operation of the RO membranes at high product water flux and salt rejection. Research to improve the pretreatment process is needed that would develop alternative, cost-effective approaches. 5a. Develop more robust, cost-effective pretreatment processes. Membrane fouling is one of the most problematic issues facing seawater desalination. Forms of fouling common with RO membranes are organic fouling, scaling, colloidal fouling, and biofouling. All forms of fouling are caused by interactions between the foulant and the membrane surface. Improved pretreatment that minimizes these interactions will reduce irreversible membrane fouling. Alteration of solution characteristics can improve the solubility of the foulants, preventing their precipitation or interaction with the membrane surface. Such alteration could be chemical, electrochemical, or physical in nature. Membranes such as microfiltration (MF) and ultrafiltration (UF) have several advantages over traditional pretreatment (e.g., conventional sand filtration) because they have a smaller footprint, are more efficient in removing smaller foulants, and provide a more stable influent to the RO membranes. Additional potential benefits of MF or UF pretreatment are increased flux, increased recovery, longer membrane life, and decreased cleaning frequency. More research is necessary in order to optimize the pretreatment membranes for more effective removal of foulants to the RO system, to reduce the fouling of the pretreatment membranes, and to improve configuration of the pretreatment membranes to maximize cost reduction. 5b. Reduce chemical requirements for pretreatment. Antiscalants, coagulants, and oxidants (such as chlorine) are common chemicals OCR for page 221 Desalination: A National Perspective applied in the pretreatment steps for RO membranes. Although these chemicals are added to reduce fouling, they add to the operational costs, can reduce the operating life of membranes, and have to be disposed of properly or they can adversely impact aquatic life (see Chapter 5). Antiscalants may also enhance biofouling, so alternative formulations or approaches should be examined. Research is needed on alternative formulations or approaches (including membrane pretreatment) to reduce the chemical requirements of the pretreatment process, both to reduce overall cost and to decrease the environmental impacts of desalination. Improve membrane system performance Sustainable operation of the RO membranes at the designed product water flux and salt rejection is a key to the reduction of desalination process costs. In addition to effective pretreatment, research to optimize the sustained performance of the RO membrane system is needed. 6a. Develop high-permeability, fouling-resistant, high-rejection, oxidant-resistant membranes. New membrane designs could reduce the treatment costs of desalination by improving membrane permeability and salt rejection while increasing resistance to fouling and membrane oxidation. Current membrane research to reduce fouling includes altering the surface charge, increasing hydrophilicity, adding polymers as a barrier to fouling, and decreasing surface roughness. Oxidant-resistant membranes enable feedwater to maintain an oxidant residual that will reduce membrane fouling due to biological growth. Current state-of-the-art thin-film composite desalination membranes are polyamide based and therefore are vulnerable to damage by chlorine or other oxidants. Thus, when an oxidant such as chlorine is added to reduce biofouling, dechlorination is necessary to prevent structural damage. Additionally, trace concentrations of chlorine may be present in some feedwaters. Cellulose-derivative RO membranes have much higher chlorine tolerance; however, these membranes have a much lower permeability than thin-film composite membranes and operate under a narrower pH range. Therefore, there is a need to increase the oxidant tolerance of the higher-permeability membranes. Lower risk of premature membrane replacement equates to overall lower operating costs. Past efforts to synthesize RO membranes with high permeability often resulted in reduced rejection and selectivity. There is a need to develop RO membranes with high permeability without sacrificing selectivity or rejection efficiency. Recent research on utilizing nanomaterials, such as carbon nanotubes, as a separation barrier suggest the possibility OCR for page 222 Desalination: A National Perspective of obtaining water fluxes much higher than that of traditional polymeric membranes. The development of membranes that are more resistant to degradation from exposure to cleaning chemicals will extend the useful life of a membrane module. The ability to clean membranes more frequently can also decrease energy usage because membrane fouling results in higher differential pressure loss through the modules. By extending the life of membrane modules, the operating and maintenance cost will be reduced by the associated reduction in membrane replacements required. 6b. Optimize membrane system design. With the development of high-flux membranes and larger-diameter membrane modules, new approaches for optimal RO system design are needed to avoid operation under thermodynamic restriction (see Chapter 4) and to ensure equal distribution of flux between the leading and tail elements of the RO system. The key variables for the system design will involve the choice of optimal pressure, the number of stages, and number and size of membrane elements at each stage. An optimal system configuration may also involve hybrid designs where one type of membrane (e.g., intermediate flux, highly fouling-resistant) is used in the leading elements followed by high-flux membranes in the subsequent elements. Fouling can be mitigated by maintaining high crossflow velocity; thus, fouling-resistant membranes may be better served in the downstream positions where lower crossflow velocity is incurred. Thus, additional engineering research on membrane system design is needed to optimize performance with the objective of reducing costs. 6c. Develop lower-cost, corrosion-resistant materials of construction. The duration of equipment life in a desalination plant directly relates to the total costs of the project. Saline and brackish water plants are considered to be a corrosive environment due to the high levels of salts in the raw water. The development and utilization of corrosion-resistant materials will minimize the frequency of equipment or appurtenance replacement, which can significantly reduce the total project costs. 6d. Develop ion-selective processes for brackish water. Some slightly brackish waters could be made potable simply though specific removal of certain contaminants, such as nitrate or arsenite, while removing other ions such as sodium, chloride, and bicarbonate at a lower rate. High removal rates of all salts are not necessary for such waters. Ion-specific separation processes, such as an ion-selective membrane or a selective ion-exchange resin, should be able to produce potable water at much lower energy costs than those processes that fully desalinate the OCR for page 223 Desalination: A National Perspective source water. Ion-selective removal would also create fewer waste materials requiring disposal. Ion-selective processes would be useful for mildly brackish groundwater sources with high levels of nitrate, uranium, radium, or arsenic. Such an ion-selective process could also be used to optimize boron removal following RO desalination of seawater. 6e. Develop hybrid desalination processes to increase recovery. Overall product water recovery in a desalination plant can be increased through the serial application of more than one desalination process. For example, an RO process could be preceded by a “tight” nanofiltration process, allowing the RO to operate at a higher recovery than it could with less aggressive pretreatment. Other options could be devised, including hybrid thermal and membrane processes to increase the overall recovery of the process. As noted in Chapter 4, the possible hybrid combinations of desalination processes are limited only by ingenuity and identification of economically viable applications. Hybridization also offers opportunities for reducing desalination production costs and expanding the flexibility of operations, especially when co-located with power plants, but hybridization also increases plant complexity and raises challenges in operation and automation. Improve existing desalination approaches to reduce primary energy use Energy is one of the largest annual costs in the desalination process. Thus, research to improve the energy efficiency of desalination technologies could make a significant contribution to reducing costs. 7a. Develop improved energy recovery technologies and techniques for desalination. Membrane desalination is an energy-intensive process compared to treatment of freshwater sources. Modern energy recovery devices operate at up to 96 percent energy recovery (see Chapter 4), although these efficiencies are lower at average operating conditions. The energy recovery method in most common use today is the energy recovery (or Pelton) turbine, which achieves about 87 percent efficiency. Many modern plants still use Pelton wheels because of the higher capital cost of isobaric devices. Thus, opportunities exist to improve recovery of energy from the desalination concentrate over a wide operating range and reduce overall energy costs. 7b. Research configurations and applications for desalination to utilize low-grade or waste heat. Industrial processes that produce waste or low-grade heat may offer opportunities to lower the operating cost of OCR for page 224 Desalination: A National Perspective the desalination process if these heat sources are co-located with desalination facilities (see Box 4-8). Low-grade heat can be used as an energy source for desalination via commercially available thermal desalination processes. Hybrid membrane-thermal desalination approaches offer additional operational flexibility and opportunities for water-production cost savings. Research is needed to examine configurations and applications of current technologies to utilize low-grade or waste heat for desalination. 7c. Understand the impact of energy pricing on existing desalination technology over time. Energy is one of the largest components of cost for desalination, and future changes in energy pricing could significantly affect the affordability of desalination. Research is needed to examine to what extent the economic and financial feasibility of desalination may be threatened by the uncertain prospect of energy price increases in the future for typical desalination plants in the United States. This research should also examine the costs and benefits of capital investments in renewable energy sources. 7d. Investigate approaches for integrating renewable energy with desalination. Renewable energy sources could help mitigate future increases in energy costs by providing a means to stabilize energy costs for desalination facilities while also reducing the environmental impacts of water production. Research is needed to optimize the potential for coupling various renewable energy applications with desalination. Develop novel approaches or processes to desalinate water in a way that reduces primary energy use Because the energy of RO is only twice the minimum energy of desalination, even novel technologies are unlikely to create step change (>25 percent) reductions in absolute energy consumption compared to the best current technology (see, e.g., Appendix A). Instead, substantial reductions in the energy costs of desalination are more likely to come through the development of novel approaches or processes that optimize the use of low-grade heat. Several innovative desalination technologies that are the focus of ongoing research, such as forward osmosis, dewvaporation, and membrane distillation, have the capacity to use low-grade heat as an energy source. Research into the specific incorporation of waste or low-grade heat into these or other innovative processes could greatly reduce the amount of primary energy required for desalination and, thus, overall desalination costs. OCR for page 225 Desalination: A National Perspective Crosscutting Research Research topics in this category benefit both Goal 1, for environmental impacts, and Goal 2, for lowering the cost of desalination. Develop cost-effective approaches for concentrate management that minimize potential environmental impacts Research objectives related to concentrate management are crosscutting, because they address both the need to understand and minimize environmental impacts and the need to reduce the total cost of desalination. For coastal concentrate management, research is needed to develop improved diffuser technologies and subsurface injection approaches and to examine their costs and benefits relative to current disposal alternatives. The high cost of inland concentrate management inhibits inland brackish water desalination. Low- to moderate-cost concentrate management alternatives (i.e., subsurface injection, land application, sewer discharge, and surface water discharge) can be limited by the salinity of the concentrate and by location and climate factors; in some scenarios all of these options may be restricted by site-specific conditions, leaving zero liquid discharge (ZLD) as the only alternative for consideration. ZLD options currently include evaporation ponds and energy-intensive processes, such as brine concentrators or crystallizers, followed by landfilling. These options have high capital or operating costs. Research to improve recovery in the desalination process and thereby minimize the initial volume of concentrate could enhance the practical viability of several concentrate management options for inland desalination. This is particularly true for the concentrate management options that are characterized by high costs per unit volume of the concentrate flow treated and for approaches that are not applicable to large concentrate flows, such as thermal evaporation or evaporation ponds. Advancements are also needed that reduce the capital costs and improve the energy efficiency of thermal evaporation processes. Conventional concentrate management options that involve simple equipment are not likely to see significant cost reductions through additional research. The reuse of high-salinity concentrates and minerals extracted from them should be further explored and developed to help mitigate environmental impacts while generating revenues that can help offset concentrate management costs. Possibilities include selective precipitation of marketable salts, irrigation of salt-tolerant crops, supplements for animal dietary needs, dust suppressants, stabilizers for road base construction, or manufacture of lightweight fire-proof building materials. Studies are OCR for page 226 Desalination: A National Perspective necessary to determine the most feasible uses and to develop ways to prepare the appropriate product for various types of reuse. For all possible uses, site-specific limitations and local and state regulations will need to be considered. Because the transportation costs greatly affect the economics of reuse, a market analysis would also be needed to identify areas in the United States that could reasonably utilize products from desalination concentrate. Highest Priority Research Topics All of the topics identified are considered important, although three topics (1, 2, and 9 above) were deemed to be the highest priority research topics: (1) assessing the environmental impacts of desalination intake and concentrate management approaches, (2) developing improved intake methods to minimize impingement and entrainment, and (3) developing cost-effective approaches for concentrate management that minimize environmental impacts. These three research areas are considered the highest priorities because this research can help address the largest barriers (or showstoppers) to more widespread use of desalination in the United States. Uncertainties about potential environmental impacts will need to be resolved and cost-effective mitigation approaches developed if desalination is to be more widely accepted. Research to develop cost-effective approaches for concentrate management is critical to enable more widespread use of desalination technologies for inland communities. As noted in Chapter 4, the cost of concentrate management can double or triple the cost of the desalination for some inland communities. Research may also reduce the costs of desalination. Any cost improvement will help make desalination an attractive option for communities addressing water shortages. However, the committee does not view these process cost issues as the major limitation to the application of desalination in the United States today. IMPLEMENTING THE RESEARCH AGENDA In the previous section, the committee proposed a broad research agenda that, if implemented, should improve the capacity of desalination to meet future water needs in the United States by further examining and addressing its environmental impacts and reducing its costs relative to other water supply alternatives. Implementing this agenda requires federal leadership, but its success depends on participation from a range of entities, including federal, state, and local governments, nonprofit or- OCR for page 227 Desalination: A National Perspective ganizations, and the private sector. A strategy for implementing the research agenda is suggested in the following section. This section also includes suggestions for funding the agenda and the appropriate roles of government and nongovernmental entities. Supporting the Desalination Research Agenda A federal role is appropriate for research that provides a “public good.” Specifically, the federal government should have an interest in funding research where the benefits are widespread but where no private-sector entities are willing to make the investment and assume the risks. Thus, for example, research that results in significant environmental benefits should be in the federal interest because these benefits are shared by the public at large and cannot be fully captured by any entrepreneur. Federal investment is also important where it has “national significance”—where the issues are of large-scale concern; they are more than locally, state-, or regionally specific; and the benefits accrue to a large swath of the public. Based on the aforementioned criteria, the proposed research agenda contains many topic items that should be in the federal interest (see topics marked with asterisks in Box 8-1). The research topics in support of Goal 1 (see Box 8-1) are directed at environmental issues that are largely “public good” issues. Some of the needed environmental research will, by nature, be site-specific, and purely site-specific research is not of great federal interest. Thus, there is a clear role for state and local agencies to support site-specific research. The federal government, however, should have an interest in partnering with local communities to conduct more extensive field research from which broader conclusions of environmental impacts can be drawn or which would significantly contribute to a broader meta-analysis. This meta-analysis could especially benefit small water supply systems. Also, there should be federal interest in establishing general protocols for field evaluations and chronic bioassays that could then be adapted for site-specific studies. The research needed to support the attainment of Goal 2 includes several topics that are clearly in the federal interest, as defined earlier. These include efforts to reduce prime energy use, to integrate renewable energy resources within the total energy picture and increase reliance upon them, and to understand the impacts of energy pricing on the future of desalination (see highlighted topics in Box 8-1). However, Goal 2 also includes a number of research topics that may be more appropriately funded by the private sector or nongovernmental organizations, assuming that these entities are willing to assume the risks of the research investment. Indeed, private industry already spends far more on research and OCR for page 228 Desalination: A National Perspective development for desalination than the federal government (see Chapter 2) and is already making substantial progress in the improvement of existing membrane performance, developing better pretreatment alternatives, and developing improved energy recovery devices. To avoid duplication and to optimize available research funding, government programs should focus instead on research and development with widespread possible benefits that would otherwise go unfunded because private industry is unwilling to make the investment. Finally, the crosscutting topic to develop cost-effective methods of managing concentrates for inland communities, which impacts Goals 1 and 2, is also in the federal interest. Federal Research Funding The optimal level of federal investment in desalination research is inherently a question of public policy. Although the decision should be informed by science, it is not—at its heart—a scientific decision. However, several conclusions emerged from the committee’s analysis of current research and development funding (see Chapter 2) that suggest the importance of strategic integration of the research program. The committee concluded that there is no integrated and strategic direction to the federal desalination research and development efforts. Continuation of a federal program of research dominated by congressional earmarks and beset by competition between funding for research and funding for construction will not serve the nation well and will require the expenditure of more funds than necessary to achieve specified goals. To ensure that future federal investments in desalination research are integrated and prioritized so as to address the two major goals identified in this report, the federal government will need to develop a coordinated strategic plan that utilizes the recommendations of this report as a basis. It is beyond the committee’s scope to recommend specific plans for improving coordination among the many federal agencies that support desalination research. Instead, responsibility for developing the plan should rest with the Office of Science and Technology Policy’s (OSTP’s) National Science and Technology Council (NSTC) because “this Cabinet-level Council is the principal means within the executive branch to coordinate science and technology policy across the diverse entities that make up the Federal research and development enterprise.”1 For example, the NSTC’s Subcommittee on Water Availability and Quality has member-ship representing more than 20 federal agencies and recently released “A Strategy for Federal Science and Technology to Support Water Avail- 1 For more information, see http://www.ostp.gov/nstc/index.html. OCR for page 229 Desalination: A National Perspective ability and Quality in the United States” (SWAQ, 2007). Representatives of the National Science Foundation, the Bureau of Reclamation, the Environmental Protection Agency, the National Oceanographic and Atmospheric Administration, the Office of Naval Research, and the Department of Energy should participate fully in the development of the strategic federal plan for desalination research and development. Five years into the implementation of this plan, the OSTP should evaluate the status of the plan, whether goals have been met, and the need for further funding. A coordinated strategic plan governing desalination research at the federal level along with effective implementation of the research plan will be the major determinants of federal research productivity in this endeavor. The committee cannot emphasize strongly enough the importance of a well-organized, well-articulated strategically directed effort. In the absence of any or all of these preconditions, federal investment will yield less than it could. Therefore, a well-developed and clearly articulated strategic research plan, as called for above, should be a precondition for any new federal appropriations. Initial federal appropriations on the order of recent spending on desalination research (total appropriations of about $25 million annually, as in fiscal years 2005 and 2006) should be sufficient to make good progress toward the overall research goals if the funding is strategically directed toward the proposed research topics as recommended in this report. Annual federal appropriations of $25 million, properly allocated, should be sufficient to have an impact in the identified priority research areas, given the context of expected state and private-sector funding. This level of federal funding is also consistent with NRC (2004a), which recommended annual appropriations of $700 million for research supporting the nation’s entire water resources research agenda. Reallocation of current spending will be necessary to address topics that are currently underfunded. If current research funding is not reallocated, the overall desalination research and development budget will need to be enhanced. Nevertheless, support for the research agenda stated here should not come at the expense of other high-priority water resource research topics, such as those identified in Confronting the Nation’s Water Problems: The Role of Research (NRC, 2004a). Environmental research should be emphasized up front in the research agenda. At least 50 percent of the federal funding for desalination research should initially be directed toward environmental research. Environmental research, including Goal 1 and the Goal 1 and 2 crosscuts, should be addressed, because these have the potential for the greatest impact in overcoming current roadblocks for desalination and making desalination an attractive water supply alternative. Research funding in support of Goal 2 should be directed strategically toward research topics that are likely to make improvements against benchmarks set by the best OCR for page 230 Desalination: A National Perspective current technologies for desalination. The best available technologies for desalination at the time of this writing are benchmarked in Chapter 4. Research proposals should make the case as to how and to what degree the proposed research can advance the state of the art in desalination. An emphasis should be placed on energy benchmarks because reductions in energy result in overall cost savings and have environmental benefits. The majority of the federal funding directed toward Goal 2 should support projects that are in the public interest and would not otherwise be privately funded (see Box 8-1), such as some high-risk and long-term research initiatives (e.g., developing novel desalination processes that sharply reduce the primary energy use). Although private industry does make modest investments in high-risk research, it is frequently reluctant to invest in research in the earliest stage of technology creation, when there is extremely low likelihood of success even though there are large potential benefits. The effectiveness with which federal funds are spent will also depend on certain critical implementation steps, which are outlined in the following section. Proposal Announcement and Selection Based on available funding, the opportunity to announce requests for proposals exists for federal agencies, such as the Bureau of Reclamation or the National Science Foundation, or other research institutions that explicitly target one or more research objectives. The principal funding agency should announce a request for proposals as widely as possible to scientists and engineers in municipal and federal government, academia, and private industry. At present, the desalination community is relatively small, but collectively there is a great deal of expertise across the world. International desalination experts and others from related areas of research should be encouraged and given the opportunity to offer innovative research ideas that have the potential to significantly advance the field. Thus, the request for proposals should extend to federal agencies, national laboratories, other research institutions, utilities, and the private sector. Since innovation cannot be preassigned, broad solicitations for proposals should include a provision for unsolicited investigator-initiated research proposals. To achieve the objectives of the research agenda, proposals should be selected through a rigorous independent peer-review process (NRC, 2002b) irrespective of the agency issuing the request for proposals. A rotating panel of independent, qualified reviewers should be appointed based on their relevant expertise in the focal areas. The process should OCR for page 231 Desalination: A National Perspective allow for the consideration and review of unsolicited proposals, as long as their research goals meet the overall research goals. Proposal funding should be based on the quality of the proposed work, the degree to which the proposed research can advance the state of the art in desalination or otherwise contribute toward the research goals, prior evidence of successful research, and the potential for effective publication or dissemination of the research findings. CONCLUSIONS AND RECOMMENDATIONS A strategic national research agenda has been conceived that centers around two overarching strategic goals for further research in desalination: (1) to understand the environmental impacts of desalination and develop approaches to minimize these impacts relative to other water supply alternatives and (2) to develop approaches to lower the financial costs of desalination so that it is an attractive option relative to other alternatives in locations where traditional sources of water are inadequate. A research agenda is proposed in this chapter in support of these two goals (see Box 8-1). Several recommendations for implementing the proposed research agenda follow. A coordinated strategic plan should be developed to ensure that future federal investments in desalination research are integrated and prioritized and address the two major goals identified in this report. The strategic application of federal funding for desalination research can advance the implementation of desalination technologies in areas where traditional sources of water are inadequate. Responsibility for developing the plan should rest with the OSTP, which should use the recommendations of this report as a basis for plan development. Initial federal appropriations on the order of recent spending on desalination research (total appropriations of about $25 million annually) should be sufficient to make good progress toward these goals, when complemented by ongoing nonfederal and private-sector desalination research, if the funding is directed toward the proposed research topics as recommended in this chapter. Reallocation of current federal spending will be necessary to address currently underfunded topics. If current federal research and development funding is not reallocated, new appropriations will be necessary. However, support for the research agenda stated here should not come at the expense of other high-priority water resource research topics. Five years into the implementation of this plan, the OSTP should evaluate the status of the plan, whether goals have been met, and the need for further funding. OCR for page 232 Desalination: A National Perspective Environmental research should be emphasized up front when implementing the research agenda. Uncertainties regarding environmental impacts and ways to mitigate these impacts are one of the largest hurdles to implementation of desalination in the United States, and research in these areas has the greatest potential for enabling desalination to help meet future water needs in communities facing water shortages. This environmental research includes work to understand environmental impacts of desalination intakes and concentrate management, the development of improved intake methods to minimize impingement and entrainment, and cost-effective concentrate management technologies. Research funding in support of reducing the costs of desalination (Goal 2) should be directed strategically toward research topics that are likely to make improvements against benchmarks set by the best current technologies for desalination. Because the private sector is already making impressive strides toward Goal 2, federal research funding should emphasize the long-term and high-risk research that may not be attempted by the private sector and that is in the public interest, such as research on novel technologies that significantly reduce prime energy use. Wide dissemination of requests for proposals to meet the goals of the research agenda will benefit the quality of research achieved. Requests for proposals should extend to federal agencies, national laboratories, research institutions, utilities, other countries, and the private sector. Investigator-driven research through unsolicited proposals should be permitted throughout the proposal process. Proposals should be peer-reviewed and based on quality of research proposed, the potential contribution, prior evidence of successful research, and effective dissemination.
<urn:uuid:c71c1a01-b722-41d4-aac2-009fd7362c0e>
CC-MAIN-2013-20
http://www.nap.edu/openbook.php?record_id=12184&page=212
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.921676
9,950
2.546875
3
Water is driven to find the shortest and quickest course from source to mouth and the Mississippi River is no exception. The river is fighting against modern engineering as it continues to crest. If it were allowed to flow freely, New Orlean's Atchafalaya River would capture the main flow of the Mississippi. However, thanks to a feat of modern engineering, the great river is forced to follow its current path through Baton Rouge and New Orleans. Some researchers believe the likelihood of major flooding increases each year due to this tension between water and engineering. Craig Colten is Carl O. Sauer professor of Geography at Louisiana State University and author of "An Unnatural Metropolis: Wresting New Orleans from Nature."
<urn:uuid:6d2fc9ae-f36c-4779-8f8c-44613e252d5a>
CC-MAIN-2013-20
http://www.thetakeaway.org/2011/may/11/man-vs-nature-along-mississippi-delta/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958688
144
3.359375
3
Florida, in the United States of America. It includes a widely diverse area from quiet, unpopulated central areas with "Old Florida" feel to vibrant resort cities. The climate of South Florida, due to its situation just above the Tropic of Cancer, is subtropical. During most of the year, there is substantial warmth and humidity, due to the common rainfall in the area. However, winter is much drier, and is prone to cold snaps that could bring the temperature as low as the 20sF. In the wintertime, weather is generally around 75F and nights are around 57F, with low humidity, and occasional very cold temperatures (as mentioned above) that kills tropical foliage, like coconut palms, and animals. The water temperature at this time is about 70F. Spring sees higher humidity and some more rain, with temperatures around 80F and nighttime lows in the 60s, with water temperatures of 75F. Summer is the most humid time of year due to frequent rainstorms, and sees temperatures around 90F, with water temperatures of 85F and nighttime lows of 80F. Fall has slightly less humidity, with water temperatures of around 80F, and similar weather to springtime ,though nights tend to be warmer, in the 70sF. However, fall is more likely to be affected by hurricanes and tropical storms, thus, still being pretty muggy. Some of the major cities in South Florida are: Other destinations South Florida has a subtropical wet-and-dry climate, which essentially means cold fronts from November through March are to be expected, and most of the year is warm and humid. The dry season begins in October and lasts through the third week in May, with famously mild winters. The hurricane season officially runs from June 1 through November 30, with the most likely time for South Florida to be hit being mid August through early October. A wide variety of languages are commonly spoken throughout South Florida with increasing diversity near the major cities. The City of Miami for example has three official languages: English, Spanish, and Haitian Creole. English, however, dominates and is the preferred language in South Florida. Even in areas where English is not the native language, most people will be bilingual in the other language (although generally not the other way around for native English speakers). The simplest way to get treated in English is to use the "approach rule." Most locals will respond only in the language they were summoned in unless they are not able to speak it. This rule can be used on anyone whether or not they were originally speaking Spanish, English, or any other language. In general the more south you go in South Florida (for instance, Miami-Dade), the more Spanish speakers there will be. Occasionally, you may run into someone who is not fluent in English. If this happens, simply speak slowly and use only simple English. In a few places, especially near Miami, you may find someone that cannot speak any English. Even when encountering a local who does not speak English, one could easily find another local to help with translation if needed without much effort, since most of the population is fluently bilingual. Get in By plane Miami International Airport, one of the busiest international airports in the world, is the main airport serving the Miami metropolitan area. Fort Lauderdale and Fort Myers, West Palm Beach, and Sarasota also have large airports. By train Amtrak provides inter-city rail service through all the major cities in South Florida. Two trains provide daily service, starting in Miami, making stops in Hollywood, Fort Lauderdale, Deerfield Beach, and West Palm Beach, continuing north to Tampa, Orlando, Jacksonville, and eventually Washington D.C., Baltimore, Philadelphia, with both trains terminating at New York City's Penn Station. All of South Florida's Amtrak stations (except Miami) share platforms with the regional commuter rail service, Tri-Rail. The Miami Amtrak Station is located in the industrial suburb of Hialeah on NW 32nd Ave, just north of NW 72nd St. By boat Coastal cities have excellent year-round marina facilities, often serving some of the largest and most luxurious yachts in the world. Miami is home to the Port of Miami, the largest cruise ship port in the world. Fort Lauderdale also has a cruise port. By bus Greyhound, America's major inter-city bus service provider, has stations at all the major cities in South Florida. At the West Palm Beach and Miami North (Golden Glades) stations, direct connections are available to South Florida's commuter rail service, Tri-Rail. The Miami Greyhound station is located on Le Juene Road (NW 42nd Ave), directly across from Miami International Airport. Service continues further south from Miami, all the way to Key West at the end of US Route 1. By car Get around Public transportation - Local public transportation includes Metrobus, Metromover, and Metrorail—an elevated rapid transit system—each operated by Miami-Dade Transit. There is also an commuter rail system named Tri-Rail, that runs north to south, from MIA all the way to West Palm Beach, making a stop at all three of the Gold Coast's international airports. Hire a car to explore the unique countryside areas. [add listing] See [add listing] Do [add listing] Eat Enjoy such meals such as a Cuban dish of ropa vieja (shredded flank steak in a tomato sauce base), black beans, yellow rice, plantains and fried yuca with beer. Get out
<urn:uuid:3114b571-b362-4893-8499-bad693d23367>
CC-MAIN-2013-20
http://wikitravel.org/en/South_Florida
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.952585
1,148
2.953125
3
A tip or gratuity is an amount of money that is given to a worker such as a waiter or waitress who performs a service for you. A common tip amount is 15% of the cost of the meal or other service. Generally a tip is determined based on the total bill which includes the cost of the meal and sales tax. If a meal costs $10.00 and sales tax is 5% the bill is $10.50. A 15% tip based on the $10.50 cost would be $1.58. The total would be $10.50 + $1.58 = $12.08. In the next lesson we will find how to quickly estimate the amount of a tip.
<urn:uuid:9cceece3-5a0f-46b8-bb16-f18d460378b6>
CC-MAIN-2013-20
http://www.aaamath.com/B/g68_tix1.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973764
151
2.90625
3
Nathan Lewis, Contributor I write about monetary and tax policy for the 21st century. For a number of years now, people have asked me whether I prefer a “flat tax” or a “fair tax.” Both are problematic. The “flat tax” is typically conceived as a replacement for the existing personal income tax. This is fine, but it ignores the payroll tax, which is really just another form of income tax. So, it is only half of an income tax reform. In practice, quite a few countries have gone this route, beginning especially with Russia in 2001, and the results have been very good. These countries have generally replaced their income tax systems, but have kept what amounts to relatively high payroll taxes. I would like to see a top-to-bottom income tax reform, which includes payroll taxes. Or, I should say, which does not include payroll taxes: I would like to see the payroll tax system eliminated entirely and integrated into a single income tax system. Neither Hong Kong nor Singapore, which are models of what can be achieved with a flat tax system (or nearly so in Singapore), have a payroll tax. The result is that taxation on the lowest incomes is very low, and the overall system has a high degree of progressivity despite modest top rates. Hong Kong’s flat tax system, with no payroll or sales/VAT taxes, generates about 13% of GDP in revenue per year, with a top tax rate of 16%. This is quite good, and shows excellent efficiency and high compliance. However, 13% of GDP is still rather short of the 18.5% of GDP that the U.S. Federal tax system has generated over the past several decades. So, we would have to decide either to reduce spending considerably — which might be nice, but is a separate discussion — or generate more revenue somehow. Now we come to the “Fair Tax,” a rather horrible name for a system which aims to generate all revenue from a single national VAT or sales tax. This would be equivalent to a 30% sales tax rate, as normally calculated (exclusive method). There are a lot of positive things to be said about the Fair Tax, especially the elimination of the IRS and all of the intrusive bookkeeping involved with the income tax. By maximizing the taxation on consumption, we would be theoretically minimizing the taxation on investment, capital, and employment, with potentially excellent results. The problems are that many states already have a sales tax (9.6% average rate in 2010), which means that the combined rate would either be 39.6% or that states would have to generate income by some other means. States also have income taxes, which presumably would be eliminated along with the federal income tax, thus generating another revenue issue. We end up with a rather impressively high sales tax rate, which raises the question of tax evasion — the higher the rate, the greater the incentive for evasion — and also the problem of regressivity, putting the largest burdens on the lowest incomes. I have argued in the past that conservatives should adopt the principle of progressivity as much as possible. The problem of “what to do with the poor” is as old as government itself. Instead of pretending the problem doesn’t exist, conservatives would do well to have their own, conservative-themed solution. Democrats promise government services and welfare, and we should recognize that that has had some success. So what should the conservative solution be? Even the most libertarian thinker can agree that, if you have no better solution – don’t take their money! I conclude that the problem with the Fair Tax is much the same as the problem with the Flat Tax — by itself, it can’t generate enough revenue without becoming a caricature of the original principle.
<urn:uuid:8b6521bd-9813-403c-95f6-88d37bce7acb>
CC-MAIN-2013-20
http://www.forbes.com/sites/nathanlewis/2011/10/13/flat-tax-vs-fair-tax-vs-herman-cains-9-9-9-plan/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.97663
785
2.546875
3
This volume is an invaluable reference for all those engaged in the areas of genetics, dysmorphology, pediatrics, and internal medicine. Dr Jones should be congratulated for perpetuating this great book initiated by one of the outstanding clinical geneticists, David Smith, MD, who may be considered the father of dysmorphology. The fifth edition of this book has been expanded, with updated references and superb illustrations. Chapter 1 includes information about the following topics: chromosomal abnormalities, small stature, senile and overgrowth syndromes, brain and neuromuscular abnormality syndromes, facial and limb defects, camptomelic syndrome, craniosynostosis, storage disorders, connective tissue and hamartomatous syndromes, ectodermal dysplasias, syndromes due to environmental agents, miscellaneous syndromes, and sequences and associations. An alphabetical listing of syndromes is also included in this chapter. Chapter 2 contains approaches to the categorical problems of growth deficiency, mental deficiency, arthrogryposis, and ambiguous external genitalia. Chapter 3 provides information about morphogenesis and dysmorphogenesis. Chapter 4 addresses the topics of genetics, genetic counseling, and prevention. Chapter 5 stresses that minor anomalies can be clues to more serious problems; they can lead to the recognition of malformation syndromes. Chapter 6 contains information about normal standards. Finally, a 74-page appendix is devoted to patterns of malformations and the differential diagnosis of anomalies.
<urn:uuid:d75f1701-4d0b-4ddc-a468-f8ddfc6a165e>
CC-MAIN-2013-20
http://archpedi.jamanetwork.com/article.aspx?articleid=189208
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.900232
309
2.875
3
Updates and changes to codes and standards that affect the way you design and install telecommunications systems Because bonding and grounding systems within a building are intended to have one electrical potential, coordination between electrical and telecommunications bonding and grounding systems is essential during design and installation. One way to coordinate these efforts is to follow industry-established codes and standards. But how do you know which ones to follow? This article presents a brief history and overview of the relevant codes and standards you should be familiar with as well as discusses recent developments that affect all designers and installers. Of course, the first relevant code is the National Electrical Code (NEC), which addresses bonding and grounding as minimum requirements for life safety. While ensuring public safety is the highest priority, the industry began to realize in the late 1980s and early 1990s that the electrical grounding requirements, while protecting end-users, were not protecting the end-user’s expensive electronic (IT) equipment. The industry addressed this concern by developing standards. While similar to a code, which is adopted by local states and municipalities into law, the use of a standard is voluntary. However, it may become a requirement for any given project, if the owner or designer/engineer lists it as such in the construction documents. One of the first standards to address bonding and grounding was IEEE 142, Recommended Practice for Grounding of Industrial and Commercial Power Systems (the Green Book) when Chapter 5 was added in the 1991 edition – Electronic Equipment Grounding. This addition primarily featured improved bonding and grounding practices for the power systems serving information technology (IT) equipment. The IEEE followed up with IEEE Standard 1100, Recommended Practice for Powering and Grounding Electronic Equipment (the Emerald Book) in 1992. IEEE 1100 expanded on the Green Book, explaining the issues with poor power quality, lightning, and other surges and different ground potentials on metallic data cabling. In 1994, the Telecommunications Industry Association (TIA) and the Electronic Industries Association (EIA) published ANSI/TIA/EIA-607, Commercial Building Grounding and Bonding Requirements for Telecommunications, which established the need for a dedicated telecommunications grounding and bonding system (see Main Components of a Telecommunications Grounding and Bonding System on page C27). This standard specified requirements for a ground reference (ground busbar) in each telecommunications space, including the telecommunications entrance room(s), telecommunications closets, and IT equipment rooms. It also established the bonding of telecommunications system pathways within the telecommunications spaces to the ground reference. The ANSI/TIA/EIA standard was revised in 2002 to become ANSI-J-STD-607-A, Commercial Building Grounding (Earthing) and Bonding Requirements for Telecommunications. The standard was developed jointly by TIA/EIA Working Group 41.7.2 in close coordination with the Alliance for Telecommunications Industry Solutions (ATIS) T1E1.5 and T1E1.7. The term “earthing” was used as the internationally accepted term for “grounding.” The major changes from ANSI/TIA/EIA-607 were greater grounding busbar detail, the addition of tower and antenna bonding and grounding recommendations, work area and personal operator-type equipment position grounding and bonding recommendations, and harmonized international terminology (although terminology from the NEC was retained). Nevertheless, the standard only addressed the connections from the electrical ground to the busbar in each telecommunications space — the connection from the busbar to the equipment was still missing. One of the glaring omissions from the standard was ensuring a quality installation. To address this issue, NECA and BICSI developed a joint standard, ANSI/NECA/BICSI-607, Standard for Telecommunications Bonding and Grounding Planning and Installation Methods for Commercial Buildings. Published in 2011, this standard provides limited planning information, but excels in eliciting installation requirements. For example, it clearly states how to ensure a bond to the busbar by using an antioxidant compound to the connection point using compression 2-hole lugs. From a planning perspective, the standard specifies bonding to a telecommunications rack and includes bonding and grounding information for data centers. However, one of the drawbacks is it was based upon ANSI-J-STD-607-A while the updated ANSI/TIA-607-B standard was in development and nearing publication. ANSI/TIA-607-B, Generic Telecommunications Bonding and Grounding (Earthing) for Customer Premises is by far the most encompassing telecommunications standard for bonding and grounding. Its requirements are for “generic” premises rather than for just a commercial building, and its purpose is to enable and encourage the planning, design, and installation of generic telecommunications bonding and grounding systems within premises. This is to address the basic grounding and bonding requirements without prior knowledge of the specific telecommunication or IT system that will be installed. While primarily intended to provide direction for the design of new buildings, this standard may be used for existing building renovations or retrofits. Design requirements and choices are provided to enable the designer to make informed design decisions. The ANSI/TIA-607-B standard covers regulatory requirements, an overview of a bonding and grounding system, the components involved, and design requirements. Additionally, performance and test requirements are covered, although simplistically. The TR-42.16 Subcommittee recognized this shortfall, and is already developing an addendum to this standard on: - soil resistivity testing using a 4-point method, - grounding electrode system design, - grounding electrode system resistance testing including the fall of potential method and use of the clamp-on test meter. Through these updates, there have been many changes to the components of a telecommunications bonding and grounding system. Busbar requirements were modified to be made of copper or copper alloys having a minimum of 95% conductivity when annealed, as specified by the International Annealed Copper Standard (IACS). While some manufacturers are offering a less expensive product made of other metals, copper is still the preferred material. Regardless of the material, the busbars must still be listed, and the dimensions of the telecommunications main grounding busbar (TMGB) and the telecommunications grounding busbar (TGB) have not changed. As for the connectors to these busbars, the surface of all bonding and grounding connectors used on a TMGB and TGB shall be of a material that provides an electrochemical potential of less than 300mV between connector and grounding busbar. Essentially, with these requirements, the standard is ensuring a well-performing bonding and grounding system. Conductor sizing is still 2kcmil per linear foot of conductor length, but the maximum size is now 750kcmil (Table). The previous edition of this standard sized the TBB conductor up to 3/0 AWG. The standard also states that the grounding conductors shall not decrease in size as the grounding path moves closer to earth, and the size of the conductor is not intended to account for the reduction or control of electromagnetic interference (EMI). The sizing of this conductor affects the: - BCT (bonding conductor for telecommunications) - TBB (telecommunications bonding backbone) - GE (ground equalizer) - Supplementary bonding network (found in computer rooms) - TEBC (telecommunications equipment bonding conductor) - UBC (unit bonding conductor) Design requirements for this standard include the entire system from the entrance point to the equipment in the rack within the telecommunications room. It also specifies that ANSI/NECA/BICSI-607 is to be used for bonding and grounding installation information. In order to limit the potential difference between telecommunications conduits or between telecommunications conduits and power conduits, the standard specifies that the telecommunications conduits shall be bonded to the TMGB/TGB. Additionally, to achieve the objectives of potential equalization, ensure that cable runway/ladder sections are bonded together to the TMGB/TGB. When the electric panelboard serving that telecommunications room is located in the same room or space as the TMGB/TGB, that panelboard’s alternating current equipment ground (ACEG) bus (when equipped) or the panelboard enclosure shall be bonded to the TMGB/TGB. A qualified electrician should install this bond. Informative annexes included with this standard have information on grounding electrodes, towers and antennas, telecommunications electrical protection, electrical protection for operator-type equipment positions, and a cross reference of more commonly used terms. For a designer of telecommunications bonding and grounding systems, the ANSI/TIA-607-B standard is the most encompassing standard to follow for premises buildings. Although there are many other guides (see Resources at a Glance below), standards are developed so that a consensus must be reached among industry expert volunteers. Although best practices may have valuable information, they typically have not been vetted among a large subset of industry experts. What does this mean for the electrical contractor? For anyone with a telecom division, it’s important to stay current on the telecommunications grounding standards. A well-designed system would include a telecommunications grounding detail and riser diagram (click here to see Figure), and specifications would list the most recent edition of the applicable standards. For drawings and specifications that are silent — or that may reference outdated standards or conflicting guidelines — the contractor should ask the design team for clarification (during the bid window, if possible) as to what sizing to follow for the TBB, because a change in conductor size may greatly affect cost. For electrical contractors subcontracting out the telecommunications work, the demarcation point for work between electrical and telecommunications contractors should be carefully coordinated. A recommended practice is for the electrical contractor to provide the grounding conductor and connection from the main electrical ground to the TMGB, as well as from an electrical panel in a telecommunications room to the grounding busbar in that room. The telecommunications contractor would then provide all of the grounding busbars and bonding conductors within and between the telecommunications rooms, as well as make all final connections to the TMGB, TGBs, and telecommunications infrastructure/equipment. Peterworth works in the Information Technology Services - Networking & Telecommunications department at the University of Texas at Austin in Austin, Texas. He can be reached at: firstname.lastname@example.org. SIDEBAR: Main Components of a Telecommunication Grounding and Bonding System The Telecommunications Main Grounding Busbar (TMGB) is typically located in the telecommunications entrance facility — where the telecommunications cables enter the building and need to transition to indoor-rated cables per Sec. 800.48 of the NEC, which limits unlisted cables to 50 ft or less. This busbar is pre-drilled and made of copper with a minimum of 4-in.-wide by ¼-in. -hick material of varying length. It is to be connected to the main electrical ground with an appropriately sized copper conductor. The entrance protectors from the outside cables and conduits are to be connected to this TMGB, as well as any other telecommunications equipment co-located in the entrance facility. (It is common practice for the entrance facility to also be the main network room for IT equipment.) In all other telecommunications rooms, there is to be a telecommunications grounding busbar (TGB), to be made of copper with pre-drilled holes and minimum dimensions of 2-in.-wide by ¼-in.-thick material of varying length. These are to be connected back to the TMGB through appropriately sized copper conductors that form the telecommunications bonding backbone (TBB), as shown in the Figure (click here to see Figure). In each telecommunications room, the ladder rack, equipment rack, entrance (lightning) protectors for the telecommunications lines, and even IT equipment are connected back to the TMGB or TGB with a bonding conductor. If either building steel or the electrical panel is available in the telecommunications room, they need to be connected back to the TMGB or TGB as well, with a minimum of 6 AWG copper conductor or larger. SIDEBAR: Resources at a Glance There are many standards and guidelines a designer may choose to specify. Here are a list of several that may be referenced for more specific project and installation applications: - ANSI/ATIS-0600334, Electrical Protection of Communications Towers and Associated Structures - ATIS 0600318, Electrical Protection Applied to Telecommunications Network Plant at Entrances to Customer Structures or Buildings - ATIS 0600321, Telecommunications – Electrical Protection for Network Operator-Type Equipment Positions - ATIS-0600313, Electrical Protection for Telecommunications Central Offices and Similar Type Facilities - EN 50310, Application of Equipotential Bonding and Earthing in Buildings with Information Technology Equipment - MIL-HDBK-419A, Grounding, Bonding, and Shielding for Electronic Equipments and Facilities Basic Theory - ANSI/IEEE 1100, 2005, Recommended Practice for Powering and Grounding Electronic Equipment - ANSI/IEEE C2, 2007, National Electrical Safety Code (NESC) - ANSI/ATIS 0600333, Grounding and Bonding of Telecommunications Equipment - ANSI/ATIS 0600334, 2008, Electrical Protection of Communications Towers and Associated Structures - ANSI/TIA/EIA-606-A, 2007, Administration Standard for the Telecommunications Infrastructure of Commercial Buildings - FIPS PUBS 94, 1983, Guideline on Electrical Power for ADP Installations, 1983 (USA Federal Information Processing Standards Publications) - ITU-T K.27, 1996, Bonding Configuration and Earthing Inside a Telecommunication Building
<urn:uuid:f45b504b-6d0e-4920-abee-5ddce87aed4d>
CC-MAIN-2013-20
http://ecmweb.com/bonding-amp-grounding/guidelines-grounding-and-bonding-telecom-systems
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.915175
2,822
2.671875
3
Oct. 10, 2008 Toxins in food often have a bad, bitter taste that makes people want to spit them out. New UC Irvine research finds that bitterness also slows the digestive process, keeping bad food in the stomach longer and increasing the chances that it will be expelled. This second line of defense in the gut against dietary toxins also triggers the production of a hormone that makes people feel full, presumably to keep them from eating more of the toxic food. This discovery has the potential to help scientists develop better therapies for ailments ranging from cancer to diabetes, and it may explain why certain isolated populations around the world have adapted to eat and enjoy local foods that taste bad to outsiders and make them sick. The study, appearing online Oct. 9 in the Journal of Clinical Investigation, was performed with mice, and the results probably translate to humans, said Timothy Osborne, molecular biology and biochemistry professor and study senior author. "We have evolved mechanisms to combat the ingestion of toxins in our food," Osborne said. "This provides a framework for an entirely new area of research on how our bodies respond to what is present in our diets." Mammals have evolved to dislike the bitter taste of toxins in food. This response is particularly important when they eat a lot of plant material, which tends to contain more bitter-tasting, potentially toxic ingredients than meat. Examples of bitter-tasting toxins include phenylthiourea, a compound that destroys the thyroid gland, and quinine, found in tonic water, which can be deadly in large doses. If toxins are swallowed, bitter-taste receptors in the gut sense them and trigger the production of a hormone called cholecystokinin that both suppresses appetite and slows the movement of food from the stomach to the small intestine. Interestingly, the UCI scientists found that cholesterol regulates the activity of bitter-taste receptors in the intestine, and diets high in plant material and potential toxins naturally are low in cholesterol, compared to low-toxin, high-cholesterol, meat-based diets. In small intestine cell cultures, low levels of cholesterol triggered a stronger receptor response – meaning they worked better – while high levels caused a weaker response. The same response was observed in mice that were given drugs to stop the production and absorption of cholesterol. Not only were their receptors more active, their small intestine cells produced two to three times the amount of the appetite-suppressing hormone in the presence of bitter food, compared to normal mice. Scientists say that regulation of taste receptors by dietary constituents likely explains why groups of people taste certain foods differently. "One group of people may think something tastes great and can metabolize it just fine, but a group from the outside may think it tastes horrible and get sick," Osborne said. "The first group likely adapted to the food through a change in the expression and pattern of their dietary sensing molecules." With this knowledge, scientists could make medicines less bitter, which in turn would allow for increased palatability and quicker absorption. Drugs used to treat cancer sometimes include molecules that taste bitter. Also, changing the patient's eating habits could improve the effectiveness of such drugs. In addition to the appetite-suppressing hormone, bitter-taste receptors in the gut activate the production of glucagon-like peptide 1, a protein that stimulates insulin secretion in the pancreas. Drugs currently are on the market that attempt to stabilize this protein in people with diabetes, and therapies aimed at increased production are attractive therapeutic targets. "Because bitter-taste receptors are expressed in the gut, a new avenue exists to identify ways to stimulate production of GLP-1," Osborne said. "It could be very beneficial for the treatment of diabetes and possibly other diseases." UCI scientists Tae-Il Jeon, Bing Zhu and Jarrod Larson also worked on this study, which was funded by the National Institutes of Health. Other social bookmarking and sharing tools: Note: Materials may be edited for content and length. For further information, please contact the source cited above. Note: If no author is given, the source is cited instead.
<urn:uuid:e5e05c02-34bb-4ef1-9472-197eea5d1ad7>
CC-MAIN-2013-20
http://www.sciencedaily.com/releases/2008/10/081009185032.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.949751
848
3.921875
4
By Bill Gregware President Obama's long-touted plan to put 1 million electric cars on the road by 2015 is hitting some bumps in road. The "bumps" are American consumers who are not convinced it's a good idea to plunk down an exorbitant amount of money on cars with multiple problems, including short driving ranges. Moreover, some energy experts claim electric cars do not make a net reduction in pollution or decrease overall use of fossil fuels because the electricity they need comes largely from fossil-fuel plants. Others claim electric cars are even counterproductive because there are several energy-wasting steps required to go from the original energy source to the car. For example, first is transferring the electricity from the power plant through transmission lines to a distant charging station (a home or other location), then transferring the energy to a battery and finally to the car. In contrast, gasoline goes directly into a car. Historians tell us that various EVs (electric vehicles) — tricycles, bicycles, carts, etc. — first appeared during the 1830s, with practical electric automobiles being developed around 1890. Electric cars were setting speed and distance records by the late 1890s. The 100- km per hour (62 mph) record was set by an electric car in 1899. Despite impressive speed records, the average electric cars were slow, mostly in the 20-mph range. Competitive vehicles on the market in those days included steam-driven cars, e.g., the Stanley Steamer, which took up to 45 minutes to get up a head of steam and then needed frequent water replenishing stops if driven for any distance. Primitive gasoline-driven cars were noisy (as were steam cars), dirty and hard to start, especially on cold mornings. Many drivers experienced broken arms when cars "backfired" while being cranked. Read more of this story and more! 7-Day Subscribers have FREE access to everything on rep-am.com and our E-Edition.CLICK HERE to register and activate your access,. Not a subscriber? You can purchase a single-day subscription for only $0.75 to read this and access all of our content and our E-Edition. CLICK HERE purchase a single day subscription. Become an electronic subscriber to the Republican-American for only $8 a month. CLICK HERE.
<urn:uuid:350bd8d6-51b0-4f6f-8e50-7a96280c8b1f>
CC-MAIN-2013-20
http://www.rep-am.com/articles/2012/11/15/commentary/679829.prt
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.956124
480
2.984375
3
Professor Keith Sagar gives Blake seminar Professor Keith Sagar, a legendary figure from the world of literary criticism, gave a seminar to A2 literature students on William Blake recently. His provocative and thought-provoking readings of Songs of Innocence and Experience gave students an idea of how literary criticism can be an act of creativity as well as analysis. What, for example, is the symbolism of a rose? After listening to students’ first thoughts, Professor Sagar steered the discussion into an exploration of an impressive range of possible meanings, all of which he rooted in examples from the history of literature. Rejecting modish nomenclature - “intertextuality” - Professor Sagar explained how writers had always read and been influenced by other writers (“of course writers actually read as well as wrote”). His no-nonsense approach did not, however, exclude complex theoretical frameworks. Having first convinced students of the way that particular symbols – the rose, tiger and worm, for example – may be found everywhere and at all periods of history, Professor Sagar expatiated on Jung’s theory of archetypes: how such symbols articulate human psychology and, in turn, shape human society. It is around such archetypal images, he argued, that Blake’s poetry revolves. But whilst Blake is a poet whose images have universal and timeless resonance, he is also a man of his time. Professor Sagar’s Blake is a visionary poet engaged in a mental fight against eighteenth-century dualistic thinking, raging against his age’s obsession with measurement and calculation (which Blake felt to be personified in the figure of Newton). As Professor Sagar gave his exposition of Blake’s “fourfold vision,” students quickly saw that Blake offered “a complete vision of reality in which there is a place for tigers and lambs,” a universe charged with imaginative energy, limitless potentiality and deep spirituality, and in which “innocence” can be “recovered at the far side of experience” – the opposite, in other words, of a mechanistic universe. Again the issue of the value of poetry arose. Professor Sagar’s answer was typically Blakean: “poetry has the task of having to re-spiritualise the world”. Students clearly enjoyed the seminar, and bought a number of his books. Professor Sagar was also the guest of the members of the Senior Essay Society, to whom he spoke in March of his literary friendship with Ted Hughes, whose letters to him (well over a hundred) are soon to be published by the British Library. Dr Paul Ellis, Head of English.
<urn:uuid:3223be62-5578-4080-8d16-88542ee94df8>
CC-MAIN-2013-20
http://www.stonyhurst.ac.uk/news/default.asp?storyID=75&pid=125&nid=2
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.967737
564
2.546875
3
Each May, the alpacas that graze the hills of Springside Farm in the town of Pompey are sheared of fleece that is spun into baby blankets, mittens and hats. Breeder Paulie Drexler has gathered 50 pounds of fiber remnants she didn’t use last year to send to volunteers who have been working to protect the Gulf Coast and its waters since the April 20 spill. The clippings will be stuffed into nylon stockings and tied together to make booms that help surround, contain and soak up the oil that is leaking into the ocean. Alpaca fleece has long been revered as warmer and lighter than wool, said Drexler, whose 55 alpacas can each produce up to 10 pounds of fiber a year. Prime fiber is spun into fine knits and woven garments; slightly less soft fibers are used for heavy blankets and jackets. The remnants — known as thirds — are too short or hairy to be used in garments, but can be processed to make rugs and for industrial uses such as oil spill remediation. The Alpaca Fiber Cooperative of North America has already sent 10,000 pounds of the material for the effort. Drexler hopes to send more after shearing her herd at the end of the month. She sees her alpacas as a renewable resource. “These animals eat something we can’t and turn it into something we can use,” she said. “That is about as green as you can get. There’s a use for everything.” The fiber recycling program also is being supported by hair salons across the country that can collect up to one pound each of human hair a day. Contact Alaina Potrikus at email@example.com or 470-3252.
<urn:uuid:d237f843-7c96-446c-bd2c-34a625be91f8>
CC-MAIN-2013-20
http://www.syracuse.com/news/index.ssf/2010/05/alpaca_fleece_from_pompey_farm.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.957497
378
2.578125
3
A unique study at the U of A. "Back, about 1993, we started studying methanogens as possible life forms on Mars," Kral says. Microorganisms, living in a test tube. But can they live on another planet? Professor Kral is trying to answer that question. "Well, this is our Pegasus chamber, it's a vaccuum chamber and we're able to take the pressure down to what we see on the surface of mars," Kral says standing next to the piece of machinery. "We could also cool this down to the temperatures on Mars." Kral recently received a grant from NASA, worth nearly $400,000. "This specific grant, I've been trying to get for about 15 years," Kral says. Which he, along with his team of researchers, and students can use to curb their curiosity and further their findings. "The bottom line would be to find out if our methanogens, or if some mutant of our methanogens, that might be resistant to radiation, could exist on mars," Kral adds. New York native Rebecca Mickol always knew she wanted to study astrobiology, and teaming up with Professor Kral truly allows her to go above and beyond. "Whenever, I go home and people ask what I'm studying, I'm like 'Life on Mars!" says second-year grad student Rebecca Mickol. Kral describes the challenge: "To me, looking for life out there. I can't imagine anything more exciting." Professor Kral plans to continue this type of research for the rest of his career. Research that is quite literally -- out of this world.
<urn:uuid:dd98bf51-4ecb-4584-845f-bbe9765374b8>
CC-MAIN-2013-20
http://nwahomepage.com/fulltext?nxd_id=372352&nxd_90162_start=50
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.968469
349
2.84375
3
Why is it that farmers competing in state and national soybean yield contests routinely grow 60 or even 85 bu. per acre yields when the national average is closer to 44? That’s the question that motivated some ground-breaking research by Fred Below, a crop physiologist at the University of Illinois. The wise-cracking, caffeinated professor presented his top-line results to a standing-room-only audience of farmers at last week’s 2013 Commodity Classic. There’s a lot more at stake in the answer to this question than a simple scientific inquiry. To feed an extra 2 billion mouths over the next 40 years, "we need to double the production of all grains," says Below. But at current rates of productivity gains, it will take 100 years to reach 85 bu. per acre. "Fortunately, there’s a lot of low-hanging fruit," says Below. In fact, nearly every tactic Below tried – whether it was adding more nitrogen or planting in denser rows – improved yields. The best course of action, he says, is "intelligent intensification," academic-speak for putting more of the right stuff in the ground at the right time. Before diving into his secrets, Below listed some "pre-requisites." He assumes that farmers are draining their fields properly, that they engage in early weed control – "no matter how satisfying it may be to let them grow then go out in the field and kill them with glyphosate" – and are maintaining proper pH levels for soils. Here’s a rundown on the six "secrets" Below revealed, one at a time. Because he figures everyone could guess weather was among the secrets, he lists it first. But it may belong at the top, since according to his studies it has a greater influence on yields than anything else. That’s unfortunate because it can’t be controlled. Fluctuating weather conditions in Below’s home state of Illinois have resulted deviations from trend-line yields of 0.7 bu. per acre over the past 20 years. Good weather, of course, influences early planting, which can create opportunities for early vegetative growth and node formation. "I think we need to plant earlier, but it’s the weather that determines the planting date," Below says. Even if you plant early, the professor says, you need to plant the right seed and protect it. The impact of heat and drought can be mitigated by management practices that promote strong root development, such as fertility, enhanced seed emergence, and disease control. Ethylene blocking compounds that alleviate corn stress may work on soybeans as well, he adds. But there’s nothing like a good rain in August. That’s what saved Below’s test crops last year. "When any of my agronomic schemes don’t work," he says, "I just blame the weather, and I’m usually right." Soil fertility, Below says, may be the most overlooked component of soybean management. "I don’t think we’re adequately fertilizing soybeans, or we’re losing a lot from corn," Below says. The popular approach of adding nitrogen during the growing season may backfire as well. "If you put in too much, in late June or early July, you can shut down the nodules. Then you wind up with worse performance." Soybeans obtain between 25 and 75% of plant nitrogen from the soil, with the balance supplied from symbiotic fixation. "When we get to 85 bu. per acre, we’re mining 100 pounds out of the soil," he says. Some growers, Below said, incorrectly believe that because they applied adequate fertilizer to their corn crop the preceding year that phosphorous (P) and potassium (K) fertility are less critical for soybean production. A typical fertilizer program for soybeans, for instance, might involve fertilizing the previous year’s corn crop with an equivalent of two years of fertilizer. A 230-bu. corn yield, however, removes nearly 100 pounds of P2O5 from every acre. This doesn’t leave much for the soybean crop in the second year. Many people think potassium is the key nutrient for soybeans, Below says. While it is important, corn stover could provide half the potassium that soybeans need. Phosphorus, he says, "is the biggest problem, and it’s probably due to the way we fertilize corn." Phosphorus is quickly immobilized in soil and may not be available in sufficient quantity. Below grew an additional 4.3 bu. per acre through better fertilization. Besides the weather, fertility is the most important variable he tested. Below believes that farmers don’t spend enough time researching soybean varieties. He found big differences in yield, even among varieties of the same maturity. Yields varied by as much as 20 bu. per acre when grown at the same location. Some variation was due to differences in susceptibility to diseases like white mold. But he also noted big differences between seeds with varying insect resistance. All told, Below attributes an additional 3.2 bu. per acre upside to selecting the right seed. 4. Enhance seed emergence and vigor Through the use of fungicidal, insecticidal and plant growth regulator seed treatments, early season growth and vigor will be protected from yield robbing stresses such as disease and insects. The professor says healthier leaves result in bigger seeds, which can dramatically improve yields. "It has a huge impact," he said. Below argues that insect and disease control is especially critical with soybeans because so many pests can limit yield or reduce grain quality. 5. Seed treatment Soybean seeds have their highest yield potential, of course, when first planted. After that, the basic idea is to relieve as much stress on the plants as possible. Seed treatments that promote seed germination, seedling establishment, and early vigor, help in this respect. Some fungicides and insecticides may also promote "physiological vigor," he says. "At my research site, when I had seed with a complete treatment, I saw an enormous improvement in yield." All told, the researcher attributes an increase of 2.6 bu. per acre to seed treatment. 6. Use narrow rows Below’s research turned up a distinct advantage to planting soybeans in narrow rows of 20 inches, rather than 30 inches. This allows more space between plants within a row and increased branching. That in turn creates more opportunities for precision fertilizer placement in a corn-soybean rotation. Twenty-inch rows also improve light interception, though reduced air circulation may create more pressure for disease. Though 15-inch soybean rows have gained in popularity in recent years, Below believes that there’s an advantage to planting both corn and soybeans in 20-inch rows. Farmers could use the same equipment for precision fertilizer placement. And by alternating crops, soybeans could take advantage of the residual fertility from the previous band. Unfortunately, farmers who employed all these secrets wouldn’t get a yield increase equal to the combined value of doing them individually. The whole, in other words, isn’t equal to a sum of the parts. But you do get some added benefit by combining approaches. For instance, in Below’s research, applying fungicide at the R3 growth stage improved yields by 2.1%. Applying insecticide at R3 resulted in a 3.7% yield increase. But doing both only improved yields by 3.8%. Soybean Yield Secrets In terms of yield percentage improvements |Fertility (extra N,P,S and Zn) |Variety (fuller maturity for region) |Foliar protection (fungicide and insecticide) |Seed treatment (fungicide, insecticide, and nematicide) |Row width (20-inch versus 30-inch) Read more information about Below and his research. For More Information
<urn:uuid:0969aaef-85aa-4166-9871-f7e0ca7be586>
CC-MAIN-2013-20
http://www.agweb.com/farmjournal/farm_journal_corn_college/article/6_secrets_to_higher_soybean_yields/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.947783
1,675
2.625
3
Avian Influenza (Bird Flu) | Situation Avian influenza is a viral disease transmitted by birds usually through feces or saliva. It is not usually passed on to humans, although it has been contracted by people who have handled infected birds or touched surfaces contaminated by the birds. In fact, avian (or H5N1) flu normally infects only birds and pigs. There are many different types of viruses and of these viruses, there are 15 subtypes. These form various combinations that are constantly changing. Our bodies develop immunity to these viruses and when we receive our annual flu shot, this boosts our immunity. But when a virus such as H5N1 comes along, it may merge with a flu that a human body already has and develop (or mutate) into a whole other subtype for which our body has not built immunity. This, then, is what has prompted the concerns of the public health community. The H5N1 virus is particularly contagious among birds and some strains are resistant to antiviral drugs. It has developed into an outbreak in domestic birds in many Asian countries. Among the humans who have been diagnosed with the disease, the mortality rate is almost 50%. The first sign of this flu is sudden, unexplained fever. What follows is slightly different for each person: For some, its body aches, cough and runny nose. For others, its diarrhea and vomiting. Several days after the first symptoms, respiratory problems will develop. There are currently no vaccines on the market to combat avian influenza. Two antiviral medications are used to treat the symptoms, but their effectiveness is uncertain. These medications are Oseltamivir (Tamiflu) and zanamivir (Relenza). The Florida Department of Health has prepared a plan for protecting the citizens of our state in the event there is an actual pandemic (worldwide flu epidemic). Portions of this plan include working with county health departments to provide local assistance; participating in the national stockpile initiative so that Tamiflu and Relenza are ready and waiting for distribution prior to an emergency; and ensuring our emergency communications system is up and running so public health officials and first responders will get real-time information they can For the latest, most trustworthy information about avian influenza, stay tuned to this Bureau of Epidemiology website, and these related links:
<urn:uuid:0beae288-5b74-4a86-93d5-33b9308140bc>
CC-MAIN-2013-20
http://www.doh.state.fl.us/disease_ctrl/epi/htopics/BirdFlu.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.938943
510
3.875
4
Mexico is one of the Latin America's richest sources for minerals and its mining industry has experienced a period of sustained growth. In 2010, Mexico exported $15.47 billion in minerals and growth is forecast to continue at least until 2015. Though the benefits have been enormous for Mexico's economy, the rise has in some cases been a burden thanks to the attention mining has garnered from crime syndicates. Cartels have begun targeting the industry more in recent years, kidnapping workers for ransom, extorting up to $37,000 a month in “security fees” from businesses, and stealing resources to sell on the black market. In recent cases, cartels have even been found to operate their own mines. For example, in May it was announced that the federal government had discovered several illegal coal mines in the northeastern state of Coahuila being run by criminal gangs. The amounts earned by gangs from exploiting the mining sector are considerable. In 2010, steel producers reported that $240 million worth of steel was stolen while an estimated $3 million in gold was lost to theft between 2008 and 2012 in Mexico. The rising number of cases has forced some companies, like Canada’s Goldcorp, to switch to aerial rather than ground transportation to avoid robberies. Others, like Torex Gold Resources, have ceased operations altogether in areas of Mexico that are deemed too risky. Once stolen, gangs can either sell the resources on the black market or attempt to integrate it into the legitimate commodity trade through the use of corrupt companies. In an example of the latter, Ignacio Lopez, a money launderer for the Familia Michoacana was arrested in October 2010 for allegedly selling illegally extracted iron ore·in the southwestern state of Michoacan. Lopez is believed to have worked with three companies to export iron ore to China. Combined, the companies reportedly exported over a million tons of illegally obtained iron ore that year, amounting to some $42 million. In addition to the profitability of mining, the industry has a particular allure for gangs as a way of laundering their money, as the Familia case indicates. Dirty cash can be converted into valuable minerals, which can then be moved and sold throughout the world. Illegally obtained minerals are also harder to trace than other, illicit commodities -- narcotics, trafficked humans -- which are typically moved via land, sea and air. The Mexican and US governments invest billions of dollars, including $1.4 billion for the US Border Patrol·alone, to police trafficking routes. Tracking the entry of illegally obtained minerals into the market and the complex relationship between cartels and legal mineral companies requires a far different level of investigation, though, than the simple inspection of vehicles for smuggled goods at the US-Mexico border. Adding to the complexity of the issue is the willing collaboration of some companies. In an interview with Reuters, Jesus del Campo, an official at the Ministry of Economy, explained that some foreign mining companies encourage illegal mining so they can operate in Mexico without having to obtain permits. The illegal mining phenomenon is by no means isolated to Mexico, but rather represents a dynamic of criminals diversifying their portfolios that has been seen elsewhere in the region. Colombia is perhaps the most notorious country for illegal mining operations with left-wing guerrillas and drug traffickers known to extort from, and operate their own mines. This well established practice prompted Colombia’s former national police chief Oscar Naranjo to label illegal mining Colombia’s greatest challenge.· Given the intense focus of Mexican and US authorities on drug interdiction, it is unlikely that organized crime will leave mining anytime soon, especially in light of the numerous financial benefits and difficulty in tracing these activities. As long as the demand and price for mineral resources stays high, mining will simply be too lucrative a prospect for gangs in Mexico to ignore.
<urn:uuid:1cc5e660-5157-492d-aa5f-a949d4c2dbe0>
CC-MAIN-2013-20
http://www.insightcrime.org/news-analysis/mexican-gangs-set-their-sights-on-illegal-mining
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.961885
778
2.84375
3
Table of Contents PC-style floppy disks work mostly like other disk devices like hard disks, except that you need to low-level format them first. To use an common 1440 KB floppy in the first floppy drive, first (as root) format it: #fdformat -f /dev/rfd0a Then create a single partition on the disk using disklabel(8): #disklabel -rw /dev/rfd0a floppy3 Creating a small filesystem optimized for space: #newfs -m 0 -o space -i 16384 -c 80 /dev/rfd0a Now the floppy disk can be mounted like any other disk. Or if you already have a floppy disk with an MS-DOS filesystem on it that you just want to access from NetBSD, you can just do something like this: #mount -t msdos /dev/fd0a /mnt However, rather than using floppies like normal (bigger) disks, it is often more convenient to bypass the filesystem altogether and just splat an archive of files directly to the raw device. E.g.: #tar cvfz /dev/rfd0a file1 file2 ... A variation of this can also be done with MS-DOS floppies using sysutils/mtools package which has the benefit of not going through the kernel buffer cache and thus not being exposed to the danger of the floppy being removed while a filesystem is mounted on it. See if your system has a ZIP drive: dmesg | grep -i zipsd0 at atapibus0 drive 1: <IOMEGA ZIP 100 ATAPI, , 14.A> type 0 direct removable Seems it has one, and it's recognized as sd0, just like any SCSI disk. The fact that the ZIP here is an ATAPI one doesn't matter - a SCSI ZIP will show up here, too. The ZIP is marked as "removable", which means you can eject it with: Insert ZIP disk Check out what partitions are on the ZIP: #/dev/rsd0d: type: ATAPI ... 8 partitions: #size offset fstype [fsize bsize cpg] d: 196608 0 unused 0 0 # (Cyl. 0 - 95) h: 196576 32 MSDOS # (Cyl. 0*- 95) disklabel: boot block size 0 disklabel: super block size 0 is the whole disk, as usual on i386. is what you want, and you can see it's a msdos filesystem even. Hence, use /dev/sd0h to access the zip's partition. mount -t msdos /dev/sd0h /mnt Access your files: ls -la /mnttotal 40809 drwxr-xr-x 1 root wheel 16384 Dec 31 1979 . drwxr-xr-x 28 root wheel 1024 Aug 2 22:06 .. -rwxr-xr-x 1 root wheel 1474560 Feb 23 1999 boot1.fs -rwxr-xr-x 1 root wheel 1474560 Feb 23 1999 boot2.fs -rwxr-xr-x 1 root wheel 548864 Feb 23 1999 boot3.fs -rwxr-xr-x 1 root wheel 38271173 Feb 23 1999 netbsd19990223.tar.gz Unmount the ZIP: Eject the ZIP: Data CDs can contain anything from programs, sound files (MP3, wav), movies (MP3, QuickTime) to source code, text files, etc. Before accessing these files, a CD must be mounted on a directory, much like hard disks are. Just as hard disks can use different filesystems (ffs, lfs, ext2fs, ...), CDs have their own filesystem, "cd9660". The NetBSD cd9660 filesystem can handle filesystems without and with Rockridge and Joliet extensions. CD devices are named /dev/cd0a for both SCSI and IDE (ATAPI). With this information, we can start: See if your system has some CD drive: dmesg | grep ^cdcd0 at atapibus0 drive 0: <CD-R/RW RW8040A, , 1.12> type 5 cdrom removable cd0: 32-bit data port cd0: drive supports PIO mode 4, DMA mode 0 cd0(pciide0:1:0): using PIO mode 0, DMA mode 0 (using DMA data transfers) We have one drive here, "cd0". It is an IDE/ATAPI drive, as it is found on atapibus0. Of course the drive (rather, its medium) is removable, i.e., you can eject it. See below. Insert a CD Mount the CD manually: mount -t cd9660 /dev/cd0a /mnt This command shouldn't print anything. It instructs the system to mount the CD found on /dev/cd0a on /mnt, using the "cd9660" filesystem. The mountpoint "/mnt" must be an existing directory. Check the contents of the CD: ls /mntINSTALL.html INSTALL.ps TRANS.TBL boot.catalog INSTALL.more INSTALL.txt binary installation Everything looks fine! This is a NetBSD CD, of course. :) Unmount the CD: If the CD is still accessed (e.g. some other shell's still "cd"'d into it), this will not work. If you shut down the system, the CD will be unmounted automatically for you, there's nothing to worry about there. Making an entry in /etc/fstab: If you don't want to type the full "mount" command each time, you can put most of the values into a line in /etc/fstab: # Device mountpoint filesystem mount options /dev/cd0a /cdrom cd9660 ro,noauto Make sure that the mountpoint, /cdrom in our Now you can mount the cd with the following command: Access and unmount as before. The CD is not mounted at boot time due to the "noauto" mount option - this is useful as you'll probably not have a CD in the drive all the time. See mount(8) and mount_cd9660(8) for some other useful options. Eject the CD: If the CD is still mounted, it will be unmounted if possible, before being ejected. Use mscdlabel(8) to add all sessions to the CDs then use the appropriate device node to mount the session you want. You might have to create the corresponding device nodes in mscdlabel cd1track (ctl=4) at sector 142312 adding as 'a' track (ctl=4) at sector 0 adding as 'b' ls -l /dev/cd1bls: /dev/cd1b: No such file or directory ls -l cd1*brw-r----- 1 root operator 6, 8 Mar 18 21:55 cd1a brw-r----- 1 root operator 6, 11 Mar 18 21:55 cd1d mknod cd1b b 6 9 Make sure you fix the permissions of any new device nodes you create: ls -l cd1*brw-r----- 1 root operator 6, 8 Mar 18 21:55 cd1a brw-r--r-- 1 root wheel 6, 9 Mar 18 22:23 cd1b brw-r----- 1 root operator 6, 11 Mar 18 21:55 cd1d chgrp operator cd1b chmod 640 cd1b ls -l cd1*brw-r----- 1 root operator 6, 8 Mar 18 21:55 cd1a brw-r----- 1 root operator 6, 9 Mar 18 22:24 cd1b brw-r----- 1 root operator 6, 11 Mar 18 21:55 cd1d Now you should be able to mount it. mount /dev/cd1b /mnt By default, NetBSD only allows "root" to mount a filesystem. If you want any user to be able to do this, perform the following steps: Give groups and other the access rights to the device. #chmod go+rw /dev/cd0a Ask NetBSD to let users mounting filesystems. #sysctl -w vfs.generic.usermount=1 Note that this works for any filesystem and device, not only for CDs with a ISO 9660 filesystem. To perform the mount operation after these commands, the user must own the mount point. So, for example: $mount -t cd9660 -o nodev,nosuid /dev/cd0a `pwd`/cdrom The mount options nosuid are mandatory from NetBSD 4.0 on. They are not necessary on NetBSD 3.x systems. Sometimes, it is interesting to mount an ISO9660 image file before you burn the CD; this way, you can examine its contents or even copy files to the outside. If you are a Linux user, you should know that this is done with the special loop filesystem. NetBSD does it another way, using the vnode pseudo-disk. We will illustrate how to do this with an example. Suppose you have an ISO image in your home directory, called "mycd.iso": Start by setting up a new vnode, "pointing" to the ISO file: vnconfig -c vnd0 ~/mycd.iso Now, mount the vnode: mount -t cd9660 /dev/vnd0a /mnt Yeah, image contents appear under Go to that directory and explore the image. When you are happy, you have to umount the image: And at last, deconfigure the vnode: vnconfig -u vnd0 Note that these steps can also be used for any kind of file that contains a filesystem, not just ISO images. To play MPEG Video streams as many DVD players can play them under NetBSD, mount the CD as you would do with any normal (data) CD (see Section 13.3, “Reading data CDs with NetBSD”), then use the package to play the mpeg files stored on the CD. There are two ways to handle audio CDs: Tell the CD drive to play to the headphone or to a soundcard, to which CDROMs are usually connected internally. Use programs like cdplay(1), multimedia/kdemultimedia3 package, mixer programs like mixerctl(1), the Curses based or kmix, which is part of This usually works well on both SCSI and IDE (ATAPI) CDROMs, CDRW and DVD drives. To read ("rip") audio tracks in binary form without going through digital->analog conversion and back. There are several programs available to do this: For most ATAPI, SCSI and several proprietary CDROM drives, the audio/cdparanoia package can be used. With cdparanoia the data can be saved to a file or directed to standard output in WAV, AIFF, AIFF-C or raw format. Currently the -g option is required by the NetBSD version of cdparanoia. A hypothetical example of how to save track 2 as a WAV file is as follows: cdparanoia -g /dev/rcd0d 2 track-02.wav If you want to grab all files from a CD, cdparanoia's batch mode is useful: cdparanoia -g /dev/rcd0d -B For ATAPI or SCSI CD-ROMs the audio/cdd package can be used. To extract track 2 with cdd, type: cdd -t 2 `pwd` This will put a file called in the current directory. For SCSI CD-ROMS the audio/tosha package can be used. To extract track 2 with tosha, you should be able to type: tosha -d-t 2 -o track-02.cda The data can then be post-processed e.g. by encoding it into MP3 streams (see Section 13.9, “Creating an MP3 (MPEG layer 3) file from an audio CD”) or by writing them to CD-Rs (see Section 13.11, “Using a CD-R writer to create audio CDs”). The basic steps in creating an MPEG layer 3 (MP3) file from an audio CD (using software from the NetBSD packages collection) are: Extract (rip) the audio data of the CD as shown in Section 13.8, “Using audio CDs with NetBSD”. Convert the CD audio format file to WAV format. You only need to perform this job if your ripping program (e.g. tosha, cdd) didn't already do the job for you! $sox -s -w -c 2 -r 44100 -t cdr track-02.cda track-02.wav This will convert in raw CD format to track-02.wav in WAV format, using signed 16-bit words with 2 channels at a sampling Encode the WAV file into MP3 format. $bladeenc -128 -QUIT track-02.wav This will encode MP3 format, using a bit rate if for bladeenc describes bit-rates in more detail. $lame -p -o -v -V 5 -h track-02.wav track-02.mp3 You may wish to use a lower quality, depending on your taste and hardware. The process of writing a CD consists of two steps: First, a "image" of the data must be generated, which can then be written to CD-R in a second step. Reading an pre-existing ISO image dd if=/dev/rcd0a of=filename.iso bs=2k Alternatively, you can create a new ISO image yourself: Generating the ISO image Put all the data you want to put on CD into one directory. Next you need to generate a disk-like ISO image of your data. The image stores the data in the same form as they're later put on CD, using the ISO 9660 format. The basic ISO9660 format only understands 8+3 filenames (max. eight letters for filename, plus three more for an extension). As this is not practical for Unix filenames, a so-called "Rockridge Extension" needs to be employed to get longer filenames. (A different set of such extension exists in the Microsoft world, to get their long filenames right; that's what's known as Joliet filesystem). The ISO image is created using the mkisofs command, which is part Example: if you have your data in /usr/tmp/data, you can generate a ISO image file in /usr/tmp/data.iso with the following command: $mkisofs -o data.iso -r data Using NETBS000.GZ;1 for data/binary/kernel/netbsd.INSTALL.gz (netbsd.INSTALL_TINY.gz) Using NETBS001.GZ;1 for data/binary/kernel/netbsd.GENERIC.gz (netbsd.GENERIC_TINY.gz) 5.92% done, estimate finish Wed Sep 13 21:28:11 2000 11.83% done, estimate finish Wed Sep 13 21:28:03 2000 17.74% done, estimate finish Wed Sep 13 21:28:00 2000 23.64% done, estimate finish Wed Sep 13 21:28:03 2000 ... 88.64% done, estimate finish Wed Sep 13 21:27:55 2000 94.53% done, estimate finish Wed Sep 13 21:27:55 2000 Total translation table size: 0 Total rockridge attributes bytes: 5395 Total directory bytes: 16384 Path table size(bytes): 110 Max brk space used 153c4 84625 extents written (165 Mb) Please see the mkisofs(8) man page for other options like noting publisher and preparer. The Bootable CD ROM How-To explains how to generate a bootable CD. Writing the ISO image to CD-R When you have the ISO image file, you just need to write it on a CD. This is done with the "cdrecord" command from the Insert a blank CD-R, and off we go: cdrecord -v dev=/dev/rcd0d data.iso... After starting the command, 'cdrecord' shows you a lot of information about your drive, the disk and the image you're about to write. It then does a 10 seconds countdown, which is your last chance to stop things - type ^C if you want to abort. If you don't abort, the process will write the whole image to the CD and return with a shell prompt. Note that cdrecord(8) works on both SCSI and IDE (ATAPI) drives. Mount the just-written CD and test it as you would do with any "normal" CD, see Section 13.3, “Reading data CDs with NetBSD”. If you want to make a backup copy of one of your audio CDs, you can do so by extracting ("ripping") the audio tracks from the CD, and then writing them back to a blank CD. Of course this also works fine if you only extract single tracks from various CDs, creating your very own mix CD! The steps involved are: If you have converted all your audio CDs to MP3 and now want to make a mixed CD for your (e.g.) your car, you can do so by first converting the .mp3 files back to .wav format, then write them as a normal audio CD. The steps involved here are: Create .wav files from your .mp3 files: mpg123 -w foo.wav foo.mp3 Do this for all of the MP3 files that you want to have on your audio CD. The .wav filenames you use don't matter. Write the .wav files to CD as described under Section 13.11, “Using a CD-R writer to create audio CDs”. To copy an audio CD while not introducing any pauses as mandated by the CDDA standard, you can use cdrdao for that: cdrdao read-cd --device /dev/rcd0d data.toc cdrdao write --device /dev/rcd1d data.toc If you have both a CD-R and a CD-ROM drive in your machine, you can copy a data CD with the following command: cdrecord dev=/dev/rcd1d /dev/rcd0d Here the CD-ROM (cd0) contains the CD you want to copy, and the CD-R (cd1) contains the blank disk. Note that this only works with computer disks that contain some sort of data, it does not work with audio CDs! In practice you'll also want to add something like speed=8" to make things a bit You can treat a CD-RW drive like a CD-R drive (see Section 13.10, “Using a CD-R writer with data CDs”) in NetBSD, creating images with mkisofs(8) and writing them on a CD-RW medium with cdrecord(8). If you want to blank a CD-RW, you can do this with cdrecord's cdrecord dev=/dev/rcd0d blank=fast There are several other ways to blank the CD-RW, call cdrecord(8) with blank=help" for a list. See the cdrecord(8) man page for more information. Currently, NetBSD supports DVD media through the ISO 9660 also used for CD-ROMs. The new UDF filesystem also present on DVDs has been supported since NetBSD 4.0. Information about mounting ISO 9660 and UDF filesystems can be found in the mount_cd9660(8) and mount_udf(8) manual pages respectively. DVDs, DivX and many avi files be played with For some hints on creating DVDs, see this postings about growisofs and this article about recording CDs and DVDs with NetBSD. To create an ISO image and save the checksum do this: readcd dev=/dev/cd0d f=/tmp/cd.iso Here is an alternative using dd(1): dd if=/dev/cd0d of=/tmp/cd.iso bs=2048 If the CD has errors you can recover the rest with this: dd if=/dev/cd0d of=/tmp/cd.iso bs=2048 conv=noerror To create an ISO image from a mounted data CD first, mount the CD disk by: mount -t cd9660 -r /dev/cd0d /mnt/cdrom Second, get the image: mkhybrid -v -l -J -R -o /tmp/my_cd.iso /mnt/cdrom/ You can read the volume data from an unmounted CD with this command: file -s /dev/cd0d You can read the volume data from an ISO image with this command: isoinfo -d -i /tmp/my_cd.iso You can get the unique disk number from an unmounted CD with this: You can read the table of contents of an unmounted CD with this command: cdrecord -v dev=/dev/cd0d -toc
<urn:uuid:3c62147d-5e85-4345-a6d1-3473f0468d6f>
CC-MAIN-2013-20
http://www.uk.netbsd.org/docs/guide/en/chap-rmmedia.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.818382
4,731
2.71875
3
|This article may be expanded with text translated from the corresponding article in the German Wikipedia. (January 2012)| ||This article needs additional citations for verification. (February 2007)| ||This article needs attention from an expert in Psychology. (October 2009)| Gestalt psychology or gestaltism (German: Gestalt – "essence or shape of an entity's complete form") is a theory of mind and brain of the Berlin School; the operational principle of gestalt psychology is that the brain is holistic, parallel, and analog, with self-organizing tendencies. The principle maintains that the human eye sees objects in their entirety before perceiving their individual parts, suggesting the whole is greater than the sum of its parts. Gestalt psychology tries to understand the laws of our ability to acquire and maintain stable percepts in a noisy world. Gestalt psychologists stipulate that perception is the product of complex interactions among various stimuli. Contrary to the behaviorist approach to understanding the elements of cognitive processes, gestalt psychologists sought to understand their organization (Carlson and Heth, 2010). The gestalt effect is the form-generating capability of our senses, particularly with respect to the visual recognition of figures and whole forms instead of just a collection of simple lines and curves. In psychology, gestaltism is often opposed to structuralism. The phrase "The whole is greater than the sum of the parts" is often used when explaining gestalt theory, though this is a mistranslation of Kurt Koffka's original phrase, "The whole is other than the sum of the parts". Gestalt theory allows for the breakup of elements from the whole situation into what it really is. The concept of gestalt was first introduced in contemporary philosophy and psychology by Christian von Ehrenfels (a member of the School of Brentano). The idea of gestalt has its roots in theories by David Hume, Johann Wolfgang von Goethe, Immanuel Kant, David Hartley, and Ernst Mach. Max Wertheimer's unique contribution was to insist that the "gestalt" is perceptually primary, defining the parts it was composed from, rather than being a secondary quality that emerges from those parts, as von Ehrenfels's earlier Gestalt-Qualität had been. Both von Ehrenfels and Edmund Husserl seem to have been inspired by Mach's work Beiträge zur Analyse der Empfindungen (Contributions to the Analysis of Sensations, 1886), in formulating their very similar concepts of gestalt and figural moment, respectively. On the philosophical foundations of these ideas see Foundations of Gestalt Theory (Smith, ed., 1988). Early 20th century theorists, such as Kurt Koffka, Max Wertheimer, and Wolfgang Köhler (students of Carl Stumpf) saw objects as perceived within an environment according to all of their elements taken together as a global construct. This 'gestalt' or 'whole form' approach sought to define principles of perception—seemingly innate mental laws that determined the way objects were perceived. It is based on the here and now, and in the way things are seen. Images can be divided into figure or ground. The question is what is perceived at first glance: the figure in front, or the background. These laws took several forms, such as the grouping of similar, or proximate, objects together, within this global process. Although gestalt has been criticized for being merely descriptive, it has formed the basis of much further research into the perception of patterns and objects (Carlson et al. 2000), and of research into behavior, thinking, problem solving and psychopathology. Gestalt therapy The founders of Gestalt therapy, Fritz and Laura Perls, had worked with Kurt Goldstein, a neurologist who had applied principles of Gestalt psychology to the functioning of the organism. Laura Perls had been a Gestalt psychologist before she became a psychoanalyst and before she began developing Gestalt therapy together with Fritz Perls. The extent to which Gestalt psychology influenced Gestalt therapy is disputed, however. In any case it is not identical with Gestalt psychology. On the one hand, Laura Perls preferred not to use the term "Gestalt" to name the emerging new therapy, because she thought that the gestalt psychologists would object to it; on the other hand Fritz and Laura Perls clearly adopted some of Goldstein's work. Thus, though recognizing the historical connection and the influence, most gestalt psychologists emphasize that gestalt therapy is not a form of gestalt psychology. Theoretical framework and methodology The investigations developed at the beginning of the 20th century, based on traditional scientific methodology, divided the object of study into a set of elements that could be analyzed separately with the objective of reducing the complexity of this object. Contrary to this methodology, the school of gestalt practiced a series of theoretical and methodological principles that attempted to redefine the approach to psychological research. The theoretical principles are the following: - Principle of Totality—The conscious experience must be considered globally (by taking into account all the physical and mental aspects of the individual simultaneously) because the nature of the mind demands that each component be considered as part of a system of dynamic relationships. - Principle of psychophysical isomorphism – A correlation exists between conscious experience and cerebral activity. Based on the principles above the following methodological principles are defined: - Phenomenon experimental analysis—In relation to the Totality Principle any psychological research should take as a starting point phenomena and not be solely focused on sensory qualities. - Biotic experiment—The school of gestalt established a need to conduct real experiments that sharply contrasted with and opposed classic laboratory experiments. This signified experimenting in natural situations, developed in real conditions, in which it would be possible to reproduce, with higher fidelity, what would be habitual for a subject. Support from cybernetics and neurology In the 1940s and 1950s, laboratory research in neurology and what became known as cybernetics on the mechanism of frogs' eyes indicate that perception of 'gestalts' (in particular gestalts in motion) is perhaps more primitive and fundamental than 'seeing' as such: - A frog hunts on land by vision... He has no fovea, or region of greatest acuity in vision, upon which he must center a part of the image... The frog does not seem to see or, at any rate, is not concerned with the detail of stationary parts of the world around him. He will starve to death surrounded by food if it is not moving. His choice of food is determined only by size and movement. He will leap to capture any object the size of an insect or worm, providing it moves like one. He can be fooled easily not only by a piece of dangled meat but by any moving small object... He does remember a moving thing provided it stays within his field of vision and he is not distracted. Cyberneticist Valentin Turchin points out that the gestalts observed in what we usually imagine are 'still images' are exactly the kind of 'moving objects' that make the frog's retina respond: - The lowest-level concepts related to visual perception for a human being probably differ little from the concepts of a frog. In any case, the structure of the retina in mammals and in human beings is the same as in amphibians. The phenomenon of distortion of perception of an image stabilized on the retina gives some idea of the concepts of the subsequent levels of the hierarchy. This is a very interesting phenomenon. When a person looks at an immobile object, "fixes" it with his eyes, the eyeballs do not remain absolutely immobile; they make small involuntary movements. As a result the image of the object on the retina is constantly in motion, slowly drifting and jumping back to the point of maximum sensitivity. The image "marks time" in the vicinity of this point. Emergence is the process of complex pattern formation from simpler rules. It is demonstrated by the perception of the dog picture, which depicts a Dalmatian dog sniffing the ground in the shade of overhanging trees. The dog is not recognized by first identifying its parts (feet, ears, nose, tail, etc.), and then inferring the dog from those component parts. Instead, the dog is perceived as a whole, all at once. However, this is a description of what occurs in vision and not an explanation. Gestalt theory does not explain how the percept of a dog emerges. Reification is the constructive or generative aspect of perception, by which the experienced percept contains more explicit spatial information than the sensory stimulus on which it is based. For instance, a triangle is perceived in picture A, though no triangle is there. In pictures B and D the eye recognizes disparate shapes as "belonging" to a single shape, in C a complete three-dimensional shape is seen, where in actuality no such thing is drawn. Reification can be explained by progress in the study of illusory contours, which are treated by the visual system as "real" contours. Multistability (or multistable perception) is the tendency of ambiguous perceptual experiences to pop back and forth unstably between two or more alternative interpretations. This is seen for example in the Necker cube, and in Rubin's Figure/Vase illusion shown here. Other examples include the Three-legged blivet and artist M. C. Escher's artwork and the appearance of flashing marquee lights moving first one direction and then suddenly the other. Again, gestalt does not explain how images appear multistable, only that they do. Invariance is the property of perception whereby simple geometrical objects are recognized independent of rotation, translation, and scale; as well as several other variations such as elastic deformations, different lighting, and different component features. For example, the objects in A in the figure are all immediately recognized as the same basic shape, which are immediately distinguishable from the forms in B. They are even recognized despite perspective and elastic deformations as in C, and when depicted using different graphic elements as in D. Computational theories of vision, such as those by David Marr, have had more success in explaining how objects are classified. Emergence, reification, multistability, and invariance are not necessarily separable modules to model individually, but they could be different aspects of a single unified dynamic mechanism. The fundamental principle of gestalt perception is the law of prägnanz (in the German language, pithiness), which says that we tend to order our experience in a manner that is regular, orderly, symmetric, and simple. Gestalt psychologists attempt to discover refinements of the law of prägnanz, and this involves writing down laws that, hypothetically, allow us to predict the interpretation of sensation, what are often called "gestalt laws". These include: Gestalt laws of grouping A major aspect of Gestalt psychology is that it implies that the mind understands external stimuli as whole rather than the sum of their parts. The wholes are structured and organized using grouping laws. The various laws are called laws or principles, depending on the paper where they appear—but for simplicity sake, this article uses the term laws. These laws deal with the sensory modality vision however there are analogous laws for other sensory modalities including auditory, tactile, gustatory and olfactory (Bregman – GP). The visual Gestalt principles of grouping were introduced in Wertheimer (1923). Through the 1930s and '40s Wertheimer, Kohler and Koffka formulated many of the laws of grouping through the study of visual perception. Law of Proximity—The law of proximity states that when an individual perceives an assortment of objects they perceive objects that are close to each other as forming a group. For example, in the figure that illustrates the Law of proximity, there are 72 circles, but we perceive the collection of circles in groups. Specifically, we perceive there is a group of 36 circles on the left side of the image, and three groups of 12 circles on the right side of the image. This law is often used in advertising logos to emphasize which aspects of events are associated. Law of Similarity—The law of similarity states that elements within an assortment of objects are perceptually grouped together if they are similar to each other. This similarity can occur in the form of shape, colour, shading or other qualities. For example, the figure illustrating the law of similarity portrays 36 circles all equal distance apart from one another forming a square. In this depiction, 18 of the circles are shaded dark and 18 of the circles are shaded light. We perceive the dark circles as grouped together, and the light circles as grouped together forming six horizontal lines within the square of circles. This perception of lines is due to the law of similarity. Law of Closure—The law of closure states that individuals perceive objects such as shapes, letters, pictures, etc., as being whole when they are not complete. Specifically, when parts of a whole picture are missing, our perception fills in the visual gap. Research shows that the reason the mind completes a regular figure that is not perceived through sensation is to increase the regularity of surrounding stimuli. For example, the figure that depicts the law of closure portrays what we perceive as a circle on the left side of the image and a rectangle on the right side of the image. However, gaps are missing from the shapes. If the law of closure did not exist, the image would depict an assortment of different lines with different lengths, rotations, and curvatures—but with the law of closure, we perceptually combine the lines into whole shapes. Law of Symmetry—The law of symmetry states that the mind perceives objects as being symmetrical and forming around a center point. It is perceptually pleasing to divide objects into an even number of symmetrical parts. Therefore, when two symmetrical elements are unconnected the mind perceptually connects them to form a coherent shape. Similarities between symmetrical objects increase the likelihood that objects are grouped to form a combined symmetrical object. For example, the figure depicting the law of symmetry shows a configuration of square and curled brackets. When the image is perceived, we tend to observe three pairs of symmetrical brackets rather than six individual brackets. Law of Common Fate—The law of common fate states that objects are perceived as lines that move along the smoothest path. Experiments using the visual sensory modality found that movement of elements of an object produce paths that individuals perceive that the objects are on. We perceive elements of objects to have trends of motion, which indicate the path that the object is on. The law of continuity implies the grouping together of objects that have the same trend of motion and are therefore on the same path. For example, if there are an array of dots and half the dots are moving upward while the other half are moving downward, we would perceive the upward moving dots and the downward moving dots as two distinct units. Law of Continuity—The law of continuity states that elements of objects tend to be grouped together, and therefore integrated into perceptual wholes if they are aligned within an object. In cases where there is an intersection between objects, individuals tend to perceive the two objects as two single uninterrupted entities. Stimuli remain distinct even with overlap. We are less likely to group elements with sharp abrupt directional changes as being one object. Law of Good Gestalt—The law of good gestalt explains that elements of objects tend to be perceptually grouped together if they form a pattern that is regular, simple, and orderly. This law implies that as individuals perceive the world, they eliminate complexity and unfamiliarity so they can observe a reality in its most simplistic form. Eliminating extraneous stimuli helps the mind create meaning. This meaning created by perception implies a global regularity, which is often mentally prioritized over spatial relations. The law of good gestalt focuses on the idea of conciseness, which is what all of gestalt theory is based on. This law has also been called the law of Prägnanz. Prägnanz is a German word that directly translates to mean "pithiness" and implies the ideas of salience, conciseness and orderliness. Law of Past Experience—The law of past experience implies that under some circumstances visual stimuli are categorized according to past experience. If two objects tend to be observed within close proximity, or small temporal intervals, the objects are more likely to be perceived together. For example, the English language contains 26 letters that are grouped to form words using a set of rules. If an individual reads an English word they have never seen, they use the law of past experience to interpret the letters "L" and "I" as two letters beside each other, rather than using the law of closure to combine the letters and interpret the object as an uppercase U. The gestalt laws of grouping have recently been subjected to modern methods of scientific evaluation by examining the visual cortex using cortical algorithms. Current Gestalt psychologists have described their findings, which showed correlations between physical visual representations of objects and self-report perception as the laws of seeing. Gestalt views in psychology Gestalt psychologists find it is important to think of problems as a whole. Max Wertheimer considered thinking to happen in two ways: productive and reproductive. Productive thinking is solving a problem with insight. This is a quick insightful unplanned response to situations and environmental interaction. Reproductive thinking is solving a problem with previous experiences and what is already known. (1945/1959). This is a very common thinking. For example, when a person is given several segments of information, he/she deliberately examines the relationships among its parts, analyzes their purpose, concept, and totality, he/she reaches the "aha!" moment, using what is already known. Understanding in this case happens intentionally by reproductive thinking. Another gestalt psychologist, Perkins, believes insight deals with three processes: - Unconscious leap in thinking. - The increased amount of speed in mental processing. - The amount of short-circuiting that occurs in normal reasoning. Views going against the gestalt psychology are: - Nothing-special view - Neo-gestalt view - The Three-Process View Gestalt psychology should not be confused with the gestalt therapy of Fritz Perls, which is only peripherally linked to gestalt psychology. A strictly gestalt psychology-based therapeutic method is Gestalt Theoretical Psychotherapy, developed by the German gestalt psychologist and psychotherapist Hans-Jürgen Walter. Fuzzy-trace theory Fuzzy-trace theory, a dual process model of memory and reasoning, was also derived from Gestalt Psychology. Fuzzy-trace theory posits that we encode information into two separate traces: verbatim and gist. Information stored in verbatim is exact memory for detail (the individual parts of a pattern, for example) while information stored in gist is semantic and conceptual (what we perceive the pattern to be). The effects seen in Gestalt psychology can be attributed to the way we encode information as gist. Uses in human–computer interaction The gestalt laws are used in user interface design. The laws of similarity and proximity can, for example, be used as guides for placing radio buttons. They may also be used in designing computers and software for more intuitive human use. Examples include the design and layout of a desktop's shortcuts in rows and columns. Gestalt psychology also has applications in computer vision for trying to make computers "see" the same things as humans do. Quantum cognition modeling Similarities between Gestalt phenomena and quantum mechanics have been pointed out by, among others, chemist Anton Amann, who commented that "similarities between Gestalt perception and quantum mechanics are on a level of a parable" yet may give useful insight nonetheless. Physicist Elio Conte and co-workers have proposed abstract, mathematical models to describe the time dynamics of cognitive associations with mathematical tools borrowed from quantum mechanics and has discussed psychology experiments in this context. A similar approach has been suggested by physicists David Bohm, Basil Hiley and philosopher Paavo Pylkkänen with the notion that mind and matter both emerge from an "implicate order". The models involve non-commutative mathematics; such models account for situations in which the outcome of two measurements performed one after the other can depend on the order in which they are performed—a pertinent feature for psychological processes, as it is obvious that an experiment performed on a conscious person may influencing the outcome of a subsequent experiment by changing the state of mind of that person. In some scholarly communities, such as cognitive psychology and computational neuroscience, gestalt theories of perception are criticized for being descriptive rather than explanatory in nature. For this reason, they are viewed by some as redundant or uninformative. For example, Bruce, Green & Georgeson conclude the following regarding gestalt theory's influence on the study of visual perception: - The physiological theory of the gestaltists has fallen by the wayside, leaving us with a set of descriptive principles, but without a model of perceptual processing. Indeed, some of their "laws" of perceptual organisation today sound vague and inadequate. What is meant by a "good" or "simple" shape, for example? See also - Gestalt therapy—often mistaken for gestalt psychology - Structural information theory - Rudolf Arnheim - Wolfgang Metzger - Kurt Goldstein - Pál Schiller Harkai - Solomon Asch - Hermann Friedmann - James J. Gibson - James Tenney - Graz School - Important publications in gestalt psychology - Optical illusion - Pattern recognition (psychology) - Pattern recognition (machine learning) - Amodal perception - Topological data analysis - Fuzzy-trace theory - Laws of Association - David Hothersall: History of Psychology, chapter seven,(2004) - Tuck, Michael. "Gestalt Principles Applied in Design (Aug 17 2010)". Retrieved 11/12/11. - Humphrey, G. (1924). The psychology of the gestalt. Journal of Educational Psychology, 15(7), 401–412. doi:10.1037/h0070207 - Bernd Bocian:Fritz Perls in Berlin 1893–1933. Expressionism – Psychonalysis – Judaism, 2010, p. 190, EHP Verlag Andreas Kohlhage, Bergisch Gladbach. - Joe Wysong/Edward Rosenfeld (eds): An Oral History of Gestalt Therapy, Highland, New York 1982, The Gestalt Journal Press, p. 12. - Allen R. Barlow, "Gestalt-Antecedent Influence or Historical Accident", The Gestalt Journal, Volume IV, Number 2, (Fall, 1981) - Mary Henle noted in her presidential address to Division 24 at the meeting of the American Psychological Association (1975): "What Perls has done has been to take a few terms from Gestalt psychology, stretch their meaning beyond recognition, mix them with notions—often unclear and often incompatible —– from the depth psychologies, existentialism, and common sense, and he has called the whole mixture gestalt therapy. His work has no substantive relation to scientific Gestalt psychology. To use his own language, Fritz Perls has done 'his thing'; whatever it is, it is not Gestalt psychology". Gestalt theory. However she restricts herself explicitly to only three of Perls' books from 1969 and 1972, leaving out Perls' earlier work, and Gestalt therapy in general. See Barlow criticizing Henle: Allen R. Barlow: Gestalt Therapy and Gestalt Psychology. Gestalt – Antecedent Influence or Historical Accident, in: The Gestalt Journal, Volume IV, Number 2, Fall, 1981. - William Ray Woodward, Robert Sonné Cohen – World views and scientific discipline formation: science studies in the German Democratic Republic : papers from a German-American summer institute, 1988 - Lettvin, J.Y., Maturana, H.R., Pitts, W.H., and McCulloch, W.S. (1961). Two Remarks on the Visual System of the Frog. In Sensory Communication edited by Walter Rosenblith, MIT Press and John Wiley and Sons: New York - Valentin Fedorovich Turchin – The phenomenon of science – a cybernetic approach to human evolution – Columbia University Press, 1977 - "Gestalt Isomorphism". Sharp.bu.edu. Retrieved 2012-04-06. - Sternberg, Robert, Cognitive Psychology Third Edition, Thomson Wadsworth© 2003. - Stevenson, Herb. "Emergence: The Gestalt Approach to Change". Unleashing Executive and Orzanizational Potential. Retrieved 7 April 2012. Text "noedit" ignored (help) - Soegaard, Mads. "Gestalt Principles of form Perception". Interaction Design. Retrieved 8 April 2012. Text "noedit" ignored (help) - Todorovic, Dejan. "Gestalt Principles". scholarpedia. Retrieved 5 April 2012. Text "noedit" ignored (help) - Langley& associates, 1987; Perkins, 1981; Weisberg, 1986,1995"> - Reyna, Valerie (2012). "A new institutionism: Meaning, memory, and development in Fuzzy-Trace Theory". Judgment and Decision Making 7 (3): 332–359. - Soegaard, Mads. "Gestalt principles of form perception". Interaction-design.org. Retrieved 2012-04-06. - Elio Conte, Orlando Todarello, Antonio Federici, Francesco Vitiello, Michele Lopane, Andrei Khrennikov, Joseph P. Zbilut: Some remarks on an experiment suggesting quantum-like behavior of cognitive entities and formulation of an abstract quantum mechanical formalism to describe cognitive entity and its dynamics, Chaos, Solitons & Fractals, vol. 31, no. 5, March 2007, pp. 1076–1088 doi:10.1016/j.chaos.2005.09.061, arXiv:0710.5092 (submitted 26 October 2007) - Elio Conte, Orlando Todarello, Antonio Federici, Francesco Vitiello, Michele Lopane, Andrei Khrennikov: A Preliminar Evidence of Quantum Like Behavior in Measurements of Mental States, arXiv:quant-ph/0307201 (submitted 28 July 2003) - B.J. Hiley: Particles, fields, and observers, Volume I The Origins of Life, Part 1 Origin and Evolution of Life, Section II The Physical and Chemical Basis of Life, pp. 87–106 (PDF) - Basil J. Hiley, Paavo Pylkkänen: Naturalizing the mind in a quantum framework. In Paavo Pylkkänen and Tere Vadén (eds.): Dimensions of conscious experience, Advances in Consciousness Research, Volume 37, John Benjamins B.V., 2001, ISBN 90-272-5157, pages 119-144 - Bruce, V., Green, P. & Georgeson, M. (1996). Visual perception: Physiology, psychology and ecology (3rd ed.). LEA. p. 110. - Carlson, Neil R. and Heth, C. Donald (2010) Psychology the Science of Behaviour Ontario, CA: Pearson Education Canada. pp 20–22. - Smith, Barry (ed.) (1988) Foundations of Gestalt Theory, Munich and Vienna: Philosophia Verlag, 1988. - Gestalt psychology on Encyclopædia Britannica - Gestalt Society of Croatia - International Society for Gestalt Theory and its Applications – GTA - Embedded Figures in Art, Architecture and Design - On Max Wertheimer and Pablo Picasso - On Esthetics and Gestalt Theory - The World In Your Head – by Steven Lehar - Gestalt Isomorphism and the Primacy of Subjective Conscious Experience – by Steven Lehar - The new gestalt psychology of the 21st century - The Pennsylvania Gestalt Center - Gestalt Theory - Ecological Approach to Visual Perception - James J. Gibson in brief
<urn:uuid:d3b286cd-f409-41c0-a6fa-9d876e5318d4>
CC-MAIN-2013-20
http://en.wikipedia.org/wiki/Gestalt_psychology
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.9143
5,923
4.09375
4
Do our students think that their liberal education proves valuable in regard to their careers and finances in later life? A purely economic indicator seems to show that their answer to that question is Yes. Parents, in difficult economic times it is tempting to steer sons and daughters to focus, narrow their interests, and learn a specific set of skills that seem designed for a particular job. To thrive in the world ahead, much more is needed. Students interested in liberal arts subjects ought to be encouraged to pursue these subjects, since we know that interest is generally a key component of success, both in completing a college degree and in acquiring the skills the graduates of today will need for the jobs of tomorrow. The Founding Fathers envisioned a Republic with an enlightened citizenry educated in "all philosophical Experiments that Light into the Nature of Things ... and multiply the Conveniences or Pleasures of Life" -- not just technical training for jobs that pay well. Students will not show their true stuff unless they find what their "wow" factor is. They have to find the arena -- the discipline that engages them so that they do their best work -- because it interests them. Round pegs don't go in square holes. Parents and students expect real results from the four-year undergraduate curriculum. This is not unreasonable. Scholarly studies have shown that programs like Global Citizen Year do deliver real educational outcomes. Efforts to encourage innovation should stretch well beyond science and technology. Graduates in the fine arts, humanities and social sciences have roles to play. We need their creativity, ability to express important ideas, and understanding of societal needs. At most liberal arts colleges, the majority of classes have fewer than 20 students. In this environment, faculty can guide students in sharing perspectives, debating ideas and making discoveries in ways that are just not possible when enrollments number in the hundreds or thousands. It is on a college or university campus that students learn and strengthens an ability to live together as part of a community in a concrete and irreversible way: to give and take, to solve disagreements maturely. Liberal arts courses are offered at art schools not only to satisfy the requirements for a college degree. They inform and provide greater depth to the art that a student is creating and will make in the future.
<urn:uuid:71578482-8022-4c18-b6f8-9b26c6941b2f>
CC-MAIN-2013-20
http://www.huffingtonpost.com/tag/liberal-arts
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.960359
461
2.734375
3
Editor’s Note: David Wise is the author of numerous books on national security, intelligence and espionage. His latest book, Tiger Trap: America’s Secret Spy War with China, was published June 14 by Houghton Mifflin Harcourt. By David Wise – Special to CNN For almost half a century during the Cold War, the world focused on the global espionage battle between the United States and the Soviet Union. The duel between the CIA and the KGB, portrayed in countless books, films and news stories captured the public imagination. Espionage became a kind of entertainment thanks in no small part to the fictional exploits of James Bond. This fiction masked a cold reality. In the actual conflict, spies and their agents died. Lives were shattered. The KGB's supermoles - Aldrich Ames in the CIA and Robert Hanssen in the FBI - stole U.S. secrets by the trunkful and betrayed agents working for U.S. intelligence. Many of those agents were executed. A the East-West intelligence battles played out in back alleys across the globe, scant attention was paid to the espionage operations of a rising global power– China. And scant attention was paid to the efforts of U.S. counterintelligence (not always successful) to counter Beijing's attempts to acquire America's secrets. Inside the FBI, Soviet spies were regarded as the principal quarry. Chinese counterintelligence was relegated to a back seat. Yet, China has spied on America for decades with some spectacular but little known results. During World War II, Soviet spies penetrated the Manhattan Project and stole U.S. atomic secrets. That was not lost on China. In the decades after World War II, Chinese espionage was principally aimed at stealing U.S. nuclear weapons data. By acquiring those secrets, China could bypass years of research and testing and speed its own development of nuclear weapons. With its modernization efforts devastated by the chaos of the Cultural Revolution, China coveted such shortcuts. So the United States, particularly the nuclear weapons labs at Los Alamos and Lawrence Livermore, became its primary target. The FBI suspected that Gwo-Bao Min, an engineer at the Livermore lab, had passed the secrets of the neutron bomb to China. The case was given the code-name TIGER TRAP by the Bureau. Although the FBI gathered considerable evidence, the Justice Department declined to authorize an arrest. However, Min was forced to resign from the nuclear weapons lab. Another priority of Chinese intelligence has been to infiltrate U.S. counterintelligence. The F.B.I. was penetrated until 2002 by Katrina Leung, a prominent figure in the Chinese American community in Los Angeles who worked as an F.B.I. asset for twenty years under the code name PARLOR MAID. Leung was having affairs with the bureau's two top agents on the West Coast responsible for Chinese counterintelligence, James J. Smith and William V. Cleveland, Jr. She fed F.B.I. secrets to China’s foreign intelligence service, the M.S.S., for years, telling investigators she filched them from Smith's briefcase during their trysts at her home. F.B.I. director Robert S. Mueller III assigned his top counterintelligence agent, Leslie G. Wiser, Jr., to go to Los Angeles in 2002 and investigate. Operating with a team of handpicked agents from a secret location in Santa Monica, Wiser broke open the case. Leung and Smith were arrested. Smith pleaded guilty to lying about his affair with Leung. She, too, pleaded guilty to lying about their affair and to failing to report some of her income from the F.B.I. Neither was sentenced to prison. And the government had avoided a sensational espionage trial in which the Bureau’s secrets might have been aired. The CIA was also penetrated by Chinese intelligence. A mole named Larry Wu-Tai Chin worked for Chinese intelligence for more than 30 years until he was caught by the FBI in 1985. There have been many more recent examples of Chinese spying against the United States. Dongfan "Greg" Chung volunteered to spy for China. Chung, a naturalized U.S. citizen, worked in the aerospace industry in southern California for thirty years. At Boeing he was a stress analyst on the space shuttle. Chung sent twenty-four manuals from Rockwell to China on the B-1 bomber. When the F.B.I. searched his home in California in 2006 they were astonished to find 300,000 pages of Boeing documents hidden in the house pertaining to the space shuttle, rockets and military aircraft. Some of the documents were in a crawl space underneath the house. Chung was arrested, convicted and sentenced in 2010 to almost sixteen years in prison. China and the United States have a mutual dependence and a common interest in avoiding conflict. Without exaggerating the danger of Chinese espionage, it is a fact that China’s spying on America is ongoing, current and shows no sign of diminishing. Chinese computer hackers have penetrated the Pentagon, the State Department and U.S. companies, such as Google. Americans should be aware that China, when it can, steals U.S. secrets. The espionage battle is no less real for being largely unseen. The views expressed in this article are solely those of David Wise. The Global Public Square is where you can make sense of the world every day with insights and explanations from CNN's Fareed Zakaria, leading journalists at TIME and CNN, and other international thinkers. Join GPS editor Jason Miks and get informed about global issues, exposed to unique stories, and engaged with diverse and original perspectives. Every week we bring you in-depth interviews with world leaders, newsmakers and analysts who break down the world's toughest problems. CNN U.S.: Sundays 10 a.m. & 1 p.m ET | CNN International: Find local times Check out all of Fareed's TIME columns here:
<urn:uuid:a56e2eba-3891-4e9f-9c0f-fdcdd5bfd8f7>
CC-MAIN-2013-20
http://globalpublicsquare.blogs.cnn.com/2011/06/14/chinas-spying-on-u-s/?iref=allsearch
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.959172
1,230
2.53125
3
ANWR: Producing American Energy and Creating American Jobs Map of northern Alaska showing locations of the Arctic National Wildlife Refuge, the 1002 area, and the National Petroleum Reserve—Alaska (NPRA). Source: U.S. Geological Survey Chairman Doc Hastings recently announced plans to recommend increased offshore and onshore drilling – including in the Arctic National Wildlife Refuge (ANWR) in Alaska - to the Joint Select Committee as a way to help reach their deficit reduction goals. Responsible energy production on less than three percent of ANWR’s total land could create thousands of jobs, generate billions in new revenue and help reduce our dependence on foreign sources of oil. Small Area = Big Energy Potential The North Slope of ANWR, known as “Area 1002”, was specifically set aside by Congress and President Carter in 1980 for oil and natural development. This area is not designated as Wilderness. A plan developing 500,000 acres—less than three percent of ANWR’s acreage—would provide access to the majority of ANWR’s resources. Supplying America’s Families and Businesses with American Energy According to U.S. Geological Survey estimates, the North Slope contains an estimated 10.4 billion barrels of oil. This is more than the known oil reserves of entire countries that the U.S. currently imports oil from, including: Mexico, Angola, Azerbaijan, Norway, India, Indonesia, Malaysia, Egypt, Australia and New Zealand, Turkmenistan, and Uzbekistan. At peak production, ANWR could supply up to 1.45 million barrels of oil per day. This is more than the U.S. imports from Saudi Arabia every day. Alternatively, 1.45 million barrels of oil per day is over one quarter of what the U.S. imports from OPEC countries each year. Reducing the Debt, Generating New Federal Revenue Developing ANWR’s resources could generate approximately $150 billion to $296 billion in new federal revenue – a substantial amount that would help pay down our Nation’s debt. Total government revenue, including leases, royalties, and state local and federal taxes for the life of ANWR field production, could be as much as $440 billion. Creating American Jobs, Growing the Economy Opening a small portion of ANWR to energy production would create tens of thousands of American jobs and contribute to significant economic growth. Studies have shown ANWR job creation ranging from 55,000 to 130,000 jobs. Increasing Our National Security Responsibly developing our own American energy resources in ANWR will help reduce our dependence on oil from hostile countries and lower foreign imports. According to the Energy Information Administration, crude oil imports will decline by one barrel for every barrel of ANWR oil production. Protecting the Environment Through New Technology Extended reach drilling allows for one single platform to cover a 28,000 foot radius, which is larger than the size of Washington, D.C. Advancements in technology allow for energy production to occur safely and with minimal environmental impact. For example, new extended reach drilling allows for one single drilling platform to cover a 28,000 ft radius—larger than the size of Washington D.C. (see map). Supporting Local Communities Many Alaska Natives support energy production in ANWR and recognize the jobs and economic benefits it will bring to their communities. It has strong support from the Village of Kaktovik - the only town within the coastal plain of ANWR.
<urn:uuid:8bd38cdf-876a-408f-8779-7df3833a8a51>
CC-MAIN-2013-20
http://naturalresources.house.gov/anwr/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.933833
735
2.90625
3
(HealthDay News) - Lifting objects -- sometimes even light ones -- is a common cause of back strain and injury. To help prevent injury when lifting things, follow these techniques suggested by the American Association of Orthopaedic Surgeons: By Dr. Eric L. Seiler - Chiropractor Back problems seem to occur in epidemic proportions. This might lead one to believe that our spines are poorly designed - but nothing could be further from the truth. Every part of the miraculous human body was designed to function perfectly and last you 90 plus years. The problem is not the way our bodies are designed, but rather the abnormal stresses we subject our bodies to. In this sense, in many ways, our bodies are like square pegs being forced into round holes. Not a good fit. Modernization has improved the quality of our lives in many ways, but it has also taken a toll. We subject ourselves to physical stresses in the modern world that our bodies were not designed to handle. One example is that we spend too much time sitting. Sitting places our spines in an abnormal and ‘compressive’ orientation with gravity. This causes misalignment of vertebrae and pre-mature breakdown of spinal discs - a major cause for all the back pain, neck pain and headaches that we suffer. For over a century now, the chiropractic profession has led the way in understanding how abnormal lifestyle-induced stress can cause alignment problems in the spine that in turn cause pain, reduced mobility and even problems with general health and wellness. Misaligned vertebrae can irritate nerves, causing a wide variety of health problems. Misaligned vertebrae that irritate nerves have a special name. They are called ‘subluxations’. Chiropractors correct subluxations using spinal adjustments; gentle forces applied by hand to re-align vertebrae. Chiropractors may also council their patients in how to avoid or minimize the negative physical stresses that cause spinal problems in the first place. One thing you can do right away to help yourself is to find ways to minimize the amount of time you sit in an upright position. No one should sit continuously for more than a half an hour without getting up and moving around for awhile. Even taking a one minute ‘micro-break’ each half hour from the compressive stress of sitting can have a major positive effect on your spine over time. If you are locked-in to a lifestyle that keeps you sitting, consider investing in an ergonomically designed work chair that minimizes postural stress. ‘Zero-gravity’ reclining chairs are also an excellent choice for relaxing and reducing the stress of sitting upright all day. While recliners are very helpful, relieving your spine of the compressive force of gravity is achieved primarily through sleep. If you are a restless sleeper, or sleep for only short durations, you may find that you have morning back or neck pain. You may profit from investing in a new bed and pillows that provide proper support as you sleep. Your specialist at ‘The Better Back Store’ has a full range of products that will allow you to sit and sleep in a healthier way. A good chiropractor, along with some intelligently designed, properly supportive furniture can help make a better fit for your ‘square peg’ body in this physically stressful ‘round hole’ world! Seiler Chiropractic Clinic Eric L. Seiler D.C. 30651 U. S. 19 N Palm Harbor, Fl 34684 © 2002- TheBetterBackStore.net All Rights Reserved.
<urn:uuid:660b4dfa-e848-4cf7-97aa-582861ebd9b8>
CC-MAIN-2013-20
http://www.thebetterbackstore.net/TBBS_Topics.asp?id=facts
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.945011
750
2.53125
3
Dr. Gabriel Barkay points to the tomb where he discovered the tiny biblical artifacts that date from well before the Dead Sea Scrolls. SOLVING A RIDDLE WRITTEN IN SILVER By JOHN NOBLE WILFORD New York Times ....An archaeological discovery in 1979 revealed that the Priestly Benediction, as the verse from Numbers 6:24-26 is called, appeared to be the earliest biblical passage ever found in ancient artifacts. ["May Yahweh bless you and keep you; may Yahweh cause his face to shine upon you and be gracious to you; may Yahweh lift up his countenance upon you and grant you peace."] Two tiny strips of silver, each wound tightly like a miniature scroll and bearing the inscribed words, were uncovered in a tomb outside Jerusalem and initially dated from the late seventh or early sixth century B.C. - some 400 years before the famous Dead Sea Scrolls. But doubts persisted. The silver was cracked and corroded, and many words and not a few whole lines in the faintly scratched inscriptions were unreadable. Some critics contended that the artifacts were from the third or second century B.C., and thus of less importance in establishing the antiquity of religious concepts and language that became part of the Hebrew Bible. So researchers at the University of Southern California have now re-examined the inscriptions using new photographic and computer imaging techniques. The words still do not exactly leap off the silver. But the researchers said they could finally be "read fully and analyzed with far greater precision," and that they were indeed the earliest. In a scholarly report published this month, the research team concluded that the improved reading of the inscriptions confirmed their greater antiquity. The script, the team wrote, is indeed from the period just before the destruction of Jerusalem in 586 B.C. by Nebuchadnezzar and the subsequent exile of Israelites in Babylonia. The researchers further reaffirmed that the scrolls "preserve the earliest known citations of texts also found in the Hebrew Bible and that they provide us with the earliest examples of confessional statements concerning Yahweh." Some of the previously unreadable lines seemed to remove any doubt about the purpose of the silver scrolls: they were amulets. Unrolled, one amulet is nearly four inches long and an inch wide and the other an inch and a half long and about half an inch wide. The inscribed words, the researchers said, were "intended to provide a blessing that will be used to protect the wearer from some manner of evil forces." The report in The Bulletin of the American Schools of Oriental Research was written by Dr. Gabriel Barkay, the archaeologist at Bar-Ilan University in Israel who discovered the artifacts, and collaborators associated with Southern California's West Semitic Research Project. The project leader is Dr. Bruce Zuckerman, a professor of Semitic languages at U.S.C., who worked with Dr. Marilyn J. Lundberg, a Hebrew Bible specialist with the project, and Dr. Andrew G. Vaughn, a biblical historian at Gustavus Adolphus College in St. Peter, Minn. A companion article for next month's issue of the magazine Near Eastern Archaeology describes the new technology used in the research. The article is by the same authors, as well as Kenneth Zuckerman, Dr. Zuckerman's brother and a specialist in photographing ancient documents. Other scholars not affiliated with the research but familiar with it agreed with the group's conclusions. They said it was a relief to have the antiquity and authenticity of the artifacts confirmed, considering that other inscriptions from biblical times have suffered from their uncertain provenance. Scholars also noted that early Hebrew inscriptions were a rarity, and called the work on the amulets a significant contribution to an understanding of the history of religion in ancient Israel, particularly the time of the Judean Monarchy 2,600 years ago. "These photographs are far superior to what you can see looking at the inscriptions with the naked eye," said Dr. Wayne Pitard, professor of the Hebrew Bible and ancient Near Eastern religions at the University of Illinois. Dr. Pitard said the evidence for the antiquity of the benediction was now compelling, although this did not necessarily mean that the Book of Numbers already existed at that time. Possibly it did, he added, but if not, at least some elements of the book were current before the Babylonian exile. A part of the sacred Torah of Judaism (the first five books of the Bible), Numbers includes a narrative of the Israelite wanderings from Mount Sinai to the east side of the Jordan River. Some scholars think the Torah was compiled in the time of the exile. A number of other scholars, the so-called minimalists, who are influential mainly in Europe, argue that the Bible was a relatively recent invention by those who took control of Judea in the late fourth century B.C. In this view, the early books of the Bible were largely fictional to give the new rulers a place in the country's history and thus a claim to the land. "The new research on the inscriptions suggests that that's not true," Dr. Pitard said. In fact, the research team noted in its journal report that the improved images showed the seventh-century lines of the benediction to be "actually closer to the biblical parallels than previously recognized." Dr. P. Kyle McCarter of Johns Hopkins University, a specialist in ancient Semitic scrip ts, said the research should "settle any controversy over these inscriptions." A close study, Dr. McCarter said, showed that the handwriting is an early style of Hebrew script and the letters are from an old Hebrew alphabet, which had all but ceased to be used after the destruction of Jerusalem. Later Hebrew writing usually adopted the Aramaic alphabet. There was an exception in the time of Roman rule, around the first centuries B.C. and A.D. The archaic Hebrew script and letters were revived and used widely in documents. But Dr. McCarter noted telling attributes of the strokes of the letters and the spelling on the amulets that, he said, ruled out the more recent date for the inscriptions. Words in the revived Hebrew writing would have included letters indicating vowel sounds. The benediction, the scholar said, was written in words spelled entirely with consonants, the authentic archaic way. The two silver scrolls were found in 1979 deep inside a burial cave in a hillside known as Ketef Hinnom, west of the Old City of Jerusalem. Dr. Barkay, documenting the context of the discovery, noted that the artifacts were at the back of the tomb embedded in pottery and other material from the seventh or sixth centuries B.C. Such caves were reused for burials over many centuries. Near this tomb's entrance were artifacts from the fourth century, but nothing so recent remains in the undisturbed recesses. It took Dr. Barkay another seven years before he felt sure enough of what he had to announce details of the discovery. Even then, for all their microscopic examination of the inscriptions at the Israel Museum in Jerusalem, scholars remained frustrated by the many unreadable words and lines. About a decade ago, Dr. Barkay enlisted the help of Dr. Zuckerman, whose team had earned a reputation for achieving the near-impossible in photographing illegible ancient documents. Working with scientists at NASA's Jet Propulsion Laboratory, Dr. Zuckerman's group used advanced infrared imagining systems enhanced by electronic cameras and computer image-processing technology to draw out previously invisible writing on a fragment of the Dead Sea Scrolls. The researchers also pioneered electronic techniques for reproducing missing pieces of letters on documents. By examining similar letters elsewhere in the text, they were able to recognize half of a letter and reconstruct the rest of it in a scribe's own peculiar style. "We learned a lot from work on the Dead Sea Scrolls," Dr. Zuckerman said. "But at first a processing job like this would send your computers into cardiac arrest. We had to wait for computer technology to catch up with our needs." As the researchers said in their magazine article, the only reasonably clear aspect of the inscriptions was the Priestly Benediction. Other lines preceding or following the prayer "could barely be seen." To get higher-definition photographs of the inscriptions, Ken Zuckerman applied an old photographer's technique called "light painting," brought up to date by the use of fiber-optic technology. He used a hand-held light in an otherwise dark room to illuminate a spot on the artifact during a time exposure. In addition, he photographed the artifact at different angles, which made the scratched letters shine in stark relief. The next step was to convert the pictures to digital form, making possible computer processing that brought out "the subtleties of the surface almost at the micron level." This analysis was particularly successful in joining a partial letter stroke on one side of a crack with the rest of the stroke on the other side. It also enabled the researchers to restore fragments of letters to full legibility by matching them with clear letters from elsewhere in the text. In this way, the researchers filled in more of the letters and words of the benediction itself and for the first time deciphered meaningful words and phrases in the lines preceding the benediction. Scholars were particularly intrigued by a statement on the smaller artifact. It reads: "May h[e]/sh[e] be blessed by YHWH, the warrior/helper, and the rebuker of Evil." Referring to God, Yahweh, as the "rebuker of Evil" is similar to language used in the Bible and in various Dead Sea Scrolls, scholars said. The phraseology is also found in later incantations and amulets associated with Israel, evidence that these artifacts were also amulets, researchers concluded. "In the ancient world, amulets were taken quite seriously," Dr. Zuckerman said. "There's evil out there, demons, and you need protection. Having this around your neck, you are involving God's presence and protection against harm." Dr. Esther Eshel, a professor of the Bible at Bar-Ilan and an authority on Hebrew inscriptions, said this was the earliest example of amulets from Israel. But she noted that the language of the benediction was similar to a blessing ("May he bless you and keep you") found on a jar from the eighth century B.C. If the new findings are correct, the people who wore these amulets may have died before they had to face the limitations of their efficacy. They might then have asked in uncomprehending despair, "Where was Yahweh when the Babylonians swooped down on Jerusalem?" Other scholars, including those previously skeptical, will soon be analyzing the improved images. In a departure from usual practices, the researchers not only published their findings in a standard print version in a journal but also as an accompanying "digital article," a CD version of the article and the images to allow scholars to examine and manipulate the data themselves. The research group said, "As far as we are aware, this is the first article to be done in this fashion, but it certainly will not be the last."
<urn:uuid:2e2f1c71-b0f8-4871-b4d9-aa533920a35b>
CC-MAIN-2013-20
http://www.yahwehsnewkingdom.com/Yahweh-600BC.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.964773
2,343
3.015625
3
"Who Save One Life." The Email message read, "Can you help me by locating in your records the name of a monastery in France where I was hidden?" It explained that Quakers in the South of France had helped the writer during World War II. Archives staff wanted to help but wondered if there were any ways to do so. Would it be possible to find the name of a monastery among hundreds of documents from that period? Would letter writers even include that sort of information, knowing the letters would be censored? If this had occurred when Germany occupied Vichy France, would any letters actually have found their way to the United States? These were some of the doubts that crossed our minds. It took us several days to remember an unlikely connection that had occurred several years before. That was to be the key that unlocked a poignant and extraordinary story. Some years prior to receiving the Email inquiry, the AFSC Archives received personal stories on tape from a European woman by the name of Alice Resch Synnestvedt. On the tapes, she shared some of her experiences about her work in the South of France where she was a member of the Secours Quaker group working among refugees who had congregated there. Prior to the German occupation of Vichy France in 1942, this group had included a mixture of European and U.S. workers. Those from the United States were arrested and interned in Germany after the occupation, while the European members of the group continued the work. At the end of one of the cassettes, Alice discovered she had several remaining minutes of blank tape, so she filled it in by telling a true story. It was about how a Jewish mother approached her in the Toulouse region of France and asked Alice to hide her two children. The children were a boy and girl. The mother said the boy was 14, but Alice said she snorted in disbelief and thought he looked more like 17 because he was so tall. She thought it would be difficult to find a place to hide him. The girl was quite young and a place could easily be found for her. Alice pondered a good deal about a refuge for the boy and finally decided to visit a monastery she knew of where the monks were friendly and willing to be of help in such situations. So off Alice drove to the monastery to talk to the Abbott. Alice Synnestvedt's recollection after so many years did not include the names of the boy or girl. She did remember, however, that the boy had sent a postcard to her from the monastery quite openly thanking her for finding a place of refuge for him. This caused her a number of days of anxiety about whether the postcard might have been read by someone else and the information passed to the authorities. However, the children went undiscovered, were eventually reunited with their father, and escaped with him to Switzerland a year later. When we in the AFSC Archives heard this story, it made quite an impression, but, a number of years later when the man's Email inquiry arrived; it didn't immediately ring a bell. Days later, however, one of us suddenly made the connection. Alice Synnestvedt and the "boy" -- now a grown man and retired from his work -- were put in touch with each other. Indeed, they discovered that, unlikely as it seemed, Alice was the one who had hidden the boy and his sister. A few years later Alice was invited to come to the United States to celebrate her ninetieth birthday. Those inviting her were other people she had helped as children during the war years, when her efforts helped them, too, to survive the Nazi Holocaust. At that time, they came into contact with her through the Secours Quaker staff. These middle-aged-and-older adults -- "her children" -- feted her by taking her to visit a number of cities in the Untied States, including Washington, D.C. There she visited the United States Memorial Holocaust Museum, where she saw her name listed among other righteous gentiles who had offered aid to others in need at the time. The mystery was solved, and the writer of the Email message finally had a chance to express his gratitude to Alice. In one of his first letters to her, after many years of a separation that seemed unlikely to end, he wrote: "The Talmud says that those who save one life save the world. And you and your organization did just that." Written by Jack Sutters, September 2002
<urn:uuid:15edb44c-a765-4022-8b95-8415df15363f>
CC-MAIN-2013-20
http://afsc.org/story/who-save-one-life
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.990661
922
2.59375
3
Wed April 11, 2012 What Would The Buffett Rule Mean For The U.S. Economy A tax-the-rich proposal named after Warren Buffett has little chance of passing this year, but that hasn't stopped the debate over what impact it would have. Some economists are skeptical that a 30 percent minimum tax on people with million-dollar incomes — known as the "Buffett rule" — would do much to reduce the deficit or boost the economy. But the Obama administration says the proposal is necessary to make the tax code more equitable. The Buffett rule would apply to wealthy people, but not all wealthy people. Instead, it would affect the tiny number of taxpayers — some of the nation's wealthiest — who make most of their money from investments. Rob Williams, a senior fellow at the Tax Policy Center, says the proposed rule would not affect many of the people we think of as "very rich." "For high income people who get a lot of their income from wage and salaries — the George Clooneys of the world, LeBron James, the CEOs — those people would not see an effect from the Buffett tax, because they're already paying tax rates above 30 percent," Williams says. But, he says, wealthy people who get their money from assets like stocks and bonds would feel the pain. "If you're in a situation like Mitt Romney or Warren Buffett ... paying a very low tax rate because most of your income comes from investments, you'll see a very large increase in taxes," Williams says. All told, the nonpartisan Tax Policy Center says 217,000 households would be subject to the Buffett rule. While the actual amount would vary enormously from person to person, those households would pay an additional $190,000 in taxes, on average. Jack Ablin, chief investment officer at BMO-Harris Private Bank, says many of those wealthy investors would rethink what they do with their money. "If you tax millionaires that are investing in, for example, municipal bonds, and they're enjoying the tax benefit of that interest, you could see a whole rash of investors moving away from buying bonds of our state and local governments," Ablin says. Under the Buffett rule, people who sell assets would suddenly be forced to pay much higher taxes on the profits they make. Will McBride, an economist with the Tax Foundation, says many people would rush to unload the assets they hold before the law takes effect. "If this tax were to go into effect Jan. 1 of next year," McBride says, "the stock market in December would not look pretty." Over the longer term, McBride says, the law would do even more damage to the economy. Because people would have to pay more taxes on the profits they make, they would have less incentive to invest, he says. As a result, McBride argues, small startups would suffer. "You don't want to heavily tax investment, because you're taxing the thing that creates long-term economic growth," he says. But Williams of the Tax Policy Center says there's little evidence that higher taxes actually affect investment all that much. Williams says companies and individuals have lots of cash — but they're not using it. "The problem right now is not that people don't have monies to invest," Williams says. Rather, he says, "People don't see investment opportunities that they think are worth putting their money into," because the economy is so weak. Jared Bernstein, a senior fellow with the Center on Budget and Policy Priorities, contends that the Buffett rule could actually benefit the economy. "A lot of very wealthy people spend a lot of time and money and effort structuring their income to take advantage of a tax code that's fraught with loopholes," Bernstein says. Because the Buffett rule establishes a 30 percent minimum tax rate for millionaires, Bernstein says, it would be much harder for rich people to game the system. "If anything, I think the kind of simplicity here militates against the kind of game-playing that we see so much of in our economy," he says. And, he argues, a simpler tax system would be good for the economy in the long run. But none of that will happen unless the Buffet rule becomes law. And right now, there's little indication that Congress is going to pass it.
<urn:uuid:2d83b255-f40f-4a22-8947-b151409c946a>
CC-MAIN-2013-20
http://krvs.org/post/what-would-buffett-rule-mean-us-economy
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.981227
888
2.953125
3
The bending of water waves as they encounter different depths and bottom conditions, or of other waves as they pass from one medium to another of different properties. The bending of waves as they approach a shore so that their crests make no more than a 5° angle with the shoreline. The re-orientation of a wave so that it approaches a shoreline at a more perpendicular angle. This process is caused by the differential reduction of water depth as a linear wave approaches a curved shoreline. A reduction in water depth causes a wave to slow down causing the waves approaching a nonlinear shoreline to curve with the shore's shape. The process by which a wave is bent or turned from its original direction. In sea waves, as a wave approaches a shore obliquely, part of it reaches the shallow water near the shore while the rest is still advancing in deeper water; the part of the wave in the shallower water moves more slowly than the part in the deeper water. In seismic waves, refraction results from the wave encountering material with a different density or composition. The process by which a wave approaching the shore changes direction due to slowing of those parts of the wave that enter shallow water first, causing a sharp decrease in the angle at which the wave approaches until the wave is almost parallel to the coast.
<urn:uuid:f73159bc-58f0-4095-827f-7a463172cb29>
CC-MAIN-2013-20
http://metaglossary.com/meanings/941430/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.952929
268
3.75
4
Students represent water issues through artThe 7th annual Water is Life art contest invites Minnesota’s 9-12 grade students to create art and videos that represent issues facing our freshwater resources. The 7th annual Water is Life art contest invites Minnesota’s 9-12 grade students to create art and videos that represent issues facing our freshwater resources. This year, the theme for the contest is water conservation. Collaborating with Minnesota’s Educational Service Cooperatives, the Freshwater Society hopes to inspire and educate Minnesota’s youth of the important issues facing vulnerable freshwater resources. Freshwater resources are facing a crisis, according to the society. The increase in human population, development and contamination of our water resources are creating a strain on surface and ground waters. Conservation of these resources is the most efficient, economical and immediate tactic to ensure the sustainability of freshwater resources for future generations, according to the Freshwater Society. The contest awards $500 scholarships to the six top finalists, prizes to each region’s semifinalists and recognition to each participant. Each year the students produce amazing art and artist statements. The winning artwork and all the semi-finalists’ entries are exhibited at public venues, including the state Capitol. For more information visit www.freshwater.org or www.lcsc.org.
<urn:uuid:fc154304-0bde-4e61-92fe-e51277b27d6e>
CC-MAIN-2013-20
http://www.echopress.com/event/article/id/79310/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.901853
273
2.703125
3
Medicines are the treatment that works best for schizophrenia, and you may be taking more than one at a time. They may be used for negative symptoms, but they don't work as well for negative symptoms as they do for positive symptoms. It may take time to find which medicines are best for you. This may be frustrating. Getting support from your family, your friends, and a community-based rehabilitation program is helpful, especially while you and your doctor are trying to find the best medicines. It also may help to speak with and get support from others who have had trouble finding the right medicines. If you stop taking your medicines, you may have a relapse. Don't stop taking your medicines until you talk with your doctor. If you and your health care team decide you should stop using medicine, you will need to be checked on a regular basis. Medicines used most often to treat schizophrenia include: - First-generation antipsychotics, such as haloperidol (Haldol), perphenazine, and chlorpromazine. - Second-generation antipsychotics, such as risperidone (Risperdal) and aripiprazole (Abilify). - Clozapine, such as These medicines often are used along with the medicines listed above:4 - Lithium carbonate, such as Lithobid and - Antianxiety medicines, such as clonazepam (Klonopin) and diazepam (for example, Valium). - Anticonvulsant medicines, such as carbamazepine (for example, Tegretol) and valproate (for example, Depakote). - Antidepressant medicines, such as selective serotonin reuptake inhibitors (SSRIs) (for example, Zoloft or Celexa) or tricyclic antidepressants (for example, Pamelor). Because of side effects or the risk of side effects, you may be tempted to stop using your medicine. But if you stop using medicine, the symptoms of schizophrenia may come back or get worse. If you have any concerns about side effects, talk to your doctor. He or she will work with you. Your doctor may give you a smaller dose of the antipsychotic medicine, have you try another antipsychotic medicine, or give you another medicine to treat the side effect. Some side effects of antipsychotic medicines can be serious. - Neuroleptic malignant syndrome is a rare but life-threatening side effect of antipsychotics. The first signs usually include a fever between 102°F (38.9°C) and 103°F (39.4°C), a fast or irregular heartbeat, rapid breathing, and severe sweating. - Tardive dyskinesia is body movement that you can't You may need regular blood tests to check for side effects. Children, teens, and older adults may need to have blood tests more often than other people.
<urn:uuid:a7d4d87a-49c1-400b-8a2f-383564db3d9f>
CC-MAIN-2013-20
http://www.everydayhealth.com/health-center/schizophrenia-medicines.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.898108
660
2.703125
3
Chapter 14. Evolutionists' Confessions Regarding the Invalidity of the "Horse Series" Until recently, the imaginary sequence showing the supposed evolution of the horse headed the list of fossil chronologies portrayed as evidence for the theory of evolution. However, many evolutionists now openly admit that the horse-evolution scenario is a fabrication. The equine evolution scenario was proposed on the basis of evolutionists' imaginations with invented sequences of fossils, set out in order of size, belonging to different life forms that lived at different times in India, North America, South America and Europe. Various researchers have proposed more than twenty different equine evolution sequences. There is absolutely no consensus regarding these completely different alleged lines of descent. The only thing these sequences have in common is the belief that the first ancestor of the horse was a relatively small dog-like animal known as Eohippus (Hyracotherium) that lived in the Eocene period some 55 million years ago. In fact, however, Eohippus, which supposedly became extinct millions of years ago, is in fact identical to the animal known as the hyrax, which is still to be found in Africa today, which has nothing to do with the horse and bears no resemblance to it. The inconsistency of the idea of equine evolution is becoming more and more apparent with every new fossil discovery. It has been established that fossils of horse breeds living today (Equus nevadensis and E. occidentalis) have been found in the same strata as Eohippus. This shows that the present-day horse was living at the same time as its supposed ancestor and is therefore obvious proof that no such process as the evolution of the horse ever took place. One of the most important pieces of evidence that totally demolish the claim in question is that at a time when evolutionists maintain an ancestor of the horse the size of a dog appeared, in other words 50 million years ago, perfect horses were actually already in existence. Flawless horse skulls dating back 45 million years prove the invalidity of Darwinist claims. Boyce Rensberger, an evolutionist, addressed a conference held at the Chicago Museum of Natural History in November 1980, with the participation of 150 evolutionists at which the problems of the theory of evolution were discussed. He described how the scenario of equine evolution was unsupported by the fossil record and that no gradual equine evolution ever occurred: Some other renowned evolutionists have also made confessions about this fact. Gordon R. Taylor is an evolutionist author and chief science advisor for the BBC: Paleontologist Niles Eldredge, curator of the American Museum of Natural History: Prof. N. Heribert-Nilsson, a famous evolutionist botanist at the University of Lund in Sweden: Stephen Jay Gould: Prof. Dr. Ali Demirsoy: 266- Boyce Rensberger, Houston Chronicle, November 5, 1980, p. 15. 267- Gordon Rattray Taylor, The Great Evolution Mystery, p. 230. 268- Niles Eldredge, quoted in Darwin’s Enigma by Luther D. Sunderland, Santee, CA, Master Books, 1988, p. 78. 269- Prof. Heribert Nilsson, Synthetische Artbildung, Verlag CWE Gleerup, Sweden, 1954, pp. 551-552. 270- Stephen Jay Gould and Niles Eldredge, "Punctuated Equilibrium Comes of Age," Nature, Vol. 336 (18 November 1993), p. 226. 271- Ali Demirsoy, Kalıtım ve Evrim [Inheritance and Evolution], p. 37.
<urn:uuid:2790c02a-56a8-4615-aad8-18a6acb4b199>
CC-MAIN-2013-20
http://harunyahya.com/en/books/8063/Confessions_Of_The_Evolutionists/chapter/4562/Chapter_14_Evolutionists_Confessions_Regarding_the_Invalidity_of_the_Horse_Series
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.944848
770
3.15625
3
George Washington Carver Shampoo from peanuts? Ink from sweet potatoes? With imagination and scientific skill, George Washington Carver developed hundreds of unexpected products from everyday plants. Although he is best known for his work on a common legume (the peanut), this exhibition reveals he was an exceptionally uncommon man: outstanding scholar, innovative scientist, pioneering conservationist, and impassioned educator. The exhibition is organized by The Field Museum in collaboration with Tuskegee University and the National Park Service. It is sponsored in Chicago by Motorola Foundation and Sara Lee Foundation. Approximately 4,500 ft2 (418 m2) One-way, inbound, paid by host venue - George Washington Carver Fact Sheet - George Washington Carver Tour Schedule - George Washington Carver Exhibition Brief - George Washington Carver Exhibition Website
<urn:uuid:8a58674c-1325-4e30-9f2f-60a93944d3e9>
CC-MAIN-2013-20
http://mailto:%20lheaney@fieldmuseum.org/about/traveling-exhibitions/george-washington-carver
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.902425
170
2.796875
3
Individual differences | Methods | Statistics | Clinical | Educational | Industrial | Professional items | World psychology | In tort law, the standard of care is the degree of prudence and caution required of an individual who is under a duty of care. A breach of the standard is necessary for a successful action in negligence. The requirements of the standard are closely dependent on circumstances. Whether the standard of care has been breached is determined by the trier of fact, and is usually phrased in terms of the reasonable person. It was famously described in Vaughn v. Menlove (1837) as whether the individual "proceed[ed] with such reasonable caution as a prudent man would have exercised under such circumstances." Professional standard of care Edit In certain industries and professions, the standard of care is determined by the standard that would be exercised by the reasonably prudent manufacturer of a product, or the reasonably prudent professional in that line of work. Such a test (known as the 'Bolam Test') is used to determine whether a doctor is liable for medical malpractice. Medical standard of care Edit A standard of care is a medical or psychological treatment guideline, and can be general or specific. It specifies appropriate treatment based on scientific evidence and collaboration between medical and/or psychological professionals involved in the treatment of a given condition. Some common examples include: - Treatment standards applied within public hospitals to ensure that all patients receive appropriate care regardless of financial means. - Treatment standards for gender identity disorders 1. Diagnostic and treatment process that a clinician should follow for a certain type of patient, illness, or clinical circumstance. Adjuvant chemotherapy for lung cancer is "a new standard of care, but not necessarily the only standard of care." (New England Journal of Medicine, 2004) 2. In legal terms, the level at which the average, prudent provider in a given community would practice. It is how similarly qualified practitioners would have managed the patient's care under the same or similar circumstances. The medical malpractice plaintiff must establish the appropriate standard of care and demonstrate that the standard of care has been breached. A special standard of care also applies to children, who are held to the behavior that is reasonable for a child of similar age, experience, and intelligence. - Care Standards Act 2000 - Clinical governance - Duty of care - National Care Standards (Scotland) - Reasonable person - Standard of care in English law - Treatment protocols |This page uses Creative Commons Licensed content from Wikipedia (view authors).|
<urn:uuid:ec321204-58f8-450c-9c69-d2e94cac1e36>
CC-MAIN-2013-20
http://psychology.wikia.com/wiki/Standard_of_care?oldid=98690
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.924425
517
3.203125
3
Pre- and Post-Visit: Winter (Grades 1-2) Students that have spent time preparing for their visit to Glacier National Park get more out of a field trip to the park. Activities post-visit also help to reinforce information learned during the trip. The following are some of our suggested pre-visit activities, as well as supplementary materials that may aid in preparing for your trip. Suggested classroom activities from Teacher's Guide Winter Ecology Teacher's Guide (pdf) - this is a large file and may take time to download Did You Know? Did you know that over 35 Hollywood films were set in Glacier National Park? In honor of film being an American tradition, the Glacier Centennial Program hosted a film festival throughout 2010.
<urn:uuid:bb4706e7-2431-4e70-8548-8c420b72fba0>
CC-MAIN-2013-20
http://www.nps.gov/glac/forteachers/winter_1-2_pre-and-post.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.969866
155
3.109375
3
Natural disasters hurt incumbents As Hurricane Sandy leaves millions without power across the East Coast, many commentators have argued that at least one person may benefit from the storm: President Barack Obama. But seeing Sandy as only an electoral benefit for the president ignores accumulating evidence on how “acts of God” influence elections. That evidence shows that voters often punish the incumbent party for adverse events, even events seemingly beyond any president’s control. For example, one of us was part of a team that examined how tornadoes affect voting behavior. We found that voters in counties which sustained damage in election years were 1 point to 2 percentage points less likely to vote for the incumbent. While most states affected by Sandy are reliably Democratic, even small changes could affect close House and Senate races in New Jersey and Pennsylvania, or in a swing state such as Virginia.Continue Reading A Princeton study found that American voters punished the incumbent presidential party for droughts, flu epidemics and even shark attacks. In 1916, in some of the very same New Jersey beach communities devastated by Sandy, shark attacks cost incumbent Woodrow Wilson up to eight percentage points. In recently published research, we looked at decades of weather data and hundreds of elections in India. We found that incumbents fare much worse at the polls when droughts or floods — events over which the government has no control — occur. An adverse weather event cost incumbent parties about six percentage points at the polls. While the United States is not India — our population of farmers is smaller — the study provides two important lessons. First, the electoral effect is much more pronounced when the weather shock occurred in an election year. Second, voters voted against the incumbent ruling party, rather than against their individual legislators.
<urn:uuid:2003e203-7dba-4c04-9d70-ac47de78172e>
CC-MAIN-2013-20
http://www.politico.com/news/stories/1112/83184.html?hp=r18
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.963506
351
3.40625
3
ixated as the Victorians were on death, it is not at all surprising that a number of talented British poets in the nineteenth century would have explored mourning. From the elaborate, regal funerals of British royalty down to the simpler funerals of members of the working class — paid for by dutifully purchased death insurance — rituals of death formed an integral part of British life (Jones, 199). Yet the poets explored here do not write about funerals. Nor do they follow the traditional patterns of elegiac poetry, for example, used in Algernon Charles Swinburne's elegy to Baudelaire, "Ave Atque Vale." Rather, they thoroughly explore various aspects of the emotional experience of mourning. Some poets, notably Elizabeth Barrett Browning and Alfred Lord Tennyson, delve into the ways that people express grief. Tennyson also struggles with the role of one's conscience in the process of mourning and with ways to reconcile a personal need for comfort and consolation with a strong desire to honor and preserve the memory of the deceased. Christina Rossetti examines how gender and sexual interest influence the way people mourn; in particular, she considers the value of mourning in relationships in which the fleeting nature of love is acknowledged. Both she and Tennyson deal with the dead woman as an aesthetic object, and the belated mourning of a previously inattentive male figure who feasts his eyes upon the dead female, bringing to light another aspect of the way gender relations affect mourning. Finally, Rossetti presents contrasting images of the afterlife that variously affect the practice of mourning, depending upon the consciousness of the deceased. A common motif permeating poetry that deals with mourning is sound, be it in the form of tears of mourning, a missed language, a song of mourning or a noted silence. A large number of poems that consider death and mourning utilize images related to sound. The role of sound in the various elements of mourning these poets consider is crucial: sound is a critical link between two people; when one person dies, this connection is apparently broken, and the mourner is left in the unhappy position of vocally trying to maintain contact with the deceased. Thus, the numerous sound illusions in elegiac poetry are no more surprising than the general Victorian focus on death: people have mourned by means of words and songs for a long time. The emotionally charged and experimental ways of examining this method of mourning set apart the work of these poets. Seeking a means of expressing grief The loss of her parents is a shadow that hangs over Aurora Leigh in her struggle to mold her identity, in Elizabeth Barrett Browning's Aurora Leigh. Aurora tells of the loss of her mother early in the poem, describing the pain of a young child hardly old enough to understand what has happened but intensely aware that something is amiss. Aurora feels that she will always be searching for a mother because she was so young when her mother died and hence their time together was extremely brief. I felt a mother-want about the world, And still went seeking, like a bleating lamb Left out at night, in shutting up the fold, — As restless as a nest-deserted bird Grown chill through something being away, though what It knows not. [First book, lines 40-45, p. 2] In Aurora's pain, she likens herself to "a bleating lamb," interestingly connecting her own mourning with the repeated cry of a young animal. The other animal analogy she makes is to a "nest-deserted bird," and since birds are associated with songs, this also seems to have aural connotations. Aurora is like a crying animal, calling out for attention to a loved one who will not hear her. Thus, this passage subtly develops the idea of mourning as a plea to the one who has died somehow to respond and return. Aurora feels that her mother, by dying, has shut her out of her love and deserted her. The animals symbolically carry out Aurora's crying; she is too young to mourn by means of words, tears or songs, as her father writes in the verses to the memory of her mother, "Weep for an infant too young to weep much / When death removed this mother" (first book, lines 103-4, p. 4). Her father's entreaty is primarily calling for sympathy for the child who is too young to have known her mother and therefore too young to mourn her. However, he is literally calling for the act of mourning by means of tears to make up for the child's inability to cry about death at her age. Thus, there is a positive association with mourning in Aurora Leigh: there is a perceived need for Aurora to cry as part of the process of mourning her mother; the sadness of this circumstance is that the child is too young to mourn and hence show reverence and the pain of loss. She is also too young to experience the cathartic effects of mourning. When she is still quite yo ung, Aurora's father dies as well. Aurora is then taken from her nurse and from Italy, her homeland, and sent to live with her aunt. The moment of parting from her nurse is wrought with agony and sounds of loss. Aurora cannot yet express her sadness, but at this point she is acutely aware of others' sounds, particularly the sounds emitted by her nurse in her unhappiness at being parted from Aurora. [W]ith a shriek, She let me go, — while I, with ears too full Of my father's silence, to shriek back a word, In all a child's astonishment at grief Stared at the wharfage where she stood and moaned! My poor Assunta, where she stood and moaned! [First Book, lines 226-31, p. 7] Even as Aurora cannot speak in her youthful misery, she notices that her father's voice has been stilled and that her nurse moans as she anticipates the loss of Aurora. Thus, vocal mourning is associated not only with the adult way of grieving a death but also with the separation of people. Sound creates a connection between people, and death and parting break that link. It is not until Aurora reaches England that she is finally able to cry over the death of her father. She hears Britons speaking English, a language which she had only heard her father speak, and she feels the pain of unfulfilled expectations: the love she had come to associate with that language has passed with the death of her father, and that same language is now spoken by strangers. And when I heard my father's language first From alien lips which had no kiss for mine, I wept aloud, then laughed, then wept, then wept, — And some one near me said the child was mad Through much sea-sickness. [First Book, lines 254-58, p. 8] Hearing the language and focusing on her loss, Aurora is finally able to grieve aloud, and she cries and laughs with sadness and relief at her ability to mourn. Her expression of grief is perceived by those around her as delirium or a fit of insanity. Although this is a somewhat negative response to her mourning, those around her do not know the cause of her tears, and so this passage does not seem to contradict the general sentiment in Aurora Leigh with regards to vocal mourning: it is a natural expression of pain that adults manifest, and that children, as they mature, will also learn to convey. Furthermore, the loss of a person creates a void: his voice is silenced. Hence, the vocal act of calling a person back fills that sound void, and is therefore comforting to the mourner. Tennyson also considers the appropriate way to mourn and the role of sound in this process — particularly in the form of mourning songs — in In Memoriam, his experimental elegy for his beloved friend, Arthur Henry Hallam. He questions the morality of such methods of mourning with respect to the memory of the deceased; yet it seems that in addition to his concern for the deceased, the narrator is also personally dissatisfied with the effects of mourning songs. Peace; come away: the song of woe Is after all earthly song. Peace; come away: we do him wrong To sing so wildly: let us go. [57, lines 1-4, p. 239] These lines suggest that the songs a mourner sings and the sounds of weeping together express a need to cling to the deceased and a refusal to relinquish him. The speaker and the other mourners dwell on the dead one, carrying on wildly rather than letting him pass peacefully and calmly. The narrator's call to those singing is to leave the dead behind and go on. He literally says that it does the deceased wrong when those alive sing, but he seems to be concerned with those who survive as well. Although this singing about loss is an earthly thing to do, and it is not exactly viewed by the speaker as an inappropriate way for those on earth to channel their grief, it is nonetheless not satisfying for exactly the reason it is natural: it is only earthly, and it provides no divine satisfaction to the mourner. The narrator is seeking that sort of spiritual experience and confirmation that Hallam died for a divine reason. The speaker feels this divine connection to Hallam in poem 95 of In Memoriam, and it is by means of touch not sound that the spiritual experience occurs, and that the narrator finds at least some degree of satisfaction. The role of conscience Throughout In Memoriam, Tennyson, as an evolving narrator, struggles in his efforts to cope with Hallam's death. He considers thoroughly how he will be affected by different modes of mourning, and he worries deeply about the effects these will have on him. He is acutely concerned that in mourning Hallam, he will somehow ease his own suffering; although he is urgently searching for divine meaning behind Hallam's death, his conscience continuously discourages him from mourning in any way that consoles him, and this makes his mourning process even more difficult and painful. He contemplates the morality of writing about his friend's death, fearing that the action of writing, which may mitigate his pain — "Like dull narcotics, numbing pain" (5, line 8, p. 208), is unethical. The act of forming words out of his pain, he fears, will misrepresent his feelings because it is impossible to perfectly capture the state of his soul (5, lines 1-4, p. 208). Similarly, he worries that beyond simply soothing his pain, he is actually using the death of his friend as inspiration for his own artistic creation, just as the yew tree receives its nourishment from the dead bodies buried in graveyards (2, lines 1-4, p. 207); this is a highly disturbing thought to a character so plagued by his conscience. He also worries that the elegy he is writing for Hallam will not provide an enduring tribute to his friend. Come; let us go: your cheeks are pale; But half my life I leave behind. Methinks my friend is richly shrined; But I shall pass, my work will fail. [57, lines 5-8, p. 239] Thus, in his mourning, the narrator is aiming not only to grapple with Hallam's death, but to create a worthy memorial for him. Although the narrator calls for an end to mournful singing, he expresses the belief that he will always be haunted by sounds reminding him of the death of Hallam. He notes that until his hearing fails him or until he himself dies, he shall hear a slow, constant bell announcing the death of his friend repeatedly in his own ears. He also describes hearing the repeated farewells said to those who are dead. Yet in these ears, till hearing dies, One set slow bell will seem to toll The passing of the sweetest soul That ever look'd with human eyes. I hear it now, and o'er and o'er, Eternal greetings to the dead; And "Ave, Ave, Ave," said, "Adieu, adieu," for evermore. [57, lines 9-16, p. 239] Thus, even when the mourner stops his vocal mourning, he nonetheless remains doomed to hear reminders of the death. It is as though the connection between the two men is so strong that not even death can break it, and sounds still draws them to one another. At this point in the poem, the narrator seems to believe that it is the responsibility of the mourner forever to hear morbid, painful sounds. Interestingly, if memories of the dead can aurally infiltrate the being of the mourner but the mourner must remain silent and experience pain fully, the natural order of the world becomes inverted: rather than the dead being silenced and those who remain alive retaining the power to speak and sing, the reverse essentially is condoned. That is, the narrator may continue to speak and sing, orally expressing his grief, but such vocal manifestations of sadness are not encouraged. On the contrary, the bells prompting him to grieve, which the narrator hears in his mind, are considered righteous and appropriate. Whereas some poems denigrate the act of mourning aloud, suggesting that it is inappropriate or inadequate, others discourage such forms of mourning in the particular context of romantic relationships and gender relations. For example, in Christina Rossetti's "Song," the narrator's request that the person to whom the poem is addressed not mourn is more a reflection of the dynamic between the characters and an indicator of gender relations than a suggestion of a general dissatisfaction of the narrator with vocal mourning. When I am dead, my dearest, Sing no sad songs for me; Plant thou no roses at my head, Nor shady cypress tree: Be the green grass above me With showers and dewdrops wet; And if thou wilt remember, And if thou wilt forget. [lines 1-8, p. 198] As George Landow has shown in "The Dead Woman Talks Back: Christina Rossetti's Ironic Intonation of the Dead Fair Maiden," Rossetti is toying with and upsetting common ideas of Victorian femininity. The last two lines of the quotation above seem to conform to standard stereotypes of the self-sacrificing female: she does not want to inconvenience her lover or cause him distress by demanding that he mourn her and always remember her. Yet the final lines of the poem, "Haply I may remember, / And haply may forget" (lines 15-16) reverse the previous vision of self-sacrifice and eternal love on the part of the female speaker, suggesting instead that she is content to or at least quite capable of forgetting her lover and that he should do the same. This reading allows for further consideration of the role of the specific acts of mourning that are mentioned in the poem. As the poem continues, the speaker describes a senseless afterlife in which she will not see, feel or hear anything, including the nightingale's song. Thus, her death will distinctly separate her from the world, and not even the mourning song of the nightingale will reach her. The removal of the speaker from the living world will render her incapable of hearing songs of mourning, and therefore such mourning rituals become ridiculous. In the course of the poem, the narrator gradually challenges the notion that there is eternal love between herself and the speaker. Thus, death can be seen as the appropriate moment at which to accept the rupture of their relationship, since it would not continue forever anyway; there is no need, then, to prolong the connection by means of songs and other customs of mourning. Rossetti boldly states what many people dare not admit: that the person who has died will not benefit from the mourning practices of those who survive him and hence, such customs only serve those who live. In a situation in which the lover is not likely to go on loving the woman who has died, Rossetti's narrator urges him not to mourn in false, showy ways: both of them will soon forget each other anyway. Beyond projecting herself into the grave, the speaker in Rossetti's "After Death" is already dead and narrates the poem from the grave. She is thus a standard aesthetic object, deemed a beautiful and rich source for poetry (Landow). In this poem, the lamenting words of the dead woman's beloved reach her ears, even though he does not know it. He leaned above me, thinking that I slept And could not hear him; but I heard him say: "Poor Child, poor child:" and as he turned away Came a deep silence, and I knew he wept. [lines 5-8, p. 200] In this case, the man's grieving words do provide comfort to the narrator, whom he did not love in her life and whom he can only pity in death. In the silence, she indicates her certainty that he is crying for her. Thus, words and tears of mourning have practical significance in this poem because they can be heard and felt by the deceased. Here the acts of mourning do not fall on deaf ears, and they are conveyed to the reader by the character with the most personal investment in them: the dead woman for whom they were intended. The dead woman as an aesthetic object also appears at the end of Tennyson's "The Lady of Shalott" when the knight Lancelot notices the beauty of the dead Lady of Shalott. From the moment that she places herself in the boat and sets out down the river, sound plays a key role in setting the scene of her death. As she floats, "the noises of the night"(line 139) are mentioned, but it is the music that she herself creates that is the more powerful sound. They heard her singing her last song, The Lady of Shalott. Heard a carol, mournful, holy, Chanted loudly, chanted lowly, Till her blood was frozen slowly, And her eyes were darkened wholly, Turned to tower'd Camelot. For ere she reach'd upon the tide The first house by the water-side, Singing in her song she died, The Lady of Shalott. [lines 143-53, p. 44] It is as though the Lady of Shalott sounds her own death knell with her song. Her music is her final and only direct interaction with the world, distant as it is, before her death. She has emerged from her bower and sings a song that reaches the ears of those her boat passes on the journey to Camelot. Then, after death, she physically confronts the outside world. Previously, she saw shadows and reflections of the world outside and made no art that the outside world could appreciate. The sound she emits before her death, however, establishes a brief and melancholic connection between her and the world. Yet when she reaches Camelot, she is "silent" (line 158, p. 44), and her deathly presence causes the merriment in the palace to cease, killing the sounds within (lines 164-5, p. 45). The silence of those at the palace stresses the absence of vocal mourning, emphasizing the distance between her and them, and their inability to feel deep compassion for her. The connection she made with them with her song is largely one-sided: most of them do not respond. Lancelot, however, does respond, but his comments about the beauty of her face and his request for God's blessing on her ring of transience: in death she has caught his fancy for a moment, but he will soon move on and forget her. In the same way that Rossetti argues against the immortality of love in "Song," Tennyson seems to suggest the inherently ephemeral nature of vocal mourning at the end of "The Lady of Shalott." The use of the word "mournful" anticipates her death, and perhaps compensates for the fact that she will not be mourned by anyone who knew her, except in her own self-pitying song. The post-mortem mourning of the men who did not love or notice the women in life has a dramatic and ironic, yet somewhat shallow effect. In both "After Death" and "The Lady of Shalott," the reader is left with a slight feeling of satisfaction: at least the man has finally noticed the woman, if only for a moment and after her death. An aura of revenge, if only mild revenge, is thereby achieved: the punishment for having ignored the women in life is that the men are doomed to see beauty in the women only when they are already out of reach. Images of the Afterlife Rossetti's imaginings of life after death range from the complete alertness seen in "After Death" to the partially aware state of the woman in "Dream Land" to the completely senseless states of the women in "Song" and "Rest." The woman discussed in "Rest" is completely shielded from the sounds of earthly life. However, the sounds discussed in the poem are not sounds of mourning, but rather the sounds that make up daily life. The omniscient narrator calls for the earth to physically isolate and protect the buried woman from "mirth/ With its harsh laughter" (lines 3-4, p. 200) and the "sound of sighs" (line 4, p. 200). The narrator, who several times alludes to sound, claims that the woman will be spared all noise in her rest, and that the silence of death will be "more musical than any song" (line 10, p. 200). The afterlife in this poem resembles that described in "Song" in that the woman escapes to a senseless, timeless place of peace. Although "Rest" does not deal directly with mourning, it reinforces the idea that sound establishes a connection between people; in the woman's desire to escape the world in death, she is entirely isolated, both from people and sound. Interestingly, in Rossetti's "Dream Land," she creates a post-mortem state somewhere between the full awareness of the narrator in "After Death" and the senseless afterlife described in "Song" and "Rest." The third person narrator in "Dream Land" never states that the woman in the poem is dead, saying rather that she is asleep, which is also implied by the title. However a number of illusions in the poem suggest that her sleep is actually death, or at least strongly resembles such a state: "a perfect rest" (line 17), "rest, for evermore" (line 25), and Till time shall cease: Sleep that no pain shall wake; Night that no morn shall break Till joy shall overtake Her perfect peace. [lines 28-32, p. 199]. The final two lines in particular suggest the prospect of heaven after a deathly respite. Although Rossetti describes how the speaker cannot see grain or feel rain, she nonetheless is able to see "the sky look pale" (line 14) and hear "the nightingale / That sadly sings" (lines 15-6). Her awareness of these sights and sounds suggests an increased awareness as opposed to the senseless afterlife anticipated by the narrator of "Song." In "Dream Land" there is no indictment of mourning. Rather, there is a slight indication that sounds can pass between the worlds of the living and the dead or at least deeply sleeping; therein may lie a justification for the nightingale's song or a lover's cries of mourning, despite the indications in "Song" that such methods of mourning are futile. As a contrast to Rossetti's quieter imaginings of the afterlife, and a parallel to "After Death," it seems reasonable to mention the afterlife envisioned by Robert Browning in his dramatic monologue, "The Bishop Orders his Tomb at Saint Praxed's Church." In "A Strangely Literal Afterlife," I discuss the lack of faith suggested by the fully aware, materialistic, and grudge-holding afterlife the Bishop envisions for himself. Yet despite Rossetti's devout religious tendencies, her depiction of the afterlife, in the poems discussed above, seems less religiously than emotionally focused: she is concerned with the women's connections or lack thereof to the world and people around them, and how death and awareness of sound affect these connections. Mourning and the connections people hope to make by emitting sounds are relatively specific themes, yet they illuminate a distinct perspective on the broader topics of personal expression, conscience, gender and the afterlife, all subjects explored by the Victorian poets here considered. They created characters who aspire to connect with other people, sometimes those who have died and are therefore out of reach. These characters struggle to adequately express their emotions. In situations of loss, this need to express oneself is heightened as a result of suffering. As they grieve and search for meaning or solace in the wake of a death, some characters feel the strains of a strong conscience, causing them to question which forms of mourning and self-expression are moral and which are not. Certain poets considered the way that men grieve for women, sometimes viewing the process from unusual angles. Gender relations played an ever-changing role in Victorian life, so of course their appearance in the elegiac poetry of the nineteenth century is understandable. Poetry that deals with love often also considers loss, and this loss allows for creative conceptions of the afterlife. All of these subjects intimately relate to human relationships. By addressing these issues, the poems discussed show that sounds both draw people together and ultimately force them to accept that their connections have been severed — and that all that remains is silence. Bolton, John, Robert Glorney and Julia Bolton Holloway, eds. Elizabeth Barrett Browning: Aurora Leigh and other Poems. Penguin Putnam Inc., New York, 1995. Buckley, Jerome H. ed. The Pre-Raphaelites. Academy Chicago Publishers, Chicago: 1968. Hill, Robert W. Jr., ed. Tennyson's Poetry. W. W. Norton and Company, Inc., New York: 1999. Jones, Gareth Stedman. "Working-class culture and working-class politics in London, 1870-1900: Notes on the remaking of a working class" in Languages of class: studies in English working class history, 1832-1982. Cambridge University Press, Cambridge: 1983. Smalley, Donald ed. Poems of Robert Browning . Houghton Mifflin Company Riverside Editions, Boston: 1956. Swinburne, Algernon Charles. "Ave Atque Vale, In Memory of Charles Baudelaire." [text on U. of Toronto site]. Last modified 17 December 2003
<urn:uuid:3daef337-9437-4eae-be68-3efe0aaee880>
CC-MAIN-2013-20
http://www.victorianweb.org/victorian/authors/ebb/newman14.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.969099
5,534
3.640625
4
This is the third and final installment of this three part series. Please see earlier entries for part 1 and part 2. What does the atheist do with Jesus of Nazareth? Some atheists, right from the start, try to inject doubt into this topic by either overtly claiming or subtly hinting that there actually was no historical Jesus of Nazareth. For example, Bertrand Russell wrote: “Historically it is quite doubtful whether Christ ever existed at all, and if he did we know nothing about him.” Although some may argue for the participation of other, earlier historical figures that began making these claims, most historians peg the start of these allegations with a man named Bruno Bauer (1809 – 1882). Bauer was a German theologian, philosopher and historian who looked at the sources of the New Testament and controversially concluded that early Christianity owed more to Greek philosophy (Stoicism) than to Judaism. Starting in 1840, he began a series of controversial works arguing that Jesus was a myth, a second century fusion of Jewish, Greek, and Roman theology. Bauer’s work was picked up by Albert Kalthoff (1850-1906) who followed Bauer’s extreme skepticism about the historical Jesus. Kalthoff went so far as to claim that Jesus of Nazareth never existed and was not the founder of Christianity. However, Bauer’s and Kalthoff’s assertions were refuted (and have continued to be refuted) by legions of historians, both Christian and secular. One example is Gary Habermas book “The Historical Jesus” that chronicles scores of extra-Biblical historical references to Jesus’ first century life, the count of which outnumbers citations of historical figures that no person doubts (e.g. Tiberius Caesar; 10 mentions vs. 43 for Jesus). Summing up the conclusion on whether Jesus of Nazareth actually lived, Princeton New Testament scholar Dr. Bruce Metzger says, “Today no competent scholar denies the historicity of Jesus.” So where is the atheist’s evidence that Jesus of Nazareth never existed? To date, no compelling proof has been offered. Some atheists who know better than to attack the historicity of Jesus’ actual life put forward arguments that involve Christ being mythologized by His followers into more than He was. They try and assert that various pagan gods such as Horus, Mithras, etc., influenced the disciples who borrowed traits from those deities and attached them to Jesus. Books such as James Frazer’s The Golden Bough and more recent works like the Internet Zeitgeist movie have been literally pulverized into submission by scholars who have showcased the many logical fallacies committed by the authors and the extraordinary lack of real commitment to historical research. Metzger says, “It goes without saying that alleged parallels which are discovered by pursuing such methodology evaporate when they are confronted with the original texts. In a word, one must beware of what have been called, ‘parallels made plausible by selective description.’” The fact is, the atheist cannot deny the historicity of Jesus’ life and be on the side of historical truth. The core historical facts include the following: Jesus was born to a young and very ordinary couple. There was some controversy surrounding his birth (which primarily centered on who his actual father was), however outside of that, he lived in relative obscurity for about thirty years. He then burst onto the religious scene in the Roman occupied areas of Galilee and Jerusalem as a very learned Jewish Rabbi, despite never being formerly educated. Reports of him performing amazing miracles (e.g. healing the sick, raising the dead, performing exorcisms) spread throughout the regions, along with claims of him being the long awaited Jewish Messiah. He gathered around him a band of fairly unsophisticated disciples, with others also following his itinerant preaching journeys. Soon, though, he ran afoul of the Jewish religious leaders and was brought before the Roman authorities on a number of unsubstantiated charges. He was then condemned to death under the Roman prefect Pontius Pilate, put to death under the common form of Roman execution, which was crucifixion, and then buried. Three days later, his body went missing and remains missing to this day. Reports of him appearing to both believers and unbelievers alike quickly began to circulate. His disciples who had fled from him during his arrest then boldly began to declare that they had seen him alive, that he was the Christ of God, with his resurrection becoming the absolute center of their preaching. A number of his disciples were martyred for their refusal to deny their story, with others like John dying of natural causes. Lastly, a zealous Jewish Pharisee, Saul of Tarsus, who had formerly persecuted the new Jesus movement, claimed he too had seen Jesus alive. Saul converted to the Christian faith and eventually was beheaded by the emperor Nero for his faith around 65 A.D. Now, it’s important to understand one thing about the prior statements: none of them requires any faith whatsoever to believe. Not one. Every claim above can be confirmed via the standard, scholarly methods (including archaeological finds that back the Bible) used to verify ancient history. The question is, when a philosophical appeal to the best explanation is made to account for these facts, where does the atheist end up? What bothers the atheists the most, obviously, is Christ’s resurrection. Dead men stay dead, says the atheist. Our experience tells us that this is something you can count on. Dead people do indeed stay dead in a naturalistic-only reality that is a closed system. But what if…what if there is a supernatural reality and our universe is actually an open system to a Creator that transcends everything that is physical? That is a horse of a different color, and one that goes back to the atheist’s need for philosophical and empirical evidence to rule out God. Occasionally an atheist will say to me (quoting Carl Sagan): “Extraordinary claims require extraordinary evidence.” What they often don’t realize is that, while they meant to slice into me with their comment, their sword actually cuts both ways. The atheist claims that a cause (with a beginning all its own) possessing none of the characteristics of its effects created all that we know. That’s a pretty extraordinary claim. The atheist claims that “Living objects . . . look designed, they look overwhelmingly as though they’re designed. Biology is the study of complicated things which give the impression of having been designed for a purpose”, and that the information (not data) contained with all of us did not come from an intelligent source. That’s a pretty extraordinary claim. The atheist claims that either Jesus never existed or all the historical accounts written about Him are inaccurate, exaggerated, and cannot be trusted. That’s a pretty extraordinary claim. If extraordinary claims require extraordinary evidence, then the atheist has some explaining to do. And that explaining needs to involve supplying the same rock-solid proof (not mere theories) that they themselves routinely require of Christians. Bertrand Russell, Why I am not a Christian, pg. 16. Bruce Metzger, The New Testament: Its Background, Growth, and Content (New York: Abingdon, 1965), pg. 78. Bruce Metzger, Historical and Literary Studies: Pagan, Jewish, and Christian (Grand Rapid, MI: Eerdmans Publishing, 1968), 9. Richard Dawkins, The Blind Watchmaker, 1986, Pg. 1.
<urn:uuid:ece23998-c95c-4b31-af81-d6749aa7bf98>
CC-MAIN-2013-20
http://calebspath.blogspot.jp/2012/04/where-is-evidence-for-atheism-part-3.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707435344/warc/CC-MAIN-20130516123035-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.963833
1,579
2.84375
3
Flight pioneer Bertrand Piccard, an aeronaut who made the first nonstop round the world balloon flight, recently unveiled a prototype of an incredible solar-powered airplane that will one day circle the globe. Dubbed the Solar Impulse, the plane first caught our attention when it was being developed, and we’re thrilled to see a working prototype of the vehicle. Is the age of the solar powered airplane upon us? The first test of the HB-SIA, (the technical name for the Solar Impulse), will take place at the end of 2009. The Solar Impulse team is aiming for a flight sequence that will last for two days and one night, propelled only by solar energy. Once that test is completed, they plan on traveling around the world. The Solar Impulse is made out of carbon fibre concentrate, looks like a glider, and has a wingspan of over 60 meters. The wings are covered in almost 12,000 solar cells which store excess power in over 400 kilograms worth of batteries. These solar cells power four ten horsepower electric motors, which propel the plane into flight. “If an aircraft is able to fly day and night without fuel, propelled solely by solar energy, let no one come and claim that it is impossible to do the same thing for motor vehicles, heating and air conditioning systems and computers.” said Bertrand Piccard. Sounds like history in the making.
<urn:uuid:5af3ebd7-5400-45a1-b003-caae7397eba8>
CC-MAIN-2013-20
http://inhabitat.com/solar-impulse-plane-unveiled-set-to-circle-the-globe/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707435344/warc/CC-MAIN-20130516123035-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.928698
291
3.578125
4
Czech Family History Czech Surname History This Czech origins and history page contains the accumulated history of the Czech family name made up of user-uploaded content from users like you. Czech family history has a rich and complex origin whose details have been accumulated over the years by Czech family members. The last name Czech is an old heredity that has spread all across the world over the centuries, and as the name Czech has migrated, it has evolved making its origin tricky to unearth. No content has been submitted here about Czech. The following is speculative information about Czech. You can submit your information by clicking Edit. The evolution of Czech begins with it's early ancestors. Even in the earliest days of a name there are changes in that name simply because family names were infrequently written down back when few people could write. It was commonplace for a surname to change as it enters a new country or language. As families, tribes, and clans emigrated between countries, the Czech name may have changed with them. Czech family members have travelled around different countries all throughout history. Czech country of origin No content has been submitted about the Czech country of origin. The following is speculative information about Czech. You can submit your information by clicking Edit. The nationality of Czech may be complicated to determine because countries change over time, leaving the nation of origin indeterminate. The original ethnicity of Czech may be difficult to determine as result of whether the surname originated organically and independently in multiple locales; e.g. in the case of names that are based on a craft, which can appear in multiple places independently (such as the family name "Gardener" which was given to people of that profession). Meaning of the last name Czech No content has been submitted about the meaning of Czech. The following is speculative information about Czech. You can submit your information by clicking Edit. The meaning of Czech come may come from a craft, such as the name "Fisher" which was given to fishermen. Many of these trade-based family names might be a profession in a different language. For this reason it is useful to know the country of origin of a name, and the languages used by its progenitors. Many names like Czech originate from religious texts like the Bhagavadgītā, the Quran, the Bible, and so on. Often these names relate to a religious sentiment such as "Favored of God". - Edward J Czech 1927 - 2005 - Peter Czech 1921 - 1993 - Thaddeus A Czech 1921 - 1990 - Mary Czech 1913 - 1975 - Joseph Czech 1902 - 1971 - Natalie M Czech 1913 - 2005 - Valentine Czech 1916 - 1974 - Stanley Czech 1918 - 1978 - Edna Czech 1912 - 2003 - Joseph Czech 1891 - 1968 - Max Czech 1915 - 1965 - Peter S Czech 1914 - 2000 - Anna Czech 1891 - 1967 - Helen B Czech 1927 - 1992 - Evelyn Czech 1926 - 1981 - K E Czech 1956 - 1990 - Michael J Czech 1921 - 1999 - John Czech 1896 - 1976 - Agnes Czech 1901 - 1973 - Doris T Czech 1927 - 2000 Czech Family Tree Famous people named Czech No famous people named Czech have been submitted. You can submit your information by clicking Edit. Nationality and Ethnicity of Czech No content has been submitted about the ethnicity of Czech. The following is speculative information about Czech. You can submit your information by clicking Edit. We do not have a record of the primary ethnicity of the name Czech. Many surnames travel around the world throughout the ages, making their original nationality and ethnicity difficult to trace. More about the name Czech Fun facts about the Czech family We have no fun facts about Czech. You can submit your information by clicking Edit. Czech spelling variations No content has been submitted about alternate spellings of Czech. The following is speculative information about Czech. You can submit your information by clicking Edit. In times when literacy was uncommon, names such as Czech were transcribed based on how they were heard by a scribe when people's names were written in court, church, and government records. This could have led to misspellings of Czech. Knowing misspellings and spelling variations of the Czech surname are important to understanding the history of the name. Surnames like Czech transform in how they're said and written as they travel across tribes, family branches, and languages over time.
<urn:uuid:4b938b64-534c-4706-ae2c-31d227fb96f2>
CC-MAIN-2013-20
http://www.ancientfaces.com/surname/czech-family-history/57636
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707435344/warc/CC-MAIN-20130516123035-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.962071
928
2.71875
3
Secular biology textbooks have finally begun to remove a long-time favorite of evolutionary teaching—the fraudulent drawings of embryos produced by Ernst Haeckel in 1868. But another one of Haeckel’s errors is still alive and well. Haeckel claimed that “gill slits” (now called “throat pouches”), a backbone, and a tail in vertebrate embryos are proof that humans and animals descended from a common ancestor. This idea is still presented in textbooks, despite the fact that the initial stages of development follow very different patterns of cell division and become very different structures in the mature organisms. The differences are ignored, and the similarities, though fleeting and only superficial, are emphasized to support the idea of a common evolutionary history. The fact that the “throat pouches” develop into jaw and gill structures in fish, and ear and throat structures in humans shows that the apparent similarities in the embryos are not indications of common ancestry. Rather, it is clear that these vertebrates do not share a common ancestor because they develop in unique ways. Help keep these daily articles coming. Support AiG. If you decide you want to keep Answers coming, simply pay your invoice for just $24 and receive four issues (a full year) more. If not, write “cancel” across the invoice and return it. The trial issue is yours to keep, regardless! Please allow 4-6 weeks for delivery. New subscribers only. No gift subscriptions. Offer valid in U.S. only. Building a Biblical Worldview ISSN: 1937-9056 | © 2013 Answers in Genesis
<urn:uuid:f88bffb6-2970-4ba8-8177-ef7992e8075f>
CC-MAIN-2013-20
http://www.answersingenesis.org/articles/am/v2/n4/developing-deception
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707435344/warc/CC-MAIN-20130516123035-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.940239
346
3.1875
3
NetWellness is a global, community service providing quality, unbiased health information from our partner university faculty. NetWellness is commercial-free and does not accept advertising. Sunday, May 19, 2013 What is pulmonary hypertension? Pulmonary hypertension is a lung disorder in which blood pressure in the pulmonary artery rises above normal levels. The pulmonary artery is the blood vessel carrying oxygen-poor blood from the heart to the lungs. Pulmonary hypertension is present when the mean pulmonary artery pressure is greater than 25mmHg at rest or 30mmHg with exercise. This abnormally high pressure (pulmonary hypertension) is associated with changes in the small blood vessels in the lungs, resulting in (More) Understanding Pulmonary Hypertension Commonly Asked Questions Research and Your Health: Ask an Expert Get Help With ... Related Topics and Conditions
<urn:uuid:660c9c7c-41b0-4de9-9d1f-770fd9451090>
CC-MAIN-2013-20
http://netwellness.com/healthtopics/pulhypertension/default.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.903471
177
3.234375
3
People of Northwest Public Radio Shots - Health Blog Thu January 26, 2012 Working Long Hours Can Be Depressing, Truly Putting in a lot of of overtime can make a person more vulnerable to depression. You might have guessed that. But now there are some hard numbers, thanks to a study that tracked the health of civil service workers in Great Britain. People who worked 11 hours a day or more than doubled their risk of major depression, compared to colleagues putting in eight hours a day. Well, who wouldn't be depressed, trapped in the office all those hours? But the story's a bit more complicated, and interesting, than that. Earlier studies have found that people with jobs are less likely to be depressed, as are people with higher incomes. And executives often put in long hours in order to pull down those fat salaries. But this study, which was published online in the journal PloS One, found that long hours at the office wiped out the protective effect of income. "Despite the fact that many of the employees who worked long hours were high [socio-economic status] employees," Marianna Virtanen, an epidemiologist at the Finnish Institute of Occupational Health who led the study, told Shots in an email, "working long hours was associated with depression." All the people in the study were white-collar workers in the civil service, so it's a pretty small snapshot of the working world. Those working longer hours were more likely to be men in higher-level job grades. They were also more likely to be married or living with someone, and likely to drink more than they should. Sounds almost like a British version of Don Draper, the hard-drinking ad exec at the center of the AMC series Mad Men. The correlation between long working hours and depression didn't come to light until the researchers adjusted their data to level out income. That's a standard statistical technique to try to determine the effect of different factors. "In terms of prevention, revealing the relevance of long working hours as a risk factor among high-[socio-economic status] employees who otherwise have lower risk of depression seems important," the researchers write. Still, it's worth noting that the population groups most at risk for major depression are women, members of minority groups, and people unable to work or unemployed, and those without health insurance, according to the federal Centers for Disease Control and Prevention.
<urn:uuid:6b0aac4c-c29a-4a35-98e5-b83ef0391165>
CC-MAIN-2013-20
http://nwpr.org/post/working-long-hours-can-be-depressing-truly
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973817
495
2.875
3
This article explains the advantages of using the h-index method of ranking over the impact factor, and the virtues of the new Google Scholar Metrics: The main flaw with the impact factor is that it is basically an arithmetic mean and, consequently, sensitive to outliers. Like a megastar that pulls all the lesser celestial bodies towards itself, one highly influential paper can draw the impact factor closer to its own citation count. This could give a distorted sense of the importance of the journal publishing the paper if its other contributions were largely forgettable. Suppose that in the current calendar year, the journal's one-hit wonder had 200 citations and its remaining 10 articles no citations. This would give the journal an impact factor of 18.2, suggesting, misleadingly, that articles it distributed typically receive 18 citations per year. Contrast this with the journal's h-index of 1, an accuracte reflection of the number of highly-cited articles the journal had published. Another advantage of Scholar Metrics is its inclusion of web repositories like the Social Science Research Network and arXiv, where authors can make manuscripts or published articles available to the web community at no cost to themselves or their readers. By making it into the top 10 of the h-index ranking, these repositories demonstrate the importance of open access and early views in strengthening a publication's sway.
<urn:uuid:147570f6-0fb6-4085-8f04-197fd0b2c78b>
CC-MAIN-2013-20
http://scholcommbc.blogspot.com/2012/04/google-scholar-metrics.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.926442
274
2.53125
3
DESOTO COUNTY, MS (abc24.com) - "Shake out so you don't freak out" was the motto of hundreds of students and teachers in DeSoto County Thursday during an earthquake drill. Mississippi is one of nine states taking part in the "Great Central U.S. Shakeout." It's designed to make sure everyone knows exactly what to do if an earthquake strikes. About three million people ran through the drill, a good number of them were school children. "I heard poles falling, walls breaking, ceilings falling in and all different kinds of stuff," says second grader Reagan Sandy. "It's very important to get down under your desk very quickly," adds classmate Bella Miller. Students at Desoto Central Primary are prepared for the worst. "We always have to cover our head," says Casey Montelelne. "When they say that you can exit the building, then you have to put your hands over your head and exit the building," Miller tells abc24.com. The kids practice drills like this every year. "In case if an earthquake really happened," Sandy says. Their response will be second nature. "We want them to kick into automation mode," says Dr. Marcia McNutt, director of the U.S. Geological Survey. Schools in Mississippi and eight other states, including TN and AR, practiced the safety techniques of drop, cover and hold on. "So they can protect themselves from falling debris and everything else," McNutt says. Scientists believe there's up to a 40% chance a serious earthquake will happen in the next 50 years. "There might be some in our lives that happen," Sandy says. "If we don't know how to do them we won't be prepared." Emergency responders want people to be ready, especially kids. "Then they go home and teach parents and older siblings what to do and it becomes a domino effect of increasing earthquake awareness everywhere," adds McNutt. Students start learning these drills in kindergarten and practice them through high school.
<urn:uuid:dd461a0a-1a96-48e7-bb56-40687cad55c0>
CC-MAIN-2013-20
http://www.abc24.com/news/local/story/DeSoto-County-Takes-Part-in-ShakeOut-Earthquake/MVptHGfva0yOCV-XI5MS-g.cspx
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973345
429
2.640625
3
|| Home | Contents |||| Settlement of Mobile || || Quick Summary | Details | Bibliography || and the Settlement of Mobile 1702 French, led by Jean-Baptiste Le Moyne de Bienville, found Mobile, capital of French Louisiana, on a bluff 27 miles north of mouth of Mobile River; town clustered around Fort Louis. 1711 After upriver site flooded, Mobile moved to permanent settlement on west bank of Mobile River; Fort Condé built to protect settlers. 1718 Biloxi supplants Mobile as capital of French Louisiana, and in 1720 New Orleans replaces Biloxi. Mobile serves as the main center for trade with the Muscogee Indians. 1763 British claim Mobile as part of settlement of French and Indian War in Treaty of Paris of 1763. 1780 Spanish occupy Mobile during American Revolution. 1783 Spanish gain title to British West Florida, including Mobile, in Treaty of Paris of 1783. 1803 Louisiana PurchaseU.S. claims that Mobile is part of West Florida, which was included in Purchase lands. 1804 Mobile placed in a U.S. Customs District. 1810 Planters in West Florida declare their independence from Spain; President James Madison annexes territory that includes Mobile. 1813 During War of 1812 American forces occupy Mobile and the Spanish depart; IMPERIAL RULE ENDS. 1819 Mobile included in the new state of Alabama (following time in Mississippi and Alabama Territories); Americans soon demolish colonial fort and develop downtown riverfront property.
<urn:uuid:e856f2fc-6447-4a7d-b70c-358e7e57b6e9>
CC-MAIN-2013-20
http://www.alabamamoments.state.al.us/sec02qs.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.919219
319
3.59375
4
The Juvenile Court system is modeled after the adult court system, but the way that it is implemented and the purpose behind it are quite different. The Juvenile Court system is much more child oriented. It is understood that children entering the Juvenile court system are at varying developmental stages and are capable of only certain levels of understanding. In recognizing this fact, the Juvenile Court has tried to make the courtroom atmosphere and the language surrounding it less intimidating. For example, children commit law violations, not crimes, and they admit or deny to the charges rather than plead guilty or not guilty. Due to the intimidating nature of the judicial system, it is important for the court to accommodate and cater to these special needs. The Juvenile Court is, therefore, more open to modification , which is dictated by the individual needs of the children. Juvenile offenders going through the Juvenile Court system are afforded almost every right that adult offenders are granted. The exception to this is that they are not given the right to a jury trial. A judge will always decide the issue at any Juvenile proceeding. The step of grand jury is also bypassed in the Juvenile Court system. Another major difference between the two court systems is the philosophy or focus. The Juvenile Court system's goals are that the offending child take responsibility for his or her actions, and get help to overcome the problem. If the offending child denies the allegations, the case proceeds much like in the adult court system. The District Attorney's computer system does not contain the status of Juvenile cases. In order to find out what is going on in a juvenile case, you should call the offending child's probation officer. This person is assigned to the case when it first enters the Juvenile Court system. He/she is an extremely helpful source of information (e.g. - date of the next court hearing, the conditions of the offending child's release, etc.). To find out who is the assigned probation officer, you may call the Juvenile Court. You may also call the D.A.'s office at Juvenile. Most Juvenile Court hearings are held at the Family Court building at 3030 Center Street NE; however, because of the increased caseload, some juvenile trials are also being set at the courthouse. Please be advised, given the delicate and confidential nature of juvenile cases, officials may not be willing to discuss cases over the phone unless you have a specific relation to the case, and a "need to know".
<urn:uuid:320e30e0-c765-4b9e-a898-a380eaff8a53>
CC-MAIN-2013-20
http://www.co.marion.or.us/DA/juvenile/?WBCMODE=PresentationUnpublished%2CPresentationUnlpublished%2CPresentationre%2CPr
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.954908
505
2.515625
3
Now four new studies presented at the Alzheimer’s Association International Conference in Vancouver add to the growing evidence that the elderly should get off the couch, showing that regular exercise — both aerobic training, like walking, and strength training involving weights — helps improve memory and reduces the frequency of those momentary hiccups we call “senior moments.” In one study, Dr. Kirk Erickson of the University of Pittsburgh and his research team found that when sedentary adults start working out even after the age of 65, the brain still benefited, increasing in size and function. The researchers looked at 120 inactive adults, some of whom were cognitively healthy and some who reported having mild memory lapses. The volunteers were assigned to a yearlong exercise program, doing either moderate-intensity walking or participating in a stretching-toning program. The researchers used an MRI to scan the brain and found that after a year of exercise, the walking group showed improved memory and increases in volume in the hippocampus, a brain region crucial for processing memory, compared with those who stretched. “Our findings suggest that the aging brain remains modifiable, and that sedentary older adults can benefit from starting a moderate walking regimen,” Erickson said in a statement. Two other studies looked at older adults who had already been diagnosed with mild cognitive impairment (MCI), a condition involving mild problems with thinking and memory that may precede dementia or Alzheimer’s. One of the studies, led by Dr. Hiroyuki Shimada of the National Center for Geriatrics & Gerontology in Japan, evaluated 47 adults ages 65 to 93 who were assigned to either a multifaceted exercise program or a no-exercise group for a year. The exercise program, which included aerobic exercise, strength training and balance training, involved two 90-minute sessions a week. Those who didn’t exercise attended health-education classes instead. At the end of the study, the exercise group showed improvements in memory and language skills. In the second study, by researchers at the University of British Columbia in Vancouver, women ages 70 to 80 with MCI were assigned to one of three groups: resistance training, aerobic training or balance-and-tone training. In each program, participants exercised two times a week for six months. At the end of the study period, those who had participated in strength training fared best: they outperformed the other groups on tests measuring attention, memory and higher-order brain functions like conflict resolution. They also showed increased function in three brain regions involved in memory. The same results were not found for those doing aerobics, though that group did improve on a memory task. “It’s definitely one of the first times resistance training has been looked at in connection with Alzheimer’s. And we’ve seen in that body of literature that people who do resistance training increase their ability to be more mobile, but it may have some other benefits,” Heather Snyder, of the Alzheimer’s Association, told CNN For the final study, also by the University of British Columbia, researchers looked at 155 community-dwelling women ages 65 to 75 who were randomly assigned to do either resistance training or balance-and-tone training for a year. In this case, researchers found that both groups had improved memory at the end of the study, but the women who started out with higher levels of cognitive function at the beginning of the study reported more improvements in memory with resistance training. “Where previously we had seen positive associations between aerobic activity, particularly walking, and cognitive health, these latest studies show that resistance training is emerging as particularly valuable for older adults,” said Dr. William Thies, chief medical and scientific officer of the Alzheimer’s Association, in a statement. It not only improves mobility and strength, but as the recent research shows, it appears to boost brain function as well. One more reason to add weights to your workout.
<urn:uuid:911b4d1b-c4dd-46c0-8827-5fa09c8aedf9>
CC-MAIN-2013-20
http://healthland.time.com/2012/07/16/mind-those-reps-exercise-especially-weight-lifting-helps-keep-your-brain-sharp/?iid=hl-article-latest
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.961486
812
2.625
3
|Banner Photograph for the Truth and Reconciliation Commission of Canada| The book touches upon the problems caused by the education of generations of Canadian Indians in residential schools. Thousands of Indian children, as young as 6 years of age, were taken from their families on their home reserves to attend these schools. At some schools they would get to go home at Christmas. At other schools they would be there from September to June. The schools were part of the Federal Government’s attempt to assimilate Canadian Indians through education and taking away their culture. At the schools children were punished for using their native language or following any traditional cultural practices. Discipline was harsh. They would remain in the residential schools for up to 12 years. There were major problems with physical and sexual abuse. There have been generational problems as the children who, essentially grew up without parents and other family, became adults and had their own children. In recent years the issues of residential schools are being addressed through a Federal Government compensation system and a Truth and Reconciliation Commission that is currently holding hearings across I have represented Indians pursuing compensation. They consider themselves survivors of residential schools. It is a wrenching experience to listen to strong, physically powerful, men break down in your office recounting experiences some had not even told their families. At the same time I have also represented individuals who worked in residential schools against whom abuse allegations have been made. While they face no legal or financial consequences it is also difficult to hear persons emotionally stating they are facing false accusations. The residential schools deeply scarred generations of Canadian Indians. The stolen children were raised on missions or by foster parents. They were totally cut off from their Aboriginality. They were severely punished when caught talking their Aboriginal language. Some children never learned anything traditional and received little or no education. Instead the girls were trained to be domestic servants, the boys to be In Arthur Upfield’s book The Will of the Tribe he talks about two educated aboriginal people, Tessa and the Captain. While educated they neither fit into white nor aboriginal society. Smilla talks of the dislocation for the Greenlanders removed from their semi-nomadic life on the land to urban . Many found themselves isolated neither accepted by Danes or native Greenlanders. They struggle to find a place in society. I described Smilla as a misfit in Denmark . Denmark In contrast is the experience of Jimmy Perez in Raven Black by Ann Cleeves. Children as young as 12 would be brought to Lerwick from the smaller Shetland Islands to live in a hostel so they could attend school. Perez from the more distant Fair Isle, could not go home for weekends. While required to move away for school at a young age there is not the same cultural dislocation as with indigeneous children. I do recognize the impact on a person leaving home to go to school. I left home to attend boarding school when I was 15. It was the hardest year of my life going to live at a school where I did not know anyone. Yet my experience was mainly positive as I adjusted and matured. There was none of the abuse of Indian residential schools. In Canada, Australia and Denmark each nation sought to eliminate the cultural identity and assimilate their aboriginal or indigenous people. The results were devastating to each country’s indigenous peoples with the effects continuing into the future. Australia described it best as “stolen generations”.
<urn:uuid:d7967e44-62ec-4e7c-96b5-2a46e8d11d8c>
CC-MAIN-2013-20
http://mysteriesandmore.blogspot.com/2012/02/removing-indigenous-children-from-their_28.html?showComment=1333789884571
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.984326
711
2.9375
3
- Historic Sites The Day Before Hollywood It was a suburb of orange blossoms and gardens, of gracious homes and quiet, dignified lives—until a regrettable class of people moved in. December 1983 | Volume 35, Issue 1 And yet the movies brought the benefit the Chamber of Commerce had always striven for: tourism. To cope with the influx, the Chamber prepared a booklet that assured tourists that motion-picture studios were only a part of Hollywood—“lower Hollywood”—and were “more or less lost in the far-spreading bungalowed landscape.” The only other evidence of movie business might be the presence on the sidewalk of a group of people, “a man turning the crank of a camera … while another man makes a girl do something foolish over and over again. Scenes like this attract little attention. The real Hollywood is engaged in its own affairs, which are those of ordinary everyday humanity, working and trading and living, and well satisfied to live in a beautiful place.” The fan magazines attacked this attitude, calling its authors “Hollywood’s Shameber of Commerce,” but actually most studios were anxious to avoid visitors. Although Universal welcomed tourists at its vast studio ranch in the San Fernando Valley, the other studios were considerably less hospitable. Lacking the space of Universal, they had also suffered from a plague of souvenir hunters on the occasions they had admitted visitors. Objects vital to continuity vanished, and pictures were held up while identical articles were tracked down in town. Anything portable was automatically pillaged by eager star worshipers, and it proved safer to close the studio gates. The wonderful sets tourists had seen in pictures were denied them, and the exteriors of most studios were uniformly dull. In later years visitors were offered special tours of the stars’ homes. But in the early days these were all too ordinary. “The trouble with Hollywood,” said one disgruntled visitor, “is that it’s so damn unimpressive.” Some of the movie people felt the same way, despite the astonishing climate and the breathtaking scenery. When shots of New York appeared on the screen, you could identify members of the movie colony by their applause.“The heat gets on your nerves,”said one.“It’s so dusty you have to change your clothes three times a day and you’re never clean.” How quickly they came to change their minds! After the real estate explosions of the 1920s and 1930s, the quietness and simplicity of the early years were greatly missed. Katherine Albert wrote, in the 1930s, that Hollywood had been like a child, charming and naive. “Now it is a woman of the world, sparkling, bizarre, hard and bitter, with a painted face and narrow eyes.” The description is a period piece in itself, proving the dangers of uncritical nostalgia. But even today anyone who wanders around the old residential streets of Hollywood at sunrise can scent in their quiet atmosphere something of the paradise that existed just a lifetime ago.
<urn:uuid:986391b1-09eb-48ab-8327-3630d429e9c5>
CC-MAIN-2013-20
http://www.americanheritage.com/content/day-hollywood?page=5
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.96781
640
3.09375
3
HealthyLife® Students' Self-Care Guide Section V – Common Mental Health Problems People with passive-aggressive behaviors show hostility and aggression in passive ways. Their aim is to resist job and social demands. Examples of passive-aggressive behaviors are: The goal of passive-aggressive behavior is to frustrate the wishes of others and make others angry. This anger is most often directed at bosses, roommates, spouses, parents, teachers, or anyone who has power or authority. But, sometimes, people are not aware that their behavior is purposeful. What leads to passive-aggressive behavior? Some researchers think that these behaviors stem from certain childhood experiences. They believe that parents who were aggressive and exercised complete control over their child did not let the child express himself or herself. This may have pushed the child into adopting passive-aggressive behavior patterns to cope. If, for example, the child openly disagreed with the parent and was punished for doing so, the child learned to substitute passive resistance for active resistance. A person who shows a lot of passive-aggressive behavior can have a Passive-Aggressive Personality Disorder. A person with this disorder: Questions to Ask Copyright 2004, 5th Edition, American Institute for Preventive Medicine. All rights reserved.The content on this website is proprietary.YOU MANY NOT MODIFY, COPY, REPRODUCE, REPUBLISH, UPLOAD, POST, TRANSMIT,OR DISTRIBUTE, IN ANY MANNER, THE MATERIAL ON THIS SITE. March 16, 2007
<urn:uuid:77e6612a-ff11-4a32-9ec0-f5e74f293f75>
CC-MAIN-2013-20
http://www.bgsu.edu/offices/sa/health/selfcare/page39612.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.952614
318
3.28125
3
a trip to Middle Earth no, not Tolkien's land of hobbits and elves, although the sites may not look too different from that fantasy world. Middle Earth is one area of the California Cavern in Calaveras County, Calif. And yes, that is the Calaveras County made famous by Mark Twain's jumping frogs. The cavern has also hosted such notable visitors as Bret Harte and John Muir. California Cavern is imbedded in limestone beds beneath the Sierra Nevada foothills. Ten million years ago, hot brine pools formed, dissolving much of the limestone and leaving giant caverns, says Steve Fairchild, president and founder of Underground Adventures, which maintains the cavern and offers tours there. The limestone was then metamorphosed into marble with the emplacement of the immense Sierra Nevada batholith nearby. Speleothems began growing shortly after the caverns were formed, according to dating from stalactite and stalagmite growth rings. Moaning Cavern's spectacular speleothems are other-worldly. Photo courtesy of Underground Adventures. California Cavern first opened to the public after its discovery in 1850 by a miner, and is California's first cave on exhibit, according to Fairchild. A mining camp called Cave City was established around the cavern between 1859 and 1875, and early residents used the cavern for dances, religious services, town meetings and weddings; there was even a bar inside. Now a popular tourist spot, California Cavern offers three walking tours, including the Middle Earth expedition. The journey to Middle Earth is the longest tour, lasting three to four hours, and is more than a mile long. Tour operators warn visitors that they will get soaked to the skin and covered in mud on this expedition. The first hour of the trip is crawling and wiggling through passages that connect 13 chambers in the Mammoth Cave area. Explorers then pass into Middle Earth, a major cave that connects Mammoth Cave to another cave the Cave of the Quills that was found in the 1950s, Fairchild says. It is a large room filled with rare speleothems, such as beaded helictites (curved, twiglike deposits of calcite or aragonite). Here guides lead visitors through nearly knee-deep clay muck. The remainder of the journey consists of exploring horizontal fissures in the Cave of the Quills (named because of porcupine quills found at its mouth when it was first discovered) and an underground rafting trip across a 200-foot-deep lake in one of the caves. Underground rafting in California Cavern is certainly not an everyday experience. Photo courtesy of Underground Adventures. Another tour, the Trail of Lights journey (aptly named because it is well-lit, in contrast to other trails), is more suitable for the entire family. The tour is a little more than an hour long and meanders over fairly level, lighted passages and walkways. Experienced guides lead groups into the recently discovered Jungle Room (named for the array of crystalline "vines" (stalactites) covering the ceiling), and they teach the history and geology of the cavern. Winter and early spring are an interesting time to visit California Cavern, but you have to time it right, Fairchild says. The cave floods in the winter, usually around Jan. 1, and small clear pools cover the ground and provide an interesting glimpse into natural cave life. When the cave is completely flooded, the trails close so be sure to call ahead if visiting over the winter. Moaning Cavern is not far from California Cavern and was discovered in 1851 by gold miners hoping to strike it rich. When the prospectors realized there was not significant gold, they abandoned the cave. Moaning Cavern was rediscovered in 1919, and legend has it that tourists were lowered into the cavern in ore buckets with only candles or whale oil lamps to light their way. The bones of about 100 humans were found at the bottom of the cavern, but don't worry, they weren't modern tourists one skull was dated using uranium-thorium isotopes to be 13,000 years old! Moaning Cavern is the largest single-chamber public cavern in California. The main room is large enough to fit the Statue of Liberty inside. The total depth of the cave is 410 feet, though family walking tours only descend 165 feet. The cavern was christened by early explorers who noticed a distant moaning sound emitting from the cave. The "moan" is created by echoes of drops of water, which falls into holes in a flowstone formation with a bottle-like shape, Fairchild says. The sound is similar to one you can make by blowing across the top of a partially full soda bottle, and the cave still moans today. "More like a booming echo," Fairchild says, "but still moaning." As at California Cavern, Underground Adventures offers varying tours of Moaning Cavern. The Adventure Trip begins with a rappel 165 feet straight down into the main chamber of the cavern. While visitors can stop there, it might be well worth spending a couple of hours exploring the deep chambers and passages that are mostly undeveloped meaning there are no stairs, walkways or lights with professional, experienced guides. At 310 feet below ground, explorers encounter the Pancake Room, Godzilla's Nostril, Roach Motel and Meat Grinder, among other interesting places, and will frequently be crawling on their bellies or wading through thick mud. The total trip is about three hours, and minors over the age of 12 must be accompanied by an adult (no one under 12 is admitted). All equipment is provided, and again, prepare to get dirty. Beginning with a 165-foot rappel deep into the earth, a visit to Moaning Cavern is for the truly adventurous. Photo courtesy of Underground Adventures. Moaning Cave is open to visitors every day of the year, and fall and winter are a great time to visit to avoid crowds, Fairchild says. November is also the month that offers the most exploration because the water table is at its lowest point, he adds. Moaning Cavern doesn't flood like California Cavern, but it does get wetter in the winter, and some treks will get very wet and muddy. Both caverns also offer gemstone and gold mining, as well as aboveground nature trails with free trail guides to learn about the local flora and fauna, the Gold Rush, and the original human inhabitants of the area. California Cavern and Moaning Cavern are about 150 miles from the San Francisco Bay Area, 70 miles from Sacramento and 100 miles from South Lake Tahoe. Nearby sites include Columbia State Historic Park, Big Trees State Park, Sutter Gold Mine and Bear Valley Ski Resort. What better way to begin or end an adventurous family weekend than by visiting the world's natural wonders? Underground Adventures in California Back to top
<urn:uuid:2c03c1ea-d719-40ef-b959-d5825fb572f8>
CC-MAIN-2013-20
http://www.geotimes.org/nov03/Travels110103.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.93878
1,478
2.8125
3
In the Great Recession, it has not been hard to picture the following situation: The leadership team of the company is deciding on cost reduction changes to the company. Some of the options may be viewed as inconsistent with stated company values. The leadership team is split on the course of action, yet convinced that if significant changes in financial performance do not occur, the company may fail. However, whatever the decision, the entire company must support it and work together to survive. This situation requires a special tool that successful teams use: a “consensus” decision. The key is in the need for all to support and work for together for the successful action. This requirement of unanimous support is in alignment with Webster’s (2nd) definition: “group solidarity in sentiment and belief”. There is a very strong emphasis on the solidarity. In fact, it is “active” solidarity, for once consensus is achieved, the group’s position is solid and unanimous. All disagreement and discussion becomes part of the confidential history of the team. Consensus is usually only required for the most difficult and potentially unpopular decisions. For a team to be effective, such consensus must respect the integrity of the team. Team members cannot follow the example of today’s politicians: once the meeting is over, individual team members publicly air their disagreement with the decision. For the team to truly work with high levels of trust, once consensus is achieved, there should be complete solidarity with the outcome by all team members. To all outside the team, it should appear to be a unanimous decision. This level of agreement requires significant emotional cost: someone may have to support a position that is different than his or her own personal choice. Because of the cost, this process must only be used rarely, when solid team support is required. Agreement to abide by a consensus must be a requirement for team membership. To achieve such consensus decision requires complete and open discussion where all opinions are heard. Active listening and mind mapping or brainstorming techniques may be used to capture all points presented and allow for the group to work its way to a solution. Every team member should be allowed to present his or her opinions and supporting reasons. It is recommended that active listening be used to ensure that all are correctly heard. This feeling of being heard is critical and discussion should continue until all key participants feel understood. Understanding does not mean that there will be agreement, although that occasionally happens, and the process eliminates the need for consensus action. If all discussion is complete and there is still disagreement, the team leader must make a decision for a course of action, which the team then actively supports. This decision may be for a less popular position, as the leader may identify that position as most in line with the values and mission of the team. Remember, the value of the majority opinion does not determine the decision as it would in a democracy. This consensus process is useful in reducing the disruptive impact of passive resistance techniques occasionally used by the members not yet fully committed to the team’s success or values. The unanimous position after consensus reduces the ability to use an emotional situation to manipulate and weaken the role of the team. Have you used this consensus technique? Do you recall a team decision where you wish you had?
<urn:uuid:a4b4b9a0-0dc6-44fc-9546-2e46164e730e>
CC-MAIN-2013-20
http://www.missionmyth.com/date/2011/08/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.955575
670
2.734375
3
POLITICAL THOUGHT IN MODERN EGYPT. The bases of Egyptian thought had remained fundamentally Arab-Islamic until its roots extended themselves into the modern soil of European culture throughout the nineteenth century. Eventually Egyptian political thought crystallized into modern concepts and terms. However, other influences also played an important role. Most sources agree that the French invasion of Egypt (1798-1801) opened the eyes of the Egyptian intelligentsia to political concepts they had never known. Even though the Egyptians did not benefit immediately or directly, the French factor marked the beginnings of the modernizing of society in MUHAMMAD ‘ALI's reign (1805-1848). Muhammad ‘Ali's educational missions to Europe were a potent factor in the development of Egyptian political thought and bridged some gaps between Egypt and the West. European academicians and experts brought into Egypt new ideas and principles. They also extended the wide and active translation movement, which had transplanted into Egypt, among other things, many new political ideas. The press was also an important factor in promoting political consciousness, an influence of the French. During Muhammad ‘Ali's reign, the Bulaq printing press was built (1821) and the al-Waqa’i‘ al-Misriyyah was issued (1828). Pope CYRIL IV gave orders for the purchase of a press to be established in 1860. This was followed by a great journalistic revival, and papers like Al-Watan, edited by ‘Abdallah Abu al-Su‘ud (1866), and Al-Watan, edited by Mikha’il ‘Abd al-Sayyid (1877), were issued. The newspapers helped form public opinion and established a base of readers with distinct political interests. The second half of the nineteenth century witnessed the growth of cultural institutions, scientific societies, and literary salons where political ideas were exchanged. There appeared, for instance, the Knowledge Society (1868), the Geographic Society (1875), the Islamic Benevolent Society (1878), the Higher Institute for Arabic and Islamic Studies (1872), and the National Library (1870). During the first half of the nineteenth century there were attempts to modernize some sectors of Egyptian society, notably the army and governmental administration, by utilizing European expertise. This began a flood of European ideas into Egypt that put the traditional political and social structure in jeopardy. Repercussions occurred in the second half of the nineteenth century, with European political ideas being absorbed into the Arab-Islamic tradition along with Coptic reformism. Although some rejected the European intellectual influence and held to their traditional culture, others enthusiastically adopted Western ideas. From this variety of attitudes emerged political thought based on certain specific attitudes, the most outstanding of which were the liberal trend, the democratic trend, the religious-political trend, and the socialist trend. The National Liberal Trend This represents a response, though limited at the beginning, to the flow of European thought into Egypt after the French invasion. Among the first Egyptians to accept this thinking was Shaykh Hasan al-‘Attar (1766-1835), who greatly influenced Rifa‘ah al-Tahtawi (1801-1873), who was considered the real initiator of the modern renaissance. In his books Hasan recorded his observations in France and made valuable comments on the state, the constitution, the ruler's jurisdiction, and the citizens' rights. It was from such works that Egyptian liberals drew many of their ideas. In his books al-Tahtawi presented the ideas of the French Enlightenment, including those of Voltaire, Condillac, Rousseau, and Montesquieu. Al-Tahtawi's new ideas inspired the next generation through his pupils, who established their liberal ideas in the press and in their literary works, particularly in the second half of the nineteenth century. This movement was followed by the liberal ideas of Jamal al-Din al-Afghani (1838-1897). Shaykh Husayn al-Marsafi's Epistle on the Eight Modes of Speech (1881) also introduced new concepts of nationalism, politics, and social justice. Mikha’il ‘Abd al-Sayyid, a Copt, also established (1877) his daily newspaper Al-Watan where he reflected the nationalistic attitude before the British occupation (1882) and after. Adib Ishaq, a Syrian orthodox Christian living in Egypt (1882), issued the first organ named Misr, which dealt with nationalistic principles and advocated freedom of thought. Writing in a simple, popular style, ‘Abdallah al-Nadim (1845- 1896) came forth with a campaign against autocracy and foreign interference, calling for national unity and the Egyptianization of new ideas. ‘Abdallah Fikri combined the idea of Egyptian patriotism with educational rather than political reform. The generation that emerged after the British occupation included such names as Ahmad Lutfi al-Sayyid (1872-1963), who advocated political democracy and a secular state based on national rather than religious laws (Shar‘ah). He influenced a whole generation through his newspaper Al-Jaridah (1907). After World War I, his followers preached his ideas in varying forms and degrees. Qasim Amin, however, was preoccupied with the problem of modernizing society by reviving it intellectually and scientifically. He was a reader of Rousseau, Herbert Spencer, John Stuart Mill, and others. Ultimately his studies led him to advocate a change in the status of women and in their freedom in society. His Tahrir al-Mar’ah (Liberation of Women; 1899) and Al-Mar’ah al- Jadidah (The New Woman; 1900) express his philosophy. Another contemporary was Ahmad Fathi Zaghlul, who espoused the cause of transplanting European culture to Egypt in certain fields and advocated political democracy, new methods of government, a free economy, and secularism in legislation. He meticulously translated some of the works of Jeremy Bentham, such as An Introduction to the Principles of Morals and Legislation (1892), part of Camille Desmoulins' Oeuvres (1900), and at least two of the treatises of André Lebon, including Modern France (Story of the Nations) (1913). Most of the Egyptian writers of this generation belonged to al-Ummah party, whose members enriched Egyptian political thought with liberal patriotism. These writers were also contemporaries of such leaders and political thinkers as MUSTAFA KAMIL (1874-1908) and Muhammad Farid (1868-1919), who were not so much theorists as practical politicians. They patriotically played their roles in combating the British presence in Egypt. They stood for Islamic unity, in spite of the concept of secular patriotism detectable in their writings as members of the National party (established in 1907). SA‘D ZAGHLUL emerged as a political leader after World War I. He led the 1919 revolution on a national basis—actually a continuation of the practical politics expounded by the National party. After the 1919 revolution, the political unity of the country was fragmented into parties such as the WAFD and the Constitutional Liberals, as well as the National party. From the 1920s to the 1940s exponents of the liberal national trend dominated the scene. Some thinkers advocated the abolition of religious courts, the modification of marital laws, and the dismantling of certain social institutions. They also championed the use of Western techniques in the field of literature, as expounded in Taha Husayn's Al-Shi‘r al-Jahili on pre-Islamic poetry (1926). The writings of Tawfiq al-Hakim and Taha Husayn, the sculptural works of Mahmud Mukhtar, the novels of Najib Mahfuz and Mahmud Taymur, and the writings of Salama Musa (a Copt), Louis ‘Awad (another Copt), Mahmud ‘Azmi, and others called for the Egyptianization of foreign ideas in all areas. In the 1930s some of those writers turned their thoughts to Oriental Islamic topics, as in the Islamic writings of Taha Husayn and Muhammad Husayn Haykal. The Democratic Trend It might be an overstatement to say that Egypt was acquainted with democratic thought before al-Tahtawi. It was not until the reign of Isma‘il (1863-1879) that a parliamentary council, the Shura al-Nuwwab, was established as the first representative body in Egypt. Sharif Pasha's cabinet was made up of those loyal to the 1879 constitution. Recognizing the supremacy of the people, the cabinet tried to issue a basic code for the council and another for elections. During the same period, another revolution in thought occurred, promoting more freedom and more constitutional rights, in the writings of Adib Ishaq, a Copt who advocated the establishment of a senate house that would be a link between the Shura al-Nuwwab and the government, while Mikha’il ‘Abd al-Sayyid, another Copt, launched a campaign to open the council members' eyes to matters of rule and politics. The ‘Urabi revolution (1881-1882) marked a new stage in Egyptian democratic thought. Jamal al-Din al-Afghani had played his part in paving the way for its advent through the old National party (see POLITICAL PARTIES); ‘Abdallah al-Nadim played a distinguished role in this period. He made a social analysis of the nature of representative councils and advocated that their membership should represent all social classes. He often reiterated that democracy is a practice in which the people should be trained. Later on, Muhammad ‘Abduh (1849-1905) emphasized his claim that the representative-council manifesto should mention its part in helping the government and in sharing the rule of the country by supervising its activities and work. After the British occupation, Ahmad Lutfi al-Sayyid emerged as one of the political thinkers who linked the claim for independence to that of rule by the people through their representatives. He borrowed his ideas of political democracy from Rousseau, Locke, and Hobbes. Together with his disciples in the Ummah party, he succeeded in bringing about a democratic trend on a wide scale. This trend was manifest when Egypt obtained a limited degree of independence after the February 1922 declaration. At that time, a committee was set up to write the 1923 constitution, which marked the start of a constitutional monarchy in Egypt. That constitution played a part in creating parliamentary life from 1924, thus letting the common people participate in ruling the country. On that occasion a number of thinkers tried to deepen the democratic concepts and fight autocracy. Outstanding among those were Muhammad Husayn Haykal, Mahmud ‘Azmi, and Salama Musa. The Religious Political Trend In spite of the rise of religious reform movements such as Wahhabism, Senusism, and Mahdi’ism prior to the twentieth century, their supporters in Egypt never constituted a majority. Perhaps religious reform had a revolutionary political impression that was precipitated by Jamal al-Din al-Afghani (1839-1897). His emergence represents a turning point in the history of religious reform. His disciples were acquainted with European political and administrative institutions, economic systems, and thought. Some of them advocated a compromise between the essence of the Islamic faith, on the one hand, and the sciences and Western concepts and institutions, on the other. Such views represented the Islamic reaction to Western hegemony. Though religion was a fundamental element in Afghani's system, it treated the secular and religious elements equally. He was also known for his advocacy of Pan- Islamism. Muhammad ‘Abduh clarified and analyzed his teacher's ideas and then developed them further. He called for a return to authentic Islam and to the freedom of religious thought from the shackles of tradition and conservatism. He launched an onslaught on the al- Azhar, the oldest Islamic university in Cairo, and he advocated an understanding of the religious guidelines expressed by the earliest Muslims before sectarian differences developed. He claimed that the spirit of modern civilization and Islam are not contradictory; indeed, one of his basic objectives was to prove the possibility of a compromise between Islam and modern thought. However, he did not deal with the relationship between religion and the state as much as was later done by a number of his disciples. Whereas al-Afghani was associated with the Pan-Islamic movement, Muhammad ‘Abduh concentrated on the Islamic political revival and modernization of its legal theories. Some of his disciples assumed a secularizing attitude. Among them were Lutfi al-Sayyid, Taha Husayn, and ‘Ali ‘Abd al-Raziq. Others, led by Muhammad Rashid Rida (1865-1935) and his Manar school, interpreted his views on the basis of early Islamic thought. Rashid Rida agreed with his mentors al-Afghani and Muhammad ‘Abduh that Islam could constitute a worthy national entity capable of opposing the secular tendencies of modern European thought. Immediately after his arrival in Egypt in 1898, in his articles in Al-Manar, his monthly journal, Rida issued a proclamation calling for the constitution of a Pan-Islamic society under the Ottoman caliph's flag. His main objective was the unification of all Muslims under one legal system based on Shari‘ah, the code derived directly from the Qur’an under the leadership of the caliphate, as against the Western concept of nationalism promoted by Kemal Atatürk after his suppression of the Ottoman caliphate in 1924. This was followed in 1925 by ‘Ali ‘Abd al-Raziq's (1888-1961) famous work Islam and the Principles of Government, in which he denied that the caliphate was a basic institution of Islam. He made it clear that the Prophet's leadership was religious and that it ended with his death, when his authority was taken over by lay political power. Conservative thinkers objected to his ideas, and a reactionary religious movement flared up, ending with the rise of the Muslim Brethren, whose ultimate objective was the reconstruction of society on the basis of a modern Pan-Islamic front derived from the Qur’an against secular European trends. The Socialist Trend Cultured Egyptians had read and heard about socialism from the middle of the nineteenth century in organs such as Al-Muqtataf magazine. In fact, socialism did not come from a vacuum but was the outcome of social, economic, and cultural developments manifest in the development of Egyptian society during the reign of Muhammad ‘Ali. The first group of socialist advocates was inspired by Saint-Simon, whom Muhammad ‘Ali invited to Egypt. Shibli Shumayyil (1860-1917), a Christian Syrian who went to Egypt in 1885, engaged himself in writing literary commentaries instead of practicing medicine, and socialism was one of his chief topics. He was followed by another Syrian Christian, Nicola Haddad, who was a prolific author in many fields, including socialism. In the meantime, an Egyptian teacher by the name of Mustafa Hasanayn al-Mansuri contributed a valuable study of socialism in his own writing or in translations from European literature. Together with the aforementioned writers, he aimed at carrying his theories into practice by the establishment of a socialist party in 1909. The project was doomed to failure until it was assumed by the real pioneer of socialism in Egypt, SALAMAH MUSA (1887-1958), who had studied in England and France and had become acquainted with Britain's Labour party. A prolific writer, he fell under the influence of socialist thinkers such as George Bernard Shaw, and his book on socialism may be considered the first consistent work on the subject to be published in the Arab world. Generally, socialist thought was regarded as a European idea that had infiltrated into Egypt on a wide scale since the middle of the nineteenth century. With the outbreak of the Russian revolution of 1917 and the Third International in 1919, which marked the beginning of Russia's interest in the East, cultured Egyptians became acquainted with the new socialist trend. Joseph Rosenthal, an Egyptian Jew, called for the establishment of an Egyptian socialist party that would speak for workers' unions, instead of being restricted to a membership consisting mainly of foreigners living in Alexandria. Rosenthal induced a group of progressive Egyptians to join him, Salamah Musa, ‘Ali al-‘Inani, Muhammad ‘Abdallah ‘Inan, and Mahmud Husni al-‘Arabi being the outstanding figures in that group. They signed a manifesto establishing the Socialist party in 1921. Although successive governments tried to suppress the party, it carried on its activities and attracted hundreds of workers, who were very often encouraged to go on strike. On the political front, ‘Aziz Mirhom led the labor movement for some time. However, the party ultimately splintered because of disagreements about ideological principles. In 1922 one of its factions that joined the Comintern called itself the Egyptian Communist party. It persisted through the 1930s and 1940s when Marxist circles became active in many secret ways, until the July 1952 revolution. AHMAD ZAKARIYYA AL-SHILIQ Click tabs to swap between content that is broken into logical sections.
<urn:uuid:3b611eb5-2ccb-4f58-813d-7a4ac1377b7f>
CC-MAIN-2013-20
http://ccdl.libraries.claremont.edu/cdm/singleitem/collection/cce/id/1609/rec/14
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704713110/warc/CC-MAIN-20130516114513-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.970834
3,628
3.203125
3
Interaction of TCP/IP and Other Protocols It is possible to classify applications as being network-aware or network-unaware. The distinction can be made because some applications, such as Web browsers and client/server applications, need to make explicit use of an underlying network protocol. Other applications, such as standard Windows application suites, simply function within the confines of a workstation's own operating system. For these applications to make use of network file and print services, it is necessary for the NOS to provide extensions to the functions of the local operating system. The next section examines how these different types of applications can make use of the underlying network. Application Programming Interface (API): Application developers can write network-aware applications by accessing a set of standard procedures and functions through an Application Programming Interface (API). This interface specifies software-defined entry points that developers can use to access the functionality of the networking protocols. The use of an API enables a developer to develop networkable applications, while being shielded from having to understand how the underlying protocols operate. Other APIs define interfaces to other system functionality. Figure 114 provides a visual representation of how a networking API might fit within the OSI seven-layer model. The majority of network applications have been written specifically to access a single networking protocol. This is because each of the NOS implementations have developed their APIs as a standard. Redirectors and File Sharing: One of the main application requirements within a network is saving files on a central file store. To achieve this, NOS implementations commonly include a program known as a redirector. A redirector program extends the functionality of the workstation operating system to enable it to address remote file stores. In a DOS/Windows environment, file storage areas are denoted with the use of letters, typically with the letters A through E being reserved for local disk drives. When a user wants to access a network file volume, it is common for the NOS to facilitate some form of mapping between a volume name and an available drive letter. After the mapping has been made, it is possible for any application to access the shared file volumes in the same way as the would access a local drive. This is because of the operation of the installed redirector program. The program sits between the workstation operating system and the NOS protocol stack and listens for application calls made to any of the mapped network drives. The functionality of a redirector can be further clarified by considering the example of an application user attempting to save a file on a network drive. The user prompts the application to save the file on a network file volume that the NOS has mapped to the DOS drive I:. The application makes a call to the workstation operating system to complete the required file save operation. The redirector program recognise that the application is attempting to access a network drive and steps in to handle the required data transfer. If the redirector hadn't been active, the workstation operating system would have been presented with a request to save a file on a drive letter that is knew nothing about, and it would have responded with a standard error message, such as 'Invalid drive specification'. In a UNIX environment, similar file sharing capabilities are provided through the use of a Network File System (NFS). The use of NFS enables the workstation to access file volumes located on remote host machines as if they were extensions to the workstation's native filesystem. As such, the use of NFS, on the workstation side, is very similar to the use of the NOS redirector as outlined earlier. Implementation of client NFS software are available from several thirdparty companies. These implementations require a TCP/IP protocol stack to operate alongside the installed NOS protocol stack. A workstation configured with both an NOS and a TCP/IP protocol stack is able to operate two independent applications that can provide file sharing access between environments. This is accomplished through the use of the redirector program, to provide access to the NOS file server, and NFS, operating on the TCP/IP protocol stack to provide access to NFS volumes on UNIX-servers. Figure 115 illustrates how a single workstation can be utilise to access both network environments. The indicated workstation loads a NetWare protocol software and the associated redirector software. File areas on the NetWare server are mapped as local drive F: and G:. The TCP/IP stack and NFS implementation are also loaded, and the remote UNIX file system is mounted as the local drive H: on the workstation PC. Files are then available to be saved by any application operating on the workstation to any of the mapped drivers. NOS Gateways and Servers: It is often more efficient to utilise an NOS server as a gateway into an existing TCP/IP network than to run dual protocol stacks upon each network client. In figure 117, the NetWare server has the Novel NFS Gateway software installed. The UNIX host has exported the NFS, which has been mounted to a drive on it. This file area is now available to any of the NetWare client workstations. These users are able to access the UNIX file area through the standard NetWare redirector program, removing the requirement of having to load a TCP/IP protocol stack and run a TCP/IP-based application. The NetWare server provides application gateway services between the IPX/SPX-based networks and the TCP/IP network. To achieve this, it is necessary for the server to load both protocol stacks. On the network clients, however, it is necessary to operate only the standard IPX/SPX protocol. The client directs applications requests to use resources within the UNIX network to the gateway using IPX/SPX protocols. The gateway relays these requests to the UNIX host via its TCP/IP protocol stack. In this way, the use of a gateway greatly reduces the administrative overhead required to provide network clients with access to TCP/IP hosts. Network users are able to utilise UNIX-based resources without the requirement to run multiprotocol stacks. Figure 116 outlines a sample configuration of a NOS server as a gateway. NOS gateways tend to be implemented in one of two ways. The first is through the operation of proxy application services. The use of a proxy service provides the user with a special set of the network applications, such as Telnet, FTP, and Web browsers, that have been specifically written to operate over NOS protocols. The client applications communicate with the gateway process, which forwards the application request to the specified UNIX hosts. An alternative solution utilise a tailored version of a standard WinSock driver. This special WinSock driver provides support for standard WinSock applications, but instead of operating on an underlying TCP/IP protocol stack it communicates using IPX/SPX protocols. Yet again, communication occurs between the client workstation and the gateway application, with the gateway acting to forward application data between the client and UNIX host. The use of the tailored WinSock driver means that network clients are able to utilise any standard. WinSock application and don't have to rely on the gateway manufacturer to provide specialised application software. Figure 117 shows a tailored version of a standard WinSock driver enables the network clients to use any standard WinSock application. NOS Support for Native IP: The major NOS vendors have recognised an increasing demand to replace their proprietary communication methods with native TCP/IP protocols. However, network applications have generally interfaced with a specific protocol. If NOS vendors were to suddenly adopt a different protocol, many of the existing network applications would no longer function. For this reason, vendors are looking for ways to replace their proprietary network protocols, but at the same time to provide a degree of backward-compatibility to protect existing applications. For example, within NetWare it is possible to replace the standard IPX/SPX protocols with a TCP/IP protocol stack to provide standard communication between network client and server. However, within this implementation each data packet actually consists of an IPX packet enclosed within a UDP packet. The inclusion of the IPX header provides NetWare with the backward-compatibility it requires to support its existing application base. However, the inclusion of the IPX header places an additional overhead on each data packet. This overhead is likely to account for around 8 to 10 percent of the total packet size. Other NOS vendors also provide native support for TCP/IP protocols. For example, Windows NT allows for the users of the NetBEUI protocol or TCP/IP protocols or a combination of both. Within NT, network protocols are provided via an interface that it refers to as the Transport Driver Interface (TDI). This is a layer that is loaded toward the top of the protocol stack and is used to provide a standard interface between application environments and any underlying network protocols. Figure 118 illustrates the location and operation of the Transport Driver Interface within Windows NT. At the TDI interface, standard APIs such as NetBIOS and WinSock are able to interact with communication modules, principally TCP/IP and NetBEUI. The TDI model has been designed around a flexible architecture so that it can be adapted to support additional network protocols as required. Under this networking model, applications that have been written to the NetBIOS interface can operate over an installed TCP/IP protocol stack. NetBIOS operates by assigning a unique name to every network node. The assignment and management of the NetBIOS name space results in the generation of a large amount of network traffic. This is because hosts send out broadcasts to all network nodes when they want to register the use of a name they need to perform name resolution. The NetBIOS over TCP/IP standards specifies a method whereby this functionality can occur over a TCP/IP protocol stack. The excessive broadcast requirements effectively limit the use of NetBIOS to small LAN environments where the necessary bandwidth is available. IP networks, on the other hand, often include wide area links where bandwidth might not be sufficient to handle the required broadcasts needed to maintain the NetBIOS address space.
<urn:uuid:5ef62ebc-fba3-4dfe-a9c7-d684c1feeb96>
CC-MAIN-2013-20
http://www.citap.com/documents/tcp-ip/tcpip017.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704713110/warc/CC-MAIN-20130516114513-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.92407
2,074
3.6875
4
June 19, 2003: Two of NASA's Great Observatories, bolstered by the largest ground-based telescopes around the world, are beginning to harvest new clues to the origin and evolution of the universe's largest building blocks, the galaxies. It's a bit like finding a family scrapbook containing snapshots that capture the lives of family members from infancy through adolescence to adulthood. The Hubble Space Telescope has joined forces with the Chandra X-ray Observatory to survey a relatively broad swath of sky encompassing tens of thousands of galaxies stretching far back in time. Called the Great Observatories Origins Deep Survey (GOODS), astronomers are studying galaxy formation and evolution over a wide range of distances and ages.See the rest: In preliminary results soon to be published, Hubble astronomers report that the sizes of galaxies clearly increase continuously from when the universe was about 1 billion to 6 billion years old. (Many astronomers believe that the universe is about 13.7 billion years old.) GOODS astronomers also find that the star-birth rate rose slightly between the time the universe was about 1 and 1.5 billion years old, and remained high until about 7 billion years ago, when it quickly dropped. This is further evidence that major galaxy building trailed off when the universe was about half its current age. The Chandra observations amounted to a "high-energy core sample" of the early universe. One of the fascinating findings in this deepest X-ray image ever taken is the discovery of seven mysterious black holes that do not correspond to the galaxies seen in the Hubble image. Astronomers suspect that these objects are the most distant black holes ever detected, or the galaxies in which they reside cannot be seen because they are heavily enshrouded in dust. When comparing the Hubble and Chandra fields, astronomers also found that active black holes in distant, relatively small galaxies were more rare than expected. This may be due to the effects of early generations of massive stars that exploded as supernovas, evacuating galactic gas and thus reducing the supply of gas needed to feed a supermassive black hole. Astronomers used several observatories for this study because they want to build a coherent picture of galaxy evolution. The two orbiting observatories, Chandra and Hubble, analyzed different wavelengths of light. Chandra studied X-rays from supermassive black holes; the Hubble telescope's Advanced Camera for Surveys examined visible light from stars in galaxies. Another space observatory, the Space Infrared Telescope Facility (SIRTF), will sample the same regions of sky in infrared light soon after it is launched in August 2003. Light yields information about an object. X-rays trace the hottest gas surrounding a supermassive black hole at a galaxy's center. Visible light yields clues about a galaxy's structure. Infrared light penetrates the dust surrounding young stars, collecting information about a galaxy's total stellar population.
<urn:uuid:60098883-983e-4dc0-bc2b-c7a53f55b19c>
CC-MAIN-2013-20
http://www.hubblesite.org/newscenter/archive/releases/cosmology/distant-galaxies/2003/18/results/50/layout/th100/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704713110/warc/CC-MAIN-20130516114513-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.924704
574
4.15625
4
|1.||The Granite Counter Fallacy| The granite counter fallacy argues that the monetary value of an object is directly proportional to the amount of money that is spent on it. The fallacy lies in the essence that previous monies spent are subject to highly subjective rationale which may not add any practical value to the object. The fallacy is typically deployed with an appeal to novelty (newer is better) fallacy in order to manipulate the audience using current “trends” or “fads” in popular culture where the subject is likely to accept the argument based upon what they believe is “popular” and implies a “higher demand (value)”. The Granite Counter Fallacy is as follows:more... Person A purchases a house and spends x amount of dollars replacing the tile kitchen countertops with granite countertops. Person A states that the value of the house has now increased because x dollars were spent replacing the tile counters with granite counters. Person B states that they do not really mind tile countertops and to them, a countertop is a countertop - whether it is made of granite or tile does not change its practical use and therefore adds no real value. Person A purchases a small house with large backyard for x dollars. Person A demolishes the house and builds a much larger house with no backyard for y dollars. Person A claims that the value of the new house is x + y because x dollars were spent on the previous house and y dollars were spent on the new house. Person B says they prefer a house with a backyard and the lower electrical bills for cooling and heating, thus, the larger house’s added rooms add no real value from their point of view. The fallacy is in Person A’s assumption that people will assume that a house is worth more than another house because it is larger while failing to understand the practical value that people may see in a smaller home. Such an argument can only work in an environment where the majority of people participate in a trend that unquestionably accepts the notion that a bigger house is better than a smaller house.
<urn:uuid:00ceca2b-a465-4594-8ac7-73e0646f4259>
CC-MAIN-2013-20
http://www.urbandictionary.com/define.php?term=the%20granite%20counter%20fallacy
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704713110/warc/CC-MAIN-20130516114513-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.946386
437
3.171875
3
Live maths - tangled DNA, the Big Bang and musical superstrings Twisting, Coiling, Knotting: Maths and DNA Replication The proportions of a DNA molecule in a human cell are equivalent to a 2000-mile-long rope packed inside the Millennium Dome. When DNA replicates, it spins at an astonishing 10 turns per second. Therefore, it is hardly surprising that DNA can become highly twisted, super-coiled and even knotted! To understand this phenomenon, the molecular biologist must grapple with the mathematical concepts of twisting, writhing and knotting. In this highly-illustrated talk Professor Michael Thompson FRS will experiment with strings and rubber bands (bring your own!) to explore the geometrical rules which underlie the transmission our genetic code. When: Thursday 24th of May 2007, 5pm - 6pm Where: Centre for Mathematical Sciences, Clarkson Road, Cambridge CB3 0WA Tickets are free but must be booked by emailing email@example.com More information: http://mmp.maths.org/events/eventlist.php Dinner@Dana: Back to the Big Bang In honour of the Large Hadron Collider, the Dana Centre is holding an evening dinner and discussion attended by the expert James Gillies from CERN. There'll be slide shows and photographs and a two-course meal inspired by particle physics. When: 15th of May 2007, 6.30pm - 8.30pm Where: Dana Centre, 165 Queen's Gate, London SW7 5HE Tickets: £15 per person, including a two-course meal and a drink. Tickets have to be booked by calling 0207942 4040 or e-mailing firstname.lastname@example.org. Age range: this event is open only to those over 18 years of age. More information: Visit the Dana Centre site. Also the Science Museum in London has put on an exhibition in honour of the Large Hadron Collider. The exhibition is free and will run until the 7th of October 2007. Superstrings - a Musical Journey through Time and Space You probably knew that Einstein was a great scientist, but did you also know that he played the violin? In this unique double act a virtuoso violinist and the head of the department of particle physics at Oxford University combine the electricity of a live musical performance with an insight into the deepest corners of the Universe. The lecture explores Einstein's life, both in science and in music, from his theories that shaped space and time, to modern ideas in particle physics. When: 18th of May 2007 5pm-7pm Where: Science Oxford, 1-5 London Place, Oxford, OX4 1BD Tickets: £6.50, £4.50 concession, available from The Oxford Playhouse on 01865 305305. More information: The Oxford Trust posted by Plus @ 10:03 AM
<urn:uuid:825db14b-8421-4beb-a68a-842b25ddaf3b>
CC-MAIN-2013-20
http://plus.maths.org/content/Blog/podcasts/latestnews/jan-apr05/planet/sites/all/modules/simpleswf/mediaplayer-html5/919778.polldaddy.com/s?page=83
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142388/warc/CC-MAIN-20130516124222-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.905409
616
2.640625
3
Benefits » Enabling People With Disabilities High speed Internet empowers people with disabilities to become more independent. An Internet connection with enough speed to allow two-way voice, data, and video transfer can remove barriers that keep people with disabilities from participating in everyday activities such as employment, education, civic responsibilities and social connection. According to the 2008 U.S. Census, 50 million Americans have some kind of disability. Not only does this substantial segment of our population stand to benefit greatly from universally accessible broadband, but we all benefit from the increased participation when more people are broadband users. Expert studies find that Americans with disabilities currently use the Internet approximately half as much as those without disabilities and their rate of adoption lags behind that of the general population. This is true for people with disabilities in both urban and rural environments. With 60 percent of working-age persons with disabilities unemployed or underemployed, affordable, universal access to broadband at home is crucial. Those without high speed Internet access at home who must use public computers contend with transportation challenges and inaccessible locations. Benefits of High Speed Internet for Enabling People with Disabilities - Live streaming video and instant text communication liberate people who are deaf, or hard of hearing, and those with speech disabilities, from dependency on the phone. - High speed Internet makes new services available to people with physical disabilities, such as attending classes remotely, online medical consultations with far away specialists, or applying for and securing jobs, eliminating the need for unnecessary or difficult commutes or trips. - Programs that read text and describe visual contents aloud in a synthetic voice or a Braille display enable people who are blind or visually impaired to search the Internet, understand videos, and communicate online. - For persons with certain mental conditions or learning disabilities, slow download speeds discourage Internet use. - Video relay services (VRS), which require high speed Internet to run, allow people who are deaf to have phone conversations in their native sign language by means of an online interpreter. - Initiatives to expand high speed Internet should include, as a principle, provisions to ensure not only affordability, but also accessibility and usability, for people with disabilities. - Measures undertaken to increase employment through deploying more high speed Internet availability should include the employment needs of people with disabilities. - Research on high speed Internet access should look at the economic benefits of assimilating marginalized segments of society as a means of integration. For More Information Related Blog Posts: - 05-14-2013: The Truth About Lifeline - 04-26-2013: Republican attack on Lifeline runs into strong defense - 12-20-2012: FCC presents accessibility awards - 11-19-2012: CWA stands with video interpreters - 06-20-2012: Yes, Netflix, the ADA does apply to you - 06-08-2012: To help the disabled, mobile needs more spectrum - 03-05-2012: Digital technology makes the disabled more able - 01-18-2012: FCC advances with Internet video closed captioning - 12-21-2011: Genachowski and Knight Foundation name winners of “Apps for Communities” project - 10-20-2011: House Dems Ask FCC To Develop Internet In Nation’s School And Libraries - 10-13-2011: FCC Takes Major Step For People With Disabilities - 08-29-2011: FCC Mandates Closed Captioning On Streaming Video - 08-19-2011: Telemedicine Does Reduce Patient Travel - 07-29-2011: Administration Presses Federal Government On Technology Accessibility - 07-28-2011: FCC Sets Six Month Deadline for Online Closed Captioning - 07-22-2011: Disabled Can Increase Employment Opportunities With Assistive Technology - 07-08-2011: Bring Broadband to the Billion with Disability - 06-30-2011: Lawsuit Against Netflix Exposes Need for Closed Captioning - 06-20-2011: COAT Adds Its Support For AT&T/T-Mobile Merger - 04-25-2011: App Design Challenge Offers Crowd-sourced Solution for Underserved Communities - 04-14-2011: FCC Adopts Equipment Program for Persons with Disabilities - 03-11-2011: AAPD Hosting Policy Forum on Telerehabilitation - 03-08-2011: FCC Proposes Rules to Expand Access for the Disabled - 02-16-2011: Americans With Disabilities are Underserved by Online Technologies - 11-09-2010: NTIA/ESA Report Sheds Light on Broadband Gaps - 11-01-2010: Leadership Conference on Civil and Human Rights, CWA Urge FCC to Act - 10-15-2010: Accessibility Act Signed Into Law - 09-28-2010: Digital Disability Access Bill Passes Senate - 08-24-2010: The Benefits of Broadband - 08-10-2010: Senate Unanimously Approves Historic Accessibility Legislation - 07-26-2010: The FCC Celebrates the 20th Anniversary of the ADA - 07-21-2010: Senate committee approves new technology accessibility standards - 06-02-2010: Kerry: Legislation Ensuring Broadband Access for Disabled May Pass in 2010 - 04-30-2010: Commerce announces $28.5 million in grant money for One Economy - 04-28-2010: FCC begins work on new public safety broadband network - 04-28-2010: Broadband adoption rates low among Americans with disabilities, according to FCC - 04-22-2010: Hollis: National recovery efforts must include Internet equality - 03-10-2010: High-speed Internet brings improved dental care to underserved community - 02-01-2010: Disability advocates laud CWA’s broadband plan recommendations - 02-01-2010: CWA calls for broadband goal of 50 mbps downstream and 20 upstream by 2015 - 11-20-2009: APT re-launches, focusing on broadband adoption - 11-12-2009: Redefining “access” - broadband for those with disabilities - 10-15-2009: Advances in telemedicine accelerate - 07-15-2009: Speed matters to the American Association of People with Disabilities - 06-15-2009: Broadband tools overcome barriers for quality healthcare - 06-08-2009: National broadband plan must include public hearings, benchmarks for progress - 06-05-2009: Broadband stimulus progress report stipulates grant application deadlines - 09-19-2008: Hearing shows high speed Internet opening doors for the disadvantaged - 09-03-2008: Telemedicine allows doctors to get regular vital signs from patients - 11-09-2007: Broadband changes lives - 09-20-2007: Children with Disabilities: Logging on to Learn - 06-14-2007: High speed for the hard of hearing - 10-09-2006: A picture is worth a thousand words - 09-12-2006: Giving the Deaf a Welcome Sign - 09-12-2006: Bringing More of the World to the Blind
<urn:uuid:88895902-cd20-427c-ae36-ab49eaecc5ba>
CC-MAIN-2013-20
http://www.speedmatters.org/benefits/archive/enabling_people_with_disabilities/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142388/warc/CC-MAIN-20130516124222-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.848128
1,492
3.171875
3
Hemingway fought in Italy in WWI, that is well know, what we didn’t know is that his first ever work was written while sojourning in Taormina. Gaetano Saglimbeni, Italian journalist and writer from Taormina embarked on a long research in London and stumbled upon the discovery of a lifetime. Ernest Hemingway took part in the First World War as a journalist, soldier and volunteer for the Red Cross. At 19, while stationed in Southern Italy he was wounded while rescuing an Italian soldier and as a result spent many months in Taormina convalescing. According to sources, the young Hemingway stayed at Count Bronte’s villa in Taormina while recovering, and here is where he was first inspired to write a short story. Hemingway’s sojourn in Italy and his romance with American nurse Agnes von Kurowsky, inspired one of his most famous novels, A Farewell to Arms, yet it seems that Italy was not only the backdrop to this literary romance, it was also where his love of writing first ensued. Back to Saglimbeni. While researching Hemingway’s first works, he stumbled across The Mercenaries, a collection of short stories published posthumously in 1987. Amongst this collection of short stories, five previously unpublished, one in particular stands out. Set in Taormina, and revolving around love, food, wine and a duel set in the garden of a restaurant, this previously neglected novella is sure to kindle some interest, especially form Italians. Unfortunately, as of yet, these The Mercenaries, is not available in Italian.
<urn:uuid:344c0315-11a5-41bd-9279-4f6586904311>
CC-MAIN-2013-20
http://www.swide.com/art-culture/literature/first-hemingway-short-story-written-while-in-taormina-discovered-in-london/2013/1/21
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142388/warc/CC-MAIN-20130516124222-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.975096
351
2.59375
3
1946-01 Introduction to What Means This Strike? [Petersen] More than four decades have passed since Daniel De Leon delivered his great speech before the striking textile workers of New Bedford, Massachusetts. When it appeared in print it was instantly recognized as one of the great speeches of our times. It contains all the elements that combine to make a speech a great classic. It measures up to Daniel Webster’s claim as to the requirements of a great speech: The Man; the Subject; the Occasion. The Man: eloquent, gifted, fully informed, fearless, uncompromising, and the very soul of integrity. The Subject: a great, irrepressible issue, and the need of stating it in simple, yet withal correct and scientific terms. The Occasion: a supremely important manifestation of that fundamental, irrepressible issue — a typical and illuminating effect of the basic cause of the universal conflict of our times, the STRIKE. And presently the merging of Subject and Occasion into the Man, the speaker, who (tirelessly and patiently proclaiming the truth born of new occasions) pointed to the true goal of the victims of modern injustice — clear and specific beyond any doubt or wavering as to the nature of that goal, and the means imperative and essential for its attainment. The strike is the manifestation of two primary factors: The fact of a social system based on classes, one of which exploits and feeds upon the other; and the indomitable spirit and unconquerable mind of slaves worthy to be free, and destined to become freemen. Around these two manifestations revolve our entire social problem and the relations of modern classes,, and the solution of that problem. In his famous speech De Leon probes the cause of the strike. The cause, being shown to be the struggle between the capitalists and the workers over the "division" of the wealth produced by labor alone (the question of length of working day being a mere variant of the same thing), De Leon proceeds to show what are wages, and what profits, and the whence and wherefore of both. He establishes the fact that the share of the capitalists in; production is nil, that the "work" they do is no more productive than "the intense mental strain and active ‘work’ done by pickpockets is directly or indirectly productive." He shows how the owners of capital came into possession of their "original accumulation." He analyzes the class struggle, and outlines the development of capitalist society. He disposes of the myth that inventors reap the benefit of their genius, showing that, on the contrary, it is the useless, unproductive owner of capital who appropriates the fruits of the inventor’s genius. He demonstrates the never-ceasing process of concentration of capital, with its destruction of smaller competitors who join in the labor market the workers displaced by improved machinery. And last, but not least, he projects the principles and the structure of the organization which the workers must build if they would free themselves from wage slavery, and without which the strikes in and by themselves would become and remain idle and hopeless gestures of despair against the all-crushing power of capital, that is, of the strongly entrenched and powerfully organized capitalist class. "What Means This Strike?" is the class-struggle primer par excellence. It is the handbook, the textbook, of the exploited worker seeking to understand the meaning, the sense, of strikes, and what to do when they take place. Strikes, in the language of Marx, are the "unavoidable guerrilla fights incessantly springing up from the never-ceasing encroachments of capital or changes of the market." Guerrilla fights are disorganized skirmishes by individuals or separate groups or bands (usually in a losing struggle) carried on against highly organized armies in aggressive pursuit. That correctly describes the struggle of the modern workers on strike in their present form of organization against the solidly organized power of capital. Hence, the form of organization, its avowed purpose and objective, are of the highest significance to the workers, whether on strike or not. That strike, therefore, is lost (no matter what the temporary gain may seem to be] which does not take heed of the structure and objective of labor unions. And experience has proved that in the situation and set of circumstances so brilliantly and eloquently portrayed by De Leon, the workers, in order to seize the crown of victory, MUST ORGANIZE COMPACTLY INTO SOCIALIST INDUSTRIAL UNIONS FOR THE PURPOSE OF ENDING CAPITALIST WAGE SLAVERY — FOR THE PURPOSE OF ESTABLISHING THE SOCIALIST REPUBLIC OF FREE LABOR. Not merely for a few more crumbs, not simply in order to ease the chains of slavery, but in order that the workers may secure the whole loaf which they alone produced; in order that .slavery itself may be forever banished from the earth. Strikes are rife throughout the country during this postwar period. The immediate cause is, of course, the return to "peacetime" production standards. During World War II, capitalism-backed financially and otherwise by the power of government-produced for "use" — that is, for war use. Costs, expenses, were no more a consideration than were human lives. The workers, through overtime pay and uninterrupted labor, enjoyed a relatively high standard of living. Shifted back on a peacetime production basis, all this came to an end. Capitalism, when it is not producing for war and destruction, is producing for a market. The question of keeping workers employed, or paying at least a living wage, concerns the capitalists not at all. Hence, the workers, employed in decreasing numbers, were offered wages that fell far below those received during the war. To their credit the workers have rebelled. They have refused to sell their labor power below its value, that is, below the amount required to maintain the minimum in a bare living. And so the struggle is on. The corporations, entrenched behind their tremendous economic resources, can afford to wait. Moreover, they even benefit by keeping their plants idle, at least until the huge tax reductions become effective. For a time, at least, it was as profitable for them to keep their plants closed down as to operate them, and evidently they feel that they are in a position to starve their wage slaves into submission. In view of the fact that the working class is not organized in Socialist Industrial Unions, prepared to take over the operation of industry for itself and society at large, the plutocratic exploiters may be right. Then, again, they may be wrong — they may be stretching the bow too far. For these are not the halcyon days of prewar capitalism — these are not the days when workers would submit — grumblingly to be sure, but submit nevertheless — to the caprices of the market, and the whims of capitalist exploiters. A world war has been fought during which the workers were told that they were fighting and producing for a "victory" that was to bring peace and plenty. The workers have had a taste of higher standards, and many of them swallowed whole the promises of capitalists and politicians. But now they stand, with empty hands, or "enjoying" a starvation diet, with increasing millions out of work. And they don’t like it. And despite efforts on the part of the labor fakers to hold them back, they are forcing these to act. Meanwhile, the capitalist class and its political and editorial spokesmen are howling and denouncing the workers. The familiar fake arguments are advanced — the dear "public" is menaced, "inflation" is being caused by the workers’ demands, and, horror of horrors, the sacred private-property interests and prerogatives of the ruling class are being placed in jeopardy! Dire threats issue from the halls of Congress, threats of repressive legislation, anti-strike laws, compulsory arbitration, and so forth. In 1941, Representative Hatton W. Summers of Texas raucously shouted from his privileged seat in Congress: "… I would not hesitate one split second to enact legislation to send them [striking workers] to the electric chair." Similar barbarous cries may soon be heard again, from Congress, from the press and radio — aye, even from the pulpit. For the ruling class of America has learned little from the fate that befell its kindred spirits, the Hitlers and the Mussolinis. And thus we may find history repeating itself on this side of the ocean where economic fascism is as rampant as ever it was in Hitler’s and Mussolini’s slave empires before they met their doom. The menace confronting the working class can be met only by organized resistance to the exploiting, useless owners of industry. But that resistance, to become effective, and in order to place the workers in an offensive instead of a defensive position, must manifest itself through powerful Socialist Industrial Unions a& urged by the Socialist Labor Party, and the goal of Socialist freedom must be proclaimed by the working: class thus organized. For there can never be peace, plenty and general social well-being without Socialism. May the workers soon fully realize this. What De Leon said in his memorable New Bedford address forty-three years ago holds good today — in some respects even more so. Here and there the text has become somewhat "dated" by the relentless march of events, and the enlargement and deepening of the science of Socialism. On page 43 of this pamphlet De Leon speaks of the workers bringing the government under their control, implying that the State would be controlled by the workers in their interest, and that that would be Socialism. State ownership is not Socialism; Industrial Union administration and operation of industry is. And organizing in Industrial Unions, and capturing at the ballot box the political government and dismantling it, will alone establish Socialism — not the "industrial unions" headed by the John L. Lewises, Philip Murrays, Sidney Hillmans, etc. These are not industrial unions in any proper sense. They are in reality agencies of capitalism and, structurally as well as ideologically, almost identical to Hitler’s "Labor Front" and Mussolini’s "corporate State." They are, in short, instruments of slavery and not of freedom. The same now erroneous implication is found on page 45, second paragraph. The reference to "shop organization" on page 50 must now be read as "Socialist industrial organization" in order to render the argument valid. The same applies in a measure to the language employed on pages 52 and 53. The Socialist Trade and Labor Alliance ceased to exist in 1905 when it merged with the Industrial Workers of the World organized that year in Chicago. The Industrial Workers of the World until 1908 represented Socialist Industrial Unionism in its true, though incomplete and undeveloped, form. In 1908 it was captured by an Anarchist element, disrupted and is now practically out of existence. On page 53, De Leon also speaks of the workers boldly marching out upon the streets, organizing monster parades, etc. Street demonstrations, parades, and the like have proved vain and futile efforts in the class struggle. Today the watchword is: Organization on class and industrial lines. Here and there, De Leon speaks of profits when, strictly speaking, he should have used the scientific term "surplus value." The occasion was hardly one that lent itself to the use of terms which required involved or lengthy explanation. And though the word "profit" was technically wrong, it did express the general idea. On page 36, De Leon speaks of "the brown of his brains being exhausted…." This is probably a typographical error. The sentence no doubt should have read: "his brawn and his brain being exhausted On pages 19 through 22, De Leon presents some arbitrary figures to illustrate a point. Through what the erudite would call a lapsus linguae, De Leon failed to correlate the figures properly. The argument, however, is not affected. Apart from these minor or incidental corrections, De Leon’s "What Means This Strike?" remains after more than forty years the same instructive and inspiring introduction to a study of Socialism which it proved to be when first released. And the basic principles and arguments will remain sound and irrefutable while capitalism persists as the blight of the fair earth and the curse of man. To this pamphlet there has been added an appendix which is a resolution on strikes adopted by the National Executive Committee of the Socialist Labor Party in May session, 1940. It should be read carefully as a supplement to De Leon’s masterpiece. Absorbing the knowledge which these important documents impart, the worker will be fortified and aided in his struggle, and, acting upon the knowledge and lessons imparted, by organizing correctly, politically and industrially, his early freedom will be assured. And out of the present chaos, darkness and slavery, there shall then emerge order, light and freedom for all. January 24, 1946.
<urn:uuid:1d96a686-61c1-4025-ae1a-5f0cc79d0b86>
CC-MAIN-2013-20
http://bataillesocialiste.wordpress.com/english-pages/1946-01-introduction-to-what-means-this-strike-petersen/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.956216
2,664
3.359375
3
Working within healthcare appeals to our society in a way virtually no other professional sector does. The mystique of making medical diagnoses, the desire to help those in need, the adrenalin surge that comes with working at a fast pace and in stressful situations, and the allure of earning a handsome salary. If you need further proof that we like the idea of healthcare jobs, just think about how many movies and televisions shows (reality, dramas, and comedies) take place or have taken place inside hospitals. Our attraction to this industry will probably always be well-matched with the necessity to educate and employ more qualified healthcare professionals—especially right now, as a substantial portion of our population is aging and requiring more medical care. In fact, the Bureau of Labor Statistics (BLS) reports that there will be more employment growth within the healthcare and social assistance sector than in any others this decade. Here's a snapshot of the 24 healthcare professions that we at U.S. News have labelled the best to break into, either this year or in the years to come. The Doctors Are In What's a list of healthcare jobs without doctors? For 2013, we highlight a handful of professions that utilize this title, although the long road to earning the honor is different for each job. Whether you choose to be a Medical Doctor (M.D.), a Doctor of Dental Medicine (D.M.D.), a Doctor of Pharmacy (PharmD), or even a Doctor of Veterinary Medicine (D.V.M.), you can expect to spend at least two years following undergrad completing a professional degree and residency program. Some medical specialties require up to eight years working as a resident. The initials behind your name are only part of the payoff for all those years of training: Doctors are imperative to providing quality healthcare, as they're the ones who make the medical diagnoses and final decisions on how to treat patients. The four categories of doctors we highlight this year could together see nearly 300,000 new hires between 2010 and 2020. Expected Openings: 27,600 Expected Openings: 69,700 Expected Openings: 168,300 Expected Openings: 22,000 Some of the most significant work in a healthcare facility is performed by medical secretaries, technologists, and technicians. And like the doctors, therapists, and nurses who they support, these workers undergo specialized training to become qualified to properly operate complex medical equipment, decipher prescription orders, prepare patients for procedures, keep detailed medical records, and possibly even perform initial analyses and medical examinations. However, you won't find yourself in a four-years-or-more learning purgatory (er, training period) to enter one of these six positions from our Best Jobs list. And job prospects are excellent, as healthcare facilities strive to meet the demand to treat more patients by hiring these types of workers to provide general care and free up registered nurses, therapists, and doctors. Keep in mind that technologists are senior to technicians, typically earn higher salaries, and often need a bachelor's degree and credentials. Expected Openings: 23,800 Expected Openings: 23,400 Expected Openings: 210,200 Expected Openings: 108,300
<urn:uuid:417b4bf6-c932-4c0a-832b-e7e0787bae84>
CC-MAIN-2013-20
http://money.usnews.com/money/careers/articles/2013/02/14/24-hot-and-hiring-healthcare-jobs?s_cid=rss:24-hot-and-hiring-healthcare-jobs
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.947842
664
2.609375
3
Related Articles and Videos What's your credit question? Search for answers to your questions. See all Three Reports and Scores See your Experian, TransUnion and Equifax credit reports in one easy-to-read format. Includes a FREE PLUS Credit ScoreSM from Experian. See them online for only $39.95! What Is Credit Credit is borrowed money that you can use to purchase goods and services when you need them. You get credit from a credit grantor, whom you agree to pay back the amount you spent, plus applicable finance charges, at an agreed-upon time. There are four types of credit: - Revolving credit. With revolving credit, you are given a maximum credit limit, and you can make charges up to that limit. Each month, you carry a balance (or revolve the debt) and make a payment. Most credit cards are a form of revolving credit. - Charge cards. While they often look like revolving credit cards and are used in the same way, charge accounts differ in that you must pay the total balance every month. - Service credit. Your agreements with service providers are all credit arrangements. You receive electricity, cellular phone service, gym membership, etc., with the agreement that you will pay for them each month. Not all service accounts are reported in your credit history. - Installment credit. With installment credit, a creditor loans you a specific amount of money, and you agree to repay the money and interest in regular installments of a fixed amount over a set period of time. Car loans and mortgages are two examples of installment credit. Why Do You Need Credit? Good credit is necessary if you plan to use credit to make a major purchase, such as a car or a home, or want to be able to take advantage of the convenience credit can provide. The importance of good credit also extends beyond purchases, in that your credit information may be used by potential employers and landlords as part of the selection process. Credit grantors review credit applications and credit reports to determine financial risk: If they lend you money, extend you credit or give you goods and services, will you pay them back? They may consider your income, how long you’ve lived at your present address, how long you’ve worked for the same employer, what kinds of assets you have and the balances of your bank accounts. Often, though, the primary resource guiding their decision is your credit information.
<urn:uuid:9b814cac-acfb-455d-8fa2-c43c179a46ab>
CC-MAIN-2013-20
http://www.experian.com/credit-education/what-is-credit.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.946763
502
2.765625
3
Selective extraction of gold(III) in the presence of Pd(II) and Pt(IV) by salting-out of the mixture of 2-propanol and water. - PubMed: 18968825 The mixture of 2-propanol with water has been employed to extract Au(III) along with other precious metals such as Pd(II) and Pt(IV) by using NaCl in the concentration range of 2.5-4.0 mol dm(-3). Upon the addition of NaCl within this concentration range (2.5-4.0 mol dm(-3)) phase separation was attained. Gold(III) in aqueous phase was quantitatively extracted into the 2-propanol phase at 2.5-4.0 mol dm(-3) of NaCl. The extraction of the other metals such as Pd(II) and Pt(IV) was much lower than for that of Au(III). Thus a maximal selective separation of Au(III) from these metals could be attained using the mixture of 2-propanol with water. A reaction mechanism involving the ion-pair of Na(+) and AuCl(4)(-) has been proposed to explain this extraction.
<urn:uuid:5b9b1ccb-3bbd-48e9-bb06-7bd3c953c579>
CC-MAIN-2013-20
http://www.mendeley.com/research/selective-extraction-gold-iii-presence-pd-ii-pt-iv-salting-mixture-2-propanol-water/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.942084
257
2.703125
3
Contents of 28-3 Practical Activities, Biodiversity for Beginners P66. Chris du Feu Biodiversity is a difficult concept. It can be introduced to young children successfully, laying the foundations for further study in later years. This article describes one practical activity for 5- and 6-year-old children. iPod Shuffle not Random. P71. Peter Holmes This article discusses the behaviour of a sequence of events under random choice and under a restriction of randomness. Outline lesson plans at three different levels are suggested. Wimbledon 2010: A Fifth Set Cliff-hanger in the Murray vs. Federer Final? P75. Elizabeth M. Glaister and Paul Glaister Imagine the scene. The year is 2010 and Andy Murray and Roger Federer are playing each other for the first time in the Wimbledon Championships final. Will it be a straights sets victory or a nail-biting five-set match? How a Dummy Replaces a Student’s Test and Gets an F (Or, How Regression Substitutes for t tests and ANOVA) P78. Joseph G. Eisenhauer Using dummy variables, this note offers a convenient illustration to demonstrate that regression can replace both the one-factor analysis of variance and the two-population t test with independent random samples. The exercise also helps to develop students’ intuition regarding regression coefficients. Consensus is Unfair. P81. Ruma Falk and Avital Lann A coefficient of unfairness in the allocation of goods to people can be extended to measuring consensus among judges. The notion of relative variability underlies the formation of these measures. NEWS & NOTES P83 The Royal Statistical Society Schools Lecture 2004: ‘Lies and Statistics’, Part 2. P84. Frank Duckworth This article concludes the serialization of the Royal Statistical Society’s Schools Lecture for 2004, on ‘Lies and statistics’. Statistical Diversions. P90. Peter Petocz and Eric Sowey The regular column in Teaching Statistics to get you thinking. COMPETITION REPORT P93 BOOK REVIEW P94 LOOK AHEAD P96 Index to Volume 28 (inside back cover)
<urn:uuid:f5044e07-65ba-4820-8bf4-f431a670bb63>
CC-MAIN-2013-20
http://www.rsscse-edu.org.uk/tsj/?page_id=289
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.829414
471
3.109375
3
Last time, I introduced you to SELinux: what it is, what it can do, and really why you need it (or a system like it). It is especially important with reported (and fixed) security vulnerabilities on the rise, and each year brings more reports, and more updates for end-users to install. This data tells us that we are in greater need of proactive security measures now than we ever were before. And this is where software like SELinux fits in. There is a lot to SELinux, and we’re only going to touch on SELinux contexts and labels. Suffice it to say, SELinux policies contain various rules that allow interaction between different contexts. Contexts are ports, processes, files, directories, and so on. Instead of getting overwhelmed with the technical concepts of SELinux, we’ll instead look at the practical side of using SELinux so that it doesn’t seem quite as daunting. The first thing to do is determine what mode SELinux is running in: The getenforce command tells us what mode SELinux is in. The possible modes are Enforcing, Permissive, or Disabled. Enforcing means that SELinux will report access violations and deny the attempt, Permissive tells SELinux to report the violation but allow it, and Disabled completely turns SELinux off. Ideally, if you are unprepared to run SELinux in Enforcing mode, it should be in Permissive mode. This can be set at boot by editing (on Red Hat Enterprise Linux and Fedora) the /etc/sysconfig/selinux file and setting the SELINUX option: This will ensure it persists across reboot. SELinux can transition from Enforcing to Permissive easily using the setenforce command. Providing setenforce with a “0″ argument will put the system in Permissive mode, a “1″ will set it to Enforcing. To transition to or from Disabled mode, you need to reboot after making the appropriate changes to the sysconfig file. Using setenforce can be a great way of troubleshooting problems; if the problem goes away after setting the system to Permissive mode then you know it is SELinux. If not, then it is something else. # setenforce 0 To view the contexts that a process is running with, add the Z option to ps: # ps auxZ | grep httpd system_u:system_r:httpd_t:s0 apache 30544 0.0 0.0 305612 6688 ? S Mar30 0:00 /usr/sbin/httpd This tells us that the httpd process is using the httpd_t type, the system_r role, and the system_u user. More often than not, it is the httpd_t type you would be interested in. The Z option is also used with other commands, such as ls, cp, id, and others. For instance, to view your security context: # id -Z Or to view the security context associated with a file: # ls -lZ /var/www/html/index.html -rw-r--r--. root root unconfined_u:object_r:httpd_sys_content_t:s0 /var/www/html/index.html Again, probably the most useful bit of information here is the type, in this case it is httpd_sys_content_t. As an example of how to quickly change the policy, assume that you do not put your websites in /var/www/, but rather use /srv/www/foo.com/html/ for your site’s document root. You can configure Apache to use these directories as the DocumentRoot for various websites, but if you were to visit them, Apache would return an error because SELinux would disallow access. SELinux knows nothing about allowing Apache to these directories as of yet. To determine what type a file needs to have in order for Apache to access it, the above ls command tells us that the type we want is probably httpd_sys_content_t; after all, Apache by default serves files from /var/www/html/. Another, probably better, way is to use the semanage tool. This tool is used to show, and change, defined SELinux policy. We could also do: # semanage fcontext -l | grep '/var/www' /var/www(/.*)? all files system_u:object_r:httpd_sys_content_t:s0 This command tells semanage to list all fcontext entries (file contexts), and we hand that output to grep to search for and display ‘/var/www’. For brevity, the whole output is not shown, but the above confirms that /var/www/* has the httpd_sys_content_t type. So what we need to do is tell SELinux to give this same type to /srv/www/foo.com/html/*, so that Apache can serve up those files. This can be done by using semanage to add a new context: # semanage fcontext -a -t httpd_sys_content_t '/srv/www(/.*)?' # semanage fcontext -l | grep '/srv/www' /srv/www(/.*)? all files system_u:object_r:httpd_sys_content_t:s0 # restorecon -Rv /srv/www The SELinux policies here use regular expressions, so the above tells semanage to add (-a) a new fcontext with the type (-t) httpd_sys_content_t, and targets /srv/www itself and any sub-directories and files. We use semanage to list the fcontexts and search for any ‘/srv/www’ entries, to verify it is in place, and then use restorecon to re-label and set the appropriate security context on the /srv/www directory and any sub-directories and files. At this point, Apache will serve content from that directory if configured to do so, because Apache has the right to read httpd_sys_content_t files and /srv/www/ will now be labeled correctly. The restorecon tool is used to set default contexts on files and directories, according to policy. You will become very familiar with this tool because it is used very often. For instance, if you move a file from a home directory to this web root, it will not immediately gain the appropriate security context because the mv command retains the existing context (cp will make a new context because it is making a new file). For instance: % echo "my file" >file.html % ls -Z file.html -rw-rw-r--. vdanen vdanen unconfined_u:object_r:user_home_t:s0 file.html % mv file.html /srv/www/foo.com/html/ % ls -Z /srv/www/foo.com/html/ -rw-rw-r--. vdanen vdanen unconfined_u:object_r:user_home_t:s0 file.html Apache is not, by default, allowed to serve up user_home_t files, so any attempt to display this file via Apache will fail with denied access. restorecon is required to re-label the file so Apache can access it: # restorecon -v /srv/www/foo.com/html/file.html restorecon reset /srv/www/foo.com/html/file.html context unconfined_u:object_r:user_home_t:s0->system_u:object_r:httpd_sys_content_t:s0 Now the security context of the file is correct. Similarly, when going from Disabled mode to Permissive or Enforcing mode, SELinux will have to re-label the entire filesystem (effectively running “estorecon /) because contexts are not set at all when SELinux is disabled. Once you wrap your head around these basics of SELinux, all of a sudden it is no more difficult to use than manipulating iptables firewall rules. Just as you would adjust your firewall to allow access to a new service, you adjust SELinux file contexts to allow applications and services to access them. Yes, it does require a little more work to set up, initially, but the security benefits are really quite useful, especially considering that the bulk of this kind of manipulation will only happen when initially setting up a system or adding new services. And getting into the habit of running restorecon on new files and directories as they are created isn’t any more difficult than using ls on them to double-check their permissions. The next and final tip on SELinux will introduce us to SELinux logging, to detect access violations, and to some other basic SELinux commands.
<urn:uuid:d3645569-0d19-45d0-af0b-286f495121c1>
CC-MAIN-2013-20
http://www.techrepublic.com/blog/opensource/practical-selinux-for-the-beginner-contexts-and-labels/2458
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.853363
1,992
2.625
3
Peru Demographic Resources CIA World Factbook - This is a summary of all public information that the United States intelligence has about Peru. Information included: geography, people, government, economy, communications, transportation, military and transnational issues. World Bank - The World Bank deals specifically with poverty reduction and economic issues, however there is much economic data that assists in developing what Peru looks like socially. Information included: GDP, population, private and public sector strength, health and education. United States Department of State - This is a summary of the United States’ public position on Peru as well as demographic, safety and geographic information for travellers. Health of Nations - This is a website presented by General Electric that presents information specifically regarding health. Information included: hospital beds (per 1000), vaccines and physicians (per 10,000). World Health Organization - This is data presented specifically by the UN’s World Health Organization, data that is used by the organization to develop aid plans and to devote money for aid. UNICEF - Information offered: nutrition, health, education, demographics, rate of progress, equity, etc. This is data only and does not offer any explanation of data. International Human Development Indicators - Data from the United Nations accumulated while trying to evaluate development throughout the world. The site offers general development information and specific health data. BBC - Information on Peru offered by BBC. It’s probably not too academic or groundbreaking, but a good place to start. USAID Peru - Information offered by USAID about current projects. Peru INEI - All in Spanish, but contains potentially valuable information if translated. Newseum - Offers access to the front page of any newspaper in the world.
<urn:uuid:5b7c3b71-b10e-4bec-a7ed-c27de35845b2>
CC-MAIN-2013-20
http://www.washcoll.edu/centers/ces/gis/peru-resources.php
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.92481
357
2.859375
3
In a recent study, researchers sought to determine whether the U.S. Surgeon General Office's recommendation of moderate intensity exercise four or more times per week for at least 30 minutes per occasion was sufficient to facilitate body fat loss. Ninety men and women were instructed to voluntarily exercise for 30 minutes four times weekly for 8 weeks. Participants were given two options, either continuous steady state cardiovascular training at 70% of HRmax, or circuit training for 30 minutes achieving similar intensity. Body composition was evaluated using air displacement plethysmography, familiar to most as a BodPod. After 8 weeks the participants were categorized into controls, and by number of days exercised per week over the course of the study: less than 2 times per week, 2 to 3 times per week and 4 or more times per week. All three exercise groups lost body fat on average, however, only those who exercised 4 or more times per week achieved significant body fat loss during the 8 week study, approximately 13 lbs. Although diet was not controlled for during this study, the findings underscore the importance of frequency of exercise for fat loss. The majority of Personal Training clients exercise with their Trainer 2 or 3 times per week. It is important that clients are encouraged to train additionally on their own to accumulate the desirable frequency. Willis, F.B. et al (2009) Frequency of Exercise for Body Fat Los: A Controlled, Cohort Study. Journal of Strength & Conditioning Research 23 (8): 2377.
<urn:uuid:965a43c3-6e2b-4867-b53b-0c9136ac3583>
CC-MAIN-2013-20
http://bostonbootcamps.blogspot.com/2009/11/training-frequency-matters-for-body.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.949718
303
2.734375
3
Basic economics state that a change in the supply of a product or service can drive the cost up or down. The more of availability of a product or service generally means there is greater competition to sell these products. However, if the demand increases even as the supply increases, the net costs of the product may increase as well. In other words, even as supply increases, the demand outpaces the supply and thereby increasing the cost to the consumer. This is the scenario that oil markets must consider when buying and selling crude oil. As more nations move into an industrialized economy, the world demand for oil increases. Other factors which can impact demand are colder than normal seasons, war, industrial growth spurts, and the increase in leisure time and summer travel. The total supply of oil is a comprised of the number of barrels oil producing countries can provide plus the available stocks sitting in storage either on land or at sea in transit. There just as many variables which could... [continues] Cite This Essay (2007, 11). Supply V. Demand: False Perceptions That Impact Crude Oil Pricing. StudyMode.com. Retrieved 11, 2007, from http://www.studymode.com/essays/Supply-v-Demand-False-Perceptions-Impact-125215.html "Supply V. Demand: False Perceptions That Impact Crude Oil Pricing" StudyMode.com. 11 2007. 11 2007 <http://www.studymode.com/essays/Supply-v-Demand-False-Perceptions-Impact-125215.html>. "Supply V. Demand: False Perceptions That Impact Crude Oil Pricing." StudyMode.com. 11, 2007. Accessed 11, 2007. http://www.studymode.com/essays/Supply-v-Demand-False-Perceptions-Impact-125215.html.
<urn:uuid:884468dd-0399-4319-907f-394cd615cd91>
CC-MAIN-2013-20
http://www.studymode.com/essays/Supply-v-Demand-False-Perceptions-Impact-125215.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.854954
397
2.71875
3
Apr 13, 2006 what is the difference between Hep C and Hep B. Is one more serious than the other? | Response from Dr. McGovern Both can cause liver disease and liver cancer. Hepatitis B is spread through sex and injection drug use; hepatitis C is spread most commonly through injection drug use and much less commonly through sex. However, hepatitis B most often clears from the body and does not cause chronic disease. On the other hand, hepatitis C causes chronic disease in about 80 percent of people. Both illnesses can be treated. Get Email Notifications When This Forum Updates or Subscribe With RSS This forum is designed for educational purposes only, and experts are not rendering medical, mental health, legal or other professional advice or services. If you have or suspect you may have a medical, mental health, legal or other problem that requires advice, consult your own caregiver, attorney or other qualified professional. Experts appearing on this page are independent and are solely responsible for editing and fact-checking their material. Neither TheBody.com nor any advertiser is the publisher or speaker of posted visitors' questions or the experts' material.
<urn:uuid:98c47a3c-d3e6-436b-9b80-ae7511ff2d25>
CC-MAIN-2013-20
http://www.thebody.com/Forums/AIDS/Hepatitis/Q173626.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.92163
236
2.703125
3
From The New York Times (Felicity Barringer): The federal government has come up with dozens of ways to enhance the diminishing flow of the Colorado River, which has long struggled to keep seven states and roughly 25 million people hydrated… …also in the mix, and expected to remain in the final draft of the report [ed. Colorado River Basin Water Supply & Demand Study], is a more extreme and contentious approach. It calls for building a pipeline from the Missouri River to Denver, nearly 600 miles to the west. Water would be doled out as needed along the route in Kansas, with the rest ultimately stored in reservoirs in the Denver area… The fact that the Missouri River pipeline idea made the final draft, water experts say, shows how serious the problem has become for the states of the Colorado River basin. “I pooh-poohed this kind of stuff back in the 1960s,” said Chuck Howe, a water policy expert and emeritus professor of economics at the University of Colorado, Boulder. “But it’s no longer totally unrealistic. Currently, one can say ‘It’s worth a careful look.’ ” The pipeline would provide the Colorado River basin [ed. Denver, Kansas, etc., are not in the Colorado River Basin] with 600,000 acre-feet of water annually, which could serve roughly a million single-family homes. But the loss of so much water from the Missouri and Mississippi River systems, which require flows high enough to sustain large vessel navigation, would most likely face strong political opposition… Rose Davis, a spokeswoman for the Bureau of Reclamation, said that during the course of the study, the analysis done on climate change and historical data led the agency “to an acknowledged gap” between future demand and future supply as early as the middle of this century. That is when they put out a call for broader thinking to solve the water problem. “When we did have that wake-up call, we threw open the doors and said, ‘Bring it on,’ ” she said. “Nothing is too silly.”[...] It is unclear how much such a pipeline project would cost, though estimates run into the billions of dollars. That does not include the cost of the new electric power that would be needed (along with the construction of new generating capacity) to pump the water uphill from Leavenworth, Kan., to the front range reservoirs serving Denver, about a mile above sea level, according to Sharlene Leurig, an expert on water-project financing at Ceres, a nonprofit group based in Boston that works with investors to promote sustainability. If the Denver area had this new source of water to draw on, it could reduce the supplies that come from the Colorado River basin on the other side of the Continental Divide. But [Burke W. Griggs] and some federal officials said that the approval of such a huge water project remained highly unlikely. Ms. Leurig noted that local taxpayers and utility customers would be shouldering most of the expense of such a venture through their tax and water bills, which would make conservation a more palatable alternative. More Missouri River Reuse Project coverage here.
<urn:uuid:ab47fb9c-7f5e-4526-b509-4201b9967b13>
CC-MAIN-2013-20
http://coyotegulch.wordpress.com/2012/12/10/missouri-river-reuse-project-i-pooh-poohed-this-kind-of-stuff-back-in-the-1960s-chuck-howe/?like=1&source=post_flair&_wpnonce=57db9114c5
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.96201
666
2.546875
3
|135–185 million Communities majorly in Iran,Afghanistan and also in Turkey, Iraq, Syria, Azerbaijan, Tajikistan, Uzbekistan, Turkmenistan, Russia, Kazakhstan, Georgia, Armenia, Oman, China (Xinjiang), India, Pakistan, United Kingdom, Germany and United States.| |Regions with significant populations| |Iran and Iranian Plateau, Anatolia, South Asia, Central Asia, the Caucasus and as immigrant communities in North America and Western Europe.| |Related ethnic groups| Other Indo-Iranian peoples The Iranian peoples or Iranic peoples are an Indo-European ethno-linguistic group that comprise the speakers of Iranian languages, a major branch of the Indo-European language family, as such forming a branch of the Indo-European-speaking peoples. Their historical areas of settlement were on the Iranian plateau (mainly Iran) and certain neighbouring areas of Central Asia (such as Afghanistan, Tajikistan, Uzbekistan, Pakistan West of the River Indus, northern Iraq and eastern Turkey, and scattered part of the Caucasus Mountains) reflecting changing geopolitical range of the Persian empires and the Iranian history. Their current distribution spreads across the Iranian plateau, and stretches from Pakistan's Indus River in the east to eastern Turkey in the west, and from Central Asia and the Caucasus in the north to the Persian Gulf in the south – a region that is sometimes called the Iranian cultural continent, or Greater Persia by scholars, and represents the extent of the Iranian languages and influence of the Persian people, through the geopolitical reach of the Persian empire. The Iranian group emerges from an earlier Iranian group during the Late Bronze Age, and it enters the historical record during the Early Iron Age. The Iranians comprise the Persians, Medes, Scythians, Bactrians, Parthians, Sarmatians, Alans, Ossetians, Cimerians and their sub-groups. The Iranians had domesticated horses, had travelled far and wide, and from the late 2nd millennium BCE to early 1st millennium BCE they had migrated to, and settled on, the Iranian Plateau. They moved into the Zagros Mountains (inhabited by Gutians, Kassites and others, home of the Mannaean kingdom) above the indigenous non Iranian Elamite Kingdom. For approximately three centuries after arriving in the region, the Medes and Persians fell under the domination of the Assyrian Empire (911–609 BCE), based in nearby Mesopotamia. In 646 BCE, Susa and many other cities of Elam were plundered and wrecked by Ashurbanipal, King of Assyria, allowing the Iranian peoples to become the predominant group in Iran. After the death of Ashurbanipal in 627 BCE, the Assyrian Empire began to unravel due to a series of bitter civil wars. In 616 BCE the Median king Cyaxares threw off the Assyrian yoke, united the Medes and Persians, and in alliance with Nabopolassar of Babylon and the Scythians, attacked the civil war ridden Assyrian Empire. By 609 BCE, the Assyrians and their Egyptian allies had been defeated. This began the Iranian domination in the Iranian Plateau. Persians formed the Achaemenid Empire by the 6th century BCE, while the Scythians dominated the Eurasian steppe. With numerous artistic, scientific, architectural and philosophical achievements and numerous kingdoms and empires that bridged much of the civilized world in antiquity, the Iranian peoples were often in close contact with the Greeks, Romans, Egyptians, Indians, and Chinese. The various religions of the Iranian peoples, including Zoroastrianism, Mithraism and Manichaeism, are believed by some scholars to have been significant early philosophical influences on Christianity and Judaism. The term Iranian is derived from the Old Iranian ethnical adjective Aryana which is itself a cognate of the Sanskrit word Arya. The name Iran is from Aryānām; lit: "[Land] of the Aryans". The old Proto-Indo-Iranian term Arya, per Thieme meaning "hospitable", is believed to have been one of the self-referential terms used by the Aryans, at least in the areas populated by Aryans who migrated south from Central Asia. Another meaning for Aryan is noble. In the late part of the Avesta (Vendidad 1), one of their homelands was referred to as Airyanem Vaejah. The homeland varied in its geographic range, the area around Herat (Pliny's view) and even the entire expanse of the Iranian plateau (Strabo's designation). The academic usage of the term Iranian is distinct from the state of Iran and its various citizens (who are all Iranian by nationality and thus popularly referred to as Iranians) in the same way that Germanic people is distinct from Germans. Many citizens of Iran are not necessarily "Iranian people" by virtue of not being speakers of Iranian languages. Unlike the various terms connected with the Aryan arya- in Old Indian, the Old Iranian term has solely an ethnic meaning and there can be no doubt about the ethnic value of Old Iran. arya (Benveniste, 1969, I, pp. 369 f.; Szemerényi; Kellens). The Avesta clearly uses airya as an ethnic name (Vd. 1; Yt. 13.143-44, etc.), where it appears in expressions such as airyāfi; daiŋˊhāvō "Iranian lands, peoples," airyō.šayanəm "land inhabited by Iranians," and airyanəm vaējō vaŋhuyāfi; dāityayāfi; "Iranian stretch of the good Dāityā," the river Oxus, the modern Āmū Daryā. The term "Ariya" appears in the royal Old Persian inscriptions in three different contexts: 1) As the name of the language of the Old Persian version of the inscription of Darius the Great in Behistun; 2) as the ethnic background of Darius in inscriptions at Naqsh-e-Rostam and Susa (Dna, Dse) and Xerxes in the inscription from Persepolis (Xph) and 3) as the definition of the God of Iranian people, Ahuramazda, in the Elamite version of the Behistun inscription. For example in the Dna and Dse Darius and Xerxes describe themselves as "An Achaemenian, A Persian son of a Persian and an Aryan, of Aryan stock". Although Darius the Great called his language the Iranian language, modern scholars refer to it as Old Persian because it is the ancestor of modern Persian language. The Old Persian and Avestan evidence is confirmed by the Greek sources". Herodotus in his Histories remarks about the Iranian Medes that: "These Medes were called anciently by all people Arians; " (7.62). In Armenian sources, the Parthians, Medes and Persians are collectively referred to as Iranians. Eudemus of Rhodes apud Damascius (Dubitationes et solutiones in Platonis Parmenidem 125 bis) refers to "the Magi and all those of Iranian (áreion) lineage"; Diodorus Siculus (1.94.2) considers Zoroaster (Zathraustēs) as one of the Arianoi. The name of Ariana is further extended to a part of Persia and of Media, as also to the Bactrians and Sogdians on the north; for these speak approximately the same language, with but slight variations. — Geography, 15.8 The trilingual inscription erected by Shapur's command gives a more clear description. The languages used are Parthian, Middle Persian and Greek. In Greek, the inscription says: "ego ... tou Arianon ethnous despotes eimi"("I am lord of the kingdom (Gk. nation) of the Aryans") which translates to "I am the king of the Iranian people". In the Middle Persian, Shapour states: "ērānšahr xwadāy hēm" and in Parthian he states: "aryānšahr xwadāy ahēm". The Bactrian language (a Middle Iranian language) inscription of Kanishka the founder of the Kushan empire at Rabatak, which was discovered in 1993 in an unexcavated site in the Afghanistan province of Baghlan, clearly refers to this Eastern Iranian language as Arya. In the post-Islamic era, one can still see a clear usage of the term Iran in the work of the 10th-century historian Hamzeh Isfahani. In his book the history of Prophets and Kings writes: "Aryan which is also called Pars (Persia) is in the middle of these countries and these six countries surround it because the South East is in the hands China, the North of the Turks, the middle South is India, the middle North is Rome, and the South West and the North West is the Sudan and Berber lands". All this evidence shows that the name arya "Iranian" was a collective definition, denoting peoples (Geiger, pp. 167 f.; Schmitt, 1978, p. 31) who were aware of belonging to the one ethnic stock, speaking a common language, and having a religious tradition that centered on the cult of Ahura Mazdā. History and settlement The language referred to as Proto-Indo-European (PIE): is ancestral to Diba and the Celtic, Italic (including Romance), Germanic, Baltic, Slavic, Indo-Iranian, Albanian, Armernian, Greek, and Tocharian languages. 'There is an agreement that the PIE community split into two major groups from wherever its homeland was situated (its location is unknown), and whenever the timing of its dispersal (also unknown). One headed west for Europe and became speakers of Indo-European (all the languages of modern Europe save for Basque, Hungarian, and Finnish) while others headed east for Eurasia to become Indo-Iranians. The Indo-Iranians were a community that spoke a common language prior to their branching off into the Iranian and Indo-Aryan languages. Iranian refers to the languages of Iran (Iranian), Pakistan (Balochi and Pashto), Afghanistan (Pashto and Dari), and Tadjikistan (Tajiki) and Indo-Aryan, Sanskrit, Urdu and its many related languages.' – (Carl C. Lamberg-Karlovsky: Case of the Bronze Age) By the early 1st millennium, Ancient Iranian peoples such as Medes, Persians, Bactrians, Parthians and Scythians populated the Iranian plateau, and other Scythian tribes, along with Cimmerians, Sarmatians and Alans populated the steppes north of the Black Sea. The Saka, Scythian, tribes spread as far west as the Balkans and as far east as Xinjiang. Scythians as well formed the Indo-Scythian Empire, and Bactrians formed a Greco-Bactrian Kingdom founded by Diodotus I, the satrap of Bactria. The Kushan Empire, with Bactrian roots/connections, once controlled much of Pakistan, some of Afghanistan and Tajikistan. The Kushan elite (who the Chinese called the Yuezhi) were either a Tocharian-speaking (another Indo-European branch) people or an Eastern Iranian language-speaking people. The division into an "Eastern" and a "Western" group by the early 1st millennium is visible in Avestan vs. Old Persian, the two oldest known Iranian languages. The Old Avestan texts known as the Gathas are believed to have been composed by Zoroaster, the founder of Zoroastrianism, with the Yaz culture (c. 1500–1100 BCE) as a candidate for the development of Eastern Iranian culture. Western Iranian peoples |Part of a series on| During the 1st centuries of the first millennium BCE, the ancient Persians established themselves in the western portion of the Iranian plateau and appear to have interacted considerably with the Elamites and Babylonians, while the Medes also entered in contact with the Assyrians. Remnants of the Median language and Old Persian show their common Proto-Iranian roots, emphasized in Strabo and Herodotus' description of their languages as very similar to the languages spoken by the Bactrians and Soghdians in the east. Following the establishment of the Achaemenid Empire, the Persian language (referred to as "Farsi" in Persian) spread from Pars or Fars Province to various regions of the Empire, with the modern dialects of Iran, Afghanistan (also known as Dari) and Central-Asia (known as Tajiki) descending from Old Persian. Old Persian is attested in the Behistun Inscription (c. 519 BCE), recording a proclamation by Darius the Great. In southwestern Iran, the Achaemenid kings usually wrote their inscriptions in trilingual form (Elamite, Babylonian and Old Persian) while elsewhere other languages were used. The administrative languages were Elamite in the early period, and later Imperial Aramaic. The early inhabitants of the Achaemenid Empire appear to have adopted the religion of Zoroastrianism. The Baloch who speak a west Iranian language relate an oral tradition regarding their migration from Aleppo, Syria around the year 1000 CE, whereas linguistic evidence links Balochi to Kurmanji, Soranî, Gorani and Zazaki. Eastern Iranian peoples While the Iranian tribes of the south are better known through their texts and modern counterparts, the tribes which remained largely in the vast Eurasian expanse are known through the references made to them by the ancient Greeks, Persians, Indo-Aryans as well as by archaeological finds. Many ancient Sanskrit texts make references to tribes like Sakas, Paradas, Kambojas, Bahlikas, Uttaramadras, Madras, Lohas, Parama Kambojas, Rishikas, Tukharas or Tusharas etc. and locate them in the (Uttarapatha) (north-west) division, in Central Asia, around Hindukush range in northern Pakistan. The Greek chronicler, Herodotus (5th century BCE) makes references to a nomadic people, the Scythians; he describes them as having dwelt in what is today southern Russia. It is believed that these Scythians were conquered by their eastern cousins, the Sarmatians, who are mentioned by Strabo as the dominant tribe which controlled the southern Russian steppe in the 1st millennium CE. These Sarmatians were also known to the Romans, who conquered the western tribes in the Balkans and sent Sarmatian conscripts, as part of Roman legions, as far west as Roman Britain. The Sarmatians of the east became the Alans, who also ventured far and wide, with a branch ending up in Western Europe and North Africa, as they accompanied the Germanic Vandals during their migrations. The modern Ossetians are believed to be the sole direct descendants of the Alans, as other remnants of the Alans disappeared following Germanic, Hunnic and ultimately Slavic migrations and invasions. Another group of Alans allied with Goths to defeat the Romans and ultimately settled in what is now called Catalonia (Goth-Alania). Some of the Saka-Scythian tribes in Central Asia would later move further southeast and invade the Iranian plateau, large sections of present day Afghanistan and finally deep into present day Pakistan (see Indo-Scythians). Another Iranian tribe related to the Saka-Scythians were the Parni in Central Asia, and who later become indistinguishable from the Parthians, speakers of a northwest-Iranian language. Many Iranian tribes, including the Khwarazmians, Massagetae and Sogdians, were assimilated and/or displaced in Central Asia by the migrations of Turkic tribes emanating out of Xinjiang and Siberia. The most dominant surviving Eastern Iranian peoples are represented by the Pashtuns, whose origins are generally believed to be from the Sulaiman Mountains, from which they began to spread until they reached as far west as Herat, north to areas of southern and eastern Afghanistan; and as eastward towards the Indus. The Pashto language shows affinities to the Avestan and Bactrian. The modern Sarikoli in southern Xinjiang and the Ossetians of the Caucasus are remnants of the various Saka tribes. The modern Ossetians claim to be the descendants of the Alano-Sarmatians and their claims are supported by their Northeast Iranian language, while culturally the Ossetians resemble their Caucasian neighbors, the Kabardians and Circassians. Various extinct Iranian people existed in the eastern Caucasus, including the Azaris, while some Iranian people remain in the region, including the Talysh and the Tats (including the Judeo-Tats, who have relocated to Israel), found in Azerbaijan and as far north as the Russian republic of Dagestan. A remnant of the Sogdians is found in the Yaghnobi speaking population in parts of the Zeravshan valley in Tajikistan. Later developments Starting with the reign of Omar in 634 CE, Muslim Arabs began a conquest of the Iranian plateau. The Arabs conquered the Sassanid Empire of the Persians and seized much of the Byzantine Empire populated by the Kurds and others. Ultimately, the various Iranian people, including the Persians, Azaries, Kurds, Baluchis and Pashtuns, converted to Islam. The Iranian people would later split along sectarian lines as the Persians (and later the Hazara) adopted the Shi'a sect. As ancient tribes and identities changed, so did the Iranian people, many of whom assimilated foreign cultures and people. Later, during the 2nd millennium CE, the Iranian people would play a prominent role during the age of Islamic expansion and empire. Saladin, a noted adversary of the Crusaders, was an ethnic Kurd, while various empires centered in Iran (including the Safavids) re-established a modern dialect of Persian as the official language spoken throughout much of what is today Iran and adjacent parts of Central Asia. Iranian influence spread to the Ottoman Empire, where Persian was often spoken at court, as well to the court of the Mughal Empire. All of the major Iranian people reasserted their use of Iranian languages following the decline of Arab rule, but would not begin to form modern national identities until the 19th and early 20th centuries (just as Germans and Italians were beginning to formulate national identities of their own). The following either partially descend from Iranian people or are sometimes regarded as possible descendants of ancient Iranian people: - Azeris: Although Azeris speak a Turkic language (modern Azerbaijani language), they are believed to be primarily descendants of ancient Iranians. Thus, due to their historical ties with various ancient Iranians, as well as their cultural ties to Persians, the Azeris are often associated with the Iranian people (see Origin of Azerbaijani people and the Iranian theory regarding the origin of the Azerbaijanis for more details). - Uzbeks: The modern Uzbek people are believed to have both Iranian and Turkic ancestry. "Uzbek" and "Tajik" are modern designations given to the culturally homogeneous, sedentary population of Central Asia. The local ancestors of both groups – the Turkic-speaking Uzbeks and the Iranian-speaking Tajiks – were known as "Sarts" ("sedentary merchants") prior to the Russian conquest of Central Asia, while "Uzbek" or "Turk" were the names given to the nomadic and semi-nomadic populations of the area. Still today, modern Uzbeks and Tajiks are known as "Sarts" to their Turkic neighbours, the Kazakhs and the Kyrgyz. The ancient Soghdians and Bactrians are among their ancestors. Culturally, the Uzbeks are closer to their sedentary Iranian-speaking neighbours rather than to their nomadic and semi-nomadic Turkic neighbours. Some Uzbek scholars, i.e. Ahmadov and Askarov, favour the Iranian origin theory. - The native name of Yakuts is Sakha, very similar to the Sakkas, proposing Yakuts to be related of descendants of Scythians, specifically Sakkahs. - Volga TatarsMany are mixed from Volga bulgars. The reasons are same with Bulgarians, and the putative claim on the Iranian origin of bulgars. - A few linguists suggest that the names of the South Slavic people, the Serbs and Croats are of Iranian origin. Those who entertain such a connection propose that the Sarmatian Serboi and Kharoti tribes might have migrated from the Eurasian steppe lands to eastern Europe, and assimilated with the numerically superior Slavs, passing on their name. Iranian-speaking people did inhabit parts of the Balkans in late classical times, and would have been encountered by the Slavs. However, direct linguistic, historical or archaeological proof for such a theory is lacking. (See also: Theories on the origin of Serbs and Theories on the origin of Croats)Ultimately, Montenegrins and Bosniaks may be counted to this theory. - Some modern Bulgarian historians claim that the Bulgars were of Iranian origin and that they migrated to Europe from the region of today's northern Afghanistan – Hindukush mountains, from the Kingdom of Balhara. Their claims are based on medieval Armenian sources, the writings of ancient historians ("Ashharatsuyts" by Anania Shirakatsi; Agathias of Myrina, Theophylact Simocatta, Michael the Syrian) archaeological findings in modern Bulgaria, the similarities with Iranian languages (place names, people names, and Iranian words in modern Bulgarian), similarities with culture (e.g.: some buildings in Pliska were built in a Zoroastrian fashion; similarities in traditional music, dancing and carpet making) and the very close similarity of the DNA of Pamirian/Iranian people with that of modern Bulgarians After their arrival on Balkans, the Bulgars subjugated and then formed an alliance with the local Slavs and formed the Bulgarian nation. Ultimately, Slavic Macedonians could be counted due to their close linguistic affinities with the standard Bulgarian language. |english||persian||zazaki||(Kurdish) Kurmanji / Sorani||bulgarian| |i know||midânam||ez dizono||ez dizanim /min azanim||az znam| |you know||midâni||ti dizana||tu dizanî / to azanit||ti znayş| |i don't know||nemidânam||ez nizon||ez nizanim / min nazanim||az neznam| |you don't know||nemidâni||ti nizona||tu nizanî / to nazanit||ti niznayş| |a dog||sag||kûtik||kûtchik / sag||kutche (kûçe)| - Indo-Aryan speakers - Speakers of Indo-Aryan languages share linguistic affinities with speakers of Iranian languages, which suggests a degree of historical interaction between these two groups. - Brahui people in Pakistan are speakers of a language classified as Dravidian, although culturally there is considerable Iranic influence among Brahui populations. - Uralic speakers - Many Volga Finns may be of part Iranian admixture due to Bulgar invasion of the Volga basin, if they (Bulgars) were Iranian people. - Hungarians have long prided themselves as Scythians in the past, Scythians being an Iranian people, prior to the Finno-Ugric/Uralic theory. It's possible they've undergone a language shift. In a Magyar folkore suggests Iranian admixture among Hungarian, when Hunor and Magor marry princesses who were Alans, another Iranian people. Jassic people of Hungary are of Ossetian origin. The Szekely are possibly of Iranian origin, as their name is similar to Sakka. - Shirazis:The Shirazi are a sub-group of the Swahili people living on the Swahili Coast of East Africa, especially on the islands of Zanzibar, Pemba and Comoros. Local traditions about their origin claim they are descended from merchant princes from Shiraz in Persia who settled along the Swahili Coast. There are an estimated 150 to 200 million native speakers of Iranian languages, the five major groups of Persians, Lurs, Kurds, Baloch, and Pashtuns accounting for about 90% of this number. Currently, most of these Iranian peoples live in Iran, the Caucasus (mainly Ossetia, other parts of Georgia, and Azerbaijan), Iraqi Kurdistan and Kurdish majority populated areas of Turkey, Iran and Syria, Afghanistan, Tajikistan, and Uzbekistan. The following is a list of peoples that speak Iranian languages with the respective groups's core areas of settlements and their estimated sizes (in millions): |Persian-speaking peoples||Iran, Afghanistan, Tajikistan, Uzbekistan, Iraq, Bahrain|| |Kurds||Turkey, Iran, Iraqi Kurdistan, Syria|| |Baluchis||Pakistan, Iran, Afghanistan|| |Gilakis & Mazanderanis||Iran|| |Lurs & Bakhtiaris||Iran|| |Pamiri people||Tajikistan, Afghanistan, China (Xinjiang), Pakistan|| |Ossetians||South Ossetia, Georgia, Russia (North Ossetia), Hungary |Yaghnobi||Uzbekistan and Tajikistan (Zerafshan region)|| It is largely through linguistic similarities that the Iranian people have been linked, as many non-Iranian people have adopted Iranian languages and cultures. However, other common traits have been identified as well, for example, a stream of common historical events have often linked the southern Iranian people, including Hellenistic conquests, the various empires based in Persia, Arab Caliphates and Turkic invasions. Like other Indo-Europeans, the early Iranians practiced ritual sacrifice, had a social hierarchy consisting of warriors, clerics and farmers and poetic hymns and sagas to recount their deeds. Following the Iranian split from the Indo-Iranians, the Iranians developed an increasingly distinct culture. Various common traits can be discerned among the Iranian people. For example, the social event Norouz is an Iranian festival that is practiced by nearly all of the Iranian people as well as others in the region. Its origins are traced to Zoroastrianism and pre-historic times. Some Iranian cultures exhibit traits that are unique unto themselves. The Pashtuns adhere to a code of honor and culture known as Pashtunwali, which has a similar counterpart among the Baloch, called Mayar, that is more hierarchical. The early Iranian people worshipped various deities found throughout other cultures where Indo-European immigrants established themselves. The earliest major religion of the Iranian people was Zoroastrianism, which spread to nearly all of the Iranian people living in the Iranian plateau. Other religions that had their origins in the Iranian world were Mithraism, Manichaeism, and Mazdakism, among others. Modern speakers of Iranian languages mainly follow Islam. Some follow Judaism, Christianity, Zoroastrianism, and the Bahá'í Faith, with an unknown number showing no religious affiliation. Overall the numbers of Sunni and Shia among the Iranian people are equally distributed. Most Kurds, Tajiks, Pashtuns, and Baluch are Sunni Muslims, while the remainder are mainly Twelver Shi'a, comprising mostly Persians in Iran, and Hazaras in Afghanistan. Zazas in Turkey are largely Alevi, while the Pamiri peoples in Tajikistan and China are nearly all Ismaili. The Christian community is mainly represented by the Armenian Apostolic Church, followed by the Russian Orthodox and Georgian Orthodox Ossetians followed by Nestorians. Judaism is followed mainly by Persian Jews, Kurdish Jews, Bukharian Jews (of Central Asia) and the Mountain Jews (of the Caucasus), most of whom are now found in Israel. The historical religion of the Persian Empire was Zoroastrianism and it still has a few thousand followers, mostly in Yazd and Kerman. They are known as the Parsis in the Indian subcontinent, where many of them fled in historic times following the Arab conquest of Persia, or Zoroastrians in Iran. Another ancient religion is the Yazidi faith, followed by some Kurds in northern Iraq, as well as the majority of the Kurds in Armenia. Cultural assimilation In matters relating to culture, the various Turkic-speaking ethnic groups of Iran (notably the Azerbaijani people) and Afghanistan (Uzbeks and Turkmen) are often conversant in Iranian languages, in addition to their own Turkic languages and also have Iranian culture to the extent that the term Turko-Iranian can be applied. The usage applies to various circumstances that involve historic interaction, intermarriage, cultural assimilation, bilingualism and cultural overlap or commonalities. Notable among this synthesis of Turko-Iranian culture are the Azeris, whose culture, religion and significant periods of history are linked to the Persians. Certain theories and genetic tests suggest that the Azeris are genetically more Iranian than Turkic. ||This section may require cleanup to meet Wikipedia's quality standards. (November 2010)| R1 is more closely linked to Iranians, while R1b is linked to Europeans. Haplogroup J2 especially the clade J2a is frequently found among almost all groups of Iranian people. In comparison with the haplogroup R1a1, J2 is not restricted to geographically eastern and western Iranian populations, but also found among north-western and south-western Iranian populations such as the Bakhtiaris and Mazanderani, as well as geographically north-western Iranian Ossetians. Despite its supposed origin in the fertile crescent, J2a is also found among Iranian populations in the east such as the Yagnobi which are of Soghdian origin as well as the Parsis of India. Beside the relatively high percentage among the Yagnobis in Central Asia, other Iranian populations tend to have a higher frequency of J2a when compared to neighboring Turkic populations. The relatively strong presence of J2a among Ossetians as well as Yagnobis proves distant from the supposed Mesopotamian origin region of J2, are carriers of this Haplogroup. In the Indo-Iranian context, the occurrence of J2a in South Asia is limited to caste populations, with the highest frequencies found among northern areas of South Asia. Compared with R1a1, J2a shows a more conservative distribution, stronger limited to Indo-Iranian origin groups. Many Haplotypes of Y-chromosomal Haplogroup R have been found throughout the Iranian Plateau, and it has been suggested that this Haplogroup may have had its origins in Iran. Cambridge University geneticist Toomas Kivisild has suggested : "Given the geographic spread and STR diversities of sister clades R1 and R2, the latter of which is restricted to India, Pakistan, Iran, and southern central Asia, it is possible that southern and western Asia were the source for R1 and R1a differentiation."(Kivisild et al. 2003). A similar conclusion was given by population geneticist Miguel Regueiro in the Journal of Human Heredity (Regueiro et al. Human Heredity vol. 61 (2006), pp. 132–143) Genetic studies conducted by Cavalli-Sforza have revealed that Iranians have weak correlation with Near Eastern groups, and are closer to surrounding Indo-Europeans speaking populations. This study is partially supported by another one, based on Y-Chromosome haplogroups. The findings of this study reveal many common genetic markers found among the Iranian people from the Tigris river of Iraq to the Indus of Pakistan. This correlates with the Iranian languages spoken from the Caucasus to Kurdish areas in the Zagros region and eastwards to western Pakistan and Tajikistan and parts of Uzbekistan in Central Asia. The extensive gene flow is perhaps an indication of the spread of Iranian-speaking people, whose languages are now spoken mainly on the Iranian plateau and adjacent regions. Another recent study of the genetic landscape of Iran was done by a team of Cambridge geneticists led by Dr. Maziar Ashrafian Bonab (an Iranian Azarbaijani). Bonab remarked that his group had done extensive DNA testing on different language groups, including Indo-European and non Indo-European speakers, in Iran. The study found that the Azerbaijanis of Iran do not have a similar FSt and other genetic markers found in Anatolian and European Turks. However, the genetic Fst and other genetic traits like MRca and mtDNA of Iranian Azeris were identical to Persians in Iran. Azaris of Iran also show very close genetic ties to Kurds. See also Literature and further reading - Banuazizi, Ali and Weiner, Myron (eds.). The State, Religion, and Ethnic Politics: Afghanistan, Iran, and Pakistan (Contemporary Issues in the Middle East), Syracuse University Press (August, 1988). ISBN 0-8156-2448-4. - Canfield, Robert (ed.). Turko-Persia in Historical Perspective, Cambridge University Press, Cambridge (2002). ISBN 0-521-52291-9 - Curzon, R. The Iranian People of the Caucasus. ISBN 0-7007-0649-6. - Derakhshani, Jahanshah. Die Arier in den nahöstlichen Quellen des 3. und 2. Jahrtausends v. Chr., 2nd edition (1999). ISBN 964-90368-6-5. - Frye, Richard, Greater Iran, Mazda Publishers (2005). ISBN 1-56859-177-2. - Frye, Richard. Persia, Schocken Books, Zurich (1963). ASIN B0006BYXHY. - Kennedy, Hugh. The Prophet and the Age of the Caliphates, Longman, New York, NY (2004). ISBN 0-582-40525-4 - Khoury, Philip S. & Kostiner, Joseph. Tribes and State Formation in the Middle East, University of California Press (1991). ISBN 0-520-07080-1. - Littleton, C. & Malcor, L. From Scythia to Camelot, Garland Publishing, New York, NY, (2000). ISBN 0-8153-3566-0. - Mallory, J.P. In Search of the Indo-Europeans, Thames and Hudson, London (1991). ISBN 0-500-27616-1. - McDowall, David. A Modern History of the Kurds, I.B. Tauris, 3rd Rev edition (2004). ISBN 1-85043-416-6. - Nassim, J. Afghanistan: A Nation of Minorities, Minority Rights Group, London (1992). ISBN 0-946690-76-6. - Riasanovsky, Nicholas. A History of Russia, Oxford University Press, Oxford (2004). ISBN 0-19-515394-4. - Sims-Williams, Nicholas. Indo-Iranian Languages and People, British Academy (2003). ISBN 0-19-726285-6. - Iran Nama, (Iran Travelogue in Urdu) by Hakim Syed Zillur Rahman, Tibbi Academy, Aligarh, India (1998). - Saga of the Aryans, Historical novel on ancient Iranian migrations by Porus Homi Havewala, Published Mumbai, India (2005, 2010). - Chopra, R. M.,"Indo-Iranian Cultural Relations Through The Ages", Iran Society, Kolkata, 2005. - Iran: Library of Congress, Library of Congress – Federal Research Division. "Ethnic Groups and Languages of Iran". Retrieved 2009-12-02. (Persian and Caspian dialects-65% Kurdish 8%-Luri/Bakhtiari 5%- Baluchi 2%):80% of the population or approximately 63 million people. - Afghanistan: CIA Factbook Afghanistan: unting Pashtuns, Tajiks, Baluchs, 21 million - Tajiks of Central Asia counting Tajikistan and Uzbekistan 10–15 million - Kurds and Zazas of Turkey, Syria, Lebanon and Iraq based on CIA factbook estimate 22 million - Ossetians, Talysh, Tats, Kurds of the Caucasus and Central Asia: 1–2 million based on CIA factbook/ethnologue. - Tajiks of China: 50,000 to 100,000 - Iranian speakers in Bahrain, the Persian Gulf , Western Europe and USA, 3 million. - Pakistan counting Baluchis+Pashtus+Afghan refugees based on CIA factbook and other sources: 35 million. - The Ossetians of the Caucasus are Orthodox Christians - R.N Frye, "IRAN v. PEOPLES OF IRAN" in Encycloapedia Iranica. "In the following discussion of "Iranian peoples," the term "Iranian" may be understood in two ways. It is, first of all, a linguistic classification, intended to designate any society which inherited or adopted, and transmitted, an Iranian language. The set of Iranian-speaking peoples is thus considered a kind of unity, in spite of their distinct lineage identities plus all the factors which may have further differentiated any one group’s sense of self." - J. Harmatta in "History of Civilizations of Central Asia", Chapter 14, The Emergence of Indo-Iranians: The Indo-Iranian Languages, ed. by A. H. Dani & V.N. Masson, 1999, p. 357 - Ronald Eric Emmerick. "Iranian languages". Encyclopædia Britannica. Retrieved Feb. 6, 2011. - PRODS OKTOR SKJÆRVØ (December 15, 2006). "Iran vi. Iranian languages and scripts Also, Diba". Encyclopedia Iranica. - Frye, Richard Nelson, Greater Iran, ISBN 1-56859-177-2 p.xi: "... Iran means all lands and people where Iranian languages were and are spoken, and where in the past, multi-faceted Iranian cultures existed. ..." - "Amazons in the Scythia: new finds at the Middle Don, Southern Russia". Taylorandfrancis.metapress.com. Retrieved 2009-06-21. - "Secrets of the Dead, Casefile: Amazon Warrior Women". Pbs.org. Retrieved 2009-06-21. - Runciman, Steven (1982). The Medieval Manichee: A Study of the Christian Dualist Heresy. Cambridge University Press. ISBN 0-521-28926-2. - Oxford English Dictionnary: "Aryan from Sanskrit Arya 'Noble'" - Gershevitch, I. (1968). "Old Iranian Literature". Iranistik. Hanbuch Der Orientalistik – Abeteilung – Der Nahe Und Der Mittlere Osten 1. Brill Publishers. p. 203. ISBN 90-04-00857-8.: page 1 - "Farsi-Persian language" — Farsi.net . Retrieved 4 June 2006. - "Article in 1911 Britannica". 58.1911encyclopedia.org. Retrieved 2009-06-21.[dead link] - G. Gnoli, "Iranian Identity as a Historical Problem: the Beginnings of a National Awareness under the Achaemenians," in The East and the Meaning of History. International Conference (23–27 November 1992), Roma, 1994, pp. 147–67. "?". - G. Gnoli, "Iranian Identity ii. Pre-Islamic Period" in Encyclopedia Iranica. Online accessed in 2010 at "?". - R. Schmitt, "Aryans" in Encyclopedia Iranica:Excerpt:"The name "Aryan" (OInd. āˊrya-, Ir. *arya- [with short a-], in Old Pers. ariya-, Av. airiia-, etc.) is the self designation of the peoples of Ancient Iran (as well as India) who spoke Aryan languages, in contrast to the "non-Aryan" peoples of those "Aryan" countries (cf. OInd. an-āˊrya-, Av. an-airiia-, etc.), and lives on in ethnic names like Alan (Lat. Alani, NPers. Īrān, Oss. Ir and Iron.". Also accessed online: "?". in May, 2010 - The "Aryan" Language, Gherardo Gnoli, Instituto Italiano per l'Africa e l'Oriente, Roma, 2002. - H. W. Bailey, "Arya" in Encyclopedia Iranica. Excerpt: "ARYA an ethnic epithet in the Achaemenid inscriptions and in the Zoroastrian Avestan tradition. "Arya an ethnic epithet in the Achaemenid inscriptions and in the Zoroastrian Avestan tradition".[dead link] Also accessed online in May, 2010. - D. N. Mackenzie, "Ērān, Ērānšahr" in Encyclopedia Iranica. "?". Retrieved 2010. - Dalby, Andrew (2004), Dictionary of Languages, Bloomsbury, ISBN 0-7475-7683-1 - G. Gnoli. "ēr, ēr mazdēsn". Encyclopedia Iranica. - R. G. Kent. Old Persian. Grammar, texts, lexicon. 2nd ed., New Haven, Conn. - Professor Gilbert Lazard: The language known as New Persian, which usually is called at this period (early Islamic times) by the name of Dari or Parsi-Dari, can be classified linguistically as a continuation of Middle Persian, the official religious and literary language of Sassanian Iran, itself a continuation of Old Persian, the language of the Achaemenids. Unlike the other languages and dialects, ancient and modern, of the Iranian group such as Avestan, Parthian, Soghdian, Kurdish, Balochi, Pashto, etc., Old Middle and New Persian represent one and the same language at three states of its history. It had its origin in Fars (the true Persian country from the historical point of view) and is differentiated by dialectical features, still easily recognizable from the dialect prevailing in north-western and eastern Iran in Lazard, Gilbert 1975, "The Rise of the New Persian Language" in Frye, R. N., The Cambridge History of Iran, Vol. 4, pp. 595–632, Cambridge: Cambridge University Press. - R.W. Thomson. History of Armenians by Moses Khorenat’si. Harvard University Press, 1978. Pg 118, pg 166 - MacKenzie D.N. Corpus inscriptionum Iranicarum Part. 2., inscription of the Seleucid and Parthian periods of Eastern Iran and Central Asia. Vol. 2. Parthian, London, P. Lund, Humphries 1976–2001 - N. Sims-Williams, "Further notes on the Bactrian inscription of Rabatak, with the Appendix on the name of Kujula Kadphises and VimTatku in Chinese". Proceedings of the Third European Conference of Iranian Studies (Cambridge, September 1995). Part 1: Old and Middle Iranian<Studies, N. Sims-Williams, ed. Wiesbaden, pp 79-92 - The "Aryan" Language, Gherardo Gnoli, Instituto Italiano per l'Africa e l'Oriente, Roma, 2002 - Hamza Isfahani, Tarikh Payaambaraan o Shaahaan, translated by Jaf'ar Shu'ar,Tehran: Intishaaraat Amir Kabir, 1988. - G. Gnoli. "Iranian Identity ii. Pre-Islamic Period". Encyclopedia Iranica. Retrieved 2010. - "Avestan xᵛarǝnah-, etymology and concept by Alexander Lubotsky" — Sprache und Kultur. Akten der X. Fachtagung der Indogermanischen Gesellschaft, 22.-28. September 1996, ed. W. Meid, Innsbruck (IBS) 1998, 479–488. . Retrieved 4 June 2006. - M. Liverani, "The Medes at Esarhaddon's Court", in Journal of Cuneiform Studies 47 (1995), pp. 57–62. - "The Geography of Strabo" — University of Chicago. . Retrieved 4 June 2006. - R. G. Kent, Old Persian: Grammar, texts and lexicon. - R. Hallock (1969), Persepolis Fortification Tablets; A. L. Driver (1954), Aramaic Documents of the V Century BC. - "Kurdish: An Indo-European Language By Siamak Rezaei Durroei"[dead link] — University of Edinburgh, School of Informatics. . Retrieved 4 June 2006. Archived June 17, 2006 at the Wayback Machine[dead link] - "The Iranian Language Family, Khodadad Rezakhani" — Iranologie. . Retrieved 4 June 2006. - A History of Russia by Nicholas Riasanovsky, pp. 11–18, Russia before the Russians, ISBN 0-19-515394-4 . Retrieved 4 June 2006. - The Sarmatians: 600 BC-AD 450 (Men-at-Arms) by Richard Brzezinski and Gerry Embleton, Aug 19, 2002 - "Jeannine Davis-Kimball, Archaeologist" — Thirteen WNET New York. . Retrieved 4 June 2006. - "Report for Talysh" — Ethnologue. Retrieved 4 June 2006. - "Report for Tats" — Ethnologue. . Retrieved 4 June 2006. - "Report for Judeo-Tats" — Ethnologue. . Retrieved 4 June 2006. - The Prophet and the Age of the Caliphates by Hugh Kennedy, ISBN 0-582-40525-4 (retrieved 04 June 2006), p. 135 - Minorsky, V.; Minorsky, V. "(Azarbaijan). Encyclopaedia of Islam. Edited by: P. Bearman, Th. Bianquis, C. E. Bosworth, E. van Donzel and W. P. Heinrichs. Brill - R. N. Frye. "People of Iran". Encyclopedia Iranica. - X.D. Planhol. "Lands of Iran". Encyclopedia Iranica. - The Columbia Encyclopedia: Azerbaijan[dead link] - "Who are the Azeris? by Aylinah Jurabchi". The Iranian. Retrieved 2009-06-21. - Askarov, A. & B.Ahmadov, O'zbek Xalqning Kilib Chiqishi Torixi. O'zbekiston Ovozi, 20 January 1994. - pronounced approximately say-kay - Kilwa chronicle - Tanzania Ethnic Groups, East Africa Living Encyclopedia, accessed 28 June 2010 - Gordon, Raymond G., Jr. (ed.) (2005). "Report for Iranian languages". Ethnologue: Languages of the World (Fifteenth ed.) (Dallas: SIL International). - Hamzehʼee, M. Reza. The Yaresan: a sociological, historical and religio-historical study of a Kurdish community, 1990. - In Search of the Indo-Europeans, by J.P. Mallory, p. 112–127, ISBN 0-500-27616-1 . Retrieved 10 June 2006. - "Pakistan — Baloch" — Library of Congress Country Studies . Retrieved 4 June 2006. - "History of Iran-Chapter 2 Indo-Europeans and Indo-Iranians" — Iranologie . Retrieved 4 June 2006. - Turko-Persia in Historical Perspective, edited by Robert Canfield, ISBN 0-521-52291-9 . Retrieved 4 June 2006. - "Azerbaijan-Iran Relations: Challenges and Prospects" — Harvard University, Belfer Center, Caspian Studies Program . Retrieved 4 June 2006. - "Cambridge Genetic Study of Iran" — ISNA (Iranian Students News Agency), 06-12-2006, news-code: 8503-06068 . Retrieved 9 June 2006. - t [M. Regueiro et al. (2006), "Iran: Tricontinental Nexus for Y-Chromosome Driven Migration"] - Y haplogroup J in Iran by Alfred A. Aburto Jr. http://archiver.rootsweb.ancestry.com/th/read/GENEALOGY-DNA/2006-06/1151592332 - Nasidze, E. Y. S. Ling, D. Quinque et al., "Mitochondrial DNA and Y-Chromosome Variation in the Caucasus," Annals of Human Genetics (2004) 68,205–221. http://www.eva.mpg.de/genetics/pdf/Caucasus_big_paper.pdf http://www3.interscience.wiley.com/cgi-bin/fulltext/118745631/PDFSTART - R. Spencer Wells et al., "The Eurasian Heartland: A continental perspective on Y-chromosome diversity," PNAS (August 28, 2001), vol. 98, no. 18. - Qamar, Raheel; Ayub, Qasim; Mohyuddin, Aisha; Helgason, Agnar; Mazhar, Kehkashan; Mansoor, Atika; Zerjal, Tatiana; Tyler-Smith, Chris et al. (2002). "Y-Chromosomal DNA Variation in Pakistan". The American Journal of Human Genetics 70 (5): 1107–24. doi:10.1086/339929. PMC 447589. PMID 11898125. - Sengupta, 2006. Polarity and Temporality of High-Resolution Y-Chromosome Distributions in India Identify Both Indigenous and Exogenous Expansions and Reveal Minor Genetic Influence of Central Asian Pastoralists http://hpgl.stanford.edu/publications/AJHG_2006_v78_p202-221.pdf - Sengupta, S; Zhivotovsky, LA; King, R; Mehdi, SQ; Edmonds, CA; Chow, CE; Lin, AA; Mitra, M et al. (2006). "Polarity and temporality of high-resolution y-chromosome distributions in India identify both indigenous and exogenous expansions and reveal minor genetic influence of Central Asian pastoralists". American journal of human genetics 78 (2): 202–21. doi:10.1086/499411. PMC 1380230. PMID 16400607. - "Where West Meets East: The Complex mtDNA Landscape of the Southwest and Central Asian Corridor" — University of Chicago, American Journal of Human Genetics . Retrieved 4 June 2006.[dead link] - Iran: tricontinental nexus for Y-chromosome driven migration – Regueiro M, Cadenas AM, Gayden T, Underhill PA, Herrera RJ, Department of Biological Sciences, Florida International University, University Park, OE 304, Miami, FL 33199, USA, National Center for Biotechnology Information - "Maziar Ashrafian Bonab"[dead link] — Department of Genetics, University of Cambridge . Retrieved 9 June 2006. Archived June 18, 2006 at the Wayback Machine[dead link] - S. Farjadian1, A. Ghaderi (December 2007). "HLA class II similarities in Iranian Kurds and Azeris". International Journal of Immunogenetics 34 (6): 457–463. doi:10.1111/j.1744-313X.2007.00723.x. PMID 18001303. - Encyclopædia Britannica: Iranian languages - People of Iran - The Changing Face of Iran a photo essay by Newsweek Magazine - Maps and demographic information on all the people groups of Iran found at www.EveryTongue.com/iran
<urn:uuid:f1e20439-a5f1-4caa-8e16-0baa90729efb>
CC-MAIN-2013-20
http://en.wikipedia.org/wiki/Iranian_people
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.894016
11,294
3.375
3
If we consider only the relative strength of the adversaries, the power of their weapons, the virulence of their poisons and their different modes of action, the scale would very often be weighted in favour of the Spider. Since the Pompilus always emerges victorious from this contest, which appears to be full of peril for her, she must have a special method, of which I would fain learn the secret. In our part of the country, the most powerful and courageous Spider- huntress is the Ringed Pompilus (Calicurgus annulatus, FAB.), clad in black and yellow. She stands high on her legs; and her wings have black tips, the rest being yellow, as though exposed to smoke, like a bloater. Her size is about that of the Hornet (Vespa crabro). She is rare. I see three or four of her in the course of the year; and I never fail to halt in the presence of the proud insect, rapidly striding through the dust of the fields when the dog-days arrive. Its audacious air, its uncouth gait, its war-like bearing long made me suspect that to obtain its prey it had to make some impossible, terrible, unspeakable capture. And my guess was correct. By dint of waiting and watching I beheld that victim; I saw it in the huntress' mandibles. It is the Black-bellied Tarantula, the terrible Spider who slays a Carpenter-bee or a Bumble-bee outright with one stroke of her weapon; the Spider who kills a Sparrow or a Mole; the formidable creature whose bite would perhaps not be without danger to ourselves. Yes, this is the bill of fare which the proud Pompilus provides for her larva.
<urn:uuid:1968a5b7-5f7c-40f6-a2b0-e993815856ab>
CC-MAIN-2013-20
http://manybooks.net/titles/fabrejeaetext02mhtgw10.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.967487
365
2.734375
3
In the book, Eight Great Ideas, I talk about using music for management. TV theme songs can be used quite effectively to either initiate a procedure or time a transition. However, music is much more than just a management tool. Playing music for your students can really improve the climate of your classroom. I've been playing music off and on as my students work on something and cannot believe the effect it's had: they're calm and quiet. Talk about music soothing the savage beast. high school teacher But what kind of music should you play? Here's some info from the book College Smarts. For over 30 years, researchers have known that Baroque music (especially slow movements where there are 60 beats per minute), accelerates learning, and enhances both short-term and long-term memory. What, exactly, are the physiological effects of slow Baroque music on learners? Researchers have found that blood pressure lowers; heartbeat slows to a healthy rhythm; fast, beta brain waves decrease by 6%, while alpha waves of relaxation increase by an average of 6%; the right and left hemispheres of the brain become synchronized. The music produces a powerful form of alert relaxation, a state in which the body functions more efficiently on less energy, making more energy available for the brain. Some "slow movement" Baroque music: * Adagio in G Minor for Strings * Largo from Harpsichord Concerto in F Minor, BWV 1056 * Largo from Harpsichord Concerto in C Major, BWV 975 * Air for the G String * Largo from Concerto No.10 in F Major from Twelve Concerti Grossi, Op. 5 * Largo from Concerto in D Major for Guitar and Strings * Largo from Concerto in C Major for Mandolin, Strings and Harpsichord * Largo from "Winter" from The Four Seasons * Canon in D The efficacy of baroque music notwithstanding, my thought is that any music is better than no music. (That's assuming, of course, that the music being played is appropriate for students.) But choosing music can sometimes lead to problems, the main one being students complaining about the music being played. Really now, who wants to hear some version of, "I don't like that music. Play something else." Helpful: The use of an overhead spinner will eliminate most of the complaining. (I say most because some students like to complain just for the sake of complaining.) Check out the other links in the nav bar to the right for more suggestions on how you can incorporate music into your own classroom. And if you come up with any new ideas, let me know. I'll add them to Music Central.
<urn:uuid:8bdcca19-ea76-4db6-8e34-241b0a84fd7a>
CC-MAIN-2013-20
http://newmanagement.com/music/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.937159
580
2.765625
3
You know how when someone compares dealing with their dog to dealing with a baby and all the parents in the room give them the stink eye? Well, the comparison might hold water. According to a study by the Hungarian Academy of Sciences, published in the journal Current Biology, when people talk to their dogs, the reaction of the pup is similar to that of a baby. József Topál, of the Hungarian Academy of Sciences, told U.K.'s The Telegraph that increasing evidence shows that humans and dogs share social skills -- and that the cognitive function of dogs resembles babies ranging from six months to two years old. The researcher also told the paper that dogs appear to react to eye contact -- as do babies. During the study, researchers presented dogs with video recordings of a person turning toward one of two identical plastic pots while an eye tracker captured information on the dogs' reactions, The Telegraph reported. In one instance, the person looked directly at the dog, addressing it in a high-pitched voice, saying "Hi dog!" Next, someone, speaking low and avoiding eye contact, said, "Hi dog." The upshot? Dogs were more inclined to follow the person and look at the pot when the person was more engaging. "Our findings reveal that dogs are receptive to human communication in a manner that was previously attributed only to human infants," Topál told The Telegraph. This probably makes a lot of sense to anyone with a dog.
<urn:uuid:bc901f04-df63-42e6-b387-ea298fa164d2>
CC-MAIN-2013-20
http://www.radiomichiana.com/wsbtam/lifestyle/bal-dogs-and-kids-not-all-that-different-study-finds-20120106,0,5804411.story
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.964747
303
2.984375
3
Viewed laterally the vertebral column presents several curves, which correspond to the different regions of the column, and are called cervical, thoracic, lumbar, and pelvic. The cervical curve, convex forward, begins at the apex of the odontoid (tooth-like) process, and ends at the middle of the second thoracic vertebra; it is the least marked of all the curves. The thoracic curve, concave forward, begins at the middle of the second and ends at the middle of the twelfth thoracic vertebra. Its most prominent point behind corresponds to the spinous process of the seventh thoracic vertebra. This curve is known as a kyphotic curve. lumbar curve is more marked in the female than in the male; it begins at the middle of the last thoracic vertebra, and ends at the sacrovertebral angle. It is convex anteriorly, the convexity of the lower three vertebrae being much greater than that of the upper two. This curve is described as a lordotic curve. The pelvic curve begins at the sacrovertebral articulation, and ends at the point of the coccyx; its concavity is directed downward and forward. The thoracic and pelvic curves are termed primary curves, because they alone are present during fetal life. In the early embryo, the vertebral column is C-shaped, and the cervical and lumbar curvatures are not yet present in a newborn infant. The cervical and lumbar curves are compensatory or secondary, and are developed after birth, the former when the child is able to hold up its head (at three or four months), and to sit upright (at nine months), the latter at twelve or eighteen months, when the child begins to walk. The thoracic portion of the vertebral column also has a slight lateral curvature, the convexity of which is directed toward the right side. This may be produced by muscular action, most persons using the right arm in preference to the left, especially in making long-continued efforts, when the body is curved to the right side. In support of this explanation it has been found that in one or two individuals who were left-handed, the convexity was to the left side. This curvature is regarded by others as being produced by the aortic arch and upper part of the descending thoracic aorta – a view which is supported by the fact that in cases of situs inversus where the viscera are transposed and the aorta is on the right side, the convexity of the curve is directed to the left regions (curvatures) of the vertebral column and names of individual vertebrae. The vertebral column seen from
<urn:uuid:26e2328e-737a-42b6-8622-fec9e742b0f2>
CC-MAIN-2013-20
http://www.salamachiropractic.com/vertebrae.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00007-ip-10-60-113-184.ec2.internal.warc.gz
en
0.941198
645
3.78125
4