text
stringlengths 181
622k
| id
stringlengths 47
47
| dump
stringclasses 95
values | url
stringlengths 14
7.09k
| file_path
stringlengths 110
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 47
136k
| score
float64 2.52
5.09
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
As early as the 1860s, people were learning how to make and use plastics. Due to its flexibility when warm and ability to hold a shape when cool, plastic made it easier to create new products. Unfortunately, it was difficult to produce affordable, quality plastics that did not warp or break.
As manufacturers experimented with plastic polymers, small items became easier to produce in greater quantities. But it wasn't until the 1940s, when demand for large amounts of inexpensive, mass-produced plastics rose, that the injection mold manufacturing industry really took off.
Injection mold manufacturing is a way to mass-produce products and product components for many different industries. Today, many mass-produced plastics are made using this process. Common examples of plastic products that the everyday consumer uses include combs and buttons. But more complex items are made too. Everything from vehicle parts to medical devices are often mass-produced using this process.
The idea is simple: Create a mold that can be used again and again to create exact replicas of the desired product. Originally associated with plastics, other materials including metal and glass are now used in this process.
The process is fairly simple as well. After an industrial engineer designs the product, a moldmaker creates a mold based on engineering specifications. The mold itself is usually made of steel or aluminum and attached to a press that holds it in place until the product is set.
To make the actual product, the plastic or other material is heated until it is pliable enough to be forced into the mold. Once in the mold, the press exerts force and holds the molding in place until the product sets and cools. The entire production is so perfectly engineered that there is usually no need to perform any additional work on the piece once it comes out of the mold.
Injection mold manufacturing has resulted in reduced cost in many industries. The ability to mass-produce items using a single design saves companies time and money over making each item or component at an individual level. This method of manufacturing has allowed companies to cut down on wasted materials while producing large amounts of the same item quickly and accurately.
The process has also proven highly useful in the recycling industry. Since the plastics and polymers must be melted down before they can be injected into the cast, used products, rejected parts and excess scrap parts can be melted down and reused in new products.
Although this type of manufacturing has many benefits, it is not suitable for every business. The start-up costs are high and custom-engineered casts are needed for every product that is created. They are best for companies that routinely produce large amounts of the same product over and over again because as production quantities rise, the cost of production per item decreases. For businesses that do not produce items on a large enough scale, the time and labour-saving benefits may not outweigh the costs.
Over 70 years of experience and a strong commitment to innovation.Click Here | <urn:uuid:909a7462-aedc-42a3-b7e9-4aa17fba4cfb> | CC-MAIN-2019-43 | https://www.baytechplastics.com/injection-mold-manufacturing | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986675598.53/warc/CC-MAIN-20191017172920-20191017200420-00465.warc.gz | en | 0.968291 | 596 | 3.828125 | 4 |
Cryptocurrency makes it easier for some individuals to transfer illegally obtained money. The original use of cryptocurrency is to exchange money without the use of a central authority like a bank. For residents of Michigan and other states, this presents more opportunities for using cryptocurrencies to commit money laundering.
The technology of cryptocurrency
Cryptocurrency is a form of technology that involves the virtual transfer and storage of financial information. Digital money is stored in a virtual database, and the financial transactions are secured using cryptography. This type of currency is not available in physical form and is not issued by a bank or government. All of these features make it easier for individuals to engage in money laundering and easily and instantly move illegal funds across country borders.
Rising rates of cryptocurrency crimes
Cryptocurrency is involved in a growing number of white-collar criminal offenses. Bitcoin transactions allow anonymous users to hide the origins of their illegal financial transactions. Hackers can transfer, withdraw and deposit money without leaving a trace of identification. In addition, these fraudulent actions are not regulated by anti-fraud laws and regulations. However, remaining 100% undetected is not possible, and more law enforcement agencies are finding ways to find those who use cryptocurrency for money laundering.
A growing form of internet fraud
People who want to secure their financial transactions often use or consider using cryptocurrency. Internet technology has made it much easier to protect money as it’s being stored or transferred to other countries. By the same token, money launderers have found it easier to hide their identities and origins of their money, so law enforcement agencies are putting forth more efforts to detect illegal online transactions and crimes. | <urn:uuid:49a09bb6-c047-4b91-82cc-543b8b603a3c> | CC-MAIN-2022-40 | https://www.felonydefenseattorney.com/blog/2022/03/cryptocurrency-offers-a-unique-form-of-money-laundering/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337490.6/warc/CC-MAIN-20221004085909-20221004115909-00023.warc.gz | en | 0.940081 | 330 | 2.671875 | 3 |
New Delhi, Feb 27 (IANS) In a bid to make its wearable devices even better at detecting abnormalities in your sleep, wearables giant Fitbit on Thursday announced its Estimated Oxygen Variation Graph, which makes use of the red and infrared sensors on the back of the wearable to estimate the variabilities in users’ blood oxygen levels, is now available for all.
“The graph, which users can see in the Fitbit app under the Sleep tile, approximates the changes in your blood oxygen saturation while you sleep. Blood oxygen saturation measures the percent of your blood that’s saturated with oxygen.
“Typically, it’s at 95-100 per cent, meaning the blood is carrying as much oxygen as it can. If you stop breathing or have other lung issues, the saturation level can fall since less oxygen enters the body. In general, variations should be low and seeing frequent, big variations could be a sign that you may be experiencing breathing disturbances during sleep,” the company said in a statement.
Many people who suffer from sleep apnea do not realise they have the condition.
According to reports, an estimated that 22 million Americans suffer from the disorder, which is actually a struggle to breathe properly while asleep.
Often it presents itself through loud, frequent snoring interspersed with sudden choking as your body tries to get enough oxygen. | <urn:uuid:73df9a0a-b352-4520-aa08-3432fb270057> | CC-MAIN-2023-06 | https://kalingatv.com/technology/fitbits-estimated-oxygen-variation-graph-now-available-for-all/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499541.63/warc/CC-MAIN-20230128090359-20230128120359-00014.warc.gz | en | 0.941325 | 282 | 2.578125 | 3 |
To avoid illnesses and maintain excellent health, the body must have a pH equilibrium. The pH of your body affects whether its fluids are more acidic or alkaline. Your risks of contracting a chronic disease reduce when your body is in an alkaline state. Your chance of developing chronic illnesses, gaining weight, having tooth and gum problems, and experiencing pain and inflammation rises if your body is more frequently in an acidic condition than a neutral one.
Your body is in good health when it has a pH level of 7.0 or above on a scale from negative 4.5 to positive 9.5. The pH of 7.365, which is just barely alkaline, is the equilibrium that your body constantly strives to maintain.
Tip: Your diet should contain 80% alkaline-forming foods and 20% acid-forming foods to achieve a healthy lifestyle balance. | <urn:uuid:9c8aa780-1bf4-41be-994c-bc7c1839419e> | CC-MAIN-2022-40 | https://inspirationandmore.com/wellness/ph-of-food/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334992.20/warc/CC-MAIN-20220927064738-20220927094738-00048.warc.gz | en | 0.923018 | 173 | 3.015625 | 3 |
“Care of stroke patients is complicated, and the evidence is growing rapidly,” explained S. Claiborne Johnston, MD, PhD, principal investigator for the study and a neurologist and director of the Stroke Service at University of California, San Francisco. “It’s difficult for busy clinicians to keep up with proven best practices, and things can fall through the cracks.”
In an effort to increase the use of these treatments, six California hospitals in the study developed standardised forms for use when stroke patients were admitted to and discharged from the hospital. The treatments include: using a clot-busting treatment within three hours of the start of the stroke; preventive treatment for blood clots in the leg veins; drugs that prevent blood clots from forming within 48 hours of arrival at the hospital and at discharge; cholesterol-lowering drugs at discharge; and smoking cessation counselling.
If the treatment was not used, the forms included boxes to check for acceptable reasons for not using the treatment, such as not using a clot-busting drug for a patient who arrived at the hospital more than three hours after the first symptoms or not using cholesterol-lowering drugs for a patient who already had low cholesterol.
The treatment stroke patients received in the year after the new forms were implemented was compared to the treatment they received in the year before the forms were implemented. During that time, 413 patients were treated in the six hospitals.
Overall, patients were more likely to receive optimal treatment after the forms were implemented than before. Optimal treatment was defined as receiving all of the recommended treatments unless there was an appropriate reason not to receive a treatment.
After the forms were implemented, 63 percent of patients received optimal treatment. In the year before the forms were implemented, 44 percent of patients received optimal treatment.
MEDICA.de; Source: American Academy of Neurology (AAN) | <urn:uuid:615e487c-6406-4573-a775-421ac6fca4ac> | CC-MAIN-2017-22 | https://www.medica-tradefair.com/cgi-bin/md_medica/lib/pub/tt.cgi/Using_Simple_Forms_Can_Improve_Stroke_Care.html?oid=16125&lang=2&ticket=g_u_e_s_t | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463612502.45/warc/CC-MAIN-20170529165246-20170529185246-00365.warc.gz | en | 0.978741 | 385 | 2.6875 | 3 |
6 Ways Christians Can Fight the 'Cultural Marxism' on College Campuses
4. Christianity provides a basis for rationality.
The goodness of Christianity does not stop at charity, however. Miller explained that "God serves as the basis even for rationality."
"In the Incarnation you have both the emphasis for compassion and you have the logos," the Ratio Christi president said, citing the ancient Greek word which the Gospel of John identified with Jesus Christ. Famously, in the opening of his Gospel, John wrote that "In the beginning was the word, and the word was with God, and the word was God." The word for "word" is logos, and it means idea, concept, speech. It is the basis for the English word "logic," and for scientific disciplines like "psychology."
The identification of Jesus Christ as logos has its roots in Genesis 1, where God created the world through speech. It also emphasizes a connection between the mind that created the universe and the minds of human beings, a connection that derives from the idea of man made in God's image. "Rationality itself is grounded in God, and what distinguishes human beings from other animals is having that rational capacity," Miller explained.
Christianity emphasizes the value of logic and reason by providing an explanation for the miracle of science: Somehow, the human mind is capable of understanding the order behind nature. If human beings and their rational capacity only developed by chance in evolution and natural selection, there is no reason to assume that their minds were wired for truth.
But if Christianity is true, people were made in the image of the very God whose words formed the universe. Their minds are made not merely for survival, but for a connection with ultimate reality.
5. Christianity and science.
This Christian view of rationality also helps believers navigate the complex realm of faith and science. As Miller argued, "from a Christian perspective, science is a very good thing."
The Ratio Christi president noted that "in the history of science most of the major subdisciplines were founded by Christians," such as Gregor Mendel (father of modern genetics), Robert Boyle (chemistry), Isaac Newton (physics), and Johannes Kepler (astronomy).
"It's not that science has been opposed to Christianity; It's the Christian theistic worldview that gave rise to science because we have a worldview that involves a Creator creating an intelligible creation with intelligent beings with rational capacity that have sense perceptions that can attach to the natural world," Miller said.
Many think that Christianity and science are incompatible, but "the problem is not Christianity and science, the problem is Christianity and scientism." Miller described scientism as "a philosophy of science that tends to assume a worldview of naturalism," a worldview that is incompatible with Christianity.
"Some of what passes as science is not even science — it's a certain philosophy of science," the Ratio Christi president explained.
"Whenever there is an alleged discrepancy between science and Christianity, it's really not a discrepancy about the facts themselves ... it's about the interpretation of the facts from a theologian and a scientist," Miller argued. He quoted Francis Bacon, who said that if God exists, "He has two books, his word and his world, scripture and nature. When those two are properly interpreted, there can be no contradiction."
Next Page: Tying it all together — How we unite Christianity and ideas. | <urn:uuid:38d020b1-a920-4ac2-be0c-9646e366a050> | CC-MAIN-2020-05 | https://pjmedia.com/faith/2016/10/06/6-ways-christians-can-fight-the-cultural-marxism-on-college-campuses/3/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250607118.51/warc/CC-MAIN-20200122131612-20200122160612-00332.warc.gz | en | 0.967572 | 699 | 2.65625 | 3 |
Coastal areas are in a time of great change. Populations are growing, development and economic activities are expanding, and sea levels are rising as the climate shifts. As a result, the management of coastal natural resources and ecosystems is becoming more complex, even as the need for solutions to problems becomes more urgent. The decisions we make—and the actions we take—today will shape the future of our coasts, and their ability to support us, for generations. Involving natural resources and places that matter to all of us, these decisions are everyone’s business. Reserves work to engage all citizens—from “K to Gray”—in exploring, understanding, and supporting coastal environments through citizen outreach, volunteer initiatives, professional training, and educational programs.
Why it matters
All of us are impacted by the changes occurring in coastal areas, and by the decisions made by policymakers, resource managers, and communities. As these decisions become increasingly complex and politicized, it can be difficult to identify the best way forward. To protect these environments and the services they provide that matter most to us, we not only need relevant, science-based information, we also need to feel our connection to the coast so we can see firsthand how we are both part of the problem and the solution. Finding this connection is becoming more challenging as natural areas shrink and degrade, technology distracts, the pace of life quickens, and our access to outdoor experiences becomes limited. In this time of accelerating change and increasing disconnection from the natural world, we all benefit from opportunities to enjoy time in coastal and estuarine environments, to learn about how these places function, discover how they support us, and get involved in managing and protecting them for the future.
How we help
Reserves provide opportunities and resources for everyone to enjoy coastal and estuarine environments, understand how they work, and get involved in protecting these special places for the future.
- Inspiring and informing the next generation: Reserves host activities and events through which students and teachers can visit their local estuaries and participate in scientific research. Through reserve-based programs, students receive hands-on learning in how coastal ecosystems function, participate in environmental monitoring projects, and become familiar with the plants and wildlife that call estuaries “home.” More than 80,000 students benefit from reserve-based education programs each year. Reserves also develop K through 12 curricula focused on coastal and estuarine environments that teachers nationwide can use in their classes. Explore: Teachers on the estuary = climate science in the classroom
- Building community capacity to make decisions: Each reserve manages a coastal training program that provides locally relevant resources to inform coastal resource management professionals about new techniques, data, and trends in their fields. Each year, more than 60,000 coastal professionals benefit from reserve-based trainings and workshops, offsetting millions of dollars in training costs nationwide. Through collaborative research projects, reserves also conduct stakeholder-driven research designed to target and fill local obstacles and information gaps. Reserves also provide lecture series and other educational programs to local residents, where they can learn about a variety of topics related to protecting coasts and estuaries. Explore: Balancing freshwater needs in Texas
- Engaging everyone in solutions: Engaging volunteers from local communities enables reserves to leverage existing resources to enhance the impact of their research and restoration work. Community members actively help protect their local estuaries by participating in reserve-based restoration projects, monitoring efforts, and scientific research. From counting American eels and analyzing water samples to pulling invasive plants and constructing oyster reefs, citizen scientists contribute to the preservation of the vital benefits that estuaries provide. Explore: Volunteer-based oyster restoration in South Carolina
- Creating memorable experiences: Visitor centers at each reserve welcome everyone to discover the sights, smells, and sounds of coastal and estuarine ecosystems. At many reserves you can hike, kayak, canoe, go fishing, and observe wildlife, on your own or through guided events. Reserves are places for everyone to enjoy being outdoors, getting fresh air and exercise, and creating memories with family and friends.
What you can do
Interested in learning about your local estuary or getting involved in research and conservation projects? Here’s where you can start…
- Visit: Bring family and friends to your local reserve to explore trails, kayak or canoe, and observe wildlife.
- Learn more: Find out the key issues and challenges your community is facing and what resources are available to help tackle them. Your local reserve is a great first stop to learn more about the issues and solutions.
- Get involved: Participate in a reserve-based citizen-science project, educational event, or another volunteer opportunity.
- Give: Consider a contribution to your local reserve to support education, volunteering, and training opportunities. | <urn:uuid:dfed285c-8ec2-4a1a-b878-612c0d71ad55> | CC-MAIN-2017-13 | http://www.nerra.org/what-we-work-for/informed-citizens-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190753.92/warc/CC-MAIN-20170322212950-00512-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.947485 | 988 | 3.5 | 4 |
Web-based tool supports sustainable living choicesPublished On: Sun, Feb 27th, 2011 | Environment | By BioNews
Those who want to live sustainably can now measure their impact on the environment. Scientists have created a Web-based tool that calculates an individual’s ‘nitrogen footprint.’
The device was developed by University of Virginia environmental scientist James N. Galloway; Allison Leach, a staff research assistant at U.Va.; and colleagues from the Netherlands and the University of Maryland.
The calculator is a project of the International Nitrogen Initiative, a global network of scientists who share research and data on the nitrogen dilemma.
Galloway, a pioneering nitrogen scientist, organized a global team of experts to develop the footprint calculator as an educational tool – one he and his colleagues hope will both raise the profile of the nitrogen issue and galvanize people into action.
By measuring what and how much you eat, as well as other factors like how you travel, the calculator shows your impact on the nitrogen cycle.
The website also makes recommendations for how to lessen your “nitrogen footprint.” They are similar to other sustainable living choices: reduce airplane travel, choose renewable energy and eat less meat, particularly beef (since cattle consume massive quantities of farmed feed, which requires much fertilizer). Professors and lecturers are already using the tool in classrooms to teach students how one individual can alter – and help restore – a natural nitrogen cycle.
“Solving the nitrogen dilemma is a major challenge of our time,” Leach said. “By calculating our individual impact, and taking small steps to reduce it, we can all play a part – and send a strong message to our nation”s leaders that we want this issue taken seriously.”
This new footprint calculator is the first in a series of research tools, known as N-Print, which Galloway and his team are developing to connect the production of nitrogen with the policies used to manage it. The team is currently creating a similar calculator for farmers and other nitrogen users, as well as a tool for policymakers that will provide regional nitrogen emission ceilings, which will show how much nitrogen can be released in these regions without major negative environmental impact.
“There are readily available solutions to reducing nitrogen pollution,” Galloway said. “By connecting consumers, producers and policymakers, we can solve it.”
The project was announced Feb. 19 at the annual meeting of the American Association for the Advancement of Science in Washington. (ANI) | <urn:uuid:0f1d2cee-775f-4a1d-b9c1-eae9e2369c9a> | CC-MAIN-2014-42 | http://news.bioscholar.com/2011/02/web-based-tool-supports-sustainable-living-choices.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507452492.48/warc/CC-MAIN-20141017005732-00226-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.950312 | 521 | 3.546875 | 4 |
IBM Standard Modular System
|This article needs additional citations for verification. (May 2010) (Learn how and when to remove this template message)|
The Standard Modular System (SMS) was a system of standard transistorized circuit boards and mounting racks developed by IBM in the late 1950s, originally for the IBM 7030 Stretch. They were used throughout IBM's second generation computers, peripherals, the 7000 series, the 1400 series, and the 1620. SMS was superseded by Solid Logic Technology (SLT) introduced with System/360 in 1964, however they remained in use with legacy systems through the 1970s.
Many IBM peripheral devices that were part of System/360, but were adapted from second-generation designs, continued to use SMS circuitry instead of the newer SLT. These included the 240x-series tape drives and controllers, the 2540 card reader/punch and 1403N1 printer, and the 2821 Integrated Control Unit for the 1403 and 2540. A few SMS cards used in System/360 peripheral devices even had SLT-type hybrid ICs mounted on them.
SMS cards were constructed of individual discrete components mounted on single-sided paper-epoxy printed circuit boards. Single-width cards were 2.5 inches wide by 4.5 inches tall by 0.056 inches thick, with a 16-pin gold plated edge connector. Double width cards were 5.375 inches wide by 4.5 inches tall, with two 16-pin gold plated edge connectors. Contacts were labeled A–R (skipping I and O) on the first edge connector, and S–Z, 1–8 on the second.
The cards were plugged into a card-cage back-plane and edge connector contacts connected to wire wrap pins. All interconnections were made with wire-wrapped connections, except for power bus lines. The back-plane wire-wrap connections were mostly made at the factory with automated equipment, but the wire-wrap technology facilitated field-installation of engineering changes by customer engineers.
Some card types could be customized via a "program cap" (a double rail metal jumper bar with 15 connections) that could be cut to change the circuit configuration. Card types with a "program cap" came with it precut for the standard configuration and if a customer engineer needed a different configuration in the field he could make additional cuts as needed. This feature was intended to reduce the number of different card types a customer engineer had to carry with him to the customer's site.
The card type was a two to four letter code embossed on the card (e.g., MX, ALQ). If the card had a "program cap" the code was split into a two letter card type code and a two letter "cap connection" code (e.g., AK ZZ).
When SMS was originally developed, IBM anticipated a set of a couple hundred standard card types would be all that would be needed, making design, manufacture and servicing simpler. Unfortunately that proved far too optimistic as the number of different SMS card types soon grew to well over 2500. Part of the reason for the growth was that multiple digital logic families were implemented (ECL, RTL, DTL, etc.) as well as analog circuits, to meet the requirements of the many different systems the cards were used in.
Another 1401 SMS card, this one with power transistors. It was used to drive print hammers on an IBM 1403 line printer.
- Boyer, Chuck (April 2004). "The 360 Revolution" (PDF). IBM. p. 18. Retrieved 25 November 2013. | <urn:uuid:717e89e6-54e6-4eb5-9b59-576170139dcf> | CC-MAIN-2017-39 | https://en.wikipedia.org/wiki/Standard_Modular_System | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689686.40/warc/CC-MAIN-20170923141947-20170923161947-00638.warc.gz | en | 0.96957 | 749 | 3.09375 | 3 |
Pork has a notorious reputation for being dry, tough, overly fatty, and unsafe to eat unless cooked to very high internal temperatures. We’ve listed 8 things you didn’t know about cooking pork, to get deliciously juicy and flavorful pork back on your weekly dinner menu!
1. Some Pork is as Lean as a Skinless Chicken Breast
It is a common belief that pork is a fatty meat. This simply is not true for all cuts of pork. In fact, pork tenderloin is now as lean as a skinless chicken breast. In the image to the right, you can see the difference in fat content between the pork chops, chicken breast, and steak. On average, today’s pork is about 16% leaner than it was 25 years ago, and saturated fat has dropped by 27%.
2. Safely Cook Pork at a Lower Temp Than You Might Think!
The current USDA recommended temperature for pork is a significant 15°F (8°C) less than what was previously recommended just a few years ago (160°F [71°C] with no rest). The 145°F (63°C) recommended internal temperature—followed by a recommended 3 minute rest—applies to whole-muscle cuts such as loin, chops and roasts. (As with all ground meat, sausages and ground pork should be cooked to the recommended temperature of 160° F [71°C].)
3. Pork Doesn’t Have to be Dry to be Safe
It only takes one past experience with unsafe meat to become apprehensive about eating undercooked pork in the future. Fear is the number one reason we overcook pork. As Bruce Aidells explains, “…if you’re worried about trichinosis, fear not: The spores are killed when pork reaches 138°F (59°C) and is held there for just a few minutes.”
4. Pink Pork is Safe to Eat
Cooking pork at the USDA recommended temperature of 145°F (63°C) will typically yield a finished product that is pinker than what most home cooks are accustomed to. Doneness cannot be accurately determined by color. Internal temperature measurement using a thermometer is the only way to know if the meat is safe to eat.
5. Pork Can Be Juicy…Really!
Research performed by the National Pork Board has found that most at-home cooks have a tendency to overcook common cuts of pork, resulting in tough, dry cuts of meat. The new guidelines will help alleviate some of the stigma associated with undercooked pork and help people enjoy this “other white meat” at its most flavorful, juicy–and safe–temperature.
6. Use a Digital Thermometer!
The number one, safest way to cook pork is by internally monitoring the temperature using a digital cooking thermometer to ensure an accurate final temperature. An instant read thermometer like the ThermPop® is an excellent tool to have. It gives you an accurate temperature reading in 5-6 seconds wherever you insert the tip. When compared to a dial thermometer that only gives an average reading.
7. Pork Continues To Cook When Taken Off Heat
Depending on the cut of meat, cooking method, and thickness, it can increase 5-10° in the center after being removed from heat. This carryover cooking happens when latent heat in the outer edges of the meat continues moving toward the center (lowest temperature area) after being removed from the heat source. Knowing this, it’s important to pull your pork from the heat source before it reaches the desired doneness temperature. Meats prepared with high heat cooking methods will see a greater carryover cooking factor than those cooked with a low-temperature method. Smaller cuts of meat will have a less significant increase in temperature than will larger roasts.
The length of the rest time is directly proportional to the size of the cut of meat. See the table below:
This is another reason why owning an instant-read ThermPop® can come in handy–you will know exactly when to take it off and factor in carry over time.
8. Cooking Pork Can Be Quick, Simple and Creative!
Pork can be cooked in as little as 30 minutes and still have delicious flavor! Other recipes may take 30 minutes to prep and 6 hours to cook, but it is still simple to prepare. (Low and slow cooking is the only way to transform tough pork shoulder into succulent pulled pork.)
Don’t be afraid to play around with different recipes and applications for pork in your cooking. Try using it for festive Pork Carnitas, juicy Grilled Pork Chops, or add new flavor to pork chops with this Canadian Maple Syrup Glaze.
When cooking pork, it only takes a matter of a few degrees before pork goes from tender and succulent to being fibrous and completely bereft of moisture. With the right temperature tools and so many different recipe options for pork, your family can be enjoying something new and delicious every week. | <urn:uuid:b7e819ea-1201-478a-a2dd-43c26f0c4cc0> | CC-MAIN-2017-13 | http://blog2.thermoworks.com/2016/06/8-things-you-didnt-about-cooking-pork/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188623.98/warc/CC-MAIN-20170322212948-00084-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.939185 | 1,045 | 2.734375 | 3 |
Balanoplis serrata Raf.
Castanea fauriei H.Lév. & Vaniot
Castanopsis thunbergii (Makino) Hatus.
Lithocarpus cuspidatus (Thunb.) Nakai
Lithocarpus sieboldii Nakai
Pasania cuspidata (Thunb.) Oerst.
Pasania sieboldii pusilla (Blume) Makino
Pasania sieboldii rotundifolia (Makino) Makino
Pasaniopsis cuspidata (Thunb.) Kudô
Pasaniopsis sieboldii pusilla (Blume) Makino
Pasaniopsis sieboldii rotundifolia (Makino) Makino
Quercus cuspidata Thunb.
Shiia cuspidata (Thunb.) Makino
Shiia cuspidata muratae Yanagita
Synaedrys cuspidata (Thunb.) Koidz.
Common Name: Japanese Chinquapin
Castanopsis cuspidata is an evergreen tree that can grow up to 25 metres tall. The straight, cylindrical bole can be 60 - 70cm in diameter.
The tree is harvested from the wild for local use as a food, and probably also for its wood. It is sometimes grown as an ornamental, where it can also be used to provide shade and shelter[
Castanopsis cuspidata is widespread and a late successional tree often forming part of the climax vegetation in laurel forests. In some areas of Japan the species is showing an increase in range while in others its habitat, and thus the species range, is experiencing decline as a result of human exploitation. The scale of this threat is not known at present but it is not expected to cause decline in the habitat to the extent that the species would fall into a
threatened category in the next 100 years. The plant is classified as 'Least Concern' in the IUCN Red List of Threatened Species(2018)[
E. Asia - central and southern Japan, Korea.
Woods and ravines, especially near the sea in western China[
]. Temperate, broad-leaved evergreen forests, also found in disturbed, primary and secondary forests and often co-dominant to dominant in laurel forests[
|Conservation Status||Least Concern
|Other Uses Rating||
|Cultivation Status||Ornamental, Wild
Castanopsis species are generally found in subtropical and tropical climates, those species that can tolerate colder winters generally also require hot summers. Thus hardy members of this genus tend to grow well in Mediterranean climates and in warm continental climates with mild winters - although frost tolerant, they often do not thrive in more maritime climates with their cooler summers, even if the winters are mild. This species is possibly the hardiest member of the genus and can tolerate occasional temperatures falling to around -15°c when dormant.
Prefers a good deep medium to stiff loam[
]. Requires a sheltered position in semi-shade and a lime-free soil[
The catkins have an unpleasant hawthorn-like smell to attract midges for their pollination[
The seeds take two growing seasons to reach maturity[
Seed - cooked[
]. The cotyledon of the nut is eaten boiled or roasted[
This species can be used for revegetation of native woodlands[
The wood can be used for making charcoal and for pulp[
We have no further specific information on the properties of this wood, but the following is a general description of the wood of Castanopsis species:-
The heartwood is a light yellowish brown, grayish brown, or dark brown, varying with species; it is sometimes sharply demarcated from the yellowish, light brown sapwood. The texture is mostly rather coarse; the grain is fairly straight to interlocked; may be lustrous when first cut; there is no distinctive odour or taste when dry. It is generally reported to season well, timbers tend to end split if the pith is boxed. It is mostly reported as being easy to work and saw; takes a good finish; easy to split. It is not very durable, being susceptible to attack by decay fungi and termites. It is used for general construction work under cover, furniture components; some species that are easy to split are used for shingles[
Seed - requires a period of cold stratification and is best sown as soon as it is ripe in a cold frame[
]. The seed has a short viability and should not be allowed to dry out. It can be stored for a few months if kept cool and moist (putting it in a plastic bag that is placed in the salad compartment of a fridge works well). Stored seed should be soaked in warm water for 24 - 48 hours prior to sowing[
]. Germination usually takes place within 1 - 3 months at 15°c[
]. As soon as they are large enough to handle, prick out the seedlings into individual pots and plant them out in mid summer if possible, otherwise grow them on in a cold frame for their first winter and plant them out in late spring. Give the young plants some protection from cold for their first few winters outdoors. | <urn:uuid:dbc53b65-2e72-4d2b-a19c-f1e3d0743cd3> | CC-MAIN-2023-06 | https://temperate.theferns.info/plant/Castanopsis+cuspidata | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500044.16/warc/CC-MAIN-20230203055519-20230203085519-00718.warc.gz | en | 0.893744 | 1,272 | 2.703125 | 3 |
The sabretache is derived from a traditional Hungarian horseman's flat leather bag called a tarsoly. Early examples have been found the tombs of Magyar warriors from the 10th century Conquest of Pannonia. They were often strengthened and decorated with silver plates and would have contained fire-making tools and other essentials.
In the early 18th century, hussar cavalry became popular amongst the European powers, and a tarsoly was often a part of the accoutrements. The German name sabretache was adopted, tache meaning "pocket". It fulfilled the function of a pocket, which were absent from the tight fitting uniform of the hussar style. Part of the wartime function of the light cavalry was to deliver orders and dispatches; the sabertache was well suited to hold these. The large front flap was usually heavily embroidered with a royal cypher or regimental crest, and could be used as a firm surface for writing. By the 19th century, other types of cavalry, such as lancers, also wore them.
In the British Army, sabretaches were first adopted at the end of the 18th century by light dragoon regiments, four of which acquired "hussar" status in 1805. They were still being worn in combat by British cavalry during the Crimean War; "undress" versions in plain black patent leather were used on active duty. The Prussian Guard Hussars wore theirs in the Franco-Prussian War. In most European armies, sabretaches were gradually abandoned for use in the field before the turn of the 20th century, but were retained by some regiments for ceremonial occasions.
- Tarsoly Bearer's Homepage
- András Róna-Tas, Hungarians and Europe in the early Middle Ages: an Introduction to Early Hungarian History, Central European University Press 1999, ISBN 963-9116-48-3 (P.136)
- Canadian Military History Gateway: Royal Staff Corps officer's sabretache, circa 1820
- Sabretaches by Lt. Colonel J. B. R. Nicholson
- Prebben Kannik, Military Uniforms in Colour, Blandford Press 1968 ISBN 0-7137-0482-9 (p.200)
- J. B. R. Nicholson, The British Army of the Crimea, Osprey Publishing Ltd 1974, ISBN 0-85045-194-9 (p.15)
- Michael Solka and Darko Pavlović, German Armies 1870-71 (1): Prussia, Osprey Publishing Ltd 2004, ISBN 1-84176-754-9 (p.20)
- Nicholson (p.268)
- James Alexander Mackay, An Encyclopedia of Small Antiques, Ward Lock, 1975 (p.164) | <urn:uuid:ddcefe72-01d1-4514-b935-27c14db13eb7> | CC-MAIN-2016-50 | https://en.wikipedia.org/wiki/Sabretache | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541517.94/warc/CC-MAIN-20161202170901-00180-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.939105 | 586 | 3.234375 | 3 |
RnA carries DnA’s instructions.. Which of the following types of RNA carries instructions.
rides and proteins, which carries the genetic message to the ribosomes where the message is translated into a particular protein (see fi gure 2.7). What carries instructions for making proteins from the nucleus into the travel from the nucleus to the cytoplasm with the instructions to make specific proteins..
Copies DNA’s instructions & carries them to the ribosomes where proteins can be made DNA contains the instructions for making proteins but is too large to leave The cell nucleus is the command and control centre of which carries instructions for protein synthesis. Each mRNA carries the instructions to make a
carries the instructions for making a protein from a gene. Transcription of DNA into RNA. DNA carries the instructions for making the proteins that. In the nucleus of the cell you have the DNA; the big archive with all the instructions for the cell including the one to make each protein. mRNA carries these.
“DNA and Chromosomes Molecular Biology of the Cell - NCBI”.
mRNA is the complementary strand of DNA that leaves the nucleus of the cell and binds to the ribosome. The mRNA is what carries the instructions for creating proteins.
9/06/2011В В· List of definitions of the scientific terms used in The New Genetics for making a protein or carries out DNA's instructions for making. Biology Basics What is a Cell? Of (and therefore all of the genetic instructions) that make up the human genome. such proteins make up cartilage,. In the nucleus of the cell you have the DNA; the big archive with all the instructions for the cell including the one to make each protein. mRNA carries these.
Effectively, RNA is the instructions for making proteins. They are generally produced by the DNA, and the proteins are constructed in the ribosomes of the cell. Fact Sheet: DNA-RNA-Protein. Messenger RNA (mRNA) carries the instructions for making proteins. The making of proteins by reading instructions in mRNA is | <urn:uuid:3aaf48d9-5644-4d64-bb29-0327f95f4f44> | CC-MAIN-2020-05 | https://alekseistevens.com/nunavut/what-carries-instructions-for-making-proteins.php | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598800.30/warc/CC-MAIN-20200120135447-20200120164447-00271.warc.gz | en | 0.923613 | 432 | 3.546875 | 4 |
Welcome to the Barona Cultural Center & Museum
Virtual Exhibit - Heritage Project
Object ID: 2013.090.006
Habitat: North America
Description: Cocklebur is a coarse herbaceous plant from the Compositae family. It is native to California. Its color is green but when the spiky ball falls off the plant, it turns brown and dries out. It looks fuzzy and really bright green when it is at the healthiest part of its life. It has roots in the soil. It is a poisonous plant to animals and humans. Its scientific name is Xanthium strumarium. Cocklebur was used to cure fevers, malaria, sinusitis, and leprosy. According to the research done by Elizabeth Windsong, it was used for hydrophobia (rabies) and was used by homeopathic doctors.
Dimensions: H—12.7 W—20.32 cm
Kingdom: Plantae (Plants)
Phylum: Anthophyta (Flowering Plants)
Collector: Windsong, Elizabeth
Identified by: Windsong, Elizabeth
Preparator: Reyes, Jefte "Noe" | <urn:uuid:b97bee08-6629-48d1-ae2e-b98985741133> | CC-MAIN-2020-40 | https://www.baronamuseum.com/201404 | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400245109.69/warc/CC-MAIN-20200926200523-20200926230523-00217.warc.gz | en | 0.881561 | 245 | 3.484375 | 3 |
TWhat is in common between DNS - the Domain Name System, and IP addresses? It is the fact that the DNS is an Internet service that translates domain names/hostnames to IP addresses (forward DNS) and IP addresses to their associated domain names/hostnames (Reverse DNS) with the help of a DNS server.
This is one of the crucial services on the Internet, greatly facilitating the access of users to websites, by helping each visitor refer to the desired website only by typing its alpha-numeric name (domain name) in the browser instead of its real numeric system name (IP address).
Each machine, which is connected to the Internet, has its own IP address. The IP address is used to identify it to the world and plays an important part in the TCP/IP protocol. Usually, an IP address is displayed as a group of numbers, separated by dots:
IP address structure and classification
The web is the busiest place we know today, with millions of websites now available online, competing to catch the users attention. Apart from the common marketing and search engine optimization techniques, one of the key weapons website owners use in fighting for their visitors attention is the name of their website - i.e. their domain.
A typical IPv4 address184.108.40.206
The numbers in the IP address are called octets. The name "octets" derives from the positions the numbers can have in the binary form of the IP address, which is actually used by computers. The "220.127.116.11" type of address is used for human understanding. Here is how the IP address of the above example will look in binary format:
An IP address in binary format001100100011000100110110001011100011011000110101
Classes of IPv4 addresses
The octets in the IP address play another important role - they divide the IP addresses into classes. They are split into two sections - net and host. The Net section always starts with the first octet and is used to define the network the machine belongs to. The Host section defines the actual machine in the network and always contains the last octet.
Class A IP addresses
The class A IP addresses have a first or Net octet in the range of 1 and 126. The other three octets define the hosts. The A class network allows for a total of 2,147,483,648 unique IP addresses and is mainly used for the network of a very large corporation.
|A class A IP address|
Class B IP addresses
The class B IP addresses use the first two octets as network identifiers, and the last two as host identifiers. The first octet in the class B IP addresses is in the 128 to 191 range. IPs from this class are most commonly used by mid-sized networks, such as college campuses
|A class B IP address|
Class C IP addresses
For this class, the Net identifier is composed of the first 3 octets and the first octet is in the 192 to 223 range. The last octet is used to identify the host. With a limited number of hosts, this IP class is suitable for small to mid-sized networks.
|A class C IP address|
Class D IP addresses
IP addresses from this class are mostly used for multicasting. They are in the 18.104.22.168 to 22.214.171.124 range. The 126.96.36.199 to 188.8.131.52 range is used only for local area network (LAN) multicasting.
Class E IP addresses
IP addresses in this class have the first octet in the 240-255 range. They are reserved for experimental usage and computers, trying to use them will not be able to communicate properly online.
When looking at a standard IPv4 address, one can easily see that it has a finite number of combinations for unique IP addresses and that at some point, they will be over. This is why the IPv6 IP address was created.
A sample IPv6 address2001:0db8:3c4d:0015:0000:0000:abcd:ef12
The IPv6 address is expected to launch worldwide in late 2010 or 2011, when the IPv4 addresses will reach their limit. The new address is of 128 bits (IPv4 is 32bit), which will be enough for at least 100 years in the future, even if the growth of the Internet users increases.
Reverse IP address lookup
It is possible for any user to find which IP address is associated with a certain domain name/hostname and vice versa with the help of an online DNS lookup tool. How does such a search tool work? When a DNS lookup request is sent by typing a certain domain name in the tool's search field, the DNS server searches the DNS database to locate the IP address that the domain is associated with and then returns the desired result back to you.
An example of a DNS resolve & a reverse DNS resolve in Linuxhost www.ntchosting.com
www.ntchosting.com has address 184.108.40.206
250.1.65.216.in-addr.arpa domain name pointer www.ntchosting.com. | <urn:uuid:a580c4d4-24f1-438c-8458-dbd6a56cd5c4> | CC-MAIN-2021-39 | https://www.ntchosting.com/encyclopedia/dns/ip-address/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057274.97/warc/CC-MAIN-20210921221605-20210922011605-00516.warc.gz | en | 0.913152 | 1,089 | 3.390625 | 3 |
Reporting a sighting
A large carnivore sighting can consist of seeing the animal itself, or spotting the tracks, droppings, carcasses, claw marks or other signs left behind by the carnivore somewhere in the wilds.
Here is what you should do when you make a large carnivore sighting:
- Define the species and number of animals as accurately as you can
- If you encounter tracks, measure the front paw’s width (and its length if the track belongs to a lynx or wolf)
- Give a detailed report with specific location information to a large carnivore contact person (preferably to one that lives near the location of the sighting)
You can find the name and phone number of the nearest large carnivore contact person on the Finnish Wildlife Agency's website (www.riista.fi) or by asking the local game management association. By reporting your sighting you are taking part in game animal research.
The large carnivore contact persons named by regional game management associations are trained experts who are well-versed in identifying large carnivore tracks and droppings. The Finnish network of large carnivore contact persons was created in the 1970s and today it spans over 1 700 hunting and game management enthusiasts. Every year tens of thousands of sightings are logged, which translates to a very significant number of volunteer man-hours.
The contact persons enter the sightings into the Tassu sighting system, where large carnivore researchers get their hands on the data. Sightings of litters, nests and large carnivores moving near populated areas are especially valuable for research purposes.
Large carnivores in populated areas & road accidents
When a conflict situation arises that involves a large carnivore, the police cooperate with SRVA (Suurristavirka-apu), a volunteer-based organisation that provides official assistance in matters related to large game animals. | <urn:uuid:ace59348-10f3-42b0-b6b5-1a138f2695f3> | CC-MAIN-2022-05 | https://www.largecarnivores.fi/large-carnivores-and-us/large-carnivore-sightings/reporting-a-sighting.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301217.83/warc/CC-MAIN-20220119003144-20220119033144-00018.warc.gz | en | 0.930791 | 381 | 3.140625 | 3 |
FTP can operate in active or passive mode, the choice of which depends on the connection method. In active mode, the client creates a TCP- control connection to the server, and the server sends your IP address and an arbitrary number of client port.
If the client is behind a firewall and can not accept incoming TCP connection, the passive mode can be used. In this mode, the client uses flow control to send a command to the server PASV, and then it receives from the server IP address and port number.
This is then used by the client to open a data stream with arbitrary client port to the resulting address and port. Both modes were updated in September 1998 to support IPv6. At this time, further changes were made to the passive mode to upgrade to the extended passive mode.
The protocol is defined in RFC 959. The server responds on the control flow three-digit ASCII-status codes with optional text message. For example, “200″ (or “200 OK”) means that the last command was successful.
Figures represent the response code and the text – or request clarification. Current transmission on the data flow can be interrupted by using the interrupt message sent by the control flow.
When transferring data over the network four reporting methods can be used:
ASCII – used for text. Data, if necessary, converted from the symbolic representation of the host sender in “eight-bit ASCII”, and (again, if necessary) in the symbolic representation of the receiving host. As a consequence, this mode is not suitable for files that contain not only the plain text.
Image mode (commonly referred to as a binary) – the sending device sends each file byte by byte, and the receiver stores the byte stream upon receipt. Support for this mode has been recommended for all implementations of FTP.
EBCDIC – used for transmission of plain text between hosts encoded EBCDIC. Otherwise, this mode is similar to ASCII mode.
Local mode – allows two computers with identical settings to send the data in its native format without conversion to ASCII.
For text files, a variety of formats and settings control record structure are provided. These features were designed to work with files containing Telnet or ASA formatting.
Data transmission may be implemented in any of three modes:
Stream mode – Data is sent in a continuous stream by performing FTP, releasing whatever was the treatment. Instead, all processing is TCP. End of file indicator is not needed, except for the separation of the recording data.
Block mode – FTP divides the data into several blocks (block header, the number of bytes, a data field), and then transmits them to TCP.
Compression mode – data is compressed into single algorithm (usually, run-length encoding).
FTP authentication uses regular username / password for access.
If the provided information is received by the client server, the server sends the invitation and client session begins. Users can, if the server supports this feature, log in without providing credentials, but the server can provide only limited access to such sessions.
Host provides FTP service, and can provide anonymous access to FTP. People usually come in as anonymous (may be case-sensitive on some FTP servers) as the user name.
Although it usually ask users to send their e-mail address instead of a password, no verification is actually performed. Many FTP hosts with software updates, support anonymous access.
NAT-PT (rfc2766), allows broadcast incoming connections from the server to the client through the NAT.
In the process of such a compound, NAT replaces the data being transmitted from the client to indicate the true server address and port, which can connect to the server, and then transmits the connection from the server to the client.
Despite all the measures and innovations adopted to support FTP protocol, in practice NAT-PT typically disables all routers to provide additional security against virus threats.
NAT and firewall traversal
FTP normally transfers data when the server is connected to the client after the client sends the command PORT. This creates a problem for NAT, and for firewalls that do not allow connections from the Internet to the internal hosts.
There are two approaches to this problem. The first is that the FTP client and FTP server use the command PASV, which establishes the data connection from the client to the server. The second approach – changes values for NAT PORT commands through the gateway at the application level.
Support for web browsers
Most of the conventional web browsers can retrieve files on FTP servers, although they may not support the expansion protocols like FTPS. Fully functional FTP client can be run as an extension to Firefox FireFTP.
FTP URL syntax is described in RFC1738, in the form : ftp:// [< user > [: < password > ] @ ] < host > [: < port > ] / < path > (parameters in square brackets are optional.) For example:
ftp://user001:secretpassword @ private.ftp-servers.example.com/mydirectory/myfile.txt
More details on specifying a user name and password is written in the documentation browser. By default, most web browsers use passive (PASV) mode, which bypasses firewalls. | <urn:uuid:c1d10c19-b7b0-4d52-a562-7a293693dcd2> | CC-MAIN-2014-23 | http://wellsdigest.com/2013/12/13/file-transfer-protocol-ftp-understanding-connection-and-data/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510261771.50/warc/CC-MAIN-20140728011741-00365-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.897866 | 1,088 | 3.5 | 4 |
The Inside-Out of a Running Shoe
Often when shopping for footwear, you will hear a salesperson use high-tech words to describe the particular features and parts of the running shoe. With a little basic knowledge of running shoes, you can become a more informed buyer and satisfied user. This shoe anatomy session can help you buy the shoe that's right for you.
The toebox refers to the toe section of the shoe. It should be roomy enough to comfortably fit your toes. There should be approximately half an inch between your longest toe and the end of the shoe, and half an inch between the top of your longest toe and the top of the toebox.
Next, take a look at shoe laces. You should use laces that are not too long or too slippery. If they are too long, cut them down or use lace locks.
Held together by the laces is the upper, or the material that encloses the foot. Breathable fabrics such as mesh keep feet from overheating in the summer. When choosing a shoe, be sure the upper fits properly; it helps the shoe stabilize the foot.
Beneath the laces you will find the tongue of the shoe. The tongue should be thick enough to protect the top of the foot from the pressure of the laces, but not so long that it rubs against your foot just above the ankle.
Occasionally, runners complain about their feet feeling tingly or numb, particularly during longer training runs. This is sometimes attributed to shoelaces being tied too tightly, which reduces the circulation of blood to one's feet. A simple solution for this annoying problem is to tie your laces just tightly enough that your shoes stay snugly on your feet. Another option that may help is to change the lacing pattern of your shoes.
At the back of the shoe is the heel notch, the slight depression cut into the shoe's heel collar to reduce Achilles tendon irritation and provide a more secure heel fit. The heel counter is the rounded place where your heel fits snugly yet comfortably. Too loose a fit can cause blisters on your heels.
If you need extra stability (for instance, your feet wobble a lot), look for a stiff heel counter or an external heel counter (a ring that wraps around the outside of the heel). On the bottom of the shoe, look for the split heel, a two-part heel structure that separates the outer and inner sides and contributes to a smoother heel-to-toe transition.
Look for heel heights that match your cushioning needs. If you are a big person, chances are you are more of a heel-striker and want more midsole foam under the heel, so you need a greater heel height. Faster runners tend to strike more in the midfoot and need a lower heel.
Getting to Know Your Soles
Most of the cushioning and shock absorption in shoes is provided by the midsole, the part of the shoe that you can't see (located above the outer sole). You will want one of two midsole foams: polyurethane or EVA (ethylene vinyl acetate). Polyurethane is denser, heavier, and more durable than EVA. EVA is a softer, cushier material. Generally, heavier runners do well with polyurethane midsoles. EVA is more common because of its lightness and more cushioned feel.
The material that covers the bottom of the shoe is referred to as the outer sole. You will want one of three kinds of outer sole: carbon rubber, blown rubber, or a combination of the two. Carbon rubber is more durable but heavier and stiffer than blown rubber. Some shoes have carbon rubber in the high-wear areas of the rear foot and the cushier blown rubber in the forefoot for a softer feel.
Running shoes also contain stabilizing technology, or devices that reduce overpronation or excessive supination (also called underpronation). These devices are usually in the shoe's midsole on the arch side of the shoe. Some shoes have firmer densities of midsole foam to combat overpronation. | <urn:uuid:e971e1fe-a4cd-4551-b97c-965a2d787532> | CC-MAIN-2015-14 | http://www.netplaces.com/running/the-well-equipped-runner/the-inside-out-of-a-running-shoe.htm | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131299515.96/warc/CC-MAIN-20150323172139-00087-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.922691 | 852 | 2.515625 | 3 |
Critique(Making feedback a more powerful tool in the classroom)
Why I looked at it:• I wanted students to develop actual pride in the quality of their work• I wanted to develop the use of feedback in my classroom (and for it to become a culture/norm)• I wanted to have feedback acted upon instantly so every student made progress (specific feedback is surely one of the best forms of differentiation?)
Process Dedicate whole lessons to this• Model a piece of work you are asking students to create (pull out key vocabulary)• Create a success criteria with students• Draft 1• Formal class critique• Draft 2 (redraft)• Student critique….
Critique Rules:• Be kind: All feedback is there to help. No personal comments. No sarcasm.• Be specific: No comments like ‘It’s good’ or ‘I like it’. These just waste our time. Ban them. Use vocab pulled out from model.• Be helpful: Aim is to help an individual or the whole class with their learning. Comments should focus on this. Anything else wastes time.• Hard on content, soft on people
Gallery CritiquePlease click this link to see the work that High Tech High in San Diego does on critique and promoting excellent work:http://www.jamieportman.com/blog/teaching-learning/reflections-on-hightechhigh-visit-exhibiting- learning/
Why? Impact?• Standard of work went through the roof• Feedback given was more specific and became like a set of instructions (vocab improved)• The progress that students made was extremely high• Content was learnt and reinforced over and over again through process of critique• Underlying development of literacy skills and other key processes used in the project• Students looking for work to be critiqued without my direction• Students skilled enough to critique their own work with rigor• Culture of creating work to be proud of was achieved in the project (due to critique)
Essential resources‘An Ethic of Excellence’by Ron BergerExcellent ‘must read’ for allteachers.http://www.amazon.co.uk/An-Ethic-Excellence-Building-Craftsmanship/dp/0325005966
Essential resourcesRon Berger basic explanation of critiquePart 1 - http://www.youtube.com/watch?v=1znB1ox0_EIPart 2 - http://www.youtube.com/watch?v=J2K75WO7a70Austin’s Butterfly - http://www.youtube.com/watch?v=JFHf7jAfJlgTait Coles Critique presentation from TMClevedonPart 1 - http://www.youtube.com/watch?v=v_qdNNs3m6gPart 2 - http://www.youtube.com/watch?v=M-yXX1En3fcHigh Tech High guide - P27 of the book explaining critiquehttp://www.innovationunit.org/sites/default/files/Teachers%20Guide%20to%20Project-based%20Learning.pdfDarren Mead blog posts on critiquehttp://pedagogicalpurposes.blogspot.co.uk/search/label/critiquesTait Coles blog posts on critiquehttp://taitcoles.wordpress.com/2012/06/07/public-critique/David Didau (Learning Spy)http://learningspy.co.uk/2013/01/26/work-scrutiny-whats-the-point-of-marking-books/ | <urn:uuid:c5991967-03fc-4a69-8c7e-afad95d07113> | CC-MAIN-2018-51 | https://www.slideshare.net/davidfawcett27/critique-presentation-16274924 | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824822.41/warc/CC-MAIN-20181213123823-20181213145323-00126.warc.gz | en | 0.842995 | 766 | 2.703125 | 3 |
Sat 21 May, 2016 09:24 am
These Students Built A Glove That Translates Sign Language Into English
A pair of undergraduates at the University of Washington made a glove that translates gestures in American Sign Language (ASL) into English and speaks it via speakers. The SignAloud glove won them a $10,000 Lemelson-MIT Student Prize and international attention. Now they're figuring out how to refine their gadget for social good...and make sure they pass their college exams.
The SignAloud glove captures ASL gestures with sensors that measure everything from XYZ coordinates to the way individual fingers flex or bend. That sensor data is sent via Bluetooth to a nearby computer and fed into coding algorithms that categorize the gestures, which are translated into English and then audibly spoken via speaker. But co-creator Navid Azodi emphasizes that SignAloud is still very much in a prototype phase.
"Keep in mind, we have by no means captured the entire language and we’re nowhere near that. [ASL] is more than just words and phrases, and we know that. It has complex grammar structures. What we eventually want to get is for SignAloud to categorize a majority of the language," says Azodi. | <urn:uuid:d0e0b26c-c235-4526-abcd-71bb53ff0224> | CC-MAIN-2019-35 | https://able2know.org/topic/324118-1 | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027323246.35/warc/CC-MAIN-20190825084751-20190825110751-00093.warc.gz | en | 0.945177 | 258 | 2.59375 | 3 |
The hottest topic in semis nowadays is the way that big tech companies are building their own silicon. We wrote about some of the motivations behind this here and explored the economics of them here. The quick summary of all that is non-semis companies do not build chips to save money, they build them for strategic advantage (which may include saving money).
So it should come as no surprise that one of Google’s key strategic assets, YouTube quietly unveiled a new chip last month, but for some reason no one is really talking about it. Maybe this is the new normal and we are used to it, or maybe no one is talking about it because it scares the chip companies badly.
Google quietly unveiled it’s new Video Coding Unit (VCU) in a blog post from the YouTube Engineering team. The team also published an academic paper on this project, (a paper which is hard to find in Google search results). The blog piece is filled with some really interesting background on how YouTube runs, as well as the usual mind-blowing statistics – every minute people upload 500 hours of video content. The problem they were trying to solve is both fairly straightforward and staggeringly difficult. Users upload video of a certain quality, but then YouTube has to play that video back with a different quality depending on the viewer’s device – 4K for a wired TV, lower-res for a mobile device on a shaky network. The process of altering that quality level is called transcoding, and it is very compute intensive. Google had some some key trade-offs here. By using a new encoding scheme they could greatly reduce their bandwidth costs (which must be massive), but this came at cost of requiring a lot more compute. The VCU solved that problem.
A few things stood out for us about the VCU.
First, it is fast. They claim it delivers 20x-33x improvement in compute efficiency. By comparison, a new generation CPU can expect roughly double (2x) the speed of its prior generation, and that result is usually mostly driven by Moore’s Law improvement. When Google announced it’s machine learning chip, the TPU, six years ago, they talked about 30x-80x better performance, and that allowed them to halve the number of data centers they would need to build. So the VCU is not quite as powerful (the math it is doing is a lot more complex), but would clearly still have a big impact on YouTube’s data center needs.
Secondly, and more importantly, the team that built the chip was largely comprised of software engineers, and not that many of them. This demonstrates how ‘easy’ it has become to design a chip. The academic paper has 52 co-authors, and we are guessing that comprises the whole team. The article makes it sounds as if these are the same people who are building YouTube’s software platform. So the team has an in-built advantage against any merchant chip company who wants to compete in this space. The big processor vendors (e.g. Nvidia, AMD, Intel, Qualcomm) usually have several hundred designers working on their core products, and then they have at least as many building software for those chips. Google’s approach is much more efficient, the benefit of vertical integration.
Admittedly, it takes many more people to bring a chip to production. Google probably worked with one of the big chip companies’ “ASIC” team to do the back-end work. (Our guess is Broadcom). But there is a more disturbing possibility, does Google have a chip operations team? They would only do this if they have several chips in production. If true, that should really worry the big chip companies. It is not clear who did the ASIC work for Google, the article is unclear and the job listing on Google are ambiguous, but it is definitely a possibility.
There is a lot for the chip industry to take in here. We mentioned the design advantage and efficiency Google enjoyed. But there is also the fact that Google essentially just invented a new category of chip, again. As far as we know, no one is really building anything directly comparable to a VCU. So Google, in need of a solution to their specific problem, went out and built it themselves. And we are not sure any chip company will go out and build a competitive product. The market for this chip has a fairly small customer pool. There is only Google maybe Facebook, and a couple companies in China. By the same token, this is just one more insurmountable barrier to entry for YouTube’s market. No one will be able to compete with YouTube unless they can build a chip too. | <urn:uuid:225d3262-dc44-42d9-b56e-84f6d38762be> | CC-MAIN-2021-25 | https://digitstodollars.com/2021/05/11/googles-vcu-a-new-chip-enters-the-fray/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488552937.93/warc/CC-MAIN-20210624075940-20210624105940-00620.warc.gz | en | 0.974865 | 968 | 2.546875 | 3 |
Tanna of the second century; the most distinguished pupil of R. Ishmael. He is not mentioned in the Mishnah, perhaps because he lived in the south (Sanh. 88b), and his teachings were consequently unknown to the compiler of the Mishnah, Judah ha-Nasi, who lived at Tiberias and Beth-she'arim in northern Palestine. This is the explanation proposed by Frankel and Brüll; but the fact may have been that the Mishnah of Meïr, which served as the basis of Rabbi's Mishnah, did not accept the development of the teachings of Ishmael as formulated by Josiah and R. Jonathan, and they were consequently omitted by Rabbi from his Mishnah (Hoffmann, in Berliner's "Magazin," 1884, pp. 20 et seq.). Josiah is frequently mentioned in the Mekilta together with Jonathan. All their differences concerned only interpretations of Biblical passages, never halakot. During Hadrian's persecution Josiah seems to have fled from Palestine; for he was at Nisibis, where he delivered precepts in the college of Judah b. Bathyra (Sifre, Num. 123; ib. Deut. 218).
- Weiss, Dor, ii. 114;
- Frankel, Hodegetica in Mischnam, pp. 146-149, Leipsic, 1859;
- Bacher, Ag. Tan. ii. 351-364. | <urn:uuid:d17f8d09-516f-4f98-b90b-c89be2d74e9e> | CC-MAIN-2015-22 | http://www.jewishencyclopedia.com/articles/8927-josiah | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927767.46/warc/CC-MAIN-20150521113207-00234-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.971741 | 308 | 2.984375 | 3 |
No future without scarce metalsJanuary 31, 2012 in Technology / Other
It is not just in laptop computers, mobile telephones and LED screens that scarce metals are to be found but also in solar cells, batteries for mobile technologies and many other similar applications. The rising demand for these metals increases the risk of a bottleneck in supplies.
Empa researchers and representatives from industry explained at the Technology Briefing why scarce metals are essential for many key technologies and how an impending scarcity might be avoided.
"There is no future without scarce metals!" This was the very clear message with which Peter Hofer, a member of Empa's Board of Directors, greeted guests at the recent Technology Briefing on scarce metals held at the Empa Academy. After all, it is scarce metals in batteries and motors that keep electric vehicles rolling and which, in automobile catalytic converters, clean up the exhaust gases. Hofer again: "Materials with special properties are essential if we are to find solutions to the problems caused by our ever-increasing mobility requirements."
The term scarce metals includes gallium, indium, cobalt and the platinum metals, in addition to the rare earth metals which are used (together with iron and boron), for example, to make the very strong magnets needed in wind turbines. And manufacturers like to use tantalum for the capacitors on mobile telephone printed circuit boards (PCBs) because this transition metal, when used in these tiny components, enables them to store and release large amounts of electrical energy. The demand is high, with more than 60 per cent of the tantalum mined being used for this application.
The darker side
But, as Patrick Wäger, the initiator of this Technology Briefing and an expert on scarce metals, explained, everything has a darker side to it. Raw materials which can only be mined and refined in a few countries, for which alternatives are not easy to find and which have a low rate of recycling must are considered to be critical. China, for example, almost completely controls the supply of rare earth metals from which high-performance permanent magnets are manufactured. Wäger, who is a staff member of Empas Technology and Society laboratory, added that by imposing export restrictions the Chinese government has forced prices to rise, leading to delivery bottlenecks. Currently great efforts are being made to reduce this dependency by expanding supply capacities outside of China, such as in the USA, Australia or Greenland with implications also for the environment.
Tantalum, required for high-performance micro-capacitors, is viewed in the microelectronics industry as a material which is difficult to substitute, and to date it has not been possible to recover it from end-of-life products. Particularly worrying are the facts that tantalum is illegally mined in certain Central African countries under degrading conditions, and the profits from its sale are used to finance civil wars.
"Swiss companies also need to think closely about how they can reduce this dependency and avoid the possibility of delivery bottlenecks," remarked Jean-Philippe Kohl, the head of Swissmem's Economic Policy Group. A recent survey of the industry association's members in the Swiss mechanical engineering, electrical and metal sectors showed that every single company contacted used at least one of the critical raw materials. In order to protect themselves from possible shortages many of the companies had signed long-term delivery contracts with their suppliers. The others are cooperating with research institutions, either to develop alternative raw materials and technologies, or to optimize existing processes.
Alternatives from research labs
As an example of this approach, Stephan Buecheler explained how Empa's Thin-Films and Photovoltaic laboratory was working to reduce the thickness of the critical tellurium layer in flexible solar cells which use cadmium telluride (CdTe) as the active material. Similarly, efforts are being made in solar cells based on copper-indium-gallium-diselenide (CIGS) to replace the critical indium oxide with zinc oxide. In making these changes no loss of performance is expected. Quite the opposite, in fact the aim is to increase the efficiency of these devices by optimal use of raw materials and fast processes. Researchers have already shown that this is possible, having set a new efficiency record last year.
Again with the aim of reducing scarce metal usage, the institutions Internal Combustion Engine laboratory has developed an extremely efficient and economic foam catalyst. Changing the form of the ceramic substrate has enabled the use of less of the noble metals palladium and rhodium in comparison to conventional catalysts. In collaboration with Empa's Solid-State Chemistry and Catalysis laboratory, the motor scientists are conducting research work on regenerative exhaust gas catalysts which employed perovskites instead of scarce metals. The former are multifunctional metal oxides which, because of their special crystal structure, are capable of transforming heat directly into electrical energy.
The recycling challenge
Despite all the doom and gloom, we will not have to do without scarce metals entirely. As Heinz Boeni, head of the Technology and Society laboratory, maintained there is of course a reserve of scarce metals to be found in end-of-life electrical and electronic products. While natural primary deposits are being used up, the anthropogenic secondary deposits created by man are increasing continuously. In a ton of natural ore as mined there is typically about 5 g of gold. In a ton of discarded mobile telephones, on the other hand, there is about 280 g, while the same weight of scrap PCBs contains as much as 1.4 kg of the precious metal.
But recovering scarce metals is anything but easy. "You can't just pull them out from electronic waste with a screwdriver and a hammer. The recovery process is at least as complex as the design and development of the old appliances themselves", recycling expert Christian Hagelüken made clear. A large percentage of scarce metals are to be found in the form of very thin layers or mixed with other substances in the form of alloys, added Hagelüken, whose employer, Umicore, is one of the largest recycling companies involved in the recovery of precious metals from complex waste material. Recycling scarce metals demands the use of complicated recovery processes.
Furthermore, suitable recovery processes alone are not enough to guarantee high recycling rates. According to the experts it is necessary to keep an eye on the whole recycling chain, from collection, disassembly and sorting of the scrap to the actual recovery process itself. The greatest efforts are in vain if, as is the case in certain countries, end-of-life computers and other electronic appliances are exported to developing and threshold countries where the scarce metals are lost through the inappropriate treatment of the electronic waste, which also represents a danger to human health and the environment. Or, if with a mechanical disassembly - which is common today in Switzerland the scarce metals are dissipated into fractions from which they cannot be recovered.
Provided by EMPA
"No future without scarce metals" January 31, 2012 https://phys.org/news/2012-01-future-scarce-metals.html | <urn:uuid:9d8208f9-0e1b-417a-911c-49fe93c17b35> | CC-MAIN-2018-09 | https://phys.org/print247219316.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815560.92/warc/CC-MAIN-20180224112708-20180224132708-00220.warc.gz | en | 0.944467 | 1,456 | 3.25 | 3 |
What are the characteristics of cardiomyocytes?
Moreover, cardiomyocytes have several unique cellular structures that allow them to perform their function effectively. Here are five main characteristics of mature cardiomyocytes: (1) striated; (2) uninucleated; (3) branched; (4) connected by intercalated discs; (5) high mitochondrial content.
What is the structure of the cardiomyocytes?
Cardiomyocyte is the fundamental contractile cell of the heart. Sarcomere, the fundamental contractile unit of cardiomyocytes is composed of thick and thin interdigitating filaments of myosin and actin, tropomyosin, titin and the troponin complex.
What are the 2 types of cardiomyocytes?
There are two kinds of myofilaments, thick filaments composed of the protein myosin, and thin filaments composed of the proteins actin, troponin and tropomyosin. As the thick and thin filaments slide past each other the cell becomes shorter and fatter.
What organelles are in cardiomyocytes?
Some of the other important organelles found in cardiomyocytes include:
- Alpha tubulins.
- Beta tubulins.
- Endoplasmic reticulum.
- Golgi Apparatus.
What is the cardiomyocytes cell?
Cardiomyocytes are the cells responsible for generating contractile force in the intact heart. Specialized cardiomyocytes form the cardiac conduction system, responsible for control of rhythmic beating of the heart.
What are the cardiomyocytes?
Cardiomyocytes are the cells responsible for generating contractile force in the intact heart. • Specialized cardiomyocytes form the cardiac conduction system, responsible for control of rhythmic beating of the heart.
What are cardiomyocytes?
Definition: What are Cardiomyocytes? Also known as myocardiocytes, cardiomyocytes are cells that make up the heart muscle/cardiac muscle. As the chief cell type of the heart, cardiac cells are primarily involved in the contractile function of the heart that enables the pumping of blood around the body.
How can cardiomyocytes be observed in histology?
Cardiomyocytes can be observed by staining of histological sections of the heart. Since the heart is a 3-D organ, make sure you cut the heart at the right angle. [In this figure] (Left) A longitudinal section through both ventricles should be made from the base to the apex of the heart.
What is the role of cardiomyocytes in heart transplantation?
The transplantation of cardiomyocytes obtained through this method (iPSC) into damaged hearts has proved successful allowing cardiac muscles to function normally. Cardiac fibroblasts make up about 50 percent of the total cardiac cells.
What is the histology of the liver?
Liver Histology. The liver is the largest internal organ of the human body, weighing approximately 1.5 kg. Embryologically it develops from the foregut and it spans the upper right and part of left abdominal quadrants. Anatomically the liver consists of four lobes: two larger ones (right and left) and two smaller ones (quadrate and caudate). | <urn:uuid:5affd3eb-a59e-45cc-83e1-ddd8f87934fe> | CC-MAIN-2022-40 | https://www.vikschaatcorner.com/what-are-the-characteristics-of-cardiomyocytes/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337906.7/warc/CC-MAIN-20221007014029-20221007044029-00275.warc.gz | en | 0.910292 | 710 | 3.5625 | 4 |
Napoleon's Theorem by Transformation
|On each side of a triangle, erect an equilateral triangle, lying exterior to the original triangle. Then the segments connecting the centroids of the three equilateral triangles themselves form an equilateral triangle.|
We'll denote the Napoleonean triangles ABC", BCA", CAB" and there centers C', A', and B', respectively. The counterclockwise rotation through 120° around A' moves B into C; the rotation around B' similarly moves C into A and the rotation around C' moves A onto B. The product of the three rotation is a rotation through 360°, i.e., a translation with point B fixed. Which means that it is the identity transform.
(The applet below allows you to experiment with the 120° rotations around the centers of the Napoleonean triangles in turn. In addition to the three vertices A, B, C, one other point is moveable by the cursor. A sequence of rotations is selected by pressing the A', B', C' buttons, or by popping the most recent rotation. The sequence of rotations applies to the fourth point. You can verify the assertion that the sequence of rotations around A', B', C' leaves B fixed by placing the fourth point at B. Similarly, one can verify the next step of the proof that follows.)
|What if applet does not run?|
Since the product of rotations in the sequence A', B', C' is the identity transform, it leaves C' fixed, but so does the rotation around C' alone. Thus the product of rotations around A' and B' also leaves C' fixed. Assume C' is rotated around A' into say P' which is then rotated around B' back into C'. In the quadrilateral C'A'P'B', angles C'A'P' and P'B'C' are 120° and the triangles C'A'P' and P'B'C' are isosceles. Their base angles are 30°, so that
I am grateful to Hubert Shutrick for bringing this proof to my attention. A proof based on similar consideration is found in the classic Geometric Transformations I by I. M. Yaglom as Problem 22(a). The product of rotations around A' and B' is found at the intersections of two lines inclined 60° to A'B' through the end points of that segment. This is a rotation through 240° that leaves C' fixed so that this is a rotation around C'. The two observations together imply that ΔA'B'C' is equilateral.
Copyright © 1996-2018 Alexander Bogomolny | <urn:uuid:598b0bd3-f377-48cf-b055-35af87a218f7> | CC-MAIN-2018-39 | https://www.cut-the-knot.org/Curriculum/Geometry/NapoleonByTransformation.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267161350.69/warc/CC-MAIN-20180925083639-20180925104039-00102.warc.gz | en | 0.926472 | 566 | 2.875 | 3 |
Early crust on Mars may be more complex than researchers previously thought—and it may even be similar to Earth’s original crust.
The Martian surface is uniformly basaltic, a consequence of billions of years of volcanism and flowing lava on the surface that eventually cooled. Scientists had thought Mars’ crustal history was a relatively simple tale because Mars did not undergo full-scale surface remodeling like the shifting of continents on Earth.
But in a new study, scientists discovered locations in the Red Planet’s southern hemisphere with greater concentrations of the chemical element silicon than what would be expected in a purely basaltic setting. Space rocks that slammed into Mars exposed the silica concentration by excavating material that was embedded miles below the surface, revealing a hidden past.
“There is more silica in the composition that makes the rocks not basalt, but what we call more evolved in composition,” says Valerie Payré, the study’s corresponding author. “That tells us how the crust formed on Mars is definitely more complex than what we knew. So, it’s more about understanding that process, and especially what it means for how Earth’s crust first formed.” Payré is an assistant professor in the Department of Earth and Environmental Sciences at the University of Iowa.
Scientists believe Mars formed about 4.5 billion years ago. Exactly how the Red Planet came into being is still a mystery, but there are theories. One idea is that Mars formed via a titanic collision of rocks in space that, with its intense heat, spawned an entirely liquefied state, also known as a magma ocean. The theory goes that the magma ocean gradually cooled, yielding a crust, like a layer of skin, that would be singularly basaltic.
Another theory is that the magma ocean was not all-encompassing, and that parts of the first crust on Mars had a different origin, one that would show silica concentrations different from basaltic.
Payré and her research partners analyzed data gathered by the Mars Reconnaissance Orbiter for the planet’s southern hemisphere, which previous research had indicated was the oldest region. The researchers found nine locations—such as craters and fractures in the terrain—that were rich in feldspar, a mineral associated with lava flows that are more silicic than basaltic.
“This was the first clue,” Payré says. “It is because the terrains are feldspar-rich that we explored the silica concentrations there.”
Feldspar had been found previously in other regions on Mars, but further analysis showed the chemical composition in those areas was more basaltic. That did not deter the scientists, who turned to another instrument, called Thermal Emission Imaging System, or simply, THEMIS. This instrument aboard the Mars Odyssey orbiter can detect silica concentrations through infrared wavelength reflections from the Martian surface. With data from THEMIS, the team determined the terrain at their chosen locations was more silicic than basaltic.
Adding further credence to their observations, meteorites such as Erg Chech 002, discovered in the Sahara and dating roughly to the birth of the solar system, show similar silicic and other mineral compositions that the team observed in the nine locations on Mars.
The researchers also dated the crust to about 4.2 billion years, which would make it the oldest crust found on Mars to date.
Payré says she was mildly surprised at the discovery.
“There have been rovers on the surface that have observed rocks that were more silicic than basaltic,” she says. “So, there were ideas that the crust could be more silicic. But we never knew, and we still don’t know, how the early crust was formed, or how old it is, so it’s kind of a mystery still.”
While Mars’ crustal origin remains shrouded, Earth’s crustal history is even less clear, as any vestiges of our planet’s original crust have been long erased due to the shifting of continental plates for billions of years. Still, the finding may offer insights into Earth’s origins.
“We don’t know our planet’s crust from the beginning; we don’t even know when life first appeared,” Payré says. “Many think the two could be related. So, understanding what the crust was like a long time ago could help us understand the whole evolution of our planet.”
Payré conducted the research as a postdoctoral researcher at Northern Arizona University. She joined the UI in August.
The study, “An evolved early crust exposed on Mars revealed through spectroscopy,” was published online on November 4 in the journal Geophysical Research Letters.
Reference: “An Evolved Early Crust Exposed on Mars Revealed Through Spectroscopy” by V. Payré, M. R. Salvatore and C. S. Edwards, 10 October 2022, Geophysical Research Letters.
Contributing authors are Mark Salvatore and Christopher Edwards from Northern Arizona.
NASA funded the research, through the Mars Science Laboratory Participating Scientist Program and the Mars Odyssey THEMIS project. | <urn:uuid:cb4b8d94-2586-4e0c-b92c-7bbbbbbc0b89> | CC-MAIN-2023-50 | https://scitechdaily.com/early-crust-on-mars-more-complex-and-evolved-than-previously-thought/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100057.69/warc/CC-MAIN-20231129073519-20231129103519-00092.warc.gz | en | 0.953267 | 1,105 | 4.46875 | 4 |
Technically, Shaivism qualifies as a religion in itself. It has its own appeal, distinct philosophies, beliefs, practices, pantheon and traditions that date back to thousands of years. Shaivism played an important role in the continuation of Hinduism. Its beliefs, philosophy and practices enriched Hinduism and contributed to its success against Jainism and Buddhism. Much of the Hindu tantric and ascetic practices are rooted in the ancient Saiva practices.
Although neither Shaivism nor Shiva figure prominently in the ancient and early Vedic hymns and Upanishads, Shaivism became an important and integral part of Vedic religions during the eastward and southward expansion of Vedic communities in ancient India. Currently, Shaivism has four major sects. Each of them has a long history of its own and contain elements of both Vedic and tantric beliefs and practices. Each of the sect has a distinctive character, following and philosophy of its own.
All the schools hold Shiva as the highest Supreme Brahman, who manifests the entire diversity in creation and holds beings bound to the mortal world by casting upon them the net of delusion or Maya. The four major schools or sub-sects of Shaivism are: Saiva Siddhanta, Vira Shaivism, Kashimiri Shaivism, and Gorakhnath Shaivism. In addition, we may also include Pasupatha Shaivism, which is a very ancient and esoteric sub-sect of Shaivism, and enjoys a very limited but dedicated set of followers.
This school is popular mainly in southern India and derives its doctrine from the 28 Saiva Agamas and the works of several Saiva saints and philosophers from the South. The most prominent among them was Nambi Andar Nambi, who composed Tirumurai, which is considered the foundational work of the school. It includes the works of several other saints, such as Appar, Sundarar and Sambandhar. According to the school, Shiva is the highest reality. A living being (jiva) has the same essence as of Shiva, although a jiva is not identical to him. Creation is made up of 36 tattvas. Reality consists of Shiva, and innumerable jivas or individual souls, who are bound by desires and attachments (pasas) to the cycle of deaths and births. The existence of the world and beings is not an illusion but a reality.
Shiva is both the efficient and the material cause of creation. He manifests the world through Sakti or Prakriti, the real material cause of the universe. In his dynamic aspect he performs five functions of creation, preservation, destruction, concealment and liberation. All living beings are subject to delusion or Maya, which is of different types. When beings achieve liberation by overcoming their delusion, they become free from the cycle of births and deaths. The souls are innumerable. They are either free or bound to one or more impurities. Among the bound souls some remain forever bound. Liberation is achieved by four means: devotional worship (carya), devotional service (kriya), the practice of yoga (yoga), and liberating knowledge (jnana). The first three are preparatory for the fourth, which is considered the highest. After liberation, souls attain purity and supreme consciousness, but retain their individuality and some distinction from the Supreme Being, Shiva.
Vira Shaivism rose to prominence during the medieval period in Karnataka and the adjoining areas of Andhrapradesh and Tamilnadu. Vira Shaivism derives its name from the heroic nature of Shiva Himself in his ferocious aspect as Virabhadra. The sect is also known as Lingayata sect, since its followers wear a Shivalinga around their necks or on their bodies. The sect was made popular by Basavanna in the Karnataka region in the 12th century C.E. According to this sect, God and the individual souls are aspects of the same reality. Individual souls make up the body of God, held together by the power of Shakti, while God is its Soul. Shiva is the efficient cause of creation. He remains constant and immutable in creation, while Shakti evoles and transforms into the phenomenal world. Each individual soul has the same essence as that of Shiva and is an aspect (amsa) of Shiva. However, it is somewhat similar but not the same as Shiva. It is also subject to the impurities of egoism, attachment and delusion. When they are overcome, the individual soul regains its blissful nature and experiences its oneness with the subtle body (linga sarira) which in essence is the same as that of Shiva. The concepts figure prominently in Vira Shaivism, namely Guru, Jangama and Linga. The guru is the spiritual teacher, a Jangama is a self-realized soul, higher than guru, and Linga is none other than Para Shiva. Those who aspire for liberation should acknowledge these three entities and observe eight rules (astavarana) of virtuous conduct, which help them in their purification and transformation and their final union with Shiva.
While the previous two schools acknowledge some distinction (bheda) between Shiva and the individual souls, Kashimiri Shaivism consider Shiva the only reality and everything else a mere illusion. The entire creation including the individual souls are a projection of Siva. At the end of creation they are withdrawn and only Shiva, the ultimate reality, remains. Kashmiri Shaivism derives its name from the region of Kashmir where it gained prominence initially before the arrival of Islam in India. It is also known by other names such Trkia, Spanda and Pratyabhijna. Trika refers to the triple principles, Pati (Shiva), Pasu (jivas) and Pasa (bondage) of existence. Spanda refers to the causative, responsive and transformative aspect of life whereby beings learn to adapt to the phenomenal world and act according to their desires and delusion which results in their bondage. Pratyabhijna is the distinct awareness, or the remembrance which arises in the souls at the time of their liberation regarding their Shiva nature or their oneness with Shiva. According to this schoo, Shiva is the ultimate reality. There is nothing beyond. He is everything, both the material and efficient cause. The whold diversity is either a reflection or projection or appearance of Shiva only in the qualities of Nature. He manifests it through his shakti, which becomes fivefold in the process of creation, namely the mind power (cit-shakti), the bliss power (ananda-shakti), the will power (iccha-shakti), the knowledge power (jnana-shakti) and the active power (kriya-shakti). Using these five powers, Shiva manifests in the world in innumerable forms and shapes as both objects and beings. Although the individual souls are the same as Shiva, since they are subject to the triple impurities of egoism, attachment and delusion, they forget their true Shiva nature. Through liberation (moksha) they regain their awareness and return to their original state of omniscience, perfection and absolute purity.
This sect is also known as Natha Shaivism or Gorakshanatha Shaivism. It rose to prominence during the 12th and 13th centuries in some parts of northern India. It is a predominantly ascetic sect. Its members practice austerities, tantra, and hathayoga, and subject their minds and bodies to rigorous discipline, often torturing themselves with extreme practices to transcend their attachment to names and forms and stabilize their minds in the contemplation of Shiva. The sect derives its name for the nine or twelve legendary teachers called Naths or lords. Followers of the sect believe that these teachers are still alive in the physical plane and keep a watch on the spiritual transformation of the world. The most prominent teacher of this sect is Goraknath, who lived in the 12th century C.E. He also figures in the Buddhist tantric lineages. He is credited with a number of compositions and tantric practices. He was also known to possess several magical and spiritual powers, including the ability to arrest aging and transcend physical death and decay. Members of this sect smear their bodies with the ash collected from graveyards and practice several tantric rituals to train their minds and bodies. The practice alchemy, magical rituals, kundalini yoga to awaken chakras and offensive public behavior to invoke public censure and overcome their pride. They also use herbs and chemicals to induced trance and prepare the mind to enter altered states of consciousness. However, they avoid the use of sex and contact with women. Like Kashimiri Shaivism, this sect also believes in the non-duality of existence and sees no distinction between Shiva and the individual souls.
Suggestions for Further Reading
- Aspects of Lord Shiva
- Saivism or Shaivism - Basic Concepts
- Shaivism Literature
- Mantra and Yoga
- Nataraja, The Lord of the Cosmic Dance
- What Shankara Means?
- Shaivism Sects
- Siva and Bhavani
- Devotional Prayers to Lord Shiva
- Significance of Lord Shiva
- Shaivism Links, Websites and Resources
- Famous Saints of Saivism
- The Worship of Lord Shiva
- History of Shaivism, Lord Shiva in Vedic Literature and Recorded History
- Methods of Worship in Shaivism
- Hindu Gods - Lord Ganesha
- Gods and Goddesses of Hinduism
- About Goddess Parvathi or Shakti
- Quotes on Religious Tolerance in Hinduism
- Sects and Sectarian Movements in Hinduism
- Hinduism - The Role of Shakti in Creation
- Hindu God Lord Shiva (Siva) - the Destroyer
- A Critical Study of the Chronology of Siddhas
- Hindu God Murugan, Kumaraswami, Skanda or Ayyappa
- Symbolic Significance of The Hindu Trinity, Brahma, Vishnu And Siva
Translate the Page | <urn:uuid:b74226e4-4561-4d17-829d-cb814a6c7d0c> | CC-MAIN-2019-13 | https://www.hinduwebsite.com/siva/sects.asp | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912205163.72/warc/CC-MAIN-20190326115319-20190326141319-00490.warc.gz | en | 0.958607 | 2,077 | 3.078125 | 3 |
I love teaching Lorraine Hansberry’s A Raisin in the Sun. This is usually the first text that I teach with a new class as I want the first literature unit to be a success that the class can build on. The student interest is high (the drama of the Younger family engages students thoroughly) but the grade level (text complexity) is low.
Before teaching A Raisin in the Sun…
Think about grade level.
The A Raisin in the Sun grade level is 9th grade and up. (I have used the play for an advanced group of 8th graders.) Even though the reading grade level for A Raisin in the Sun is low, the issues, themes, and context are more appropriate for High School.
- ATOS Book Level: 5.5
- Interest Level (AR): Upper Grades 9-12
- Lexile Level: NP (non-prose)
- Leveled Reading: Z (Grade 7-8)
Prepare to address sensitive material.
While the language is not complicated, there are some sensitive issues to navigate:
- Racism and internalized racism
- Alcohol abuse
- Religious arguments (atheism)
- Words: the n-word, “negro,” “colored,” “fa**oty,” “chick,” “ass,” “damn,” and “hell”
This is not kids’ stuff. Think about how you will handle these topics. Warn the students about this content, and explain your expectations. Remind them that you are trusting them to address these topics with sensitivity and maturity.
Plan your reading and lesson schedules.
You must decide what works for you, but this is the A Raisin in the Sun reading schedule that works for me in my current teaching assignment:
- Week 1 Act I, scene 1
- Week 2 Act I, scene 2 – Act II, scene 1
- Week 3 Act II, scene 2 – Act II, scene 3
- Week 4 Act III
Note: I know this reading schedule is lax, but with this text I want to build habits that will prepare students for more rigorous reading schedules.
I expect my secondary students to read the text independently on a weekly basis. I hold them accountable for the reading with brief reading quizzes that count as homework grades. They need to start approaching grade-level texts without having it spoon fed to them. They have a full week to read the assignment in a way that works for them and receive additional support.
Explore the concept of “The American Dream.”
Ask students what “The American Dream” means. What are the connotations of this term? Does it mean different things to different people? Has the meaning changed? Does it mean something to them personally?
Explore the different conceptions of “The American Dream” as a class. You may want the entire class to read the same articles or you may want to “jigsaw” the exploration by assigning different students (or groups) different texts to present.
- “How Rural Students Define the American Dream” by Magdalena Slapik
- “What the man behind the ‘American Dream’ really meant” by Ted Widmer
- “I Have a Dream…” speech by Martin Luther King Jr.
- “Is There an American Dream for Black Children?” by Sean McElwee
- “African-American History Timeline: 1950 to 1959” by Femi Lewis
- “Donald Trump Claims ‘The American Dream is Back,’” by Natalie Waters
Another lesson that I enjoy teaching is a comparison of poem that inspired Hanberry’s title, “Harlem” by Langston Hughes, and the “I Have a Dream…” speech by Martin Luther King Jr. This lesson lends itself to performance, and I encourage the students to organize choral readings of both texts before starting our analysis.
Video connections for “The American Dream”
Videos are a great way to spark discussion on “The American Dream.” It becomes clear that term means different things to different people. The meaning can focus on individual expression, personal freedoms, opportunity, or prosperity.
- Where Does the American Dream Live” video (14:45) from Retro Report: This is an engaging video focusing on race and opportunity. Clear connections to the play (1950s Chicago). Content Advisory: “black bastards” (1:45)
- “Park Avenue: Money, Power & the American Dream” preview video (0:36) from Independent Lens: Short promo asserting that “The American Dream” has been hijacked.
- “Is the American Dream Still Alive” video (7:29) from CBS Sunday Morning: Economic point of view focusing on the struggling middle class.
- “The American Dream in 2016” video (4:41) from the New Yorker: People use an art exhibit to reflect on their views of “The American Dream.”
- “American Dream” MKTO music video (3:46) from Disney: Focusing on personal expression as the new dream.
Teaching A Raisin in the Sun: Historical Context
Make sure that students understand the context of the play within the Civil Rights Movement and why the the original production was ahead of its time. By the late Fifties, when Hansberry wrote the play, what had African Americans gained and what did they seek? By this point in the Civil Rights era, what issues were in the forefront of the minds of African Americans?
The Younger parents (Mama and Big Walter) moved to Chicago as part of The Great Migration. How was the Civil Right era different for families like the Youngers and African Americans in the South? How were the issues of the day different for Walter, Mama, Beneatha, and the other characters respectively?
There is a excellent documentary that I like to use when studying the Civil Rights Era in the South that is always a big hit with the students: The Children’s March (40 minutes). I rarely see students so interested in a documentary.
Plan to support resistant and struggling readers.
My students have an entire week to read so that they can receive any needed support. In order to identify students who may need additional support, you must have reliable data. You may need to use a reading diagnostic tool if the data you have is questionable or out-of-date. I typically give seven or eight identified students scene summaries (discretely) from the start.
Helping students to read independently
Reading every word together as a class may be possible with a play or novella, but is it desirable? We want to scaffold independent reading so that the scaffolding can be minimized as the student progresses. Additionally, students should be familiar with the text so that class time may be spent on thoughtful analysis, collaboration, or, in this case, performance (i.e. dramatic reading).
- Chapter summaries: These can be printed from Sparknotes, Shmoop, and the like. I feel that it is not dishonest as long as the students still reads the actual text (before or after reading the summary).
- Support services: Give your special education colleagues the book, schedule, etc. Parents can also provide support since the readings are on a weekly basis to accommodate busy schedules.
- Video: Use sparingly as you only want to orient their imaginations. Again, it is not dishonest as long as the students are still reading.
- Audio books: Many websites will read a text aloud, but remind students that they should still follow along and then re-read on their own.
- Reading groups: You may want to organize a weekly reading group or encourage students to do so. If the discussions are lively, they may even enjoy it.
- Modified assessments: Students with an IEP may benefit from modified quizzes, a different venue or alternative scoring (e.g. 7 or better is %100). Sometimes it is as easy as crossing off some of the toughest distracters.
Preview the final task for the A Raisin in the Sun unit.
Let the students know where this study is headed. By letting them know what they will be expected to demonstrate, you both alleviate anxiety and encourage reading with a purpose. Is there anything they could do as they read to make things easier later?
For example, if they will be writing the symbol and theme essay, students might pick a symbolic element now and “cheat” by taking notes as they read. You may even want to give a simple, two-column chart to track key citations and their initial analysis. I like this method because it increases engagement and yields better student products.
Symbolic / thematic elements in A Raisin in the Sun:
- The check
- Beneatha’s hair
- Mrs. Johnson
- Mr. Lindner
- Joseph Asagai
- George Murchison
- Music (Nigerian, Jazz / blues, and hymns representing the characters).
- Clybourne Park
RELATED POST: A Raisin in the Sun Projects
While reading a A Raisin in the Sun…
Teach A Raisin in the Sun as you would a novel.
A Raisin in the Sun is a masterpiece and offers so much to digest that simply viewing a performance or reading it as a class is not going to cut it. Class time is not when students read the text for the first time; class time is for thoughtful analysis, collaboration, and performance.
Analyze word choice so that students understand how Hansberry creates mood and sense of time and place.
Explain how Hansberry selects every word and phrase with care. Her word choices enable her to set the stage as she imagines. Review word connotations (feelings / associations), figurative language, allusions, mood, and tone as needed. Have the students give analysis on key excerpts.
“That was a long time ago. Now the once loved pattern of the couch upholstery has to fight to show itself from under acres of crocheted doilies and couch covers which have themselves finally come to be more important than the upholstery.” (23)
The apartment and furnishings are described as weary, tired, undistinguished, worn, etc. The apartment is given human traits (personification) and fights to show how run-down it is. The dreams and optimism signified by the furnishings initially have faded, the mood is of low energy and discouragement.
Include other texts to get students thinking about symbolism.
When teaching A Raisin in the Sun, I have students review symbolism by reading a short story like “The Grandfather” by Gary Soto. I like this story because, despite its brevity, the symbol of the avocado tree has many facets (just as the check in A Raisin in the Sun represents money but also death, deferred dreams, and waiting for change). It also keeps with the plant/family motif. I want them practice the type of symbol analysis that they will apply to A Raisin in the Sun.
Each line and action in A Raisin in the Sun characterizes the members of the Younger family and illustrates their experience. Hansberry allows each of the main characters to build the case for their point of view on life.
Main characters lesson idea:
Get students to think about their own values. What about life is important to them? Try to redirect material values into abstract values (e.g. a smartphone might really be about valuing social connection). Explain that they will be using evidence from the play so far in order to draw conclusions about the characters’ points of view and values.
Each student or group is to analyze one character: Beneatha, Mama, Walter, Ruth, Joseph, or George. They must create a three-column chart to share with the class. Remind them to include the character’s values in the analysis. Students could work in small groups to create a larger chart to share.
Key values to discuss in teaching A Raisin in the Sun: Dignity, familial love, religion, romantic love, raising children, helping others, money, respect, sense of self, heritage, enlightenment, etc.
Have students analyze Beneatha’s search for identity.
- What is the importance of this thematic element?
- What is behind her compulsion to try so many forms of expression?
- How is her view on identity different from the rest of her family?
- How do other characters react to her interest in African heritage?
- What views on assimilation are discussed, and can we decipher Hansberry’s views on assimilation?
Explore minor characters in A Raisin in the Sun as symbols.
Minor characters in the play act as symbols. Mrs. Johnson’s main role, for example, is to represent internalized racism. Mrs. Johnson accepts the oppression of African Americans and expects the Youngers to do the same. She resents the Youngers’ ambitions as an indictment of her own acquiescence.
Have the students choose a minor character and analyze their symbolic importance:
- Mrs. Johnson
- George Murchison
- Mr. Lindner
- Willie Harris (in absentia)
- Joseph Asagai
Related post: A Raisin in the Sun Discussion Questions
Put Mrs. Johnson in the spotlight.
Mrs. Johnson, despite her thematic importance, does not make it into many productions. I feel she is an essential inclusion.
Of Mrs. Johnson Robert Nemiroff writes,
“….(Mrs. Johnson’s scene) is included here in any case, because it speaks to fundamental issues of the play, makes plain the reality that waits the Youngers at the curtain, and, above all, makes clear what, in the eyes of the author, Lena Younger – in her typicality within the black experience – does and does not represent.”
Mrs. Johnson serves as a foil to Mama. Although their stations in life are similar, Mama will never accept second-class citizenry. Mrs. Johnson represents acceptance of the status quo and even internalized racism that must be overcome.
I like to have students compare the poem “Booker T. and W.E.B” by Dudley Randall and Act II, scene 2 (Mrs. Johnson’s scene) of the play regarding the themes and creative choices. What are the two positions taken on how African Americans should advance? How do Dudley Randall and Hansberry approach the debate differently?
Have students perform dramatic readings with purpose.
Dramatic readings as part of teaching A Raisin in the Sun can be both engaging and thought-provoking. Be advised, everyone wants to be Walter. Assign roles and ask the students to perform them with appropriate tone and emphasis. (I have to keep a list of who has had roles from lesson to lesson to prevent arguments.)
Add purpose by having the students discuss what elements need to be emphasized by the actors and why. What is each character’s motivation in the scene? This practice puts the students in the director’s chair. Chart direction notes from the students before reading the scene. Afterwards, ask students to critique the reading with constructive criticism.
It is key that students conduct dramatic readings after reading the assignment so that the performance choices and discussions are meaningful.
Use Beneatha’s subplot to analyze structure.
Have students analyze the structure of the play by connecting Beneatha’s subplot to the larger plot. How does her romantic choice fit within the drama? What function does it serve? How do the two plots relate to one another?
After teaching A Raisin in the Sun…
Have students demonstrate mastery with symbolism presentations.
After completing the drama, have the students give presentations on the thematic importance of Hansberry’s symbols. Students should cite textual evidence and give thorough analysis of how the symbol helps develop a theme. Students should include explanations of how the symbol and theme connect to other literary elements.
Have students extend their learning through creativity, research, argument.
Here are four of the extension task ideas from my A Raisin in the Sun unit:
Research projects: Develop focus questions based on your study of A Raisin in the Sun. Conduct a research project demonstrating your ability to use search terms, use varied sources, synthesize findings, consider credibility / accuracy, quote, paraphrase, cite, and avoid plagiarism.
- Neighborhood integration and A Raisin in the Sun
- Lorraine Hansberry’s life and A Raisin in the Sun
- The Civil Rights Movement and A Raisin in the Sun
- The Women’s Movement and A Raisin in the Sun
Presentation of Knowledge and Ideas: In a cooperative group, stage one scene from the play. Adapt your speech appropriately for task, purpose, and audience. After the performance, read a rationale statement explaining the creative choices your group made and how they emphasize elements and reveal meaning.
Creative writing: Write an original drama. In a cooperative group, create a one-scene play focused on the thematic element of “The American Dream.” Make sure that you have a clear theme (about “The American Dream”), setting, conflict, plot, points of view, and other narrative elements.
Creative writing: Write an original narrative. Write a short story based on two key elements: “The American Dream” and symbolism. The rest is up to you. You can interpret “The American Dream” in any way that you want. Make sure to apply what you have learned about symbolism from studying A Raisin in the Sun. Your narrative must clearly demonstrate all of the key narrative elements: setting, plot, conflict, character development, and theme.
Thanks for visiting Teaching A Raisin in the Sun by Lorraine Hansberry
Teaching A Raisin in the Sun at the appropriate grade level has been a rewarding experience for me, and I think that my students learn a great deal from the unit. They always offer insightful comments, arguments, and observations. Students who have come back to their old school to visit me recall how much the play engaged them.
The play gives students access to discussing complex themes. I want my students to recognize that the Language Arts classroom is a place for exploring the complex, critical issues of their world. Hansberry’s themes on racism, sexism, heritage, identity, dreams, and money are still relevant today. | <urn:uuid:c6da2ce0-d542-44b0-bfc6-8f8a4f7b1573> | CC-MAIN-2022-05 | https://teachnovels.com/teaching-a-raisin-in-the-sun-by-lorraine-hansberry/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303884.44/warc/CC-MAIN-20220122194730-20220122224730-00318.warc.gz | en | 0.941014 | 3,923 | 3.015625 | 3 |
Towers are one of the most characteristic aspects of Tuscan architecture. During the Middle Ages and the Renaissance, in many Italian cities were built towers and bell towers, both for military or public purposes,as well as a symbol of wealth and nobility. In Tuscany there are some so famous that they are symbols of Italian art all over the world. Let’s take a look at the most particular ones.
Giotto’s bell tower
Giotto’s bell tower is one of the symbols of Florence. It testifies to the development of the Gothic architecture in 14th century. It is located in Piazza Duomo and is the bell tower of Santa Maria del Fiore, that is the Cathedral of the city. Its construction began in 1298 and from 1334 Giotto started working on it. Despite the death of the great master only 3 years later, his design was respected until the completion of the bell tower in 1359. The exterior decoration in Giotto style makes it an almost pictorial work and, according to many, makes it the most beautiful bell tower in Italy.
Towers of San Gimignano
San Gimignano is a beautiful village in the province of Siena, famous for its towers. From the Middle Ages the wealthy families came to build up to 72. Today there are only 14. Torre Rognosa, dating back to 1200, is the oldest one, also known as Clock Tower. While the highest is Torre Grossa, with its 54 meters. The most characteristic ones are the Twin Towers, built by the Salvucci Guelph family, to rival the pair of towers of Ardinghelli family. By walking you can discover many more towers fused inside the modern buildings.
Defensive towers of Monteriggioni
Monteriggioni is a tiny Tuscan village that has remained unchanged over time. The medieval structure is intact, as well as the walls, remained basically the original ones. In fact the city was never expugned. And almost all the defensive towers are still standing. They are 14 and surround the entire perimeter of the citadel. Through the route of patrol you can visit them, by walking on the walls and overlooking the watchtowers to enjoy a beautiful view. The village has been made famous all over the world thanks also to the video game Assassin’s Creed.
Guinigi Tower (Lucca)
Guinigi tower is the most characteristic tower of Lucca. It is part of a building realized by the Guinigi, a rich family of merchants who dominated the city in the 14th century. It is the only remaining of over 250 private towers erected in Lucca during the Middle Ages. It is built of stone and brick and is more than 44 meters high. On its top there is a roof garden, where large oaks were planted, now secular. You can reach the top by climbing over more than 200 steps, to enjoy the beautiful panorama of the village and the hills of Lucca.
The Leaning Tower of Pisa needs no introduction. It is one of the symbolic monuments of Italy in the world. The inclination of almost 4 degrees, due to land subsidence, is what makes it famous. It is basically the bell tower of the Cathedral of Santa Maria Assunta, 57 meters high and built starting from 1173. Its fascination is increased by the legend according to which Galileo Galilei used it for his experiment on the "falling bodies", which in reality never happened. But the tower has never ceased to amaze and that is why it was proposed as one of the Seven Wonders of the modern world. You really never took a picture pretending to hold it?
Mangia tower (Siena)
Mangia tower is the civic tower of the City Hall of Siena which is located in Piazza del Campo. Started in the 14th century, it is one of the oldest towers in Italy. It is about 88 meters high, with a square base and is made of brick, while the final part and the battlements are in marble. Its name comes from a singular character: Giovanni di Balduccio, one of the first bell-ringers marking the hours (before the installation of the automatic mechanism of the clock). He was called il Mangiaguadagni (the “Gain-eater”) or simply il Mangia (the “Eater”) for his famous expensive passion for food. He was also honoured with a statue that, lost for centuries, was found and restored and is still visible today in the courtyard of Palazzo Pubblico. | <urn:uuid:8b2d2baf-82ec-411b-b542-8d84cfb496ff> | CC-MAIN-2023-14 | https://www.visititaly.eu/places-and-tours/the-most-beautiful-towers-in-tuscany | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948932.75/warc/CC-MAIN-20230329023546-20230329053546-00391.warc.gz | en | 0.978162 | 962 | 3.0625 | 3 |
According to the United Nations Children’s Fund (UNICEF) and the World Health Organization (WHO), breastfeeding is one of the most powerful practices for promoting child survival and well-being when initiated within the first hour of birth, provided exclusively for six months, and continued up to two years or more with the provision of safe and appropriate complementary foods.
Among the many benefits of breastfeeding, it is believed to improve child survival, protect against life-threatening and chronic illnesses, promote healthy growth, boost early child development, and support healthy brain development.
Unfortunately, the reality is that breastfeeding is not always a possibility for all mothers, because successful lactation requires balancing a combination of physical, emotional, and even personal factors.
While some women manage to breastfeed with no complications, Canadian and U.S. surveys have shown 10% to 32% of mothers never begin breastfeeding, 4% stop within the first week of the baby’s life, and 14% stop breastfeeding before their baby is 2 months old.
This can happen for a variety of reasons, the most common are:
- Lactational Difficulties (physical discomfort while nursing or pumping, baby not satisfied with nursing, infant weaning on their own)
- Medical issues (concern about baby’s lack of weight gain, starting birth control or using other contraindicated medications, breast hypoplasia or glandular dysfunction)
- Personal conflicts (returning to work or school, negative experience with breastfeeding in the past, current or past sexual abuse)
- Infectious Diseases
The most frequent solution for the lack of breastfeeding is the use of infant formula as a way to fulfill the infant’s nutritional requirements.
Commonly, cow’s milk-based infant formulas are the substitute for mother’s milk as it is a globally available source of mammalian proteins with high nutritional value. Although this is the simplest solution for many babies, cow’s milk allergy (CMA) remains to be the most prevalent type of food allergy among infants, affecting up to 3.8% of small children. Adding to this, research shows that babies fed cow’s milk-based formula have a much higher risk of developing necrotizing enterocolitis (NEC) than babies fed breast milk.
NEC is a serious gastrointestinal condition that primarily affects premature babies. Because a preemie’s system is not as fully developed as an infant delivered at full term, formula is not as easily digested. As a result, bacteria can build up in the intestines causing inflammation and infection.
In some cases, NEC can lead to serious infections, cerebral palsy, other serious injuries and even death as the inflammation and infection can cause bowel perforation, which causes germs to leak into the abdomen.
What Can You Do When Breastfeeding is not an Option?
When breastfeeding is not an option, however, resorting to human donors’ milk is known to be the second best choice.
Human milk donors are typically healthy breastfeeding postpartum women with a surplus of milk who volunteer to donate milk.
It is available at human milk banks (HMBs), which are services that recruit breast milk donors and collect, pasteurize, and store the donors’ milk (end sentence here). It is then tested for bacterial contamination, and distributed to families.
Pasteurized donor milk provides the nutritional and immunologic benefits of breast milk while reducing infectious complications such as NEC in preterm or low birthweight infants compared to formula milk as the pasteurization process eliminates the risk of toxic, bacterial, or viral contamination while maintaining the nutritious and immunologic qualities of breast milk.
Oftentimes the cost of donor milk is too high for a new mother. That said, associations like the Human Milk Banking Association of North America (HMBANA) make it possible for babies to receive safe pasteurized donor human milk, regardless of their family’s ability to pay.
Knowing that there are alternatives that will help those who are not able to or decide not to breastfeed for various reasons can be of great relief, especially with the misconception that every mother can do it, and the risks that cow’s milk-based formulas may bring to those with premature babies.
If your baby developed NEC after being fed cow’s milk-base infant formula compensation may be available for your family to cover both past and future medical expenses, ongoing treatment your child needs, and your expenses as a parent such as loss of wages, child care, and funeral expenses if the NEC lead to the death of your child.
At Birth Injury Guide we are here to help and offer FREE legal consultations. To learn more about your legal rights and options, complete the form on this page or call 877-415-6603 now. | <urn:uuid:2d244af9-fac0-467b-b9b4-0e3a6e6cf8b7> | CC-MAIN-2023-50 | https://www.birthinjuryguide.org/2022/12/human-milk-donors-as-an-alternative-to-infant-formula/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100057.69/warc/CC-MAIN-20231129073519-20231129103519-00398.warc.gz | en | 0.935648 | 988 | 3.46875 | 3 |
What’s Really Happening With computer hardware
Students in bachelor’s diploma applications in computer know-how discover working methods, networking, security protocols and hardware. Some extent applications allow students to choose a spotlight, like internet expertise and multimedia, database enchancment, or digital safety. Graduates may be prepared for entry-diploma positions and professional certification. To be eligible for admission, students ought to have their highschool diplomas and acceptable ACT or SAT scores, along with some experience with computer systems. Although the motherboard is only one piece of circuitry, it is dwelling to a special one of the crucial important pieces of hardware: the processor. DOS, Microsoft Home windows XP and Mac OS are some examples of personal computer working applications. Server-level computers use working systems similar to UNIX and Microsoft Dwelling home windows Server. LINUX and BSD are versatile sufficient to be used both in a private laptop or as an working system in a server, relying on which components are put in.
While general information on software program engineer salary could present average incomes potential, computer software program engineer students ought to keep in mind different parts that influence incomes potential. For instance, the business graduates choose can affect financial alternatives. Whereas the computer methods design commerce employs basically the most individuals, prime-paying industries embody radio and tv broadcasting, subscription programming, and semiconductor manufacturing. Equally, faculty college students ought to take into consideration location. California affords a number of the highest salaries and job opportunities. Different parts embrace expertise and education ranges. Incomes a complicated software program engineering diploma signifies students possess specialised, chopping-edge knowledge and abilities, whereas expertise can mirror utilized understanding of ideas. This course will educate students how you can make the most of PowerPoint as presentation software program program.
On-line laptop repair corporations are rising as an essential part of the computer business. Pc repair firms provider is aware of your desires and could also be of great help to you. The Central Processing Unit (CPU; sometimes simply called processor) is a machine which will execute pc programs. It’s generally called the mind of the computer. Interview several pc networking suppliers providers before making up your thoughts. Evaluating explicit gives and analyzing the primary variations will assist you perceive the sector higher. You may also get some bonuses and particular affords by speaking to a whole lot of totally totally different pc network suppliers suppliers. Microsoft proclaims Phrase, initially referred to as Multi-Gadget Phrase. In a advertising blitz, Microsoft distributed 450,000 disks containing an illustration model of its Phrase program in the November issue of COMPUTER World journal, giving readers a chance to try this system completely free.
Hulu recorder permits you’re feeling no worries as to the way in which to document Hulu video clips. A step-by-step guide helps you report the film of 1’s choice as and when you like to doc, even if you are you watch it. Run the Hulu recorder, the streaming video recorder. Just earlier than recording, you could select in regards to the output file format you want to have and in addition the vacation spot on your output file is to be copied on the similar time. Utility software program program or Purposes are what most people think of once they think about software. Typical examples embrace workplace suites and video video games. Utility software program program is usually bought separately from pc hardware. Typically applications are bundled with the computer, but that doesn’t change the truth that they run as unbiased purposes. Purposes are normally unbiased purposes from the operating system, though they’re normally tailor-made for specific platforms.
By following the steps you see beneath, you may order the computer systems by PeopleSoft to be positioned on the Computer Depot. COMTS has chosen the minimal advisable hardware and works intently with the Depot to replace these bundles frequently. Don’t doubt this methodology! Truly it’s an effective and simple approach to repair with just a few of clicks. Error could perhaps be introduced on by registry error on the system. System Restore Instruments can fix not solely but in addition help you to detect and take away most of home windows system errors on your PC. the one value is the software program and in addition you on no account must remunerate for the packages you watch. The software additionally works effectively with any internet connection velocity. whether or not or not or not you are an impatient explicit individual, overlook this. At this time, there is a pc satellite tv for pc television software program that lets you rapidly settle for hundreds of purposes from worldwide networks. | <urn:uuid:08e4bbc8-f840-42a1-b7f3-ef3bdbfcec94> | CC-MAIN-2021-17 | http://whsgames.net/whats-really-happening-with-computer-hardware | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038064520.8/warc/CC-MAIN-20210411144457-20210411174457-00276.warc.gz | en | 0.930147 | 935 | 2.671875 | 3 |
Social forces are never identical in nature. Some social forces are reactionary; some are oriented toward innovation and to some extent revolution. In history, religion, government, and the educational system were seen as conservative social forces that attempted to motivate individuals to act conservatively. They were seen as forces that prevent innovation and progress; their form was highly oriented toward maintaining order in society. With the coming of the 19th century, there were social forces that successfully destroyed the old order.
The individual became the focus and motivation of that century. The individual offered the only possible means for the society to achieve progress, since it is the “individual” that creates innovation and challenge. This was true for the dominant group. During that time, there was no complete understanding of the concept of juridical equality, equality between genders, religious liberty, and political liberalization.
Some groups were more powerful than others. Some groups were more oppressed than others. The individual was the icon of the dominant group.There were two forces that propelled progress for the oppressed group. The individual became the focus of massive racial unrest. It became the embodiment of dream, progress, and equality. The sacrifice of individuals like King, Gordon, and others became the starting point of “revolution.
” This revolution was oriented towards racial equality. It was a new revolution where ideas reign and blood disregarded. For these individuals, racial equality was the first step towards “genuine progress.” The second force was somewhat “odd.” In the 17th century, it was the main conservative social force. During the 20th century, it became one of the most progressive social institutions.
The educational system would serve as the learning center of the new ideals of the century; that is, the means for the “individual” to communicate his/her ideas “to the larger community.” Through this, progress can be achieved without resort to unethical ideals. The oppressed group then would become a self-esteem group. | <urn:uuid:34acb8bc-c267-4b3f-bacc-d719c2042737> | CC-MAIN-2021-21 | https://bereavementpractitioners.org/essay-social-forces-progress-focus-oppressed-group/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989030.65/warc/CC-MAIN-20210510003422-20210510033422-00372.warc.gz | en | 0.985794 | 408 | 3.78125 | 4 |
The following announcement was written by the folks at Findmypast:
This week’s Findmypast Friday marks the release of two brand US collections that will help you learn more about your immigrant ancestors.
United States Naturalization Petitions contains more than 7.8 million records spanning the years 1905 to 1950. The collection currently covers four states: Connecticut, Massachusetts, New York, and Pennsylvania, and allows you to discover when and where your immigrant ancestor was born, how old they were when they first crossed the Atlantic and their port of entry. Images of the original documents may even include a photograph of your ancestor.
The United States government began to regulate the naturalization process, including the forms and courts authorized, in September 1906 with the formation of the Bureau of Immigration and Naturalization (later known as the Immigration and Naturalization Services (INS)). The changes that followed included more information being taken from applicants during the naturalization process as forms required applicants to record their occupation, birth date, and names of spouse and children.
Discover when, where, and why your ancestors travelled with over 800,000 US Passport Application records. Applications may also include a physical description, your ancestor’s occupation, residence, naturalization details, the name of their spouse, date of birth and place of birth. Most applications are one to two pages in length and, from 21 December 1914 onward, photographs of applicants are also included.
The collection has been compiled from the National Archives and Records Administration (NARA) collection M1490. Images of the original documents are included and may reveal additional details of your ancestor’s citizenship, such as when and from where they immigrated, by what means they arrived in the United States, and when they were naturalized. For those born in the United States, you may learn details of their fathers’ naturalization such as their full name, birthplace, and date and place of emigration. Additional details were also recorded such as the applicant’s eye color as well as descriptions of their mouth, nose, forehead, chin, complexion, face, and hair color.
Earlier passport applications, from 1795 for example contain fewer details. However, they would still include name, age, and physical description.
Don’t forget to regularly check our dedicated Findmypast Friday page to keep up to date with all the latest additions. | <urn:uuid:7922e700-1f7f-4443-b94c-b56cd4fcaed8> | CC-MAIN-2017-51 | https://blog.eogn.com/2016/07/08/more-than-8-7-million-new-us-immigration-and-travel-records-available-to-search-this-findmypast-friday/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948530668.28/warc/CC-MAIN-20171213182224-20171213202224-00659.warc.gz | en | 0.973568 | 483 | 2.53125 | 3 |
As I penned this editorial in mid-May, the internet was abuzz with news and images of people in some parts of the US East Coast panic-buying large volumes of gasoline. The behavior was driven by the closure of the Colonial Pipeline, the largest petroleum artery in the US, after its operator was targeted by a ransomware attack perpetrated by Russian hackers. Although the pipeline was closed for less than a week, individuals filled both approved gasoline containers and improvised ones with gas in nervous anticipation of a dearth of the crucial resource.
Last year, in the early days of the COVID-19 pandemic, shoppers similarly rushed to hoard obscene amounts of toilet paper and cleaning products, their consumer drive shifted into high gear by a looming catastrophe. As COVID-19 swept through communities and workplaces, infecting tens and then hundreds of thousands around the world and killing thousands every day, high among citizens’ and retailers’ worries was that the pandemic would disrupt supply chains. History is littered with similar examples of panic buying, large and small. Humans have a tendency to gorge themselves on critical resources as crises approach, even if facts on the ground don’t necessarily warrant such panic.
What is it about our psychology that makes us vulnerable to such behavioral swings? Sadly, the scientific literature surrounding this phenomenon is somewhat lacking. Most of the papers that do address it were spawned by panic buying that resulted from the start of the COVID-19 pandemic. According to a review paper published in May of last year, four factors likely drive this impulse: the perception of a coming crisis and corresponding resource scarcity, fear of the unknown, coping behavior triggered by control deprivation, and social-psychological factors including social network dynamics.
While it is easy to deride as illogical the people seen in viral images stocking up on toilet paper, gasoline, or hand sanitizer, the urges undergirding this behavior are intimately familiar to anyone who has lived through the past 18 months. Ironically, it is panic buying that can break the very supply chains that are perceived to be imperiled by crises such as pandemics. In the COVID-19 era, there have been shortages of particular goods, and some businesses have suffered immensely due to the disruption the outbreak has wrought. But arguably, panic buying has been more central to breaking supply chains and causing some shortages than the actual disease spurring the disruptions.
As the authors of the aforementioned review suggest, better understanding of the biology behind panic buying “offers some implications for health professionals, policy makers, and retailers on implementing appropriate policies and strategies to manage panic buying.” Putting an end to this practice can help to insulate the supply chains that COVID-19 has revealed as more fragile than they should be.
Watching recent events unfold, another thought that occurred to me was how impressively some of the people navigating our new reality have avoided panic, maintaining a calm and focused course. One of these people is Nicola Petrosillo, this month’s Critic at Large. A veteran of infectious disease outbreaks—attending to patients in Italy during the SARS epidemic of the early 2000s and running an Ebola hospital in Nigeria as that viral scourge ravaged western Africa in the past decade—he has seemingly never wavered from a logical and scholarly approach. Even as Petrosillo, an infectious disease physician and researcher at Rome’s Lazzaro Spallanzani National Institute for Infectious Diseases, cared for COVID-19 patients last year and saw his hospital fill to bursting with sick and dying people, he retained his trust in science. In this issue, he writes about the utility of studying not only SARS-CoV-2 but also other coronaviruses that have sparked deadly outbreaks in order to get a more complete sense of how to end this pandemic and avoid the next one.
It’s this devotion to logic, even in the face of intense emotional turmoil, that I feel is key to steering humanity in the right direction now and in the future. Here’s hoping that we find a way, as a society, to make such calm reason widespread as we stare down crises that come our way. | <urn:uuid:4f6901a7-1ce6-4509-aa6c-8c8d3571e4c9> | CC-MAIN-2023-40 | https://www.the-scientist.com/editorial/the-psychology-of-panic-68824?utm_source=DamnInteresting | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511364.23/warc/CC-MAIN-20231004084230-20231004114230-00839.warc.gz | en | 0.966473 | 853 | 2.984375 | 3 |
The Church of the House of Peter
Archeological investigations carried out over a 70-year period (at the beginning of the 20th century) by the Studium Biblicum Franciscanum (Jerusalem) revealed an octagonal mid-5th-century ecclesiastical structure built around an earlier one-room dwelling dated to the 1st century CE. The central octagonal shrine, enclosing a dry-wall basalt structure, was surrounded by an octagonal ambulatory similar to the ambulatory in the Rotunda of the Holy Sepulcher in Jerusalem; or the later octagonal Islamic shrine built on the Haram esh-Sharif (the Temple Mount).
The room contained within the central octagonal shrine appears to have been part of an insula (a complex of small single-storey residential rooms and courtyards) that toward the end of the 1st century was put to public use, possibly as a domus ecclesia, a private house used as a church. The plastered walls of the enshrined room were found to be scratched with graffiti in Aramaic, Greek, Syriac and Latin, containing the words "Jesus", "Lord", "Christ" and "Peter".
The enshrined room is presumed to be the "House of Simon, called Peter" reported by the Spanish pilgrim, the Lady Egeria, who visited the town sometime between 381-384 during her pilgrimage to the Holy Land. She described in some detail how the house of "the prince of Apostles" had been made into a church, with its original walls still standing.
In the mid-5th century, this room was enshrined within an octagonal-shaped building. This was the church later described by the 6th-century Piacenza Pilgrim who wrote, "The house of St. Peter is now a basilica." Like the nearby synagogue, the octagonal-shaped church was destroyed early in the 7th century, possibly at the time of the Persian invasion.
The present Franciscan church was built in 1990 over the site of the Insula Sacra to preserve the archeological finds and to permit visitors and worshippers an overview of the various architectural elements.
Source: Israeli Foreign Ministry | <urn:uuid:9124869a-7cbb-44a0-8c31-056fe1187274> | CC-MAIN-2013-48 | http://www.jewishvirtuallibrary.org/jsource/Archaeology/stpeter.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345771702/warc/CC-MAIN-20131218054931-00080-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.974936 | 455 | 3.28125 | 3 |
Cowboy camp in the Needles area (circa 1938) Ranching
From the 1880s to 1975, local ranches used much of Canyonlands for winter pasture. Cowboys searched the canyons for good feed and water. They constructed trails to move their stock across the rugged terrain. To guard their herds, cowboys lived in primitive camps for weeks at a time. The Cave Spring Trail in the Needles District features one such camp. Places throughout the park bear the names of early cowboys. The Taylor, Holeman and Shafer families grazed cattle and sheep in what is now the Island in the Sky. Don Cooper, Mel Turner, D.L. Goudelock and Joe Titus ranched the Indian Creek area. Their holdings under the Indian Creek Cattle Company were bought by the Scorup and Sommerville families in 1914. Headquartered at the Dugout Ranch outside the Needles District, the Indian Creek Cattle Company operates today under ownership of the Nature Conservancy.
The Biddlecome, Ekker, Tidwell and Chaffin families wintered animals in the Maze. The Ekker Ranch grazed cows on lands adjacent to the Maze until 2000. In addition to cattle and sheep, the rugged country around the Maze harbored outlaws. Robbers Roost, a mesa top west of the Maze, provided refuge for Robert Leroy Parker (a.k.a. Butch Cassidy), Tom and Bill McCarty, Matt Warner and others.
The growth of America's nuclear arms program in the 1950s created a high demand for uranium. Geologists thought that Utah's canyon country contained a significant amount of uranium, but the rugged terrain made access difficult. To encourage prospectors, the Atomic Energy Commission offered monetary incentives and built almost 1,000 miles of road in southeast Utah. In Canyon-lands, these roads include the popular White Rim Road at the Island in the Sky..Though the region produced substantial amounts of uranium, miners discovered very little in what is now Canyonlands. However, the newly created roads led to other discoveries. For the first time, much of Canyonlands could be seen from a car. Tourism slowly increased as more people learned about the area's geologic wonders. By opening canyon county to travel, the miners blazed the trail for the creation of a National Park. | <urn:uuid:00e9cce0-5257-483e-b797-41785bf94cb5> | CC-MAIN-2019-13 | https://www.us-parks.com/canyonlands-national-park/mining-and-ranching.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201521.60/warc/CC-MAIN-20190318172016-20190318194016-00506.warc.gz | en | 0.942536 | 473 | 3.375 | 3 |
To those unfamiliar with the mysteries of Houston, a visit to Hogg Bird Sanctuary yields surprising results. When you turn at the traffic-choked intersection of Memorial Drive and Westcott, then park in the lot across from Bayou Bend, the Museum of Fine Arts Houston satellite location that was once home to Ima Hogg, you don’t expect that you’re about to enter a wooded wonderland. But once you’ve stepped out of the parking lot and into the sanctuary, carved out of forest and terrain that’s downright hilly by Houston standards, you feel almost completely removed from the roaring city just a few yards away.
With a few more steps you’re at the edge of a steep and unexpectedly tall cliff overlooking an oxbow bend in the bayou below, its graceful arc framed by trees. You’re standing in one of the most dramatic spots, natural or man-made, the city has to offer. Given Houston’s when-in-doubt-pave-it ethos, the thought that you’re on the edge of a highly developed and well-monied neighborhood just minutes from downtown produces a touch of vertigo.
This stretch of Buffalo Bayou might be beautiful, but it is not altogether healthy. Decades of intense development, along with the construction of two rather fragile and frequently flushed upstream dams, have constrained the bayou’s floodplain while increasing the volume it’s expected to carry. As a result, erosion has become a sizeable problem—one that the Harris County Flood Control District is attempting to address with a highly contentious “stream restoration” known as the Memorial Park Demonstration Project.
According to the HCFCD website, “Erosion in the project area has caused bank failures, loss of public and private land, and a reduction in ecological functions, such as water quality and habitat.” The sheer cliff at the Hogg Bird Sanctuary is, in part, a result of this erosion.
The problem became severe enough that the Bayou Preservation Association, founded in the 1960s by environmental activist Terry Hershey, among others, to protect Buffalo Bayou from the brutal concrete channelizations that other Houston-area bayous suffered at the hands of the HCFCD and the Army Corps of Engineers, undertook a study of how to deal with erosion in 2010.
According to the HCFCD website, “experts in the fields of fluvial geomorphology and natural channel design” were brought in to perform studies and make recommendations. Based in part on the Bayou Preservation Association’s study, the HCFCD is seeking a permit from the Army Corps of Engineers to implement its recommendations.
In the HCFCD’s demonstration project, 5,800 feet of the bayou winding through the Hogg Bird Sanctuary and Houston’s River Oaks neighborhood will have its vegetation, including its riparian forest, scraped bare. Then the banks will be graded to a gentle slope, among other steps, to “restore Buffalo Bayou to a natural, stable condition.”
Despite its origins in the Bayou Preservation Association, the plan has provoked a thunderous backlash from environmental and community activists, who say it’s far too drastic. Led by environmental attorney Jim Blackburn, activist Frank Salzhandler, writer Olive Hershey and others, opponents claim that the project will destroy the bayou in its attempt to save it. They point out that even if vegetation eventually grows back on the bayou’s razed banks, hundreds of species of birds and animals now living there will be forced from their habitat. The bayou itself, opponents say, will be transformed into “a drainage ditch,” like Houston’s other channelized bayous, albeit without their concrete lining. They argue that erosion can be addressed through less destructive measures, and that in any event the HCFCD proposal is “not real science,” as more than one activist argued at a recent community meeting.
Crying “follow the money,” some attendees at that meeting expressed outrage that their beloved bayou would be reshaped in part to benefit the River Oaks Country Club, whose golf course has suffered erosion at its riverine edges. (River Oaks Country Club has agreed to pay one-third of the $6 million project’s costs, with the City of Houston and the Harris County Flood Control District paying the rest). Carlos Calbillo, a community activist from the heavily Latino Second Ward, suggested that the project could be a stalking horse for further development of a San Antonio Riverwalk-type development to the stretch of the bayou that runs through the eastside ward.
Proponents, on the other hand, say the plan is necessary, if regrettable. “Our board voted to support the project only after much careful deliberation,” says Shellye Arnold, executive director of the Memorial Park Conservancy (Buffalo Bayou runs through Memorial Park). She says that if erosion is not addressed, “the bayou is going to fall in on itself.”
Due to the intensity of public response, the Army Corps of Engineers recently extended the comment period regarding the HCFCD proposal until June 30. The Corps can ultimately approve the proposal, or reject it based on a number of criteria, including its potential impact on water quality and its cumulative—as opposed to localized—effect on the waterway. Public comments serve as the equivalent of a public hearing in the Corps’ permitting process, and both sides are urging their supporters to weigh in. | <urn:uuid:ecc435af-59fb-4a56-be83-2bc466b0c5ba> | CC-MAIN-2020-05 | https://www.texasobserver.org/buffalo-bayou/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594662.6/warc/CC-MAIN-20200119151736-20200119175736-00156.warc.gz | en | 0.950649 | 1,154 | 2.71875 | 3 |
|Lesson Plan ID:
Historic Indian Tribes of Alabama
This lesson will focus on researching, analyzing, and comparing the culture of four Indian tribes from Alabama's history. The rich culture of the Cherokee, Creek, Chickasaw, and Choctaw Indian tribes contributed to the rich history of Alabama. Collaborative research in small groups will culminate in presenting knowledge with a variety of visual and oral presentations.
|TC2(3-5) ||5. Practice safe use of technology systems and applications. |
|TC2(3-5) ||6. Describe social and ethical behaviors related to technology use. |
|TC2(3-5) ||8. Collect information from a variety of digital sources. |
|TC2(3-5) ||9. Use technology tools to organize, interpret, and display data. |
|SS2010(3) Geographic and Historical Studies: People, Places, and Regions||13. Describe prehistoric and historic American Indian cultures, governments, and economics in Alabama. (Alabama) |
|Primary Learning Objective(s):
Students will research and classify the Indian cultures in Alabama's history.
Students will create graphic organizers to compare and contrast the cultures of Alabama's historic Indians.
Students will present timelines indicating major events and accomplishments of each tribe.
|Additional Learning Objective(s):
|Approximate Duration of the Lesson:
|| Greater than 120 Minutes|
|Materials and Equipment:
Clear folders for reports, Alabama: Its History and Geography textbook, markers, posters, colored pencils and student-made Alabama fact booklets and posters, overhead projector w/transparencies, TV/VCR
|Technology Resources Needed:
Computers with Internet access, printer
The teacher will need to find and preview a Native Americans of Alabama video and bookmark age- and content-appropriate websites.
Students will need to be familiar with graphic organizers and basic Internet use.
1.)Day 1: Introduce to the class the four historic Indian tribes to be discussed and researched during the week. Students will watch a video of these Indian tribes of Alabama. Divide the class into four groups and assign each a tribe to research by having them draw a tribe name at random from an envelope.
2.)Day 2: Groups will silently read from their Alabama: Its History and Georgaphy textbooks about their tribe's contribution, tradition, custom, dress and social life. After reading, groups will draw pictures of some aspect of their tribe. Important information about the tribe's history will be collected for oral presentations.
3.)Day 3: In class computer use - Students will work to find websites providing information in preparation for the "Show and Tell" oral presentation. (Internet searching is often difficult for young students. The teacher should closely guide this step providing recommended search terms if needed. Also, previsited websites that the teacher can recommend should also be available.)
5.)Day 4: Groups will organize their information in presentation form using timelines, graphic organizers, charts and posters for the "Show and Tell" presentation on Day 5. Each student in the group will be responsible for bringing at least one thing their Indian tribe contributed to our state. Students will then create a 2-page poster spread.
(Create a Timeline in MS Excel
)Simple directions for creating a timeline.
7.)Day 5: Students will present their findings to the rest of the class using graphic organizers, timeline of the era and pictures of the tribes during a 5-minute oral presentation.
|Attachments:**Some files will display in a new window. Others will prompt you to download.
Students may be provided extra preparation time and assistance if they are having difficulties obtaining facts or searching the Web.
Each area below is a direct link to general teaching strategies/classroom
for students with identified learning and/or behavior problems such as: reading
or math performance below grade level; test or classroom assignments/quizzes at
a failing level; failure to complete assignments independently; difficulty with
short-term memory, abstract concepts, staying on task, or following directions;
poor peer interaction or temper tantrums, and other learning or behavior problems.
|Presentation of Material
||Using Groups and Peers
|Assisting the Reluctant Starter
||Dealing with Inappropriate
Be sure to check the student's IEP for specific accommodations.
|Variations Submitted by ALEX Users: | <urn:uuid:3ae916be-935e-4b24-a77f-ec9550d9c0fe> | CC-MAIN-2015-11 | http://alex.state.al.us/lesson_view.php?id=12824 | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464088.46/warc/CC-MAIN-20150226074104-00173-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.857336 | 917 | 4.03125 | 4 |
A naumachia was the reenactment of a naval battle in a basin or on a lake, a popular albeit costly – and for the participants deadly – entertainment of the masses in ancient Rome. The term naumachia was also used for the location at which the games took place.
Our current read, Sand of the Arena, opens with an imaginative happening of the naumachia of Nero – “…he also exhibited a naval battle in salt water with sea monsters swimming about in it” according to Suetonius’ Life of Nero.
Smith's Dictionary via LacusCurtius has this to say (please note the many e-text links):
NAUMA‑CHIA was the name given to the representation of a sea-fight among the Romans, and also to the place where such engagements took place. These fights were sometimes exhibited in the Circus or Amphitheatre, sufficient water being introduced to float ships, but more generally in buildings especially devoted to this purpose. The first representation of a sea-fight on an extensive scale was exhibited by Julius Caesar, who caused a lake to be dug for the purpose in a part of the Campus Martius, called by Suetonius the “Lesser Codeta” (Dion Cass. XLIII.23; Suet. Jul. Caes. 39); this lake was afterwards filled up in the time of Augustus on the account of the malaria arising from the stagnant water in it (Dion Cass. XLV.17). Augustus also dug a lake (stagnum) near the Tiber for the same purpose, and planted around it a grove of trees (nemus) (Suet. Aug. 43; Tacit. Ann. XII.56, XIV.15). This naumachia was the first permanent one; it continued to be used after others had been made, and was subsequently called the “vetus naumachia” (Suet. Tit. 7; Dion Cass. LXVI.25; Ernesti, ad Suet. Tib. 72). Claudius exhibited a magnificent sea-fight on the lake Fucinus (Tacit. Ann. XII.56; Suet. Claud. 21 ; Dion Cass. LX.33). Nero appears to have preferred the amphitheatre for these exhibitions. Domitian made a new naumachia, and erected a building of stone around it, in which the spectators might sit to see the engagement ( Dion Cass. LXVI.8; Suet. Dom. 4, 5). Representations of naumachiae are sometimes given on the coins of the emperors. (Scheffer, de Militia Navali, iii.2 pp189, 191).
The combatants in these sea-fights, called Naumachiarii (Suet. Claud. 21) , were usually captives (Dion Cass. XLVIII.19) or criminals condemned to death (Dion Cass. LX.33), who fought as in gladiatorial combats, until one party was killed, unless preserved by the clemency of the emperor. The ships engaged in the sea-fights were divided into two parties, called respectively by the names of two different maritime nations, as Tyrians and Egyptians (Suet. Jul. 31), Rhodians and Sicilians (Suet. Claud. 21 ; Dion Cass. LX.33), Persians and Athenians (Dion Cass. LXI.9), Corcyraeans and Corinthians, Athenians and Syracusans, &c. (id., lxvi.25). These sea-fights were exhibited with the same magnificence and lavish expenditure of human life as characterised the gladiatorial combats and other public games of the Romans. In Nero's naumachia there were sea-monsters swimming about in the artificial lake (Suet. Nero, 12; Dion Cass. LXI.9), and Claudius had a silver Triton placed in the middle of the lake Fucinus, who was made by machinery to give the signal for attack with a trumpet (Suet. Claud. 21) . Troops of Nereids were also represented swimming about (Martial, de Spect. 26). I n the sea-fight exhibited by Titus there were 3000 men engaged (Dion Cass. LXVI.25), and in that exhibited by Domitian the ships were almost equal in number to two real fleets (paene justae classes, Suet. Dom. 4). In the battle on the lake Fucinus there were 19,000 combatants (Tacit. Ann. XII.56) and fifty ships on each side (Dion Cass. LX.33).
Known sponsors were Gaius Julius Caear and the emperors Augustus, (probably) Tiberius, Caligula, Claudius, Nero, Titus, Domitian, and Trajan. According to this Wikipedia article, Trajan's naumachia basin was discovered in the 18th century on the grounds of the Vatican City. It had bleachers and the surface was about one sixth the size of the Augustan naumachia. In the absence of any texts, it has to be assumed that it was only used at the time of Trajan. (see Naumachia Vaticana). Also, there, was a Naumachia Philippi (Philip the Arab), which may have been a restoration of the Naumachia Augusti.
Google Books has a related page from Daily Life in Ancient Rome: The People and the City at the Height of the Empire by Jerome Carcopino (revised 2003 with new material to the second edition 1968, Yale University Press, with an introduction & bibliographic essay by Mary Beard – neither of which, unfortunately, is online). Bryn Mawr Review.
Modern naumachiae were performed in France in 1550 in Rouen for Henri II and Catherine de' Medici – view the illustration at the bottom of Fête triomphale et naumachie sur la Seine pour l’entrée royale d’Henri II à Rouen en 1550 – and in Milan in 1807 for Napoleon (figures, doesn't it?). | <urn:uuid:f9428152-f1f1-4ff4-9be7-3afd408e6e59> | CC-MAIN-2017-04 | http://romanhistorybooks.typepad.com/roman_history_books_and_m/2007/03/naumachia.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00081-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.949235 | 1,298 | 3.578125 | 4 |
Tardigrades, or Water Bears, are a distinctive group of small (usually less than 1 mm) invertebrates related to Arthropods, Nematodes and Velvet Worms. They have a simple segmented body with four pairs of limbs, and are remarkably resilient to environmental stress, being able to withstand extremely high and low temperatures, complete desiccation and even exposure to vacuum. To date about 1200 species of Tardigrade have been described, from marine, freshwater and terrestrial environments. Of these, less than 250 have been described from South America, the majority of these from Chile, Argentina and Brazil.
In a paper published in the journal ZooKeys on 27 September 2017, Oscar Lisi of the Grupo de Investigación MIKU at the Universidad del Magdalena, and the Dipartimento di Scienze Biologiche, Geologiche e Ambientali at the Università di Catania, Anisbeth Daza and Rosana Londoño, also of the Grupo de Investigación MIKU at the Universidad del Magdalena, and Sigmer Quiroga of the Programa de Biología at the Universidad del Magdalena, describe a new species of Tardegrade from the Sierra Nevada de Santa Marta Mountains of Colombia.
The new species is placed in the genus Bryodelphax, and given the specific name kristenseni, in honour of Reinhardt Møbjerg Kristensen, of the Natural History Museum of Denmark and University of Copenhagen, for his work on Tardigrade taxonomy. The species is described from eleven specimens collected from Lichen, Moss and Liverworts at two locations in the Sierra Nevada de Santa Marta Mountains. These range from 106 to 131 μm in length, are apparently eyeless and covered in armoured plates.
Drawings of the dorsal (A) and ventral (B) plates arrangement of Bryodelphax kristenseni. Lisi et al. (2017).
Follow Sciency Thoughts on Facebook. | <urn:uuid:d8dc1b55-7e7e-4fdb-a1c8-ef5d978ea22e> | CC-MAIN-2019-30 | https://sciencythoughts.blogspot.com/2017/09/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195529481.73/warc/CC-MAIN-20190723172209-20190723194209-00279.warc.gz | en | 0.839415 | 428 | 3.546875 | 4 |
The Mahakal Mandir in Darjeeling is very popular and highly revered religious temple which is dedicated to Lord Shiva. Also known to the locals as the “Holy Hill”, it is just a few minutes’ walk from the Chowrasta and is situated on the highest ridge of the town. The Mahakal temple atop the hill is a revered place for the locals and visitors will be surprised to find a Hindu priest and a Buddhist monk sharing a common altar.
The Mahakal Mandir holds religious significance both for Hindus and Buddhist living in Darjeeling. The temple is a unique amalgamation of the two most important religions of the region. Legend has it that the place where the temple stands today was once home to a Buddhist Monastery. Besides the main temple there are other smaller temples dedicated to Gods like Kali, Durga, Ganesh, Hanuman etc. There is also a cave which is considered to be sacred and worshipped by the people. The sound of the Hindu temple bells amidst the fluttering Buddhist flags give a serene and divine atmosphere.
The Observatory Hill where the temple stands today is considered to be the very place from where civilization in Darjeeling started. Initially this was the only place inhabited by people before the population began to spread and took the form of present Darjeeling. Myth also has it that the place was initially home to a Buddhist monastery and was under the rule of the kingdom of Sikkim. It is believed that the town Darjeeling got its name from the word “ Dorje-Ling” or the Land of the Thunderbolt, a name given by the monks of the monastery.
The present day temple is built in the Hindu architecture. It is round in shape with the Shiva-linga placed at the center. Along with the shiva-linga there are also idols of Buddha. The statue of Nandi, the scared bull of Lord Shiva adorns the entrance of the temple. The main entrance is lined by the Hindu bells and the Buddhist prayer flags. Among all the important festival celebrated here Siva Ratri is the most important, during this festival people are seen in huge number to offer prayers at Mahakal Temple. Other than Shiv Ratri, many other pujas like Saraswathi Puja, Ganesh Puja, Hanuman Puja, Durga Matha Puja, Buddha Jyanti etc are celebrated with grandeur. The tranquil atmosphere here provides a very spiritual experience. | <urn:uuid:1daa2d97-5202-4c3e-bae3-ec4d475475ba> | CC-MAIN-2020-05 | https://1001things.org/mahakal-mandir-darjeeling/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601615.66/warc/CC-MAIN-20200121044233-20200121073233-00226.warc.gz | en | 0.967849 | 505 | 2.65625 | 3 |
The ivory-billed woodpecker is the largest of all woodpeckers in the United States and the third largest in the world. It was once thought to be extinct until a live male was seen in Arkansas in 2004. There is also a possible surviving population in Cuba. Adults can reach up to 20 inches tall and weigh about 20 ounces, and their wingspans reach about 30 inches. They are shiny blue-black in color with white markings on the neck
and back. As its name suggests, the bill of the ivory-billed woodpecker is ivory in color. Males are easily recognizable because they have a crest that is black along the front edge and red on the side and rear.
Ivory-billed woodpeckers were once found in a variety of habitats such as swamps and swine forests where large amounts of dead or decaying trees were present. Their enormous bills allowed them to hammer, wedge, and peel the bark off of dead trees to find food. Diet consists mainly of larvae of wood-boring beetles, seeds, fruit, and other insects. These birds are known to pair and mate for life and even travel together. Mating occurs between January and May, and the female gives birth to two to five eggs. Both parents help with incubating the eggs for three to five weeks, and the male is known to take over mainly at night. When the eggs hatch, both parents feed and continue to care for the young.
This species was once found from the southeastern U.S. to Cuba, but much of its habitat has been lost to logging, mining, and the building of plantations.
Conservationists continue to search for surviving specimens in the mountains of southern Cuba and in Arkansas and Florida. As of April of 2009, a $50,000 reward is being offered by the "Nature Conservancy" for information leading to the discovery of an ivory-billed woodpecker nest, roost or feeding site, and conservationists are already planning land acquisition and restoration efforts to protect any possible surviving woodpeckers.
Do you think you may have seen an ivory-billed woodpecker? It may be a case of mistaken identity. You may have seen the pileated woodpecker which very closely resembles the ivory-billed woodpecker and has a much larger range. If you still believe you have seen an ivory-billed woodpecker, contact the Nature Conservancy.
Copyright Notice: This article is licensed under the GNU Free
Documentation License. It uses material from the Wikipedia article "Ivory-billed woodpecker".
Ivory-billed Woodpecker Facts Last Updated:
May 9, 2017
To Cite This Page:
Glenn, C. R. 2006. "Earth's Endangered Creatures - Ivory-billed Woodpecker Facts" (Online).
Accessed 9/18/2019 at http://earthsendangered.com/profile.asp?sp=939&ID=9.
Need more Ivory-billed Woodpecker facts? | <urn:uuid:104b9df3-0ccd-4f8f-9dc5-1dcb4fc9ed39> | CC-MAIN-2019-39 | http://www.earthsendangered.com/profile.asp?gr=B&view=c&ID=9&sp=939 | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573309.22/warc/CC-MAIN-20190918151927-20190918173927-00435.warc.gz | en | 0.964936 | 630 | 3.65625 | 4 |
Scripture: Matthew 12:1-8
1 At that time Jesus went through the grainfields on the Sabbath; his disciples were hungry, and they began to pluck heads of grain and to eat. 2 But when the Pharisees saw it, they said to him, "Look, your disciples are doing what is not lawful to do on the Sabbath." 3 He said to them, "Have you not read what David did, when he was hungry, and those who were with him: 4 how he entered the house of God and ate the bread of the Presence, which it was not lawful for him to eat nor for those who were with him, but only for the priests? 5 Or have you not read in the law how on the Sabbath the priests in the temple profane the Sabbath, and are guiltless? 6 I tell you, something greater than the temple is here. 7 And if you had known what this means, `I desire mercy, and not sacrifice,' you would not have condemned the guiltless. 8 For the Son of man is lord of the Sabbath."
Meditation: What does the commandment "keep holy the Sabbath" require of us? Or better yet, what is the primary intention behind this command? The religious leaders confronted Jesus on this issue. The "Sabbath rest" was meant to be a time to remember and celebrate God's goodness and the goodness of his work, both in creation and redemption. It was a day set apart for the praise of God, his work of creation, and his saving actions on our behalf. It was intended to bring everyday work to a halt and to provide needed rest and refreshment.
Mercy and not sacrifice
Jesus' disciples are scolded by the scribes and Pharisees, not for plucking and eating corn from the fields, but for doing so on the Sabbath. In defending his disciples, Jesus argues from the Scriptures that human need has precedence over ritual custom. In their hunger, David and his men ate of the holy bread offered in the Temple. Jesus also quoted of the Sabbath work involved in worship in the Temple. This kind of work was usually double the work of worship on weekdays. Jesus then quotes from the prophet Hosea (6:6): I desire mercy, and not sacrifice. While the claims of ritual sacrifice are important to God, mercy and kindness in response to human need are even more important. Do you honor the Lord in the way you treat your neighbor and celebrate the Lord's Day?
"Lord, make us to walk in your way: Where there is love and wisdom, there is neither fear nor ignorance; where there is patience and humility, there is neither anger nor annoyance; where there is poverty and joy, there is neither greed nor avarice; where there is peace and contemplation, there is neither care nor restlessness; where there is the fear of God to guard the dwelling, there no enemy can enter; where there is mercy and prudence, there is neither excess nor harshness; this we know through your Son, Jesus Christ our Lord." (Prayer of Francis of Assisi, 1182-1226)
12 What shall I render to the LORD for all his
bounty to me?
13 I will lift up the cup of salvation and call on the name of the LORD,
14 I will pay my vows to the LORD in the presence of all his people.
15 Precious in the sight of the LORD is the death of his saints.
16 O LORD, I am your servant; I am your servant, the son of your handmaid. You have loosed my bonds.
17 I will offer to you the sacrifice of thanksgiving and call on the name of the LORD.
18 I will pay my vows to the LORD in the presence of all his people,
19 in the courts of the house of the LORD, in your midst, O Jerusalem.
Daily Quote from the early church fathers: The Seventh Day, from the early Greek fathers, attributed to Eusebius of Alexandria (5th century AD)
"Now every week has seven days. Six of these God has given to us for work, and one for prayer, rest, and making reparation for our sins, so that on the Lord's Day we may atone to God for any sins we have committed on the other six days. Therefore, arrive early at the church of God; draw near to the Lord and confess your sins to him, repenting in prayer and with a contrite heart. Attend the holy and divine liturgy; finish your prayer and do not leave before the dismissal. Contemplate your master as he is broken and distributed, yet not consumed. If you have a clear conscience, go forward and partake of the body and blood of the Lord." (excerpt from SERMON 6, 1-2)
Scripture quotations from Common Bible: Revised Standard Version of the Bible, copyright 1973, and Ignatius Edition of the Revised Standard Version of the Bible, copyright 2006, by the Division of Christian Education of the National Council of the Churches of Christ in the United States of America. Used by permission. All rights reserved.
references for quotes from the writings of the early church fathers.
|The Daily Scripture Readings and Meditations is in need of on-going development to expand resources and to reach people around the world. If you would like to contribute, you can make an online donation.| | <urn:uuid:c5ad69b3-75d2-49f3-a201-56772ec0cbbf> | CC-MAIN-2015-11 | http://www.rc.net/wcc/readings/jul18.htm | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936460577.67/warc/CC-MAIN-20150226074100-00026-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.965518 | 1,119 | 2.734375 | 3 |
A stoa (//; plural, stoas, stoai, or stoae //), in ancient Greek architecture, is a covered walkway or portico, commonly for public use. Early stoas were open at the entrance with columns, usually of the Doric order, lining the side of the building; they created a safe, enveloping, protective atmosphere.
Later examples were built as two stories, with a roof supporting the inner colonnades where shops or sometimes offices were located. They followed Ionic architecture. These buildings were open to the public; merchants could sell their goods, artists could display their artwork, and religious gatherings could take place. Stoas usually surrounded the marketplaces or agora of large cities and were used as a framing device.
The name of the Stoic school of philosophy derives from "stoa".
- Stoa Poikile, "Painted Porch", from which the philosophy Stoicism takes its name
- Stoa of Attalos
- Stoa Basileios (Royal Stoa)
- Stoa of Zeus at Athens
- Stoa Amphiaraion
- Stoa of the Athenians
|Look up stoa in Wiktionary, the free dictionary.| | <urn:uuid:11d5464c-5c0e-463f-beb8-b919bc6276cf> | CC-MAIN-2022-21 | https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wiki/Stoa.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662522741.25/warc/CC-MAIN-20220519010618-20220519040618-00158.warc.gz | en | 0.956371 | 268 | 3.09375 | 3 |
From The Mason Historiographiki
What was Progressivism?
Standing at Armageddon provides the economic backdrop of Progressivism; in four decades, "the United States went through the change from a rural agricultural based nation to one of industry." Silver Cities as well as Segregation both agree with the importance of industrialization, focusing on the role of the city during this time. However, by seeing the reform movements and governmental changes associated with the Progressive Era over the course of the last 70 centuries Segregation challenges the idea that the Progressive Era was an era at all.
In A Fierce Discontent, McGerr addresses the changing role of individualism between the Victorian era and the Progressive era and its impacts on labor, consumption, and gender, among others. He describes the “four quintessential progressive battles: to change other people; to end class conflict; to control big business; and to segregate society”(xv).
For the most part, other scholars agree on such a definition. For example, the dollar diplomacy described in Financial Missionaries to the World, fits under the category of changing other people.
The ideal of ending class conflict is a bit more suspect. Molina’s Fit to Be Citizens? suggests that Progressives wanted to maintain the status quo and keep others in their place, which might well exacerbate class conflict.
Missing from McGerr’s list are the gendered ideals of manliness and motherhood.
Progressivism and Class
In many of these books, the typical Progressive seems to be a middle-class or upper-class white person, male or female. Women may have embraced reform as a way to get out of the house. Spreading the American Dream challenges this individualism of the era by focusing on the role of the federal government to promote these reform movements.
Were they just middle-class whites?
Financial Missionaries to the World suggests that Progressive bankers supported the gold standard at the expense of farmers. In order to escape the anti-bank rhetoric of the 19th century, they emphasized their professionalism.
Silver Cities does not challenge the idea that most of these reformers were middle class whites, but instead shows how crucial photography was in encouraging the reforms of the era through the work of photographers like Jacob Riis.
Progressivism and Race
Gender, Class, Race, and Reform in the Progressive Era suggests that "immigrants and minorities were seen as objects to be reformed" by middle-class reformers. The book suggests, however, that the Progressives were sincere in their belief they were helping others.
Becoming Citizens notes the presence of black Progressives, who cared about anti-lynching, education, and settlement work. But "the white women’s refusal to reach out to other races slowed their progress and forced African-American women to create their own clubs and organizations. Mexican and Chinese women were left out completely."
Is the ideal of improving other people's lives inherently racist?
Progressivism and Gender
Progressives embraced two gendered ideals: manliness and motherhood.
Vaughn notes that Financial Missionaries to the World draws heavily on "the work of Gail Bederman offered in her book, Manliness & Civilization: A Cultural History of Gender and Race in the United States 1880-1917 (University of Chicago Press, 1995). Bederman saw an emerging twentieth century masculinity that is both civilized, in that it is self-controlled and protective, and primitive, in that it is connected to its native power." Of course, this distinction between civilized and primitive was racialized.
Fit to Be Citizens? stresses the ideal of motherhood. Progressives blamed high rates of infant mortality on the incompetence of Mexican-American mothers, even though unsanitary conditions were the real cause.
Gender, Class, Race, and Reform in the Progressive Era notes the alternative values of immigrants. They wanted to maintain child labor, which kept the family together. Standing at Armageddon notes that the gendered reform of closing the saloon did not provide better jobs for the men in the saloon.
Progressivism and Citizenship
Books such as Becoming Citizens and Fit to Be Citizens? put the question of citizenship right in their titles, but they do not explain broader debates about citizenship in the early twentieth century. We could use more information about the status of immigrants, Indians, and annexed peoples (such as Puerto Ricans) in this era.
Suggestions for Additional Reading
- Gail Bederman, Manliness & Civilization: A Cultural History of Gender and Race in the United States 1880-1917
- Daniel T. Rodgers, Atlantic Crossings: Social Politics in a Progressive Age
- Kimberley S. Johnson, Governing the American State: Congress and the New Federalism, 1877-1929 | <urn:uuid:01f9f48c-9de2-4223-b8c6-9af0ae1f5824> | CC-MAIN-2016-44 | http://chnm.gmu.edu/courses/schrag/wiki/index.php?title=Progressivism&oldid=6026 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721392.72/warc/CC-MAIN-20161020183841-00152-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.954614 | 975 | 3.875 | 4 |
The term “shin splints” describes pain felt along the front of lower leg, at the shin bone. This pain concentrates in the lower leg between the knee and ankle.Shin splints is a cumulative stress disorder.
The nature of shin splints, also known as medial tibial stress syndrome (MTSS), most often can be captured in four words: too much, too soon.
In the absence of a more specific diagnosis, shin splints should probably just be called “tibial pain syndrome” — unexplained pain around the tibia.
- An anatomical abnormality (such as flat foot syndrome)
- Muscle weakness in the thighs or buttocks
- Lack of flexibility
- Improper training techniques
- Running downhill
- Running on a slanted surface or uneven terrain
- Running on hard surfaces like concrete
- Using inappropriate or worn-out shoes for running or working out
- Participating in sports that have fast stops and starts (like soccer or downhill skiing)
- A dull ache in the front part of the lower leg
- Pain that develops during exercise
- Pain on either side of the shin bone
- Muscle pain
- Pain along the inner part of the lower leg
- Tenderness or soreness along the inner part of the lower leg
- Swelling in the lower leg (usually mild, if present)
- Numbness and weakness in the feet
- Keep your legs elevated.
- Use ice packs to reduce swelling. Shop for cold compresses.
- Take an over-the-counter anti-inflammatory, such as ibuprofen (Advil) or naproxen sodium (Aleve).
- Wear elastic compression bandages. Shop for elastic compression bandages.
- Use a foam roller to massage your shins. Shop for foam rollers.
- Wearing shoes that fit well and offer good support
- Using shock-absorbing insoles.
- Avoiding exercising on hard or slanted surfaces or uneven terrain
- Increasing exercise intensity gradually
- Warming up before exercising
- Making sure to stretch properly
- Engaging in strength training, specifically toe exercises that build calf muscles
- Not attempting to exercise through the pain
- Surgery is rarely required to repair shin splint problems. Shin splints, however, which are complicated by compartment syndrome may require surgery, often immediately. | <urn:uuid:22a8e701-25db-4cf2-82a5-07771d14d7e4> | CC-MAIN-2021-04 | https://arthritiscommunity.org/joint-pain/ankle-pain/shin-splint/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703533863.67/warc/CC-MAIN-20210123032629-20210123062629-00267.warc.gz | en | 0.903461 | 495 | 3.171875 | 3 |
Educational Psychology and who we are
Poole Educational Psychology Service provides services to:
- Children and young people aged 0-19
- Preschool settings
- Officers of the Borough of Poole
Educational Psychologists understand how children and young people think, learn, feel and behave. They have a higher degree in Educational Psychology and have experience in the practical application of psychology to children and schools.
Each school has an entitlement to time from the Educational Psychology Service. How this is used is negotiated with each individual school, but typically we:
Assess the psychological needs of children within an educational context
Plan and advise on appropriate educational programmes and types of educational placement
Monitor and evaluate programmes
Advise schools on the ways that their organisation can develop to enhance the psychological well being of their pupils
Research and evaluate good practice
Provide training to teachers and others who work with children and young people
All of the above also takes place in pre-school settings. However, before statutory school age psychologists tend to work more with individual children.
School consultation and training
We work with schools in many different ways. During our regular visits, as well as individual assessments, we try to prevent problems arising by providing advice about children and how to prevent difficulties by consultation and/or training.
When problems do arise about a particular child or group of children, we will try to find out why the difficulties are occurring. We do not always need to see the child in order to help. We may be able to make suggestions on the basis of information provided by other people such as teachers and parents.
We can offer both training sessions specifically designed for a particular school or situation, and more general courses on issues relating to:
Ways that schools can help youngsters with various medical diagnoses
Additionally we are involved in training courses for pre-school workers and teaching assistants.
One way that psychologists’ time can be used is to carry out an individual assessment on a child or young person. This might involve:
The use of various types of tests.
A structured conversation around the problems perhaps using techniques such as solution focused brief therapy.
An exploration of what the young person’s views are and how they relate to other people’s perception of the problem.
With younger children assessment is often play based, and at all ages observation in class or other groups may be important.
We try to produce practical and realistic recommendations for the young person, their parent or care-giver and for the school. We do not see children or young people without explicit agreement from parents or carers and we are always happy to talk to all the adults involved.
If there are concerns about a youngster in nursery or playschool, referral is possible either direct to the educational psychologist or to them via one of the pre-school services.
When Borough of Poole carry out a statutory assessment under the Education Act 1996, an Educational Psychologist must see the child or young person as part of the process.
The actual assessment is usually very similar to that done if the person was seen as a matter of course in school.
On the rare occasions when a parent and the Borough agree that the best way forward is a Special Educational Needs Tribunal, the psychologist is normally one of the Borough’s witnesses.
Work with other agencies
One of the psychologists works closely with Children and Young People's Social Care, with children and young people who are looked after and their carers. Another spends time with the medical services on issues related to young people with mental health issues and another with various agencies on issues relating to Aspergers syndrome and autism. Additionally, when other services are involved with the child or family we will liaise with them.
We initiate and contribute to a range of working parties and policy initiatives. Recent work by members of the psychological service includes:
The production of a manual for running social skills groups
Guidance for schools on handling critical incidents
Research the effectiveness of Precision Training
As well as the social skills guide, we also publish a similar manual for anger management groups and guidance on bereavement issues. A guide for schools on the use of Precision Training is currently being completed. | <urn:uuid:1dcbb51c-602c-4490-afcc-f9acfaa2e0be> | CC-MAIN-2017-09 | http://poole.gov.uk/education-and-learning/school-and-colleges/educational-psychology-about-us/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171936.32/warc/CC-MAIN-20170219104611-00602-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.957689 | 851 | 2.625 | 3 |
In business, we have always heard and worked under management. But have you ever thought about why management is such an integral part of any activity? The word Management is understood by different senses. Some people take it as the art and science of getting things done through and with people. Some others consider it as the process of achievement of the goal. Some describe it as the optimum utilization of the resources for the purpose of accomplishing the organizational objectives.
As per Management Innovations 2008, “Management is the process of reaching organizational goals by working with and through people and other organizational resources.”
It has three characteristics:
- It is a process of continuing and related activities
- It focuses on reaching company goals
- It achieves these goals by working with and through people and other resources
In addition, management comes up with all six Ms like Men and Women, Money, Materials, Machine, Methods, and Markets. These resources are used to reach business goals like high sales, revenue generation, business expansion, etc.
Here are some major points which make management important to any business especially in the modern-day;
Proper Utilisation of Resources
Utilising your resources is vital for an organisation to stay competitive and relevant in this modern era. The right management helps in the division of work and prevents the employees from underperforming or getting overburdened with work.
Every employee in a company has his own specific field. Through management, the employees are provided work related to their field of knowledge and experience. It boosts the speed and accuracy of work and the company’s growth ultimately. Besides, management also makes sure to make the right use of available space and equipment.
The company should be maintained in a way that external market problems do not hamper the company’s operation. It needs instant and effective changes that need to be made without hurting the company’s stand.
Without proper management, it will not be possible. Management will provide stability and adaptability to the company, supporting it to survive market turbulence and flourish with time.
Present the Feel-Good Factor
Keeping the employees delighted and satisfied is very important for the smooth functioning of the company. When a company is managed with efficiency, growing rapidly and, in turn, generates good revenue, hence opening avenues of development for the people involved.
The upward journey ensures the workforce of not just better incomes, but better positions, that keep them motivated.
Creation and Maintenance of Coordination
If in any company, people do their individual work without caring for and know about their connection with one another, such scattered activities and work can result in all wastage of time and productivity.
Managers create and work to maintain coordination among human and material resources and lead all of them towards the accomplishment of organizational goals.
The Balance Between Multiple Goals
This is another key factor that shows the importance of the right management in a business. In any organization, the management has two goals, the first one is individual and the second one is organizational. Both goals are important, individual goals satisfy the employees and employers of a company and the organizational goal satisfies both on a broader level.
Social Development & Innovation
The right management always prepares the company for social welfare. It helps to direct the human energies towards the needs of the society on different levels from education, health, environment, and so on.
Aside from social development, management also makes sure that their company is making efforts for innovation. In this digital era, where everything is changing so rapidly, moving with time is vital. Here, management plays an important role. They encourage employees to research the current market happenings and bring the latest innovation within the organization.
So, these are some key points to understand the importance of the right management to a Modern Business. Hopefully, you found this article interesting and helpful. | <urn:uuid:df1b5264-f9f1-420f-930e-93e9a5618577> | CC-MAIN-2023-40 | https://theincmagazine.com/importance-of-right-management-to-a-modern-business/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506028.36/warc/CC-MAIN-20230921141907-20230921171907-00598.warc.gz | en | 0.951996 | 784 | 2.703125 | 3 |
In the CNC MACHINING process, there are many reasons for machining errors. The error caused by the tool radial runout is one of the important factors, which directly affects the minimum shape error and the machined surface geometry accuracy.
In actual cutting, the radial runout of the tool affects the machining accuracy, surface roughness, uneven wear of the tool, and the cutting process characteristics of the multi-tooth tool. The greater the radial runout of the tool, the more unstable the machining state of the tool, and the more obvious the impact.
Causes of radial runout
Tool manufacturing errors and clamping errors cause drift and eccentricity between the tool axis and the ideal rotation axis of the spindle, as well as specific processing techniques and tooling, which may cause radial runout of CNC milling machine tools during processing.
The influence of the radial runout of the spindle itself
The main reasons for the radial runout error of the main shaft are the coaxiality error of each journal of the main shaft, various errors of the bearing itself, the coaxiality error between the bearings, and the deflection of the main shaft. Their influence on the radial rotation accuracy of the spindle varies with the processing method. These factors are formed in the process of manufacturing and assembling the machine tool, and it is difficult for the operator of the machine tool to avoid their influence.
- The impact of the inconsistency between the tool center and the spindle rotation center
When the tool is installed on the spindle, if the center of the tool is inconsistent with the center of rotation of the spindle, the tool will inevitably cause radial runout. The specific influencing factors are the fit of the tool and the chuck, whether the method of loading the tool is correct, and the quality of the tool itself.
- The impact of specific processing technology
The radial runout of the tool during machining is mainly because the radial cutting force aggravates the radial runout. The radial cutting force is the radial component of the total cutting force. It will cause the workpiece to bend and deform and produce vibration during processing, which is the main component that affects the quality of the workpiece. It is mainly affected by factors such as cutting amount, tool and workpiece material, tool geometric angle, lubrication method, and processing method.
Methods to reduce radial runout
The radial runout of the tool during machining is mainly because the radial cutting force aggravates the radial runout. Therefore, reducing the radial cutting force is an important principle to reduce the radial runout. The following methods can be used to reduce radial runout:
- Use sharp knives
Choose a larger rake angle to make the tool sharper to reduce cutting force and vibration. Choose a larger clearance angle of the tool to reduce the friction between the main clearance surface of the tool and the elastic recovery layer of the transition surface of the workpiece, thereby reducing vibration. However, the rake angle and the back angle of the tool cannot be selected too large, otherwise, the strength and heat dissipation area of the tool will be insufficient. Therefore, it is necessary to select different tool rake angles and back angles according to the specific conditions. The rough machining can be smaller, but in the finishing machining, for the consideration of reducing the radial runout of the tool, it should be larger to make the tool Sharper.
- Use strong tools
There are two main ways to increase the strength of the tool. One is to increase the diameter of the tool holder. Under the same radial cutting force, the diameter of the tool holder increases by 20%, and the radial runout of the tool can be reduced by 50%. The second is to reduce the protruding length of the tool. The greater the protruding length of the tool, the greater the deformation of the tool during processing. When processing is in constant change, the radial runout of the tool will continue to change, resulting in a workpiece Similarly, if the machining surface is not smooth, the extension length of the tool is reduced by 20%, and the radial runout of the tool will also be reduced by 50%.
- The rake face of the tool should be smooth
During processing, the smooth rake face can reduce the friction of the chips on the tool, and can also reduce the cutting force on the tool, thereby reducing the radial runout of the tool.
- Spindle taper and chuck cleaning
The spindle taper hole and the chuck are clean, and there should be no dust and debris generated during the processing of the workpiece. When selecting processing tools, try to use tools with a shorter extension length, and the force should be reasonable and even when loading the knife, and not too large or too small.
- Choose a reasonable amount of knife
If the amount of the tool is too small, the phenomenon of machining slippage will occur, which will cause the continuous change of the radial runout of the tool during machining, and the processed surface will not be smooth. When the amount of the tool is too large, the cutting force will increase, which will cause the tool to deform and increase the radial runout of the tool during processing, which will also make the processed surface not smooth.
- Use up milling in finishing
As the position of the gap between the lead screw and the nut changes during down milling, it will cause uneven feed of the worktable, resulting in shock and vibration, affecting the life of the machine and the tool and the surface roughness of the workpiece.
- Reasonable useof cutting fluid
The cooling effect of the aqueous solution has little effect on the cutting force. The cutting oil whose main function is lubrication can significantly reduce the cutting force. Due to its lubricating effect, it can reduce the friction between the tool rake face and the chip and the friction between the flank face and the transition surface of the workpiece, thereby reducing the radial runout of the tool. | <urn:uuid:2523e975-68d7-4c32-9c0f-07c8f69c34ac> | CC-MAIN-2023-40 | https://www.3qmachining.com/how-to-reduce-the-tool-radial-runout-in-cnc-milling/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511406.34/warc/CC-MAIN-20231004184208-20231004214208-00472.warc.gz | en | 0.914389 | 1,239 | 2.953125 | 3 |
Please note: This information was current at the time of publication. But medical information is always changing, and some information given here may be out of date. For regularly updated information on a variety of health topics, please visit familydoctor.org, the AAFP patient education Web site.
Information from Your Family Doctor
Psoriasis: What You Should Know
Am Fam Physician. 2007 Mar 1;75(5):715.
What is psoriasis?
Psoriasis (sor-EYE-ah-sis) is a condition that causes thick red or silvery spots that look like scales to form on your skin. The scaling is probably the result of an increase in the number of skin cells. Sometimes pus-filled blisters form. Most of the time, the skin on the elbows and knees is affected, but psoriasis can occur anywhere on the body.
Doctors aren't sure what causes psoriasis. It seems to get worse in many people when they are under stress or when they have an infection. Some medicines may make psoriasis worse, too.
Is psoriasis contagious?
No. You can't catch psoriasis from another person or give it to someone by touching them, and you can't spread it to other parts of your body.
How is psoriasis treated?
There are several treatments for psoriasis. Your doctor will decide which one is right for you. Moisturizing your skin is a good first step.
Medicated creams, ointments, lotions, and gels are often prescribed for psoriasis. Your doctor may tell you to put medicine on the scales before you go to bed and then cover the areas with plastic wrap.
Special shampoos are used for psoriasis on the scalp. In more severe cases, medicines are taken by mouth. Other treatments include a special type of light therapy.
Sunlight can help psoriasis, but be careful not to stay in the sun too long. A sunburn can make your psoriasis worse. You should use sunscreen on the parts of your skin that aren't affected by psoriasis. It is especially important to put sunscreen on your face.
Will psoriasis go away with treatment?
The scales should start to go away almost immediately after you begin treatment. It may take two to six weeks for the affected areas to return to a more normal thickness, and the redness may last several months. Although psoriasis will improve, it may not go away completely.
After you've been using a certain medicine for awhile, your psoriasis may “get used to” the treatment and your medicine may not be as effective. If this happens, your doctor may change your medicine or give you a stronger dosage. Talk to your doctor if your psoriasis doesn't seem to be getting better with treatment.
This handout is provided to you by your family doctor and the American Academy of Family Physicians. Other health-related information is available from the AAFP online at http://familydoctor.org.
This information provides a general overview and may not apply to everyone. Talk to your family doctor to find out if this information applies to you and to get more information on this subject.
Copyright © 2007 by the American Academy of Family Physicians.
This content is owned by the AAFP. A person viewing it online may make one printout of the material and may use that printout only for his or her personal, non-commercial reference. This material may not otherwise be downloaded, copied, printed, stored, transmitted or reproduced in any medium, whether now known or later invented, except as authorized in writing by the AAFP. Contact email@example.com for copyright questions and/or permission requests.
Want to use this article elsewhere? Get Permissions | <urn:uuid:4dcb0fbf-2f34-4463-b381-a8bb8ad7d801> | CC-MAIN-2015-06 | http://www.aafp.org/afp/2007/0301/p715.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115858583.14/warc/CC-MAIN-20150124161058-00016-ip-10-180-212-252.ec2.internal.warc.gz | en | 0.935755 | 790 | 3.09375 | 3 |
Any good dog owner knows it’s a bad idea to feed your dog chocolate. And you know at Christmas to keep the pooch out of the poinsettias. But the ASPCA’s Animal Poison Control Center handled more than 17,000 cases of poisoned pets in 2009 — and not all of them were because Snarf got into your Cadbury’s stash.
There are many, many human foods that will cause an adverse reaction when consumed by canines, but our science-y brethren at Consumer Reports rounded up this list of common pooch-poisoners:
* Coffee grounds
* Grapes and raisins
* Gum or candy with xylitol
* Human vitamin supplements
* Macadamia nuts
* Onions and garlic (raw, cooked, powder)
* Yeast dough
Different foods cause different problems in dogs, including cardiovascular, gastrointestinal, respiratory, neurological or blood problems, and even organ failure.
If you think your pet has eaten something poisonous, call your veterinarian or the ASPCA’s Animal Poison Control Center hotline (888-426-4435; a consultation fee may apply).
For more information and links to helpful sites, check out the full article over at ConsumerReports.org. | <urn:uuid:f986ce2a-4000-45f3-a57a-8de6c972efb7> | CC-MAIN-2013-20 | http://consumerist.com/2010/06/24/14-people-foods-that-will-poison-your-puppy/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381630/warc/CC-MAIN-20130516092621-00074-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.883667 | 260 | 2.515625 | 3 |
In September, the UK’s University of Bath completed construction on a small building whose walls are insulated with the shredded woody inner core, or shiv, of the hemp plant (not to be confused with bast, the fibrous outer part under the bark).
The hemp plant, which can’t be grown in the United States because one variety, Cannabis sativa indica, produces large flower buds called marijuana, is highly useful for its fibers, which can be made into durable paper products, fabrics, “green” plastics, health supplements, fuel and – as shown at Bath – construction products.
The industrial variety, Cannabis sativa sativa, is one of the fastest-growing biomass plants known to man, producing up to 25 tonnes (27.55 short tons) of dry matter per hectare (about 2.5 acres) per year. It is also one of the first plants domesticated by man, showing up in Asia and the Middle East as far back as 10,000 years ago.
Hemp is highly environmentally friendly, growing in poor soil with few amenities (fertilizers, pesticides, herbicides) and little water, though increased production is easy to procure with about the same tilth and chemical enhancements as a wheat crop. Of course, like any growing plant, hemp takes in carbon dioxide, or CO2; that is, sequesters it, and does not release it when chopped for insulation.
The Bath University experimental building is the product of collective efforts, from such construction and materials experts as BRE (Ltd) 1 (Building Research Establishment) Centre for Innovative Construction Materials, based at the university, as well as UK-based Feilden Clegg Bradley Studios (sustainability architects), heavy building materials supplier Hanson UK, UK-based industrial hemp supplier Hemp Technology, chemicals producer Lhoist Group, lime-based building products supplier Lime Technology, the National Non-Food Crops Centre (NNFCC) and Manchester building engineering firm Wates Living Space.
Called the “Hemp Pod”, the small, one-story building’s hemp-filled walls trap air between the shiv’s shreds, providing a sort of passive cooling effect. The fiber itself is also porous, trapping and holding even more heat or cool air. Finally, a lime-based binder, which also absorbs CO2, protects the shredded hemp, improving indoor air quality and making the building eminently fire resistant. In fact, lime and hemp being such natural ingredients, it’s hard to imagine a more eco-friendly approach to building.
The Hemp Pod, while not the first UK building constructed using hemp and lime, is the first purpose-built with said ingredients to test the hemp-lime mixture, according to Dr Mike Lawrence, Research Officer, Bath University’s Department of Architecture & Civil Engineering.
During 18 months of monitoring, Lawrence and colleagues will access readouts from sensors inside the walls to determine how quickly heat and humidity travel through, and then out of, Hemp Pod walls.
BRE’s Centre for Innovative Construction Materials Director, Professor Pete Walker, unashamedly admits that the Hemp Pod is an attempt to attract mainstream builders to the idea of using hemp insulation. But who can blame him, considering that one could grow enough hemp to insulate a three-bedroom house in three short months on a lot the size of a rugby pitch (6,800 square meters, or 73,194 square feet)?
Thus, farmers could use intercropping or cover cropping (between summer and winter crops, for example) on the UK’s 9.3 million hectares of farmland to provide enough hemp to insulate approximately 1,500 new homes per year, or roughly .02 percent of all the homes built in the UK in 2009.
And the cost of hemp is so cheap, compared to other eco-friendly building and insulative materials, that the three-bedroom house sans basement would end up costing a mere £75,000, or less than a plot of land in East Sussex.
Sponsored by the Department for Environment, Food & Rural Affairs (Defra) under the Renewable Materials LINK Programme, this Hemp Pod, if combined with technology from Bath University’s straw-bale paneled house called BaleHaus@Bath, would deliver a cool, clean, “green” house that even the Big Bad Wolf could envy.
Article by Jeanne Roberts, appearing courtesy Celsias. | <urn:uuid:58d5c54f-dd6b-4294-8c4f-4544bdc0149d> | CC-MAIN-2015-35 | http://cleantechies.com/2010/09/28/field-testing-a-low-carbon-hemp-house/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065534.46/warc/CC-MAIN-20150827025425-00324-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.929039 | 925 | 2.859375 | 3 |
When Booker T. Washington stepped to the podium at the Atlanta Exposition in 1895 to give a speech on race relations, two things happened.
First, many fellow Black Americans, including W.E.B. Du Bois, derided his speech as “The Atlanta Compromise,” because Washington called the agitation for social equality “the extremest folly,” advocating instead slow, steady, and segregated self-improvement for the American Negro.
Second, Booker T. Washington’s was acclaimed by the white power structure, and his less threatening approach to progress proclaimed in the press. Washington himself was elevated to the status of the pre-eminent “Negro leader,” at least in the eyes of white folks. Washington alone had access to the ears and pockets of millionaires like Andrew Carnegie and John D. Rockefeller. Washington alone received an invitation to Teddy Roosevelt’s White House in 1901.
His debate with Du Bois — who called Washington “The Great Accommodator” — has been simplified to one of segregation versus integration. But Washington secretly contributed to anti-segregationist causes, all the while publically advocating an industrial education for Negroes, rather than the liberal arts education that Du Bois favored. Most notably, Booker T. Washington, who was born a slave, went on to found the Tuskeegee Institute, one of the first historically black colleges.
Washington was not a radical, and he caught hell from activists who wanted to move faster. In our time, Barack Obama’s moderate policies, his willingness to meet with his political adversaries, and his advocacy of Black self-reliance rankles many liberals and older Black leaders. As such, Obama and Booker T. Washington share a legacy of both personal achievement in the face of past adversity; and, in some ways, prudent accommodation with the larger power structure. | <urn:uuid:67883b75-0234-48bd-b4f1-70167dd21ee9> | CC-MAIN-2014-49 | http://newsone.com/83221/the-moderate/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931011456.52/warc/CC-MAIN-20141125155651-00133-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.962778 | 387 | 3.328125 | 3 |
Crop circles have sparked curiosity for ages. The crop formations, usually created by bending the stalks of crops such as wheat, barley, rye or corn, appear overnight and can span hundreds of yards. Centuries ago, farmers believed that crop circles were caused by a “mowing devil” said to reside in the area. Since then, countless theories have been used to explain their mind-boggling existence.
Some claim that crop circles have existed for thousands of years, though there isn’t much historical evidence to support such a belief. The “mowing devil” incident in 1678 is often cited as the first documented example of a crop circle. In the 1960’s, crop circles began appearing more frequently, but it wasn’t until the 1990’s hit that they became a huge phenomenon. Lay people who study the crop circles often refer to themselves as cerealogists. | <urn:uuid:c50bf5bf-7c58-479d-9e60-a932ddf7e18d> | CC-MAIN-2017-13 | http://all-that-is-interesting.com/history-cool-crop-circles | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189802.18/warc/CC-MAIN-20170322212949-00283-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.979631 | 189 | 3.578125 | 4 |
Likes UP: The Rule of Liking, Authority, and Scarcity
Influence and Persuasion: The Rule of Authority, Liking, and Scarcity
This is part of a series of articles on the science of influence and persuasion. It is based in large part on a book by Robert B. Cialdini, Ph.D., titled Influence: The Psychology of Persuasion.
Part 1: How to Trigger the “Yes” Response
Part 2: The Rule of Reciprocity
Part 3: The Rule of Consistency
Part 4: The Rule of Social Proof
Part 5: The Rule of Authority, Liking, and Scarcity
Decked out in a uniform, badge, and baton, a television reporter stationed himself in front of a Las Vegas bank. On the ATM, he placed a sign with large lettering that read, “OUT OF ORDER — GIVE DEPOSITS TO GUARD ON DUTY.” In the center of the sign was the shape of a large, gold badge.
When bank customers approached the ATM, the “guard” smiled, looked them straight in the eyes, and asked, “Do you need to make a deposit or a withdrawal?”
No bank would ever allow a guard to conduct private transactions like this, but were people suspicious? Not a bit. Without hesitation, customer after customer handed over not only cash and checks, but also Social Security numbers, credit cards, account numbers, PIN codes — private information that in the wrong hands could leave people penniless.
In fact, out of 10 customers, only one showed any signs of hesitation. And even that customer eventually gave in.
In two hours, the reporter gained access to over $10,000 in check deposits and account balances.
When the reporter revealed the deception and asked the flabbergasted victims why they so readily handed him money and private information, they all gave pretty much the same answer: “Because of the uniform. Because of the sign.” In other words, “Because you looked authoritative.”
The Rule of Authority
What? Am I saying that these people just handed over cash, checks, and private information merely because a guy in an official-looking uniform asked them to? Yup. That’s what I’m saying.
This is one of the finest examples I’ve ever seen of the Rule of Authority — the principle that people are instantly deferential to those in positions of power. It’s not just security guards and people in uniforms who command our obedience, though, it’s anyone with authority, special knowledge, impressive credentials, or even an air of confidence.
And it’s not just those with actual power to whom we kowtow, it’s anyone with the “symbols” of authority. In other words, when someone “appears” to be authoritative, we act as if they are, regardless of their actual position.
What kind of symbols do we look for in evaluating authority? Here are three of the most basic:
- Titles: such as Dr., Professor, Ph.D., President, or Chairman
- Clothing: such as hospital whites, army greens, priestly black, police blues, or even a gray business suit
- Trappings: anything that usually goes along with particular positions, such as guns and badges for security personnel, prestigious letterhead for executives, expensive cars or watches for successful entrepreneurs, etc.
Why do people respond to authority figures? Because we grow up surrounded by those bigger, smarter, and more experienced than ourselves. We are taught to do what we’re told. And we’re often punished for disobedience.
First it’s our parents. Later it’s our teachers. Then it’s policemen, politicians, bosses, lawyers, priests, and gurus. And in this age of narrow specialization, we’re more prone than ever to look to experts (or those we perceive to be experts) to give us the answers and show us the way.
Which diet will take off those extra pounds? Well, here’s a nationally-recognized weight-loss authority who says she has the answer. She’s got a doctorate in nutrition. She dresses in exercise gear. And her books and tapes are in every book store. Titles, clothes, and trappings. Sure, we’ll give it a whirl.
And this kind of instant reaction to perceived authority isn’t unusual, it’s natural. In fact, it’s downright beneficial. How could we get through life without being able to rely on all those authority figures to guide us and protect us?
Ah. And that’s where it gets good. Because, since our reaction to authority is so powerful and immediate, those “in the know” can use this principle to get a “yes” response more often.
The Rule of Authority works just like all the other rules in this series. It’s what psychologists call a “decision heuristic,” which is a highfalutin way of saying “a shortcut for making decisions.”
Life is too complicated for people to methodically evaluate every element of every situation, so we all learn to take shortcuts to help us make decisions based on very limited information.
If you’re looking for a doctor, for example, you don’t run an in-depth investigation, you just pick one out of the phone book. Then when you’re in the office, you look on the wall to see what school he or she graduated from. You put your life in that doctor’s hands based solely on whether a piece of paper on the wall looks official. Throw in a white frock, a stethoscope around the neck, and your sold. You’re ready to do just about anything this person tells you.
Authority Is Good, but Credibility Is Better
Now that I’ve revealed the Rule of Authority, you’re already thinking how you can use this idea in your promotions. To pump up the credentials of your letter signer. To add impact to your on-air spokesperson. To change the look and tone of your messages to feel more confident and authoritative.
But wait. While titles, clothing, and trappings can certainly go a long way toward helping you get to “yes,” I’d like to suggest that you go one more step. Instead of just giving the “appearance” of authority, why not establish “actual” authority.
I’m talking about credibility. Real credibility.
And what does it take to establish credibility? According to a mountain of psychological research, there are four basic elements: 1) Expertise, 2) Trustworthiness, 3) Similarity, and 4) Physical Attractiveness. The first two are most important, but they all play a part.
Expertise — Having relevant knowledge is the key to expertise. What special education do you have? What kind of experience? Have you demonstrated unusual competence in a relevant area? What are your big successes? What about awards or public recognition? People look for clues about what you know and what you’ve done.
However, these clues must be relevant to the subject at hand. If you’re selling accounting software, the fact that you graduated from Harvard may show you’re smart — but the fact that you’re an experienced and successful accountant is far better.
Trustworthiness — Perhaps even more important than expertise is trustworthiness. Do people feel they can trust you? The answer is based on what people perceive your intentions to be. People want to know why you take the position you do.
Among the reasons for people rating you low on the trustworthiness scale are a “knowledge bias” or “reporting bias.”
If your prospect thinks your background or particular experience prevents you from being objective, there’s a “knowledge bias.” That means there’s always more persuasion when you take a position that people don’t expect you to take. If you’re writing a letter to raise funds for a conservative cause, imagine how powerful it could be to have a liberal delivering the message. If a liberal buys into the idea, it must be convincing!
If your prospect thinks you are just saying what people want to hear, there’s a “reporting bias.” So, you’ll be more persuasive when it seems you are saying what you really believe. That often means admitting that there are two sides to an issue or acknowledging flaws before presenting your position.
Similarity — While Expertise and Trustworthiness are most important, Similarity can also figure into Credibility. We tend to pay more attention to those who are like us.
Deep down in our minds, we ask: Do you think like me? Are your ideals like mine? Are you from the same social class as I am? Do you look like me? And the more yeses we come up with, the more likely we are to like that person and grant his or her requests.
Of course, Similarity depends on relevance. For example, if you’re selling computers, you’ll be more effective if you agree with your prospect that software can be hard to learn than if you reveal you belong to the same political party.
Physical Attractiveness — The final Credibility key is one most of us won’t want to admit to: physical attractiveness. There’s no way around it, you and I are more likely to pay attention to attractive people. This is for a variety of reasons.
Attractiveness produces the “halo effect” — the pleasant feeling we get from an attractive person is associated with the message that person delivers. And according to various studies, attractive people are seen as better communicators and more fluent.
In addition, liking and identification play a part, since people like and identify with attractive people, thinking “I can be like that person if I believe what she believes, says what she says, or does what she does.”
One caveat: Extreme attractiveness can be distracting and may reduce persuasion. This isn’t rocket science, you just have to remember that the level of attractiveness must meet a prospect’s expectations. You have to have beautiful hair to sell shampoo, for example, but you don’t have to be a model to give medical advice as a doctor.
Putting Credibility to Work
Remember, the only reason that direct marketing works is that it gives people a more convenient and exclusive way to buy things, get information, donate to their favorite causes, and perform other transactions.
However, basic human instincts are still at work. Most people prefer to see, feel, and shake something before they buy it. Some people never shop by mail because they can’t touch the merchandise first.
Therefore, Credibility is essential. How do you get it? Keep it? Like this:
- Establish your expertise with plenty of information. Display your know-how and experience. Show your credentials before presenting your argument. Better still, allow people to discover your expertise indirectly, so it seems more natural and not part of a sales pitch. And make sure all the symbols of Authority are in place.
Create trustworthiness by avoiding any appearance of bias. Take a position that people don’t expect you to take. Say what you truly believe and say it with conviction.
One technique is to mention weakness or drawbacks in what you’re saying. This will appear to be contrary to your own interests, and you will appear more trustworthy. If you do mention weaknesses, bring them up before you list strengths — this generates greater belief in your position and lowers resistance to your arguments.
- Try the “convert effect.” Imagine you’re selling an investment course that teaches how to trade commodities. If your spokesperson has been wildly successful with commodity trading, prospects will expect that person to promote such investments. But if you present a timid soul who previously invested in nothing more dangerous than CDs, yet found success buying and selling sugar, potatoes, and silver on the open market, THAT is persuasive.
Someone who has converted to another lifestyle — to something opposite — is always more credible. The “convert effect” plays on the feelings of similarity between the convert and the prospect. The convert seems to have overcome a “knowledge bias.” And the convert has made a voluntary decision to do something different and has not been forced into the decision by circumstances.
- Show similarities between you and your prospect, customer, or donor. Show that your thoughts, ideals, social class, and appearance are alike. Demonstrate similarities that are relevant to the selling situation.
- Take advantage of your spokesperson’s attractiveness. Whether it’s an insert in a direct mail package or a spokesperson on TV, make sure the look is attractive but not wildly beautiful. And be sure that the look is relevant to the situation and matches people’s expectations.
- Use all the standard credibility techniques. Don’t forget the basics like using the most credible spokesperson, giving a strong guarantee, and presenting testimonials of satisfied customers who are similar to your target audience.
BONUS: The Final Rules
During this series of articles, we’ve discussed four powerful rules of psychological persuasion:
1. The Rule of Reciprocity — People are driven to repay debts. Give something away to create a feeling of indebtedness. Then ask for what you want.
2. The Rule of Consistency — People are compelled to be consistent with their past actions. Get people to take a stand on what they honestly agree with now. Align your product with your prospect’s current sense of consistency.
3. The Rule of Social Proof — Most people are imitators. If you want someone to do something, show others doing it.
4. The Rule of Authority — The mere symbols of authority (titles, clothing, and trappings) are often enough to gain instant compliance. However, for added persuasion, establish genuine credibility through Expertise, Trustworthiness, Similarity, and Physical Attractiveness.
Now I’d like to give you the final two rules — briefly. I’m doing this because they are particularly easy to understand, and do not warrant a full article at this time. They are the Rule of Liking and the Rule of Scarcity.
5. The Rule of Liking — People are far more likely to say “yes” to those they know and like. Get your prospect to like you first by showing similarity, with flattery and praise, and by demonstrating cooperation. Work with your target as an ally with common goals.
6. The Rule of Scarcity — That which is rare or is becoming less available is always more appealing. Show genuine scarcity in the most tangible way you can. Point out what will be lost by not responding. People fear loss, so generate a feeling of potential loss.
by Dean Rieck
source Direct Creative
Contact Dean Rieck for his Direct Marketing copy and creative
Mail: 701 Lookout Ridge Drive, Westerville, OH 43082
E-mail: Dean@DirectCreative.com LinkedIn | <urn:uuid:10aac38e-5000-42cd-98e8-ca705551089d> | CC-MAIN-2019-43 | http://likesup.com/likes-up-the-rule-of-liking-authority-and-scarcity/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986653876.31/warc/CC-MAIN-20191014150930-20191014174430-00470.warc.gz | en | 0.946168 | 3,220 | 2.515625 | 3 |
There’s no doubt ultrasonic cleaning is simple, versatile and effective. No other method can deliver the same spotless cleaning in the same short timeframe while offering an equal level of safety for your parts and employees. But even though you’re dealing with a simple process, an adjustment in the frequency your ultrasonic cleaner operates at can make a noticeable difference in performance.
Why does “hitting the right note” matter? It comes down to the details of cavitation. When ultrasonic waves travel through a liquid, they form bubbles on the surface of submerged items. But the waves also cause the bubbles to collapse, and as they do so, they create a powerful jet of liquid that strikes the surface and any contaminants clinging to it. This creates a constant scrubbing action.
Different frequencies will produce larger or smaller bubbles. The higher the frequency, the smaller the bubbles are. The smaller they are, the more gentle the scrubbing action will be, and the more evenly the bubbles will be distributed across the surface. Smaller bubbles also penetrate cracks, crevasses and other narrow and/or deep recesses more effectively. The larger bubbles produced by lower frequencies create a far more powerful cleaning action, but don’t penetrate as well.
Let’s take a look at the available frequency ranges, what they can accomplish and what the best items to clean them with are:
This frequency is quite low, just above the top of the human hearing range, which is 18kHz. It produces relatively large, powerful bubbles, which strike the part being cleaned with a powerful jet. This makes it the ultimate scrubbing tool for contaminants which are thick and/or tenaciously sticky. This frequency is ideal for cleaning large, durable metal parts—such as engine blocks, radiators, dies—and any parts for which finish isn’t a critical consideration. The main disadvantage is that the bubbles produced won’t penetrate narrow crevices.
This is the most commonly used frequency in industrial applications because it hits the “sweet spot” for scrubbing power and penetration. It can be used for about 95% of ultrasonic cleaning applications. The bubbles it produces are about a micron in diameter, and can deliver excellent cleaning results in all but the smallest spaces. It’s gentle enough for almost all materials and the bubble size also provides good coverage on wide surfaces.
For some materials, 40kHz is too aggressive and can leave damage behind. Those parts—such as hard drive components, electronics, buffed soft metal parts and precision optics—call for the gentler scrubbing action of a higher frequency. As you’ve probably guessed, this frequency also penetrates into even smaller spaces than 40kHz.
132kHz to 170kHz
This is the highest frequency range commonly used in industrial ultrasonic cleaning, and offers the ultimate in gentle cleaning and penetration of even the tiniest crevices. It’s commonly used to clean pharmaceutical products, medical implants, titanium components and unusually delicate electronic parts.
With the right frequency and our Vibra-bar® Simultaneous Multi-Frequency® transducers, you can clean nearly anything, and do it with a healthier bottom line. To see how our customers used our cleaners to reduce costs and deliver a cleaner product, click here to learn about Ushers Machine and Tool. | <urn:uuid:99dddf04-6be8-4f22-b864-c76a9b142d2a> | CC-MAIN-2020-40 | https://www.upcorp.com/blog/finding-the-balance-tuning-in-on-the-right-frequency-for-your-ultrasonic-cleaning-application/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402101163.62/warc/CC-MAIN-20200930013009-20200930043009-00494.warc.gz | en | 0.912866 | 687 | 2.671875 | 3 |
Public Health Student researches Intersection of Food and Culture
In the world of public health, what works in one country may not work in another. That is something that graduate student Susannah Barr has seen time and time again in both her studies and work.
Barr began the Master of Public Health degree program in the Department of Health Promotion and Community Health Sciences in the Texas A&M School of Public Health with an undergraduate degree in anthropology. Her main interest, which she developed as an undergraduate student, is the intersection of economics and food. That is how she ended up in the Dominican Republic, helping to collect data for a project focused on health and nutrition in rural communities. “I kind of stumbled into projects working with children and nutrition,” Barr said.
Her work with Somos Girasoles (The Sunflower Project), which Barr founded with a few friends, made it clear that health interventions that work in the United States do not always adapt well to other cultures. Somos Girasoles works with artists from a school of fine arts in Santo Domingo, the capital city of the Dominican Republic, to use art as a way to educate children on health and nutrition.
Barr’s current work is with a program named Salud Para Usted y Su Familia (Health for You and Your Family)
part of a School of Public Health five-year, $4.9 million dollar project funded by the U.S. Department of Agriculture aimed at reducing childhood obesity in communities known as colonias along the U.S.-Mexico border in Texas, New Mexico and Arizona. The project’s main goals are to increase fruit and vegetable consumption, reduce screen time and increase physical activity. Barr’s role in this project has ranged from data management to spatial and qualitative analysis and leading pilot testing of a board game meant to teach people how to shop for groceries.
“Even the places we purchase food are cultured, so why do we expect people from other countries or cultures to understand grocery stores in the U.S.?” says Barr. “This board game gives them a map and suggestions of when to use skills they may have learned in other nutrition interventions.”
As she continues to juggle both work and school, Barr’s heart remains with the Dominican Republic. In 2016, she conducted a community assessment of Cabrera, the town where Somos Girasoles is based. This year she included Somos Girasoles in her coursework, conducting a program evaluation as part of her practicum. She also published an article in Human Ecology that was based on her first research experiences in the Dominican Republic.
When she completes her master’s degree, Barr plans to pursue a PhD in anthropology building on the content of this article, which highlights the impact of mobile produce vendors on household fruit and vegetable consumption using Geographic Information Systems (GIS). Barr believes mobile produce vendors can have a critical economic and nutritional impact on the country.
“Food is an interesting area of research because it is important in all cultures and is impacted by economics and the environment,” Barr said. “Everyone has to eat.” | <urn:uuid:0d20ffe5-0cdf-4ad3-8d4c-74244ffb8377> | CC-MAIN-2020-16 | https://public-health.tamu.edu/alumni/spotlights/alumni-spotlight-barr.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506477.26/warc/CC-MAIN-20200401223807-20200402013807-00453.warc.gz | en | 0.960884 | 651 | 2.796875 | 3 |
The American Civil War casts a long shadow over America history. Anyone doubting its pernicious legacy need only note that all of the states of the former Confederacy except Virginia voted for Trump. However it would be a mistake to believe that the white population of this region have alway acted en bloc as rabid racists.
Recently released on DVD, Free State of Jones, starring Matthew McConaughy, tells us that even during the Civil War sections of the white population in the south sided with the Union. The film deals with what was essentially an insurrection against the Confederacy in Jones County, Mississippi, of poor white farmers and runaway slaves led by Newton Knight. It flies in the face of the “lost cause” myth that the Civil War wasn’t about slavery and that all southerners avidly supported secession.
The Mississippi Secession Convention made it quite clear in 1861 what it was fighting for. “Our position is thoroughly identified with the institution of slavery — the greatest material interest of the world.” Conventions such as this were decidedly controlled by the slave owning class, although 75% of the white population didn’t own any slaves. Pressure was put on the yeoman farmer class to join the Confederate army, but the “glory” of the cause was to wear thin as the war dragged on.
The Confederacy lost more soldiers through desertion than any other reason. One factor which accelerated this was the passing of what became known as the “Twenty Slave Law” which stated that men from estates with 20 or more slaves were excused military service. To poor white conscripts, it became clear that government represented slaveowner class. Amongst disaffected troops the phrase “rich man’s war, poor man’s fight” was popular.
Newton Knight was one of those who deserted in disgust at the Twenty Slave Law. He returned to his Mississippi neighbourhood to find it close to starvation as a consequence of the forced confiscation of their food and livestock by the Confederate government. Knight built a guerrilla army to combat this and developed common cause with runaway slaves hiding out in the local swampland.
The insurrectionists fought several skirmishes with confederate troops and at one stage succeeded in capturing the county town of Ellisville, where they hoisted the Union flag. Sad to say, this example of inter-racial solidarity did not last long once the war came to an end. Knight supported efforts to give civil rights to Afro-Americans and was appointed US Marshall to serve that end. However, the terrorist activities of the Ku Klux Klan overpowered such efforts and the Federal government gave up all pretence at supporting civil rights when its troops were withdrawn from the South in 1877 the better to meeting the rising threat of organised labour.
After a conflict between two different modes of production, in which Northern finance and industrial capital was triumphant,Washington was quite prepared to let white supremacists back into power in the South. The Trump victory has given a new lease of life to white supremacists as they seek to suppress the voting rights of blacks in states like Texas and Alabama. In Tennessee and North Carolina moves are afoot to effectively re-segregate schools. But socialists should not write off elements of the working class who were Trump voters.
The campaign by Bernie Sanders supporters and others in southern states in the last few weeks is a welcome effort at raising awareness of the dangers American workers and their families face and the necessity of workers’ unity. | <urn:uuid:3431e963-10ad-4a11-a317-84b3128e6e79> | CC-MAIN-2020-05 | https://www.workersliberty.org/story/2017-07-26/challenging-lost-cause-myth | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251700988.64/warc/CC-MAIN-20200127143516-20200127173516-00364.warc.gz | en | 0.974304 | 712 | 3.21875 | 3 |
What was the value of chocolate in exchange for currency?
200 beans = Turkey cock
100 beans = daily wage of porter
100 beans = Turkey Hen
100 beans = rabbit
30 beans = small rabbit
3 beans = turkey egg
3 beans = new avocado
3 beans = fish wrapped in maize husks
1 bean = ripe avocado
1 bean = tomato
1 bean = tamale
200 small cacao beans = 1 Spanish real (or 4 cents) (circa 1625)
Chocolate has been valued for a long time and is still in high demand. | <urn:uuid:fbb7a439-27ce-4413-b9f2-ce1f81e2501e> | CC-MAIN-2014-42 | http://www.chocolatewerks.com/pages/chocolate-history/chocolate-for-trade-:-spain | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507447020.15/warc/CC-MAIN-20141017005727-00242-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.908209 | 120 | 2.921875 | 3 |
Nothing quite says summer has arrived like our first ride of the season on the Looff Carousel at Crescent Park. This year as we sat outside the pavilion enjoying a frozen lemonade and reveling in the thrill of our first ride, I couldn’t help but wonder about the story behind this Rhode Island treasure.
I did a little bit of digging to find out that our local carousels play a significant role in carousel history. Four of the area’s carousels were made during the golden age of carousel art, and a reproduction at Roger Williams Park pays homage to the great carousel builders of the nineteenth century.
There are plenty of fun facts to share with your kids during your next visit to a local carousel. Not only will they enjoy the ride, they will also be able to learn about Rhode Island’s history. And if they’re lucky, they may just get the brass ring!
Crescent Park Looff Carousel
End of Bullock’s Point Avenue, East Providence, RI
(401) 435-7518 or (401) 433-2828
Cost: $1 per ride
Summer hours: Open Thursday — Sunday, Noon — 8pm
Off season hours: Open Friday 4pm — 8pm, Sat & Sun Noon — 8pm
The Crescent Park Carousel was made in 1895 by Charles I. D. Looff, one of the world’s foremost carousel makers and producer of Coney Island’s first merry-go-round. Looff moved his factory from New York to East Providence and designed the Crescent Park carousel as a showcase for prospective clients. As a result, no two figures are alike and each horse is designed to complement the next.
Historians consider this carousel a treasure of American folk art and a museum to the work of Looff. The carousel is a National Historic Site and was proclaimed the Rhode Island Symbol of Folk Art in 1985.
Make it a daytrip: A beach, a park, and a carousel
Flying Horse Carousel, Watch Hill
Bay Street, Watch Hill, RI
Hours of Operation: Open weekends only until June 18. Open every day during the summer.
The Flying Horse Carousel is believed to be the oldest carousel of its type in America. The design of the carousel is unique in that its horses are not attached to the floor, but hang by chains suspended from overhead. The horses appear to fly as the carousel increases in speed, hence the name “Flying Horse Carousel.”
Of all of the carousels in Rhode Island, the Flying Horse certainly has the most dramatic history. The carousel was built sometime between 1867 and 1876 and was part of a traveling carnival until 1879, when the carnival was forced to abandon the carousel in Watch Hill. The carousel was originally drawn from place to place by a horse, and legend has it that this horse was so faithful to the carousel that when he died, his tail was cured and inset onto one of the carousel horses as a permanent memorial.
Note: Riders are limited to children under 12 years of age.
Slater Memorial Park Carousel
Route 1A, Pawtucket, RI
(401) 728-0500, x 252
Hours of Operation: Closed for the 2008 summer season for extensive renovation. Will reopen around Labor Day weekend
Another Looff design, this carousel was built between 1880 and 1890. Although the original location is unknown, it was purchased by carousel concessionaire John Walker and moved to Slater Park in 1910. Historians claim this is the fastest Looff carousel ever made.
All but one of the hand-carved horses are original, and all have genuine horsehair tails. Worth noting: look for the man in the derby hat painted on the center of the carousel–it’s a portrait of Charles Looff himself.
The surrounding structure houses an antique ice cream truck which was operated by Americo Pierini in 1906. Another bit of Rhode Island trivia: the truck’s lettering misspells his name “Peirini.”
Carousel Village, Roger Williams Park (Website)
100 Elmwood Drive, Providence, RI
(401) 785-9450 ext. 261
Cost: $1 per ride
Hours of Operation: Open daily from 10 am — 5pm
Although this carousel is actually a reproduction built in 1989, it is worth marveling over.
The carousel is made up of fiberglass reproductions of designs by the masters of carousel art, including the “Looff Lion,” a jumping rabbit based on a signature design by Gustav Dentzel, and scenery panels, including one which displays a portrait of Dentzel. Each of the sixty carousel animals took over 100 hours to paint and detail!
Carousel at Battleship Cove (Website)
5 Water Street, Fall River, MA
Cost: $1 per ride
Summer Hours: Open seven days a week from 11am — 5pm.
Off season hours: Open weekends only from 11am — 5pm.
Growing up in Southeastern Massachusetts, I have fond memories of summer days spent at Lincoln Amusement Park in North Dartmouth. Although Lincoln Park closed over a decade ago, I was thrilled to learn that its historic carousel, which operated in the park for seventy years, had been restored and moved to Battleship Cove.
Built by the Philadelphia Toboggan Company in 1920, the carousel is made up of forty-eight horses, two multi-passenger chariots, and a Wurlitzer band organ. It sits in a gorgeous Victorian-style pavilion overlooking Heritage Park and Mt. Hope Bay.
Easton’s Beach Carousel
175 Memorial Boulevard, Newport, RI
Cost: $1 per ride
Summer Hours: Open seven days a week from 11am — 6pm.
Off season hours: Open weekends only from 11am — 6pm.
The Easton’s Beach Carousel was built in 1952 by the Allan Herschell Company. The Herschell Company was a major influence in the development of amusement park rides, pioneering the “Kiddie Land” concept and producing adult thrill rides like the Twister and a ninety-foot double Ferris wheel.
In addition to the carousel, Easton’s Beach is the home of the Save The Bay Exploration Center. The Center houses fourteen tanks and exhibits and over 150 species of animals from Narragansett Bay.
Between the carousel, the Exploration Center, sand, and surf, there’s something for everyone at Easton’s Beach.
Carousel at Emerald Square Mall
(Located in the Food Court on the 3rd floor near Macy’s)
# 999 S Washington St, North Attleboro, MA
Cost: $2 per ride or 6 tickets for $10
Hours of Operation: Same hours as the mall. Monday — Friday from 10am — 9:30pm; Sunday from 11am — 6pm.
This might not be a vintage carousel, but when you’re looking to escape the summer heat, Emerald Square provides you with a great alternative (and air-conditioned) activity. Enjoy a carousel ride and have lunch in the food court, a double crowd pleaser!
Photo Credit: Jaci Arnone. Kids in line for the Crescent Park Looff Carousel in Riverside. | <urn:uuid:7332ed6c-eced-4cd2-adc5-6c5282bc9b40> | CC-MAIN-2015-18 | http://kidoinfo.com/ri/carousels-around-rhode-island/comment-page-1/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246656168.61/warc/CC-MAIN-20150417045736-00203-ip-10-235-10-82.ec2.internal.warc.gz | en | 0.935021 | 1,563 | 2.578125 | 3 |
Nowadays computers, network and Net are as important as the air to take a breath. Computer systems have actually become an integral part of our lives, individuals have been storing all their useful data and info on the computers when there develops a need to share or transfer this info with other individuals network is available in. The thesaurus defines network as any set of interlinking lines looking like a web, a network of roads an interconnected system network of alliances. Based upon this a local area network can be defined merely as a system of interconnected computers. The network helps with remote accessibility to geographically distant sources minus the physical presence. It is additionally developed to send data to and fro and also remain attached in a globalized business environment. In today’s affordable globe organization development circumstances, sharing information on the network necessitates validating the security and security of the info from outdoors dangers.
Networks are at risk as a result of their integral quality of helping with remote access. Organization mainly depends on the firewall software’s set up in the IP network, as well as the server produced web traffic logs to maintain the info security pose. This is where details security and network security enters play. Keeping an eye on thousands of gadgets in a large network is a mammoth job. Besides with the number of arising hazards, restraint security budget plans, as well as differed compliance needs, ventures search for outsourcing this obligation to experts that have handled security services. The function of Web Application Security is quite just to protect the network and also its component parts from unauthorized access and also abuse. When security is a concern, being notified is necessary. Network layout, the applications made use of, web traffic circulation, as well as understanding of security hazards are just some of the subjects that one should know when handling network security.
A recent survey carried out by the Computer system Security Institute, states 70 percent of the companies questioned confessed violation of their network security defenses which 60 percent of the strike on information security originated from within the companies. With business purchases done over the Web, increase of e commerce and also wireless networks, companies should guarantee that security remedies be faultlessly integrated, more transparent and also much more flexible. The managed security service providers provide real time protection to the organizations and also therefore lower the threats involved in an ever changing hazard atmosphere. With a well balanced technique, aggressive security position, a techno centric focus and a flexible distribution model, this security provider likewise makes certain that the ventures fulfill the governing conformities of global standards. | <urn:uuid:a8e8a5a0-a4e5-498b-8923-446761069621> | CC-MAIN-2017-47 | http://topmdhelp.com/technology/how-to-choose-finest-network-security-services.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934803848.60/warc/CC-MAIN-20171117170336-20171117190336-00731.warc.gz | en | 0.947987 | 504 | 2.9375 | 3 |
Bioneers 2008: Using Google Earth for Environmental Activism
We've seen that with Google Earth you kind of hold the world in the palm of your hand. TreeHugger has posted on some really cool things the software can do, such as illustrate deforestation and our renewable energy potential. But there is more to it than just a few layers of mapping that illustrate our world.
After Hurricane Katrina hit, Google Earth was used to help rescue workers to save more than 4,000 people. A little later a scientist in Australia discovered a previously unknown fringing coral reef with Google Earth. At the same time, the Australian government was going to subject that region to a major environmental assessment for an oil and natural gas push. Of course, the discovery shifted things in the favor of the coral reef.
At this point, Google started to catch on that the Earth mapping holds some serious significance.
So, the world has this tool — what is the world doing with it? Google Earth has become one of the most powerful tools we have to show the scale of problems, illustrate solutions, shift public policy, channel funding for projects, and change people's way of thinking about the world.
Rebecca Moore and Google Earth Outreach are hard at work getting this tool into the hands of nonprofits that need it to further their environmental causes. After presentations and workshops at Bioneers, Moore talked with us about some of the amazing programs they're involved with.
A few years ago, Moore was handed a fuzzy map that showed where a logging company planned to cut timber in her community. It was nearly undecipherable. So in just a weekend, she utilized Google Earth to map out exactly what those fuzzy lines meant. It meant water pollution and timber cutting within 300 feet of a public school. With this tool, she was able to show the community that they did not want this logging company to move forward with the plan as it stood.
Through Google Earth, users can travel virtually to see with their own eyes what is at stake if we loose habitat, allow deforestation, move forward with coal plants or do nothing to stop a polluting factory.
With Google Earth features, users can add elements to make a map real, such as before and after imaging of things like oil spills or mountain top removal, imagery to illustrate what the maps mean and what people are looking at when they see the terrain. Video can also be embedded to increase the impact.
Through case studies presented on Google Earth Outreach, you can see the impact that seeing can have on an audience. For example, a group in Appalachia could, in just a few minutes, powerfully illustrate to politicians the devastation caused by mountain top removal, and they're making progress in stopping it. | <urn:uuid:48f544e0-c2ce-4aee-8a65-84585196f6d2> | CC-MAIN-2015-32 | http://www.treehugger.com/clean-technology/bioneers-2008-using-google-earth-for-environmental-activism.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042987552.57/warc/CC-MAIN-20150728002307-00172-ip-10-236-191-2.ec2.internal.warc.gz | en | 0.960109 | 554 | 3.03125 | 3 |
With a tanking economy and global violence on the rise, there's at least one thing to smile about: A pair of scientists is reporting that happiness can spread through social networks, meaning that friends of the cheery contract the happiness bug themselves. The data behind the new findings come from, of all things, a massive study of cardiovascular disease. In 1948, researchers began collecting health and other information on U.S. adults as part of the Framingham Heart Study. Today, the project has data on more than 14,000 people, and it has helped researchers identify many of the major risk factors behind heart disease and stroke. Because the Framingham leaders, trying to track volunteers over many years, worried about losing contact with them, they asked all subjects to provide the name of a friend who would know how to find them if necessary. Often, those friends were also part of the study.
Nicholas Christakis, formerly a hospice physician at Harvard, and James Fowler, a political scientist at the University of California, San Diego, used these data to create a social network of nearly 5000 people. The duo then matched the information with various health data. Last year, they reported that weight loss and weight gain could “spread” through the network, meaning that a guy whose friends were overweight was more likely to pack on the pounds himself (ScienceNOW, 25 July 2007). Christakis and Fowler published a similar finding on smoking earlier this year.
Now, the two have turned to something more ethereal: mood. | <urn:uuid:31e6f118-606b-4a50-a653-779ab3b1a240> | CC-MAIN-2022-27 | https://3quarksdaily.com/3quarksdaily/2008/12/is-happiness-contagious.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104576719.83/warc/CC-MAIN-20220705113756-20220705143756-00444.warc.gz | en | 0.971355 | 316 | 2.65625 | 3 |
Fathers, Teach your Children
The fourth chapter of Proverbs contains a beautiful picture of three generations of fathers passing along Godly wisdom to their sons: King Solomon taught his sons, and he remembered his father, King David, who taught him at a tender age. Each was taken under wing by a loving father and given instruction to prepare him for manhood.
“Listen, my sons, to a father’s instruction;
pay attention and gain understanding.
I give you sound learning,
so do not forsake my teaching.
For I too was a son to my father,
still tender, and cherished by my mother.
Then he taught me, and he said to me,
“Take hold of my words with all your heart;
keep my commands, and you will live.” (Proverbs 4:1-4)
|Author with sons, 2000|
Proverbs is especially useful to prepare young men starting out in life, but we can apply it more broadly to any parent-child instruction – and to all of us who are adopted as children by the Father above, who freely offers us His wisdom and love.
A few years ago, author Gordon Dalbey led one of our men’s retreats and he told us a story about a Catholic nun who worked in a men’s prison. One day, she said, a prisoner asked her to buy him a Mother’s Day card for his mother.
She did, and the word got out to other prisoners, and pretty soon this nun was deluged with requests, so she put in a call to Hallmark Cards, who donated to the prison several large boxes of Mother’s Day cards. The warden arranged for each inmate to draw a number, and they lined up through the cellblocks to get their cards.
Weeks later, the nun was looking ahead on her calendar, and decided to call Hallmark again and ask for Father’s Day cards, in order to avoid another rush. As Father’s Day approached, the warden announced free cards were again available at the chapel. To the nun’s surprise, not a single prisoner ever asked her for a Father’s Day card.
I understand that Mother’s Day is the biggest calling day of the year for the phone company. However, in terms of call volume, Father’s Day is like any other day of the week.
Before his passing last year, Irving Kristol quoted the startling fact that “almost two-thirds of rapists, three-fourths of adolescent murderers, and three-fourths of long-term prison inmates were abandoned by their fathers. Another study revealed that 92% of prison inmates hated their fathers.
This is a grim picture. Something has gone terribly wrong. Why are there so many deadbeat dads? Why have so many young men and young women been wounded by the absence of a father – a father who’s been either physically or emotionally absent, perhaps both. Others have been deeply hurt by the presence of an abusive father. | <urn:uuid:86b24c51-0a18-493d-8324-8244ef287bea> | CC-MAIN-2018-09 | https://continentalnews.net/fathers-teach-your-children | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816083.98/warc/CC-MAIN-20180225011315-20180225031315-00173.warc.gz | en | 0.978453 | 639 | 2.59375 | 3 |
We have all seen the adverts on TV, and in the media in general, around how a Virtual Private Network (VPN) will secure your web browsing, and make your connection totally private.
Well, I hate to say this, but this is not totally true.
So, what is a VPN?
We need to first of all show how a VPN is used, and how it provides you some protection.
When you connect to the Internet (be it via WiFi or wired connections) you connect your device to a Router or access point. This might be your home router, a network at your workplace or maybe a free WiFi hot spot in a Cafe.
Your device connects to the router, which in turn connects to the Internet Service Provider (ISP) that provides the external connection to the internet. We have no control over the external connection to the Internet as this is totally managed by the ISP.
If you are using WiFi, the connection to the router is typically encrypted and secure, but once the connection terminates in the router what is sent out is not encrypted unless you have encrypted the data you are sending.
However we do have control over what we pass down to the ISP.
When we browse a website using an HTTPS connection, it is encrypted. This mean that even if someone inspected the data being transferred, they would not be able to read it. However, anyone observing the network traffic would see you are accessing a website, the URL and that you were transferring encrypted data to and more than likely the IP address if the web server you were communicating with.
When you connect to the router using a VPN, all traffic is encrypted between your device and the router. Anyone observing the network traffic will just see you are connecting to a VPN Provider, and won’t be able to observe any of the traffic between your device and the VPN provider. This helps to make your connection private to any other users of the same access point and to the ISP.
Let’s zoom out a bit …
This is the sequence of events that happens:
- Your device connects to the Router/access point/hot spot
- Your device establishes a connection to a VPN Provider
- The router routes all traffic via the Internet to the VPN Provider
- The VPN Provider then decrypts the network traffic from your device and then forwards it onto the target website via the internet.
Once the web request gets to the VPN provider it is decrypted back to the basic HTTPS connection that you sent from your web browser.
Once the request gets to the target website, it knows everything there is to know about you from the resulting HTTPS connection. This will include:
- Your Browser User Agent String, which will identify the browser you are using (e.g. Chrome, FireFox, Edge, Safari) as well as the version of the browser and other information about your device
- Your Browser Fingerprint (look this up in our Glossary)
- Any username and password you provide
- Information relating to browser cookies the website had read
- Any tracking information your browser/website records and transmits.
Basically, you are only private up to the point the VPN Provider exits onto the internet. From there on you are in clear water.
If you login to the website, they know everything that you have previously provided to them, as if you had just connected normally without a VPN.
So, what is the use of a VPN?
A VPN protects you at the access point, which is probably the most vulnerable connection especially if you are connecting to public WiFi. The protection is does provide you is:
- Hides all traffic coming from your device so that it is impossible for anyone to observe your messaging even if you are using an unencrypted connection
- Hopefully hides all DNS lookups when you are not using an encrypted DNS lookup (see my blog on this)
- When the DNS lookup has resolved to an IP address, this is also hidden from the router and any observer
- Stops your ISP from tracking what websites you are looking at.
In other words it does provide some privacy and security when browsing on public networks.
What is doesn’t provide are:
- Privacy from the target website
- If you are connecting to a malicious website, the malware could still get back to your device
- Privacy from the VPN Provider
- Tracking cookies and other tracking mechanisms employed by search engines and websites.
While your ISP doesn’t know what websites you are visiting, your VPN provider does as they need to make the connection to the target website for you. The better VPN providers will state they don’t retain logs of what websites or services you access via their service. But they do log some information, for example:
- The Date/Time you connected to the service, when you disconnected and the duration of your connection
- The device you connected with
- The total amount of data you transferred
- Where you connected from.
They need this information to adequately manage the service and handle peek loads on their servers. They will often claim to only retain anonymised data that doesn’t identify you directly and to delete it after a short period.
The better ones won’t record:
- The Websites/services you visit
- Data Transferred to the target service
- Target website usernames/passwords
- Tracking information.
However, not all VPN’s are made equal. The better ones are not free to use, and will provide a better privacy and security experience. The free ones will monetise your connection in various ways:
- Record your traffic and sell this data to other services for tracking and marketing purposes
- use your device to provide some aspect of the VPN connection for other users (e.g. route traffic through your device instead of through their servers).
There are many ways to monetise your data through these free VPN’s. The general principle is ‘If you are jot paying for a product, your data is likely the product’.
Why would I use a VPN?
There are many reasons to use a VPN:
- If you are accessing your workplace remotely, your employer will likely provide a VPN to make that connection secure and private
- You want to hide your activity when using public WiFi
- You want to hide your activity from your ISP to limit their ability to market your data
- You want to communicate privately with someone and you don’t want people to monitor your conversation
- You want to access material in a different geographic location that is blocked from your current location.
Lets look at the last point a little closer. Try to access the BBC iPlayer while you are on holiday outside the UK. Try to access Hulu from the UK. You will be greeted by a screen telling you that the content you are trying to access is not available in your location. This is GeoFencing. The restriction of information to a particular geological, or political, border.
When connecting to a VPN you can choose which country you are connecting from, and which country you are exiting in. If you are Spain and access the BBC iPlayer with the exit node of the VPN in the UK, then the BBC thinks you are in the UK and unblocks the content. However, some services are getting wise to this and detecting the exit node from the VPN and blocks the content anyway irrespective of whether you are in the relevant country or not.
However, if you are using a VPN to ensure total privacy, then as soon as you exit onto the open internet you are visible again and a lot of the perceived privacy and security evaporates.
What VPN Services are there?
I should firstly mention that I have no affiliation to any particular service and any recommendations are based on freely available data.
Tech Radar is a very good consumer technology website that performs periodic reviews of VPN services. Perform the following search to see a lot of their current material:
There are also other sources of information and I suggest you do your own research in your own country as the advice there might be different to the UK.
Also look to see where they are based. Look up in our Glossary ‘Surveillance Alliances’ , and in particular the “5 Eyes”, “9 Eyes”, and “14 Eyes” global surveillance alliances. If your VPN is based in any of these countries, then any use of the VPN has to be recorded and can be requested/disclosed as intelligence to any of these nations. Even if you don’t live in these countries, they may disclose any information they have about you.
Express VPN is based in the British Virgin Islands. NordVPN is based in Panama. Both these countries have very few restrictions on what they are required to record and are amonst the top VPN providers. However, neither are cheap and definitely do not have any free options.
Mozilla (makers of the FireFox browser) are also trialing a VPN, but this is currently limited to certain US States. However it will eventually be rolled out to most countries and when it does, I expect I will try it. While we are on this subject, I strongly recommend using FireFox as your default browser as it provides a lot of the privacy protection you need even without a VPN (see also below).
Are there places I can’t use a VPN?
The short answer to this is ‘YES’.
Some countries monitor and actively block VPN’s. Russia, China and Saudi Arabia are very active in blocking VPN’s. There are some that are approved for corporate use, but very few are available in these countries for consumer use. If you use one, you may get arrested and you are unlikely to get any internet access.
If you are traveling and intend to use a VPN, do your homework on whether or not you may land in trouble if you use it in your destination country. Ignorance of the law is definite not an excuse in these countries.
You have been warned!
How do I protect myself if I don’t want to use a VPN?
All modern browsers have some form of ant-tracking feature either by using an Add-on or native features. FireFox is by far the best for privacy because they don’t market any information processed through their browser. On the other hand, Googles Chrome browser leaks everything back to Google who will monetise that data.
There are a number of browser extensions for Chrome and FireFox that will help to limit privacy invasions and help secure your browsing experience (other browsers may also have these):
- U-Block Origin – this is a very effective Advert blocker, but also has a number of other features, e.g. Link Tracking Protection
- Ghostery – this is a tracking protection add-on that blocks a lot of the trackers that appear on web pages
- HTTPS Everywhere – this is produced by the Electronic Frontier Foundation (EFF) and enforces HTTPS connections even when you don’t specify one
- Privacy Badger – this is also an EFF add-on that provides intelligent tracking protection similar to Ghostery and that provided by browsers (you don’t need both)
- ClearURLs – this removes a lot of the tracking information in the URL you use to access a website.
These are the extensions/add-ons I use all the time to secure my own browsing. However, they can break websites functionality and you may have to experiment to see which one is causing the problem by selectively disabling its function for the website or disabling settings.
You can also block auto-play of HTML 5 Video, which is more of an annoyance limiter than anything. However ,malware can creep in via video players so this should also be considered. There are various extensions available, and most browsers offer this in their advanced settings.
You can also enable the ‘Do Not Track’ function in your browser. However, this is little or than a suggestion to the receiving web server that you don’t want to be tracked and the majority of web services totally ignore this setting. However, I would suggest you enable this setting for those websites that do honour the request.
I would suggest using the above add-ons even if you do use a VPN since all the tracking data is not typically blocked by the VPN.
FireFox also has extensive Tracking Protection built in. Chrome is providing similar functionality in the future. The Chrome version of Microsoft’s Edge browser will offer this protection when it releases for Windows and Macs. The Microsoft Edge browser for Android does provide some ad-blocking and privacy features, but FireFox on Android is by far the best for this.
You can also use Encrypted DNS lookups.
What about the TOR network?
This is the subject of a blog that I have yet to write. However if you want to use TOR then go and look at the TOR Projects website which will provide you with a lot of the more technical information and how it is funded. You can also use the TOR Browser on most platforms, including now Android, that makes a connection to the TOR network before you start browsing. However, if you use the TOR network as a VPN, once you exit the TOR network you are in clear water again and can be tracked. The TOR Browser does provide the best safeguards to limit the ability for any service to track you, but once you login into the service they own you.
If you use the TOR network you should steer clear of the dark and deep web as his will only get you into trouble (a subject of another future blog).
You should also know that some services block access from the TOR network, so you could end up being locked out of your favorite websites. Also, as you are accessing the TOR network from an ISP, they will track that access, and you could find yourself being actively watched by law enforcement and intelligence agencies. Accessing the TOR network from some countries is also banned, punishable by law so do your research before you travel. Some countries, like China and Iran, have managed to block access to the TOR network because of the way they have set up the internet in these countries. Russia is also actively researching how to decrypt the TOR network and render it useless – good luck with that!
On Android, you can also use OrBot, which is a free VPN/Proxy that routes through the TOR network that is sponsored by the TOR Project.
BE WARNED – The TOR network isn’t for the feint hearted and definitely not a safe play ground even for experienced people. More on this in the future blog (when I get round to writing it).
I hope this blog, while a bit long even by my standards, has demystified some aspects of VPN’s and that you will be better informed to decide whether or not one if you.
I also hope that you can now see through the ‘BS’ that is pedaled by a lot of the VPN providers around total privacy and security while accessing the Internet.
If you are going to use a VPN, DO NOT USE A FREE ONE!! If you do, you are the product they are selling, not the VPN.
Look out for my blogs on the TOR Network and the Dark/Deep Web and keep coming back for more content as I produce it.
Headline image provided by Shutterstock. | <urn:uuid:f97a63ab-da0a-4bad-9642-7a1ec809e2df> | CC-MAIN-2022-05 | https://jmbusinesssecurity.co.uk/2019/10/19/blogs20191019b/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304471.99/warc/CC-MAIN-20220124023407-20220124053407-00269.warc.gz | en | 0.950898 | 3,267 | 3.0625 | 3 |
Monday , November 24, 2003
Very few people took immediate notice of a great man's death on November 22, 1963. Even so, C.S. Lewis (search) almost certainly will leave a larger legacy than John F. Kennedy (search), who died the same day, or Aldous Huxley (search), who also died on November 22.
Lewis was a literary scholar who set out on a painstaking, lifelong trek from agnosticism (search) to Christianity. He conducted himself like a curious tourist, looking carefully and curiously at the world around him, at the good, the bad, the seamy, the saintly, the noble and, of course, the despicable.
He asked simply questions, such as, "Where does moral truth come from if not from God?" and "Jesus was either a liar, a lunatic or the lord. Which is it?"
He wrote with thrilling clarity, as if tracing his words with a razor rather than a pen.
And he was brutally honest. He refused to evade tough questions or concoct easy excuses, as many churchmen do these days, and became arguably the most effective Christian writer of the 20th century because he wrote as a seeker, not a preacher.
He figured we're all sinners and the best among us isn't a whole lot better than the worst. But he did perform one great service. He taught others how to search for the truth. He didn't take anybody to Camelot, but he may have led a few souls closer to salvation. Not bad.
That's it for today. Have a great week, and remember to start your Sundays right here on Fox News Sunday. | <urn:uuid:76717ebc-108a-4747-9026-9e8adda08c0b> | CC-MAIN-2016-44 | http://www.foxnews.com/printer_friendly_story/0,3566,103938,00.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718987.23/warc/CC-MAIN-20161020183838-00288-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.986901 | 341 | 2.6875 | 3 |
Note: This notes were strongly inspired by the following books: CSSLP Certification All in one and Official (ISC)2 Guide to the CSSLP CBK, Second Edition
Attack Surface Evaluation
The threat modeling process have 3 phases:
- model the system for which you want to find the threats.
- find the threats.
- STRIDE model.
- attack trees – An attack tree is a hierarchical tree-like structure, which has either an attacker’s objective (e.g., gain administrative level privilege, determine application makeup and configuration, bypass authentication mechanisms, etc.) or a type of attack
(e.g., buffer overflow, cross site scripting, etc.) at its root node.
- address each threat found in the previous step. Once identified,each threat must be evaluated according to the risk attached to it. There are several ways to quantitatively or qualitatively determine the risk ranking for a threat. These range from the simple, non-scientific, Delphi heuristic methodology to more statistically sound risk ranking using the probability of impact and the business impact.
- document and validate.
This part is linked to the Secure Software Concepts and contains how the security software concepts can be applied to have a secured application.
- confidentiality – use cryptographic and masking techniques
- integrity – use hashing (or hash functions), referential integrity design (uses primary keys and related foreign keys in the database to assure data integrity), resource locking (when two concurrent operations are not allowed on the same object (say a record in the database), because one of the operations locks that record from allowing any changes to it, until it completes its operation, it is referred to as resource locking), and code signing.
- availability – replication, fail-over and scalability techniques can be used to design the software for availability.
- authentication – use multi-factor authentication and single sign on (SSO). Rely of already existing mechanism if possible (like the ones offered by the operating system).
- authorization – rely of already existing mechanism if possible.
- accounting (audit) – determine of what elements should be logged and under what circumstances.
- improper implementation of least privilege
- software fails insecurely
- authentication mechanisms are easily bypassed
- security through obscurity
- improper error handling
- weak input validation
Architecture system with secured design principles:
- good enough security – care should be taken to ensure that the security elements are in response with the actual risk associated with the potential vulnerability; do not over-engineer.
- least privilege – use of accounts with non-administrative abilities.
Modular programming is a software design technique in which the entire program is broken down into smaller sub-units or modules. Each module is discrete with unitary functionality and is said to be therefore cohesive, meaning each module is designed to perform one and only one logical operation.
- separation of duties – the programmer should not be allowed to review his own code nor should a programmer have access to deploy code to the production environment.
- defense in depth
use of input validation along with prepared statements or storedprocedures, disallowing dynamic query constructions using userinput to defend against injection attacks.
disallowing active scripting in conjunction with output encodingand input- or request-validation to defend against Cross-SiteScripting (XSS).
- fail safe
the user is denied access by default and the account is locked out after the maximum number (clipping level) of access attempts is tried.
errors and exceptions are explicitly handled and the error messages are non-verbose in nature.
not designing the software to ignore the error and resume nextoperation
- economy of mechanism – trade-off that happens between the
usability of the software and the security features that need to be designed and built in.
Unnecessary functionality or unneeded security mechanisms should be avoided.
- Strive for simplicity.
- Strive for operational ease of use.
- complete mediation –
- open design – the inverse of the open design principle is security through obscurity, which means that the software employs protection mechanisms whose strength is dependent on the obscurity of the design.
- least common mechanism – mechanisms common to more than one user or process are designed not to be shared. Design should compartmentalize or isolate the code (functions) by user roles, since this increases the security of the software by limiting the exposure.
- psychological acceptance – security principle that states that security mechanisms should be designed to maximize usage, adoption, and automatic application.The security protection mechanisms:
- are easy to use,
- do not affect accessibility.
- are transparent to the user.
- weakest link – when designing software, careful attention must be
given so that there are no exploitable components.
- leverage existing components – reusing tested and proven, existing libraries and common components has good security benefits.
Securing commonly used architectures
- mainframe architecture
- distributed architecture
- service oriented architecture
An ESB is a software architectural pattern that facilitates communication between mutually interacting software application.
- rich internet aplications (RIA)
Infrastructure as a Service (IaaS) -infrastructural components such as networking equipment, storage, servers and virtual machines are provided as services and managed by the cloud service provider.
Platform as a Service (PaaS) -in addition to infrastructural components, platform components such as operating systems, middleware and runtime are also provided as services and managed by the cloud service provider.
Software as a Service (SaaS) – in addition to infrastructural and platform components, data hosting and software applications are provided as services and managed by the cloud service provider.
Digital Rights Management
Open Digital Rights Language (ODRL) – A generalized, open standard under development that expresses rights using XML.
eXtensible rights Markup Language (XrML) – Another generalized REL that is more abstract than ODRL. XrML is more of a meta-language that can be used for developing other RELs.
Publishing Requirements for Industry Standard Metadata(PRISM) – Unlike ODRL and XrML, PRISM can be used to expressrights specific to a task and is used for syndication of print mediacontent such as newspapers and magazine.
- Trusted Platform Module (TPM) – specification used in personal computers and other systems to ensure protection against disclosure of sensitive or private information as well as the implementation of the specification itself.
- Trusted Computing Base (TCB) – the set of all hardware, firmware and software components that are critical to its security. | <urn:uuid:ef74f2d2-96bf-4bc5-8a38-d912b340bf07> | CC-MAIN-2020-34 | https://adriancitu.com/tag/threat-modeling/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738950.31/warc/CC-MAIN-20200812225607-20200813015607-00558.warc.gz | en | 0.901499 | 1,373 | 2.578125 | 3 |
“The ultimate objective of this strategy—to wipe out poverty by establishing a guaranteed annual income — will be questioned by some. Because the ideal of individual social and economic mobility has deep roots, even activists seem reluctant to call for national programs to eliminate poverty by the outright redistribution of income.” — Cloward and Piven
First proposed in 1966 and named after Columbia University sociologists Richard Andrew Cloward and Frances Fox Piven, the Cloward-Piven Strategy seeks to hasten the fall of capitalism by overloading the government bureaucracy with a flood of impossible demands, thus pushing society into crisis and economic collapse.
Inspired by the August 1965 riots in the black district of Watts in Los Angeles (which erupted after police had used batons to subdue an African American man suspected of drunk driving), Cloward and Piven published an article titled "The Weight of the Poor: A Strategy to End Poverty" in the May 2, 1966 issue of The Nation. Following its publication, The Nation sold an unprecedented 30,000 reprints. Activists were abuzz over the so-called "crisis strategy" or "Cloward-Piven Strategy," as it came to be called. Many were eager to put it into effect.
In their 1966 article, Cloward and Piven charged that the ruling classes used welfare to weaken the poor; that by providing a social safety net, the rich doused the fires of rebellion. Poor people can advance only when "the rest of society is afraid of them," Cloward told The New York Times on September 27, 1970. Rather than placating the poor with government hand-outs, wrote Cloward and Piven, activists should work to sabotage and destroy the welfare system; the collapse of the welfare state would ignite a political and financial crisis that would rock the nation; poor people would rise in revolt; only then would "the rest of society" accept their demands.
The key to sparking this rebellion would be to expose the inadequacy of the welfare state. Cloward-Piven's early promoters cited radical organizer Saul Alinsky as their inspiration. "Make the enemy live up to their own book of rules," Alinsky wrote in his 1971 book Rules for Radicals. When pressed to honor every word of every law and statute, every Judeo-Christian moral tenet, and every implicit promise of the liberal social contract, human agencies inevitably fall short. The system's failure to "live up" to its rule book can then be used to discredit it altogether, and to replace the capitalist "rule book" with a socialist one.
The authors noted that the number of Americans subsisting on welfare — about 8 million, at the time — probably represented less than half the number who were technically eligible for full benefits. They proposed a "massive drive to recruit the poor onto the welfare rolls." Cloward and Piven calculated that persuading even a fraction of potential welfare recipients to demand their entitlements would bankrupt the system. The result, they predicted, would be "a profound financial and political crisis" that would unleash "powerful forces for major economic reform at the national level."
Their article called for "cadres of aggressive organizers" to use "demonstrations to create a climate of militancy." Intimidated by threats of black violence, politicians would appeal to the federal government for help. Carefully orchestrated media campaigns, carried out by friendly, leftwing journalists, would float the idea of "a federal program of income redistribution," in the form of a guaranteed living income for all — working and non-working people alike. Local officials would clutch at this idea like drowning men to a lifeline. They would apply pressure on Washington to implement it. With every major city erupting into chaos, Washington would have to act. This was an example of what are commonly called Trojan Horse movements — mass movements whose outward purpose seems to be providing material help to the downtrodden, but whose real objective is to draft poor people into service as revolutionary foot soldiers; to mobilize poor people en masse to overwhelm government agencies with a flood of demands beyond the capacity of those agencies to meet. The flood of demands was calculated to break the budget, jam the bureaucratic gears into gridlock, and bring the system crashing down. Fear, turmoil, violence and economic collapse would accompany such a breakdown — providing perfect conditions for fostering radical change. That was the theory.
Cloward and Piven recruited a militant black organizer named George Wiley to lead their new movement. In the summer of 1967, Wiley founded the National Welfare Rights Organization (NWRO). His tactics closely followed the recommendations set out in Cloward and Piven's article. His followers invaded welfare offices across the United States — often violently — bullying social workers and loudly demanding every penny to which the law "entitled" them. By 1969, NWRO claimed a dues-paying membership of 22,500 families, with 523 chapters across the nation.
Cloward and Piven recruited a militant black organizer named George Wiley to lead their new movement. In the summer of 1967, Wiley founded the National Welfare Rights Organization (NWRO). His tactics closely followed the recommendations set out in Cloward and Piven's article. His followers invaded welfare offices across the United States -- often violently — bullying social workers and loudly demanding every penny to which the law "entitled" them. By 1969, NWRO claimed a dues-paying membership of 22,500 families, with 523 chapters across the nation.
Regarding Wiley's tactics, The New York Times commented on September 27, 1970, "There have been sit-ins in legislative chambers, including a United States Senate committee hearing, mass demonstrations of several thousand welfare recipients, school boycotts, picket lines, mounted police, tear gas, arrests and, on occasion, rock-throwing, smashed glass doors, overturned desks, scattered papers and ripped-out phones." These methods proved effective. "The flooding succeeded beyond Wiley's wildest dreams," writes Sol Stern in the City Journal. "From 1965 to 1974, the number of single-parent households on welfare soared from 4.3 million to 10.8 million, despite mostly flush economic times. By the early 1970s, one person was on the welfare rolls in New York City for every two working in the city's private economy." As a direct result of its massive welfare spending, New York City was forced to declare bankruptcy in 1975. The entire state of New York nearly went down with it. The Cloward-Piven strategy had proved its effectiveness.
The Cloward-Piven strategy depended on surprise. Once society recovered from the initial shock, the backlash began. New York's welfare crisis horrified America, giving rise to a reform movement which culminated in "the end of welfare as we know it" — the 1996 Personal Responsibility and Work Opportunity Reconciliation Act, which imposed time limits on federal welfare, along with strict eligibility and work requirements. Both Cloward and Piven attended the White House signing of the bill as guests of President Clinton.
Most Americans to this day have never heard of Cloward and Piven. But New York City Mayor Rudolph Giuliani attempted to expose them in the late 1990s. As his drive for welfare reform gained momentum, Giuliani accused the militant scholars by name, citing their 1966 manifesto as evidence that they had engaged in deliberate economic sabotage. "This wasn't an accident," Giuliani charged in a 1997 speech. "It wasn't an atmospheric thing, it wasn't supernatural. This is the result of policies and programs designed to have the maximum number of people get on welfare."
Cloward and Piven never again revealed their intentions as candidly as they had in their 1966 article. Even so, their activism in subsequent years continued to rely on the tactic of overloading the system. When the public caught on to their welfare scheme, Cloward and Piven simply moved on, applying pressure to other sectors of the bureaucracy, wherever they detected weakness.
In 1982, partisans of the Cloward-Piven strategy founded a new "voting rights movement," which purported to take up the unfinished work of the Voting Rights Act of 1965. Like ACORN, the organization that spear-headed this campaign, the new "voting rights" movement was led by veterans of George Wiley's welfare rights crusade. Its flagship organizations were Project Vote and Human SERVE, both founded in 1982. Project Vote is an ACORN front group, launched by former NWRO organizer and ACORN co-founder Zach Polett. Human SERVE was founded by Richard A. Cloward and Frances Fox Piven, along with a former NWRO organizer named Hulbert James.
All three of these organizations — ACORN, Project Vote and Human SERVE — set to work lobbying energetically for the so-called Motor-Voter law, which Bill Clinton ultimately signed in 1993. The Motor-Voter bill is largely responsible for swamping the voter rolls with "dead wood" — invalid registrations signed in the name of deceased, ineligible or non-existent people — thus opening the door to the unprecedented levels of voter fraud and "voter disenfranchisement" claims that followed in subsequent elections. At this time Barack Obama was a community organizer in Chicago deeply committed to the aims and goals of ACORN and an advocate of the Cloward and Piven Strategy and the tactics of his mentor Saul Alinsky. While Obama’s Acorn connection has not gone entirely unreported, its depth, extent, and significance have been poorly understood. Typically, media background pieces note that, on behalf of Acorn, Obama and a team of Chicago attorneys won a 1995 suit forcing the state of Illinois to implement the federal “motor-voter” bill.
The new "voting rights" coalition combines mass voter registration drives — typically featuring high levels of fraud — with systematic intimidation of election officials in the form of frivolous lawsuits, unfounded charges of "racism" and "disenfranchisement," and "direct action" (street protests, violent or otherwise). Just as they swamped America's welfare offices in the 1960s, Cloward-Piven devotees now seek to overwhelm the nation's understaffed and poorly policed electoral system. Their tactics set the stage for the Florida recount crisis of 2000, and have introduced a level of fear, tension and foreboding to U.S. elections heretofore encountered mainly in Third World countries.
While Acorn holds to NWRO’s radical economic framework and its confrontational 1960’s-style tactics, the targets and strategy have changed. Acorn prefers to fly under the national radar, organizing locally in liberal urban areas — where local legislators and reporters are often “slow to grasp how radical Acorn’s positions really are.” Acorn’s new goals are municipal “living wage” laws targeting “big-box” stores like Wal-Mart, rolling back welfare reform, and regulating banks — efforts styled as combating “predatory lending.” Unfortunately, instead of helping workers, Acorn’s living-wage campaigns drive businesses out of the very neighborhoods where jobs are needed most. Acorn’s opposition to welfare reform only threatens to worsen the self-reinforcing cycle of urban poverty and family breakdown. Perhaps most mischievously Acorn uses banking regulations to pressure financial institutions into massive “donations” that it uses to finance supposedly non-partisan voter turn-out drives.
Both the Living Wage and Voting Rights movements depend heavily on financial support from George Soros's Open Society Institute and his Shadow Party, through whose support the Cloward-Piven strategy continues to provide a blueprint for some of the Left's most ambitious campaigns.
The now-infamous Cloward-Piven Strategy is a clear roadmap to socialism: get so many people addicted to government entitlements that the economic system collapses, and in the resulting chaos the populace will demand and vote for a new economic system in which everyone is supported by the state.
Sounds logical (if nefarious), and President Obama seems hell-bent on bringing it to fruition in the United States. The problem for Obama’s inner socialist is that he’s also required for appearance’s sake to attempt a rescue of the American economy using Keynesian principles. This self-cancelling combo-strategy is the underlying cause of our economic stagnation.
Last week the Bureau of Labor Statistics released a report that said that the labor force participation rate (LFPR) dropped to 63.6%, the lowest rate since Jimmy Carter was in office. Essentially that means that of the population of 16 year and older, 37.4% of them decided not to work or not to seek work. That’s 88.8 million people! To put that in perspective, when George Bush took office the LFPR was 67.2% and eight years later it was 1.5% lower at 65.7%. It has dropped 2.1% in Barack Obama’s first four years, the most precipitous drop in workforce participation since they started keeping records in 1948.
But percentages only tell you so much. Each of those percentage points represents approximately 2.5 million people. Since Barack Obama became president over 5 million people have simply stopped trying to find a job. If just half of those 5 million people were still looking for jobs, the unemployment rate would actually be 9.4% rather than the official 7.8%. Now some of those are students who chose to go to college because they couldn’t find a job and others are senior citizens who’ve retired from the workforce, but the overwhelming majority of those 5 million are people who have simply given up hope.
And that’s the point, and the problem. Not since the 1970’s have the American people felt so discouraged about the prospects for the nation in general and their individual economic circumstances in particular. For most of American history the notion of having a job, doing something productive for your family and your community was the norm. Barack Obama is seeking to rapidly change that, and he got a good head start during his first term. The President has doubled the number of people on food stamps and he gutted Bill Clinton’s welfare reform. That’s his version of Supply Side Economics, he supplies the benefits and people will be happy to give him four more years. Add to this the regulatory nightmare he has unleashed on businesses and four years of demagoguing those who drive American productivity and you have an ever increasing number of Americans who believe they either can’t or don’t have to find jobs.
For much of the 20th century the United States was looked at as the place to come to seek your fortune, to make or do something with your life, basically where anything was possible. Although Hollywood, Coke, and Levis brought the American Dream to the rest of the world, far more importantly, most Americans were pursuing it here at home, if not living it. Today something altogether different is occurring. As the Gallop poll demonstrated, much diminished is that “Can do” feeling that most Americans had for most of our history, the feeling that prosperity and success were just around the corner and anyone could achieve it if they worked hard enough. America has become a state of dependence, where half the population pays no income taxes and where 40% of the population suckles at the public tit, either in the form of government handouts or as employees of a bloated bureaucracy.
How long can a population survive when fewer and fewer people are supporting an ever increasing population of non-producers? As Cloward and Piven predicted in 1966 you could overload the welfare system in an effort to bring about a redistribution of wealth. If you read their manifesto, you can’t help but recognize their methods in Barack Obama’s policies.
While it’s impossible to know what the future holds, it’s not difficult to wonder what the situation of the country might be in 4 years if the same policies that brought us to where we are today were implemented during the president’s second term.
If Food Stamp growth were to decline to 25% (vs. 50% over the President’s first term) there will still be 60 million Americans on the program. If Social Security Disability (which is at its highest level on record) increases by another 25% as it did in the last four years, a total of 13 million Americans will be on disability. (What’s most heart breaking about this programs is that the rampant fraud and bureaucratic incompetence are keeping benefits out of the hands of the truly needy.) Those measures alone would bring the total of people receiving government checks (i.e. money taken from taxpayers or borrowed that will have to be paid back by taxpayers) from 18% of our population today to almost 23%. Add in the 8 million or so people receiving unemployment benefits and the 4.4 million on welfare and you have over a quarter of the population on the receiving end of some wealth redistribution program. On the workforce side, if the LFPR declines another two percent it will sit at 61.6%, a level not seen since 1977. With a LFPR of 61.6% and an unemployment rate that stayed at today’s 7.9%, we would have only 141 million workers supporting a population of 323 million people verses today’s 144 million supporting a population of 313. That’s 3 million fewer workers supporting a population that would have grown by 10 million! Inverted pyramids like that don’t last for long.
At the end of the day, one has to wonder what exactly were those 65 million voters hoping for when they voted for Barack Obama? If it was more of the same they just might be in luck at least in the short run. It appears that the President plans on doubling down on his policies. He appears to be executing the socialist Cloward Piven Strategy perfectly. While his devotees may be happy with his rhetoric today, they will likely not be happy when his grand strategy succeeds tomorrow. The problem with socialism in America is that it assumes a static nature of the citizenry, i.e. that government can impose whatever requirements on workers and producers and they will have no choice but to comply. Nothing could be farther from the truth. With countries from Australia to Canada to Singapore to Estonia to Denmark offering greater levels of economic freedom, those who fund what the government redistributes have many options available to them. Money, like water, flows to the areas of least resistance and the resistance is increasing in the United States. Eduardo Saverin (of Facebook fame), Tina Turner and a record number of other American citizens are making it clear that do indeed have options. Lots of companies do too. When all of the producers have finally left the country, all that will be left of Barack Obama’s redistributive state will be those who no longer know how to fend for themselves. Somehow I can’t imagine that being the Nirvana that Obama voters were thinking of.
But the economy, while the main focus point of the Cloward and Piven Strategy, it is not the only thing happening in the Obama administration. Their other factor is chaos. Right now the Obama masterminds are overloading the Congress, press, and people with numerous issues that are dulling the senses of the voters. Immigration, gun control, sequesters gay marriage, health care, regulations, crony capitalism, government bail-outs, North Korea, Afghanistan and an overblown and ridiculous budget — a budget that will only reduce the increase in spending, the deficit, and the national debt. All of these factors are creating chaos and diverting the efforts of those in opposition to Obama’s plans.
The Democratic controlled Senate is rushing immigration and gun control bills through the Congress with little or no debate or hearings. The “path to citizenship” proposed in the various proposed immigration bills will add somewhere between 10-20 million new welfare recipients to the mix along with dramatically increasing the cost of health care and bankrupting the states through their Medicare payments thus further overloading the system.
The proposed gun control legislation, while not adding much to the deficit or debt, will increase government control over the citizenry by watering down the Bill of Rights. These measures are only a part of the chaos being fostered by Obama and his minions with little or no oversight from Congress.
While Richard Andrew Cloward is dead Frances Fox Piven is still pushing their strategy of redistribution towards the socialist state. This is a far cry from those men of the Gilded Age who built the greatest economic power in the world and our Founders who gave us the most unrestricted and freest government in the history of the world where life, liberty and the pursuit of happiness were the paramount factors in their thinking. Today the Cloward Piven Strategy seems to be working and our lawmakers are marching in lockstep while the voters are lining up to have their rice bowls filled by Uncle Sam. | <urn:uuid:b2f3e424-6512-40f0-8e88-73dd1c7954b4> | CC-MAIN-2017-34 | http://fredhenstridge.blogspot.com/2013/04/the-clowardpiven-strategy-is-working.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886112682.87/warc/CC-MAIN-20170822201124-20170822221124-00419.warc.gz | en | 0.96007 | 4,288 | 3.0625 | 3 |
The prophet Zephaniah declared that God would eventually punish the Assyrians for their cruelty and pagan worship (Judges 1:6 and Nahum 2:3). Their capital city, Nineveh, would become a laughingstock among the nations.
People would express their delight at Nineveh’s downfall by heaping contempt on the city. Hissing by passing air through one’s teeth and shaking the fist were expression of mockery and ridicule.
The prophet Jeremiah painted a similar picture of the mockery of Jerusalem after it fell to the Babylonian army in 687 BC (Lamentations 2:15).
ZEPHIANIAH 2:15 – Every one that passeth by her [Nineveh] shall hiss [scoff, NIV], and wag his hand [shake their fists, NIV], | <urn:uuid:4d8e5223-a418-4ba6-8873-6fb567a60ac0> | CC-MAIN-2022-27 | https://jesusway4you.com/2021/03/30/bible-customs-and-curiosities-mockery-and-ridicule/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104669950.91/warc/CC-MAIN-20220706090857-20220706120857-00591.warc.gz | en | 0.967098 | 173 | 2.75 | 3 |
By Dhiren Chauhan, Contributor
Every firefighter knows that the radio is a lifeline. Indeed, some radios have integrated GPS tracking — laying the groundwork for tracking firefighters via GPS locators.
But whether GPS is ideal to track firefighters still is being debated.
Radio-enabled GPS tracking can work for locating team members in outside environments, such as wildfires. GPS also can aid in locating the nearest assets to a given location if the overall asset identification and dispatching system is GPS capable.
Yet, no technology can work in a vacuum.
For instance, not all public-safety communications infrastructure is satellite capable. So, direct links with the GPS satellite network might not be available.
The GPS tracking might still be viable; however, communicating the location data to the incident commander will require further planning and infrastructure.
Limitations of GPS
GPS tracking does have some limitations. GPS tracking only is accurate to within a certain degree, as anyone using maps on a smartphone is probably aware. That latitude of accuracy is not precise enough to find someone injured in a large wildfire.
GPS's biggest limitation is when first responders move indoors.
When firefighters enter a building, GPS quickly becomes unreliable. To work effectively, GPS requires line of sight with the sky and the ability to connect with more than one GPS satellite.
Just like cellular phones are less effective inside the concrete and steel of a building, the GPS integrated into the radio is not effective enough inside a structure to bet someone's life on the technology.
Addressing this area of firefighter safety is crucial since most incidents requiring personnel rescue occur within a structure. As urban areas seek denser development and mixed-use structures – retail beneath residential units, for instance – the prospect of firefighters increasingly entering complex interior environments raises the stakes on tracking and locating firefighters needing rescue.
Sensors for future tracking
Fortunately, new technology is emerging that addresses the problem of tracking firefighters under any conditions, outside or within a building. The technology involves sensor modules worn on a firefighter's belt.
The modules contain sensors such as accelerometers and barometers to produce location information and can often coordinate with one another in a mesh network to produce coordinate information.
Software then distributes that snapshot of this information through the radio back to the command infrastructure.
At some point, this technology could be incorporated directly into the radio much like the GPS technology mentioned above. However, that point of integration is some time in the future.
The sensor technology is improving far more rapidly than practical for radio upgrade cycles. While this sensor module locating system currently is only recommended for training purposes, it is just a matter of time before full deployment is possible.
Firefighters risk their lives to help others. Location and tracking technology already exists, and it is evolving rapidly to ensure their lives are protected. The time to incorporate it into tactical management and infrastructure planning is now.
Dhiren Chauhan is the fire and EMS marketing manager for North American Public Safety. Additionally, he provides a voice for Motorola Solutions for firefighter life safety initiatives and advocacy associations such as The National Fallen Firefighter’s Foundation (NFFF) and the Congressional Fire Services Institute (CFSI). Learn more about Location Services and be sure to follow the latest public safety news from Motorola Solutions on Twitter and Facebook. | <urn:uuid:90caaf2b-e4cb-4a9d-bd03-e28a36e85157> | CC-MAIN-2014-23 | http://www.firerescue1.com/fire-products/technology/articles/1916468-Holy-Grail-of-firefighter-tracking-on-the-horizon/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997889255.54/warc/CC-MAIN-20140722025809-00170-ip-10-33-131-23.ec2.internal.warc.gz | en | 0.924886 | 671 | 2.9375 | 3 |
IC 1908 - Barred Spiral Galaxy in Horologium
IC 1908 is a Barred Spiral Galaxy in the Horologium constellation. IC 1908 is situated south of the celestial equator and, as such, it is more easily visible from the southern emisphere.
Photometric information of IC 1908
The following table lists the magnitude of IC 1908 in different bands of the electomagnetic spectrum (when available), from the B band (445nm wavelength, corresponding to the Blue color), to the V band ( 551nm wavelength, corresponding to Green/Yellow color), to the J, H, K bands (corresponding to 1220nm, 1630nm, 2190nm wavelengths respectively, which are colors not visible to the human eye).
For more information about photometry in astronomy, check the photometric system article on Wikipedia.
The surface brightess reported below is an indication of the brightness per unit of angular area of IC 1908.
Apparent size of IC 1908The following table reports IC 1908 apparent angular size. The green area displayed on top of the DSS2 image of IC 1908 is a visual representation of it.
Digitized Sky Survey image of IC 1908
The image below is a photograph of IC 1908 from the Digitized Sky Survey 2 (DSS2 - see the credits section) taken in the red channel. The area of sky represented in the image is 0.5x0.5 degrees (30x30 arcmins).
IC 1908 - Barred Spiral Galaxy in Horologium morphological classification
IC 1908 - Barred Spiral Galaxy in Horologium is classified as Barred Spiral (Bb) according to the Hubble and de Vaucouleurs galaxy morphological classification. The diagram below shows a visual representation of the position of IC 1908 - Barred Spiral Galaxy in Horologium in the Hubble de Vaucouleurs sequence.
Celestial coordinates and finder chart of IC 1908
Celestial coordinates for the J2000 equinox of IC 1908 are provided in the following table:
The simplified sky charts below show the position of IC 1908 in the sky. The first chart has a field of view of 60° while the second one has a field of view of 10°.
Rise ans set times of IC 1908 from your location
IC 1908 - Barred Spiral Galaxy in Horologium is currently not visible from Greenwich, United Kingdom [change] | <urn:uuid:855f0d03-dece-4675-8e36-72a48ea42a09> | CC-MAIN-2022-27 | https://theskylive.com/sky/deepsky/ic1908-object | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104205534.63/warc/CC-MAIN-20220702222819-20220703012819-00650.warc.gz | en | 0.781214 | 494 | 2.96875 | 3 |
If you¿ve ever wondered what the heck quarks and neutrinos are, or why anyone cares, this is the site for you. Lawrence Berkeley National Laboratory¿s particle physicists have created an accessible, entertaining primer on, as they describe it, what the world is made of and what holds it together. Nine sections address these fundamental questions and explore related topics, such as how researchers collect and interpret particle data, and how particles decay into other particles. One not-to-be-missed chapter covers unsolved mysteries, delving into supersymmetry, string theory, dark matter and the possible existence of extra dimensions. Other features include particle physics news and a page of links to other particle physics education sites.
Image: SNOW CRYSTALS
A visit to this site might help you appreciate the season's flakes next time you're out shoveling them away. The author, California Institute of Technology professor Ken Libbrecht, explains everything you ever wanted to know¿and then some¿about natural snow, lab-made designer crystals and the physics behind them in a clear, concise fashion. The site also houses a collection of galleries showcasing the fruits of Libbrecht and his colleagues' efforts to develop techniques for growing snow crystals. Photographers can read up on trade secrets for capturing the fast-melting fluff, and amateur scientists can find kitchen-table projects to grow crystals at home.
String theory may well be one of the most important¿and baffling¿concepts in modern physics. And finally someone has put together a site that comes as close to Superstrings for Dummies as possible. The site's creator, John M. Pierre, starts by explaining how string theory relates to the Standard Model and then lays out the basics¿from open and closed strings to perturbation theory. Simple line drawings and animations help clarify the text. Another group of pages details more advanced topics and a summary reviews everything at the end. If at that point you are ready for more the site includes an extensive list of references at different levels, as well as a glossary and related links.
In 1928 physicist Paul Dirac wrote down a mathematical equation that had a revolutionary implication: for every particle, there exists an identical particle with the opposite charge¿an antiparticle. Since then scientists have detected not only antiparticles but also antinuclei and even antiatoms. This site, hosted by CERN, presents a highly readable account of the search for antimatter¿from Dirac's first musings to today's elaborate accelerator experiments¿and puts it in context with sections describing the origins of antimatter and antimatter in everyday life. Other features include a kids' corner, a questions and answers section, and live Webcasts.
We're not kidding. This may be the only site where you can enter the mind of Lucky, a Britney song character, and vote on which semiconductor or telecommunications technology will fill the meaningless void in her angst-ridden adolescent life. And it is definitely the only site that mixes celebrity headshots and hairy equations in a unique melding of physique and physics. In short, this silly site houses a lot of very serious material explaining the lasers that read Britney's CDs. Ms. Spears (and her clearly devoted fans in the Applied Physics Group at the University of Essex in England) should be proud. | <urn:uuid:9b183126-6863-4b4c-b2fe-d84b6a86696e> | CC-MAIN-2015-40 | http://www.scientificamerican.com/article/physics/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737916324.63/warc/CC-MAIN-20151001221836-00120-ip-10-137-6-227.ec2.internal.warc.gz | en | 0.914401 | 688 | 3.09375 | 3 |
In November, I wrote about some simple tests that I had undertaken on the DNS Root name servers. These tests looked at the way the various servers responded when they presented a UDP DNS response that was larger than 1,280 octets.
I awarded each of the name servers up to five stars depending on how they managed to serve such large responses in IPv4 and IPv6.
I’d like to return to this topic by looking at one further aspect of DNS server behaviour, namely the way in which servers handle large UDP responses over IPv6.
What is “large” in this context?
Don’t forget that 1,280 is a “special” number for IPv6 – it’s the size of the largest IPv6 packet that standards-confirming networks must be able to support without requiring IP packet fragmentation. Any IPv6 packet larger than 1,280 octets can be considered “large” for our purposes here.
In an IPv6 environment, there is no assurance for end hosts that a packet larger than 1,280 octets can be passed through an IPv6 network. This implies that IPv6 hosts must be able to successfully negotiate transmission of larger IPv6 packets using IPv6 fragmentation when the network path is constrained: whereby packets larger than 1,280 octets are dropped, or find another approach using a transport protocol that avoids large packets altogether. The way an IPv6 host is informed of network elements that impose a packet size constraint is the network element is meant to generate an ICMPv6 Packet Too Big message (RFC443) when a large IPv6 packet is discarded, and pass this error notice back to the packet’s sender. This ICMPv6 packet contains a conventional IPv6 header and an ICMP payload that contains the Packet Too Big (PTB) code, the Maximum Transmission Unit (MTU) value of the next hop link that is the constraining factor, and as much of the original IPv6 packet as can be contained without exceeding this 1,280 octet minimum IPv6 MTU (see Figure 1).
When a sending host receives such an ICMPv6 PTB message, the IP processing element is required to inspect the inner IPv6 payload. To quote from RFC443, this control message “MUST be passed to the upper layer process if the relevant process can be identified.”
Now all this is fine for TCP. The ICMPv6 PTB message is supposed to be passed to the TCP process and the MTU value is intended to be used to reduce the local host’s value of the path Maximum Segment Size (MSS), so that the TCP session will adjust itself to ensure that it fits within the new path MSS value as per the ICMPv6 PTB message. Presumably, the TCP session will also resend any outstanding unacknowledged data using this new MSS value to reframe the unacknowledged data stream. In the case of TCP, the sending host should never actually attempt to fragment an outgoing TCP packet, as the session’s TCP MSS value should always be equal to or less than the host’s path MTU estimate.
But what about UDP?
UDP transactions can be stateless transactions, and it’s entirely unclear that there is an upper layer process or state left in the sending host once the UDP packet is sent. This is certainly the case for the DNS, where the UDP part of the server operates as a set of simple transactions where each UDP query generates a single UDP response. What is an IPv6 host meant to do with a received ICMPv6 PTB message when the message is a consequence of sending a UDP packet?
It would be helpful if IPv6 hosts “remembered” in some manner what the new MTU might be for destinations when they receive such an ICMPv6 message.
But do they?
One of the more critical applications that rely upon stateless UDP transactions is the Domain Name System (DNS). So, we can focus our question a little more by asking: do DNS nameservers adapt their behaviour in response to a received ICMPv6 PTB message? And if we want to be specific here, what do the DNS root servers do when they receive an ICMPv6 PTB message relating to a UDP response that they sent?
The reason why I am focussing on the DNS root servers is due to the planned roll of the Key-Signing Key (KSK) of the DNS root zone. There will be a period when two KSKs (old and new) are in the root zone at the same time, and the zone’s DNSKEY record will be signed by both of these KSKs. The signed response to a query for the DNSKEY record will inflate from 864 octets in size to 1,425 octets at that point in time. In the context of the current key roll plan, this larger response will occur on 11 January 2018, and last for 20 days.
As far as I’m aware, this is the first time a “normal” DNS response from the root servers will exceed 1,232 octets in length, and the IPv6 UDP packet will exceed 1,280 octets in length.
It’s critical in so far that if a DNSSEC-validating resolver is unable to retrieve the root zone keys, it will be unable to answer any further queries – it will go “black” and will need manual intervention to bring it back into the server once more.
We’ll try and answer this question using a simple test routine. The test involves sending each of the DNS root name servers a query over UDP in IPv6 that will generate a response where the packet is over 1,280 octets in size.
The query used in this test related to a non-existent domain name, and the EDNS(0) extension is used by the query with the DNSSEC OK flag set, and the EDNS(0) UDP buffer size set to 4,096 octets. The dig utility was used to perform the query, so the utility performed UDP fragmentation reassembly, and also performed a fallback to TCP in response to a truncated UDP response. Each root name server was directly queried, bypassing any local DNS resolution infrastructure. A unique name was generated for each query, using the longest possible DNS name query string. The root servers generated a DNS response of 1,268 octets in size, which corresponded to a IPv6 UDP packet of 1,316 octets, 36 octets greater than the 1,280 unfragmented IPv6 packet size.
The query process was active for 10 hours, performing one query every two seconds. Each root server was queried in rotation, so each server was queried every 26 seconds. Every hour, the ICMPv6 PTB responder was executed for a period of three minutes. The PTB responder generated a synthetic ICMPv6 PTB message by using a source address that contained a randomized Interface Identifier value and used a 1,280 octet MTU value, simulating a last-hop router with a size-constrained next hop.
The results of this test are as follows:
|A||Always responds with a packet that is truncated so as to fit within a 1||280 octet limit – the test case response is 955 octets in size.|
|B||Always responds with a packet that is truncated so as to fit within a 1||280 octet limit – this server echoes only the query||so the response is 330 octets in size.|
|C||Appears to react to an ICMP PTB message||by sending a fragmented response for 10 minutes after receipt of the first ICMP PTB message.|
|D||Appears to react to an ICMP PTB message||by sending a fragmented response for 10 minutes after receipt of the first ICMP PTB message.|
|E||Appears to react to an ICMP PTB message||by sending a fragmented response for 10 minutes after receipt of the first ICMP PTB message.|
|F||Always fragments the response to fit within a 1||280 MTU size.|
|G||Always responds with a packet that is truncated so as to fit within a 1||280 octet limit – this server echoes only the query||so the response is 330 octets in size.|
|H||Always sends a large UDP response and does not react to any incoming ICMPv6 PTB messages.|
|I||Appears to react to an ICMP PTB message||by sending a fragmented response for 10 minutes after receipt of the first ICMP PTB message.|
|J||Always responds with a packet that is truncated so as to fit within a 1||280 octet limit – the test case response is 955 octets in size.|
|K||Always sends a large UDP response and does not react to any incoming ICMPv6 PTB messages.|
|L||Appears to react to an ICMP PTB message||by sending a fragmented response for 10 minutes after receipt of the first ICMP PTB message.|
|M||Always fragments the response to fit within a 1||280 MTU size.|
It appears that the servers C, D, E, I and L act in a manner that appears to be consistent with the intent of the IPv6 ICMPv6 PTB semantics: this ICMPv6 error message generates a state change in the root server that appears to add an entry to the server’s local route cache that associates the new MTU value with this IPv6 destination address. This route cache appears to use a lifetime of 10 minutes.
Servers A, B, G and J always truncate large responses, offering a UDP response no larger than 1,280 octets at all times.
Servers F and M always fragment in a manner that is consistent with a locally defined constraint of a UDP MTU of 1,280 octets, irrespective of the UDP buffer size offered in the EDNS(0) settings in the query.
Servers H and K never adjust the packet size from their local MTU setting, and always send the large UDP response irrespective of any ICMPv6 PTB messages. It appears that they are using platforms that have disabled the local IPv6 MTU route cache.
That’s a wealth of variation in behaviour, but which of these four classes of behaviour is better here?
Each of these four behaviours appears to be the result of efforts to steer between known obstacles:
- Fragmented packets have a lower delivery reliability level than unfragmented packets because of common firewall filtering practices. Because the trailing fragment does not contain any transport level information, a simple firewall’s response is to either accept all fragments or deny all fragments. It’s common to deny all packet fragments under such circumstances. Servers should avoid gratuitous fragmentation to minimize this problem.
- IPv6 has a further problem with packet fragmentation: fragmentation in IPv6 uses Extension Headers, and there are a number of network switches that are ill-equipped to handle IPv6 packets that contain IPv6 Extension Headers. These units simply drop IPv6 packets that contain Extension Headers, including fragmentation control Extension Headers. Previous measurements suggest that some 35% of visible DNS resolvers lie behind such devices and they cannot receive fragmented IPv6 packets. In the case of IPv6, the desire to avoid packet fragmentation is a serious consideration.
- ICMPv6 PTB packets are also commonly filtered. A server that relies on the successful reception of ICMPv6 PTB messages is also going to encounter cases where the control message is filtered, and the server has no backup method of adjusting its sending MTU in the case of a UDP transaction.
- An IPv6 server also has to defend itself against ICMPv6 PTB attacks. Because of the stateless nature of UDP, it is readily possible to send an avalanche of ICMPv6 PTB messages at a server. The host has no inherent ability to differentiate between a genuine ICMPv6 PTB message and a synthetic message. To defend itself, it will need to limit the size of the local MTU route cache and not push these messages into the route cache once the size of the cache exceeds some system-defined upper limit, or drop the cache lifetime. In either case, an overwhelming number of such ICMPv6 PTB messages would effectively invalidate the utility of this route cache. The other aspect of the handling of these messages is the CPU processing time taken to examine the message, enter it into the MTU route cache and maintain the cache itself, and the inherent risk of exposing the host to a DDOS vector.
- Using TCP as a fallback when attempting to send a large packet makes a lot of sense, except in the case of the DNS. While the use of TCP in the DNS is part of the DNS specification, it’s not universally supported and more than 10% of the visible resolver population appear to be incapable of making a query over TCP. It is possible that this is the result of overly zealous firewall filters that only open UDP port 53 for DNS traffic and exclude TCP.
- Where TCP is used, the combination of lost ICMPv6 PTB messages and TCP also exposes the DNS TCP session to a risk of PMTU Blackholes. If the server pushes out a response that is larger than the Path MTU, and the ICMPv6 PTB message is lost, then the server will be waiting for an ACK that will never arrive and the client TCP session has no unacknowledged sent data, so it too will hang.
The use of a truncated response by servers A, B, G and J force the resolver into using TCP to complete their query. Earlier measurements show that around (17% of visible resolvers are unable to perform a DNS query using TCP).
Servers C, D, E, I and L also have a problem on those network paths that have a constrained MTU – the use of fragmentation will incur packet loss due to IPv6 Extension filtering and firewall filtering. This appears to (affect around 35% of visible DNS resolvers using IPv6).
Servers F and M have a similar issue, and due to problems with the transmission of fragments they also will be unable to reach about 35% of visible DNS resolvers using IPv6.
Servers H and K will be unable to reach any resolvers that lie behind paths where the path MTU is smaller than the response they are sending.
There is no perfect answer here.
Perhaps the best compromise that can be achieved is to use a large MTU for UDP and react to ICMPv6 PTB, as is done by C, D, E, I and L.
The approach adopted by A, B, G and J to avoid sending large IPv6 UDP packets at all and instead push the resolver to re-query using TCP also has some merit.
Part of the issue here is attempting to assess which has the greater failure rate: failure of the server to receive an ICMP PTB packet, failure of the resolver to receive a fragmented IPv6 UDP packet, or failure of the resolver client to perform DNS queries over TCP.
Starting with a large UDP packet response and then reacting to ICMPv6 PTB messages appears to offer a reasonable compromise between efficiency and maximizing the chances that the first response will be used by the querying DNS resolver. Truncating the initial UDP response and forcing the resolver to use TCP to complete the query would appear to have a higher probability of ultimate success at the cost of efficiency, were it not for the problem of widespread filtering of DNS over TCP.
So, I’ll nominate only the root servers C, D, E, I and L for a sixth star here, as their approach appears to strike a reasonable balance between speed and reliability for large DNS responses over IPv6, despite the observation that it’s by no means the optimal form of response. The problem here is that there is no clear path that avoids all of these obstacles, so every form of response represents a compromise of sorts.
If this problem is so bad then why does the DNS work at all? Firstly, the root servers do not normally send large packets. The exercise here uses an artificially constructed query that pushes the root server into constructing a large response. In any case, the response is of the form NXDOMAIN, that is, not only is this a rare case, the answer is basically a negative one!
However, this will not always be the case – from 11 to 31 January 2018, the response to a query for the root zone’s DNSKEY resource record will be 1,425 octets, so DNSSEC-resolving resolvers will encounter this large packet issue at that time. So, while this is a largely esoteric issue for the moment, for a brief two-week period in about a year from now, it will be an issue that will be critical to the stable operation of the DNSSEC security framework of the DNS!
Secondly, there are 13 root name server clusters using four distinct behaviours for sending large responses. There is a good chance that if a resolver cannot receive a response from one server, it will be able to negotiate a response from another server.
Thirdly, and perhaps most importantly, there is still IPv4 to help us out of this mess! Only some 11% of queries to a dual stack name server use IPv6 and the issues encountered here with IPv6 and packet fragmentation do not spill over into IPv4. For as long as the dual-stack world persists for the DNS, this IPv6 behaviour is not a major issue for us.
But a dual-stack Internet is not the long-term outcome planned for the Internet. We need to be considering an environment where IPv4 is no longer available and in such an IPv6-only environment, IPv6 and the DNS present some particular challenges. Most of these challenges would be addressed if we were able to clean up just two practices:
- Extension Headers need to be treated in the same manner as all other packets, and not dropped, and
- ICMPv6 PTB messages need to be passed back to the source.
Of course, another option is to drop UDP completely and move the DNS on to a TLS platform that is layered on a TCP end-to-end transport. The downside here lies in the higher overheads imposed by adding session maintenance to what was a simple stateless query/response protocol.
Even in a TCP world, there are still Path MTU issues. And here the ICMP PTB and packet fragmentation behaviour is less tractable. Even if all ICMPV6 PTB messages were to be passed through, the issue of firewall policies and the vulnerability of exposing the host’s MTU cache to external attack makes this a more challenging issue. But that does not imply that it is insoluble. One viable approach is to drop the IPv6 TCP MSS for the DNS to a default of 1,220 octets. This results in a slightly lower transmission efficiency for DNS, but the upside is the prospect of a greater resiliency of the TCP session in the face of arbitrary filtering actions.
If this lower MSS makes you uncomfortable, then there are few options left. One possible approach is to revisit the concept of tunnelling. Rather than view fragmentation as an IP layer function, one response is to push this one layer down in the protocol stack. What if we used tunnels that took it upon themselves to fragment packets as necessary on tunnel ingress and reassemble the tunnel payload fragments on tunnel egress? In terms of end-to-end path MTU, such tunnels would be transparent and we could remove the rather uncomfortable and error-prone interactions between the host and the network that are associated with the current model of MTU discovery. But I suspect that this is just a step too far to contemplate for the Internet.
If we are serious about an all-IPv6 network at some point in the future we need to revisit IPv6 packet fragmentation and make some changes to the way we currently operate IPv6 hosts, networks, and applications. Relying on IPv4 as an ever-present plan B to fix up the gaping holes in the IPv6 end-to-end story is certainly a pragmatic short-term tactical response. But it’s a pretty lousy long-term strategy.
The views expressed by the authors of this blog are their own and do not necessarily reflect the views of APNIC. Please note a Code of Conduct applies to this blog. | <urn:uuid:58729286-e843-477c-a5b8-4655f6a40988> | CC-MAIN-2017-30 | https://blog.apnic.net/2016/12/12/scoring-dns-root-server-system-pt-2-sixth-star/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424756.92/warc/CC-MAIN-20170724062304-20170724082304-00582.warc.gz | en | 0.920025 | 4,320 | 2.75 | 3 |
Presents, fleshiness has become a serious epidemic disease worldwide. The increasing prevalence of fleshiness is a large job which threats the public wellness awfully. Australia is faced with terrible corpulent job. “ The Medical Journal of Australia found that fleshiness in Australia more that doubled in the two decennaries predating 2003, and the unprecedented rise in fleshiness has been compared to the same wellness crisis in America “ ( Dunn, A. , 2003 ) . The lifting prevalence can do important bad effects on the society. Obesity is associated with wellness jobs. “ An corpulent individual has a higher hazard of mortality from cardiovascular disease, type 2 diabetes, degenerative arthritis, and some specific signifiers of malignant neoplastic disease. As a individual ‘s weight additions, their hazard of developing more than one of these medical conditions besides increases ” ( Medibank Health Solutions, 2010 ) . Apart from the physical effects, fleshiness besides has bad effects on people ‘s psychological effects. Besides, it can give rise to great economic and societal costs. Thus fleshiness is a pressing concern in Australia. Taking soft drinks is an of import factor which causes fleshiness. This paper discusses the imposure on carbonated soft drinks to take down soft drink ingestion. Since carbonated soft drink ingestion is reduced, it has a good influence on fleshiness bar.
Evidence Statement: There is strong grounds that a revenue enhancement on carbonated soft drinks reduces carbonated soft drink ingestion.
The ingestion of carbonated soft drinks is considered to be a conducive factor to burden addition and fleshiness. “ One survey followed 548 schoolchildren over 19 months and found that alterations in soft drink were associated with alterations in organic structure mass index ( BMI ) . Each soft drink that a kid added to his or her day-to-day ingestion was accompanied by an addition in BMI of 0.24 kg/m2 ” ( Ludwig, Peterson and Gortmaker, 2001 ) . Therefore, the ingestion of carbonated soft drinks demands to be reduced. Many experts advocate revenue enhancement on soft drinks. The purpose of enforcing revenue enhancement on carbonated soft drinks is to control unhealthy diet and prevent fleshiness. Since a revenue enhancement is imposed on the carbonated soft drinks, the monetary values of the carbonated soft drinks addition. A figure of surveies have found that sodium carbonate ingestion is price-sensitive ( Andreyeva, Long and Brownell, 2010 ) . As the monetary values of soft drinks addition, the consumer buys less carbonated soft drinks or the hapless even stops to purchase.
Monetary value alterations can act upon the purchases and ingestion of carbonated soft drinks. Based on the best estimations to day of the month of the reactivity of demand for soft drinks to alterations in monetary value ( Andreyeva, Long and Brownell, 2010 ) , a revenue enhancement of 1 cent per ounce of drink would increase the cost of a 20-oz soft drink by 15 to 20 % . The influence on ingestion can be estimated by research on monetary value snap. The monetary value snap for all soft drinks is in the scope of -0.8 to -1.0 ( Andreyeva, Long and Brownell, 2010 ) . ( Elasticity of -0.8 suggests that for every 10 % addition in monetary value, there would be a lessening in ingestion of 8 % ) . With the usage of a conservative estimation that consumers would replace Calories in other signifiers for 25 % of the decreased Calorie ingestion, an excise revenue enhancement of 1 cent per ounce would take to a minimal decrease of 10 % in calorie ingestion from sweetened drinks, or 20 kcal per individual per twenty-four hours, a decrease that is sufficient for weight loss and decrease in hazard ( Brownell et al. , 2009 ) . The effects could be higher user of soft drinks ( Gustavsen and Rickertsen, 2005 ) . Price intercession is an effectual manner to take down carbonated soft drinks ingestion.
Many research workers have linked monetary values to soft drink ingestion. Research has shown that nutrient ingestion is sensitive to monetary value alterations. Based on November 2008 monetary value addition and volume gross revenues information on Coca Cola and Pepsi gross revenues in the U.S. demand for sodium carbonate is “ elastic ” ( -1.15 ) significance that a 10 % revenue enhancement would cut down ingestion by 11.5 % ( Beverage Digest, 2008 ) . If the monetary values of carbonated soft drinks are raised, the consumers will cut down their demand on soft drinks and bend to other picks. It can advance the purchases of healthy drinks ( Rudd study, 2009 ) . If a revenue enhancement is imposed on carbonated soft drinks, the monetary values of the drinks will increase necessarily. Consequently, the ingestion is discouraged.
Besides the above grounds, a survey, published in the American Journal of Public Health, besides prove that revenue enhancement can take down carbonated soft drinks ingestion. The survey was carried out at Harvard ‘s Brigham and Women ‘s Hospital in Boston. The research workers raised the monetary value of sugary soft drinks in the university canteen by 35 per centum for a four hebdomad period. Regular soft drinks ingestion declined by 26 per centum during the monetary value addition stage ( Food Product Design, 2010 ) . While gross revenues of regular soft drinks fell, gross revenues of diet soft drinks and java increased by 20 per centum ( Thomas, 2010 ) . This survey shows that the monetary value addition of sugary soft drinks reduces the ingestion of sugary drinks and may promote many people to take fitter drinks ( Thomas ) . The research workers besides held an educational run enduring four hebdomads to recommend the pupils to diminish soft drinks ingestion. However, this attack did non work. During this period, the soft drinks ingestion alterations little ( Thomas ) . The instruction had small influence on gross revenues.
The survey on kids besides supports the theory. Small sales-tax additions on soft drinks may cut down ingestion and kerb fleshiness for some at-risk kids ( Pediatric Super Site, 2010 ) . Each 1 per centum revenue enhancement difference between soft drinks and other nutrients was associated with a 0.222 lessening in BMI among those at hazard for going corpulence ( Pi?¤0.5 ) . Children of low-income families ( i?¤ $ 25,000 ) and those who watched more than nine hours of Television per hebdomad consumed fewer sodium carbonates overall ( 0.029 ) and in school ( 0.142 ) per hebdomad for each 1 % of revenue enhancement ( Pi?¤0.5 ) ( Pediatric Super Site ) . A revenue enhancement on carbonated soft drinks can cut down ingestion for some particular groups and kerb weight addition for some at-risk kids.
Furthermore, the revenue enhancement of baccy and intoxicant demonstrates a good illustration for the revenue enhancement of carbonated soft drinks. The revenue enhancement of baccy and intoxicant demonstrates that it is possible to act upon consumer behaviour and wellness results by the revenue enhancement system. It is suggested that coffin nail revenue enhancements is an effectual manner to forestall the young person and grownup from smoke and better public wellness ( Fletcher, Frisvold and Tefft, 2009 ) . Economic surveies conclude that every 10 % addition in the existent monetary value of coffin nails reduces ingestion by 3 to 5 % overall, 3.5 % among immature grownup tobacco users and 6 to 7 % among kids ( Rudd study ) . As a affair of fact, grownups, particularly immature grownups are sensitive to the monetary value of intoxicant and that increases in intoxicant revenue enhancements would cut down mortality, hurts and offense ( Fletcher, Frisvold and Tefft, ) . The belongingss of carbonated soft drinks are like the belongingss of baccy and intoxicant. Like baccy and intoxicant, carbonated soft drinks are non necessities for life and it can do societal jobs. Therefore, carbonated soft drinks ingestion can besides be reduced by a revenue enhancement.
All the groundss listed above are imaginable to back up the theory that a revenue enhancement on carbonated soft drinks reduces carbonated soft drink ingestion. These groundss are persuasive but they are non perfect. It has disadvantages and defects. The first grounds is the most convincing grounds. However there are non plenty practical instances to turn out the theory. The 2nd survey is carried out in a little country during a short clip. A general decision can non be made from this grounds. The 3rd 1 has the same advantage as the 2nd grounds. The 4th one is least convincing.
Although the groundss for enforcing revenue enhancement on carbonated soft drinks have defects, it is converting adequate to do a decision that a revenue enhancement should be added to carbonate soft drinks to cut down carbonated soft drinks ingestion and prevent fleshiness.
Evidence interlingual rendition: A gross revenues revenue enhancement of 5 % should be added to carbonate soft drinks in Australia.
Carbonated soft drinks do non incorporate any nutrition. It can do fleshiness and other diseases. Obesity is a serious job in Australia. It non merely threats public wellness but besides generates immense economic costs. The entire costs of fleshiness to the Australian economic system are 37.7 billion dollars. The direct costs are 1.3billion dollars. The indirect costs are 6.4 one million millions dollars. And the disease costs are 30 billion dollars, which is a large proportion in the entire costs ( Medibank Health Solutions ) . Thus fleshiness intercession should be made desperately. The groundss show that enforcing revenue enhancement on carbonated soft drink can cut down ingestion. If the carbonated soft drinks ingestion is reduced, fleshiness can be prevented to some grade. The revenue enhancement step encourages the populace to hold healthier diet and life manners.
Besides, the revenue enhancement can bring forth enormous grosss for authorities. For illustration, in USA, Arkansas revenue enhancements 0.21 dollar per gallon of liquid soft drink and 2 dollars per gallon of soft drink sirups, bring forthing about 40.4 million dollars in one-year income. California has a 7.25 % gross revenues revenue enhancement on soft drinks that produces an estimated 218 million dollars in one-year income for the province ( Brownson and Shiriki Kumanyika, P161 ) . These grosss can be used to bring around and forestall fleshiness and wage for the comparative medical disbursals. Enforcing revenue enhancement can forestall fleshiness and cut down the disbursals on fleshiness interim it will bring forth more money for fleshiness intervention and bar. The revenue enhancement can besides promote the soft drink company to develop healthier drink. For illustration the company can utilize xylitol which is nonsweet to replace sugar.
Enforcing revenue enhancement on carbonated soft drinks is necessary. However, the impersonation on revenue enhancement is a complicated and controversial job. There are many statements on this issue. Many people are opposed to this proposal. There are side effects on this issue. Besides, how much revenue enhancement should be added and which sort of revenue enhancement should be imposed can non be decided easy.
Peoples doubt that whether soft drink revenue enhancement is an effectual method to cut down ingestion. The survey on kids mentioned in the 3rd grounds shows that little soft drink revenue enhancement has small influence on ingestion. For each 1 % addition in soft-drink revenue enhancement, the decrease in entire soft drinks per hebdomad was 0.004 and the decrease in soft drinks purchased at schools per hebdomad was 0.010. overall BMI was decreased by 0.033 ( Pi?¤0.5 ) ( Pediatric Super Site ) . Although soft drink revenue enhancements have existed since at least 1920 ( New York Times, 1920 ) and until late these revenue enhancements have been used chiefly to bring forth gross ( Caraher and Cowburn, 2005 ) .
The monetary value addition of carbonated soft drink may actuate consumers to purchase the replacements, such as athleticss drink and other drinks with high caloric. What ‘s worse, this attack may promote consumers to purchase larger containers because the cost per ounce is lower, so the revenue enhancement per ounce would be lower every bit good ( Rudd Report ) . Then, the revenue enhancement step may hold an inauspicious consequence. Meanwhile, this issue besides involves the jobs of societal equity and single liberty ( Basham and Luik, 2010 ) .
Based the above groundss and analysis, a revenue enhancement should be levied on carbonated soft drinks to forestall fleshiness in Australia. However, in order to do the fleshiness intercession effectual, little revenue enhancement is inefficient. A sale revenue enhancement of 5 % does non hold adequate consequence on the autumn of the carbonated soft drinks ingestion. The monetary value addition of carbonated soft drink may excite the consumers to purchase other drinks with high caloric or larger containers. To work out this job, excise revenue enhancement has more advantages that sale revenue enhancement. | <urn:uuid:895ee778-8afd-4142-99f9-13ea52086012> | CC-MAIN-2018-09 | https://tsfagourmet.com/effects-of-the-soft-drink-tax-economics-essay.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891808539.63/warc/CC-MAIN-20180217224905-20180218004905-00045.warc.gz | en | 0.914313 | 2,671 | 2.671875 | 3 |
With his wide-ranging knowledge, Leonardo da Vinci came up with designs for things like the helicopter, the tank, the double hull plus all manner of diamante taglio brillante colore g purezza vs inventions like an automated bobbin winder for example.
In his study of flight, Leonardo da Vinci came up with over a hundred drawings and sketches relating to flight.
Ahead of his time.His Flying Machine helps to remind us of just that.Even if, by chance, it was possible there is no guarantee that it could have landed in one piece.From his journal entries, and his drawings, they show how he cerco cani taglia piccola was able to combine his skills as both an inventor and someone able to turn his ideas into designs.0 likes 17 views payment 13338 3d models found for: da vinci flying machine loading).
Leonardo da Vinci was fascinated by the phenomenon of flight, producing plans for several.
He envisaged that to achieve flight there would be a need to include levers, pedals and pulleys.Using his hands, the pilot would grip a stick coming down from each wing for direction control.Ezio auditore de Firenze.His ideas were many years ahead of others.Leonardo da Vinci Working "reciprocating motion machine" model.In his study of flight, Leonardo da Vinci also designed a parachute and a lightweight hang glider.If you want the skins.His Drawings Flying Machine, when he began his study of birds in flight, Leonardo da Vinci realised that humans are too heavy.If you contributed to the creation of this modification and consider that your rights have been violated, please let us know via the feedback form.
As there was no engine, to achieve flight, the pilot would make a flapping motion by pushing his legs downwards with his feet held in two spurs.
Amongst his works are the Mona Lisa. | <urn:uuid:1b491b3e-b83d-4770-bbd5-f3c1286f28aa> | CC-MAIN-2018-39 | http://gamerpro.biz/leonardo-da-vinci-flying-machine-wooden-model.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158045.57/warc/CC-MAIN-20180922044853-20180922065253-00354.warc.gz | en | 0.974724 | 401 | 3.40625 | 3 |
By Matthew Lucks, MD, Scripps Health
When we hear that someone is being treated for high blood pressure, many of us assume the person is probably in their 50s or 60s. However, a recent report from the Centers for Disease Control found that while the number of adults over age 18 who have high blood pressure, also called hypertension, has not increased in the past 10 years, more of them are taking medication to control their blood pressure—especially among young adults age 18-39.
Why are so many more young people increasingly being treated for hypertension with medication? One reason may be that the medical community’s definition of hypertension has changed in the past few years; the thresholds for high blood pressure are lower than they used to be. Blood pressure is measured in two numbers. The first number (systolic) indicates the pressure on the walls of your blood vessels when your heart beats; the second (diastolic) indicates the pressure between beats. Blood pressure is considered high if your systolic blood pressure is greater than or equal to 140 mm Hg, or your diastolic blood pressure is greater than or equal to 90 mm Hg (written as 140/90). Normal blood pressure is below 120/80; anything between the two numbers is considered borderline high. Because more younger people now meet these new criteria, more are being diagnosed with hypertension and treated for it with medication.
Blood pressure awareness
According to the CDC report, high blood pressure awareness increased among adults between 40-59 and 60 and over, but not among people 18-39. Since fewer adults in this age group are aware that they have high blood pressure, fewer make lifestyle or dietary changes that could have a significant effect on bringing blood pressure numbers back down to normal. Moreover, decreasing amounts of physical activity and increasing levels of obesity and diabetes, especially among teenagers, sets the stage for people to develop hypertension at an early age. Consequently, by age 18, the disease has already progressed to the point that medical therapy is needed.
Clearly, we need to get the word out about hypertension among younger people, and it needs to start very early. Most grade school children know about the dangers of smoking; they should also be aware of the dangers of high blood pressure and high cholesterol. It’s never too soon to teach kids to make smart food choices and encourage them to exercise instead of spending their time in front of the television, computer screen or hand-held game player.
Tips to help young people avoid developing high blood pressure
Maintain healthy weight. Obesity among people under age 18 is higher than ever. Excess weight increases the risk of high blood pressure, high cholesterol and type 2 diabetes. Young people who maintain healthier weights will have healthier hearts.
Eat smart. Build meals around low-fat protein sources such as fish, poultry, lean meats, and beans. Trim excess fat, and bake or broil instead of frying. Fill out meals with whole grains and fresh, whole foods such as vegetables and fruits. Minimize the use of prepackaged, processed and “fast” foods that can be sky-high in salt, sugar, saturated fats, trans fats and tropical oils.
Be active. Get at least 30 minutes of moderate physical activity a day, such as sports, bike riding, swimming or hiking at least five days a week. Exercise stimulates a substance called nitric oxide, which helps keeps blood vessels open. Exercise also strengthens the heart and burns off excess weight.
No smoking. According to the 2007 National Survey on Drug Use and Health, 90 percent of adult smokers began at or before age 18. Smokers are much more likely to develop heart disease than non-smokers. Smoking puts extra stress on the heart, and increases the likelihood of developing an artery-blocking blood clot.
By learning to live heart-healthier lives now, preteens and adolescents may be able to avoid medical therapy for hypertension in the future.
Matthew Lucks, MD, is a cardiologist with Scripps Health. “To Your Health” is brought to you by the physicians and staff of Scripps Health. For more information, please call 1-800-SCRIPPS or visit Scripps.org.
Media Contact: Lisa Ohmstede | <urn:uuid:83b0f79a-fb2b-458b-b485-e6f2fd7b6a4c> | CC-MAIN-2015-06 | http://www.scripps.org/news_items/3782-more-young-adults-treating-hypertension-with-medication | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122059136.7/warc/CC-MAIN-20150124175419-00001-ip-10-180-212-252.ec2.internal.warc.gz | en | 0.95129 | 876 | 3.734375 | 4 |
Agatha maintained that she had a happy childhood. Her mother, a good storyteller, did not want her to learn how to read until she was 8 years old. However, a determined Agatha taught herself how to read, and was soon devouring chapter books. Mrs. Molesworth's The Adventures of Herr Baby was one of her favourites. Edith Nesbit's The Phoenix and the Carpet and The Railway Children helped to expand her imagination. Agatha also enjoyed Sir Arthur Conan Doyle's Sherlock Holmes, sewing the seeds of a detective novelist.
Agatha started her writing career with short stories, penning the title The House of Bravery. Her later short stories, reflecting how well read she was as a child, were based on nursery rhyme titles:
And Then There were None (Ten Little Indians); One Two Buckle My Shoe; Five Little Pigs (This Little Piggy); Crooked House (There Was a Crooked Man); A Pocket Full of Rye (Sing a Song of Sixpence); Hickory Dickory Dock; and Three Blind Mice. (https://en.wikipedia.org/wiki/Agatha_Christie)
Her first novel, Snow Upon the Desert, featured scenes from Cairo, Egypt which she had visited. Rejected by six publishers, it took Agatha five years to publish it.
The Mysterious Affair at Styles, featuring the Belgian detective Hercule Poirot, was Agatha's first detective novel. Poirot, who would become famous, was based on the Belgian refugees who appeared in her town after the First World War. Agatha continued to write detective stories, often inspired by real life events. In 1934, a train trip to Istanbul led to her novel Murder on the Orient Express, one of her most famous title which was later made into a film.
In 1928, Agatha divorced her first husband, Christie, and married archaeologist Sir Max Mallowan. She often joined him at excavations sites. While he dug, she would clean off artifacts, reconstruct pottery, take photographs and record field notes. These came in handy for future detective novels like: Murder in Mesopotamia (1936), Death on the Nile (1937) and They Came to Baghdad (1951).
In total Agatha penned over 60 detective novels, making her the best selling fiction writer of all time, save maybe Shakespeare. The young girl who had been inspired by Sir Conan Doyle went on to inspire other generations to read: "The gripping whodunits of Christie turned people into voracious readers." (http://www.indiatvnews.com/buzz/life/agatha-christie-murder-mysteries-235.html) | <urn:uuid:9a60f4af-b3b0-4a50-b595-00f8f9913e14> | CC-MAIN-2017-39 | http://alinefromlinda.blogspot.com/2015/10/queen-of-crime-based-detective-novels.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818685129.23/warc/CC-MAIN-20170919112242-20170919132242-00223.warc.gz | en | 0.974002 | 562 | 2.890625 | 3 |
How to Draw Unicorn Head
- Drawing Tutorials
- Legendary Creatures
- How to Draw Unicorn Head
Start the tutorial by making two circles, a curve line & a triangle.
Draw outline for the face as shown.
Make eye & nose.
Draw horn & hairs.
Make ears & hairs over the neck.
Make line over the horn and other head portions as shown.
Finally, make necessary improvements to finish. | <urn:uuid:70183792-9af1-4dc9-8c00-a43ef298eb98> | CC-MAIN-2018-43 | https://www.drawingtutorials101.com/how-to-draw-unicorn-head | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514005.65/warc/CC-MAIN-20181021115035-20181021140535-00273.warc.gz | en | 0.853071 | 89 | 2.703125 | 3 |
Ok, I’m splitting hairs here a little. The grammar police are screaming, “No, include is a verb, inclusion is a noun.” And they are right, grammatically.
But if we are going to get to the heart of what it means to include others, we need to think of inclusion as a verb. Because it will not matter, in the end, what we say, if it’s not backed up by what we do.
Inclusion happens when people actively include others. Think behavior, authentic conversations, genuine and meaningful interactions. Inclusion is about helping people feel comfortable enough to be who they truly are in your presence. And the more comfortable people feel, the easier it will be to include others who are different
Inclusion is a conscious action. We must choose to include. We have to engage in behavior that lets the other person in. Not just allows that person to sit on the sidelines and watch, but really lets them in. And if we have to change the game a little along the way, so be it. That’s inclusion.
How do I do it, you ask?
Use people’s names. Names matter. Imagine what our relationships could become if we intentionally and deliberately learned and used the name of each person with whom we interact. I’m not just talking about the people we work with or those that we see regularly. I’m suggesting that we learn and use the names of every person we encounter. “Thank you, Susan, for checking me out at Shop Rite today.” Or, at your favorite coffee shop, “Thank you. Have a great day, Paul.”
Teach the value of inclusion. Demonstrate it. Look the man using a wheelchair that you pass every morning in the eye and say, “Hello.” Choose a line at the grocery store for the clerk with a disability and quietly explain to your children, outside the store, that you continue to shop at this very store because of its inclusive employment practices. Walk a little farther because there are certain spots saved for people who don’t walk as well as you can on their own.
You can do it. Let people in. Choose to include. Like I said, inclusion is a verb.
Photo Credit: Alex Eylar/Flickr | <urn:uuid:b8759d21-a3d3-4960-989e-3178438f44f0> | CC-MAIN-2019-39 | https://www.thinkinclusive.us/inclusion-is-a-verb/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573284.48/warc/CC-MAIN-20190918110932-20190918132932-00070.warc.gz | en | 0.96314 | 484 | 2.84375 | 3 |
This volume brings together research on the evolution of civilisation in the Andean region of South America from the work of sixteen leading scholars, at one time actively engaged in fieldwork in Peru. Beginning with early chiefdom societies living along the Peruvian coast 2000 years before Christ, the authors trace the growing complexity of Andean states and empires over the next 3000 years. They examine the accomplishments of the ancient Andeans in the rise of magnificent monumental architecture and the construction of unparalleled prehistoric irrigation systems. They also look at the dominant role of warfare in Andean societies and at the collapse of empires in the millennia before the arrival of the Spanish in 1534. Together, the contributors provide the first systematic study of the evolution of polities along the dry coastal plains and high mountain valleys of the Peruvian Andes.
Publisher: Cambridge University Press
Number of pages: 196
Weight: 450 g
Dimensions: 279 x 210 x 11 mm
You may also be interested in...
Thank you for your reservation
Your order is now being processed and we have sent a confirmation email to you at
When will my order be ready to collect?
Call us on or send us an email at
Unfortunately there has been a problem with your order
Please try again or alternatively you can contact your chosen shop on or send us an email at | <urn:uuid:cd1bd502-e04e-466f-99a6-9ec0f69bd71c> | CC-MAIN-2018-47 | https://www.waterstones.com/book/the-origins-and-development-of-the-andean-state/jonathan-haas/shelia-pozorski/9780521104852 | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743854.48/warc/CC-MAIN-20181117205946-20181117231117-00049.warc.gz | en | 0.85878 | 268 | 2.703125 | 3 |
I introduce to you the African Black-footed Cat. The smallest wild cat in the world and the most lethal hunter. So cuteeee! Kawaii!
- HB Length:36-52 cm (14-20″)
- Tail Length: 12-20 cm (4.7-8″)
- Height: Appr. 20 cm (8″)
- Weight: 1-2.5 kg (2.2-5.5 lbs)
- Pop. Trend: Decreasing
The soft, dense coat ranges from dark to pale tawny gold, with a bold pattern of rounded dark brown to black spots which sometimes merge into bands or rings. Their large eyes are amber or greyish brown. The chin, chest, belly and insides of the legs are whitish, and the backs of the ears are pale brown. There are two dark streaks across each cheek, and dark bars on the forelegs and haunches. The short tail, about half the body length, has two or three black rings, tapering to a black tipped point. As special adaptations to their desert habitat, these cats have a broad skull with large, rounded ears, which provide enhanced hearing in an area with scarce prey. Low-set ears are often completely flattened in an ‘aggressive’ posture, an adaptation to hunting in areas with little cover. They are protected from the hot sand by hair on the black soles of the feet.
Black-footed Cats are found only in three countries of southern Africa: Botswana, Namibia and South Africa. They are found primarily in short to medium length grass plains, scrub desert, and sand plains, including the Kalahari and Karoo Deserts. Areas of grass with high rodent and bird densities are optimal habitat. They seem to avoid brushy country and rocky terrain, perhaps because of the occurrence of other carnivores. Average annual rainfall in the area is 100-500 mm.
The Black-footed Cat is rare compared to the other small cats of southern Africa. Knowledge of the behaviour and ecology of this cat comes from a decades-long study on the Benfontein Nature Reserve and two large farms in central South Africa. Researchers from the Black-footed Cat Working Group continue to study the cats in these three areas.
In the 60 sq km study area, they found the density of adult cats to be 0.17/sq km,, but in low-quality habitat densities were much lower. Males have larger home ranges at 20.7 sq km than females, 10 sq km. Male ranges overlap those of one to four females.
An incredibly tenacious little cat, the natives have a legend claiming these tiny cats can bring down giraffe. While this is untrue, it pays homage to the fierce determination of these feisty little felines.
During the study, 1725 prey items were consumed, with the males taking larger prey species. Mammals were most often taken (72%), followed by small birds, while invertebrates, amphibians and reptiles were rarely eaten. Small rodents like the large-eared mouse were particularly important during the reproductive season for females with kittens. Males showed less seasonal variation in their choice of prey, which may help to reduce competition between the sexes.
Black-footed Cats share their range with other carnivores – African wildcat, Cape foxes, bat-eared foxes and black-backed jackals. They captured smaller prey on average than African Wildcats Felis silvestris lybica, although both captured approximately the same number (12-13) of prey species per night. The cats co-exist with jackals (predators on the cats) by using burrows during the day. They share space with the Cape foxes but don’t use the same habitats, activity times or hunt the same prey species.
One small Black-footed Cat can consume 3,000 rodents each year. They have also been known to eat dead springbok lambs, although they don’t actually kill them. Larger males can take adult Cape hare which weigh approximately the same as the cat. They have also been observed eating eggs, crushing them gently between the jaws, and then licking the contents clean. Although they can get their moisture requirements from prey, they will drink water if it is available.
Black-footed Cats shelter during the heat of the day in abandoned termite mounds or burrows. Of 184 resting places in South Africa, 98% of them were abandoned springhare burrows. Their habit of resting in termite mounds has earned them the local name of ‘anthill tiger’. Their nocturnal activity varies with the length of the night, leaving and returning to the den within 30 minutes of sunset and sunrise. Hunting techniques include waiting up to 40 minutes at rodent burrows, or flushing nesting birds by walking very fast through the grass. Hunting cats are occasionally shadowed by marsh owls which swoop down on the flushed prey.
They readily climb trees and fence posts to look for bird nests, but generally there is little food in the acacia trees compared to that available on the ground. While attacking flying birds, they make frequent jumps of up to 2 metres in distance and 1.5 metres high.
Researchers observed a male Black-footed Cat steal a gerbil from a striped polecat, an equally tenacious member of the weasel family. On five occasions, researchers observed black-backed jackals circling cornered Black-footed Cats. The tiny cat attacked each time, succeeding in driving the much larger jackal away.
Edited by MacCionoadha BeanSidhe, 12 January 2019 - 10:48 AM. | <urn:uuid:260ee9a6-f675-43f8-bff2-14dee7962fb3> | CC-MAIN-2019-30 | http://www.paranormalsoup.com/forums/index.php?s=aa63f36f121e865815b08f8f665636e3&showtopic=45591 | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525402.30/warc/CC-MAIN-20190717201828-20190717223828-00031.warc.gz | en | 0.95768 | 1,165 | 3.28125 | 3 |
The largest living organism ever found has been discovered in an ancient American forest.
The Armillaria ostoyae, popularly known as the honey mushroom, started from a single spore too small to see without a microscope. It has been spreading its black shoestring filaments, called rhizomorphs, through the forest for an estimated 2,400 years, killing trees as it grows. It now covers 2,200 acres (880 hectares) of the Malheur National Forest, in eastern Oregon.
The outline of the giant fungus stretches 3.5 miles (5.6 kilometres) across, and it extends an average of three feet (one metre) into the ground. It covers an area as big as 1,665 football fields.
The discovery came after Catherine Parks, a scientist at the Pacific Northwest Research Station in La Grande, Oregon, in 1998 heard about a big tree die-off from root rot in the forest east of Prairie City.
Using aerial photos, Ms Parks staked out an area of dying trees and collected root samples from 112. She identified the fungus through DNA testing. Then, by comparing cultures of the fungus grown from the 112 samples, she determined that 61 were from the same organism, meaning a single fungus had grown bigger than anything anyone had ever described before.
On the surface, the only evidence of the fungus are clumps of golden mushrooms that pop up in the autumn with the rain. "They are edible, but they don't taste the best," said Tina Dreisbach, a botanist and mycologist with the US Forest Service in Corvallis, Oregon. "I would put lots of butter and garlic on them."
Digging into the roots of an affected tree, something that looks like white latex paint can be seen. These are mats of mycelium, which draw water and carbohydrates from the tree to feed the fungus and interfere with the tree's absorption of water and nutrients. The long rhizomorphs that stretch into the soil invade tree roots through a combination of pressure and enzyme action.
In 1992, another Armillaria ostoyae was found in Washington state covering 1,500 acres, near Mount Adams, making it the largest known organism at the time.
"We just decided to go out looking for one bigger than the last claim," said Gregory Filip, associate professor of integrated forest protection at Oregon State University, and an expert in Armillaria. "There hasn't been anything measured with any scientific technique that has shown any plant or animal to be larger than this."
He said scientists want to learn to control Armillaria because it kills trees, but they also realise it has served a purpose in nature for millions of years. | <urn:uuid:b4c6e3cf-a197-4fec-9a0c-47e2790fbd2a> | CC-MAIN-2018-09 | http://pseudoscientific.blogspot.com/2010/11/worlds-largest-living-thing.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815812.83/warc/CC-MAIN-20180224132508-20180224152508-00145.warc.gz | en | 0.964835 | 554 | 3.6875 | 4 |
Cross Cultural Issues Self Regulation Therapy (SRT)
Cross Cultural Issues
Cross cultural issues affect the way in which we experience life. Our culture is determined by more than our food, music and language. Family relationships, gender roles, sexual expression, concept of time, humour, politeness and common sense are just some of the elements that are influenced by our spiritual and religious background, ethnicity and race.
Cross cultural issues usually become more pronounced when we move or immigrate and become exposed to people from other races and religions. It's common to feel different, and to lose your sense of self-esteem. Being bicultural or multicultural means that you may be confused about your allegiance to more than one community.
Relationships can also bring out the worst of cross cultural issues. Behaviours that are normal in one culture can seem insensitive, unkind and even obnoxious to the other partner. This can cause serious family, marital or social issues. It has been shown that cross cultural issues can lead to domestic violence, as well as victimization in the community.
If you feel that you don't fit in, lonely, anxious, or even victimized, you should consider getting help. People in cross cultural relationships who feel that their partners are intrusive, removed or unkind can benefit from counselling, too.
Cross cultural issues counselling offers a safe environment for people to explore their own history and the identities that they have developed to survive emotionally in a multicultural society. Therapy is a great tool for multicultural families to find common ground and reshape an identity for the family as individual members and as a family unit. Done individually or in a group setting, there are many ways in which to help a person to keep their own identities in a multicultural world.
If you are looking for a counsellor or psychologist who can help address your cross cultural issues you may want to search the directory to find a professional whose approach will suit you best.
Self Regulation Therapy (SRT)
Self Regulation Therapy (SRT) offers a mind-body approach to reducing excess nervous activation. With roots in neurobiology, SRT reflects the human's built-in automatic response to threat or novelty.
The nervous system changes as the result of negative events, but Self Regulation Therapy (SRT) helps the nervous system to integrate these events and balance the nervous system.
Self Regulation Therapy (SRT) takes place in a contained environment where the client feels safe. It helps to develop new neural pathways to help the client to develop flexibility and to better handle daily stresses and challenges.
Self Regulation Therapy (SRT) can help the symptoms of dysregulation, including mood disorders, personality disorders, PTSD, stress and anxiety disorders, and physical issues such as chronic pain, asthma, migraines and insomnia.
If you are looking for a therapist who offers Self Regulation Therapy (SRT), please browse our list of practitioners below.. | <urn:uuid:4d8f36c0-9aa0-4bf5-ad76-922bc3c4e35e> | CC-MAIN-2022-49 | https://counsellingbc.com/counsellors/approach/self-regulation-therapy-srt-246/practice/cross-cultural-issues-115 | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710237.57/warc/CC-MAIN-20221127105736-20221127135736-00726.warc.gz | en | 0.951513 | 587 | 3.4375 | 3 |
How can a mole be defined?
it can be defined in terms of the number of particles in a substance or by the grams of the substance
what is the mole?
the number of atoms of an elements equal to the number of atoms in exactly 12g of Carbon-12
how would you calculate the number of moles present in a given mass of a substance?
divide the mass of the substance by its molar mass
how would you calculate the number of particles present in a given number of moles of a substance?
multiply avagadros number by the number of moles
How would you calculate the number of particles present in a given mass of a substance?
take the given mass of the substance and divide it by the molar mass, and multiply the moles by Avagadros Number
because the actual mass of a single atom is so small what is used?
amu's are used to describe the mass of an atom
is knowing the mass of one atom or one molecule in atomic mass units important in a lab? Explain.
no, it isnt practical. instead the gram is the desired unit of mass
in order to establish the relationship between mass and grams what must scientists do?
1. identify what they already knew about atoms and mass
2. using the relationship between masses of different elements, they
what relationship did scientists discover between the masses of different elements?
as long as the mass of the elements aer in the same ratio as their atomic masses, there are equal numbers of atoms of each element.
why are amu's used to dscribe the mass of an atom/
because the actual mass of a single atom is so small
As far as the masses of the element samples are in the ___ ratio as their atomic masses, there are equal numbers of ___
a mole of any element is defined as what?
the number of atoms of that element equal to the number of atoms in exactly 12.0 grams of carbon
the mass ( in grams) of one mole of a substance is equal to what?
its atomic mass or formula mass in amu's
how can you determine the number of moles of atoms in a mole of molecules by doing what?
looking at the subscripts
one mole of an ionic compound contains how many formula units does it contain
6.02 x 10 23 formula units
what does the molar mass depend on?
particles, atoms, molecules or formula units that make up a substance
why is the mole the central unit in converting them amount of a substance from one measurement to another?
because a mole measures a mass, number of particles, volume of gas
if you know the number of moles in a substance how many particles are there?
6.02 x 10 23 times that number of moles
how do you find out how many molecules are in 2 moles of water
mutiply the n umber of molecules in one mole of water by 2.
what did avagadro say about gases?
at the same temperature and pressure, equal volumes of gas contain the same number of gas particles
the molar volume relationship can be used to convert between what?
the volume of that gas at STP, PRESSURE, NUMBER OF MOLES OF GAS
what is the percentage composition of compound? how do you find it?
it is the percentage by mass of each element in the compound. it is determined by dividing the mass of each element by the mass of the entire compound and multiplying by 100%
How can you find the empirical formula?
using the mass of each element and calculating the moles of each element then comparing mole ratios
how can the empirical formula ALSO be calculated?
caculated from the percentage composition of the compound
what is the molecular formula?
gives the actual number of atoms of each element in a molecular compound.
how can the molecular formula be calculated?
diving the molar mass of the compound by the empirical formula mass
what particles are you describing when you say a mole of hydrogen?
hydrogen atoms or hydrogen molecules because it is diatomic
For each of the following substances list the representative particle, number of particles in 1 mole, and the mass of one mole
4. Magnesium Oxide
1. atom, a.n, 20.2 g
2. molecule, a.n, 32 g
3. molecule, a.n,18 g
4. formula unit, a.m, 40.3 g
why is the mole the central unit in converting a substance from one measurement to another?
because the mole measures both a mass and a number of particles
you have a sample of sodium chloride with a mass of 11.2 grams, how many moles of sodium chloride are in this?
-1 mole of NaCl has a mass of 58.5 grams
- 112 g NaCl x 1 mole NaCl
58.5 g NaCl
= .191 mole of NaCl
what did avagadro propose about gases?
he said that at the same temperature and pressure, equal volumes of gases contain the same number of gas particles
the volume of a gas is known as what?
molar volume because it is the volume of one mole of gas at standard conditions
the formula for a compound indicates what?
the number and kind of each atom in a representative particle of the compound
what is the percentage composition of a compound?
the mass of each element in a compound compared to the entire mass of the compound and multiplied by 100
what are the two ways in which you can find percent composition?
1. from the given formula, you take the amount of each element, divide by its atomic mass then times 100
2. experimental analysis.
a sample of an unknown compound with a mass of 0.2370g is extracted from the roots of a plant. decomposition of the sample produces 0.09480 g of C, 0.1264 g of O, and 0.0158 g of H. what is the percent composition of the problem?
-Determine the percentage of each element in the compound
C= 0.0948g/ 0.2370g x 100%
O= 0.1264g/0.2370g x 100%
H= 0.0158g/0.2370g x 100%
the ratio of atoms will be what?
the ratio of atoms will be the simplest whole number ratio of atoms of the elements in a compound
a compound was analyzed and found to contain 13.5 g of Ca, 10.8 G of O, and 0.675 g of H. what is the empirical formula for the compound?
- convert the mass of each element to the number of moles using molar mass
13.5 g Ca x 1 mol / 40.08 g
= 0.337 mol Ca
10.8g O x 1 mole O/ 16.0 g O
= 0.675 mol O
0.675g H x 1 mol H/ 1.01g H
= 0.668 mol H
- divide each by the smallest number of moles
0.337mol Ca/0.337 = 1 mole of Ca
0.675 mol O/0.337 = 2.00 mol O
0.668 mole H/ 0.337= 1.98 mol H
the mole ratio of the elements is ..
1Ca: 2O: 2H
the empirical formula is
what does the empirical formula of a compound indicate? what doesnt it tell?
the simplest ratio of atoms in the compound, but it doesnt tell the actual number of atoms in each molecules
the exact number of atoms in each molecule of a compound determines what?
determines the properties, or characteristics of that compound
ribose has a molar mass of 150g/mole and a chemical composition of 40.0% C, 6.67% H, and 53.3% O. what is the molecular formula for ribose?
1. find the empirical formula
40%C: 40g x 1 mol C/ 12 g C
= 3.33 moles of Carbon
6.67% H: 6.67g x 1 mol H/ 1 g H
= 6.60 moles of Hydrogen
53.3%O: 53.3g x 1 mol O/16g
= 3.33 moles of Oxygen
mole ratio: 1 molC: 2molH: 1 molO
empirical formula mass: 30.0g/mol
empirical formula mass
150g/mole/ 30g/mole = 5
molecular formula= 5 x empirical
how many particles would 1 mole of CO2 contain? what would its volume be? what would its molar mass be?
6.02 x 10 23, 22.4 liters, 44.0 grams | <urn:uuid:2bce76b0-76c4-4c1c-a1bb-4f898829f796> | CC-MAIN-2016-40 | https://quizlet.com/4498096/10-1-and-10-2-chemistry-flash-cards/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660181.83/warc/CC-MAIN-20160924173740-00173-ip-10-143-35-109.ec2.internal.warc.gz | en | 0.901109 | 1,862 | 3.59375 | 4 |
Feedback: Funding Is Only the Beginning
Education reform requires more than money.
All the money in the world cannot reform education ("Operation: Save Our Schools," September 2009). It's open-minded and creative people who have the ability to make reforms.
The stimulus funds can really make an impact if they are spent to buy real equipment, materials, and lab space in each district ("Is enough of the stimulus money going to school technology?"). Students will then discover the bonds linking science, engineering, and mathematics.
Fully equipped labs where kids can build prototypes and model solutions to real-world issues will bring solutions for so many of our most urgent problems. Our nation needs to produce the best minds, so let's get to work and create great school programs.
Lockport, New York
Does Cash Lead to Reform?
In my state, Hawaii, our governor wants to use the stimulus funds to replace money the state already has legislated for schools and to instead use the budgeted money to cover our current shortfall ("Operation: Save Our Schools," September 2009). From what I understand, this follows the letter of the law, but not the intent. Teachers, who will not see a pay raise and are facing cuts in benefits and positions, are understandably upset. Parents ought to be upset, too, because their children's educations are also being compromised.
Federal funds should be used to wire the students, not the schools. Imagine if this money were spent to buy every U.S. student a netbook. You could lower the costs if you limited the money to those students who could not afford to buy a netbook on their own. Finally, you'd save millions by reducing state spending on textbooks and switching to open electronic texts instead.
More money will have a negligible effect on educational reform, just as it has had little effect on changing the bad behaviors that caused the current recession. Educational reform comes from encouraging innovation, identifying best practices, and influencing behaviors. It is a process that respects the unique individuality and creativity of independent schools without imposing top-down standards such as NCLB. Let's imagine a better system in which the best teachers lead the reform effort with the blessings of supportive communities.
John K. Vickrey
Coos Bay, Oregon
Though it's a fact that public education is underfunded, the issue of true reform is a much larger problem. To change our public schools, we must have more oversight of how funds are spent. Our school systems have become for-profit machines in which administrations are better staffed than the teaching staff. But we put teachers in front of the NCLB firing squad when their students don't test well.
Out of Pocket
I appreciated the creative fundraising strategies you outlined for teachers ("Fabulous Freebies," September 2009). But this strategy should be considered in the larger context of a neighborhood's economics. Private bolstering of public school budgets will surely widen an already large divide.
Chula Vista, California
Technology can provide students almost unlimited access to information, people, and a range of creative tools ("When the Money Isn't There," September 2009). But how long will the spark of curiosity and enthusiasm for learning last if the first three adults a child asks for help (teacher, parent, librarian) don't have a clue or if they don't have the resources to help the child follow through?
Hampton Falls, New Hampshire
Technology can improve students' academic performance in so many ways, but teachers need to feel as though the administration supports them so they have the confidence to help their students learn through technology.
Technology no longer supplements instruction; it's an integral part of everyday classroom teaching and student learning. It's the best way to prepare students to compete and thrive in today's society. | <urn:uuid:fc2d05e2-08de-4204-8539-3d3c50022ee6> | CC-MAIN-2023-23 | https://www.edutopia.org/feedback-economic-stimulus-education-funding/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644867.89/warc/CC-MAIN-20230529141542-20230529171542-00767.warc.gz | en | 0.949984 | 835 | 2.90625 | 3 |
In mid-1999, the East End Seaport Lighthouse Committee decided to undertake the saving of New York's Plum Island lighthouse. With the successful restoration of the Long Beach Bar (Bug) Light in 1990 as well as a popular maritime museum, the Committee feels that it is poised to preserve another piece of maritime history.
Plum Island is not only rich in maritime history, it is rich in American history. Recent research shows that the area was most likely the location of the first American amphibious landing in August of 1775, when Continental troops landed, under fire, to prevent livestock raids by the British. However, it wasn't until 52 years later in 1827 that the first Plum Island Light station was established. It served until as late as 1978 helping mariners navigate the often-treacherous waters of Plum Gut. Since the decommissioning of the lighthouse, the structure has been allowed to deteriorate with absolutely no action by anyone to restore it or stop the dramatic erosion that threatens the lighthouse.
Plum Gut is the waterway between Orient Point (the easternmost point of Long Island's North Fork), and Plum Island. This mile-wide constriction is a major passage for waters to and from Long Island Sound, a designation it shares with The Race off of Fishers Island. Like The Race, Plum Gut is often plagued by tidal currents of four to five knots and waves of up to six feet as the waters pass over shoals in the Gut. This combination of strong currents, waves and shoals makes the passageway hazardous for mariners.
This dangerous waterway prompted the erection of a lighthouse on the western side of the Plum Island. On August 28, 1826, the Superintendent of Light-Houses in Sag Harbor issued a call for proposals for the construction of a Light-House and Dwelling-House on the west end of Plum Island. The proposal called for a tower 30 feet in height of an octagonal pyramid shape. On top of the rough-stone tower was an octagonal iron lantern containing Winslow Lewis patent lamps. In 1838, the lighting apparatus consisted of 10 patent lamps with 13-inch reflectors. In 1856, the light was changed to a fourth order Fresnel lens.
As with many of the lighthouses built during the reign of the Fifth Auditor of the Treasury, the 1827 structure did not fare well. By the 1860's, it was time to rebuild the light. The 1867 annual Report of the Light-House Board reported that "the tower and dwelling require considerable repairs. The tower is damp and contracted, and it is recommended to rebuild it and the dwelling, and provide a new lantern."
The 1868 report pointed out that "both the tower and keepers dwelling are in bad condition and should be rebuilt. The tower, built in 1827, leaks badly; the masonry is soft and crumbling; the lantern is of the old pattern and with small lights and large astragals, and it leaks badly. It is thought that the old buildings are not worth the money which would be required to put them in good order, and it is therefore proposed to rebuild them."
By 1869, "the rebuilding of this station, for which a special appropriation was made March 3, 1869, is now far advanced in progress and will be roofed in by the end of the season for outdoor work." This structure's granite quarters with a cast-iron tower and lantern is the same design as several other area lights, including Old Field Point, Block Island North, Great Captains Island, Sheffield Island and Morgan Point. Unlike the previous lighthouse, the new one was built to last. All of the afore mentioned lights still stand, with several of them still acting as active aids to navigation.
Even with the new lighthouse and its fourth order lens guiding the way, Plum Gut was still a dangerous waterway. In 1899, the new cast-iron Orient Point tower joined forces with the Plum Island light. The two lights worked together for 79 years to guide mariners through Plum Gut.
In 1978, Plum Island's light was extinguished. The Orient Point light, which had avoided demolison earlier in the decade, was upgraded to help compensate for the loss of its neighbor's beacon.
During the time the lighthouse served mariners on the west side of the Plum Island, other things were happening on the 840-acre island. Fort Terry had been built as part of a series of artillery posts to guard the area during the Spanish-American War. After WWII, Fort Terry was deactivated. In April of 1952, Fort Terry was reactivated for Chemical Corps purposes and July 7 of that year, the Department of Agriculture announced plans to build a lab on the island to study hoof and mouth disease in cattle. These two events in 1952, combined with the closing of the island to the public, were the beginning of the mysterious reputation held by Plum Island to this day. In 1954, the Army turned over its labs to the Department of Agriculture. The Animal Disease Center is still in operation, and in 1999 it was announced that the government is considering working with more dangerous diseases on the island. The intrigue which inspired the 1997 Nelson DeMille novel that bears its name continues to this day.
In 1994, the fourth order Fresnel lens and operating clockwork mechanism were removed from the light and put on display at the East End Seaport Museum in Greenport, NY. A 1995 report on a proposed erosion control effort at the island stated that "this historic lighthouse will be condemned unless erosion control measures are taken to stabilize the bluff." In 1997, a generator house at the old light station fell in to the seas as erosion continued to gnaw at the bluff below.
Currently, the East End Seaport Lighthouse Committee is seeking the support to save the lighthouse, however, without the cooperation of the USDA, the lighthouse cannot be accessed, much less restored.
The Committee hopes to obtain a lease to the lighthouse and reestablish it as a federal aid to navigation, as was accomplished with the Long Beach Bar lighthouse. The pro bono services of marine contractors for the placement of rip rap to stabilize the bluff have already been procured. The bluff will be stabilized using the methods which have proven successful at New Yorks, Montauk Point Light. Upon completion, the structure would be accessible to the general public. However, because of the nature of the USDA's work on the island, such access will be conducted under USDA guidelines on a restricted basis.
Perhaps 2000 will see another historc landing on Plum Island, that of the "troops" sent to save an endangered part of American lighthouse history.
About the authors:
Robert G. Muller is a freelance writer, creator of the LongIslandLighthouses.com web site, and is presently writing a book on the history of Long Island's lighthouses. He is the publicist for the Horton Point Lighthouse and is a member of the East End Seaport Lighthouse Committee. You will often find him narrating cruises and guiding tours at many of Long Island's lighthouses. He may be reached at LILighthouses@aol.com
Merlon E. Wiggin, Ph.D., M.E., is the founder and Director of the East End Seaport Lighthouse Committee and a former Chief of Engineering at Plum Island. Dr. Wiggin is a retired Air Force Lieutenant Colonel, has a FFA pilots license and holds a Coast Guard Masters license. When not involved in East End Seaport matters, he and his wife Isabelle can often be found upon their 30-foot sloop, Albion.
How You Can Help?
Those interested in helping save the Plum Island lighthouse may learn more about the effort from:
East End Seaport Lighthouse Committee
One Bootleg Alley
P.O. Box 624
Greenport, NY 11944
E-mail: email@example.com Web site: ww.eastendlighthouses.org
More information is also available at: www.longislandlighthouses.com/saveplumisland/index.htm
This story appeared in the
January 2000 edition of Lighthouse Digest Magazine. The print edition contains more stories than our internet edition, and each story generally contains more photographs - often many more - in the print edition. For subscription information about the print edition, click here.
All contents copyright © 1995-2016 by Lighthouse Digest®, Inc. No story, photograph, or any other item on this website may be reprinted or reproduced without the express permission of Lighthouse Digest. For contact information, click here. | <urn:uuid:b83ec71c-eeb2-42b5-87c1-25cd342a530a> | CC-MAIN-2016-26 | http://www.lighthousedigest.com/Digest/StoryPage.cfm?StoryKey=666 | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397111.67/warc/CC-MAIN-20160624154957-00001-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.961338 | 1,772 | 3.078125 | 3 |
The word of the LORD came to Jonah the son of Amittai saying, “Arise, go to Nineveh the great city and cry against it, for their wickedness has come up before Me.” But Jonah rose up to flee to Tarshish from the presence of the LORD. So he went down to Joppa, found a ship which was going to Tarshish, paid the fare and went down into it to go with them to Tarshish from the presence of the LORD. [Jonah 1:3]
Jonah was a prophet of God who lived in Israel in the seventh century BC (around 2,700 years ago). It was a time that Israel would become a powerful nation, expanding its borders with wealth and power. However, spiritually they were not doing well. This increased prosperity and power had resulted in a materialistic culture that thrived on injustice to the poor and oppressed.
It was at such times when God often would raise up a prophet to speak against such injustices and call His people to repentance, but Jonah is not called to speak to His own people instead he is called to go Nineveh, the capital city of Assyria, a place of perversity, violence, bitter enemies to the people of Israel.
The Word of the LORD came to Jonah – It was God’s idea for Jonah to go to Nineveh and do what He wanted him to go and do. He was the perfect person for the job as he is a successful well-known preacher and prophet who usually transfers what God has to say clearly to people. The challenge this time was going to the city of Nineveh which is an enemy city of Israel and the Ninevites were terrible, nasty and cruel people, who used to attack, kill and inflict pain on other people. And God was asking Jonah to go and speak to these very scary people, to do a very scary thing and so Jonah was anxious.
Jonah instead decided to do the opposite of what God asked him to do – he ran away, went to Joppa and boarded on a ship wanted to rather go to Tarshish. God laid out some work for Jonah, but he made the choice to go elsewhere.
Just like Jonah, all those centuries ago, God still speaks to us, gives us instructions on what He expects us to do. The question becomes, what will you do with what God is asking you to do? One of the most powerful things that God has given to us as humans is “The Power to Choose”.
About seven centuries before Jonah’s time God spoke to Moses and the people of Israel saying, “I call heaven and earth as witnesses against you today that I have set before you life and death, blessing and cursing. Therefore, choose life, so that you and your descendants may live…” [Deuteronomy 30:19]
The very next generation a man named Joshua leads the people of Israel into the promised land and twice he will tell them to choose, “Now therefore fear the Lord and serve him in sincerity and in faithfulness. Put away the gods that your fathers served beyond the River and in Egypt, and serve the Lord. And if it is evil in your eyes to serve the Lord, choose this day whom you will serve, whether the gods your fathers served in the region beyond the River, or the gods of the Amorites in whose land you dwell. But as for me and my house, we will serve the Lord.” [Joshua 24:14-15].
Centuries later, The Prophet Elijah will stand on Mount Carmel and call out the people of Israel to choose between two opinions…
Then Elijah approached all the people and said, “How long will you waver between two opinions? If the LORD is God, follow Him. But if Baal is God, follow him.” But the people did not answer a word [1 Kings 18:21].
Jonah then decides to run from God, but it never went well with him, he ended up on the ship and because of his choice he ended up in the belly of a huge fish. God had mercy on him and the fish vomited him to dry land. It is in Jonah Chapter 3 that we see him making the choice to heed to God’s call.
Our existence is not our choice, but choice is the gift of our existence. And with that power of choice, it is critical for us to understand that every choice we make is a seed that will produce fruit, either life or death, blessings or curses – every choice we make will have consequences, good or bad.
Putting it another way, “The choices we make today determine our tomorrow”. [OPINION]
Content created and supplied by: Mbuyu-Ana (via Opera News ) | <urn:uuid:276af23e-916f-4acd-b82a-6908b4cdcf84> | CC-MAIN-2021-10 | https://za.opera.news/za/en/others/0c3df2b903f903228bde45708a696701 | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178357984.22/warc/CC-MAIN-20210226205107-20210226235107-00375.warc.gz | en | 0.980551 | 996 | 2.5625 | 3 |
Start making healthy choices
Healthy changes don’t happen overnight. But you can start making healthier choices for you and your family today. Even small changes will have you on your way towards a healthier tomorrow.
Four key areas where Ontario’s public health units work to support choices for healthy living include:
- healthy eating
- food safety
- hand washing
- active living
Making choices to improve your health will:
- make you feel better
- reduce stress
- prevent diseases
Eating well is one of the most important things you can do to keep you and your family healthy. It can help protect you from heart disease and stroke. It can lower your risk of type 2 diabetes and some kinds of cancer. It can also stop bone loss as you age.
Programs and resources to help people in the province eat healthy include:
- EatRight Ontario
- Northern Fruit and Vegetable Program
This free service can help you eat and cook in a healthier way.
- call a dietitian toll-free at 1-877-510-510 – Option 2
- email a dietitian to get answers to your nutrition and healthy eating questions
- visit EatRight Ontario for:
- articles on food and nutrition
- meal planning advice
- healthy eating tips
Northern Fruit and Vegetable Program
This program brings healthy, nutritious food to elementary and intermediate school students in the districts of Algoma, Porcupine and Sudbury. The Ontario Fruit and Vegetable Growers’ Association coordinates delivery of fruits and vegetables to students at least twice a week from January to June.
Algoma Public Health, Porcupine Health Unit and Sudbury and District Health Unit work with schools in their regions. The program reaches over 190 schools and approximately 37,000 students.
The goal is to teach children and their families the benefits that fruits and vegetables, healthy eating and physical activity have on their overall health and to encourage them to eat more of these healthy foods.
Tips for healthy eating
- use Canada’s Food Guide to Healthy Eating
- eat a variety of colourful vegetables and fruits
- eat whole grain products
- choose fat-free and low-fat dairy products
- choose lean meats like skinless chicken or turkey
- snack smart: choose dried fruit, carrot sticks, whole grain crackers
- use healthy cooking methods such as baking, broiling or steaming
- serve healthy portion sizes
- limit your alcohol intake
- start your own Healthy Weight Action Plan
Food safety in Ontario is shared by all levels of government — federal, provincial and municipal. There are three ministries responsible for food safety in the province:
- Agriculture and Food — dairy and meat inspection programs
- Health and Long Term Care — protection of public health and setting food safety standards
- Natural Resources — fish and plants harvested in Ontario
What causes food poisoning
You and your family can get food poisoning when you eat contaminated food. You can’t smell or see these toxins. But they multiply quickly and can make you sick.
Seniors, young children, pregnant women and people with weakened immune systems, are more likely to become sick.
Signs and symptoms of food poisoning
You may have food poisoning if you have some or all of these symptoms:
- upset stomach with nausea, vomiting, stomach cramps, stomach pain
Contaminated food can make you sick anywhere from hours to weeks after eating it. Most people get sick within a couple of days.
What to do if you think you have food poisoning
- seek medical care as soon as possible
- notify your local public health unit immediately
How to make a complaint about food safety
Contact your local health authorities for concerns about:
Tips to prevent food poisoning
- follow 4 steps to make sure you’re handling all the food you eat safely and to prevent illness read current food recall warnings
- handle and store food properly to prevent spoilage or contamination from bacteria
Washing your hands is important to keeping you and your family healthy. Follow these important tips:
- wash your hands often and carefully — at least 15 seconds for each part
- remove jewellery and keep nails short
People who are physically active live longer and healthier lives. They are less likely to develop heart disease and other chronic health problems. Regular physical activity leads to a better quality of life. And, it helps lower the cost of health care in the province.
Ontario’s public health units offer programs that can help you learn to eat healthier, be more active and prevent chronic diseases.
- walking is a great way to explore your neighbourhood — you can find new places to get active and have fun
- discover more than 330 provincial parks in Ontario
- take a walk on the Ontario trails
- find provincial recreation organizations that can help you pursue your favorite sport or activity
- see what programs are offered through local community and recreation centres
How much you should exercise
The Canadian Society for Exercise Physiology has set out physical activity guidelines that tell you how often you should exercise.
Originally Posted on: https://www.ontario.ca/page/healthy-choices | <urn:uuid:f5c51812-5324-43b2-aca5-f4b35b16b187> | CC-MAIN-2020-50 | http://www.wharncliffewalkin.com/healthy-choices-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141168074.3/warc/CC-MAIN-20201123211528-20201124001528-00173.warc.gz | en | 0.943049 | 1,060 | 3.03125 | 3 |
In a paper published in Nature Communications, researchers from the Sir Peter Mansfield Imaging Centre at the University of Nottingham, working in collaboration with the Paediatric Neuroimaging group from the University of Oxford and scientists from UCL, demonstrate how they have enhanced their ground-breaking Magnetoencephalography (MEG) technology with a novel helmet design that they used to measure brain activity in young children engaging in natural activities.
As well as providing a new way to measure healthy brain function across the lifespan, it also opens up the opportunity to study a range of neurological and mental health conditions in children, including epilepsy and autism.
Brain cells operate and communicate by producing electrical currents. These currents generate tiny magnetic fields that can be detected outside the head. Researchers use MEG to map brain function by measuring these magnetic fields. This allows for a millisecond-by-millisecond picture of which parts of the brain are engaged when we undertake different tasks, such as speaking or moving.
Wearable quantum technology
Ryan Hill, the Ph.D. researcher who led this new study and said: “The foundations for human cognition are laid down in the first decades of life, but there have always been limited ways to study them due to restrictions in brain scanning technology. A particular problem has always been movement and the fact that the large traditional fixed scanners have always required patients to stay completely still. Not only does this fail give an accurate picture of the brain operating in a natural environment, but it also places severe restrictions on who can be scanned, with children representing the biggest challenge. “
The research team in Nottingham have solved this problem by using new ‘quantum’ sensors which are very light in weight. This means that MEG technology, which traditionally requires a half tonne ‘one-size-fits-all’ machine, is reduced to a 500 g helmet which can adapt to any head size. Because the new sensors can be placed very close to the head, the amount of signal that they can pick up is vastly increased compared to conventional equipment (which requires sensors to be kept very cold (-269 degrees) and therefore far from the head). The research team have also developed special electromagnetic coils which enable accurate control of background magnetic fields, allowing individuals to be scanned whilst they move freely.
Ryan continues: “The initial prototype scanner was a 3D printed helmet that was bespoke – in other words only one person could use it. It was very heavy and quite scary to look at. Here, we wanted to adapt it for use with children, which meant we had to design something much lighter and more comfortable but that still allowed good enough contact with the quantum sensors to pick up signals from the brain. We designed and built a new bike helmet style design and using this we were able to successfully analyse brain activity of a 2 and 5-year-old whilst they were doing an everyday activity, in this case watching TV whilst their hands were being stroked by their mum. They were able to move around and act naturally whilst doing this. To show that the system is equally applicable to older children, we used it, with a larger helmet, to scan a teenager playing a computer game.”
As well as looking at children’s brain activity, the researchers used the new scanner to examine brain activity in an adult learning a musical instrument – this scenario provides a way to examine brain activity whilst someone engages in a natural task, but was unthinkable with conventional MEG equipment because the act of playing the instrument requires head and arm movement, which has previously not been possible.
Professor Matthew Brookes, who leads the MEG research at the University of Nottingham, said: “This study is a hugely important step towards getting MEG closer to being used in a clinical setting, showing it has real potential for use in children. The challenge now is to expand this further, realising the theoretical benefits such as high sensitivity and spatial resolution, and refining the system design and fabrication, taking it away from the laboratory and towards a commercial product.”
Professor Richard Bowtell, Director of the Sir Peter Mansfield Imaging Centre, who was also involved in the research, said: “This is a really exciting development, which moves us towards a wearable brain MEG technology that can be used in adults and children. Collaboration with an interdisciplinary team of researchers from three universities has been key to the success of this work.” | <urn:uuid:2563265a-17cc-4008-9b1d-abe1ec8313eb> | CC-MAIN-2021-10 | https://neuroimaging.paediatrics.ox.ac.uk/whats-new/new-design-of-2018bike-helmet2019-style-brain-scanner-used-with-children-for-first-time | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178359497.20/warc/CC-MAIN-20210227204637-20210227234637-00345.warc.gz | en | 0.968724 | 900 | 3.46875 | 3 |
The question of whether the historical Jesus was in good mental health has been explored by multiple psychologists, philosophers, historians, and writers. The first person, after several other attempts at tackling the subject, broadly and thoroughly questioned the mental health of Jesus was French psychologist Charles Binet-Sanglé, the chief physician of Paris and author of a four-volume work La Folie de Jésus (The Madness of Jesus). This view finds both supporters and opponents.
The assessment of the sanity of Jesus first occurs in the gospels. The Gospel of Mark reports the opinion of members of his family who believe that Jesus "is beside himself." Some psychiatrists, religious scholars and writers explain that Jesus' family, followers (John 7:20), and contemporaries seriously regarded him as delusional, possessed by demons, or insane.
And when his family heard it, they went out to seize him, for people were saying, "He is beside himself". And the scribes who came down from Jerusalem said, "He is possessed by Be-el′zebul, and by the prince of demons he casts out the demons".
The accusation contained in the Gospel of John is more literal:
There was again a division among the Jews because of these words. Many of them said, "He has a demon, and he is mad; why listen to him?"— John 10:19–20, Revised Standard Version
Justin Meggitt, a lecturer at the University of Cambridge, suggests in his article ″The Madness of King Jesus: Why was Jesus Put to Death, but his Followers were not?″ (2007) and in his book The Madness of King Jesus: The Real Reasons for His Execution (2010) that Pilate and the other Roman people regarded Jesus as an insane deceived lunatic. According to the Gospels, Jesus was presented to Pilate and sentenced to death as a royal pretender, but the standard Roman procedure was the prosecution and execution of would-be insurgents with their leaders. Therefore, to suggest that Jesus was put to death by the Roman authorities as some kind of royal pretender does not explain sufficiently why he was killed, unlike his disciples.
Jean Meslier (1664–1729) had similar thoughts in the 18th century. In chapters 33 and 34 of his Testament, he provides evidence for his conclusion that Jesus ″was really a madman, a fanatic″ (étoit véritablement un fou, un insensé, un fanatique).
Challenging the sanity of Jesus continued in the 19th century with the first quest for the historical Jesus. David Friedrich Strauss (Das Leben Jesu, second edition, 1864) claimed that Jesus was a fanatic. Lemuel K. Washburn (Was Jesus insane?) concluded, "Jesus was not divine, but insane". Oskar Panizza introduced Jesus as a psychopathological and paranoid case. Oskar Holtzmann (1903) diagnosed Jesus to be "ecstatic", which he described to be a pathologically-strong excitability of the imagination and the power of will. Georg Lomer (as George de Loosten, 1905) attempted to retrospectively diagnose Jesus as generally mentally ill, similarly to Jean Meslier. Emil Rasmussen (1905) determined Jesus to be either epileptic or paranoid. Using a few examples, he developed a description of the typical pathological prophet ("Prophetentypus") and applied it to Jesus. Julius Baumann (1908) hypothesised that the abnormalities he found in Jesus' behaviour could be explained by a nerve overstimulation (Nervenüberreizung). However, it was not until the publication of Charles Binet-Sanglé's four-volume work La folie de Jésus from 1908 to 1915 that the topic was extensively and visibly discussed.
Binet-Sanglé diagnosed Jesus as suffering from religious paranoia:
In short, the nature of the hallucinations of Jesus, as they are described in the orthodox Gospels, permits us to conclude that the founder of Christian religion was afflicted with religious paranoia.— (vol. 2, p. 393)
His view was shared by the New York psychiatrist William Hirsch, who in 1912 published his study, Religion and Civilization: The Conclusions of a Psychiatrist, which enumerated a number of Jesus' mentally-aberrant behaviours. Hirsch agreed with Binet-Sanglé in that Jesus had been afflicted with hallucinations and pointed to his "megalomania, which mounted ceaselessly and immeasurably". Hirsch concluded that Jesus was just a "paranoid":
But Christ offers in every respect an absolutely typical picture of a wellknown mental disease. All that we know of him corresponds so exactly to the clinical aspect of paranoia, that it is hardly conceivable how anybody at all acquainted with mental disorders, can entertain the slightest doubt as to the correctness of the diagnosis.— (p. 103)
The Soviet psychiatrist Y. V. Mints (1927) also diagnosed Jesus as suffering from paranoia. The literature of the Soviet Union in the 1920s, following the tradition of the demythologization of Jesus in the works of Strauss, Renan, Nietzsche, and Binet-Sanglé, put forward two main themes: mental illness and deception. That was reflected in Mikhail Bulgakov's novel The Master and Margarita in which Jesus is depicted by Pontius Pilate as a harmless madman. It was only at the turn of the 1920s and the 1930s that the mythological option, the denial of the existence of Jesus, won the upper hand in Soviet propaganda.
Jesus' mental health was also questioned by the British psychiatrists William Sargant and Raj Persaud, a number of psychologists of the psychoanalytic orientation, like Georges BerguerQuelques traits de la vie de Jésus au point de vue psychologique et psychanalytique.in his study
Władysław Witwicki, a rationalist philosopher and psychologist, in the comments to his own translation of the Gospels of Matthew and Mark, Dobra Nowina według Mateusza i Marka (The Good News according to Matthew and Mark ), which is in fact a psychobiography of Jesus, attributed that Jesus had subjectivism, an increased sense of his own power and superiority over others, egocentrism and the tendency to subjugate other people. He also had difficulties communicating with the outside world and dissociative identity disorder, which made him a schizothymic or even schizophrenic type (according to Ernst Kretschmer's typology).
The American theologian and psychologist of religion Donald Capps in his book Jesus: A Psychological Biography (1989, 2000) diagnosed Jesus as a utopian-melancholic personality (he looked forward to a coming kingdom of God) with suicidal tendencies.
New Testament scholar Andrew Jacob Mattill Jr.in his article in The Book Your Church Doesn't Want You To Read (1993), he draws attention to the ever-increasing megalomania of "John's Jesus" (described in the Gospel of John 6:29, 35, 38, 40, 47-58; 7:38; 8:12; 11:25-26; 14:6, 13-14) and concludes:
The more trust one puts in the Fourth Gospel's portrait of Jesus the more difficult it is to defend the sanity of Jesus.
The English psychiatrist Anthony Storr in his final book Feet of Clay; Saints, Sinners, and Madmen: A Study of Gurus (1996) suggested that there are psychological similarities between crazy "messiahs" such as Jim Jones and David Koresh and respected religious leaders including Jesus.[a] Storr tracks typical patterns, often involving psychotic disorders that shape the development of the guru. His study is an attempt to look at Jesus as one of many gurus. Storr agrees with most scholars of historical Jesus, who are inclined to the hypothesis of Jesus as apocalyptic prophet:
It seems inescapable that Jesus did share the apocalyptic view that God's final conquest of evil was at hand and that God's kingdom would be established upon earth in the near future.
Storr recognises Jesus' many similarities to other gurus. It was, for example, going through a period of internal conflict during his fasting in the desert. According to Storr, if Jesus really considered himself a deputy for God and believed that one day he would come down from heaven to rule, he was very similar to the gurus whom he had previously described as preachers of delusions possessed by mania of greatness. He notes that Jesus was not ideal in family life (Mark 3:31–35, Mark 13:12–13). Gurus often remain indifferent to family ties. Other similarities, according to Storr, include Jesus' faith in receiving a special revelation from God and a tendency to elitism, in the sense that Jesus believed that he had been specially marked by God.
American neuroendocrinology researcher Robert Sapolsky in his essay included in the book The Trouble with Testosterone: and Other Essays on the Biology of the Human Predicament (1997, 1998) suggests the occurrence of schizotypal ("half-crazy", p. 248) behavior and metamagical thinking in Jesus and other charismatic religious leaders:
Oh, sure, one can overdo it, and our history is darkly stained with abortive religious movements inspired by messianic crackpots. (...) However, if you get the metamagical thoughts and behaviors to the right extent and at the right time and place, then people might just get the day off from work on your birthday for a long time to come.— (p. 256)
Then Sapolsky notes that "plausible links can to made among schizotypal behaviour, metamagical thought, and the founding of certain religious beliefs in both non-Western and Western societies." (p. 256)
In 1998–2000, Leszek Nowak (born 1962) from Poznań, Poland[b] authored a study in which, based on his own history of religious delusion of mission and overvalued ideas and information communicated in the Gospels, made an attempt at reconstructing Jesus' psyche, with the view of Jesus as apocalyptic prophet, taking into account the hypothesis of indirect suicide. He does so in chapters containing, in sequence, an analysis of character traits of the "savior of mankind", a description of the possible course of events from the period of Jesus' public activity, and a naturalistic explanation of his miracles.
In 2012, a team of psychiatrists, behavioral psychologists, neurologists and neuropsychiatrists from the Harvard Medical School published a research that suggested the development of a new diagnostic category of psychiatric disorders related to religious delusion and hyperreligiosity. They compared the thoughts and behaviors of the most important figures in the Bible (Abraham, Moses, Jesus, and Paul) with patients affected by mental disorders related to the psychotic spectrum using different clusters of disorders and diagnostic criteria (DSM-IV-TR), and concluded that these Biblical figures "may have had psychotic symptoms that contributed inspiration for their revelations", such as schizophrenia, schizoaffective disorder, bipolar disorder, delusional disorder, delusions of grandeur, auditory-visual hallucinations, paranoia, Geschwind syndrome (especially Paul) and abnormal experiences associated with temporal lobe epilepsy (TLE). According to the authors, in the case of Jesus, it could have been: paranoid schizophrenia, bipolar and schizoaffective disorders. They hypothesized that Jesus may have sought death through "suicide-by-proxy" (indirect suicide).
Opinions and publications questioning the sanity of Jesus, especially Charles Binet-Sanglé and William Hirsch, triggered polemical reactions. They were first challenged by Albert Schweitzer in his doctoral thesis, The Psychiatric Study of Jesus: Exposition and Criticism, (Die psychiatrische Beurteilung Jesu: Darstellung und Kritik, 1913) and by the American theologian Walter E. Bundy in his 1922 book, The psychic health of Jesus. Bundy summarized his defense of Jesus′ sanity:
A pathography of Jesus is possible only upon the basis of a lack of acquaintance with the course and conclusions of New Testament criticism and an amateur application of the principles of the science of psychiatry.— (p. 268)
Earlier (1908) the mental health of Jesus was defended by: the German Catholic theologian, professor of apologetics at the University of Würzburg, Philipp Kneib (Moderne Leben-Jesu-Forschung unter dem Einflusse der Psychiatrie) – against the arguments of Holtzmann, Lomer, Rasmussen and Baumann; the German evangelical theologian and pastor Hermann Werner (Die psychische Gesundheit Jesu) – against the arguments of Holtzmann, Lomer and Rasmussen; and also (1910) by the German psychiatrist, chief physician of the Friedrichsberg Mental Asylum in Hamburg, Heinrich Schaefer (Jesus in psychiatrischer Beleuchtung: eine Kontroverse) – against the arguments of Lomer and Rasmussen.
The mental health of Jesus is also defended by psychiatrists Olivier Quentin Hyder, also by Pablo Martinez and Andrew Sims in their book Mad or God? Jesus: The healthiest mind of all (2018). Christian apologists, such as Josh McDowell and Lee Strobel, also take up the subject of Jesus' sanity defense.
The defense of Jesus' mental health was devoted to an editorial in the magazine of Italian Jesuits La Civiltà Cattolica, published November 5, 1994. To the title question E se Gesù si fosse ingannato? ("What if Jesus was deceived?") the editors replied in the negative by arguing that Jesus was not a fanatic or megalomaniac but a mentally-healthy and very realistic person. Therefore, he did not deceive himself by saying that he was the messiah and the Son of God.
American biblical scholar James H. Charlesworth, in his essay Jesus Research and the Appearance of Psychobiography (2002), discusses previous attempts to write a psychobiography of Jesus. In the final reflection, he suggests that earlier (created at the beginning of the 20th century) images of a mentally disturbed, paranoid Jesus with hallucinations resulted from comparing him to paranoids in the clinics of their creators and applying Freudian psychology to ancient sources. According to the author, Jesus' intentions should be examined in the context of his place and era, using historical research.
Pope Benedict XVI wrote in his book Jesus of Nazareth:
A broad current of liberal scholarship has interpreted Jesus′ Baptism as a vocational experience. After having led a perfectly normal life in the province of Galilee, at the moment of his Baptism he is said to have had an earth-shattering experience. It was then, we are told, that he became aware of his special relationship to God and his religious mission. This mission, moreover, supposedly originated from the expectation motif then dominant in Israel, creatively reshaped by John, and from the emotional upheaval that the event of his Baptism brought about in Jesus′ life. But none of this can be found in the texts. However much scholarly erudition goes into the presentation of this reading, it has to be seen as more akin to a ″Jesus novel″ than as an actual interpretation of the texts. The texts give us no window into Jesus′ inner life – Jesus stands above our psychologizing (Guardini, Das Wesen des Christentums).
C. S. Lewis famously considered Jesus' mental health in what is known as Lewis's trilemma (the formulation quoted here is by John Duncan):
Christ either deceived mankind by conscious fraud, or He was Himself deluded and self-deceived, or He was Divine. There is no getting out of this trilemma. It is inexorable.
The agnostic atheist New Testament scholar Bart Ehrman wrote on his own blog:
And he may well have thought (I think he did think) that he would be made the messiah in the future kingdom. That may have been a rather exalted view of himself, but I don't think it makes Jesus crazy. It makes him an unusually confident apocalyptic prophet. There were others with visions of grandeur at the time. I don't think that makes him mentally ill. It makes him a first-century apocalyptic Jew.
That the other members of his own family considered him insane, is said quite plainly, for they openly declare, "He is beside himself."
He was thought to be insane by his own family and neighbors in 'when his friends heard of it, they went out to lay hold on him: for they said, He is beside himself... (Mark 3:21–22 – The Greek existemi, translated as "beside himself", actually means insane and witless). The Greek 'ho para, translated as "friends", also means family.
Perhaps, even earlier, Jesus Christ might simply have returned to his carpentry following the use of modern [psychiatric] treatments.
Two thousand years ago Jesus received a crown of thorns. Today the Messianic have electro-convulsive therapy.
You can only do post-hoc forensic psychiatry on Koresh and Jones, but Charles Manson is a diagnosed paranoid schizophrenic. But get it just right, and people are gonna get the day off from work on your birthday for millennia to come. | <urn:uuid:ff8ea103-8dde-4526-bed2-cfc992b2017d> | CC-MAIN-2023-50 | https://db0nus869y26v.cloudfront.net/en/Mental_health_of_Jesus | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103558.93/warc/CC-MAIN-20231211045204-20231211075204-00121.warc.gz | en | 0.958254 | 3,620 | 3.203125 | 3 |
Teachers have always coined terms to explain and classify the voice in an attempt to add credibility to vocal pedagogy (teaching). Trying to make an art form sound more credible by using impressive terms unfortunately does not make it scientific. Not being scientifically sound, some of these terms would occasionally clarify concepts for a singer but more often they would generate confusions which actually hinder one’s understanding and potential.
Range and Register Classifications
The terms Chest Voice, Head Voice and Falsetto are examples of such a vocabulary that possibly traces back as far as the Roman Empire. They may have some descriptive value but they provide no physiologically accurate data about how the voice actually works while appearing to do so.
When you sing in the range of your voice that spans from a few notes below the pitch of your speaking voice to about an octave above it, you often feel sensations in the breastbone; thus the classification “chest voice.” Likewise, the head voice was so named due to the experience of sensations in the head when singing up from approximately 6 to 8 notes higher than the pitch of one’s usual speaking voice. Between chest and head was designated as the “middle register” – just to have a name for it. For men, the falsetto lies above the head register; while for women it is often called the whistle register (Mariah Carey’s highest range).
The name falsetto can be especially misleading since “false” is defined as unreal or imaginary. In fact, the name originates from an early Italian school of voice technique. It was during a time when only men were permitted to sing in concert and so needed to sing all the parts. But, as they considered the highest notes of a male voice unnatural and a false voice, they named it accordingly. It’s unfortunate that this biased classification has carried forward into modern vocal parlance.
The Problem with This
Now-a-days these terms lack uniform definitions and mean different things from teacher to teacher. This creates a great deal of confusion and may have you made you uncertain as to what’s the correct approach as you sing low and high in your range.
The problem with using these categories in vocal training is that it can encourage you to think of your voice in sections. This sectionalized approach can lead to the idea that you must make something happen in order to bridge the gap between your “different voices.” And in fact, this is how many singers are taught and it is a complete falsehood.
After working with tens of thousands of singers from around the world, many of whom were confused and plagued by needless maneuvers to navigate between “their registers,” I decided not to perpetuate this fallacy of segmented range. My previous research into medical journals had provided accurate scientific vocal physiology which I incorporated into an understanding of how to achieve an uninterrupted wide useable range.
My discoveries have validated the way I prefer to think of the voice - as having an expanse of range within which the singer is free to create sounds appropriate to their own self-expression and communication. However, there are several factors that can impede this achievement and if they’re not understood, would cause a singer to think about range in a more limiting way.
A major factor is too much air released when you sing. This single issue — very common even amongst trained singers — is the underlying cause of such an array of apparently nonrelated vocal difficulties that you may not even suspect it as a problem. You may not know this is the underlying reason for the symptoms you experience or the limitations of your voice and range.
The result of air over-blow is usually an unconnected range that is stronger in the lower notes and lighter, weaker, breathier or without ‘body’ in the higher range. This usually leads to the confirmation and supposed proof that there is such a thing as “Chest voice” and “Head voice.” From this, systems were designed to “bridge” each section and mask over these sections. It’s like creating a problem and then developing “techniques” to hide the problem that was never solved in the first place.
Pushing out too much air while you sing has many symptoms. Many singers expend most of their energy working to compensate for this problem without realizing what the problem is. Unfortunately this is reinforced by voice techniques that are designed to work around air over-blow instead of recognizing it as the problem and remedying it.
Is There Hope?
I have discovered and developed a breath management technique that works naturally and automatically. Once you learn it, you don’t need to do “breathing exercises” and you don’t have to think about breathing when singing. To begin to get a sense of what it might feel like to sing with less air coming out try this:
EXPERIMENT: Put your hands on your sides, about half-way up from your waist. Through your mouth, inhale and let your sides expand (those are your ribs expanding). Now sing a line of a song while trying to maintain the expansion of your sides. As you do so, do not push in your stomach.
It is not easy to maintain an expanded ribcage without proper muscle development. The above is not one of my exercises. I am only trying to give you a sense of what it might be like to not push out your breath as you sing, and see if you notice any improvement, no matter how slight.
To completely achieve natural breath support along with the full benefits of this approach (ribcage expansion technique), you will find the comprehensive theory and exercises in my “Contemporary Vocalist” Volume One book and CDs.
You can own and command your range with confidence and ease!
Yours in song,
on September 23, 2014 at 10:15 PM said:Great post! I have experienced this 'teaching' as well and it has resulted in a voice that can be strong, but gentle and quiet isn't always a forte (no pun intended ;-) ) I've also always thought of Falsetto as something that's 'not real', but heck, it's my voice and my voice is an instrument. Trumpets can squeal, why not voices ? ;-) Thanks again!
on September 24, 2014 at 10:30 AM said:Hi Michael - Thanks for your input. The wonderful thing is, the area of range named "falsetto" can be strong and full if approached and exercised correctly. Some of the major singers in the 1980's such as Steve Perry of Journey are good examples of what's possible
on September 24, 2014 at 8:17 PM said:Jeannie, you are so wonderfully clear and articulate about these issues! Thank you for exploring this whole set of ideas, really thinking it out physiologically, and coming up with your teaching technique. Any of you reading this, I am here to tell you that Jeannie's method really works, will give you uninterrupted use of a fuller range, and will allow you to have enough control to sing high and soft when you want to, while still giving you a nice big sound throughout your range when that is what you want.
on September 25, 2014 at 12:47 PM said:Hi Ginny! Thanks so much! It has always been a pleasure working with you.
on September 29, 2014 at 8:40 PM said:Jeannie, I was practicing in the car today and realized how easy it was to belt stuff out, even higher in my range. Then I realized that singing quiet in that area was possible as well, with falsetto tinges, but it was a little more difficult. Singing between the two extremes wasn't very easy at all. Interesting about Steve Perry. Truthfully, I've always thought there was some falsetto magic going on with Steve Perry. I've used your exercises in the past. I need to dig in again. ;-) Thanks for sharing your expertise!
on September 29, 2014 at 11:18 PM said:Hi Michael - thanks for your additional comment. Do you have my Contemporary Vocalist Volume One book and 4 CDs? Working with that approach and exercises should do the trick as far as getting rid of any "transitional" areas in your range and giving you a wide range of consistent strength and choices of tones, dynamics and more. Let me know. :-)
on September 30, 2014 at 11:10 AM said:This is beyond correct. Getting complete control of your exhalation and learning to work with and manage sub glottis pressure is the key to really powerful singing with intense emotion and resonance.
on September 30, 2014 at 6:50 PM said:Jeannie, I actually don't have that particular package. Me thinks I should get it. :)
on September 30, 2014 at 11:23 PM said:Michael - yes. The Contemporary Vocalist is the foundation of my method. I think you'll love it.
on September 30, 2014 at 11:23 PM said:Thanks Bot!
on October 1, 2014 at 1:42 AM said:Done, Jeannie!! Looking forward to the lessons!! Appreciate all the assistance! :)
on October 1, 2014 at 8:34 AM said:What about Vocal Placement? You still have your low ranges that resonate in the chest, mid range that resonates in the mask and high range which resonates in the head. All ranges are placed forward through the mask to get the so called "nose buzz" to avoid "breaks". Once learned how to navigate between these areas then you put it all together as one voice with no breaks, unless of course you want to use your breaks for vocal expression. To me the Head voice, Chest voice, etc. are merely tools and a way to communicate about the areas in ones range.
on October 3, 2014 at 12:03 AM said:Hi Jeannie. I have purchased your program and have been doing it now for 2 weeks. Enjoying it a lot. After how many months will I really see the difference and improvement in my voice? Thank you.
on October 5, 2014 at 12:01 PM said:Dear Lizette, Thank you for buying my program. I'm glad you are enjoying it. If you do the vocal warm-ups daily and also the exercises in Chapter 3 of Contemporary Vocalist Vol. 1, you should see improvements right away. It should not take months. It does take some time to fully apply the rib cage expansion while singing, but just doing the exercises and the warm-ups should produce noticeable improvements within a week or so. If you need personalized feed back, I recommend a consultation with me via Skype. Wishing you success.
on November 4, 2014 at 6:59 AM said:Hi Jeannie, I agree 100% on everything you had mentioned in your article. Most of the times, I've been so confused as to where I feel most comfortable when I sing. I could never understand thoroughly if I constantly sing in my head or in my chest voice. I just have one question, which of your volumes of singing would be the best way to expand your range and to help mesh your head and chest voice together to eventually create a mid range?
on November 4, 2014 at 3:49 PM said:Dear Geny, The Contemporary Vocalist Vol. 1 is the best of my materials to give you the information and exercises you need to expand your range. | <urn:uuid:0eb23d31-3b7f-4e18-8722-522f9ad08883> | CC-MAIN-2018-30 | http://www.jeanniedeva.com/blog/post/3644988 | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591332.73/warc/CC-MAIN-20180719222958-20180720002958-00190.warc.gz | en | 0.968024 | 2,377 | 4.09375 | 4 |
PROJECT: UNDP-SIWI WATER GOVERNANCE FACILITYUnited Arab Emirates
Water scarcity is a great issue within UAE, to which technological solutions have been applied. However, improving community awareness of local and global water issues can reduce the dependence on these technologies. Every Drop Matters focused on increasing awareness of efficient water use.
Activating agents of change
Remarkably for an arid country, per capita water use in the UAE is three times higher than the global average. While the nation’s ability to provide this abundance of water through large supply infrastructure and desalinization systems is an impressive technical achievement, it is also very expensive and unsustainable. To build awareness and a culture of water saving, this multi-generational EDM project engaged the succeeding generation to lead the way as agents for change in their households and communities.
In its first phase, it developed a series of creative and effective educational programs on sustainable water and energy consumption and the impacts of climate change that engaged 2,000 students and their teachers in 215 schools and 64 colleges. It further worked to instill good water conservation practices, responsible management of energy resources and climate informed action through public campaigns and diverse activities reaching nearly 10,000 people with civil society, decision makers, as well as the public and private sectors, including 200 companies.
The second phase of the project built upon this momentum through a series of student (targeting young persons aged 10-22) and teacher workshops; public speaking and drawing competitions; and public events that attracted the participation of more than 100 schools and 125 organizations. As a result, hundreds of students vowed to be vocal advocates in their communities for water conservation and environmental protection, activating a commitment that will last a lifetime.
- Delivered educational workshops and outreach activities on environmental sustainability for 2,000 students and their teachers in 215 schools and 64 colleges
- Initiated student competitions on environmental public speaking and drawing
- Engaged more than 200 companies through participation in exhibitions and in-house events to promote water and environmental sustainability
- Advocated water conservation to nearly 10,000 people through community lectures, public events and social media
- Educated children to be agents for change for water conservation in their homes
- Provided tailored workshops to nearly 600 students and 100 teachers on water stewardship and climate change
- Arranged drawing and public speaking competitions with more than 900 students
- Engaged 125 public and business organizations to improve water management
Title: Adaptation to climate change through water conservation
Implementing agency: Emirates Environment Group
Budget Phase 1: 102,000 USD (EDM: 60,000 / Co-financing: 42,000)
Budget Phase 2: 103,000 USD (EDM: 60,000 / Co-financing: 43,000)
Implementation period: 2011-2014
Partner and contributor
- Emirates Environment Group
- UNDP UAE | <urn:uuid:625a1165-a7fa-41fd-8328-e6eace7e8ad8> | CC-MAIN-2022-40 | https://siwi.org/big_project_page/programmes/every-drop-matters/united-arab-emirates/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335355.2/warc/CC-MAIN-20220929131813-20220929161813-00225.warc.gz | en | 0.946312 | 603 | 2.65625 | 3 |
How To Fight A Duel
Duelling with swords or pistols is no longer practical. Instead, if you have an unresolved feud with a friend or acquaintance, watch VideoJug's How To Fight A Duel for some modern alternatives.
Step 1: The history of duelling
A duel is a fight, between two gentlemen, which settles an argument. Traditionally, duels were often fought to the death, and in Regency England was such a popular pursuit that the London police could not cope with the numbers of aristocrats slain fighting duels in the Royal Parks.
Duelling with swords or pistols is illegal in the UK, and despite popular misconceptions, has always been illegal. A death resulting from a duel is treated as murder, and, according to legend, the last gentlemen to fight a duel in England in 1852, both died. Mr. Cornet was shot and killed by Mr. Bartholmy, who was hanged for his murder.
So duelling with swords or pistols nowadays is neither practical nor efficacious. Instead, there are various modern activities that can be used to settle disputes.
Step 2: Demanding satisfaction
The first way is to simply say "Sir, I demand satisfaction!", to which the acceptance is: "then you shall have it sir!" Remember that the culture of duelling developed so that gentlemen could remain polite at all times, and that when demanding satisfaction there is no reason to do so angrily or aggressively.
A second way to demand satisfaction is to lightly slap the face of your rival with a silken glove, but take care not to make contact with your own hand, as this is unpardonable. You should carry a silken glove around for this purpose at all times.
Step 3: Modern techniques for duelling
As we have noted, pistols and swords are no longer acceptable weapons, but the modern gentleman can adapt modern pursuits for the purpose.
Step 4: Thumb war
This simple game is an excellent modern alternative to traditional duelling, as there is no bloodshed. Both duellists curl the four fingers of their right hands, and then grip each other's hand. The duellists thumbs stand proud. The duellists look each other in the eye and recite "1 2 3 4, I declare thumb war!" They then attempt to capture the other's thumb between their thumb and fist. The first to hold the other's thumb for a count of three, is pronounced the winner of the duel, and honour is satisfied.
Step 5: Talent competition
Each duellist must pick a talent of their choice and perform it to the best of their ability.
The winner of this talent duel is decided by phone vote.
Step 6: Other techniques
There are many other techniques for fighting a modern duel. You might challenge your rival to a competitive computer game, a game of 'slapsies', or a board game that challenges their vocabulary and intellect, that will decide the matter in question.
Step 7: A note on style
It is essential that while fighting a duel, you pepper your language with well-mannered expletives such as "Damme!" "Have at you!" and "On guard, good sir!" This will add to the experience for duellists and spectators.
Armed with these alternatives to the sword or pistol, we at Videojug are confident you will be able to settle all disputes that arise to your satisfaction and the satisfaction of your opponent. | <urn:uuid:86e5b6fd-e794-41a6-afa0-6716aab42f5d> | CC-MAIN-2014-42 | http://www.videojug.com/film/how-to-fight-a-duel-3 | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119646269.50/warc/CC-MAIN-20141024030046-00016-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.945697 | 704 | 2.625 | 3 |
Think of all the animated cartoon characters running around out there. Mickey Mouse. Bugs Bunny. Fred Flintstone. Buzz Lightyear. SpongeBob. Scooby-Doo. Dora the Explorer. There are thousands, perhaps millions, of characters that have been brought into this world. Do you know who was the first - the very first animated cartoon character ever created? A dinosaur named "Gertie" holds that distinction, and she was created in 1914 by Spring Lake native Winsor McCay.
Winsor McCay was born in the 1860's and grew up in Spring Lake. His artistic talent was evident at an early age. Spring Lake historians know that the village was plagued by a number of fires in those days. One of these destroyed the McCay home. In the shelter of a neighbor's house, young Winsor drew his very first noted picture. It was a scene recounting the tragedy, etched in the frost of a window pane. Later the steamer Alpena sank in Lake Michigan, and Winsor drew a picture as he imagined the scene on the school chalkboard. It was so impressive that a photographer heard about it, took photographs, and sold them. The foundations of the school (Union School) can still be seen in the park to the west of Spring Lake District Library.
McCay knew national fame in his lifetime, first as a newspaper cartoonist. He authored several comic strips, the most famous of which was "Little Nemo in Slumberland." It is a highly inventive fantasy that takes place within the dreams of a little boy named Nemo. The artwork continues to be hailed today for its wild imagination, intricate detail, and archetectural brilliance. It was the first comic strip to enter the Louvre. Children's author Maurice Sendak says, "Little Nemo is nearly pure gold."
Later McCay became a pioneer of animated film. The scant handful of experiments in animation previously attempted were extremely crude and had been conceived as mere "tricks" or "gimmicks." McCay's "Gertie the Dinosaur" was the first animated cartoon character with a distinct and engaging personality. The film was an amazing five minutes long, the typical length of a one-reel film in those days. It was a huge endeavor with thousands of painstakingly full, detailed drawings and sophisticated, fluid animation.
Today both Winsor McCay and his creations are known around the world. In art, cartooning, and animation circles he is universally known, beloved, and praised. Each year at the Annie Awards, the "Oscars" of the animation world, the Winsor McCay Award is given for lifetime achievement. It is the highest honor given to an individual in the animation industry.
Although in the art world McCay is internationally recognized, in his own hometown of Spring Lake he is virtually unknown. No monument or memorial commemorates his life here.
Recently the Spring Lake District Library has expanded their collection of wonderful books and videos highlighting McCay's life and work, and has hosted programs spotlighting illustration and animation. Additionally, representatives of the community have been meeting to work on ways to recognize McCay and his work in Spring Lake.
So yes, of all the places of the world, Spring Lake could be called "The Birthplace of Character Animation," for it is the hometown of Winsor McCay, pioneer of animated film. | <urn:uuid:e9a2cb3d-c33f-4c6b-a675-eb8982b0a67b> | CC-MAIN-2018-34 | http://springlakemccay.blogspot.com/2007/10/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221219469.90/warc/CC-MAIN-20180822030004-20180822050004-00264.warc.gz | en | 0.981674 | 692 | 3.203125 | 3 |
Statements of Discipline of Nonviolent Movements, unsigned,
(Apparently used in nonviolence training.)
Why Didn't They Hit
Back? Jhan & June Robbins, Redbook, 1963.
CORE pamphlet describing one of the rare instances of nonviolence converting a racist attacker into a supporter.
Nonviolence: An Interpretation, Julian Bond. Freedomways, 1963.
CORE Rules for Action (1963-64)
Proposal For Action in Montgomery,
Diane Nash, September, 1963.
(See The Alabama Project for background.)
Excerpts from SCLC: Handbook for Freedom Army Recruits, Alabama, spring 1964:
Code of Discipline
Hints for a Profitable Stay in Jail
Rules for Prison
The New Jacobins and Full
Emancipation, James Farmer, CORE. 1964.
(On nonviolence & strategy.)
Nonviolence — Why?, Martin Oppenheimer.
(1964) (Training scenarios) [PDF]
The Limits of Nonviolence, Howard Zinn. Freedomways, 1964.
Peacemaker: Orientation Program in Nonviolence, Unsigned, Catholic Worker. September 7 1965
The New Nonviolence, David Dellinger. Undated (probably 1966 or 1967).
Neither Victims Nor Executioners ~ Nonviolent Resistance in the Civil Rights Movement, by Bob Wechsler. 2009
Possible Role Playing Situations. Nonviolence Training (possibly from 1964 Freedom Summer)
Articles by Bruce Hartford, CORE & SCLC.
Two Kinds of Nonviolent Resistance
100 Years of Nonviolent Struggle
Nonviolent Resistance & Political Power
Nonviolent Resistance, Reform, & Revolution
Working the 5-95 Split
Onion Theory of Nonviolent Protest
Audacity & Humor — Tactics of Nonviolence
Rubber Band Theory of History, Water Strategy of Social Change
The Tao of Social Struggle
Notes from a Nonviolent Training Session (1963)
Questions & Comments on "Notes from a Nonviolent Training Session" | <urn:uuid:8adb86ab-8878-43a3-95f6-8df23d9072b6> | CC-MAIN-2018-39 | https://www.crmvet.org/info/nv.htm | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159165.63/warc/CC-MAIN-20180923075529-20180923095929-00017.warc.gz | en | 0.705374 | 417 | 2.546875 | 3 |
To begin at the beginning, an explanation of Sarah Stanley Grimke’s spiritual roots must start with Free Baptists. Moses Clement Stanley, a New Hampshire native born in January 1826, was in the first year of his first pastorate when Sarah was born in Scriba, Oswego County, New York in April 1850. In 1851 Moses became pastor of a Free Baptist church in Fond du Lac, Wisconsin; in 1855 he went back east to another Free Baptist church in Farmington, Maine, a few miles from Wilton where his wife had been born Sarah Pease in 1827. In 1859 Moses was in Two Rivers, Wisconsin as pastor of a Congregational church, and from 1860 onwards he served Episcopal churches in Michigan and Indiana. The trajectory from Free Baptist to Episcopalian via Congregationalist raises many questions about the Stanley family as a spiritual environment for young Sarah. Active in three denominations, Moses served in five states and demonstrated even more mobility geographically than spiritually. Despite the hard feelings Moses Stanley expressed towards Sarah’s marriage to Archibald Grimke and her Unitarian associations in Boston, her own geographical and spiritual mobility seems quite continuous with that of her father. She moved from Transcendentalism to New Thought to Hermetic astrology, from Massachusetts to Michigan to California, with the same freedom that Moses had demonstrated in his life. Fluidity seems one of the main themes in exploring both the Stanley and Weld/Grimke families. One of the more inspiring characters in my research has been Moses Stanley due to his ultimate embrace of his African-American son-in-law and granddaughter despite his initial opposition to Sarah’s marriage. The struggle between conscience and tradition is painfully evident in his letters to her. Ultimately the better angels predominated, and the Stanleys loved their biracial granddaughter dearly despite having dreaded the *idea* of race mixing.
Some biases from my early environment made me think of “free” and “Baptist” as opposites, but in the nineteenth century their role in American culture was quite different. Brought up a Methodist in the South in the era of Civil Rights and Vietnam, I saw the Baptists as “more conservative” at every level—theologically, politically, culturally. That bias was upended in recent years by the discovery that in North Carolina Civil War history, my father’s Baptist ancestors had been largely Unionist while my mother’s Methodist forebears were Confederates. Nineteenth century Baptists in the South were not quite the traditionalists that they became in the twentieth. Having heard of Free Will Baptists all my life but seen Free Baptists only in history books, I found that they are names for the same movement which began in North Carolina in 1727. In the South the term “Free Will Baptists” has been near universal terminology and there are now about 300,000 Free Will Baptists headquartered near Nashville, TN. But in New Hampshire, Benjamin Randall began a Free Baptist movement in 1780, most of whose congregations were ultimately absorbed into the Northern Baptists in 1911. It had been strongly abolitionist in orientation. This is the denomination in which Sarah Stanley spent her early childhood. “Free will” refers to the belief in freedom as opposed to determinism, the Calvinist notion that God chooses who shall be saved and damned with no human power to affect the outcome. The Free Baptist General Conference minutes for 1889 are available on Google books. This 1911 Encyclopedia Britannica article on Free Baptists gives a summary of the denomination as the northern members were being absorbed into the mainstream northern Baptists. | <urn:uuid:15863669-d847-4a1f-a9ec-1244e0bc2b66> | CC-MAIN-2023-23 | https://adepts.light.org/page/264/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646350.59/warc/CC-MAIN-20230610200654-20230610230654-00747.warc.gz | en | 0.978917 | 749 | 2.5625 | 3 |
What does 100 years of women’s suffrage mean to you? In the exhibition Take to the streets, about women’s suffrage and activism in Amsterdam, the struggle of activists from then and now comes to life.
Events and special stories of the women and men who fought for women’s suffrage. Wanting a better future. Who were they? Where did their determination come from?
This exhibition is free.
It shows you archive material, photos, newspaper articles and propaganda resources from Atria’s collection into the history of 100 years ago. A Virtual Reality experience brings you back to the demonstration for women’s suffrage in Amsterdam in 1916.
In addition to this exhibition there is a Women’s suffrage walk through Amsterdam.
You will walk part of the route of the “Great Demonstration” of 1916 and pass buildings which played a key role in the struggle and the lives of those who fought it, such as the birthplace of Wilhelmina Drucker and the offices of the Association for Women’s Suffrage (Vereeniging voor Vrouwenkiesrecht, VvVK). Compare the historical photos with the modern cityscape and identify the places where the struggle was waged.
It took Dutch women more than 25 years to win the vote; this walk will take you about 2.5 hours.
Suffrage Walk on Google Maps
Exhibition opening hours:
OBA Oosterdok, Amsterdam
Monday until friday: 08:00 – 22:00
Saturday, sunday: 10:00 – 22:00 | <urn:uuid:e1c3a0ec-b246-4087-9ed1-0f5992ff497d> | CC-MAIN-2020-45 | https://institute-genderequality.org/agenda/take-to-the-streets-exhibition/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107922411.94/warc/CC-MAIN-20201031181658-20201031211658-00254.warc.gz | en | 0.93117 | 335 | 3 | 3 |
The latest UNEP Emissions Gap Report (2021) and IPCC sixth assessment report (2022) show that it is possible to limit the global temperature rise to 2.2°C if the net-zero emissions pledges are fully implemented and, thus, they call for immediate action both from the production and consumption-side. The projections show that policy-makers, businesses and society need to take effective measures to mitigate greenhouse gas (GHG) emissions and support sustainable development for all (IPCC, 2022), specifically in fossil fuel use, waste generation and agriculture which are priority areas for action (UNEP, 2011). Although governments and businesses play an important role in supporting sustainable development to ensure the planet’s health and human well-being, we, as individuals, also need to adopt measures considering whether the impact of our actions are compatible with the planetary boundaries.
But what might incite individuals to take action, by themselves? Interviews conducted in the context of the EU1.5° Lifestyles project show that important personal norms inducing the adoption of low-carbon lifestyles at the individual level are self-awareness and responsibility. In other words, understanding the consequences of your lifestyle choices and the possible problems you might cause, is a crucial first step, and accepting responsibility for these problems by taking adequate measures to solve them, i.e. adjusting your consumption, is a key second step towards sustainable lifestyles. Considering the UNEP (2021) report, we, as consumers, can adopt some measures in priority areas such as energy consumption – the electricity consumption in our homes or the way we move in our daily lives. Nutrition is also one of the greatest contributors to GHG emission and hence generates significant climate change issues, e.g. livestock farming is responsible for the 14.5 % of the anthropogenic GHG emission (7.1 Gigatonnes of CO2-equiv per year; FAO, 2013), including methane (CH4).2
Personal motivations are also quite important to adopt low-carbon lifestyles. People, mostly, opt for sustainable lifestyles, e.g. switching to a vegan diet, due to their concerns about social justice, the value of the environment, animal rights, and respect for the rights of other human beings, including future generations . Furthermore, personal concepts of the human-nature relation is also quite an important influence on individuals’ willingness to take necessary actions to protect our planet Earth. While watching documentaries on the climate emergency, for instance, could help raise awareness on the issue, being in direct contact with nature may matter more and allow for a more complete understanding of the consequences of our choices.
Opting for low carbon lifestyle options, such as switching to a vegan diet or to the use of public transport for commuting, may also be a challenging task for individuals, despite such personal motivations. If social norms favor a high carbon lifestyle, opting for a low carbon one may be viewed as a challenge or criticism by others, including friends and family. Similarly, low carbon lifestyle options are sometimes not easily accessible. For example, vegans – in Spain – often face challenges when they decide to have lunch or dinner outside, due to a lack of vegan options on the menu or a lack of transparency with respect to product origins and characteristics.
However, there are also facilitating factors that can support an individual’s transition to a more sustainable lifestyle. For instance, friends who opt for a similar sustainable lifestyle can be supportive since they are on the same page and face the same challenges. A certain type of personality, specifically being independent and standing on your own feet in financial terms, can also be important enablers allowing individuals to face and overcome these challenges.
Most fundamentally, while individuals may have to make certain sacrifices and experience inconveniences, they are likely to feel happier and more comfortable if their lifestyles resonate with their personal beliefs and thoughts. Thus, individuals adopting a low carbon lifestyle report that they feel they are doing something really good with their life because they protect the planet, nature and the animals they love. This gives them greater peace of mind, since they do not have to make the psychological effort to convince themselves that there are no contradictions between their lifestyles and their personal views. Last but not least, following a plant-based diet in a more conscious way, consuming fresh and local food products, including fruits and vegetables, also tends to be associated with positive health effects.
Dr. Nadin Ozcelik, Universidade da Coruña
1 This piece is based on an interview conducted in the context of the EU1.5°Lifestyles project, and thus draws on the personal experiences of the interviewee.
2 Livestock farming (industrial) also has other environmental impacts, such as, the macro-farms seem to contaminate the groundwater, since the slurry could be discharged into groundwater through the soil.
- Gerber, P.J., Steinfeld, H., Henderson, B., Mottet, A., Opio, C., Dijkman, J., Falcucci, A. & Tempio, G. 2013. Tackling climate change through livestock – A global assessment of emissions and mitigation opportunities. Food and Agriculture Organization of the United Nations (FAO), Rome.
- IPCC, 2022: Climate Change 2022: Impacts, Adaptation and Vulnerability. Contribution of Working Group II to the Sixth Assessment Report of the Intergovernmental Panel on Climate Change [H.-O. Pörtner, D.C. Roberts, M. Tignor, E.S. Poloczanska, K. Mintenbeck, A. Alegría, M. Craig, S. Langsdorf, S. Löschke, V. Möller, A. Okem, B. Rama (eds.)]. Cambridge University Press. Cambridge University Press, Cambridge, UK and New York, NY, USA, 3056 pp., doi:10.1017/9781009325844
- Statista (2021). Emissions of methane (CH4) produced by cattle worldwide from 1990 to 2019. Available at: https://www-statista-com.accedys.udc.es/statistics/1261318/cattle-methane-emissions-worldwide/
- United Nations Environment Programme (2021). Emissions Gap Report 2021: The Heat Is On – A World of Climate Promises Not Yet Delivered. Nairobi | <urn:uuid:51403167-fddb-4809-9ab2-cb2b8560cc7d> | CC-MAIN-2022-40 | https://onepointfivelifestyles.eu/blog/sustainable-lifestyles-personal-motivations-external-challenges-and-facilitators | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337595.1/warc/CC-MAIN-20221005073953-20221005103953-00104.warc.gz | en | 0.906183 | 1,325 | 2.953125 | 3 |
Materials and Resources. Materials and Resources. This Portion of the SAS website includes sample materials, and units which align with state standards. Materials are created by education professionals (teachers like you) as part of a collaborative professional community.
and content area.
Voluntary Model Curriculum
This suggested curriculum includes
1. Progressions (Content Maps)
2. Unit plans
3. Individual Lesson Plans
4. Resources related to content
Learning Progressions chart a students expected level of achievement within a standard from grades k-8.
Progressions are available in the PSSA testing areas:
Reading, Writing, Math, and Science.
Additional Materials are available across Keystone content areas. | <urn:uuid:1970cfb8-8dcf-4cf1-8b03-723aee5bc337> | CC-MAIN-2017-26 | http://www.slideserve.com/garnet/materials-and-resources | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323801.5/warc/CC-MAIN-20170628204133-20170628224133-00138.warc.gz | en | 0.890329 | 144 | 3.046875 | 3 |
The catheterization is a procedure of draining the bladder through a tube (catheter) inserted in the patient’s bladder. The clean intermittent catheterization is the gold standard for draining the bladder of patients with neurogenic bladder dysfunctions.
It is normal that we are concerned with the future of our kids and the way the spinal cord injury or spina bifida will influence their development throughout their lives – from puberty to possible parenthood.
In various stages of life, as well as when we suffer from medical problems like the ones that are our primary focus, the dynamics of our intimate lives changes. We are well aware of a strong influence our intimate lives have on our psycho-physical well-being…
A spinal cord injury is an injury of any part of the spinal cord. When it happens, the brain cannot communicate with any part of the body located below the level of the lesion. The higher the injury on the spine, the bigger the number of parts of the body that are dysfunctional. | <urn:uuid:71ba5d65-3fdf-4e21-b7db-2b315e517274> | CC-MAIN-2019-26 | http://lentismed.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999210.22/warc/CC-MAIN-20190620105329-20190620131329-00154.warc.gz | en | 0.941757 | 207 | 2.734375 | 3 |