text
stringlengths
181
584k
id
stringlengths
47
47
dump
stringclasses
10 values
url
stringlengths
14
2.03k
file_path
stringlengths
125
142
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
45
138k
score
float64
2.52
5.25
int_score
int64
3
5
Identifying Fungi (Bushy Park) - Location: London - Tutor: Mark Spencer - Date: Saturday 06 October 2018 - Times: 10:00 - 16:00 - Level: Open for Everyone - NON-RESIDENT: £30 This course is fully booked on this date but you can join the waiting list (by scrollling to the bottom of the page) in case space becomes available or it is run on another date. Did you know that there are over 1,500 species of fungi in London? This beginners course will explore the environment of Bushy Park, showing how and where to find different species of fungi and examining their amazing life-histories. The introductory talk, followed by an exploration of the park, will help you start to learn the basic identification techniques. This course will not teach you how to forage fungi for food, although where relevant, edibility and toxicity will be discussed. Fungi grow in almost every imaginable niche, from tropical jungles to polar ice caps and our own temperate woods and fields, they are even found in the sea. Many species play an important role supporting the health of plants, others are significant tree and plant killers or essential ‘mopper-uppers’ of decaying material in the environment. Without fungi our environment would come to a halt pretty quickly! Field identification of fungi is often made easier by the use of chemical tests which will be demonstrated by the tutor. By the end of this course, participants will have: - examined specimens of fungi from different groups and habitats - practiced identification of fungi using standard field guides and identification handouts. Course fee includes a copy of the FSC fold out chart: Fungi Identification Guide. About the Tutor: Dr Mark Spencer did his PhD on the evolution of oomycetes and has a long-standing interest in field mycology. He is an experienced botanist and is the vascular plant recorder for the LNHS and BSBI Middlesex vice-county recorder. He has research and personal interest in 17th & 18th Century botanical science, urban botany, non-natives and the impacts of environmental change. - 0930 Registration - 1000 Welcome, Health and Safety & Introduction - 1030 Walk through Bushy Park: Field Identification, collection of specimens - 1230 Lunch - 1330 Identification of fungi collected in the morning session - 1530 Summary - a chance to ask questions - 1550 Taking your interest further and Course Reviews - 1600 Course finishes Disclaimer All timings are approximate. This is an outline programme and may be subject to change according to the weather, requirements of the group or access restrictions to field sites on the day of the course. What to bring: - Lunch and plenty to drink - Suitable clothing & footwear, waterproofs or sun cream as appropriate! - Notebook and pencil - Small bag to carry personal items If you have them - Your favourite fungi field guide - x10 hand lens Health and Safety: - There will be a member of staff with first aid training and access to a first aid kit on site. - If you have special medical requirements please let us know as soon as possible so we can plan the course. - Please be aware that this is a Deer Park, and there can be ticks. Please consider wearing long sleeved tops and trousers, even if the weather is nice, and bring insect repellent. Meeting point / Location: The Stockyard, Bushy Park. https://www.royalparks.org.uk/parks/bushy-park/visitor-information/opening-times-and-getting-here FSC in Bushy Park: FSC have been working in partnership with The Royal Parks to deliver courses since 2011. In Bushy Park, our education Centre has two classrooms, toilet facilities, a small kitchen and office space. Alongside this is an area of the Park for education use, not open to members of the public. With two large meadows and grassland areas, woodland areas and three ponds, this is an exciting and inspiring space to discover more about the Park. Located near Hampton Court Palace, Bushy Park's mixture of woods, gardens, ponds and grassland makes it a fantastic place to enjoy wildlife with roaming herds of Red and Fallow Deer. The park is also home to the famous Chestnut Avenue, a formal Baroque water garden and the beautiful Diana Fountain. Select the booking option and quantity from the list below and add them to your basket. This course is currently fully booked. You can request to join the waiting list. View your basket
<urn:uuid:726a59ee-014d-4733-90b0-df4f2533b5a1>
CC-MAIN-2018-39
https://www.field-studies-council.org/individuals-and-families/courses/2018/ldn/identifying-fungi-73701.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156418.7/warc/CC-MAIN-20180920062055-20180920082055-00399.warc.gz
en
0.923786
976
2.671875
3
Nigeria has had a long hard struggle in keeping its democratic independence. The military has taken over numerous times, leaving democracy severely handicapped. Nigerians have clamored, conversed, fought and died over their democracy. But has Nigeria's democracy ever belonged to all Nigerians? In attempting to give background to this question and insight into the answer I have attempted to piece together the important events leading up to the 1959 election. I will touch on Britain's colonization of Nigeria. I will go into depth about the regionalism of the three major areas of Nigeria. I will also explore the three major ethnic groups who have charged forward to take political power for themselves in the guise of political parties in those same regions. The inherent weakness of the first republic can be attributed to the domination of ethnicity and regionalism amongst the three major political parties. Incompatibility between North and South Nigeria is a reflection of colonization by Britain. Nigeria has had to fight to be one country. But perhaps the fighting was not necessary. Perhaps if the British had left the two colonies as separate in the stead of bringing them together in the mistake of 1914,' there could have been two benign countries as opposed to one divided nation. The incompatibility begins with the North, who did not want to associate with the South on equal terms. The North viewed the South as a threat to its society. The North was a fundamental Islamic society whose leaders had ruled for over a hundred years. The conquering Fulani had eventually intermarried with the conquered Hausa and formed a stable society. Although in the South stable civilizations did exist, they were not based on the rigid Islamic culture of the Fulani. Trade relations existed between the North and the other regions but there was not substantial migration between the two. The peoples who existed in both territories existed in different climates that would have prevented large, voluntary migrations because the two climates had bred human adaptation along two different paths. The north was used to open grasslands, light annual rainfall and the keeping of cattle. The people in the Niger Delta were unsuited for the average northerners' way of life. The people in the south had adapted to hot and wet weather, vast forests, economic benefits of their environment, and the tsetse fly. The north would offer few comforts that the southern person was adapted to. The Fulani did not take the West either. This was because in the West a people called the Yoruba had long established themselves as a cultured civilization that formed themselves into large scale kingdoms. There are other groups that make up the region of the West such as the Ijaw, Edo, Itsekeri and Igbo; but the Yoruba dominated the area. Inter-kingdom fighting had existed among the Yoruba for many centuries. At the time of the Fulani invasion, the Yoruba had been in a state of decline due to the infighting. After the Fulani attacked Northern Yoruba-land, the Yoruba began to unify against the invaders. When the British arrived, Yoruba and Fulani were still encamped against each other. In the East lived many peoples but the most dominant was the Igbo. The Igbo had had a long tradition of democracy. Igbo people democratically decide on village actions, diplomacy, and government. Each Igbo village was loosely allied with other villages but each village autonomously ruled itself. The Fulani could not take the East due to the indigenous peoples, the deep forests of the region and the testes fly who all proved to be too difficult of an obstacle for the Fulani to conquer. Native Authority and the Three Regions In 1900 Britain took control of the previously company-owned land in Western Sudan. The land was the home of over 250 different peoples. No one people ruled them all. There was no division because there had never been a unity.... Please join StudyMode to read the full document
<urn:uuid:ac213679-6a0e-4f2a-b98b-47aeebcbf5d4>
CC-MAIN-2018-39
https://www.studymode.com/essays/Political-Situation-Leading-Up-To-Nigeria's-67432.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156418.7/warc/CC-MAIN-20180920062055-20180920082055-00399.warc.gz
en
0.984171
792
3.015625
3
Hepatitis dating derek dereks school of dating It is assumed that we are dealing with a closed system—no loss of either parent or daughter elements has occurred since the study material formed.No scientist can guarantee that any sample can be considered a closed system unless it was isolated from its environment when it was formed.They will argue that the clock was not reset if the age is too old, or that isotopes were selectively removed if the age turns out to be too young.In the study on the Hawaii lava flow cited above, it was argued that entrapment of excessive amounts of argon gas had made the samples appear older than they were. If even a small percentage of the limestone deposits were still in the form of living marine organisms at the time of the Flood, then the small amount of carbon-14 would have mixed with a much larger carbon-12 reservoir, thus resulting in a drastically reduced ratio.For more on this subject, see the video Bones in Stones i. Ogden III, "Annals of the New York Academy of Science," 288 (1977): 167-173. According to the American Liver Foundation, fatty liver occurs when 10 percent or more of the organ's weight is fat.Over time, the liver may become scarred and it may harden. When this occurs, the condition has progressed into cirrhosis, a very serious health problem that can lead to liver failure. Help us reduce the maintenance cost of our online services.
<urn:uuid:63a2768e-899f-4c55-bc04-956cf2c3c464>
CC-MAIN-2018-39
http://cator.skachatbesplatnyeprogrammy.ru/hepatitis-dating-367.htm
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157028.10/warc/CC-MAIN-20180921092215-20180921112615-00559.warc.gz
en
0.972135
301
2.515625
3
in'cu-nab'u-la (in'ku-nab'u-la), n. pl.; sing. -LUM (-lum). [L., pl. cradle, birthplace, origin. See In- in; CUNABULA.] 1. Cradle period or state; beginnings; infancy. 2. Bibliog. Works of art, or of human industry, of an early epoch; specifically books printed before 1501 A.D. Also in the singular form, in'cu-nab'u-lum (-lum); -- called also cradle book, fifteener. In 1639, Bernard von Mallinckordt of Munster Cathedral first associated the term "Incunabula" with books. The study of books printed during the first fifty years of printing illuminates the birth of the craft and the transition from the manuscript tradition to the print tradition. Printing spread rapidly from Mainz, Germany throughout Europe during this time period. Printers established shops in centers of commerce where the demand for books was high and supplies were accessible. Italy quickly became a center for printing with prominent shops operating in Rome and Venice in the early 1470s. By 1500, the proliferation of printers had nearly saturated smaller commercial centers throughout the continent and printing became an established profession. Among the features to note during the period of incunabula are the development of roman and gothic typefaces, and the rise of title pages and colophons in books. Gothic typefaces took hold in Northern Europe and remained popular in Germany into the nineteenth century. Southern Europe followed the humanist tradition more closely and preferred the more open roman styles. These roman typefaces also represented an easier transition from the manuscript era as they more closely resembled manuscript writing. The business-minded Venetian printers also viewed the compact roman types as more economical, allowing them to print more text per page. Even though the printing press provided for the reproduction of texts more quickly and easily than by hand, a large amount of time was still taken to illuminate and sometimes hand illustrate books of this period. Another popular method of illustrating texts was the use of the woodblock print. Printers at this time also began to work with engraved metal plates. The transition to print was not an easy one for all readers to make. Many aristocrats of the late fiftenth century hired scribes to hand-copy printed books to manuscript form, so that they might be kept in their original format. As the 15th century came to a close, Venice had established itself not only as a center for international commerce and trade, but also as the capital of the printing world. Hundreds of presses were operating in the 1480s and 1490s producing a wide variety of materials. The majority of the incunabula in this exhibit come from Venice, and represent a wide cross section of works printed here.
<urn:uuid:9e94828b-a0f9-4e19-9ede-5a22de2729fd>
CC-MAIN-2018-39
http://liblamp.uwm.edu/omeka/SPC2/exhibits/show/incunabula/intro
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157028.10/warc/CC-MAIN-20180921092215-20180921112615-00559.warc.gz
en
0.955755
603
3.859375
4
(See attached file for full problem description) 3. Sulfuric acid would dehydrate which of these alcohols fastest (identical reaction conditions for all)? 4. Which cation is not aromatic? 5. Which methods below will furnish 1-hexanol?© BrainMass Inc. brainmass.com September 21, 2018, 6:45 am ad1c9bdddf - https://brainmass.com/chemistry/acid-and-base-organic-chemistry/organic-chemistry-aromatic-structures-68954 It provides detailed explanations of various organic chemical questions, such as dehydration of alcohols by sulfuric acid, aromatic cation, and reduction of tripe bound to double bond.
<urn:uuid:88a98522-6b15-4712-bead-6490aa24a2b4>
CC-MAIN-2018-39
https://brainmass.com/chemistry/acid-and-base-organic-chemistry/organic-chemistry-aromatic-structures-68954
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157028.10/warc/CC-MAIN-20180921092215-20180921112615-00559.warc.gz
en
0.863265
153
2.828125
3
Information for optometrists Retinoblastoma (Rb) is the most common malignant tumour of the eye in children and accounts for 3% of all childhood cancers. It can occur either unilaterally or bilaterally and generally develops before the first five years of life. Tumours develop in the retinal cells which are developing rapidly in early life. The process of cell development continues throughout infancy and the retina is fully developed at approximately five years of age. It is a life threatening disease but 98% of children survive retinoblastoma in the UK. Over the past four decades, the management of this disease has evolved tremendously, changing from a deadly childhood cancer to a largely curable disease. A swift referral pathway for a suspected case is vital to reduce loss of vision and the risk of mortality. Research by the Childhood Eye Cancer Trust has found that optometrists are more than twice as likely to spot the signs of retinoblastoma in a child and make an urgent referral compared to GPs. This shows that optometrists can play a crucial role in ensuring a swift referral pathway for suspected cases. For more information please read our Would you recognise it leaflet. - Occurs in about 1:20,000 live births. - Between 50-60 cases are diagnosed each year in the UK. - Can be unilateral or bilateral. - No gender or race predisposition. - Can be heritable so adults who had Rb and wish to have children should be offered genetic counselling and testing. - Babies who may have inherited retinoblastoma must be screened from birth. Early diagnosis is vital in order to save life and reduce the lifelong impact of the disease on the child. If you are unable to confidently rule out retinoblastoma with a detailed eye examination, NICE guidelines state an urgent referral must be made for children with: - A white pupillary reflex (leukocoria). Pay attention to parents reporting an odd appearance in their child’s eye. - A new squint or change in visual acuity if cancer is suspected. - A family history of retinoblastoma and presenting with visual problems (screening is necessary from birth.) Depending on local referral protocol, urgent referrals should be made to the local ophthalmology department, A&E or the GP stating ‘suspected retinoblastoma’. Where referral is to the local ophthalmology department we recommend you call through to alert them to this case and to find out the speed with which their urgent referrals are seen (in some cases it can be longer than two weeks). - Carry out a detailed eye examination in every case of parental concern. - Leukocoria or strabismus are the most common signs. - Children with retinoblastoma usually show no other signs of illness to alert you to the condition. - Just because it’s rare, doesn’t mean it isn’t there. There are several signs which could indicate retinoblastoma but it is important to remember that a child with retinoblastoma may appear systemically well. The initial signs are confined to the eye. Leukocoria and strabismus are the most common presentations. If any child presents with one of the following, a detailed eye examination must be carried out (see also: Would you recognise it leaflet). - Leukocoria – (intermittent) white pupillary reflex noticed in dim lighting or a photo. - Strabismus – retinoblastoma must be ruled out for all cases of squint in babies and children using a red reflex test. - Change in the colour of the iris or part of the iris. - Inflammation, redness or increased pressure in or around the eye without an infection. - An absence of red reflex when doing a red reflex test. - Deterioration of vision in one or both eyes or poor vision from birth. - Parental history of retinoblastoma – the condition is heritable so children of an affected parent with retinoblastoma must be screened from birth. - Parental concern over vision or eye appearance. Supported by the Royal College of Ophthalmologists and the College of Optometrists, the Opticians’ Protocol aims to cut delays in diagnosis of childhood eye cancer. It states that all staff working in an optical practice should be aware of the main signs of Rb and offers clear information on what action to take if a parent is concerned by any of these main symptoms of Rb. Let us know if your practice is able to adopt this protocol and help with our battle against retinoblastoma. Please email firstname.lastname@example.org Watch our e-learning module on the Opticians’ Protocol. Your support staff also have a key role to play – Optical Assistants’ protocol Take five minutes to run through this simple protocol with your optical support staff such as receptionists, optical assistants and dispensing opticians in order to help expedite diagnosis of children with retinoblastoma. Adult patients after retinoblastoma For some people, the effects of retinoblastoma can be life-long. Read our information on supporting patients after retinoblastoma to find out more. We also have a health professionals resources section to help you with every stage of supporting a patient affected by Rb. For referrals and information contact the Rb teams in London and Birmingham at: - Royal London Hospital retinoblastoma service 020 3594 1419 - Birmingham Children’s Hospital retinoblastoma service 0121 333 9475 Watch presentations from leading retinoblastoma consultants on presentation, referral, treatment and long term effects.
<urn:uuid:8f5adfbd-2c29-4146-bcb1-ded7daa2e5bd>
CC-MAIN-2018-39
https://chect.org.uk/resources-2/optician/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157028.10/warc/CC-MAIN-20180921092215-20180921112615-00559.warc.gz
en
0.886962
1,221
3.359375
3
Carbon Dioxide Is Not Toxic, but The Moon Is July 12, 2018 Too much of something can be bad, but too little can also be bad. We examine the influence of carbon dioxide in earth’s atmosphere. Scientists seem conflicted about CO2 (carbon dioxide). It gets blamed for all kinds of bad things, but with few exceptions, every living thing either takes it in or gives it off. […] 350,000-Year-Old Skull Looks Shockingly Like Modern Human July 11, 2018 It's too old, but too modern: a skull unearthed in Ethiopia in 2017 has evolutionary paleontologists rewriting textbooks – again. Planet Origin Theories Contradict Physics June 28, 2018 Materialists sound much more confident than they are about their theories for the origin of planets. Most Exoplanets Are Probably Not Habitable June 26, 2018 More astrobiologists are coming to the "depressing" conclusion that we are alone in the universe, but it's only depressing if you're an evolutionist. Geology and Anomaly Are Practically Synonyms June 25, 2018 When formations don't fit established consensus paradigms, can secular geologists, indoctrinated into long ages and gradual change, think outside the box? Why Milankovitch Cycle Theory Is Like Astrology June 22, 2018 Sometimes a hunch proves to be unworkable. The Milankovitch Cycle theory has too many complications. It’s time to give it up. In the 1920s, Milutin Milankovitch, a Serbian astronomer, mathematician and popularizer of science, had a bright idea. Knowing that certain orbital cycles drift over time, he wondered if they could influence the earth’s climate. […] Climate Science Underestimates Natural Sources of Warming June 18, 2018 Scientists discover two more potent sources of greenhouse gases, both of which have nothing to do with human activity. Van Allen Belts Protect Earth from Solar Wind June 11, 2018 Geophysicists are still puzzling over how the earth's magnetic field and Van Allen radiation belts protect the surface from deadly particles in the solar wind. NASA Titillates Public Again with Fake Mars Life June 9, 2018 Which is worse: NASA making hyper-exaggerated claims about life on Mars over the decades, or so many media reporters falling for it each time? Surprises in the Chicxulub Tale of Dino Extinction June 5, 2018 Did an asteroid hit in the Yucatan explain the demise of the dinosaurs? New drilling in the crater has brought some surprises. What’s Pluto Been Dune? Making Young Sand Dunes June 4, 2018 Sand dunes were surprising enough on Titan, but et tu, Pluto? and young, recent dunes? Scientists couldn't believe their eyes. Radiocarbon Dating Is Not Globally Uniform May 31, 2018 Adjustment required for dates in the Levant could undermine published results by decades and impact debates about Biblical chronology. First Lizard Was 100% Lizard May 30, 2018 Evolutionists celebrate the earliest fossil lizard, but have to push back the origin of lizards by 75 million years. Origin of Life: A Field of Ignorance May 24, 2018 The origin of life field is characterized by speculation about dumb molecules that could not possibly have organized themselves into living beings. Earth Is a Safe Haven May 23, 2018 Recent news articles show how mechanisms protect earth's inhabitants from a hail of bullets overhead.
<urn:uuid:5f9fb080-ac4e-4fbb-9020-010f540f5100>
CC-MAIN-2018-39
https://crev.info/category/physical_science/geology/page/2/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157028.10/warc/CC-MAIN-20180921092215-20180921112615-00559.warc.gz
en
0.917826
739
2.609375
3
A WAY OF STRENGTHENING WISDOM Guided Autobiography helps individuals organize their life stories. Guided by our trained instructors, participants are led through themes and priming questions that evoke memories of events once known but filed away and seemingly forgotten. Writing and sharing life stories with others is an ideal way to find new meaning in life as the uncertainties of the past, and the contradictions, paradoxes and events of life are put into perspective. Participants feel stronger and have a growing appreciation of their lives. (The Birren Center). Continuing education can be an important way to cultivate wisdom in the later years, researchers say, for one thing because it combats isolation. But training in practical skills may be less useful for older people than courses in the humanities that help people make sense of their lives, says Professor Monika Ardelt, an associate sociology professor at the University of Florida in Gainesville. She and other researchers recommend classes in guided autobiography, or life review, as a way of strengthening wisdom. In guided autobiography, students write and share their life stories with the help of a trained instructor. (The New York Times, “The Science of Older and Wiser,” ) 12, 2014 A Brief Introduction to Guided Autobiography Guided Autobiography is a class to assist people of all ages in writing their memoirs. Typically, it consists of ten weekly sessions of two to three hours each. The method was developed by pioneering gerontologist Dr. James Birren and has been in use for over thirty years with participants ranging from college students to residents of senior facilities. What makes Guided Autobiography unique and powerful is that participants are writing essays on specific themes and then sharing them with others. Many people say they want to write their memoirs, but few actually follow through – usually because the project is too overwhelming, or because it’s just not fun to do alone. Guided Autobiography deals with both of those issues head-on: by writing on a specific theme, participants are able to break down their life story into small, easy-to-complete projects, and they bond with other class members and form friendships by sharing their stories. No previous creative writing experience is necessary, and no special equipment is needed. The only requirement is to show up, and the only “homework” is a two-page essay on the theme of the week. A computer is not a must – the stories can be handwritten or spoken into a recorder. A typical Guided Autobiography class consists of two parts. In the first hour, the instructor leads the class in a discussion of the week’s theme, plus a few fun and easy exercises to stimulate their creativity. In the second hour, the class breaks into small groups in which everyone reads aloud the two pages they have written on the theme for that session Benefits to the participants are many, and include: - Learning more about themselves and understanding the ‘why’ they may have done the things they have done. - Understanding and appreciating others and their life story. - Greater ease and confidence with writing as they learn to tap into inner feelings. - Developing close friendships with fellow students. - Leaving a legacy for their children and grandchildren, and to the world at large. Bruce Feiler wrote a fascinating article in the NY Times He said, “The single most important thing you can do for your family may be the simplest of all: develop a strong family narrative.” In other words, the children who know the most about their family history—the traditions, the set-backs and successes of parents and grandparents—had the best odds of bouncing back from hard times. Write and Publish Your Life Stories in 99 Days! Classes are now forming in Pacific Grove: January 21 to March 25, 2015, (10 weeks) at the Masonic Lodge, 130 Congress Avenue. Two class times are available: 12:30-2:30p.m. or 4-6 p.m. Inquire about other class times and procedure for any classes you may need to miss. What is Guided Autobiography? A weekly 2 hour class meeting over a ten week period, based on the Guided Autobiography method developed by pioneering gerontologist James Birren. This is a proven program to help you get your life story on paper by breaking it down into short, easy-to-write themes and by turning the process into a fun, social event by sharing your stories with others in the class. No previous writing experience necessary and no computer or special equipment needed. — Only $245 – that’s less than $25 per class!. Turn Your Class Experience into a Published Book! This option gives you the 10-week class program described above, PLUS: YOU WILL RECEIVE 5 PRINTED BOOKS BY APRIL 30, 2015. We will design, format, publish, and print 5 soft-cover books for you, prepared from your stories (up to 30,000 words) that you type into a Microsoft Word.doc, plus 2 photos per class theme that we will scan at each class.—$795. Intermediate Writing and Book Package: All of the above, PLUS: We will professionally edit your book and publish it on Amazon. —$1495. Premier Writing and Book Packages: All of the above, PLUS: We’ll turn your printed book into a Kindle e-book and launch a Custom Marketing Campaign that can include a press release, 100 postcards, 100 business cards, a web page for your book, a blog, and other Social Media. ,. —Individual pricing based on choice of services you desire. ALSO AVAILABLE: Custom design services, private coaching and instruction are available. You may add additional book pages and photos, print hardcover books, video and audio recordings and production with upload to “Keepers of Our Culture” YouTube Channel. Services priced individually for your custom package. INSTRUCTORS Patricia Hamilton and Joyce Krieg are certified by The Birren Center to teach the Guided Autobiography method developed by James E. Birren. Books will be published by Park Place Publications. For more information, please call Patricia Hamilton at 831-649-6640 or e-mail:
<urn:uuid:41526675-f468-4304-b68f-45425ed2157f>
CC-MAIN-2018-39
https://parkplacepublications.wordpress.com/guided-autobiography-classes-concierge-services/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157028.10/warc/CC-MAIN-20180921092215-20180921112615-00559.warc.gz
en
0.942872
1,307
2.9375
3
What Are IDEAs Made Of: Differentiation One of the most abused words in the industry, differentiation is also often strangely ignored. The word itself creates a problem, as there are three concepts involved: differentiation, differentiation and differentiation. Differentiation enables differentiation which leads to differentiation… The first ‘differentiation’ surrounds the product. It needs an examination of its differentiating attributes, and a typical question would be ‘what makes you different’? Not a surface skim (‘it’s once a day, that means convenience, right?’), but a deep treasure hunt looking for those attributes that truly make it different (either as a molecule, or potentially as a brand). It is the hunt for intrinsic or extrinsic difference. The second differentiation is to differentiate by clear communication. That is, if I choose to focus on studying and saying one thing well, and drive a perception of difference. This ‘differentiation’ is the demonstration of difference. The third is the measured differentiation (do audiences believe and echo the hoped-for differentiation). That is, do your audience now believe you are differentiated. This ‘differentiation’ is the perception of difference. Of course, none of these is self-evidently a good thing. It is incredibly easy to be differentiated (on items you’d rather not be differentiated by). Every product is a set of positive and negative attributes. If you are genuinely inventive, you might succeed in turning a negative into a positive (see KFC ‘Finger Lickin’ Good’ or Viagra for examples), but more often products become ‘differentiated’ by their safety profile, formulation problems or lack of a certain kind of efficacy. The hard thing is to find the perfect combination of the thing / things your audience want and that you are or do better than any other product. “Every product is a set of positive and negative attributes. If you are genuinely inventive, you might succeed in turning a negative into a positive…” Differentiation, as a process, should begin with an assessment of the kind of difference audiences want to see. Do they want what they currently have, but better (‘sameness with difference’), or something different? Unfortunately, much market research (often masquerading as ‘insight’) tends to produce the former – “we would like it to be like what we have, but 10% better on this dimension, while not doing anything worse.” This kind of ‘differentiation’ is quantitative differentiation – the product is ‘differentiated’ only by being slightly or somewhat better numerically than its opponent. More useful is ‘qualitative’ differentiation. Qualitative differentiation means finding something that the product ‘does’ that no other product does. This can look a lot like quantitative differentiation, but is a lot more powerful. For example, the difference between dropping LDL levels by 5% over the competition and getting patients to a tipping point that starts to reverse atherosclerosis might be no difference at all numerically, but one sounds a whole lot more valuable than the other. Unfortunately, a lot of pharma propositions fail to make this step towards a concrete qualitative proposition – what does a 25% increase in PFS mean to a physician or patient, or a 4 point increase in ADAS-Cog actually achieve for an Alzheimer’s Disease patient, for example. Let’s go back to the ‘first’ differentiation. We always use the metaphor of diving for treasure. It matters who you send to look at the ocean floor. An inexperienced diver might bring up every piece of glass, wondering if it is a diamond. A lazy diver might bring up the first doubloon, and ignore the chest that sat one metre under the surface. Hand on heart, in hundreds of brands, we have never seen two products that were identical, that had no intrinsic differentiation – even the ‘me-toos’. Diving for real treasure needs a constant evaluation of ‘is this different?’ and ‘is this potentially valuable,’ and for that process to carry on until the ocean floor is fully investigated. It needs imagination and ingenuity, and there is no alternative, unfortunately, to the dredging that is necessary to ensure the real treasure is found. It is also essential that the dredging includes the whole competitive set, not just the ‘same class’ competitors, and the whole market context. The world of ‘value’ provides so much opportunity that every direct and indirect competitor must be considered. It is too easy also to fall into the trap of self-deception – choosing a parameter that you really wish was more important to the market than it seems to be. “…presenting a lot of messages about a great product can be worse than delivering one great message about an average product.” Finding that treasure early and then choosing to focus on it is the ‘second’ kind of differentiation. Doing studies that differentiate may need a good deal of forethought, but companies that are now engaging in companion diagnostics, validated Patient Reported Outcomes or other endpoint evaluation, and more innovative trial design, find that the process of communicating difference is a whole lot easier after doing those things. Demonstrating difference does also need clear, focused communication, however. At least as many products fail on market because they ignore this simple truth that presenting a lot of messages about a great product can be worse than delivering one great message about an average product. The third kind of differentiation is what gets tracked into those market research decks. One thing that is too seldom borne in mind is that these are lag indicators of what has happened in the market – that any differentiation seen in the market now is the result of what has been happening for the past year, two years. The direction of travel is more important than any one snapshot. For such a critical piece of a commercial jigsaw (it is the corner piece that makes so much of the rest of the picture easier to find), differentiation has been remarkably poorly served. Like ‘positioning,’ it is a word that, in meaning so much, or having so many meanings, potentially fails to deliver its value to the uninformed. About the author: Mike Rea is a Principal with IDEA Pharma, who enjoys taking a look outside the industry to learn how it can think differently. For direct enquiries he can be contacted on email@example.com and for more information on IDEA Pharma please see http://www.ideapharma.com/what/default.htm. Does pharma look for real differentiation in new drugs?
<urn:uuid:bbb05817-e78b-448b-aa76-dd117eabe2e1>
CC-MAIN-2018-39
https://pharmaphorum.com/views-and-analysis/what_are_ideas_made_of_differentiation/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157028.10/warc/CC-MAIN-20180921092215-20180921112615-00559.warc.gz
en
0.954613
1,392
2.90625
3
Become a patron of Renovatio. Apr 28, 2017 And they ask you about the spirit—Say: The spirit is from the affair of my Lord. – Qur’an 17:85 Human nature has been a central theme of intellectual and mystical contemplation from ancient times and across civilizations. By virtue of distinctive traits like rationality, knowledge, speech, and moral agency, man was considered a world apart from the rest of nature, and the spirit of man was recognized as something unique and wondrous. In Islam, knowledge of one’s soul is the point of departure for its purification and for attaining divine love, given that an authentic life of piety and altruism emanates from a sanctified soul absorbed in the remembrance of God. With the advent of modernity, new philosophical commitments brought new terminology and novel theories. What most civilizations traditionally named spirit or soul is often called “mind” today due to the theological implications of the classical terms.1 The branch of modern philosophy that deals with what the medievals called soul is the philosophy of mind, a field of inquiry that relates to many critical issues in both academic and public discourse. For example, is transhumanism—the theory that through science and technology, humans can evolve beyond current physical limitations and elude aging or even death—a genuine possibility if there is such thing as a human soul? Is atheism, which attempts to explain all of reality through materialism, rendered incoherent if man has an immaterial intellect? Do human consciousness, thought, and rationality signify the existence of the soul? With the scientific method as its governing approach to knowledge, modernity has attempted to unpack man’s inner mystery through a variety of somewhat contrasting paradigms, such as neuroscience, Freudian psychoanalysis, behavioral genetics, and evolutionary psychology.2 So much of human culture, society, and even politics hinges on our awareness of ourselves as human beings and our relationship with the world we inhabit. How we understand the mind is central to that awareness. Historically, Muslim theologians generally espoused an integrative substance dualism of body and soul. As Syed Naquib al-Attas defines, “Man has a dual nature, he is both body and soul, he is at once physical being and spirit.”3 While Muslim scholastics deemed the essence of the soul to be a mysterious divine secret—what the mystic Ibn ʿAjībah (d. 1224/1809) termed “a luminous, lordly subtlety”4—it was evident that the soul is (a) distinct from the body, though deeply integrated with it, and (b) the locus of human consciousness. Yet as spiritual substance, the soul is inaccessible to empirical investigation: consciousness is located in a realm beyond the physical—not in mulk, the corporeal world, but in malakūt, the spiritual world. The question of its artificial replication is for most theists a nonstarter, since human manipulation is limited to the physical domain. The possibility of replicating consciousness (or generally, any feature of the mind) largely emerges from what is termed naturalism—the view that all things and events in nature can be explained physically, even if the hard sciences have yet to discover their explanations, because natural processes take place of their own accord. As an explanatory idea, naturalism is most often associated with materialism—or physicalism—an ontological position which holds that only “physical matter” really exists.5 In Death of the Soul: From Descartes to the Computer, William Barrett has traced the gradual exclusion of mind from intellectual deliberations on reality.6 The seventeenth century inaugurated a new science that viewed the world as a machine, based on a theory of matter that deems physical objects to be composites of particles in empty space. The mechanism of this Newtonian science was coupled with John Locke’s famous distinction between primary and secondary qualities. According to Locke, since physical objects are merely quantifiable aggregates of molecules, they have only “primary qualities” like extension and shape, while “secondary qualities” like color, taste, or sound are absent from the objects-in-themselves and exist only as sensations in people.7 What is “out there” is only the quantitative and measurable. Unsurprisingly, if quality is generally removed from one’s account of what actually exists, then the mind with all of its qualitative features is also susceptible to being reduced to the quantitative brain/body. The eighteenth century brought another watershed moment with the skepticism of David Hume, who reduced human experience to a succession of sense impressions, and moreover considered the “self” to be nothing more than a bundle of perceptions. Barrett laments, “The I, or ego, suffered here a blow from which the fragmentation of the Modern Age has never rescued it. We live in a world where the flow of sensations, copiously fed to us by all the devices of technology, can virtually turn the ordinary citizen into a heap of perceptions.”8 Barrett notes that Hume’s categorical mistake, though, was to search for the self in objective sense-data rather than to recognize his own subjectivity in that search. Yet subsequent thinkers were captivated by Hume’s ideas; and as technology and the hard sciences rapidly advanced, materialism would emerge as a reigning paradigm for modern science. Nevertheless, in the eyes of many philosophers of mind, materialism has now reached an insurmountable quandary in the question of consciousness. Physicalist theories that attempt to explain mental states include eliminative materialism, behaviorism, identity theory, and functionalism.9 In light of the continued success and explanatory power of modern physics, physiology, and neuroscience, eliminative materialism [EM] denies the existence of psychological states (sensations, thoughts, feelings, etc.): notions like “John is in pain” and “Fred enjoys vanilla ice cream” are eliminated and replaced by “John’s brain is in neural state X” and “Fred’s brain is in neural state Y.” For eliminativists like Paul Churchland, the commonsense view that mental states are real—what he terms “folk psychology”—is simply a theory, and one that is devoid of explanatory power. So he argues that it is a false theory: its history of failure to provide scientifically useful explanations leads to the conclusion that the mental states of folk psychology are merely illusions. However, opponents of this view argue that (a) our psychological states do not themselves comprise a theory but require a theory (or metaphysical worldview) to explain them; and (b) EM as a theory proves incoherent and self-refuting, insofar as its claims that it is true, and that folk psychology is false, reveal intentionality, itself a profoundly salient state of the mind.10 Truth claims are propositional attitudes that EM denies. Acceptance of EM presupposes folk psychology, since EM rejects notions like “acceptance.” Another materialist/physicalist theory of mind is philosophical behaviorism [PB], according to which psychological states are logically equivalent to “dispositions” of behavior: pain is not a subjective reality, but is only the tendency to wince or cry or say “Ouch!,” etc. To justify PB, proponents adduce as evidence the strong connection between mental states and behavior, which for them can readily be explained as a connection between behavioral dispositions and behavior. To be “in pain” is to be “disposed” to certain behaviors (crying, wincing, …); to be “happy” is to be “disposed” to certain other behaviors (smiling, laughing, …); and so forth. PB is also supported by the Vienna Circle’s theory of verificationism in the philosophy of language, a theory that was central to the Circle’s broader philosophy of logical positivism, a form of empiricism that denied the possibility of metaphysics. This early twentieth-century group of philosophers and scientists in Vienna, Austria, argued that the meaning of any statement is rooted in its method of verification, and verification was limited to sense-data: if a statement could not be verified empirically, it did not have rational (or “cognitive”) meaning. Thus, some PB proponents argued that if sensory observation is the only avenue of ascertaining the meaning of a proposition, then private mental states can be translated to observable behavior without losing meaning. Most philosophers, though, do not subscribe to verificationism, which has been almost unanimously discarded in the philosophy of language for several reasons, such as the theory’s incoherence—verificationism itself cannot be empirically verified.11Moreover, critics of PB point out that PB is demonstrably flawed, for it is conceivable that a person could have rich and changing mental states yet refrain from any behavior at all.12 Not all pain is expressed through crying or wincing, and not all happiness through smiling and laughing. And quite often, a person’s behavior is informed by innumerable mental states (beliefs, emotions, desires, motives, …) that are near impossible to reduce to algorithms of corresponding physical behavior. What functionalism excludes of consciousness, however, are essential features like qualia and intrinsic intentionality. Mental states involve what philosophers call qualia, or the way it feels to be in pain, to enjoy ice cream, or to see red. And certain qualia are features of all consciousness, human or animal. As Thomas Nagel has argued, a scientist who gains mastery of all there is to know about echolocation in bats, of complete bat neuroscience, and of all the functional connections of bat behavior, would still not know “what it’s like to be a bat.”20 There is a first-person feel to that reality that no third-person account can provide. Frank Jackson has made a similar qualia argument21with color: if a scientist who had never seen color were forced to investigate nature from within a black-and-white room, and learned everything about the physical basis of seeing color—“everything in completed physics, chemistry, and neurophysiology, and all there is to know about the causal and relational facts consequent upon all this, including of course functional roles”—she would undoubtedly gain new knowledge of the world were she to go out and see red for the first time. Specifically, as Jackson explains, “she will realize how impoverished her conception of the mental life of others has been all along.”22 Some identity theorists respond that, as IT asserts, the conceptual distinction between qualia and scientific knowledge of related brain processes itself is not evidence of their actual distinction. Yet proponents of knowledge arguments reply that the first-person subjective experience of qualia is still undeniable, and physicalist descriptions of objective neuronal activity leave that out. Knowledge arguments like these demonstrate that qualia are real, based on the categorical distinction between first-person subjective experience and third-person description. Functionalism is therefore false, and Strong AI incoherent. A computer programmed to mimic human response to stimuli clearly lacks qualia. Mental states also have intentionality, or a directedness towards something (that is, they are about something): we can think about the universe, or about history, or even about our consciousness, etc. Based on intentionality, John Searle has formulated a thought experiment called “The Chinese Room” that argues against functionalism and strong AI.23 If one were to imagine a person who does not understand Chinese, locked in a room with a rule book (effectively, a computer program) that lists correct answers to questions in Chinese; who receives those questions as input from someone outside the room; and who, based on the rule book, provides perfectly correct answers as output back to the person outside, it remains true that the man in the room still does not understand Chinese, even though the Turing Test was passed successfully from the vantage of the person outside the room. The man in the room is akin to a computer that is programmed to give correct answers to questions in Chinese: neither the man nor the computer understands Chinese. While there is extrinsic intentionality in the form of “function,” or giving correct output in response to input, the intrinsic intentionality of understanding Chinese is notably absent. And intrinsic intentionality is a quintessential, necessary property of thought and consciousness. Intentionality proves to be one of the remarkable features of consciousness that reveals its obstinacy to physicalist reduction or dismissal. Meaning is mysteriously grounded in the purely mental. As Edward Feser notes, anything physical that exhibits meaning, such as a word or a picture, does so only because of mental agents designating it as meaningful—its intentionality is derived and not intrinsic. In and of themselves, words, pictures, or computer pixels are merely marks on a surface. It is only mind that gives those marks meaning. And like ink marks on paper, brain processes are physical entities/processes inherently void of meaning. Yet the concepts and propositions that comprise thought are undeniably non-physical, abstract, and universal. Feser comments: Had there been no human beings, the proposition there are no human beings would have been true, even though there would then have been no “sentence in the head” for that proposition to be identical to. Had there been no physical world at all, the proposition there is no physical world would have been true, even though there would then have been no physical entity of any sort for that proposition to be identical to…. [W]hen the mind grasps a concept or proposition, there is clearly a sense in which that concept or proposition is in the mind; but if these things are in the mind and yet… cannot be in the brain, it would seem to follow that the mind cannot be identified with the brain, or for that matter with anything material.24 A final consideration for the uniqueness of “mind” and its distinctiveness from the physical domain is the unity and simplicity of consciousness. This is a principal rational argument for substance dualism put forth by the Muslim theologian Fakhr al-Dīn al-Rāzī (d. 606/1209) in his treatise on the soul,26 and different versions of it have been used by Descartes, Leibniz, Kant, and others since. Mental awareness is unified and indivisible, expressed by the singular “I” that represents the individual. The brain, however, is composite. It is a collection of physical parts organized in a certain way. And if a composite substance were the locus of consciousness, then each part of the aggregate would have a part of consciousness. Yet consciousness, as denoted by the pronoun “I,” is not divisible into parts. It is what philosophers call “simple.” William Hasker comments, “A person’s being aware of a complex fact cannot consist of parts of the person being aware of parts of the fact [emphasis his]. A conjunction of partial awarenesses does not add up to a total awareness.”27 Likewise, as David Barnett contends, “[F]or any pair of conscious beings, it is impossible for the pair itself to be conscious”; and this is true only because consciousness is simple, while any pair (or group of parts) is composite.28 The soul, however, is simple indeed. And it is the foundation and basis of the spiritual life of man. The implications of its denial are quite grave, since it is the soul that apprehends meaning, purpose, and virtue. The theologians and mystics of Islam held it to be a secret of the Divine, for only the soul is capable of knowledge—of oneself, of fellow man, of society, of the cosmos, and of its Creator. And only the soul is capable of love. Among its properties are to seek, yearn, and long for goodness, for truth, for beauty, for intimacy, and ultimately for perfection. The enterprise of scientific discovery itself presupposes this immaterial orientation to these immaterial, transcendental realities: the scientist is impelled by a passion to discover what is true, and deems that pursuit good. Metaphysics accommodates transcendentals, as it accommodates consciousness. At bottom, it would seem that consciousness remains intractable to ontological reduction or elimination. While the human body can be described to a great extent in the language of physics and biochemistry, the human spirit cannot. It must be something else.
<urn:uuid:beee05e0-d143-445f-96f0-0b4343af1c9e>
CC-MAIN-2018-39
https://renovatio.zaytuna.edu/article/can-materialism-explain-the-mind
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157028.10/warc/CC-MAIN-20180921092215-20180921112615-00559.warc.gz
en
0.951726
3,457
2.828125
3
In the past, when I’ve written about climate and mass extinctions, I generally single out two of them — the one 65 million years ago that ended the dinosaur era, and the one about 250 million years ago that killed off almost everything then alive and made room for the dinosaurs to develop. The dinosaur-killing extinction is called the “Cretaceous–Paleogene (K–Pg) extinction event” since it occurred between the Cretaceous Period and the Paleogene Period. The earlier extinction, also called the “Great Dying,” is the “Permian–Triassic (P–Tr) extinction event” and occurred between those two geological periods. But starting from the first explosion of life on earth, some 540 million years ago, all geological periods are grouped into just three “eras” — the era of Old Life (Paleozoic Era), the era of Middle Life (Mesozoic Era, or the age of dinosaurs), and the era of New Life (Cenozoic Era, or the age of mammals and man). The Paleozoic Era lasted over 290 million years. The Mesozoic Era lasted 185 million years. We’re in the Cenozoic Era now, and it’s lasted 65 million years. Just three major divisions since life first exploded. And guess what divides these eras? The two mass extinctions I mentioned above. Here’s what that looks like in one handy chart: So yes, mass extinctions — certainly mass extinctions of this size — matter. As I argued here and here, we may not using our little climate problem just to exit the Holocene (our current 12,000-year geological division). We may be exiting the entire Cenozoic Era. Now that’s a world-historical event. The Great Dying Was Probably Caused by Atmospheric Methane So the first part of today’s piece to keep in mind is the major geological divisions. And make no mistake, the Great Dying was a great dying, the mother of all great dyings (my emphasis everywhere): It is the Earth’s most severe known extinction event, with up to 96% of all marine species and 70% of terrestrial vertebrate species becoming extinct. It is the only known mass extinction of insects. Some 57% of all families and83% of all genera became extinct. Because so much biodiversity was lost, the recovery of life on Earth took significantly longer than after any other extinction event, possibly up to 10 million years. [Other sources say 30 million years.] Now the second part of this discussion. People have been puzzled about the cause for a long time, and how it managed to be so … effective. Turns out that researchers at MIT may have found the answer — atmospheric methane. It’s the only explanation that fits the facts, and there’s much evidence to support it. Given the factual data that’s been assembled about the event, all of the other, previously-thought-plausible explanations have to be dismissed. Not one of the others could explain the combination of facts now known. Let’s look at this from two sources, MIT and a separate write-up of their research. The MIT publication is informative, but the other is more clear for the lay reader. First, from the MIT news office: Methane-producing microbes may be responsible for the largest mass extinction in Earth’s history. Evidence left at the crime scene is abundant and global: Fossil remains show that sometime around 252 million years ago, about 90 percent of all species on Earth were suddenly wiped out — by far the largest of this planet’s five known mass extinctions. But pinpointing the culprit has been difficult, and controversial. Now, a team of MIT researchers may have found enough evidence to convict the guilty parties — but you’ll need a microscope to see the killers. The perpetrators, this new work suggests, were not asteroids, volcanoes, or raging coal fires, all of which have been implicated previously. Rather, they were a form of microbes — specifically, methane-producing archaea called Methanosarcina — that suddenly bloomed explosively in the oceans, spewing prodigious amounts of methane into the atmosphere and dramatically changing the climate and the chemistry of the oceans. Volcanoes are not entirely off the hook, according to this new scenario; they have simply been demoted to accessories to the crime. The reason for the sudden, explosive growth of the microbes, new evidence shows, may have been their novel ability to use a rich source of organic carbon, aided by a sudden influx of a nutrient required for their growth: the element nickel, emitted by massive volcanism at just that time. The new solution to this mystery is published this week in the Proceedings of the National Academy of Science by MIT professor of geophysics Daniel Rothman, postdoc Gregory Fournier, and five other researchers at MIT and in China. Now William Costolo at the Guardian Liberty Voice: The ocean swarm of micro-organisms was the byproduct of volcanic eruptions which threw off the substance nickel. The nickel from the volcanoes provided the metabolic fuel necessary for the bloom to occur. Scientists previously suspected that the volcano eruptions themselves caused the horrific killing, but the MIT researchers determined that the volcanoes alone would not have created enough atmospheric carbon dioxide to cause the mass extinction. The carbon dioxide must have come from another source. Further research indicated to the scientists that the source of the carbon dioxide was derived from a biological source. The carbon dioxide levels would have receded faster if derived only from the volcanoes. The rich source of nickel available from the volcanos was just the right fuel for the tiny methane producing killing machines to consume the carbon in the ocean floors and proliferate in rapid fashion. The analysis of genome material provided the necessary clues to the researchers. The Methanosarcina acquired a genetic trait from another microscopic organism which allowed them to quickly produce the poison gas under the right conditions. The vast store of carbon in the oceans together with the volcanic nickel provided the perfect storm of material required for a gigantic methane plume. The tiny organisms followed their genetic programming to reproduce quickly and throw off a massive amount of poison gas. Except for his use of the term “poison gas” (living things weren’t “poisoned”), this is a clear explanation of the relationship between the massive volcanoes, the nickel, the microbes, and the methane. The killing happened in relatively short order, driven by the massive volcanoes. The mass kill off, known as the Permian extinction, had its roots in the volcanoes of the Siberian Traps. The lava flows were so large they would have covered a land area larger than the United States. The atmosphere remained poisoned for over 100,000 years. The earth did not regenerate diverse life for another 30,000,000 years. The length of time the atmosphere remained poisoned was a clue to the researchers that the volcanoes alone could not have caused the killing catastrophe. Why does methane have such a powerful effect? Read on. Methane Is Far More Powerful Than CO2 at Trapping Heat Why does methane’s greenhouse effect last so long? Partly because atmospheric methane degrades to CO2 by a fairly simple formula: CH4 + 2 O2 → CO2 + 2 H2O So while methane itself produces its own huge greenhouse gas effects (see below for the relative scale), it then disappears and leaves longer-lived CO2 in its place to do further greenhouse damage. CO2 doesn’t break down; it has to be extracted by some process, such as plant activity, dissolving into the ocean, and so on. Atmospheric methane in sufficient quantity is a real problem, greenhouse-wise. The combined effect of the methane bomb and the resulting CO2 is what the MIT researchers say accounts for both the scale of the Great Dying and the 30-million-year recovery period. To give a sense of relative effects of these two greenhouse gases: While more than half of the CO2 emitted is removed from the atmosphere within a century, some fraction (about 20%) of emitted CO2 remains in the atmosphere for many thousands of years. In contrast, methane is more powerful, but shorter lived in the atmosphere: Methane has an atmospheric lifetime of 12 ± 3 years and a GWP [global warming potential] of 72 over 20 years, 25 over 100 years and 7.6 over 500 years. The decrease in GWP at longer times is because methane is degraded to water and CO2 through chemical reactions in the atmosphere. In all cases, the GWP number is relative to CO2. That is, CO2 is artifically assigned a GWP of “1″ and the GWP of other greenhouse gases is either a multiple or a fraction of that. It gets worse. (1) That 20-year methane GWP number is likely low. This site says that the GWP of methane could be 10–40% low when indirect interactions are taken into account. I’ve seen estimates of methane’s 20-yeargreenhouse effect as high as 100 times that of CO2. And (2) that’s the 20-year effect. Methane lasts for 12 years on average. What do you think its effect is in the first 5–10 years, as a global warming accelerator? Kind of explains the Great Dying, yes? Boom, the methane bomb goes off, and everything changes. We’re Melting a Methane Bomb in the Arctic Which brings us to the fourth part of this discussion. So why do we care? Because we’re sitting on a “methane bomb” in the Arctic region — frozen, sequestered methane locked into the permafrost both on land and in the ocean, and climate change (global warming) is releasing it. NOAA (my emphasis): [Methane hydrates] have also been proposed as major agents of climate change. Methane is a powerful greenhouse gas, ten times more effective at trapping heat than carbon dioxide. But the volume of this gas now in the atmosphere pales next to that currently sequestered in hydrates, estimated at ten thousand billion tons (about 3,000 times the amount of methane as the atmosphere). Let that sink in. The methane in the permafrost is 3000 times the amount of methane already in the atmosphere. And don’t let that “ten times as effective at trapping heat” fool you. That’s the average over 100 years. Methane only lasts about 12 years before it’s gone. When it starts out, before it breaks down, it’s likely a hundred times more effective than CO2. Or as the NOAA site above puts it: A methane build-up will greatly enhance the intensified greenhouse effect that is driving global warming, and could cause the temperature to rise even higher, and to rise quickly. As we reported earlier, this gives a sense of the scale of the methane melt. Coming off the floor of the ocean, methane reverts to a gas and forms “plumes” — literally torch-shaped structures created by water pressure — that rise to the surface. These plumes have been observed and measured for a fair number of years, and their recent growth in size and number is astonishing: Vast methane ‘plumes’ seen in Arctic ocean as sea ice retreats. Dramatic and unprecedented plumes of methane – a greenhouse gas 20 times more potent than carbon dioxide [over a 100-year timespan] – have been seen bubbling to the surface of the Arctic Ocean by scientists undertaking an extensive survey of the region. The scale and volume of the methane release has astonished the head of the Russian research team who has been surveying the seabed of the East Siberian Arctic Shelf off northern Russia for nearly 20 years. … “Earlier we found torch-like structures like this but they were only tens of metres in diameter. This is the first time that we’ve found continuous, powerful and impressive seeping structures more than 1,000 metres in diameter. It’s amazing,” Dr Semiletov said. “I was most impressed by the sheer scale and the high density of the plumes. Over a relatively small area we found more than 100, but over a wider area there should be thousands of them,” he said. Let’s put that “1000 meters” into something Americans understand. These giant plumes are over half a mile wide. Not a half mile high — a half mile wide. Compared to their earlier observations, the plumes are now 100 times larger in just a few years. And yes, he did say there were likely “thousands of them.” The Path of Deterioration Will Contain Sudden Collapses as Well as Gradual Declines Which leads to just two final thoughts, and then I’ll close. First, just because the effects of climate change have been mostly gradual until now, doesn’t mean that gradual is all we’ll get. As I wrote recently: But there’s no reason to assume that there won’t be sudden collapses as well, sudden discontinuities, the way a steady dribble of small chunks of ice might fall from a Greenland glacier into the sea, then suddenly a piece the size of Ohio splits and floats away, lost, never to come back. A discontinuity, a break from the gradual. Discontinuities work in the social sphere as well, in the sphere of confidence and panic. As I’ll show you shortly, the first major (white) American city to end its life forever following a Haiyan-sized hurricane — Miami, for example — will cause a collapse in American confidence in the future that will never return. That loss of confidence and the panic that will result is a collapse as well, a discontinuity, fear the size of Ohio breaking the population from its safe assumptions and presumed security. The Great Dying was a collapse, the largest in the history of life on the planet, though a slower paced one, since the volcanoes took a million years to fully erupt. Still, a massive methane proliferation caused it, and the initial effects must have been massive, since microbes grow and proliferate very quickly indeed (think “algae bloom”). If we succeed in getting most of the Arctic methane into the air in, say, 50 years, that will cause a collapse as well, and one at the geologic timescale of a nanosecond. Keep those thousands of half-mile wide plumes, rising through the ocean, in mind. A two-degree jump in warming, say, in only a few decades, would have huge consequences for anyone alive at the time — it would collapse the livability of the planet to a fraction of itself. Second, all of this means that we really really need to take the timeline seriously, assume that we have far less time than we think we have, and act now. There’s a reason I’m being so aggressive lately about the need for a “Zero Carbon” + energy rationing regime (click for a short description) to get us off of all energy sources that produce greenhouse gases. I don’t think I’m exaggerating the danger. The sudden ice ages discussed in this video occurred within decades of a warming event — yes, glacial ice just decades after a global warming event. That’s a collapse, and that’s sudden. My ask of you is this. If you write, write this. We can’t allow our “leaders” — leash-holders might be a better term — to lead us to think the unicorn dream of “carbon neutral” will save us. “Carbon neutral” means the carbon car never stops, it just fails to accelerate. That doesn’t mean the climate itself won’t accelerate in its deterioration. Remember, there will be sudden collapses. If you don’t write, you still have “reach.” Everyone who reads this has some reach. Please use it. People need to be told now, ahead of the inevitable panic that (1) we need to stop, not slow down; and (2) we can stop. We just have to. I know many of your friends and associates won’t take you seriously … now. But they will, once the freak-out starts for real. Social panic is like a lynch mob. It starts suddenly and burns like a wildfire. Once the panic starts, people will need to have been already told points (1) and (2) above. After all, Lying Pantsuit Lady (i.e., the Exxon / methane industry spokesperson) is already telling your friends that the choice is carbon or no TV. She’s right, of course, but she’s selling the carbon. We should be messaging just as hard, so when they are ready to listen, they’ll have already heard what the answer is. One last note — I hear people get depressed when they take this stuff seriously. Don’t. There’s a lot of ball game left, no collapse yet, still time on the clock, and lots of ways to mitigate. I’m personally excited by the idea that we can stillget positioned for a chance opening, a good opportunity to make a big change. Remember — winners know not to give up, just in case god has a gift in hand. Play to the whistle. After all, didn’t lowly Auburn beat Alabama, back when earth was cooler?
<urn:uuid:80543ad0-e385-4f01-90ba-5d65aa27bf96>
CC-MAIN-2018-39
https://truthout.org/articles/the-perp-in-the-greatest-mass-extinction-on-earth-methane/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157028.10/warc/CC-MAIN-20180921092215-20180921112615-00559.warc.gz
en
0.94476
3,712
3.75
4
Everybody has seen people on busy street corners and in large public buildings zealously attempting to hand out religious literature to all passersby. And you yourself may have even had a person with a "Christian message" knock on your door. These are common, everyday occurrences; and most people, even if they don't necessarily agree with their views, passively accept these door-to-door evangelists as part of Western Christianity. But did you know that long before the coming of Jesus Christ, the pagan world had its door-to-door representatives? The ancient pre-Christian world teemed with different religious sects, all vying with one another for converts. Many of them were attempting to spread their doctrines and win new adherents by preaching from house to house. Plato remarked that "mendicant prophets go to rich men's doors and persuade them that they have a power... of making an atonement for a man's 'own... sins... at a small cost" (Republic, 364 b-c). Not only did these zealous pagans preach, they also distributed a variety of tracts of a religious and moralizing nature. Werner Jaeger, an authority on the influence of pagan culture on early Christianity, observes that "we have to reckon with the existence in Hellenistic times of religious tracts as a means of propaganda fides [propagandizing their faith] of many sects" (Early Christianity and Greek Paideia, London: Oxford University Press, 1969, p. 8). Members of such a sect would actually distribute their propaganda literature from house to house. This practice was widespread already in Plato's day, some four hundred years before Christ. Plato reports about these door-to-door evangelists in no uncertain terms: "And they produce a host of books [tracts] written by Musaeus and Orpheus... according to which they... persuade not only individuals, but whole cities" (Republic, 364e). This was nothing other than the same door-to-door high-pressure evangelism so common among us today. In fact, so ubiquitous had this practice become among the pagans — and so obnoxious and repulsive to the average individual — that the pagan author Plutarch felt it his duty to denounce it in his writings. In his Precepts for Newly Married People, Plutarch advises wives "not to admit strangers by the back door who try to smuggle their tracts into the house advertising a foreign religion" (Jaeger, p. 8). This denunciation demonstrates how common door-to-door tract evangelism had become. "Let them [the door-to-door preachers] be exterminated from her outermost threshold!" Plutarch thundered (Conjugal Precepts, c. 19). All this goes to show that the distribution of religious tracts was an obnoxious pagan means of winning converts — and it antedated Christianity by as much as four hundred years! Such a way of "winning souls," needless to say, is diametrically opposed to the practices and teachings of Jesus. Christ never preached from door to door. He did not hand out one religious tract. He specifically instructed His disciples, "Go not from house to house" (Luke 10:7). John, the last survivor of the original twelve apostles, admonished the followers of Christ: "If there come any unto you, and bring not this doctrine [which John preached and which only the one true Church of God preaches], receive him not into your house" (II John 10). No truth could be learned from the preachings or the writings of these disseminators of error. Paul warned about the type of fellow Plutarch wrote about. "For of this sort are they which creep into houses, and lead captive silly women laden with sins, led away with divers lusts" (II Tim. 3:6). True Christians know and understand that God is the One who calls and converts people (John 6:44). They recognize, therefore, that it would be completely futile — and actually contrary to God's will — to go out and attempt to win converts by force. The pagans of old, on the other hand, did not serve an active, living God. They had to do the converting themselves in order to gain followers, because their "god" was nonexistent, and the real God was not calling anyone to their religion. And, furthermore, they were not supported by God financially. That is why, in the words of Plato, the mendicant preachers performed their services "at a small cost," meaning they charged "a small fee." Jesus Christ, who supports and finances the dissemination of His message so that it can go out without cost, said "freely you have received, freely give" (Matt. 10:8). How different is true Christianity from the ways of the pagans!
<urn:uuid:d6b49ded-751e-4119-9f2e-8b67a45616cb>
CC-MAIN-2018-39
https://www.hwalibrary.com/cgi-bin/get/hwa.cgi?action=getmagazine&InfoID=1334328746
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157028.10/warc/CC-MAIN-20180921092215-20180921112615-00559.warc.gz
en
0.972371
987
2.984375
3
Since it first appeared in Hong Kong in 1997, the H5N1 avian flu virus has been slowly evolving into a pathogen better equipped to infect humans. The final form of the virus, biomedical researchers fear, will be a highly pathogenic strain of influenza that spreads easily among humans. Now, in a new study a team of researchers from the University of Wisconsin-Madison report the identification of a key step the virus must take to facilitate the easy transmission of the virus from person to person. Writing in the journal Public Library of Science Pathogens, a team of researchers led by virologist Yoshihiro Kawaoka of the UW-Madison School of Veterinary Medicine has identified a single change in a viral protein that facilitates the virus' ability to infect the cells of the upper respiratory system in mammals. By adapting to the upper respiratory system, the virus is capable of infecting a wider range of cell types and is more easily spread, potentially setting the stage for a flu pandemic. "The viruses that are in circulation now are much more mammalian-like than the ones circulating in 1997," says Kawaoka, an internationally recognized authority on influenza. "The viruses that are circulating in Africa and Europe are the ones closest to becoming a human virus." As its name implies, bird flu first arises in chickens and other birds. Humans and other animals in close contact with the birds may be infected, and the virus begins to adapt to new host animals, a process that may take years as small changes accumulate. Over time, an avian virus may gather enough genetic change to spread easily, as experts believe was the case with the 1918 Spanish flu, an event that killed at least 30 million people worldwide. In the new study, which was conducted in mice, the Wisconsin team identified a single change in a viral surface protein that enabled the H5N1 virus to settle into the upper respiratory system, which "may provide a platform for the adaptation of avian H5N1 viruses to humans and for efficient person-to-person virus transmission." Other currently undetermined changes are required for the virus to become a human pathogen of pandemic proportions, Kawaoka explains, but establishing itself in the upper respiratory system is necessary as that enables easy transmission of the virus through coughing and sneezing. To date, more than 250 H5N1 human infections worldwide have been reported. Of those, more than 150 have been fatal, but so far efficient human-to-human transmission has not occurred. Most infections have occurred as a result of humans being in close contact with birds such as chickens that have the virus. According to Kawaoka, the avian virus can be at home in the lungs of humans and other mammals as the cells of the lower respiratory system have receptors that enable the virus to establish itself. Temperatures in the lungs are also higher and thus more amenable to the efficient growth of the virus. The new study involved two different viruses isolated from a single patient -- one from the lungs, the other from the upper respiratory system. The virus from the upper respiratory system exhibited a single amino acid change in one of the key proteins for amplification of influenza virus genes. The single change identified by the Wisconsin study, says Kawaoka, promotes better virus replication at lower temperatures, such as those found in the upper respiratory system, and in a wider range of cell types. "This change is needed, but not sufficient," Kawaoka explains. "There are other viral factors needed to cause a viral pandemic" strain of bird flu. However, Kawaoka and other flu researchers are convinced it is only a matter of time, as more humans and other animals are exposed to the virus, before H5N1 virus takes those steps and evolves into a virus capable of causing a pandemic. In addition to Kawaoka, authors of the new PLoS Pathogens study include Masato Hatta, Yasuko Hatta, Jin Hyun Kim, Shinji Watanabe of the UW-Madison School of Veterinary Medicine; Kyoko Shinya of Japan's Tottori University; Tung Nguyen of the Vietnamese National Centre for Veterinary Diagnostics; Phuong Song Lien of the Vietnam Veterinary Association; and Quynh Mai Le of the Vietnamese National Institute of Hygiene and Epidemiology. The work was funded by grants from the U.S. National Institutes of Health and the Japan Science and Technology Agency.
<urn:uuid:826e9954-6816-4c35-9434-6887244faedc>
CC-MAIN-2018-39
https://www.infectioncontroltoday.com/influenza/researchers-identify-key-step-bird-flu-virus-takes-spread-readily-humans
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157028.10/warc/CC-MAIN-20180921092215-20180921112615-00559.warc.gz
en
0.943784
904
4.0625
4
In the West, when talking about Eastern woodworking traditions, it is more often than not the case that we are referring to Japanese tradition. Although there are long and rich histories of wood craft across Asia, from the South through to the East, a google search for Asian woodworking will usually result in a page filled with Japanese carpentry techniques and tools. Even when searching specifically for Chinese woodworking, several Japanese-centric sites will pop up. Perhaps this is due to a difficult relationship between modernity and tradition within China, but the case remains that Chinese craft is relatively unfamiliar to the general public these days, and even has several negative connotations attached to it. While traditional Chinese carpentry has many similarities to Japanese carpentry given their intertwined histories, it may be helpful to compare Chinese woodworking with the Western through the lenses of technique, aesthetics and social status. It would be fair to say that Chinese joinery is superior, while the strength of Western technique lies in carving, turning and bending. Although Chinese object-making does not shy away from ornamentation, there is a heavy emphasis on structure and framework, with a fair amount of ornamentation taking the form of angular structures, which can be seen in the architecture of temples and palaces. Iconic examples of Western workmanship can be seen from the ornate rococo and baroque periods, the pared down shaker aesthetic with its spindle-turned spokes, and Michael Thonet's steam-bent No.14 chair, which have all laid foundations for modern woodworking in their own ways. One major difference between Chinese and Western joinery may also provide us with a peek into the social aspects of carpentry. Chinese joinery is very complex and visually stunning. However, the joinery tends to be blind, where much of the detail is tucked away. Western joinery on the other hand tends to be simpler, but is also much more likely to be exposed as a visual feature celebrating the beauty of the structure. The aesthetics is a revealing of the social status of carpenters in Chinese and Western culture. While it is a vocational occupation for both, carpentry is regarded much more as a way to make a living in China rather than a calling. Even though it requires about 6 years of apprenticeship to learn the trade and become a professional, a lot of Chinese woodcraft goes uncredited. On the Western side of things, craft is more frequently elevated to artistry, and there are many notable Western woodworkers who have become household names and major inspirations to designers and carpenters alike. It is also interesting to note that, along with an ever-expanding hobbyist culture, woodworking in the west is becoming more standardized and readily available in professional education, while China does not have quite so many people interested in DIY and continues solely on the model of apprenticeship. With new makers and creators now giving their take on China's identity in the modern world, it will be interesting to see where Chinese object making and design goes from here, and where the East and the West converge and collide.
<urn:uuid:fbd9716b-cdfb-49ee-a1f7-897ede458b92>
CC-MAIN-2018-39
https://www.weliving.us/blogs/west-east/a-compasison-of-traditions-chinese-and-western-woodworking
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157028.10/warc/CC-MAIN-20180921092215-20180921112615-00559.warc.gz
en
0.967027
628
3.015625
3
This is a wonderful time to learn to identify this star, even though you might have to squint a bit to see it in the moon’s glare. Aldebaran is a bright reddish star, a good star to come to know. Did you know that Aldebaran is also a former pole star? It’s true, and it’s a fascinating story. Many people know that Polaris is the present-day North Star, but few know that Aldebaran reigned as the North Star some 450,000 years ago. What’s more, Aldebaran appeared several times brighter in the sky then than it does now. Plus – 450,000 years ago – Aldebaran shone very close to the very bright star Capella on the sky’s dome. In that distant past, these two brilliant stars served as a double pole star in the astronomical year -447,890 (447,891 BC). At this point, we should probably insert a note about astronomical dating. In ancient times, there was no zero year, so the year AD 1 followed the year 1 BC. However, present-day astronomical calculating is made simpler by equating the astronomical year 0 with the year 1 BC. Thus, the astronomical year -1 corresponds to 2 BC and the astronomical year -2 corresponds to 3 BC. And so on . . . But back to Aldebaran and Capella as dual pole stars. The identity of the pole star shifts over time, due to the 26,000-year cycle of precession. To read more about that, click into this article about Thuban, another former pole star. Still, how can it be, you might wonder, that the stars Aldebaran and Capella were once so near each other on the sky’s dome? They’re not especially close together now. Aren’t the stars essentially fixed relative to one another? The answer is that, yes, on the scale of a human lifespan, the stars are essentially fixed. But the stars are actually moving through space, in orbit around the center of the galaxy. In our solar system, galaxy, and universe … everything is always moving. So the sky looked different hundreds of thousands of years ago than it does today. So watch for Aldebaran near the moon tonight, and think back to 450,000 years ago, when Aldebaran and Capella teamed up together to serve as Earth’s double north pole star!* *Source: Page 363 of Mathematical Astronomy Morsels V by Jean Meeus Bottom line: Will you see Aldebaran in the moon’s glare on January 16 or 17, 2019? Plus … the story of Aldebaran when it was part of a double pole star.
<urn:uuid:f48f529c-2d6c-460f-966b-cc00fd4cf02e>
CC-MAIN-2018-39
http://earthsky.org/tonight/moon-aldebaran-ex-pole-star
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158450.41/warc/CC-MAIN-20180922142831-20180922163231-00159.warc.gz
en
0.946853
579
3.34375
3
of a stapes prosthesis onto the incus. Incus Stapes Superstructure Replacement Prosthesis - … I-SRP - Incus Stapes Superstructure Replacement Prosthesis Definition : Implantable ossicular prostheses designed to replace one or both of the middle and innermost middle ear ossicles (i.e., incus and stapes, respectively). These prostheses are typically made of bioactive materials such as hydroxyapatite, bioactive glasses, silastic, stainless steel, titanium, or high-density polyethylene sponge (HDPS); some materials require placement of cartilage between the prosthesis and the tympanic membrane to prevent extrusion. Sculpted autografts and allografts are less frequently used as ossicular prostheses. Incus and/or stapes prostheses are used mainly to reestablish the middle ear sound-conducting mechanism; they are also used to repair congenital abnormalities in the ossicles, improving a patient's hearing capabilities. Entry Terms : "Prostheses, Ossicular, Incus/Stapes" , "Prostheses, Stapedial" , "Prostheses, Middle Ear Ossicle, Incus" , "Prostheses, Middle Ear Ossicle, Stapes" , "Stapes Middle Ear Prostheses" , "Incus Middle Ear Prostheses" , "Stapes Prostheses" Wehrs HAPEX incus-stapes prosthesis. The upper portion of the stapes bone is then vaporized with a Laser). The distance between the fixed stapes footplate and the mobile incus (2nd bone of hearing) is measured to select the properly sized prosthesis. A 0.7mm hole in the fixed stapes footplate is created with the Laser. The prosthesis is then inserted into the footplate hole and then “welded” to the incus with the Laser. A small piece of tissue from the back of the ear lobule is draped around the prosthesis at the footplate hole to seal it. Success rates of stapedotomy are traditionally assessed by the closure of the air-bone gap on audiometry with a good outcome generally accepted to be within 10 dB or less, closure of the preoperative air-bone gap. Success rates of surgery vary from 17% to 80% . The common causes of failure of stapedotomy include prosthesis displacement, incus necrosis, undiscovered fixation of the incus or malleus, adhesions in the middle ear, and oval window fibrosis. Revision stapedotomy procedures are associated with inferior hearing outcomes and greater comorbidity [, ]. the stapes prosthesis can be attached to the incus (incus .. The SMart prosthesis is one of the newer stapes prostheses available on the market, and a number of large series have shown good surgical outcomes with its usage [, ]. The piston exhibits shape memory whereby the application of heat leads to a phase alteration in the atomic structure resulting in the formation of a predetermined shape. In the case of a SMart prosthesis, this results in the crimping of the hook around the incus. As this crimping occurs, increased contact with the incus generates stress which acts to inhibit the memory properties and therefore stop the crimping process . This should produce a snugly fitted secure prosthesis. The Megerian Stapes Replacement Prothesis is a heat activated, nitinol stapes replacement prosthesis. The piston features 6 tapered nitinol arms that follow the natural contour of the incus. With this unique design, the surgeon can adapt the SRP for use with a necrosed incus. The Megerian SRP ranges in lengths from 4.00mm to 5.00mm in quarter millimeter increments. NiTiBond Stapes Prosthesis - Atos Medical Incus replacement prostheses of hydroxylapatite in … The new NiTiBOND® Stapes Prosthesis is created by combining the features .. incus with short and long processes 10/02/2017 · Incus replacement prostheses of hydroxylapatite in .. Incus - an overview | ScienceDirect Topics The evolution of ear ossicles (malleus, incus, stapes, .. For this reason, some surgeons prefer a bucket handle prosthesis The Bartels Bucket Handle prosthesis was specially designed with an adjustable diameter bucket to accommodate a small, medium or large sized incus. This feature greatly reduces hospital inventories. An additional feature is the stepped down shaft of the prosthesis. The Bartels is offered in 0.4mm, 0.5mm or 0.6mm diameter, with the shaft of each stepped down to 0.3mm. The stepped down shaft provides better clearance with an over-hanging facial nerve or promontory. The Bartels has a 1mm polished depth gauge to aid in determining depth into the vestibule. Stapes Prostheses - Products - Grace Medical In our case, the prosthesis was successfully crimped at time of initial surgery with good audiological evidence of improvement. The prosthesis, however, was found to be “uncrimped” during surgery. We would not classify this as a prosthesis displacement, the commonest cause of late failure of surgery, as the piston was still in contact with the incus and the stapes footplate. The uncrimping of the prosthesis has led to poor sound transmission and hence deterioration of hearing thresholds. "I have always been impressed by the quick turnaround and your thoroughness. Easily the most professional essay writing service on the web." "Your assistance and the first class service is much appreciated. My essay reads so well and without your help I'm sure I would have been marked down again on grammar and syntax." "Thanks again for your excellent work with my assignments. No doubts you're true experts at what you do and very approachable." "Very professional, cheap and friendly service. Thanks for writing two important essays for me, I wouldn't have written it myself because of the tight deadline." "Thanks for your cautious eye, attention to detail and overall superb service. Thanks to you, now I am confident that I can submit my term paper on time." "Thank you for the GREAT work you have done. Just wanted to tell that I'm very happy with my essay and will get back with more assignments soon."
<urn:uuid:c23cda6f-63a1-4289-86df-8a7fc0001372>
CC-MAIN-2018-39
http://eventsbymilkandhoneyfarm.com/incus-stapes-prosthesis.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158450.41/warc/CC-MAIN-20180922142831-20180922163231-00159.warc.gz
en
0.909157
1,352
2.671875
3
These are imported feeds of lesson plans and classroom activities. This is not an archive, these entries are here for only a few weeks. What are clauses of purpose? Clauses of purpose explain the reason for an action. There are a few different clauses, but we will focus on clauses with to, for, and so that. Katie will go to England to study gardening next September. for his health. Alan studies English every day so that he can find a new job. The first sentence explains Katie's purpose in going to England. The second sentence explains Bill's purpose in joining a gym. And the third sentence talks about the reason Alan studies English every day. What is the sentence[...] What are adverbs? Adverbs give additional information to verbs and clauses, much like adjectives give additional information to nouns. Adverbs tell you how, where, and when, and also how often something happens. Let's focus on the following three types, though: 1: Adverbs of Manner: These describe how something happens. Because he just received his driver's license, he drives carefully. The singer has a fantastic voice. She sings many songs beautifully. In the library, you must speak quietly. 2: Comment Adverbs: These adverbs describe the speaker's opinion. Obviously, the politician was lying. He definitely had a relaxing vacation! What are imperatives? mom to daughter: Eat vegetables to stay healthy! husband to wife: Get the car washed this weekend. boss to employee: Finish the report before you leave for the day. What is the sentence structure? base verb | object[...] Feb 29, 2016 2:39 PM A beautiful and very warm day. I wore sandals today! 1 Alphabet – spelling dictation 2 Grammar – pronouns 3 Review and rewrite papers Alphabet – spelling dictation I will say the words and I will spell them. Write the letters for each word when I spell the words. • We need to practice i and e • Bingo?Grammar – pronouns 1). Personal Pronouns Pronouns can be: • Subjects – I, you, he, she, it, we, you, they • Direct objects – me, you, him, her, it, us, you, them • Indirect objects – the same as Direct objects In this context an “object” is a thing or person, an item – a noun. • Subjects are the topic of the sentence. A subject is something or someone that is doing the action, the verb. • Example: I drive fast. • The subject is “I” • Direct object is the person or thing that the verb is acting on. • Example: I drive the car fast. • The direct object is “the car”. I drive it fast. Finish Indirect Objects next Monday. • Indirect objects tell us about the person or thing that benefits from the action of the verb. • Example: I bought a car for her. Or: I bought her a car. • The Indirect object is “her”. The direct object is “car”. • I bought a car. I did not buy her. • She received the benefit of the verb “bought”. 2). Do in questions and negative statementsUse Do or Does to form questions. “Do” changes with the subject in questions, the verb is in the base form and does not change. Use Don't or Doesn't to make verbs negative. Again, “Do” changes with the subject, the verb is in the base [...] Adjectives are words that describe nouns and pronouns. Proper nouns are nouns that name specific people, places, things, or ideas. Think of proper as meaning specific.Notice that proper nouns always begin with a capital letter. Examples of proper nouns: America, English, Paris Proper Adjectives Proper adjectives are adjectives that are formed from proper nouns. Most proper adjectives identify people, places, languages, or groups. Notice that proper adjectives are still performing the job of an adjective: They are all describing nouns. Edited from source: English Grammar Revolution/Proper Adjectives Filed under: grammar, Information, Synicated [...]
<urn:uuid:4524a76b-270f-411d-a41b-e7b95a6d1c95>
CC-MAIN-2018-39
http://toni-esl.com/teach/lesson-plans/?pg=2
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158450.41/warc/CC-MAIN-20180922142831-20180922163231-00159.warc.gz
en
0.941121
933
4.09375
4
Time Machine (Popular Penguin) A Victorian scientist propels himself into the future. Entranced at first by the Eloi, an elfin species descended from man, he soon realises that this beautiful people are simply remnants of a once-great culture - now weak and childishly afraid of the dark. They have reason to be afraid: in tunnels beneath their paradise lurks another race - the sinister Morlocks. When the scientist's time machine vanishes he must confront the Morlocks or remain forever trapped in the future. H. G. Wells, the third son of a small shopkeeper, was born in Bromley in 1866. After two years' apprenticeship in a draper's shop, he became a pupil-teacher at Midhurst Grammar School and won a scholarship to study under T. H. Huxley at the Normal School of Science, South Kensington. He taught biology before becoming a professional writer and journalist. He wrote more than a hundred books, including novels, essays, histories and programmes for world regeneration. Wells, who rose from obscurity to world fame, had an emotionally and intellectually turbulent life. His prophetic imagination was first displayed in pioneering works of science fiction such as The Time Machine (1895), The Island of Doctor Moreau (1896), The Invisible Man (1897) and The War of the Worlds (1898). Later he became an apostle of socialism, science and progress, whose anticipations of a future world state include The Shape of Things to Come (1933). His controversial views on sexual equality and women's rights were expressed in the novels Ann Veronica (1909) and The New Machiavelli (1911). He was, in Bertrand Russell's words, 'an important liberator of thought and action'. Wells drew on his own early struggles in many of his best novels, including Love and Mr Lewisham (1900), Kipps (1905), Tono-Bungay (1909) and The History of Mr Polly (1910). His educational works, some written in collaboration, include The Outline of History (1920) and The Science of Life (1930). His Experiment in Autobiography (2 vols., 1934) reviews his world. He died in London in 1946.
<urn:uuid:3c5611aa-7b5e-4f00-abbf-aacfab1bc3d8>
CC-MAIN-2018-39
https://baylifebooks.com/p/classics-time-machine-popular-penguin--6
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158450.41/warc/CC-MAIN-20180922142831-20180922163231-00159.warc.gz
en
0.952249
466
2.859375
3
Main Barriers to Education - Refugee status - Conflict affected - Weak school administraiton Interventions to Barriers - Data maintenance nad analysis - School management and teacher training - Psychosocial support The crisis in Syria has dramatically impacted neighbouring countries, especially Lebanon. With an uncertain end to the conflict, Palestinian refugees and Syrians experience profound hardship, unemployment, poverty and insecurity. Effectively, the situation in Syria has had an adverse impact on the education prospects of many Syrian, Palestinian and poor Lebanese children. Alone, Lebanon has to date registered approximately 800,000 Syrian refugees – 300,000 of whom are children. 80 percent of those children are out of school. At present, UNRWA estimates that Lebanon hosts approximately 44,000 Palestinians from Syria who are also in desperate need of assistance. Moreover, Lebanon’s Ministry of Education and Higher Education remains under resourced and struggles to serve the expanded caseloads of vulnerable Syrian refugees in public schools. The influx of displaced children from Syria has nearly doubled the number of education spaces necessary in Lebanon. To help address the plight of Palestinian and Syrian children in Lebanon who have been affected by the conflict in Syria, EAC has partnered with UNRWA and the U.S. Fund for UNICEF to increase education access to OOSC; provide a psychosocial and survival skills support system; deliver learning content adapted to the aggravated setting; improve the quality of teaching; ensure safe learning environments; construct/rehabilitate learning spaces; and train school management staff. Geographic Location: Middle East Languages: Arabic (official), French, English, Armenian Together, EAC and UNRWA, through the Education for Palestinian Children out of Syrian School because of Conflict project brought quality primary education to 66,969 out of school Palestinian Refugee Children in Jordan, Lebanon and Syria . The crisis in Syria is now in its fifth year and every day the risk of a lost generation of children grows. Nearly 14 million children have been affected by escalating conflict. Half of all Syrians are displaced and close to 2 million children have fled for neighboring countries and are living in overcrowded camps, inadequate informal settlements, or host communities, where tensions are rising between refugee and local populations.
<urn:uuid:542c4c93-dba7-4f50-8d86-4d5af7cee2be>
CC-MAIN-2018-39
https://educateachild.org/our-partners-projects/country/lebanon
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158450.41/warc/CC-MAIN-20180922142831-20180922163231-00159.warc.gz
en
0.941509
460
3.3125
3
This quote is found everywhere, which isn’t surprising, since it reminds us of the importance of keeping the body in good health—something many of us neglect to do. It’s from Buddha’s Little Instruction Book, where it’s “Our body is precious. It is our vehicle for awakening. Treat it with care.” (Note the use of “our” rather than “your” in the original.) “Precious” is not, to the best of my knowledge, a term the Buddha ever used to describe the body. However, he did indeed stress the importance of keeping the body healthy: Reflecting properly, he takes alms-food. He does so not for enjoyment, not for vanity, not for improvement of the body, not for a better complexion, but only to sustain the physical body, to have just enough nourishment for maintaining life, to appease hunger and to carry out the Noble Practice of Purity. [He reflects thus:] ‘By this alms-food, I shall remove the existing discomfort and shall prevent the arising of new discomfort. I shall have just enough nourishment to maintain life and to lead a blameless life with good health.’ (Sabbasava Sutta) But as you can see, the attitude to the body here is rather neutral. It’s not regarded as “precious” but is simply to be sustained, without attachment. Seeing the body as precious would, for the Buddha, be taking us too close to what he called “intoxication” with health: There are beings who are intoxicated with a [typical] healthy person’s intoxication with health. Because of that intoxication with health, they conduct themselves in a bad way in body… in speech… and in mind. But when they often reflect on that fact, that healthy person’s intoxication with health will either be entirely abandoned or grow weaker… (Upajjhatthana Sutta) To counter this intoxication, the Buddha offered perspectives on the body that are less than flattering: Behold this body — a painted image, a mass of heaped up sores, infirm, full of hankering — of which nothing is lasting or stable! Fully worn out is this body, a nest of disease, and fragile. This foul mass breaks up, for death is the end of life. As for the body being a vehicle for awakening, it could be argued that the Buddha came close to saying that in stressing the need for bodily mindfulness. For example in Dhammapada 293, he says: But those who always practice well do never what should not be done and ever do what should be done; mindful, clearly comprehending, their pollutions out of existence go. And even more clearly, There is one thing that when cultivated and regularly practiced, leads to deep spiritual intention, to peace, to mindfulness and clear comprehension, to vision and knowledge, to a happy life here and now and to the culmination of wisdom and awakening. And what is that one thing? It is mindfulness centered on the body. (Anguttara Nikaya I 43) The quote in question should probably be attributed to Jack Kornfield (along with many others that have been taken from Buddha’s Little Instruction Book and mis-attributed to the Buddha), but it may in turn be an adaptation of a verse from Tsongkhapa: “The human body, at peace with itself, is more precious than the rarest gem. Cherish your body, it is yours this one time only. The human form is won with difficulty, it is easy to lose.” The Buddha would certainly have agreed with Tsongkhapa about the rarity of human existence, but I doubt he would have used the word “precious” to describe the body.
<urn:uuid:27c1d25d-221f-4750-9efa-c7604361244d>
CC-MAIN-2018-39
https://fakebuddhaquotes.com/your-body-is-precious-it-is-your-vehicle-for-awakening-treat-it-with-care/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158450.41/warc/CC-MAIN-20180922142831-20180922163231-00159.warc.gz
en
0.946445
817
2.625
3
Improvement by Design: The Promise of Better Schools One of the great challenges now facing education reformers in the United States is how to devise a consistent and intelligent framework for instruction that will work across the nation’s notoriously fragmented and politically conflicted school systems. Various programs have tried to do that, but only a few have succeeded. Improvement by Design looks at three different programs, seeking to understand why two of them—America’s Choice and Success for All—worked, and why the third—Accelerated Schools Project—did not. The authors identify four critical puzzles that the successful programs were able to solve: design, implementation, improvement, and sustainability. Pinpointing the specific solutions that clearly improved instruction, they identify the key elements that all successful reform programs share. Offering urgently needed guidance for state and local school systems as they attempt to respond to future reform proposals, Improvement by Design gets America one step closer to truly successful education systems.
<urn:uuid:7cb24a2d-35bb-445c-944e-4340d2d60fca>
CC-MAIN-2018-39
https://positiveorgs.bus.umich.edu/books/improvement-by-design-the-promise-of-better-schools/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158450.41/warc/CC-MAIN-20180922142831-20180922163231-00159.warc.gz
en
0.958247
194
2.796875
3
Science of Cycles is proud to bring to you ‘live streaming’ of the Aug. 21 Solar Eclipse. The stream will go ‘live’ at 11AM (PST). A new experiment set for an Aug. 14 launch to the International Space Station will provide an unprecedented look at a rain of particles from deep space, called cosmic rays, that constantly showers our planet. The Cosmic Ray Energetics And Mass mission destined for the International Space Station (ISS-CREAM) is designed to measure the highest-energy particles of any detector yet flown in space. The ISS-CREAM experiment will be delivered to the space station as part of the 12th SpaceX commercial resupply service mission. Once there, ISS-CREAM will be moved to the Exposed Facility platform extending from Kibo, the Japanese Experiment Module. “High-energy cosmic rays carry a great deal of information about our interstellar neighborhood and our galaxy, but we haven’t been able to read these messages very clearly,” said co-investigator John Mitchell at Goddard. “ISS-CREAM represents one significant step in this direction.” At energies above about 1 billion electron volts, most cosmic rays come to us from beyond our solar system. Various lines of evidence, including observations from NASA’s Fermi Gamma-ray Space Telescope, support the idea that shock waves from the expanding debris of stars that exploded as supernovas accelerate cosmic rays up to energies of 1,000 trillion electron volts (PeV). That’s 10 million times the energy of medical proton beams used to treat cancer. ISS-CREAM data will allow scientists to examine how sources other than supernova remnants contribute to the population of cosmic rays. Protons are the most common cosmic ray particles, but electrons, helium nuclei and the nuclei of heavier elements make up a small percentage. All are direct samples of matter from interstellar space. But because the particles are electrically charged, they interact with galactic magnetic fields, causing them to wander in their journey to Earth. This scrambles their paths and makes it impossible to trace cosmic ray particles back to their sources. When astronomers peer into the universe, what they see often exceeds the limits of human understanding. Such is the case with low-mass galaxies — galaxies a fraction of the size of our own Milky Way. These small, faint systems made up of millions or billions of stars, dust, and gas constitute the most common type of galaxy observed in the universe. But according to astrophysicists’ most advanced models, low-mass galaxies should contain many more stars than they appear to contain. A leading theory for this discrepancy hinges on the fountain-like outflows of gas observed exiting some galaxies. These outflows are driven by the life and death of stars, specifically stellar winds and supernova explosions, which collectively give rise to a phenomenon known as “galactic wind.” As star activity expels gas into intergalactic space, galaxies lose precious raw material to make new stars. The physics and forces at play during this process, however, remain something of a mystery. To better understand how galactic wind affects star formation in galaxies, a two-person team led by the University of California, Santa Cruz, turned to high-performance computing at the Oak Ridge Leadership Computing Facility (OLCF), a US Department of Energy (DOE) Office of Science User Facility located at DOE’s Oak Ridge National Laboratory (ORNL). Specifically, UC Santa Cruz astrophysicist Brant Robertson and University of Arizona graduate student Evan Schneider (now a Hubble Fellow at Princeton University), scaled up their Cholla hydrodynamics code on the OLCF’s Cray XK7 Titan supercomputer to create highly detailed simulations of galactic wind. “The process of generating galactic winds is something that requires exquisite resolution over a large volume to understand — much better resolution than other cosmological simulations that model populations of galaxies,” Robertson said. “This is something you really need a machine like Titan to do.” After earning an allocation on Titan through DOE’s INCITE program, Robertson and Schneider started small, simulating a hot, supernova-driven wind colliding with a cool cloud of gas across 300 light years of space. (A light year equals the distance light travels in 1 year.) The results allowed the team to rule out a potential mechanism for galactic wind. Now the team is setting its sights higher, aiming to generate nearly a trillion-cell simulation of an entire galaxy, which would be the largest simulation of a galaxy ever. Beyond breaking records, Robertson and Schneider are striving to uncover new details about galactic wind and the forces that regulate galaxies, insights that could improve our understanding of low-mass galaxies, dark matter, and the evolution of the universe. Simulating cold clouds About 12 million light years from Earth resides one of the Milky Way’s closest neighbors, a disk galaxy called Messier 82 (M82). Smaller than the Milky Way, M82’s cigar shape underscores a volatile personality. The galaxy produces new stars about five times faster than our own galaxy’s rate of star production. This star-making frenzy gives rise to galactic wind that pushes out more gas than the system keeps in, leading astronomers to estimate that M82 will run out of fuel in just 8 million years. Analyzing images from NASA’s Hubble Space Telescope, scientists can observe this slow-developing exodus of gas and dust. Data gathered from such observations can help Robertson and Schneider gauge if they are on the right track when simulating galactic wind. “With galaxies like M82, you see a lot of cold material at large radius that’s flowing out very fast. We wanted to see, if you took a realistic cloud of cold gas and hit it with a hot, fast-flowing, supernova-driven outflow, if you could accelerate that cold material to velocities like what are observed,” Robertson said. Answering this question in high resolution required an efficient code that could solve the problem based on well-known physics, such as the motion of liquids. Robertson and Schneider developed Cholla to carry out hydrodynamics calculations entirely on GPUs, highly parallelized accelerators that excel at simple number crunching, thus achieving high-resolution results. In Titan, a 27-petaflop system containing more than 18,000 GPUs, Cholla found its match. After testing the code on a GPU cluster at the University of Arizona, Robertson and Schneider benchmarked Cholla under two small OLCF Director’s Discretionary awards before letting the code loose under INCITE. In test runs, the code has maintained scaling across more than 16,000 GPUs. “We can use all of Titan,” Robertson said, “which is kind of amazing because the vast majority of the power of that system is in GPUs.” The pairing of code and computer gave Robertson and Schneider the tools needed to produce high-fidelity simulations of gas clouds measuring more than 15 light years in diameter. Furthermore, the team can zoom in on parts of the simulation to study phases and properties of galactic wind in isolation. This capability helped the team to rule out a theory that posited cold clouds close to the galaxy’s center could be pushed out by fast-moving, hot wind from supernovas. “The answer is it isn’t possible,” Robertson said. “The hot wind actually shreds the clouds and the clouds become sheared and very narrow. They’re like little ribbons that are very difficult to push on.” Having proven Cholla’s computing chops, Robertson and Schneider are now planning a full-galaxy simulation about 10 to 20 times larger than their previous effort. Expanding the size of the simulation will allow the team to test an alternate theory for the emergence of galactic wind in disk galaxies like M82. The theory suggests that clouds of cold gas condense out of the hot outflow as they expand and cool. “That’s something that’s been posited in analytical models but not tested in simulation,” Robertson said. “You have to model the whole galaxy to capture this process because the dynamics of the outflows are such that you need a global simulation of the disk.” The full-galaxy simulation will likely be composed of hundreds of billions of cells representing more than 30,000 light years of space. To cover this expanse, the team must sacrifice resolution. It can rely on its detailed gas cloud simulations, however, to bridge scales and inform unresolved physics within the larger simulation. “That’s what’s interesting about doing these simulations at widely different scales,” Robertson said. “We can calibrate after the fact to inform ourselves in how we might be getting the story wrong with the coarser, larger simulation.” Researchers believe they have discovered a rock carving in New Mexico’s Chaco Canyon that represents a total eclipse that occurred more than 900 years ago. The engraving, known as a petroglyph, shows a circle with curved, intricate swirling emissions issuing from it. Around the circle, believed to depict the Sun, human figures can be seen in different positions and engaged in different activities. University of Colorado Boulder Professor J. McKim Malville has said the circle shown in the rock art represents the Sun’s outer atmosphere, known as its corona, with the tangled, looped protrusions on its edges dating it to a total eclipse that occurred in the region on July 11, 1097. Malville made the observation Wednesday to mark the upcoming total solar eclipse on August 21 that will be visible across a large swathe of the U.S. “To me it looks like a circular feature with curved tangles and structures,” Malville said. “If one looks at a drawing by a German astronomer of the 1860 total solar eclipse during high solar activity, rays and loops similar to those depicted in the Chaco petroglyph are visible.” Malville, who is attached to Boulder’s astrophysical and planetary sciences department, and José Vaquero of the University of Extremadura in Cáceres, Spain were able to date the carving on the basis of the loops that they believed to be a coronal mass ejections (CME). These CMEs are eruptions that can blow billions of tons of plasma from the Sun at several million miles per hour during active solar periods. “It turns out the Sun was in a period of very high solar activity at that time, consistent with an active corona and CMEs,” the pair said in their 2014 paper on the rock art in the Journal of Mediterranean Archaeology and Archaeometry. The two used several sources to assess the activity of the Sun around the time of the 1097 eclipse. The data they gathered included information ancient tree rings from which they could detect the activity of cosmic rays. They also used records of naked-eye observations of sunspots, which go back several thousand years in China. A third method involved looking at historical data compiled by northern Europeans on the annual number of so-called “auroral nights,” when the northern lights were visible, an indication of intense solar activity. The free-standing rock hosting the possible eclipse petroglyph, known as Piedra del Sol, also has a large spiral petroglyph on its east side that marks Sunrise 15 to 17 days before the June solstice. A triangular shadow cast by a large rock on the horizon crosses the center of the spiral at that time. It may have been used to start a countdown to the summer solstice and related festivities. The rock carving was first discovered in 1992 by Malville and then-Fort Lewis Professor James Judge and was carved by early Pueblo people. Chaco Canyon, a centre of Pueblo culture in the Southwest a thousand years ago, is believed by archeologists to have been populated by several thousand people and held political sway over an area twice the size of Ohio. Today my 14 day window prior to the Full Solar Eclipse Aug. 21, then it continues 14 days after the event and the following is what to monitor over this period. I expect large earthquakes measuring 7.0 or larger world-wide. I also believe we will witness moderate to large earthquakes measuring 5.9 – 7.0 + in North America along the west coast, but also less-usual locations such the central states and the southeast coast. There are other earth changing events expected during this 28 day window, which I will further address in a coming article, but first I wish to address a bit more related to the ’cause’. As mentioned in prior articles, the most influential impetus as to the cause of escalating events is rapid temperature shifts. However, there is a significant second element to the full solar eclipse causation concerning geo-physical and bio-psycho-social disturbance. It is a phenomenon known as ‘gravitational waves’. During a solar eclipse, the Moon shields a limited region of the Earth’s atmosphere from the heating effect of the solar radiation. This shadow travels through the Earth’s lower atmosphere at supersonic velocity, causing a propagation of charged particles emitting internal gravity waves that form a bow wave about the shadow region. Tentative estimates of the amplitude of this wave indicate that it will be detectable well outside the area where the eclipse can be observed directly. The process of a gravity wave bow shock, appears to have a destabilizing effect on expected space weather, but cause perturbations in atmospheric winds and fluid displacement i.e. oceans, rivers, oil, sand-type soil and perhaps natural gas. Of course this in-turn would be produce the environmental setting for such things as earthquakes, volcanoes, fissures, tornadoes, and hurricanes. Thank you for your continued support. Here in Part-II, I will enhance the understanding of the causal effect between (charged particles) cosmic rays associated with a) geo-physical i.e. earthquakes, volcanoes, hurricanes, tornadoes etc. and b) bio-psycho-social i.e. depression, disorientation, anxiety, and depression turned inward ‘rage’. My research suggests during the period eclipse transition, which I surmise to have a process of expansion and contraction prior to and after its apex. In this case that would be Aug. 21 2017. As associated with transitional sequence, I suggest there are periods of significant cosmic ray fluctuation. This process would be in addition and co-occurring with periods of rapid temperature flux closest to the apex event. In a coming article, I will explain the causal effects mostly related to geo-physical occurrences, which I expect to begin next week. Watch for my reports as they occur. In this article my focus remains on charged particles effect on humans and how this could be the basis for a presumed connection to civil unrest and war. To best convey the connection between cosmic rays and humans is to present how medical procedures are being used today to treat an assortment of mental health diagnosis such as depression, ADD, bi-polar, anxiety, and ptsd. It has also been effective for dementia and other memory problems like concussions and (TBI) traumatic brain injury often associated with combat veterans from explosives. Transcranial Magnetic Stimulation (TMS) involves the use of a magnetic coil which produces a magnetic field and placing it against the scalp. Capacitors from the TMS machine pass electrical currents through the coils that create brief, pulsating magnetic fields that pass through the skull and create electric currents in the neurons or nerve cells of the brain. Charged particles created by the electromagnetic field releases natural brain chemistry in neurons and synaptic receptors. The choice of stimulation parameters determines whether the effects of stimulation are excitatory or inhibitory. For example, two single pulses separated by less than 5 milliseconds can produce intracortical inhibition, while two single pulses separated by a gap greater than 10 and less than 30 milliseconds can produce intracortical facilitation. This accounts for the reason some people may experience feelings of increased energy, hyperactive, or anxious during the duration of a powerful CME (coronal mass ejection) or large X-class solar flare – while others express feelings of depression, lethargy, or disoriented. I hope this best explains how the fluctuation of charged particles in the way of cosmic rays (and solar rays) can have a direct causal effect on humans. Furthermore, how the expansion and contraction of charged particles influenced by a full solar eclipse can set a template of for civil unrest and war motivated by fear and disorientation. Thank you for your continued support. According to one longstanding theory, our Solar System’s formation was triggered by a shock wave from an exploding supernova. The shock wave injected material from the exploding star into a neighboring cloud of dust and gas, causing it to collapse in on itself and form the Sun and its surrounding planets. New work from Carnegie’s Alan Boss offers fresh evidence supporting this theory, modeling the Solar System’s formation beyond the initial cloud collapse and into the intermediate stages of star formation. It is published by the Astrophysical Journal. One very important constraint for testing theories of Solar System formation is meteorite chemistry. Meteorites retain a record of the elements, isotopes, and compounds that existed in the system’s earliest days. One type, called carbonaceous chondrites, includes some of the most-primitive known samples. An interesting component of chondrites’ makeup is something called short-lived radioactive isotopes. Isotopes are versions of elements with the same number of protons, but a different number of neutrons. Sometimes, as is the case with radioactive isotopes, the number of neutrons present in the nucleus can make the isotope unstable. To gain stability, the isotope releases energetic particles, which alters its number of protons and neutrons, transmuting it into another element. Some isotopes that existed when the Solar System formed are radioactive and have decay rates that caused them to become extinct within tens to hundreds of million years. The fact that these isotopes still existed when chondrites formed is shown by the abundances of their stable decay products — also called daughter isotopes — found in some primitive chondrites. Measuring the amount of these daughter isotopes can tell scientists when, and possibly how, the chondrites formed. A recent analysis of chondrites by Carnegie’s Myriam Telus was concerned with iron-60, a short-lived radioactive isotope that decays into nickel-60. It is only created in significant amounts by nuclear reactions inside certain kinds of stars, including supernovae or what are called asymptotic giant branch (AGB) stars. Because all the iron-60 from the Solar System’s formation has long since decayed, Telus’ research, published in Geochimica et Cosmochimica Acta, focused on its daughter product, nickel-60. The amount of nickel-60 found in meteorite samples — particularly in comparison to the amount of stable, “ordinary” iron-56 — can indicate how much iron-60 was present when the larger parent body from which the meteorite broke off was formed. There are not many options for how an excess of iron-60 — which later decayed into nickel-60 — could have gotten into a primitive Solar System object in the first place — one of them being a supernova. While her research did not find a “smoking gun,” definitively proving that the radioactive isotopes were injected by a shock wave, Telus did show that the amount of Fe-60 present in the early Solar System is consistent with a supernova origin. Taking this latest meteorite research into account, Boss revisited his earlier models of shock wave-triggered cloud collapse, extending his computational models beyond the initial collapse and into the intermediate stages of star formation, when the Sun was first being created, an important next step in tying together Solar System origin modeling and meteorite sample analysis. “My findings indicate that a supernova shock wave is still the most-plausible origin story for explaining the short lived radioactive isotopes in our Solar System,” Boss said. Boss dedicated his paper to the late Sandra Keiser, a long-term collaborator, who provided computational and programming support at Carnegie’s Department of Terrestrial Magnetism for more than two decades. Keiser died in March.
<urn:uuid:d83c174d-3a9e-4d5b-9079-11407aced157>
CC-MAIN-2018-39
https://scienceofcycles.com/topics/galaxy-sun-earth-connection/page/9/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158450.41/warc/CC-MAIN-20180922142831-20180922163231-00159.warc.gz
en
0.932769
4,292
3.375
3
Find the Best Plan in Your Area Find The Right Dentist For You Recently, Dentistry.co.uk reported that a study published in the Journal of Clinical Periodontology found that people who are dependent on alcohol are more likely to develop serious gum disease than those who only drink occasionally. Now, The Huffington Post UK has published an article stating that a study in the Royal College of Surgeon's Dental Journal is calling for dentists to screen their patients for signs that they consume too much alcohol. The researchers said that dentists have a duty to promote the general health and well-being of the public, and they should inquire about their patients' drinking habits so they can know to screen for alcohol-related dental health problems. "After screening, the individuals identified as misusing alcohol could then be offered treatment, including brief motivational advice sessions delivered by hygienists or dental nurses," said study authors, quoted by the news source. The scientists added that alcoholics have an increased risk of sustaining mouth injuries through falls or traffic accidents. Furthermore, the researchers stated that alcohol use may also raise a person's chances of cancers of the mouth, larynx, pharynx and esophagus. For more information on discount dental plans, call 1-888-632-5353 © 2012 Brafton Inc. The materials and articles published on DentalPlans.com are for informational purposes only. Although DentalPlans.com strives to be accurate and complete, the information is provided without liability for errors. DentalPlans.com does not warrant the accuracy or completeness of the information, text graphics, links, or other items contained on DentalPlans.com. DentalPlans.com expressly disclaims liability for errors or omissions in these materials and DentalPlans.com makes no commitment to update the information on DentalPlans.com. DentalPlans.com expressly disclaims all liability for the use or interpretation by others of information on DentalPlans.com. Decisions based on information contained on DentalPlans.com are the sole responsibility of the visitors, and visitors agree to hold DentalPlans.com and its Affiliates harmless against any claims for damages arising from decisions visitors make on such information. Nothing on DentalPlans.com constitutes medical advice or other forms of advice. DentalPlans.com assumes no responsibility for material created or published by third parties linked to DentalPlans.com with or without DentalPlans.com’s knowledge.
<urn:uuid:36f00a9a-2d9d-412c-84ac-3608cd395f75>
CC-MAIN-2018-39
https://www.dentalplans.com/dentalhealtharticles/58172/researchers-call-for-dentists-to-screen-for-alcohol-use.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158450.41/warc/CC-MAIN-20180922142831-20180922163231-00159.warc.gz
en
0.907943
530
2.53125
3
The real history behind some of the episode's pivotal moments. The fifth episode of the second season of Underground, “Whiteface” opens on a startling note. A room full of affluent white people have come to see a minstrel show, but instead, something else is amiss. Rather than being painted in blackface, the performers are covered in whiteface. They begin making fun of white people much to the horror of the audience. As the crowd rushes out, we soon realize that Cato or C. Powell as he’s calling himself these days is responsible for it all. Though many of us might have been shocked at the site of whiteface, Underground’s writers and creators did not pull that out of thin air. Whiteface became fairly popular during the 19th century. Initially, it was one of the many ways the Irish were mocked, and moving forward it was seen in the 20th century when actor Canada Lee, an incredibly talented performer in the 1940’s donned whiteface for his role in the Duchess of Malfi. He used whiteface because his role was originally slated for a white actor. Needless to say, critics were none-to-pleased. More recently, whiteface has been seen in films like The Wayans’ Brothers White Chicks, Chappelle’s Show, and even in rapper Chamillionaire’s music video, “Hip Hop Police.” Now a member of the Black elite in Philadelphia, Cato has used his money to assert his influence. Typically during the 19th century in Philadelphia, members of the Black elite were native Philadelphians, West-Indians, or fair complexion, freeborn Southerners. Much of the wealth in the Black community during the time period stemmed from caterers. For example, entrepreneur Robert Bogle was the first of many African-American caterers who served nineteenth-century Philadelphia’s white elite, and he became extremely wealthy as a result. Subscribe to our daily newsletter for the latest in hair, beauty, style and celebrity news. As we see from Cato’s extravagant party in “Whiteface,” the Black elite in Philly had close ties with the abolitionist movement. Philadelphia specifically welcomed newcomers with open arms, which is why Cato was able to carve out a place for himself without much upheaval. However, as we learn in this episode, being a Black person whether free or enslaved during this period meant that your status could change in the blink of an eye. Cato learns this the hard way when slave catchers Patty Cannon and August Pullman come knocking and snatch everything that he has built for himself from under him. During this episode, we finally meet Frederick Douglass (John Legend) who was known to make his rounds, visiting abolitionist and sympathizers to the cause during this time. The same year Douglass visits Cato’s home in Philadelphia, John Brown visits Douglass’ home Rochester, New York where the two argue over Brown’s planned slave revolt and raid on Harper’s Ferry. In contrast, when Brown meets with Harriet Tubman that same year, she helps him recruit for the attack. Though Underground has not yet addressed it, Harriet Tubman and Frederick Douglass did not always see eye-to-eye. Although they led very different lives, Harriet Tubman and Frederick Douglass’ paths often ran parallel to one another. As a conductor on the Underground Railroad, Tubman often worked in secret while Douglass’ work can be more easily traced. And yet, they were both friends with abolitionist William Lloyd Garrison and abolitionist and women’s rights leader Lucretia Mott. Also, Tubman once used Douglass’ Rochester home as a station for 13 runway slaves, she’d helped to freedom before getting them on board a ship to Canada. Though Cato was not the only character at the center of this episode of Underground, his storyline was the most riveting this week. Still, everyone’s lives are on the verge of explosion. Georgia’s secret has been revealed. She’s been passing as a white woman, and the sheriff’s department has figured it out. People of color passing as white has long since been a part of our culture. Both 1934 and 1959’s Imitation of Life films are perhaps the most long-standing images of passing in popular culture. In the films, Peola and Sarah Jane, the young women who attempt to pass are destroyed in the end by their actions. Likewise, Georgia assures both Elizabeth and the audience that her decision to pass is not taking the easy way out. Elizabeth is still teetering the line between peaceful protest and violence, and it looks like she’s ready to dive headfirst into violence. Seduced by the defiance of John Brown’s men, she’s ready to ride and die for the cause, and she nearly does this episode. It’s clear that Elizabeth will not be silenced moving forward. In the meantime, Rosalee and Noah have finally been reunited. However, their reunion is bittersweet. Instead of telling Noah that she’s pregnant, Rosalee convinces him to accompany her on her journey down South to try and retrieve her mother, Ernestine, and brother, James. Elizabeth is horrified that Rosalee would put her unborn child in any danger, but Rosalee is determined. As the newly engaged couple head back to Georgia, we know disaster is probably on the horizon. Meanwhile, in South Carolina, Ms. Ernestine has let go of her addiction to the devil’s blood and Hicks, and she seems back to her old determined self. (At least for the time being.) She’s forged a relationship with Clara, who is looking to grasp some power of her own by bedding the young master of the Roe plantation. She turns to Ernestine for guidance. I’m not sure how any good can come of this, but Stine seems to think that Clara’s bond with the young master is her way off of the rice plantation. Things are certainly brewing on Underground. As winter draws near, we know that something big is just around the corner. Underground airs Wednesdays at 10 PM ET on WGN America. You may like Get The Essence Newsletter and Special Offers delivered to your inbox!
<urn:uuid:e61f1e78-a6f8-4207-b4a3-e9d6149955f6>
CC-MAIN-2018-39
https://www.essence.com/entertainment/underground-recap-whiteface/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158450.41/warc/CC-MAIN-20180922142831-20180922163231-00159.warc.gz
en
0.975381
1,328
2.78125
3
Scientists from the Higher School of Economics and University of Valladolid have developed a neural network that can predict corruption based on economic and political factors. The researchers, Félix J. López-Iturriaga and Iván Pastor Sanz, used self-organizing maps (SOMs), a kind of artificial neural network that aims to mimic brain functions, to predict corruption cases by detecting patterns within large amounts of data. They looked at data from actual cases of corruption cases in Spain, using the neural network to look at the probability of corruption cases in different time scenarios. The hope is that this will lead to anti-corruption measures that can be tailored “depending on the immediacy of such corrupt practices.” They published their results, “Predicting Public Corruption with Neural Networks: An Analysis of Spanish Provinces” in Social Indicators Research, showing that economic factors, particularly taxation of real estate, economic growth, increased house prices, and the growing number of deposit institutions and non-financial firms may induce public corruption. They also find that when the same party remains in power for too long they are more likely to become corrupt. Keep that in mind when voting in the 2018 elections.
<urn:uuid:6cb193f3-f1b5-47da-a2f3-a3721ba0851b>
CC-MAIN-2018-39
https://www.fastcompany.com/40513089/watch-out-congress-this-neural-network-can-predict-public-corruption
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158450.41/warc/CC-MAIN-20180922142831-20180922163231-00159.warc.gz
en
0.939247
251
3.09375
3
This according to a new thesis from Karolinska Institutet. “It’s a common misconception that fibromyalgia is a manifestation of mental problems,” says Karin B. Jensen, postgraduate at the Department of Clinical Neuroscience. “But in the studies that comprise my thesis, we’ve made careful measurements and have found no correlation at all between pain sensitivity in fibromyalgia patients and the degree of anxiety or depression they show.” In one of the studies presented in the thesis, subjects had both thumbs pressed hard enough for them to feel the same degree of mild pain as healthy controls. Using functional magnetic resonance imaging (fMRI), researchers could show that the subjects had the same level of activity in the parts of the brain that deal with emotions as well assensory information from the thumb, regardless of which group they belonged to. However, the subjects with fibromyalgia had lower activity in a brain area that inhibits the experience of pain. According to the team, treatment with drugs that work on the central nervous system (CNS), such as SNRI antidepressants, are effective against fibromyalgia. But this is not a question of treating depression but of other properties of these drugs. “The patients who had had their pain symptoms for the shortest amount of time were those that responded best to the drug treatments tested,” says Karin B Jensen. “This shows how important it is that fibromyalgia is detected and taken seriously as early in its development as possible.” Her thesis also confirms the existence of a relationship between genetics and pain regulation. Studies of healthy people revealed a relationship between a specific genetic variant and the effect of a morphine-like drug on repeated pain stimulation. The results suggest that the gene under study only affects the body’s pain regulating system in the presence of greater psychological stress. This knowledge, say the researchers, could one day make possible the development of customised medical treatments and thus better and more effective pain relief. Fibromyalgia affects about two per cent of the population, women more so than men. The disease involves the enhancement of pain impulses, leaving sufferers highly sensitive to pain, which is both chronic and diffuse. Previously, the causes of the disease were unknown, and there were no objective measurements of the way the CNS processes pain. This, in turn, made many sufferers feel misunderstood and mistreated by the healthcare services and during rehabilitation. Brain mechanisms in pain regulation, Karin Jensen, Department of Clinical Neuroscience, Karolinska Institutet. Supervisors: Professor Martin Ingvar and associate professor Eva Kosek. The thesis defence is scheduled for Friday 23 October 2009.
<urn:uuid:f451699a-2a54-4953-acfc-82bf1f79525e>
CC-MAIN-2018-39
https://www.healthcanal.com/brain-nerves/3741-early-treatment-of-fibromyalgia-more-effective.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158450.41/warc/CC-MAIN-20180922142831-20180922163231-00159.warc.gz
en
0.9625
548
2.953125
3
Democratic Theory Today: An Introduction April Carter and Geoffrey Stokes. Part I: Challenges to Democracy. Chapter 1: Democracy and Citizenship Geoffrey Stokes. Chapter 2: Democracy and Inequality Harry Brighouse. Chapter 3: Democracy, Citizenship and Gender Elizabeth Frazer. Chapter 4: Democracy and Group Rights John Kane. Chapter 5: Democracy and Nationalism Margaret Canovan. Chapter 6: Democracy and Indigneous Self-determination Michele Ivanitz. Part II: Theoretical Responses. Chapter 7: Deliberative Democracy Mark Warren. Chapter 8: Civil Society and Democracy Baogang He. Chapter 9: Associative Democracy April Carter. Chapter 10: Social Democracy Raymond Plant. Chapter 11: Transnational Democracy Anthony McGrew. Ian Shapiro, Yale University "The nearly one dozen essaysin this volume traverse the field in useful provocative ways. They not only help place the field in clearer focus, but make constructive contributions to ongoing debates...For the unintiated it will serve as a nice introduction to current debates. For scholars in the field it will serve as a useful map of where democratic theory now stands" James Johnson, University of Rochester - Provides a comprehensive and clear summary of all the major issues in democratic theory - Includes contributions from academics around the world giving perspectives from the UK, North America and Australia - Addresses issues that are not often approached in books on democratic theory for example indigenous peoples
<urn:uuid:c9a12dd5-dfa6-41d6-aae3-a8c1e61fdd3f>
CC-MAIN-2018-39
https://www.wiley.com/en-us/Democratic+Theory+Today%3A+Challenges+for+the+21st+Century-p-9780745621944
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158450.41/warc/CC-MAIN-20180922142831-20180922163231-00159.warc.gz
en
0.829945
298
2.609375
3
1 School of Psychology, Brayford Campus, University of Lincoln, Lincoln, United Kingdom, 2 School of Life Sciences, Riseholme Campus, University of Lincoln, Lincoln, United Kingdom AbstractWe investigated the presence of a key feature of human word comprehension in a five year old Border Collie: the generalization of a word referring to an object to other objects of the same shape, also known as shape bias. Our first experiment confirmed a solid history of word learning in the dog, thus making it possible for certain object features to have become central in his word comprehension. Using an experimental paradigm originally employed to establish shape bias in children and human adults we taught the dog arbitrary object names (e.g. dax) for novel objects. Two experiments showed that when briefly familiarized with word-object mappings the dog did not generalize object names to object shape but to object size. A fourth experiment showed that when familiarized with a word-object mapping for a longer period of time the dog tended to generalize the word to objects with the same texture. These results show that the dog tested did not display human-like word comprehension, but word generalization and word reference development of a qualitatively different nature compared to humans. We conclude that a shape bias for word generalization in humans is due to the distinct evolutionary history of the human sensory system for object identification and that more research is necessary to confirm qualitative differences in word generalization between humans and dogs. Editor: Anna Dornhaus, University of Arizona, United States of America Received: April 5, 2012; Accepted: October 10, 2012; Published: November 21, 2012
<urn:uuid:1b8078ee-f7b3-4a47-ba7e-42a4ae9f4437>
CC-MAIN-2018-39
http://cvamarosa.blogspot.com/2012/11/los-perros-aprenden-de-forma-distinta.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.920547
333
2.890625
3
The neural coding of spatial location for memory function may involve grid cells in the medial entorhinal cortex, but the mechanism of generating the spatial responses of grid cells remains ambiguous. the accurate coding of spatial location in the environment, ranging from the foraging behaviour of rodents to the sociable relationships of humans. Study in rodents and humans shows that the neural mechanisms for coding of space appear to include neuronal spiking activity of place cells in the hippocampus (O’Keefe & Dostrovsky, 1971; O’Keefe, 1976; O’Keefe & Nadel, 1978) and grid cells in the medial entorhinal cortex (mEC) (Fyhn and and the landmark signals entering the ventral mEC. Alternately, these might reflect the differential influence of input from different portions of the visual field, with dorsal mEC responding to features on the floor aircraft whereas ventral mEC responds to features on distal walls. Computing location from full visual images The model explained above simulated differential effects on grid cell firing field spacing used the comparable angle of pre\defined visual features, but there are also models that have tackled the use of more detailed visual images in traveling spatial reactions of grid cells. For example, a paper used a ray\doing a trace for formula to create images of a rat environment to travel the firing reactions of oriented Gabor filters that could travel an attractor model of grid cells (Sheynikhovich et?al. 2009). This specific simulation of visual input is definitely rare, but additional models presume that JIB-04 sensory input can provide a position transmission to periodically right Rgs2 the firing location of grid cells (Burgess et?al. 2007; JIB-04 Pastoll et?al. 2013; Bush & Burgess, 2014) or use halt feature extraction to drive grid cells (Franzius et?al. 2007). Recent work in our laboratory address the mechanism for generating a position transmission from visual input centered on earlier robotics work by Michael Milford (Milford, 2008; Milford & Wyeth, 2008, 2010; Milford et?al. 2010; Chen et?al. 2014). The performance of the visual input depends upon an appropriate Gaussian tuning width for detection of visual features that allows generalization between surrounding locations without overgeneralizing. In a recent model demonstrated in Fig.?4 (N. Raudies and M. Elizabeth. Hasselmo, unpublished), this position transmission was used as input to different models of grid cells, and the level of sensitivity of the models to external position noise was evaluated. A related analysis of level of sensitivity to external position noise was evaluated recently (Towse et?al. 2014). Number 4 The simulation of grid cells using a wave model that is definitely driven by the position transmission that in change is definitely retrieved from visual views Notice that the external position noise used in the model in Fig.?4 and the Towse paper differs from most earlier noise evaluations in grid cell models, in that external noise rather than internal noise and position noise rather than velocity noise were used. Internal noise causes problems for oscillatory interference models (Burgess et?al. 2007; Zilli et?al. 2009), but can become overcome by attractor characteristics (Burak & Fiete, 2009; Bush & Burgess, 2014). In contrast, both attractor dynamic models and oscillatory interference models possess difficulty in overcoming the external noise in a velocity signal because attractor characteristics overcome the noise of internal characteristics but not JIB-04 the noise on an input signal. The problem of external noise is definitely somewhat less severe when the noise.
<urn:uuid:5a22c802-2561-4dc3-8df8-2c8aae7883cd>
CC-MAIN-2018-39
http://researchhunt.com/2018/02/01/the-neural-coding-of-spatial-location-for-memory-function-may-involve/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.880713
738
2.53125
3
The AP Literature Free-Response Section - Yahoo Decor 0 ideas - A bibliography - Virginia Colleges » - Original Language: Everything in a piece of creative writing is subject to scrutiny, including word choice. Therefore it’s helpful to look closely at language. Is the writing fresh? Are there any obvious clichйs that detract from the piece? - Summer between Junior and Senior Year: Complete your first full draft over the summer between Junior and Senior Year! I know, I know no one wants to work during the summer, but trust me this will save you so much stress come the fall when you are busy with college applications and other IB internal assessments for your IB classes. You will want to have this first full draft done because you will want to complete a couple of draft cycles as you likely won’t be able to get everything you want to say into 4000 articulate words the first time. Try to get this first draft into the best possible shape you can, so that you do not have to work on too many revisions during the school year on top of your homework/college applications/work/extracurriculars/etc. - April 2017 (4) - Each process essay will require a different thesis depending on your particular topic or task. To develop your thesis, try to think about the central problem that you are trying to solve. Then, you’ll need to figure out how you plan to tell your reader to solve that problem. Those two ideas combined will form your final thesis. - communicate your ideas effectively in standard written English - When working with the literature you have selected for your research, you can mark the ideas or explanations you need with different colors or signs depending on what is more convenient for you and the materials you use (for example, a paper book or a downloaded article). By the way, if you have a draft plan of your paper, it could be really helpful to mark in which part or you would like to use this or that idea. - Most Popular Singers from the UK - The bible vs the Quran: what are the differences in teachings - College Essay Brainstorming and Writing Timeline for Rising Seniors » - Sign posted - Essay in 3 hours - Getting emancipated from parents as a minor - ► August (1) - Does leading an active social life have a bad influence on school performance? Working with a new set of cultures within a foreign community will be a challenge, but I also expect it to be a highly rewarding experience.You should only go with this option if you plan on taking advantage of the full computer-based practice test as well as getting your essays scored; otherwise, ScoreItNow! is the more cost-effective option for official GRE essay grading.If you find yourself supporting the proposal in the prompt, like that a right to avoid health risks is a more important freedom than the right to do whatever you want, then you just need to think of ways it would be positive.Today, I’ll share them with you, along with ways that http://ujang.me/how-to-write-an-academic-hardship-essay/ you can practice them. - Should women be allowed to serve in the army and take part in military campaigns? - Documents of the place and time in which they are made - If your topic allows that, it’s highly recommended to include charts and graphs. They will help the reader understand the issue a bit better without reading too much content. - ENL (US, GB, AU, CA) writers available. - What kind of job do you want to have? Give the reasons why. - 6. Write the body paragraphs - Am I involving the reader in my recount of the experience? Should my writing definition have more detail or is there so much detail that I run the risk of confusing my readers? - Second most important key point How to Format A College Essay: 15 Expert Tips 8 tips for great essay writing Another approach to this would be to choose a few of the above activities and expound on how you carried them out.However, this eventually leads to a decrease in the quality of life as the city can experience overcrowding, exorbitant property prices, and increased vulnerability to terrorist attacks.At the moment I am concentrating on task 1, but in the next 2/3 I’ll be adding lots of vocab for essays.Write a different essay for EACH of the schools you’re applying to. The highlighted sections in the following paragraph represent key phrases or words relating to this topic.Albert supercharges learning outcomes for students at all levelsSome essential paper writing tips include:It’s difficult to undo the damage caused by a lifetime of writing improperly. “Confusing moments in a work of literature are like a loose thread in a sweater: if you pull on it, you can unravel the entire thing.A topic sentence may or may not restate your thesis or position but always should state the paragraph’s central argument.We give you tips for writing scientific papers that will enable you to complete the papers without much trouble and much efficiently. - Informed Interest: Why College Application Supplements Are Important » - Follow instructions. Failing to follow instructions is easily the most common way students screw up when writing critical essays. Read the assignment instructions through carefully — twice! — and then if anything is unclear, ask your professor for clarification. - Do a detailed explanation of the problem with facts that show why it needs to be dealt with. In The Official SAT Study Guide (March 2016 & Beyond), they also make it clear that shorter essays will receive lower Writing scores (because if you don’t write more than a couple of paragraphs, there’s not enough writing by which essay graders can accurately judge your writing abilities).These are also sometimes called “storyboards.” Basically, the idea is that you want to brainstorm some ideas before they sit down to write so that you don’t just sit and look at the page.Interview the person.1 GRE AWA MODEL ESSAYS Topics in the following list may appear in your actual test. Once you have watched the movie, facing the act of writing might knock the wind out of your sails because you might be wondering how to write a film analysis paper.You need to utilize gathered information and the arguments you have decided to use and figure out how to express them in your analysis essay.This possibility of change is one reason not to aim for perfect writing in the first draft: no need to waste your efforts polishing something you might later cut out or revise.Write a Personal Testimonial About Yourself Once again, abgedankt (abdicated) is an example of the literary past tense (and an example of a word that you probably haven’t come across in your previous German studies!) This attribute of your work is crucial.Write an Argumentative Essay https://writemyessays24.com/write-my-term-paper/ by Virginia Kearney 3 Check with a dictionary for terms you don’t know.My image of myself in senior year. The points should descend in order from strongest argument to least supportive argument.Liked it.It was one thing to watch commercials asking for donations to help the unfortunate people in less developed countries, yet it was a whole different story to actually live it.It’s also causing some cherished forms of communication, like letter writing.Don’t think you have enough support? Don’t know where to add that extra sentence or two? Usually, I like to write down my extra sentences on the back of the exam book and make it clear where I wanted to add it. I realized that the one thing that this world needed more than anything was compassion; compassion for those less fortunate than us.If it is not, that can be a good way to start the article, by talking about your expectations before reading and then how you thought after reading.
<urn:uuid:832bbbc1-5e01-451f-9895-f551a556abe7>
CC-MAIN-2018-39
http://sales4startups.org/fatimi-estar/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.939653
1,667
2.671875
3
Viruses and Windows NT What Is a Computer Virus? "Computer virus" is a phrase that strikes fear into the hearts of both computer professionals and end users. What is a virus, and more importantly, how can it affect Windows NT? To define what a computer virus is, let's start with the definition of a common virus taken from the Oxford American Dictionary: "a very simple organism[el]capable of causing disease." If you extrapolate this to the computer world, you get a good definition of a computer virus: "a very simple piece of software code, written with the intent of causing system malfunctions." This is fairly generalized, but it is an accurate description for our purposes. Although today there are literally thousands of computer viruses, they have all sprung up in the last few years. It wasn't until the later half of the 1980s that computer viruses began to appear. Many of the first viruses were written as proof of concept, not always with ill intent in mind. How Do Computer Viruses Spread? Just as human viruses spread with contact, so do computer viruses. If you want to avoid catching a virus, you could simply hide out in your house and have no interaction with other people. Similarly, if you want to prevent any chance of your computer catching a virus, you can keep it from communicating with other computers by never connecting it to a network and never inserting a floppy disk or CD-ROM. But, quite frankly, that takes most of the use, and all of the fun, out of using a computer. Computer connectivity is becoming an increasingly important medium in our information-based society, and simply disassociating yourself is not a solution. How do viruses spread? I defined a virus as a simple piece of code that does unwanted and often malicious things. How does this code get into someone's computer? Usually this is accomplished by piggybacking onto another piece of useful, or good, code. For instance, you write a piece of virus code and then attach it to a game. Whenever the game is loaded, you have the viral code look around the hard drive for other programs. The code then copies parts of itself into the start-up routines of these other programs. Now these other programs are infected. Attaching a piece of viral code onto a piece of software that is otherwise attractive is a common method of distribution. To make matters worse, there are other ways of spreading viruses that many people don't know about. A piece of viral code can be stored anywhere where there are instructions that will be executed by a computer. This includes the boot record of a disk, as well as macro functions, including those in office automation applications such as Microsoft Office. The Myth of Viruses and Windows NT To set the record straight, Windows NT is not immune to viruses in any way. Too many people have to find this out the hard way before taking action. The misconceptions of NT's alleged virus resistance mostly come from exaggerated tales of NT's Hardware Abstraction Layer (HAL). The HAL prevents software routines from writing directly to hardware, thus making NT resistant to one of the more common techniques used by viruses to assist in their propagation. Also, because NT prevents one 32-bit application from accessing the memory space of another 32-bit application, Windows NT can prevent viruses that spread by loading into memory and then watching for other programs to load. To many people, that might sound pretty good. The problem is viruses that employ additional schemes in their pursuit of mayhem. Even hinting that NT might in some way be virus-proof gives people the wrong impression. As Windows NT Server and NT Workstation become more prevalent in the marketplace, so will the number of NT-specific viruses. What Is Protected in NT Server? When you talk about protecting Windows NT Server against viruses, there are actually two distinct roles that need to be addressed: NT as a file server and NT as a workstation. Most people use Window NT Server in some capacity as a file server. Even systems that also act primarily as applications servers usually play at least a minor role as a file server. Because most viruses infect files and are transmitted by accessing or executing an infected file, one primary duty is to ensure that NT Server is not used as a medium to transmit viruses. It is also important to understand the consequences of viruses passing through NT Server and how it's done. For instance, imagine you are connected to an NT Server from a Windows 95 client and your system gets infected by a virus called X. If the task of virus X is to propagate by infecting all executables on all mounted volumes, it might first infect your local hard disk and then move to volumes mounted from the NT Server. If you have write permission to any executables on the server, such as in a public region, the virus could infect those files. Then when someone else on the network accesses the infected files from the server, their computer could become infected as well. So the virus spreads. In this instance, the NT Server is merely a host to the virus, and the virus cannot harm the NT Server. However, because Windows NT Server can also be used as a workstation console to execute standard programs, you also have to worry about the possibility of infecting the server from the console. In this instance, you might install a utility on the NT Server console and not realize that the utility has been infected by a virus. Unlike the previous instance, you can actually harm the NT system itself. Additionally, depending on the rights of the user you were logged in as at the time of infection, the virus could infiltrate other files on the server. When a client accesses one of these infected files, it too could become infected. Thus the virus spreads. Types of Computer Viruses For these purposes, I classify viruses into five major types, based on the environment in which they were designed to function. They are MBR viruses, DOS viruses, Windows 3.x viruses, native Windows NT viruses, and macro viruses. In each of the sections, I address how the viruses in that area typically spread, and more importantly, how they could possibly affect Windows NT. Master Boot Record (MBR) Viruses The vast majority of viral infections come from boot sector viruses. These are pieces of viral code that attach themselves to the boot sector of a floppy or hard disk. This boot sector normally contains a small piece of code that is executed when the disk is booted. A boot sector virus typically spreads by attaching a copy of itself onto the boot sector of all currently mounted local diskssuch as your hard disk and any floppy disks. Additionally, the boot sector virus keeps a small piece of code resident in memory that is used to infect other disks that are inserted into the computer, thus spreading itself. The boot sector virus is loaded before any operating system code, and therefore can be considered operating system independent, running on any Intel-compatible system designed for running MS-DOS. However, there are problems with boot sector viruses and Windows NT. First, when you install Windows NT, it uses its own boot sector code, which differs from the standard DOS code. Most boot sector viruses expect a standard piece of boot code and make assumptions based on this expectation. The problem is when your NT system gets a boot sector virus and you try to boot your system. Depending on the virus, one of two things happens. If the virus actually makes radical changes to the boot sector (such as encrypting the partition information) when it passes control to Windows NT for the operating system to begin loading, NT loads a virtualized piece of code that continues the boot process. This differs from traditional DOS methods, where the operating system relies on BIOS-level calls, which the virus traps and then passes correct information back to the OS, enabling it to boot. However, because NT doesn't rely on these BIOS-level calls, the virus is cut out of the loop. Because the virus has altered the boot information, usually by encryption, NT is unable to continue the boot process and typically dies with a blue screen error message. The second kind of boot sector virus is similar to the first, except it does not actually make changes to the boot information. In this case, when NT begins loading, it completely ignores the viral code, because it uses its own virtualized code, thus rendering the virus impotent. Unfortunately, this kind of boot sector virus is less common than the previous. How can NT get infected by a boot sector virus? Typically, there are two ways to get infected by a boot sector virus. The first is by using an infected disk (usually a floppy disk) that drops the virus onto your system. However, when NT is alive, it cannot be infected in this manner because the infection process actually requires writing directly to the hardware, something that is disabled by NT's Hardware Abstraction Layer (HAL). The second way of spreading a boot sector virus is to boot a system from an infected disk. Unfortunately, this often happens because of a user's mistake. More often than not, a user works with a floppy disk, forgets the disk is in the drive, and restarts the system. If this disk is infected and the system reads the boot code, the virus is replicated onto your local hard drives, thus infecting your system. Because NT is not alive at this point, it cannot protect itself. To help guard against this, you might want to disable booting from floppy disks if your hardware supports such an option. Although MBR viruses account for the largest number of infections, they don't account for the largest number of viruses. DOS-based viruses actually make up the largest segment of the virus population. You can further split DOS viruses into two categories: those that load a portion of code into memory, where it can continue to infect other programs, and those that perform their functions only when they are executed. This distinction is made to identify what effects the viruses can have on Windows NT. The first group, which loads a memory-resident piece of code, was very effective under DOS and Windows 3.x. Because all applications shared a common memory space, which was fully accessible, a simple memory-resident virus could simply "hang out" and infect things at its leisure. This was often done by intercepting various DOS calls and manipulating them in some way. However, things work a little differently under Windows NT, so it is important to realize what can happen. Beginning with version 3.5, NT can run 16-bit programs in a shared address space with other 16-bit programs, or in its own 32-bit virtual DOS machine (VDM). By default, all 16-bit applications run together in a shared VDM. This means that a virus that loads itself as a memory-resident program can affect any other 16-bit application that runs in the shared memory space. However, the virus is completely unaware of any 32-bit processes that are also running on the system and is completely unable to interfere with their operation. Additionally, if you run all 16-bit applications in their own memory space, a virus of this type cannot do its job properly. However, the situation is a little different with the second type of virus. This other kind of virus typically sits attached to a seemingly normal program or utility and spreads itself, or performs unwanted actions, only when you run the utility. These are often referred to as Trojan horse viruses. Although you can have viruses that work in a combination of these two ways, typically virus writers focus on one or the other distribution methods. Very often these viruses perform some sort of direct file manipulation. This takes the form of either corrupting data on the system or replicating its viral code onto other executable files, further spreading the infection. NT is very susceptible to this kind of attack. The main way to limit the impact of this kind of attack is to make sure you never use unknown programs when you are logged on as an administrative user. More importantly, you should limit the kinds of actions you perform at the server's console and limit the access you grant people from the network to the minimum level required. Additionally, you should be sure to install a good virus-scanning program to help watch for these kinds of viruses. See the section, "Commercial Virus Detection Packages," later in this appendix for information on choosing an appropriate virus detection program. Windows 3.x Viruses (16-Bit) Several viruses out there are targeted for the Windows 3.x environment. Most of these work at least partially, even under Windows NT. This is because NT offers many services that provide down-level compatibility with Windows 3.x. For the most part, these viruses are limited in the same way as the DOS viruses mentioned in the previous section. Windows 3.x viruses can directly affect only other 16-bit programs running in the same VDM. However, the virus can still alter data, as long as it doesn't try to do so by directly writing to the hardware, and the current user has access permissions to modify the file targeted by the virus. Native Windows NT Viruses (32-Bit) As of this writing, there are no known viruses that specifically target Windows NT. This could mean either that none have yet been written or that someone has written and released one that was unsuccessful in propagating itself in the outside world. A virus targeted for Windows NT could take many forms, including a device driver, a dynamic link library (DLL), or a standard executable. Because all these forms contain code segments that get executed, often by the operating system itself, infection through one of these avenues could spread rapidly. From the server standpoint, it makes sense to set rules and limits as to who can log onto the server's console and what kinds of actions are permitted from the console. Remember, simply denying that NT can become infected does nothing but increase the likelihood that you will become infected. Macro viruses are the fifth type of virus I discuss here. Until recently, the macro languages included with most applications were not powerful or robust enough to support writing an effective virus. However, many of the more advanced applications that are being developed today include built-in programming capabilities that rival some of the larger development packages. This has recently been demonstrated by the various strains of Microsoft Word viruses, including the so-called Word Concept and Word Nuclear viruses. These viruses transport themselves through Microsoft Word documents. When opened in Word, they perform various actions, including spreading themselves into the user's installation of Word, thus preparing to infect all future documents on the system. An additional concern is that macro viruses can be cross-platform. The Word Concept virus has the claim to fame of being the first prominent cross-platform virus, because it can infect both Windows and Macintosh systems. Because most application macro languages support passing execution to an external shell, such as COMMAND.COM or CMD.EXE, the power of the macro virus is not limited to the constraints of the macro language itself. Additional Ways to Protect Against Viruses Using a good anti-virus package is a defense against viruses. However, there is always the possibility that somehow a virus can sneak past your defenses. Following are some ways you can help reduce your risk of infection or help recover your data if your system does get infected by a virus. Perform Regular Backups One of the best ways to help protect your system against viruses is to implement an effective backup solution. No matter what kind of virus detection software you use, there is always the possibility that a virus could go undetected and you could lose all your data. By incorporating a virus protection strategy into your backup plans, you have a much greater chance of recovering your data if a virus does penetrate your server. When planning for this contingency in your backup strategy, here are a few points you should note: - Remember that most viruses (with the major exception of MBR viruses) live inside standard files. When you back up these files to tape, the virus tags along for the ride. This means that when you restore it from tape, the virus is restored as well. If you are recovering from tape after suffering a viral invasion, you should always check your system to make sure you are not re-infecting it. - Make sure you don't recycle your tapes too often. Some people use simple tape rotation strategies where they use the same tapes each week. This can be dangerous if your files do get infected by a virus. Depending on the type of viral infection, you might not discover the infection for weeks, or even months. By then, the virus might have caused irrecoverable damage. For more information about backing up your system, refer to Chapter 23. Create an Emergency Boot Disk If your system is successfully attacked by a Master Boot Record (MBR) virus, NT most likely cannot boot. (For more information about why this is, see the earlier section on MBR viruses.) If your MBR is infected by a virus, you can use an emergency boot disk to get Windows NT up and running. Once NT has begun the boot process, a boot sector virus cannot cause any further damage. I repeat for emphasis: A boot sector virus cannot cause any further damage once NT is booted. This sentence pertains to boot sector viruses only. Other types of viruses can continue to cause further problems, even after NT has booted. Although this gives you the ability to get NT working again, and potentially keep it working until a more convenient time when you can take it down to remove the virus, you should remove the virus as soon as possible! After you have successfully booted NT with the emergency boot disk, you should back up the system before trying to remove the virus. Please see Chapter 23 for more information on creating an emergency boot floppy disk for Windows NT Server. Keep Your Emergency Repair Disk Updated Remember that the Emergency Repair Disk contains the most important files that give a unique identity to your NT system. It contains parts of the boot system, as well as key components of the Registry. If your system is attacked by a virus and rendered unable to boot properly, having an up-to-date Emergency Repair Disk is invaluable for getting your system back up and running. Use the RDISK.EXE program to update your Emergency Repair Disk or to create a new one. For more information on creating and using the Emergency Repair Disk, refer to Chapter 23. Remember, there is a difference between the Emergency Repair Disk and the emergency boot disk referred to in the previous section. The emergency boot disk contains the key components that enable NT to begin the load process and then hand off control to the appropriate NT installation on your system. It does not contain any of the key registry components that could be useful in reconstructing a corrupted system. This disk is useful if somehow the bootstrap information cannot find a valid NT installation where it expects to. In contrast, the Emergency Repair Disk is not a bootable disk. To use it, you must boot with the NT installation disk set and choose options to recover your system. This disk is invaluable if your NT installation itself is somehow corrupted. Using NTFS along with properly implemented security settings can help stop the spread of viruses. NTFS enables you to restrict a user's access to a single file or directory. This restriction is enforced if the file is accessed from the network or if it is accessed locally. However, NT cannot prevent access to FAT or HPFS partitions from the local system. Additionally, when accessing HPFS and FAT volumes from a remote system, access restrictions can be assigned only for the entire share at a time. If a user needs to write to a single file on the share, the whole share must be created with write permissions for that user. If you use NTFS, you can restrict a user's write access to all the files expect the one he or she needs to be able to write to. Log On with an Unprivileged Account If you want to protect yourself as much as possible from potential Trojan horse viruses, do not use a privileged user account for your day-to-day work. If you execute a Trojan horse virus, the virus has the same level of user privileges as you do. If you have administrative privileges, so does the virus. However, if you are using an unprivileged account, the virus's actions are more limited. For instance, if you were using a privileged account, the virus could potentially create a new user and grant it administrative rights. This account could later be used to further infiltrate your system. If you weren't using a privileged account, the virus could not have performed these actions. If you must use a privileged user account, never run anything other than the standard administrative utilities or other utilities of known origin that you are sure you can trust! Warning: It's easy to write a WordBasic or Visual Basic macro that can make changes to the NT user database, so be careful about even opening seemingly innocuous files in Microsoft Word or Excel. To help protect yourself, you might want to use the Word Viewer or disable automatic macro execution in any program that supports macros. Potential New Viruses Unfortunately, the future promises more viruses, not less. With the number of computers increasing every day, as well as the increasing penetration of computers into the corporate environment, viruses will become the preferred method of espionage and revenge. More powerful multiplatform development tools, as well as prebuilt virus templates, make it easy for anyone with minimal knowledge to create a computer virus. Additionally, as you automate your computing environment through the use of macros, interactive online environments, and more complex personal agents that make your life easier, you also open yourself to new outside threats. Commercial Virus Detection Packages Unlike MS-DOS and Windows 3.x, Microsoft does not ship Windows NT with any type of anti-virus software. To make matters worse, until recently very few virus packages supported Windows NT. Fortunately, many vendors have come forward to help fill that gap. Today, several virus packages support Windows NT. How to Evaluate an Anti-Virus Package Before deciding what anti-virus package you want for your system, you should ask yourself a few questions to make sure you get a package that best fits your needs. When evaluating a virus package for Windows NT, here are some questions you will probably want to ask: - Is it a native Windows NT program? Ideally, you want a package that was made specifically for Windows NT. Some 16-bit Windows- and DOS-based virus scanning packages run on Windows NT, with varying degrees of success. Make sure your package was specifically made for NT. - Does it run as a service? What you really want is a virus detection engine that installs itself as a Windows NT service. This allows greater flexibility when configuring your system. If it does not install as a service, you need to leave a user logged onto the system for the virus scanner to run. - Is it intended for workstation or server operations, or both? A package that provides both gives you the most security. What does this really mean? Windows NT Server is actually providing you with two functions. Its primary function is to provide file services for users on the network. You want a virus solution that constantly scans files as users access them from the network. Many virus products enable you to adjust the level of scanning separately for incoming and outgoing files, as well as specify what actions should be taken if a virus is discovered. The second function of NT Server is that of a workstation. You want a virus scanner that helps protect you when you log onto the NT Server console. Ideally, it automatically scans any disks you insert for viruses, as well as scanning any programs you run to ensure they are virus-free. Remember what I talked about earlier: If you're logged on as the administrator and run a program, if that program is infected with a virus, the virus is running with administrative privileges! - How does the licensing work? Some virus scanners for NT make you pay a fee for each server you run it on. However, some also have additional costs per workstation that accesses the server. Make sure you understand and are willing to abide by the virus maker's pricing policy before choosing to go with their package. Remember, good virus protection can be costly! - How is the virus scanner going to impact the rest of your system's security? Make sure you understand what permissions the virus scanner needs to do its job. Most virus scanners that install as an NT service create a special user account for their use. Find out what privileges this account needs and how this will impact the security of your system. - What kind of viruses does this package protect against? Most of the virus protection vendors are fairly diligent about updating their software to detect the latest viruses. However, you need to understand the limitations of what it will not detect. For instance, many vendors still do not detect macro viruses, such as the cross-platform Word Concept virus that infects Microsoft Word documents. Also, many of the packages do not detect Macintosh viruses. If you are using NT Server to provide file services to Macintosh clients, you want to make sure to choose a package that provides support for Macintosh viruses. - What kind of support and service will you get? You want to look for a company that has a history of providing quality Windows NT software. Additionally, you should choose a company with a track record of regularly updating their virus detection database. - What processor platforms does it support? If you are using non-Intel platforms to run NT Server, make sure your platform is supported. You might be surprised how many work only on the Intel platform. A List of Available Virus Protection Software for Windows NT Following is a list of some of the more common packages on the market with Windows NT support. The level of functionality between the different products varies greatly, so use the questions listed here as a guideline when evaluating these packages for your use.
<urn:uuid:617c8c44-50eb-496c-b6d1-b78368daa441>
CC-MAIN-2018-39
http://softlookup.com/tutorial/WINNT/wsuxbfi.asp
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.950837
5,305
3.3125
3
THEOSOPHY, Vol. 31, No. 5, March, 1943 (Pages 205-209; Size: 16K) (Part 2 of 2) COMPROMISE IN SCIENCE AND RELIGION ANOTHER phase of the transient unity between science and religion in the early nineteenth century is represented by the Deist philosophy of the Founding Fathers. This is of importance today, when popular writers like Walter Lippmann and Dorothy Thompson are claiming that the classical and religious background of the great first Americans is lacking from present-day culture. These sentiments are occasionally echoed by spokesmen for the back-to-religion movement. But it is seldom noted, as Harry Elmer Barnes remarks in his History and Social Intelligence, that "the majority of distinguished Americans in the generation of the Fathers were not even professing Christians." Dr. Barnes quotes from a sermon printed in 1831, in which the Rev. Dr. Wilson deplores the fact that most of the founders of our country were "infidels," and that "of the first seven presidents not one of them had professed his belief in Christianity." Citing Remsburg's Six Historic Americans, Dr. Barnes justifies the preacher's plaint that "God had been deliberately excluded from the origins of our government":. . . the Constitution was framed and God was neglected. He was not merely forgotten. He was absolutely voted out of the Constitution. The proceedings, as published by Thompson, the secretary, and the history of the day, show that the question was gravely debated whether God should be in the Constitution or not, and after a solemn debate he was deliberately voted out of it. . . . There is not only in the theory of our government no recognition of God's laws and sovereignty, but its practical operation, its administration, has been conformable to its theory. Those who have been called to administer the government have not been men making any public profession of Christianity. Washington was a man of valor and wisdom. He was esteemed by the whole world as a great and good man but he was not a professing Christian.The Founding Fathers were really the inheritors of the Deist tradition that gained currency during the seventeenth century. One of the more important Deists of this earlier period, John Toland, wrote of the practice of the ancient philosophers "to set forth an exoteric and an esoteric teaching, of which the former was intended for the general public, but the latter only for the circle of initiated disciples." (Lange, History of Materialism I, 324.) In his treatise, Clidophorus, the "key-bearer," he says: "I have more than once hinted that the External and Internal Doctrine are as much now in use as ever; tho' the distinction is not so openly and professedly approv'd as among the Antients." This is not to suggest that Washington was of necessity a believer in Toland's views, but simply to show the quality of Deist thought, which is present also in the great deists of a century or more later. Deism, like Emersonian idealism, was fated to give way to the externally more impressive "proofs" of scientific materialism. The synthesis of the nineteenth century was inadequate to the heavy artillery of men such as Darwin and Huxley, or, to be more accurate, to the unceasing sniping at metaphysics and moral philosophy which raised to prominence the lesser minds who transmitted evolutionary theory to the masses. Today, while a world-wide social cataclysm rages about their heads, the serious men of the age are desperately trying to devise a philosophy that will give them the faith to go on and to hope for better days. Urged on by the terrifying catharsis of war, the weaker of the scientific fraternity are opening the door to traditional religion, on the theory that we must have some stabilizing influence. The Catholics, of course, are saying "I told you so," and insisting that they have had the solution all along. The enlightened men of religion, however, are more cautious, at the same time more conscious of the extremity of the situation. Some thoughtful criticisms of "Our Moral Chaos" are provided by Willard L. Sperry, Dean of Harvard Divinity School. His first comment is on the war:We have probably outgrown the idea of "holy wars," though a decently good conscience is still morally necessary to the waging of a war. Victorious self-righteousness is likely to make a bad peace. From a religious standpoint, it is almost impossible to see how any new world is ever to be set up if the self-righteousness of great states is allowed to persist undisciplined. The world of politics can hardly afford to say these things; the world of religion cannot afford not to say them.In this statement of a leading Christian there is quite a step of progress. Historical research has shown that Christians were most persistent of any of the groups demanding the conquest of the Philippines in 1898, on the ground that by taking these South Pacific islands Americans could better carry to the natives the truths of Christ! Similarly, President McKinley, after a night spent in pondering the problem of whether or not to seize the Spanish possession, announced that God had instructed him to go ahead. Today we see where the march of Christian progress has led us. Fortunately for their own Karma, protagonists of Christianity no longer ask for bayonets to clear the way for the process of conversion. After developing the weaknesses of scientific positivism as the source of ethical guidance, Dr. Sperry proceeds:If there is any single conclusion to be drawn from our present dilemma it is that morality alone cannot make a religion, and that behind any ethical system that is to have a religious quality about it there must be an act of faith and a body of beliefs. The way we behave is determined by judgments of value that we pass on the world and on our own experience, and by some long-range guess as to the meaning of life. Those of us, therefore, who hoped forty years ago to keep the ethics of Jesus and to let his "religion" go were wrong. That apparently cannot be done. The reason for behaving in the ways that Jesus proposes, and beyond that, the actual ability to behave thus, are derived from the belief that there is a God. It is said, "One is your Father and all ye are brethren." We tried to realize the second of these propositions in neglect of the first. It begins to look as though we should have to go back to the major premise if we expect the ethics of Jesus to work.It is at this point that Julian Huxley enters a strenuous objection. The analysis, in the abstract, is accurate enough. In theosophical terms, without the first Fundamental Proposition of The Secret Doctrine, brotherhood is an idea without any substantial support. Further, without any teaching at all concerning the destiny of the soul, and the nature of immortality, there is no real reason for morality. As Mr. Judge wrote years ago in The Ocean of Theosophy: "For alone in reincarnation is the answer to all the problems of life, and in it and Karma is the force that will make men pursue in fact the ethics they have in theory." He adds: "It is the aim of the old philosophy to restore this doctrine [reincarnation] to whatsoever religion has lost it; and hence we call it the 'lost chord of Christianity'." But will Dr. Sperry recognize its ancient harmony, realize that Reincarnation, and not God the personal Father, is what modern ethics, Christian or otherwise, needs in order to survive the ravages of scepticism and lip profession? The learned Dean is urbane, pleasantly sophisticated, wisely tolerant, but "God the Father" still entrances his otherwise thoughtful mind. Like so many other good men, he probably has never given any serious thought to alternative possibilities. There is wisdom in much of what he writes:The world will never get its moral universals back until it again finds something like a religious faith. Of course man cannot compel himself to believe this or that article of faith by a fiat act of his will, but he can, at least, put himself in a believing attitude toward things. He can refuse to be contentedly agnostic. That, after all, is what has been wrong with modern man, not his agnosticism -- for there is a strong strain of agnosticism in every religion -- but his complacent contentment with that agnosticism. Job came to the point when he decided to give up bothering his head about the mystery of life and the world. But just when he had reached this comfortable solution of his difficulties, the Lord spoke to him out of a whirlwind and told him to stand on his feet and answer like a man. It rather seems as though out of the gales of modern history a voice were trying to say the same thing to us.The analogy of Job is a pertinent one, for if, as H. P. Blavatsky wrote, the book of Job is a treatise on Initiation, the world of today stands on the threshold of another epoch of Manasic(1) life, and, like Job, is being tossed by the whirlwinds of the trial which must precede a new awakening. The transition age is upon us, and like Job, the time has come for us to choose a philosophy of life that has truth in it -- to choose, or, as always happens to the lukewarm, the apathetic and the careless, to be destroyed. Another important problem is raised and faced by Dr. Sperry:Ethically our situation is even more difficult. All great world religions have, in their moral regimens, a strong strain of world denial or world renunciation. This negative quality has been, as a matter of fact, the fulcrum by which they have proposed to move history. But the natural man tends to world affirmation. How to square these rival ethics is a stubborn riddle -- perhaps an insoluble riddle. But it cannot be shirked.Nor has it been shirked -- by Theosophy. A Theosophical Teacher has written:Why has that struggle ["the struggle for life"] become almost the universal scheme of the universe? We answer: because no religion, with the exception of Buddhism, has taught a practical contempt for this earthly life; while each of them, always with that one solitary exception, has through its hells and damnations inculcated the greatest dread of death. Therefore do we find that struggle for life raging most fiercely in Christian countries, most prevalent in Europe and America. It weakens in the Pagan lands, and is nearly unknown among Buddhist populations (THEOSOPHY X, 70).The "world affirmation" taught by Theosophy is found in the Kwan Yin Pledge -- never to seek escape from the world at the expense of our brothers, but always to seek to make the world a better place for them, that they may learn all the lessons that life holds. That is the positive acceptance of life here by Theosophy -- resolution of the ethical dilemma inevitably confronting all religions which teach personal salvation as the highest good. Humanitarians cannot accept such a religion, and in default of anything else they become materialists. Dr. Sperry concludes by appeal to the Emersonian theory that every reform was first an idea in the mind of a private individual. He urges that thoughtful men form "cells" in their communities, to attempt to work out some religious solution by actually testing their ideas in practice. This, again, is what Theosophists have always maintained to be the only way for social reforms to be accomplished, and their study groups and meetings have for years been carrying out this part of Dr. Sperry's program. . . . Not in behalf of a Christian revival, however, but toward the rebirth of the Wisdom-Religion in the hearts of men. We may be thankful for such men as Julian Huxley and Dr. Sperry. The one clearly perceives the religious need of the world, the other as clearly sees the danger in that great vice of religion, the personal God idea. It is natural, in a transition age, that the leaders of society should present unresolved conflicts in their best thought, and a unity before the time of natural ripening of the cycle would be a specious compromise by both. When scientists acknowledge the soul and its immortal life, and when theologians bid goodbye forever to the "heavenly father," then may we hope for a Religion of the Future, founded on the teachings of Theosophy. Meanwhile, the trends of thought on both sides of the controversy need to be examined for both the good and the evil in them, lest the world be betrayed by their weaknesses, or, on the other hand, ignore entirely the values that are slowly emerging. COMPILER'S NOTE: The following is a separate item which followed the above article but was on the same page. I felt it was useful to include it here: POLARIZATIONS OF RELIGION Theosophy, on earth, is like the white ray of the spectrum, and every religion only one of the seven prismatic colours. Ignoring all the others, and cursing them as false, every special coloured ray claims not only priority, but to be that white ray itself, and anathematizes even its own tints from light to dark, as heresies. Yet, as the sun of truth rises higher and higher on the horizon of man's perception, and each coloured ray gradually fades out until it is finally re-absorbed in its turn, humanity will at last be cursed no longer with artificial polarizations, but will find itself bathing in the pure colourless sunlight of eternal truth. And this will be Theosophia. The Adepts and Modern Science ONE (1) FOOTNOTE LISTED BELOW: COMPILER'S NOTE: I added this footnote; it was not in the article. If it doesn't paint an accurate enough picture, or is incorrect, I hope the Editors of THEOSOPHY magazine will spot it and point it out to me, so that I can make the necessary corrections. (1) "Manas" means Mind. Back to text.
<urn:uuid:36188e96-5d3c-46f7-85aa-f71206fc55d8>
CC-MAIN-2018-39
http://wisdomworld.org/setting/compromisetwo.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.969005
2,943
2.796875
3
Our schools today have an understandable focus on teaching knowledge to achieve improved examination results. The academic demands on all children, the growing gap between Pupil Premium and Non Pupil Premium children, means the pressure is higher than ever for students and teachers alike. In today’s fast moving world of technology, more negative pressure is put on children and young adults from social media sites with the persisted need to ‘fit in’. From an early age children are noticeably struggling when facing setbacks, having fixed-mindsets about what they can and can’t achieve and in a ‘get famous / rich fast’ thinking world, there is a general lack of resilience, and self-esteem when ideas and dreams do not materialise. However, learning non-academic factors such as resilience and empathy, growth mind-set and emotional-control can also have a profound impact on our children’s success beyond school. With an understanding that whatever background you come from, whatever learning difficulty one might be supporting – with a good sense of self esteem and positive thinking, perseverance and tolerance of others, one can achieve their goals. “My class thoroughly enjoyed the BEST workshops. Vicky and Julia explained the workings of the brain in language that my Year 1 children could understand. They gave the class strategies to work on during the week such as ‘sitting like a frog’ for calming down. The class loved the games that we played which really encouraged good team work within the class. I’ll definitely use them again with my next class!” Year 1, Teacher. “This was a great lesson, I really liked their acting of the feelings and linking it to fight/fright and frustration. The idea of understanding our frustration and anxiety was excellent as this is part of the challenge in our class.” Year 3, Teacher.
<urn:uuid:14a0fac8-c82e-4332-9c81-67855590f260>
CC-MAIN-2018-39
http://www.best4learning.co.uk/schools/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.960863
386
2.953125
3
Welcome to www.ecolandscapes.ie The website aims to provide guidance on development sites, e.g. housing estates and road developments, which contain native habitats in order to maximise and enhance the protection of existing habitats, and enhancing the potential to create stepping stones and corridors for wildlife within the landscape, i.e. habitat connectivity. Information is also provided on how to create suitable planting schemes to create wildlife habitats on brownfield sites, e.g. industrial estates. Details of relevant legislation, policy and standards for the protection and management of native habitats and vegetative elements such as trees and hedgerows during construction is provided. Vegetation clearance resulting in habitat loss is one of the main impacts which occurs as a result of new developments. The timing of site clearance works and the sensitive removal of vegetation is critical in order to protect native mammals, bats and birds and minimise negative impacts on them. The strategic layout of street lighting is also necessary to avoid negative impacts of light pollution on wildlife. In relation to landscape maintenance, best practice measures which maximise the development of sustainable long-term planting schemes which require minimal input and maintenance is also provided.
<urn:uuid:4068db46-b2d1-4872-a447-13c01031fe99>
CC-MAIN-2018-39
http://www.eco-landscapes.com/local-authorities
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.897224
239
2.609375
3
According to the American Veterinary Dental Society, 80% of dogs and 70% of cats have oral disease by the age of 3. It is the most frequently diagnosed health problem in pets. Common signs of oral disease include tartar buildup, red and swollen gums, bad breath, changes in eating or chewing habits, pawing at the face and generalized depression. A veterinarian should evaluate your pet’s dental health at least once a year. We recommend this because bacteria and food debris accumulates around a pet’s teeth and, if left unchecked, will lead to deterioration of the soft tissue and bone surrounding the teeth. This decay results in irreversible periodontal disease and even tooth loss. There are other reasons why you should pay close attention to your pet’s dental health. Dental disease can affect other organs in the body: bacteria in the mouth can get into the blood stream and may cause serious kidney infections, liver disease, lung disease, and heart valve disease. Oral disease can also indicate that another disease process is occurring elsewhere in a pet’s body. A physical exam combined with appropriate laboratory work can determine if this is the case. At Blue Ridge Veterinary Services, we are particularly vigilant about monitoring for and treating dental disease. We have seen many pet’s lives literally changed by proper dental care. Our clients will call us with comments like, “My dog is acting like a puppy again!” If we have recommended dental care for your pet, but you have concerns about the procedure, anesthesia, recovery time or ability to eat if teeth are lost, call one of our staff members. We can discuss the options you have that will address your concerns, such as alternative anesthesia or speeding recovery time with laser therapy.Also see our articles on Dental Disease in our pet care section.
<urn:uuid:e7151aa1-82d1-4b3b-8171-19650d638770>
CC-MAIN-2018-39
https://blueridgeveterinaryservices.net/service-category/small-animal-services/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.940447
371
3.0625
3
One of the mysteries of the English language finally explained. A silvery freshwater fish of the carp family, which is fished commercially in eastern Europe. Leuciscus idus, family Cyprinidae. See also golden orfeAlso called ide - ‘The same lake is also good for mixed nets of ide and orfe with fish to 2lb.’ - ‘Plenty of small ide, orfe, carp and tench are keeping anglers active with one visitor from Leeds complaining that he did not have time to eat his butties.’ - ‘He bagged two double figure carp plus scores of orfe, ide and tench for his winning net of 46 lb 14 oz.’ - ‘This is well stocked with a good head of roach, rudd, tench, bream, carp and orfe.’ - ‘The big main lake in front of us has nearly eight hundred carp plus some orfe and tench.’ - ‘We had clearly arrived at the wrong time to catch a record orfe.’ Late 19th century: from German; perhaps related to French orphe, Latin orphus, and Greek orphos ‘sea perch’. In this article we explore how to impress employers with a spot-on CV.
<urn:uuid:1dd7bd69-12bd-45bb-989c-3d50cb311568>
CC-MAIN-2018-39
https://en.oxforddictionaries.com/definition/orfe
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.964697
285
2.625
3
ERIC Number: ED539010 Record Type: Non-Journal Publication Date: 2006-Oct-9 Reference Count: 0 Role of Zero in Grading. Research Brief Education Partnerships, Inc. What is the role of "zero" in grading? According to several authors, giving students a zero lets them too easily off the hook, seldom serves as a motivator for them to do better and is not an accurate reflection of what has been learned. While students do need to be responsible and accountable for their work, assigning a zero skews the grade and it tends to be inaccurate. An equitable distribution would make the grade more appropriately representative of what a student had learned. Typically grade spans are 100-94=A, 93-84=B, 83-73=C, 72-64=D, 63-0=F. If using letter grades, an "F" equates to a 0. The literature suggests that it should be a 1.0 not a zero. According to several articles, each mark should have an appropriate influence on a student's grade. Some schools and districts are exploring recording a 50 or 60 in lieu of an "F" or "0" because then it helps make the spread more equitable. An example of scoring in the Olympics was cited where the high and low scores are thrown out so that one judge is not in control of the results (Policies work against standards). A zero plays the role of the judge that is in total control of the outcome of the grade. Faculty should discuss and agree upon the following when establishing a grading policy: (1) learning goals of the school; (2) the purposes of grades; (3) factors that should be included when grading; (4) the role of zero and how lack of achievement will be assessed and recorded; (5) weighting of grades; (6) ways in which to document student progress; (7) how feedback will inform the instructional program; (8) programs that will assist students and help them become responsible for their own learning; (9) communication with students and parents about the school's grading policy and expectations; (10) define and develop meaningful assessments; and (11) periodic reexamination, assessment and modification of the grading system. A list of resources is included. Descriptors: Student Evaluation, Grades (Scholastic), Grading, Feedback (Response), Scoring, Academic Achievement, School Policy, Definitions Education Partnerships, Inc. Web site: http://www.educationpartnerships.org Publication Type: Reports - Descriptive Education Level: N/A Authoring Institution: Education Partnerships, Inc. (EPI)
<urn:uuid:5105ac14-2fce-4768-8073-14e2efa6dd14>
CC-MAIN-2018-39
https://eric.ed.gov/?id=ED539010
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.932454
555
3.28125
3
Knowing the type of hearing loss is necessary in order to provide proper treatment.Hearing loss is normally divided into two categories: conductive hearing loss vs sensorineural hearing loss , depending on where in the ear the hearing loss originates. You can also have a mixed hearing loss which is a combination of the two. If you suspect that you have a hearing loss, or if there are a physical or medical conditions of the ear that cause concern, a hearing test can be made.
<urn:uuid:f5ccc528-d13f-468b-b5e0-2f60c3da53f4>
CC-MAIN-2018-39
https://global.widex.com/en/hearing-loss/types-of-hearing-loss
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.93308
103
2.65625
3
Erie Canal (NY) (Images of America) - Publish Date: 2001-08-01 - Binding: Paperback - Author: Martin Morganstein and Erie Canal Museum;Joan H. Cregg;Erie Canal Museum The building of the Erie Canal was the engineering marvel that unleashed the growth of the young nation that was the United States. Spearheaded by the vision of Gov. Dewitt Clinton, New York State built the waterway that opened the West to settlement and made New York City the center of finance and commerce. Opened in 1825, the canal proved so commercially viable that construction of an enlarged Erie Canal began just eleven years later. The success of the canal spawned the growth of cities, towns, businesses, and industries along its route in upstate New York. Erie Canal takes you on a ride through the heyday of the old Erie Canal. You can swim with the Volunteer Life Saving Corps as they sharpen their skills, view images of mule-drawn boats wending their way through scenic countryside, and marvel at the engineering of the bridges, aqueducts, and locks that facilitated the functioning of the canal. Erie Canal travels a step back in time and illuminates the people whose lives were shaped by the canal.
<urn:uuid:7870e3ca-6608-4643-a8b0-470db0d609ad>
CC-MAIN-2018-39
https://greenwaybooks.com/products/9780738508696-0738508691-erie-canal-ny-images-of-america
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.954471
259
3.25
3
What Are the Most Common Sarcoma Symptoms? Because sarcoma can start in several different parts of the body, symptoms are not always the same from one person to the next. For instance, sarcomas that develop in the bones or soft tissues of the arms can produce vastly different symptoms than those that develop in the abdomen or legs. Sarcoma and lumps When sarcomas develop, the tumors can sometimes be seen beneath the skin. Small, painless lumps or swollen areas – especially those that grow larger with time – can be a sign of sarcoma. However, lumps can also be noncancerous, so it’s best to consult with an experienced physician who can order a biopsy, or tissue test. It’s also important to remember that not all sarcomas cause lumps. Those that develop in certain parts of the body, such as the uterus, are almost never visible outside of the body. Site-specific symptoms of sarcoma Depending on where in the body a sarcoma develops, it can cause certain site-specific symptoms, such as: - Vaginal bleeding and abdominal pain, for those that develop in the uterus - Chest pain and difficulty breathing, for those that develop in the heart or lungs - Constipation or discolored stools, for those that develop in the bowels - Difficulty walking, for those that develop in the legs If you experience unusual symptoms such as these, it’s normal to be concerned. But, you don’t have to spend time worrying. You can have your symptoms professionally evaluated at Moffitt Cancer Center, where our specialized Sarcoma Program offers comprehensive diagnostic services and treatments in one location. For more information, call 1-888-663-3488 or submit a new patient registration form online. You do not need a physician’s referral to request an appointment.
<urn:uuid:8c40278b-62ca-41cc-8359-b1af6cdb32ca>
CC-MAIN-2018-39
https://moffitt.org/cancers/sarcoma/faqs/what-are-the-most-common-sarcoma-symptoms/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.913796
396
2.578125
3
After discussing the role of technology in achieving modern performance standards, this article examines sources that have been cited in support of extremely rapid tempos for the time frame 1630-1800. It summarizes recent findings about the French time devices in which a new source ‒ the Paris dancing master Raoul Auger Feuillet’s reasonable pendulum tempo numbers for dance forms ‒ provides the most accurate information to date for tempo around 1700. Continuing then with other sources cited for rapid tempos, the present article discusses the conflicting statements in Marin Mersenne’s Harmonie universelle and his inaccurate pendulum measurements. It considers the tempo implications of the various time signatures, as supplied, for example, by Jean Rousseau and Jacques Hotteterre, together with Saint-Lambert’s idiomatic use of “une fois plus vite” to indicate the signatures’ tempo relationships. The latter’s “walking man” analogy was not a guide for tempo, but a means to convey beat equality; i.e., sound rhythm. Johann Joachim Quantz’s pulsebeat of 80, unworkable in the tempo sense applied today, was intended to teach fast-to-slow gradations of tempo to musicians who lacked any form of time-measuring device. In response, Daniel Gottlob Türk and Johann George Tromlitz cited the many variables that affect tempo. Without the modern technology that makes extreme tempos possible, tempo in earlier centuries had to have been commensurate with the prevailing conditions. "Numbers and Tempo: 1630-1800," Performance Practice Review: 1, Article 4. Available at: https://scholarship.claremont.edu/ppr/vol17/iss1/4
<urn:uuid:c5f887d9-749a-4d20-a6ef-ba235f0d4071>
CC-MAIN-2018-39
https://scholarship.claremont.edu/ppr/vol17/iss1/4/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.846801
373
3.296875
3
By Kelly Simmons UGA Marine Extension is poised to launch the state’s first oyster hatchery, bringing the popular shellfish back to the Georgia coast after more than 50 years, and diversifying the state’s aquaculture industry. The shellfish research lab on Skidaway Island began piloting oyster growth last year, using funding from the Georgia Department of Natural Resources (DNR) to give wild spat—oyster seed—and advice to aquaculturists in the area who have DNR approval to farm and harvest in specific areas along the coastal rivers and tributaries. DNR funding also paid to outfit part of the shellfish laboratory to be used as a hatchery to hire a hatchery manager. “We hope eventually to attract a commercial hatchery to supply large amounts of seed,” said Thomas Bliss, director of the Marine Extension Shellfish Research Laboratory on Skidaway Island. “We can focus here on research.” So far, 10 growers have cultivated the seedlings, protected in mesh bags on racks in shallow water. The first full size single shell oysters are expected to be ready for harvest this fall. By summer, some were already 1.75 inches long, about a quarter inch smaller than the legal size for commercial harvesting in Georgia, said Bliss. The survival rate was high—about 99 percent had survived so far. John Pelli, who owns the Savannah Clam Co., was among the local aquaculturists who agreed to try raising oysters. On a windy but sunny day in March, he was on his skiff, moving his mesh bags of shells from one location to another. He hopes to produce about 300,000 oysters a year to supply retailers locally and across the state. In the early 1900s, Georgia was the largest wild oyster producer in the country, harvesting more than eight million pounds of oyster meat in 1908. By the 1940s and 1950s, however, production declined significantly. In the 1960s, canneries built to process the native oysters had closed. In the 1980s, marine extension again began to explore opportunities in aquaculture. Clams, which are easier to grow, were first. In 2013, Georgia clammers harvested more than 105,000 tons of clams, up from 54,000 tons just five years earlier and 4.2 tons in 1993. Clams are much easier to grow because you can buy seed from other states. Georgia doesn’t allow oyster spat from outside the state because it could contain disease. To grow the spat, Bliss and hatchery manager Justin Manley have to recreate the natural spawning process of oysters inside tanks of water. Once the larvae is formed it attaches to a small piece of shell in the tank. The baby oysters, called spat, can be transplanted to other areas to grow into adults. They may be harvested when they are two inches long. This year, Bliss says they’ll produce about 100,000 to 200,000 seeds, or spat. By 2020, he hopes that will increase to five to eight million. The payoff would be worth it. The 100,000-500,00 oysters grown in 2015 have an estimated dock value of $75,000. Five to eight million would bring in about $1.6 million. “Everybody’s crazy about single oysters,” Pelli said. “People are willing to pay good money for them.”
<urn:uuid:556242ce-eea8-4116-8a20-fd677be9eae5>
CC-MAIN-2018-39
https://skidawaycampusnotes.com/2015/10/20/marine-extension-pilots-program-to-grow-individual-oysters-off-georgia-coast/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.962612
729
2.59375
3
An experimental study was conducted to quantify the flow characteristics of microburst-like wind and to assess the resultant wind loads acting on low-rise, gable-roof buildings induced by violent microburst-like winds compared with those in conventional atmospheric boundary layer winds. The experimental work was conducted by using an impinging-jet-based microburst simulator in the Department of Aerospace Engineering, Iowa State University. Two gable-roof building models with the same base plan and mean roof height, but different roof angle, were mounted over a homogenous flat surface for a comparative study. In addition to measuring the surface pressure distributions to determine the resultant wind loads acting on the building models, a digital particle image velocimetry system was used to conduct flow field measurements to reveal the wake vortex and turbulence flow structures around the building models placed in the microburst-like wind. The effects of important parameters, such as the distance of the building from the center of the microburst, the roof angle of the building, and the orientation of the building with respect to radial outflow of the oncoming microburst-like wind, on the flow features such as the vortex structures and the surface pressure distributions around the building models as well as the resultant wind loads acting on the test models were assessed quantitatively. The measurement results reveal clearly that when the building models were mounted within the core region of the microburst-like wind, the surface pressure distributions on the building models were significantly higher than those predicted by ASCE 7-05 standard, thereby induced considerably greater downward aerodynamic forces acting on the building models. When the building models were mounted in the outflow region of the microburst-like wind, the measured pressure distributions around the building models were found to reach a good correlation with ASCE 7-05 standard gradually as the test models were moved far away from the center of the microburst-like wind. It was also found that both the radial and vertical components of the aerodynamic forces acting on the building models would reach their maximum values when the models were mounted approximately one jet diameter away from the center of the microburst-like wind, while the maximum pressure fluctuations on the test models were found to occur at further downstream locations. Roof angles of the building models were found to play an important role in determining the flow features around the building models and resultant wind loads acting on the test models. The flow field measurements were found to correlate with the measured surface pressure distributions and the resultant wind loads (i.e., aerodynamic forces) acting on the building models well to elucidate the underlying physics of flow-structure interactions between the microburst-like winds and the gable-roof buildings in order to provide more accurate prediction of the damage potentials of the microburst wind. Experiments in Fluids – Springer Journals Published: May 8, 2013 It’s your single place to instantly discover and read the research that matters to you. Enjoy affordable access to over 18 million articles from more than 15,000 peer-reviewed journals. All for just $49/month Query the DeepDyve database, plus search all of PubMed and Google Scholar seamlessly Save any article or search result from DeepDyve, PubMed, and Google Scholar... all in one place. Get unlimited, online access to over 18 million full-text articles from more than 15,000 scientific journals. Read from thousands of the leading scholarly journals from SpringerNature, Elsevier, Wiley-Blackwell, Oxford University Press and more. All the latest content is available, no embargo periods. “Hi guys, I cannot tell you how much I love this resource. Incredible. I really believe you've hit the nail on the head with this site in regards to solving the research-purchase issue.”Daniel C. “Whoa! It’s like Spotify but for academic articles.”@Phil_Robichaud “I must say, @deepdyve is a fabulous solution to the independent researcher's problem of #access to #information.”@deepthiw “My last article couldn't be possible without the platform @deepdyve that makes journal papers cheaper.”@JoseServera
<urn:uuid:e6089216-6415-4c4f-b4d6-da0d6a6b3211>
CC-MAIN-2018-39
https://www.deepdyve.com/lp/springer_journal/an-experimental-study-of-flow-fields-and-wind-loads-on-gable-roof-OkpRDsVGyg
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.956809
867
2.53125
3
On average, American residents each use about 100 gallons of water per day, while those in Europe use about 50 gallons a day, and a resident of sub-Saharan Africa uses about five gallons of water per day. The Tree Hugger Website offers some smart ways to reduce your water usage: Turn off the tap when brushing your teeth or shaving. The average faucet releases two gallons of water per minute. Fix leaky sinks and running toilets: Up to 200 gallons of water each day can flow through a running toilet. At the sink, one drip per second equals 3,000 gallons per year! Wash your produce in a bowl in the sink. Or, save cooking water used for boiling or steaming. Once cooled, this water is perfectly fine for flushing the toilet or watering plants. Take a bucket to the shower. While waiting for the water to warm, collect it and use it for toilet flushes or for watering plants. Compost food scraps instead of sending them down the garbage disposal. Shower or Bath? A bath uses up to 70 gallons of water; a five-minute shower uses 10 to 25 gallons. Also, installing a low-flow shower head can save water and money. When doing laundry, try to wash only full loads, use cold water, and minimize detergent use. In your landscaping, mulch to retain water and plant hardy, native, water-saving trees and shrubs. Water in the early morning or late evening, or install drip irrigation.
<urn:uuid:eb9a5fdc-1753-4a3f-8a24-a672ac9b312b>
CC-MAIN-2018-39
https://www.durant.org/423/Water-Saving-Tips
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.873815
312
3.21875
3
The ETS® Major Field Test for Physics consists of 70 multiple-choice questions, some of which are grouped in sets and based on materials such as diagrams, graphs, experimental data and descriptions of physical situations. The emphasis of the test is on the students' firm grasp of fundamental principles and their ability to apply an understanding of them in the solution of problems. Most of the test questions can be answered on the basis of a mastery of the first three years of undergraduate physics. For information about the data and how to use it, see the Comparative Data section. Departmental Roster — includes total scores and subscores (if applicable) of all students tested, listed alphabetically by last name. Departmental Summary: Total Scores and Subscores — includes the frequency distributions of total scores and subscores, showing the percent of students scoring below each percentile. The departmental mean scale score and standard deviation are also shown. A Departmental Summary does not include scores of students who answered fewer than 50 percent of the test questions in one or both sections of a test. Departmental Summary: Assessment Indicators — provides a list of the mean (average) percent correct of test questions answered in particular subdomains/content areas for the group as a whole. Departmental Demographic Summary Report — provides student demographic information taken directly from the answer sheets and summarized for the group as a whole. Individual Student Report — includes total score and subscores for each student tested, along with interpretive information. For more information about other reports, see the Reports section. Order tests, manage test administrations, run reports (for existing customers only).
<urn:uuid:ca3b3337-b16c-493d-a4bf-4649d5a7962c>
CC-MAIN-2018-39
https://www.ets.org/mft/about/content/physics
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.923097
334
2.609375
3
It’s Groundhog Day! If you live in the part of America that experienced an arctic outbreak in the last couple of weeks, it may have seemed like this auspicious occasion couldn’t come soon enough. But alas, the day has come! On Saturday February 2nd, Punxtawney Phil emerged amongst a crowd of onlookers and decided our weather fate. Phil did not see his shadow this year, signaling an early spring arrival according to legend. “Weather” or not you are pleased with the result, this quirky and ancient tradition has become a mainstay in American culture. However, how much do we really know about Groundhog Day? Who is this Punxsutawney Phil, Seer of Seers, Sage of Sages, Prognosticator of Prognosticators and Weather Prophet Extraordinary? Read on to learn more about the day that gathers thousands of onlookers every year, inspired a movie, and draws upon American, German and Celtic traditions.
<urn:uuid:a0addec3-b0e5-4aef-ae62-b61544528b19>
CC-MAIN-2018-39
https://www.huffingtonpost.com/2013/02/02/groundhog-day-facts-2013-trivia_n_2600485.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.954042
208
2.703125
3
“No safe way to suntan, new NICE guidance warns,” BBC News reports. The guidelines, produced by the National Institute for Health and Care Excellence (NICE), also stresses the benefits of moderate sun exposure. This will help prevent vitamin D deficiency; which is more common in the UK than many people realise. It is estimated that around one in five adults and older children (aged between 11 and 18) have low vitamin D status. The figure is around one in seven for younger children. What are the risks of overexposure? Sunlight contains ultraviolet A (UVA) and ultraviolet B (UVB) radiation, both of which can be harmful to the skin. (The guidelines do not discuss artificial sources of UV light, such as sunbeds, but these are also thought to be harmful). Risks of overexposure to sunlight include: Non-melanoma is a leading cause of disfigurement, with an estimated quarter of a million cases occurring each year in the UK. Melanoma is a leading cause of cancer deaths in younger adults. More than 2,000 people die every year in the UK from melanoma. Overexposure can also cause premature ageing of the skin, which can lead to signs and symptoms, such as : - enlarged blackheads - loss of skin elasticity Groups of people particularly vulnerable to overexposure include: - children (particularly babies) and young people - people who tend to burn rather than tan - people with lighter skin, fair or red hair, blue or green eyes, or who have lots of freckles - people with many moles - people who are immunosuppressed (that is, they have less resistance to skin problems as a result of a disease or use of particular drugs) - people with a personal or family history of skin cancer (even if their natural skin colour is darker than that of the family member who had cancer) - outdoor workers - those with outdoor hobbies, for example, sailing or golf - people who sunbathe - people who take holidays in sunny countries Avoid strong sunlight Avoid spending long periods of time in strong sunlight. The sun is at its strongest from 11am to 3pm from March to October. It can also be very strong and have potentially damaging effects at other times. Even if it is cool or cloudy, it is possible to burn in the middle of the day in summer. Wear suitable clothing Skin should be protected from strong sunlight by covering up with suitable clothing, finding shade and applying sunscreen. Suitable clothing includes: - a wide-brimmed hat that shades the face, neck and ears - a long-sleeved top - trousers or long skirts in close-weave fabrics that do not allow sunlight through - sunglasses with wraparound lenses or wide arms with the CE Mark and European Standard EN 1836:2005 When buying sunscreen, make sure it’s suitable for your skin and blocks both ultraviolet A (UVA) and ultraviolet B (UVB) radiation. The sunscreen label should have: - the letters “UVA” in a circle logo and at least 4-star UVA protection - at least SPF15 sunscreen to protect against UVB Most people do not apply enough sunscreen. The amount of sunscreen needed for the body of an average adult to achieve the stated sun protection factor (SPF) is around 35ml or six to eight teaspoons of lotion. If sunscreen is applied too thinly, the amount of protection it gives is reduced. If you’re worried you might not be applying enough SPF15, you could use a stronger SPF30 sunscreen. If you plan to be out in the sun long enough to risk burning, sunscreen needs to be applied twice: - 30 minutes before you go out - just before going out Sunscreen should be applied to all exposed skin, including the face, neck and ears (and head if you have thinning or no hair), but a wide-brimmed hat is better. Water-resistant sunscreen is needed if sweating or contact with water is likely. Sunscreen needs to be reapplied liberally, frequently and according to the manufacturer’s instructions. This includes applying straight after you’ve been in water (even if it is “water-resistant”) and after towel drying, sweating or when it may have rubbed off. Advice for babies and children Take extra care to protect babies and children. Their skin is much more sensitive than adult skin, and repeated exposure to sunlight could lead to skin cancer developing in later life. Children aged under six months should be kept out of direct strong sunlight. From March to October in the UK, children should: - cover up with suitable clothing - spend time in the shade (particularly from 11am to 3pm) - wear at least SPF15 sunscreen To ensure they get enough vitamin D, children aged under five are advised to take vitamin D supplements even if they do get out in the sun. Find out about vitamin D supplements for children. There is no healthy way to tan. Any tan can increase your risk of developing skin cancer. Getting a tan does very little to protect your skin from the harmful effects of the sun. The idea that there is such a thing as a healthy tan is a myth. The British Association of Dermatologists advises that people should not use sunbeds or sunlamps. Sunbeds and lamps can be more dangerous than natural sunlight, because they use a concentrated source of ultraviolet (UV) radiation. UV radiation can increase your risk of developing melanomas. Sunbeds and sunlamps can also cause premature skin ageing. If you do want browner looking skin then fake tan is the way to go. Sunlight and vitamin D Vitamin D is essential for healthy bones, and we get most of ours from sunlight exposure. We need vitamin D to help the body absorb calcium and phosphorus from our diet. These minerals are important for healthy bones and teeth. A lack of vitamin D – known as vitamin D deficiency – can cause bones to become soft and weak, which can lead to bone deformities. In children, for example, a lack of vitamin D can lead to rickets. In adults, it can lead to osteomalacia, which causes bone pain and tenderness as well as muscle weakness. Most people can make enough vitamin D from being out in the sun daily for short periods with their forearms, hands or lower legs uncovered and without sunscreen from March to October, especially from 11am to 3pm. A short period of time in the sun means just a few minutes – about 10 to 15 minutes is enough for most lighter-skinned people – and is less than the time it takes you to start going red or burn. Exposing yourself for longer is unlikely to provide any additional benefits. People with darker skin will need to spend longer in the sun to produce the same amount of vitamin D. Groups of people who have little or no exposure to the sun for cultural reasons or because they are housebound or otherwise confined indoors for long periods, may be vitamin D deficient and may benefit from vitamin D supplements. How long it takes for your skin to go red or burn varies from person to person. Cancer Research UK has a useful tool where you can find out your skin type, to see when you might be at risk of burning. Vitamin D and pregnancy Pregnant and breastfeeding women should take a vitamin D supplement to make sure their own needs for vitamin D are met, and their baby is born with enough stores of vitamin D for the first few months of its life. You can get vitamin supplements containing vitamin D free of charge if you are pregnant or breastfeeding, or have a child under four years of age and qualify for the Healthy Start scheme. Read more about vitamins and supplements in pregnancy
<urn:uuid:66ad8dc3-0336-4bce-902a-6f08b90133f8>
CC-MAIN-2018-39
https://www.nursingtimes.net/clinical-archive/cancer/new-nice-guidelines-on-sun-exposure-warn-tanning-is-unsafe/7002334.article
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.94535
1,649
3.796875
4
This month will be your absolute last chance to see Jupiter before it dips from view in the evening sky. Look for this planet’s gradually dimming beacon low in the west as soon as twilight starts to darken. As Jupiter sinks lower in the west each evening, the planets Venus and Mercury are rising higher from below. From May 24th to 29th, watch all three as they’re positioned shift from night to night, and on the 28th Venus and Jupiter are just 1° apart, about the width of your outstretched fingertip. To see this celestial dance you’ll need a clear shot at the western horizon. Start looking about 30 minutes after sunset. Meanwhile, even as Jupiter disappears from the evening sky, Saturn reached opposition on April 28th. That means it’s opposite the Sun in the sky, rising in the east at sunset and staying up all night long. Watch how it nudges higher in the sky at dusk as the weeks and months go by. This is just a sample of the skywatching tips you'll hear when you download May's audio sky tour, an expertly-guided tour of the evening sky brought to you each month by the editors of Sky & Telescope.
<urn:uuid:780ecf77-9a1f-4735-9f0f-b1d231784b1b>
CC-MAIN-2018-39
https://www.skyandtelescope.com/astronomy-news/observing-news/tour-mays-sky-by-eye-and-ear/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.940992
251
2.734375
3
Apply manure sooner or later? A frequently asked question this time of year is: “What do you think about putting on manure in August or September?” The response is fairly simple: “What do you want to achieve with manure application?” Liquid swine manure’s nitrogen form is primarily ammonium-N. Ammonium-N is positively charged and is attracted to negatively charged soil particles, preventing losses such as leaching. But this manure is similar to high ammonium-N content fertilizer, such as anhydrous ammonia that is subject to the same processes for nitrogen loss once it is converted to nitrate-N. If your goal is to use liquid swine manure as a nitrogen fertilizer for corn the following year, then your primary objective would be to wait as long as possible in the fall to apply. As soil temperatures cool, microbial processes slow, and the conversion of ammonium-N to nitrate-N is also slowed down, thereby preventing losses of N as nitrate, primarily through leaching. Nitrate-N can also be lost through denitrification if soils become saturated. We saw this happen in 2014 when we had excessive rainfall and saturated soils in June. Results of a two-year study in Minnesota showed when manure was applied in early September, corn yields averaged 10 fewer bushels per acre than with application in October or November. Similar studies showed that soil nitrate concentrations in June of the following year were much less in the plots where liquid swine manure had been applied in August and September versus the November application date. Conversion to nitrate is dependent on soil temperature and moisture, whereas leaching is dependent on rainfall. The earlier the manure is applied, the more rapid the conversion takes place and the greater the time available to lose N due to leaching before the corn crop can access the N. Incorporation and injection also slow gaseous losses of N by volatilization, as the manure has time to react with the soil. Losses of phosphorus and potassium should be negligible if manure is injected. Whereas if liquid swine manure is surface-applied, losses can occur if water flows across the surface or if erosion happens. Solid and bedded manure Solid and bedded manures have a higher concentration of N as organic N. This N must mineralize or breakdown into inorganic N forms that are available to the plant. The process of mineralization is increased in warm, moist soil conditions. We often see the impact of residual N as these manures continue to slowly break down. Application of this manure in early fall would give more time for mineralization. But since these manure sources are surface-applied, the impact of N losses to the atmosphere and the time it’s exposed to potential runoff must be considered. There are many reasons why manure is applied early in the fall. Sometimes manure storage is full, often we have longer periods of dry weather leading to good soil conditions for application, or more time is available in fall vs. spring when we concentrate on planting crops. If you have to apply manure, especially liquid swine manure, early in the fall, consider: • applying only enough to alleviate storage concerns • applying only a half rate so you can apply the remaining rate of N in the spring as commercial fertilizer or manure • incorporating or injecting manure to maintain its value of P and K For more information, read “Swine Manure Application Timing: Results of the Experiments in Southern Minnesota,” at http://www.extension.umn.edu/agriculture/manure-management-and-air-quality/manure-application/docs/manure-timing.pdf. Rieck-Hinz is an Iowa State University Extension field agronomist. This article published in the September, 2015 edition of WALLACES FARMER. All rights reserved. Copyright Farm Progress Cos. 2015.
<urn:uuid:4e55f8db-dd85-464c-b659-2e29853957ec>
CC-MAIN-2018-39
https://www.tackntogs.com/library.aspx/apply-manure-sooner-later-25/25/2639
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159570.46/warc/CC-MAIN-20180923173457-20180923193857-00319.warc.gz
en
0.951915
817
3.21875
3
Logic and Structure Dirk van Dalen’s popular textbook Logic and Structure, now in its fifth edition, provides a comprehensive introduction to the basics of classical and intuitionistic logic, model theory and Gödel’s famous incompleteness theorem. Propositional and predicate logic are presented in an easy-to-read style using Gentzen’s natural deduction. The book proceeds with some basic concepts and facts of model theory: a discussion on compactness, Skolem-Löwenheim, non-standard models and quantifier elimination. The discussion of classical logic is concluded with a concise exposition of second-order logic. In view of the growing recognition of constructive methods and principles, intuitionistic logic and Kripke semantics is carefully explored. A number of specific constructive features, such as apartness and equality, the Gödel translation, the disjunction and existence property are also included. The last chapter on Gödel's first incompleteness theorem is self-contained and provides a systematic exposition of the necessary recursion theory. This new edition has been properly revised and contains a new section on ultra-products. Features a self-contained introduction into classical and intuitionistic logic using Gentzen’s natural deductionIncludes the basics of recursion, proof and model theory (including a new section on ultraproducts) Gives a comprehensive account of Goedel’s Incompleteness Theorem within the framework of natural deduction
<urn:uuid:f0e00832-7a1d-4de6-b986-02f3cdab19ef>
CC-MAIN-2018-39
http://m.beck-shop.de/item/3131313737373138
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.884111
300
2.890625
3
PACid’s data security offerings are a suite of solutions that share common features, but they can be implemented in a variety of ways with different levels of security and different levels of associated cost/complexity. In this discussion we talk about five levels of data security, although that is a simplification as additional variations could be implemented within some of the levels. All five levels of security start with a common platform. Instead of relying on users to create strong passwords and change them frequently, PACid’s solution takes care of that automatically. Once the user has activated a secure device, all other user ID and password management is handled behind the scenes (machine to machine at machine speeds). Passwords and user IDs generated by the PACid system are long, complex, and used only once. Making not only the password but the user ID itself complex and dynamic adds an additional level of security. The personal authentication credentials are created automatically using a set of “Master Secrets.” Additionally, the encryption solution on the connection between the user and the host is changed every few minutes. We call applications that use our dynamic security technology “PACid-Enabled applications.” The five levels of data security are different ways the user could connect to the PACid-Enabled application. The host side is the same in all five levels. PACid’s five levels of data security are: - Software only (installed on a single device such as a PC, tablet, or smartphone) - Software + removable memory device (software on the PC handles the encryption work; the Master Secrets are stored in the removable memory device) - Software + mobile intelligent device (the PC runs the application and the mobile device protects the Master Secrets and performs some of the related tasks) - PACid Bunker: application-specific device with limited computing power (PC plus mobile device plus PACid intelligent bunker) - Limited capability secure computing device (standalone or physically embedded within a normal computing device – user has very little ability to update, upgrade or install any software or malware) One of the noteworthy features of the five levels of security is that levels 3 – 5 can only be compromised by someone who has physical possession of the device housing the Master Secrets. This would eliminate the vast majority of data breaches, as such attacks are almost always made remotely, often from another country. Before describing how these levels work we need to present some background information. Please read the page on PACid’s Bolt-on Strong Security (BoSS) for an introduction to how our approach to data security works. The five levels described here are different ways to implement the BoSS technology. There are several concepts common to all five levels of BoSS: - Master Secrets: a 2048-bit Master Secret is used in conjunction with a date/time stamp to generate authentication (one-time use logon credentials) and an encryption solution. We selected 2048 bits because it provides more than enough data to generate unbreakable authentication and encryption without using excess system resources. Every application and every use has a unique Master Secret (i.e., if the user has 300 accounts there are 300 unique Master Secrets, one for each account). - User Credentials: username/password combination used to access a remote server, such as a bank account. - Application: whatever you are using the PACid system to protect. It could be to access to a bank account, a credit card, a secure server, etc. - Session credentials: everything needed to establish a secure connection including user credentials, encryption algorithm and key, etc. In the PACid system all session credentials, including user credentials, are one time use only. - m-bit result: a string of bits that the application uses for various security-related needs. The m-bit result is used to create user credentials, an encryption algorithm and key, and/or a signature – whatever the application needs. The application sends the PACid system a request that can be any number of bits (“n-bit”) long. The system creates a unique m-bit result used for that session only which is passed back to the application, which then parses those bits into the different ways it is using them. The input is referred to as n-bit and the output is referred to as m-bit to indicate that they may or may not be the same number of bits; n may be equal to, less than, or greater than m. Level 1 – Software Only Our Level 1 solution doesn’t require users to have any special hardware at all. As the name implies, it’s software installed on the computing device in order to run PACid-Enabled applications. The Level 1 solution provides a massive improvement over what most users have today, and it would stop a large number of data break-ins. But several vulnerabilities remain. It’s vulnerable to snooping attacks when the “Master Secrets” are accessed by the PACid software to create the temporary, one-time use credentials that are used to actually connect to the host. The user ID and passphrase that are used to activate the PACid system are also vulnerable to key-stroke snooping and discovery. Our Level 1 solution offers the following benefits over current data security technology: - Most people are the “weak link” in their own data security: re-using passwords, using simple passwords, failing to change passwords on a regular basis. The Level 1 solution does away with those problems by automatically generating long, complex user credentials that are only used once. See our page “Information for Consumers” for more details. - Impervious to “phishing” attacks: end users do not have access to the Master Secrets that are used to generate the session credentials needed to access their accounts. See “For Data Security, Employees Are the Weakest Link” for more information. - Impervious to “brute force” attacks: passwords are sufficiently long and complex – and changed often enough – that they are unbreakable with current technology. - Connection encryption is much stronger than the current state of the art – not only does it use long complex keys, those keys are changed every few minutes, making it impossible for someone intercepting the link to acquire enough data to crack it – and if they somehow did acquire enough data or otherwise acquired the key and were able to crack it, they would only have access to a few minutes of data before the encryption solution was changed again. - Can also enable dynamic encryption algorithm hopping; changing not only the key but also the method of encryption on the fly. - Impervious to “man-in-the-middle” attacks: the encryption solution for each session is parsed from the m-bit result and there is no SSL exchange. The famous “Heartbleed” data breach which revealed a major system flaw in the https protocol would not have affected PACid-Enabled applications. We use techniques to insure that someone is physically typing on the keyboard and moving the mouse of the computer to reduce the likelihood that someone has “hijacked” the computer and is operating it remotely, but an expert and dedicated cracker could still defeat a Level 1 setup by capturing the username / password the user enters to activate the PACid system, stealing the Master Secret files, and cloning the PC. Level 2 – Software with a Removable Memory Device In our Level 2 solution the Master Secrets used to spawn the credentials for the secure connections are no longer stored on the computing device. Instead they are stored on a removable memory device, such as a USB drive or a SD memory card. Level 2 offers the following benefits over Level 1: - The memory device containing the Master Secrets can be removed from the computing device when not in use by secure applications, protecting them from remote access via one of the many insecurities inherent in computer networks. - The Master Secrets files can be carried from one computer to another, such as office to home or desktop to laptop. There are vulnerabilities that remain with the Level 2 solution: the Master Secrets are still moved to the computing device to create the m-bit result used in generating the session credentials and they are vulnerable to snooping during the few milliseconds they are in the computing device’s memory. The user ID and passphrase used to activate the PACid system are still vulnerable to snooping using software that can log what users type on their keyboards. Level 3 – Software with a Mobile Intelligent Device The Level 3 solution uses an intelligent mobile device (which could be a smartphone or tablet) to store the Master Secrets and generate the m-bit result that contains the information the application needs to generate the one-time-use credentials and encryption solution for the secure connection. The mobile device does not do any actual encryption or run any complex algorithms. All it does is perform a limited set of operations necessary to protect the Master Secrets and spawn an m-bit result which is passed back to the PC. The PC uses the m-bit result in the process of creating the user credentials and encryption solution used to connect to the host. The mobile device can be connected to the PC via USB cable, WiFi, Bluetooth, or any other means. Level 3 provides the benefits of Level 2 (security and portability of Master Secrets) plus: - The Master Secrets themselves that are used to spawn the session credentials never leave the mobile device; therefore the “family jewels” are not exposed to the vulnerabilities that are present in a general purpose computer. - User inputs (entering the username and password required to activate the PACid system) are not made on a keyboard directly connected to the computer. This provides protection from keystroke logging malware on the computer. - The application can take advantage of any additional security features on the mobile device such as a fingerprint, pin, or voice recognition. The only way for a malevolent party to hack into a Level 3 solution would be to clone the mobile device, which would require physical possession of the device for a brief period of time, putting it outside the range of possibilities for most hackers. Depending on the application, it would be possible to implement a complete Level 3 solution on the mobile device, although that could result in poor performance as it may require more system resources than are typically available on a smartphone or tablet, and would be a big drain on batter life. PACid’s encryption technology could also be used to create secure telephone connections between devices that shared a Master Secret. Level 4 – The PACid Bunker (Patent Pending 2013/0085944 A1; Patent Applications 17668-008001, 17668-00800x) The Level 4 solution, the PACid Bunker, addresses the above mentioned vulnerability that the Master Secrets could be compromised by cloning the phone. The PACid Bunker is proprietary hardware device. It is a very simple device with limited memory and processing capability. The Master Secrets reside in the bunker and never leave the bunker. The bunker is designed in a way that there is no command that can be sent to it that would cause it to read out the Master Secrets. Banks or other organizations that are PACid-Enabled could give the PACid Bunker away to new customers – it would be cheaper than many other “giveaways” such as toasters. As with Level 3, an intelligent mobile device (smartphone or tablet) is used as the interface to the PC. In this case, the mobile device serves as an interface between the PC and the bunker. The only output that can ever come from the bunker is an m-bit result – it is not capable of outputting the Master Secrets themselves. Testing to verify the Master Secrets were properly stored is done by outputting an m-bit result and verifying it is correct. If there is an error, the Master Secrets are simply reloaded. The mobile device passes the m-bit result spawned by the bunker to the PC where the actual compute intensive encryption is performed and the connection is established. Level 5 – Secure Computing Device (Patent 8,479,021 B2; applications: 17668-009001, 17668-00900x) Level 5 provides the ultimate in data security. As with Level 4, it would require a new proprietary piece of hardware. This would be a custom-designed computing device which could either be a standalone device (perhaps similar to a netbook or tablet) or it could be embedded in a normal computing device. It would have a custom operating system and very limited ability to update, upgrade, or install any software or malware. As personal computing devices have become more capable and more complex they have also become more vulnerable to a variety of attacks that rely on infecting the device with viruses or “malware.” By severely limiting the input/output ports and the type of software that can be run on the device it makes it much easier to protect the device from such attacks. In a Level 5 solution, all activities are conducted within a highly secure environment (akin to the military’s TEMPEST standards). This provides the ultimate in data security. It also comes with a price, as it requires a custom computing device and that device by definition must have much less capability than a standard computing device. PACid’s Level 1 solution – implemented in software only – provides a level of security far superior to anything currently on the market. But as hackers are determined to steal your data, it’s not enough to just be better than today’s technology. PACid has always taken a visionary approach to data security, focused not only on today’s challenges but on the challenges of the future. Our five levels of data security can keep the “good guys” ahead of the “bad guys” for many years to come.
<urn:uuid:4f96ac68-afb9-4968-a803-6ba0d69fc3f1>
CC-MAIN-2018-39
http://pacid.com/dynamic-encryption-technology/pacids-five-levels-data-security/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.931916
2,861
2.546875
3
“Castro, while in new York for the 1960 opening session of the United Nations, was turned away from the Hotel Shelburne because of concern about “adverse publicity.” The black owner of Harlem’s Hotel Theresa invited Castro, along with his entire delegation, to lodge with them, free of charge. Castro accepted and the black community has never forgotten him.” -Joanne Bealy, Freelance Writer, 2003 Fidel Alejandro Castro Ruz Born August 13, 1926, Castro led the revolution overthrowing Fulgencio Batista in 1959. Shortly thereafter, Castro was sworn in as the Prime Minister of Cuba. Castro became First Secretary of the Communist Party of Cuba in 1965, and led the transformation of Cuba into a one-party socialist republic. In 1976 he became president of the Council of State as well as of the Council of Ministers. He also holds the supreme military rank of Comandante en Jefe (“Commander in Chief”) of the Cuban armed forces. On February 19, 2008 after nearly five decades of rule, Fidel Castro announced his resignation in a letter published in the online edition of the Communist Party daily publication called “Granma”. On Sunday, February 24, 2008 Cuba’s National Assembly chose Fidel Castro’s younger brother Raul to be the country’s new president. Raul Castro helped his brother plan the 1950s uprising that brought about the Cuban revolution that put Fidel Castro in power. Reference: Wikipedia, CNN
<urn:uuid:b64e1218-275c-4b5e-8976-84fca146c7eb>
CC-MAIN-2018-39
http://riversider.org/etienne/having-our-say/fidel-castro/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.961119
319
2.796875
3
Sunday, 25 October 2009 British Wildlife: P Polacanthus foxii Owen, 1865 Ankylosauridae; Ornithischia; Sauropsida; Chordata Polacanthus is Britain's best-known ankylosaur. Despite this, the entire skeleton has not yet been found, and indeed, the skull is very poorly known. It was found in the Isle of Wight, and was contemperaneous with such dinosaurs as Eotyrannus and Neovenator, with the latter possibly large enough to have been a potential predator. Various bones and osteoderms (armour plates) of Polacanthus foxii Dinosaur Isle Museum, Isle of Wight One of the most notable features of Polacanthus, and its close relatives Gastonia and Mymoorapelta of North America, is the sacral shield, a large plate of armour covering the lower back, hips and upper portion of the tail. This, like the rest of the armour plates, was made of dermal bone, hence it was embedded in the skin and not attached to the skeleton. Great crested grebe (in breeding plumage) Podiceps cristatus (Linnaeus, 1758) Podicipedidae; Podicipediformes; Aves; Chordata One of my favourite freshwater birds is the great crested grebe. It's always a thrill to see it on medium-sized to large bodies of water, even in areas very close to human habitation (the photographs that follow were taken in Hyde Park, very close to the centre of that little town called London). They tend to stick to the centre of such water bodies, mainly because they dive for their food, but also because they're a little shy and wary of humans. Adult great crested grebe in breeding plumage Hyde Park, London Adult great crested grebes hang on to their breeding plumage until quite late in the year, when they take on a more sedate hue for the few months of winter. At that time of year, the four British members of the genus Podiceps (red-necked grebe - P. grisegena; Slavonian grebe - P. auritus; black-necked grebe - P. nigricollis; and great crested grebe) all look quite similar and are hard to tell apart. The great crested grebe is the largest and is less likely to take to estuaries and coasts in winter than its congeners. Immature great crested grebe Hyde Park, London The chicks are endearing little things; when very young they climb aboard one of their parents' backs and stay there, as adult grebes do not make nests. What they are known to do, however, is collect twigs as 'presents' to each other, a behaviour I have witnessed in early spring. The young have a bold striped pattern, which remains on the face until late in the year, when they moult into the adult winter plumage. Fratercula arctica (Linnaeus, 1758) Alcidae; Charadriiformes; Aves; Chordata The puffin is one of the most recognisable of birds; short stubby wings, black and white plumage and the tri-coloured bill reminiscent of a toucan, not to mention the triangle around the eye giving it a clown-like air. Puffins are auks, with relatives including guillemots (or murres) and razorbills. Most are unknown to the general public, except when a wandering auk from the other side of the globe ends up in British waters and has its picture and ultimate fate published in tabloids. The other infamous auk is the great auk (Pinguinus impennis), pushed to extinction in the 19th Century. Stuffed and mounted Atlantic puffin Bristol City Museum The Atlantic puffin is one of three species in the genus Fratercula ('little monk'), and the only one that breeds in Britain. Colonies exist on deserted cliffs and islands, and are quite approachable, if only for the reason that they will only fly if they have to, due to their short wings. Despite this, they are capable flyers, and are able to take off and land proficiently, in order to reach their clifftop nest. The nest is created in a burrow, but they don't create them themselves. Puffins have declined significantly in number in the UK and elsewhere in Europe, partly due to hunting (it is an Icelandic delicacy), but overfishing is also to blame. Next week, Q: a trilobite, a butterfly and a game bird.
<urn:uuid:7cb984b1-1328-44db-9df0-20d846c95a7f>
CC-MAIN-2018-39
http://subhumanfreak.blogspot.com/2009/10/british-wildlife-p.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.951409
990
3.15625
3
“If you were blind, how would you “see” a photo?” This is another area where 3D printing can revolutionize people’s lives. Making 3D prints from photographs enables physical representation of imagery. The Singapore based company that is doing this social experiment is called called Pirate3D with easy to use 3D printers. The director of this film short, Marco Aslan tells a story of five people, Gabor, Mario, Meritxell, Yassine and Daniela who have lost their eyesight, yet each has a vivid memory captured in time on a photograph. These photographs were then modeled and printed in 3D allowing each person to re-experience that photograph through touch.
<urn:uuid:efb05265-f661-43ee-ac5a-e84a03de40db>
CC-MAIN-2018-39
http://webvision.med.utah.edu/tag/3d-printing/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.964763
150
2.59375
3
Top 10 Expository Essay Writing Tips for Middle School In an expository essay, the author should give readers information about a subject using only facts. This type of academic paper helps students learn how to prove their arguments using objective data rather than their personal opinions. To write a decent expository paper, you should know some basic writings tips. You can find them in the list below. - Select a good topic. - Do thorough research. - Make your thesis statement. Compose a thesis that presents your arguments and sets the tone for your expository paper. - Choose a style. It’s always advisable to choose topics that will be interesting for you to write about. When you’re interested in your topic, you’ll be able to remember more details while doing your research and come up with better arguments. Look for various materials to help you with writing your expository essay. These materials should include books that are written by experts, thematic journals, online articles, and anything else that contains useful data. There are several styles of expository papers that you may choose from: - Definition paper. - Classification paper. - Compare and contrast paper. - Cause and effect paper. - Process paper. Focus your attention on your arguments. It’s necessary to support them appropriately, using facts and statistics that you’ve discovered during your research. Make sure that your arguments look objective rather than subjective. Each paragraph of the body should be related to a new argument. Start a new paragraph with a topic sentence that gives an overall idea about the argument. Make sure all your topic sentences are related to your thesis. When writing a conclusion for your expository essay, you should summarize your main points and restate your thesis. You shouldn’t add any new arguments in your conclusion. Try to finish your paper with a memorable sentence that will leave a lasting impression on your readers. It’s advisable to write your introduction last. In this case, you’ll know exactly what the contents of your paper are and will be able to introduce them properly. When writing your essay, try to imagine that you’re an ordinary reader. Look at your text and determine whether it’s clear and interesting to read. The last step is to proofread your work and eliminate your mistakes. Search not only for grammar and spelling errors, but also for awkward phrasing and vague explanations.
<urn:uuid:51b0a9fb-71f2-47ec-a8b3-de19c854f3ca>
CC-MAIN-2018-39
http://writeaheadlog.com/10-must-know-expository-essay-writing-tips-for-dummies/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.888649
508
3.484375
3
Dept. of Justice Affirms Arab Race in 1909 Dept. of Justice Affirms in 1909 Whether Syrians, Turks, and Arabs are of White or Yellow Race In 1909, the Department of Justice in Washington, D.C., took a hand in the controversy whether Middle Easterners belong to the white race and are therefore entitled to naturalization as American citizens, or the yellow race, and are to be excluded from the privileges of citizenship, as contended by Chief Richard K. Campbell of the Bureau of Naturalization of the Department of Commerce and Labor. William H. Harr, the attorney general’s assistant for naturalization matters, announced that instructions would be sent to attorneys throughout the country to hold in abeyance all proceedings until the matter could be further investigated. George Shishim won his case with the Federal Government. It started when Shishim, acting in his capacity as a policeman in Venice, California, Los Angeles County, arrested the son of a prominent lawyer for disturbing the peace. This incident started the legal fight for Shishim’s eligibility to citizenship. The arrested man claimed Shishim had no right to arrest him because Shishim was not and could not become an American citizen, because he was not of the “white” race. Having been born in Lebanon, part of Asia, Shishim was considered of Chinese-Mongolian ancestry. As the legal fight heated up, Syrian-Lebanese community leaders in Los Angeles, including Phares A. Behannesey, Mike George, and Elias Shedoudy, Nick Baida, Saleem Sawaya, and John Safady, met at the office of Mike George. They pooled their resources and secured a leading attorney, Byron C. Hanna. Behanessey wrote to many universities asking them for the ethnological background of Lebanese-Syrian and Arab ancestry. The answer was: “from the white race.” This document and others were presented in court, and Judge Hutton of the Superior Court of Los Angeles ruled that Shishim was eligible for citizenship and that the Lebanese and Syrians belong to the “white race.” During the court hearings, Shishim stated: “If I am a Mongolian, then so was Jesus, because we came from the same land.”. Thus, California set a precedent upon which other states based their decision on this matter, granting U.S. citizenship to Lebanese, Syrians, and all Arabs. The following article was published in the Los Angeles Herald, November 5, 1909: “Assured, temporarily at least, that the mantle of citizenship placed on their shoulders by Uncle Sam’s naturalization officers will not be removed, 17,000 Syrians scattered throughout the length and breadth of the land will breathe easier when they hear of the decision rendered yesterday by Judge Hutton of the superior court, to whom the first challenge to reach the test stage was submitted a month ago. Judge Hutton holds that Syrians are eligible to citizenship, and if a different construction is to be placed on the meaning of the law it is for Congress to so declare. The test case was made on the application of George Shishim of Venice, Los Angeles County, California, for citizenship papers by Fred Jones, naturalization examiner, who, acting in accordance with instructions from Washington, opposed the application on the ground that Syrians belonged to the Mongolian race and should therefore be excluded. Judge Hutton’s decision, which has been eagerly watched for in all parts of the country, was as follows: ‘This is an application by one George Shishim, a Syrian, to be admitted to citizenship. The federal government, acting through the department of justice, objects to his admission, basing its objection on the sole ground that he is not a member of the white race in contemplation of section 2169 of the revised statutes of the United States. ‘The court has listened to arguments of counsel representing the Department of Justice and counsel representing applicant and various friends of the cause who have appeared in the case, and has read their briefs with much care and great interest. If this were a new question, I might agree with the government, but as it is by no means new. I am convinced that this court would not be justified in resolving a question of such doubtful construction contradictory to the rulings of other courts throughout the United States that have for many years admitted to full citizenship thousands of Syrians in the same position as applicant at bar. The courts of this nation, both state and federal, have, whenever called upon for more than a century, construed the term “white persons,” or members of the white race, to include Syrians. If at this late date a different construction is to be placed upon the meaning of this very doubtful statute Congress should so declare. The objection of the government is therefore overruled.’ “Shishim, with his attorney, Byron Hanna, and a number of Syrian friends were in the courtroom when the decision was read. He had already shown himself qualified for citizenship in other respects and the oath of allegiance was administered. “I believe that even as your fathers come to this land to produce riches, you were born here to produce riches by intelligence, by labor.” Read more from Kahlil Gibran’s article published in the first edition of The Syrian World Magazine, New York, July 1926, addressing “Young Americans of Syrian Origin”
<urn:uuid:dce39b91-7139-485f-96c4-9d216af7fe46>
CC-MAIN-2018-39
http://www.arabamericanhistory.org/archives/dept-of-justice-affirms-arab-race-in-1909/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.974046
1,127
2.609375
3
A tax on sugar-sweetened beverages (SSBs), as proposed by National Treasury, may be a cost effective way for government to raise additional revenues, but unfortunately it will have little or no impact on tackling obesity in South Africa. Dr. Sundeep Ruder, a Johannesburg-based endocrinologist, claims in a press release that research shows that there could be 250,000 fewer obese South Africans in three to five years if the SSB tax is introduced. The science is flawed, however, as there are many contributing factors to obesity – a lifestyle disease that is the result of consuming too many kilojoules and exercising too little. SSBs contribute just 3% of the total kilojoules consumed by the average South African on a daily basis. So even if the tax did reduce consumption of sugary drinks – and there is little global evidence to show this – it would have a negligible impact on the total kilojoule intake of consumers. As noted recently by one local academic, taxing sugar-sweetened beverages without providing incentives for consumer education and advice on a balanced approach to diet and lifestyle is “just a drop in the caloric ocean.” A tax on SSBs assumes that people will consume less sugary drinks if they become more expensive – but experience in both developed and developing countries shows otherwise. While consumption of sugar-sweetened beverages decreases following the addition of a tax, it soon seems to start climbing again. Take Mexico for example, where firms reported that sales volumes – an accurate proxy for sodas consumed – are now the same as before a sugar tax was introduced or growing. Denmark scrapped its long-standing sugar tax in 2014 because it had very little impact on public health. A 2014 study commissioned by the European Union reported that while food taxes reduced consumption of the taxed products, consumers simply switched to cheaper and even less healthy alternatives. One likely potential consequence of an SSB tax is that price sensitive consumers will simply switch to other sugary products such as confectionary and biscuits – which currently aren’t targeted under the proposed tax. One of the most authoritative reports on tackling obesity in recent years comes from the McKinsey Global Institute’s 2014 study. It found that of all the possible options available to combat the lifestyle disease, the most effective by far were portion size and reformulation of products to reduce sugar content. The Beverage Association of South Africa (BEVSA) is working with the Department of Health to find the best possible solutions to tackle obesity through its efforts as a contributor to the initiative by the Consumer Goods Council of South Africa. While Dr. Ruder compares the proposed tax on sugary drinks to that of the recent legislation on regulating the salt content in food, they are entirely different policy approaches. A standalone tax on soda, will have little health benefits and is merely a money spinner for government. The economic and social consequences of this headline-grabbing tax, however, should be scrutinized - some 60 000 jobs are on the line, many of those are amongst small spaza owners and vendors in the informal sector. Because it is an excise duty and not a sales tax, soft drink manufacturers may also have to increase the price of other drinks too – including healthier options such as bottled water and fruit juice to cross-subsidise losses or, in the case of smaller soft drink manufacturers to merely stay in business. The regressive nature of this tax is that the poor simply pay more. Given the Treasury’s dislike for ring-fencing, the proceeds from a sugar tax are likely to go into the melting pot of tax revenue, rather into a demarcated fund to tackle the causes and effects of obesity. Indeed, the Department of Health itself agrees that a multiple-intervention approach to tackling obesity is needed, rather than individual interventions. Implementing policies that fund infrastructure and support sport in schools and communities, healthy eating education and awareness campaigns as well as working with industry to better label products would be far more effective in preventing obesity. There’s no doubt that SSBs are a soft target when the tax coffers need some plumping, but a tax on sugary drinks won’t improve the nation’s health. If government’s intentions are truly to address obesity we must look at evidence-based interventions, rather than misguided, potentially damaging fiscal policies that could affect the livelihoods of thousands of South Africans with negligible health benefits. - South Africa may consider rate increase in grip of a recession - NETSOL Technologies Goes Live in South Africa with German Auto Manufacturing Giant - In latest clash, Nigeria hands SA's MTN $2 billion tax bill - Rand slumps as SA enters recession for first time since 2009 - South Africa’s Vodacom launches 5G Internet service
<urn:uuid:7705375a-6f94-4155-b851-6d0795d21430>
CC-MAIN-2018-39
http://www.cbn.co.za/agriculture/food-beverage-wine/tax-on-sugary-beverages-won-t-tackle-obesity-in-sa.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.957715
983
3.09375
3
AVON LAKE, OH (WOIO) - A third bald eagle hatched Sunday night in the nest at Redwood Elementary School in Avon Lake. Now, students will have to start thinking about eagle names as they head back to class today. The school set up the live camera in November 2015. A live stream of the eagles and eagle eggs can be found below, or click here. Once considered endangered, the bald eagle population has made a comeback in recent years through the works of wildlife biologists and the concerned public. In 1979, an estimated four breeding pairs resided in Ohio. In 2017, an estimated 221 pairs existed in Ohio. According to the Ohio Department of Natural Resources, the bald eagle typically is found near sizable bodies of water, such as the marshy regions near Lake Erie. A pair of eagles tend to build a nest between October and early December. Then, the female eagle lays one to three eggs in mid-February to late March, which usually incubate for 35 days before hatching.
<urn:uuid:2973d438-9c5a-40bc-b591-53af1d83b1ae>
CC-MAIN-2018-39
http://www.cleveland19.com/story/37909125/threes-company-3rd-bald-eagle-hatches-on-cam-in-avon-lake-nest/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.956441
211
3.140625
3
Read this tip to make your life smarter, better, faster and wiser. LifeTips is the place to go when you need to know about Treatment and Therapies for Autism and other Autism topics. Social stories can be used to treat autism. This autism treatment method was designed by Carol Gray. The social stories method is intended to teach autistic children social skills that they may be lacking. The stories used in this method are written in the first person and the present tense, contain descriptive sentences, perspective sentences and directive sentences, can incorporate pictures or music and are written to address a child's specific fear. The descriptive sentences describe the situation, the perspective sentences offer insight into the feelings of those in the story and the directive sentences are aimed at eliciting a response from the patient.
<urn:uuid:4adb204c-ce63-42d4-a2a8-d67baff776c8>
CC-MAIN-2018-39
https://autism.lifetips.com/tip/116331/treatment-and-therapies-for-autism/treatment-and-therapies-for-autism/using-social-stories-to-treat-autism.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.943178
156
3.171875
3
Home » Opera House Writings Category Archives: Opera House Writings Dear Mrs. Babcock, When the opera house was here it had a room for storage, a fire station, a police department, a library, a city hall, jail sells, a dressing room, and an opera house. John Bogart was mayor back then. He wanted the opera house so that Bozeman would be respected. They might get the capital. The opera house could fit over 900 people, and the seats were moveable. There was a heating tower to dry the hoses for the fire station. On opening day there was a bridge from the Bozeman hotel to the opera house. It was for women so they would not get their dresses wet. The jail cells were under the dressing room. The removable chairs were for meetings and dances. Dear Mrs. Babcock, The opera house played a very important part in Bozeman’s history. It was built in 1889 across the street of the Bozeman Hotel and showed people that Bozeman was a respectable city. It was also built to try and get Montana’s capital. Inside the Opera House, there was a public library, City Hall, a courthouse, a firehouse, and a tower for drying out the fire hoses. There also was a police station with three jail cells, one for women, two for men. The cells were located right underneath the actors’ dressing rooms. The opera house had a flagpole that was 100 feet tall, painted gold, and had an eagle figurine on top. The opera house also had a large auditorium that fit 900 people. The entry way was a sandstone arch, and above it was a beautiful stained glass. You can find the stained glass at the Museum of the Rockies. You could find many people at the opera house. There even was a temporary bridge across Main Street into the opera house so people’s nice clothes wouldn’t get muddy. But when movie theaters came to Bozeman, the opera house wasn’t used quite as much. Later, the building was used for storage, and in 1965 it was torn down because the lack of usage and the amount of money that was needed to maintain it. As you can see, the opera house played a huge role in Bozeman History. For more information, find Dede Carson, who teaches art history at MSU and knows a lot about the Opera House. The other day, my class and I went to the old site of the Opera House. We sat on the cold pavement in front of the lot where the place was located and listed to a presentation by Dede, a historian. In 1880, before Montana had a capital, the mayor was John Bogert. He enjoyed the arts, especially music and theature. When he heard that Montana was running for a capital, he quickly spiffed up our downtown with a fancy opera house. It was built in 1890. The building was also home to the city hall, fire dept, police dept and library. Three jail cells are located under the dressing room. There was one cell for women and two for men. The auditorium could seat up to 900 people. Because the early Main Street was not paved, so there was a temporary bridge spanning the muddy road so the ladies with their elegant skirts would not get dirty before the show. The bridge spanned the gap between the Bozeman Hotel and the 2nd story of the Opera House. Around the 1920s, the old place became used for celabrations only (graduations, weddings, etc.). Eventually it was used for the storage of Christmas lights. Finally, in 1965, it was torn down, because it was not being used and too expensive to maintain.
<urn:uuid:6f513855-66d3-4060-afa1-a1d98ef2b738>
CC-MAIN-2018-39
https://bozemanhistory.wordpress.com/category/opera-house-writings/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.986698
774
2.75
3
Input and Output of Minerals for an Area of Pennine Moorland: the Importance of Precipitation, Drainage, Peat Erosion and Animals Author(s): D. T. Crisp This resource is a citation record only, the Center for Digital Antiquity does not have a copy of this document. The information in this record has been migrated into tDAR from the National Archaeological Database Reports Module (NADB-R) and updated. Most NADB-R records consist of a document citation and other metadata but do not have the documents themselves uploaded. If you have a digital copy of the document and would like to have it curated in tDAR, please contact us at email@example.com. This Resource is Part of the Following Collections Cite this Record Input and Output of Minerals for an Area of Pennine Moorland: the Importance of Precipitation, Drainage, Peat Erosion and Animals. D. T. Crisp. Journal ,3-1. US: Journal of Applied Ecology. 1966 ( tDAR id: 112963) Site Evaluation / Testing min long: -87.635; min lat: 24.396 ; max long: -79.974; max lat: 31.001 ; NADB document id number(s): 358650 NADB citation id number(s): 000000053394
<urn:uuid:2b0d06eb-55c6-4eac-b0e3-2a5caaa2b040>
CC-MAIN-2018-39
https://core.tdar.org/document/112963/input-and-output-of-minerals-for-an-area-of-pennine-moorland-the-importance-of-precipitation-drainage-peat-erosion-and-animals
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.793591
297
3.03125
3
Hydrogen Peroxide: A strong oxidizing agent used in aqueous solution as a ripening agent, bleach, and topical anti-infective. It is relatively unstable and solutions deteriorate over time unless stabilized by the addition of acetanilide or similar organic materials.Hydrogen: The first chemical element in the periodic table. It has the atomic symbol H, atomic number 1, and atomic weight [1.00784; 1.00811]. It exists, under normal conditions, as a colorless, odorless, tasteless, diatomic gas. Hydrogen ions are PROTONS. Besides the common H1 isotope, hydrogen exists as the stable isotope DEUTERIUM and the unstable, radioactive isotope TRITIUM.Peroxides: A group of compounds that contain a bivalent O-O group, i.e., the oxygen atoms are univalent. They can either be inorganic or organic in nature. Such compounds release atomic (nascent) oxygen readily. Thus they are strong oxidizing agents and fire hazards when in contact with combustible materials, especially under high-temperature conditions. The chief industrial uses of peroxides are as oxidizing agents, bleaching agents, and initiators of polymerization. (From Hawley's Condensed Chemical Dictionary, 11th ed)Hydrogen Bonding: A low-energy attractive force between hydrogen and another element. It plays a major role in determining the properties of water, proteins, and other compounds.Catalase: An oxidoreductase that catalyzes the conversion of HYDROGEN PEROXIDE to water and oxygen. It is present in many animal cells. A deficiency of this enzyme results in ACATALASIA.Oxidants: Electron-accepting molecules in chemical reactions in which electrons are transferred from one molecule to another (OXIDATION-REDUCTION).Hydrogen Sulfide: A flammable, poisonous gas with a characteristic odor of rotten eggs. It is used in the manufacture of chemicals, in metallurgy, and as an analytical reagent. (From Merck Index, 11th ed)PeroxidasesOxidation-Reduction: A chemical reaction in which an electron is transferred from one molecule to another. The electron-donating molecule is the reducing agent or reductant; the electron-accepting molecule is the oxidizing agent or oxidant. Reducing and oxidizing agents function as conjugate reductant-oxidant pairs or redox pairs (Lehninger, Principles of Biochemistry, 1982, p471).Lipid Peroxides: Peroxides produced in the presence of a free radical by the oxidation of unsaturated fatty acids in the cell in the presence of molecular oxygen. The formation of lipid peroxides results in the destruction of the original lipid leading to the loss of integrity of the membranes. They therefore cause a variety of toxic effects in vivo and their formation is considered a pathological process in biological systems. Their formation can be inhibited by antioxidants, such as vitamin E, structural separation or low oxygen tension.Oxidative Stress: A disturbance in the prooxidant-antioxidant balance in favor of the former, leading to potential damage. Indicators of oxidative stress include damaged DNA bases, protein oxidation products, and lipid peroxidation products (Sies, Oxidative Stress, 1991, pxv-xvi).Reactive Oxygen Species: Molecules or ions formed by the incomplete one-electron reduction of oxygen. These reactive oxygen intermediates include SINGLET OXYGEN; SUPEROXIDES; PEROXIDES; HYDROXYL RADICAL; and HYPOCHLOROUS ACID. They contribute to the microbicidal activity of PHAGOCYTES, regulation of signal transduction and gene expression, and the oxidative damage to NUCLEIC ACIDS; PROTEINS; and LIPIDS.Hydroxyl Radical: The univalent radical OH. Hydroxyl radical is a potent oxidizing agent.Glucose Oxidase: An enzyme of the oxidoreductase class that catalyzes the conversion of beta-D-glucose and oxygen to D-glucono-1,5-lactone and peroxide. It is a flavoprotein, highly specific for beta-D-glucose. The enzyme is produced by Penicillium notatum and other fungi and has antibacterial activity in the presence of glucose and oxygen. It is used to estimate glucose concentration in blood or urine samples through the formation of colored dyes by the hydrogen peroxide produced in the reaction. (From Enzyme Nomenclature, 1992) EC 220.127.116.11.Free Radicals: Highly reactive molecules with an unsatisfied electron valence pair. Free radicals are produced in both normal and pathological processes. They are proven or suspected agents of tissue damage in a wide variety of circumstances including radiation, damage from environment chemicals, and aging. Natural and pharmacological prevention of free radical damage is being actively investigated.Amitrole: A non-selective post-emergence, translocated herbicide. According to the Seventh Annual Report on Carcinogens (PB95-109781, 1994) this substance may reasonably be anticipated to be a carcinogen. (From Merck Index, 12th ed) It is an irreversible inhibitor of CATALASE, and thus impairs activity of peroxisomes.Superoxide Dismutase: An oxidoreductase that catalyzes the reaction between superoxide anions and hydrogen to yield molecular oxygen and hydrogen peroxide. The enzyme protects the cell against dangerous levels of superoxide. EC 18.104.22.168.Superoxides: Highly reactive compounds produced when oxygen is reduced by a single electron. In biological systems, they may be generated during the normal catalytic function of a number of enzymes and during the oxidation of hemoglobin to METHEMOGLOBIN. In living organisms, SUPEROXIDE DISMUTASE protects the cell from the deleterious effects of superoxides.Tooth Bleaching: The use of a chemical oxidizing agent to whiten TEETH. In some procedures the oxidation process is activated by the use of heat or light.Peroxiredoxins: A family of ubiquitously-expressed peroxidases that play a role in the reduction of a broad spectrum of PEROXIDES like HYDROGEN PEROXIDE; LIPID PEROXIDES and peroxinitrite. They are found in a wide range of organisms, such as BACTERIA; PLANTS; and MAMMALS. The enzyme requires the presence of a thiol-containing intermediate such as THIOREDOXIN as a reducing cofactor.Hydroxides: Inorganic compounds that contain the OH- group.Antioxidants: Naturally occurring or synthetic substances that inhibit or retard the oxidation of a substance to which it is added. They counteract the harmful and damaging effects of oxidation in animal tissues.Benzoyl Peroxide: A peroxide derivative that has been used topically for BURNS and as a dermatologic agent in the treatment of ACNE and POISON IVY DERMATITIS. It is used also as a bleach in the food industry.Acatalasia: A rare autosomal recessive disorder resulting from the absence of CATALASE activity. Though usually asymptomatic, a syndrome of oral ulcerations and gangrene may be present.Free Radical Scavengers: Substances that influence the course of a chemical reaction by ready combination with free radicals. Among other effects, this combining activity protects pancreatic islets against damage by cytokines and prevents myocardial and pulmonary perfusion injuries.Horseradish Peroxidase: An enzyme isolated from horseradish which is able to act as an antigen. It is frequently used as a histochemical tracer for light and electron microscopy. Its antigenicity has permitted its use as a combined antigen and marker in experimental immunology.Oxygen: An element with atomic symbol O, atomic number 8, and atomic weight [15.99903; 15.99977]. It is the most abundant element on earth and essential for respiration.Hypochlorous Acid: An oxyacid of chlorine (HClO) containing monovalent chlorine that acts as an oxidizing or reducing agent.Glutathione: A tripeptide with many roles in cells. It conjugates to drugs to make them more soluble for excretion, is a cofactor for some enzymes, is involved in protein disulfide bond rearrangement and reduces peroxides.Tooth Bleaching Agents: Chemicals that are used to oxidize pigments in TEETH and thus effect whitening.Kinetics: The rate dynamics in chemical or physical systems.Lactoperoxidase: An enzyme derived from cow's milk. It catalyzes the radioiodination of tyrosine and its derivatives and of peptides containing tyrosine.Glutathione Peroxidase: An enzyme catalyzing the oxidation of 2 moles of glutathione in the presence of hydrogen peroxide to yield oxidized glutathione and water. EC 22.214.171.124.Peroxidase: A hemeprotein from leukocytes. Deficiency of this enzyme leads to a hereditary disorder coupled with disseminated moniliasis. It catalyzes the conversion of a donor and peroxide to an oxidized donor and water. EC 126.96.36.199.tert-Butylhydroperoxide: A direct-acting oxidative stress-inducing agent used to examine the effects of oxidant stress on Ca(2+)-dependent signal transduction in vascular endothelial cells. It is also used as a catalyst in polymerization reactions and to introduce peroxy groups into organic molecules.Paraquat: A poisonous dipyridilium compound used as contact herbicide. Contact with concentrated solutions causes irritation of the skin, cracking and shedding of the nails, and delayed healing of cuts and wounds.Hydrogen-Ion Concentration: The normality of a solution with respect to HYDROGEN ions; H+. It is related to acidity measurements in most cases by pH = log 1/2[1/(H+)], where (H+) is the hydrogen ion concentration in gram equivalents per liter of solution. (McGraw-Hill Dictionary of Scientific and Technical Terms, 6th ed)Electron Spin Resonance Spectroscopy: A technique applicable to the wide variety of substances which exhibit paramagnetism because of the magnetic moments of unpaired electrons. The spectra are useful for detection and identification, for determination of electron structure, for study of interactions between molecules, and for measurement of nuclear spins and moments. (From McGraw-Hill Encyclopedia of Science and Technology, 7th edition) Electron nuclear double resonance (ENDOR) spectroscopy is a variant of the technique which can give enhanced resolution. Electron spin resonance analysis can now be used in vivo, including imaging applications such as MAGNETIC RESONANCE IMAGING.Catalysis: The facilitation of a chemical reaction by material (catalyst) that is not consumed by the reaction.Hydrogen Cyanide: Hydrogen cyanide (HCN); A toxic liquid or colorless gas. It is found in the smoke of various tobacco products and released by combustion of nitrogen-containing organic materials.Iron: A metallic element with atomic symbol Fe, atomic number 26, and atomic weight 55.85. It is an essential constituent of HEMOGLOBINS; CYTOCHROMES; and IRON-BINDING PROTEINS. It plays a role in cellular redox reactions and in the transport of OXYGEN.Cells, Cultured: Cells propagated in vitro in special media conducive to their growth. Cultured cells are used to study developmental, morphologic, metabolic, physiologic, and genetic processes, among others.Lipid Peroxidation: Peroxidase catalyzed oxidation of lipids using hydrogen peroxide as an electron acceptor.Models, Molecular: Models used experimentally or theoretically to study molecular shape, electronic properties, or interactions; includes analogous molecules, computer-generated graphics, and mechanical structures.Xanthine Oxidase: An iron-molybdenum flavoprotein containing FLAVIN-ADENINE DINUCLEOTIDE that oxidizes hypoxanthine, some other purines and pterins, and aldehydes. Deficiency of the enzyme, an autosomal recessive trait, causes xanthinuria.Molecular Sequence Data: Descriptions of specific amino acid, carbohydrate, or nucleotide sequences which have appeared in the published literature and/or are deposited in and maintained by databanks such as GENBANK, European Molecular Biology Laboratory (EMBL), National Biomedical Research Foundation (NBRF), or other sequence repositories.Spectrophotometry: The art or process of comparing photometrically the relative intensities of the light in different parts of the spectrum.Sulfhydryl Compounds: Compounds containing the -SH radical.Oxidoreductases: The class of all enzymes catalyzing oxidoreduction reactions. The substrate that is oxidized is regarded as a hydrogen donor. The systematic name is based on donor:acceptor oxidoreductase. The recommended name will be dehydrogenase, wherever this is possible; as an alternative, reductase can be used. Oxidase is only used in cases where O2 is the acceptor. (Enzyme Nomenclature, 1992, p9)Ascorbic Acid: A six carbon compound related to glucose. It is found naturally in citrus fruits and many vegetables. Ascorbic acid is an essential nutrient in human diets, and necessary to maintain connective tissue and bone. Its biologically active form, vitamin C, functions as a reducing agent and coenzyme in several metabolic pathways. Vitamin C is considered an antioxidant.Models, Chemical: Theoretical representations that simulate the behavior or activity of chemical processes or phenomena; includes the use of mathematical equations, computers, and other electronic equipment.Cell Survival: The span of viability of a cell characterized by the capacity to perform certain functions such as metabolism, growth, reproduction, some form of responsiveness, and adaptability.Disinfectants: Substances used on inanimate objects that destroy harmful microorganisms or inhibit their activity. Disinfectants are classed as complete, destroying SPORES as well as vegetative forms of microorganisms, or incomplete, destroying only vegetative forms of the organisms. They are distinguished from ANTISEPTICS, which are local anti-infective agents used on humans and other animals. (From Hawley's Condensed Chemical Dictionary, 11th ed)Dose-Response Relationship, Drug: The relationship between the dose of an administered drug and the response of the organism to the drug.Dianisidine: Highly toxic compound which can cause skin irritation and sensitization. It is used in manufacture of azo dyes.Bacterial Proteins: Proteins found in any species of bacterium.Mitochondria: Semiautonomous, self-reproducing organelles that occur in the cytoplasm of all cells of most, but not all, eukaryotes. Each mitochondrion is surrounded by a double limiting membrane. The inner membrane is highly invaginated, and its projections are called cristae. Mitochondria are the sites of the reactions of oxidative phosphorylation, which result in the formation of ATP. They contain distinctive RIBOSOMES, transfer RNAs (RNA, TRANSFER); AMINO ACYL T RNA SYNTHETASES; and elongation and termination factors. Mitochondria depend upon genes within the nucleus of the cells in which they reside for many essential messenger RNAs (RNA, MESSENGER). Mitochondria are believed to have arisen from aerobic bacteria that established a symbiotic relationship with primitive protoeukaryotes. (King & Stansfield, A Dictionary of Genetics, 4th ed)NADPH Oxidase: A flavoprotein enzyme that catalyzes the univalent reduction of OXYGEN using NADPH as an electron donor to create SUPEROXIDE ANION. The enzyme is dependent on a variety of CYTOCHROMES. Defects in the production of superoxide ions by enzymes such as NADPH oxidase result in GRANULOMATOUS DISEASE, CHRONIC.Ascorbate Peroxidases: Peroxidases that utilize ASCORBIC ACID as an electron donor to reduce HYDROGEN PEROXIDE to WATER. The reaction results in the production of monodehydroascorbic acid and DEHYDROASCORBIC ACID.Time Factors: Elements of limited time intervals, contributing to particular results or situations.Copper: A heavy metal trace element with the atomic symbol Cu, atomic number 29, and atomic weight 63.55.Escherichia coli: A species of gram-negative, facultatively anaerobic, rod-shaped bacteria (GRAM-NEGATIVE FACULTATIVELY ANAEROBIC RODS) commonly found in the lower part of the intestine of warm-blooded animals. It is usually nonpathogenic, but some strains are known to produce DIARRHEA and pyogenic infections. Pathogenic strains (virotypes) are classified by their specific pathogenic mechanisms such as toxins (ENTEROTOXIGENIC ESCHERICHIA COLI), etc.DNA Damage: Injuries to DNA that introduce deviations from its normal, intact structure and which may, if left unrepaired, result in a MUTATION or a block of DNA REPLICATION. These deviations may be caused by physical or chemical agents and occur by natural or unnatural, introduced circumstances. They include the introduction of illegitimate bases during replication or by deamination or other modification of bases; the loss of a base from the DNA backbone leaving an abasic site; single-strand breaks; double strand breaks; and intrastrand (PYRIMIDINE DIMERS) or interstrand crosslinking. Damage can often be repaired (DNA REPAIR). If the damage is extensive, it can induce APOPTOSIS.Water: A clear, odorless, tasteless liquid that is essential for most animal and plant life and is an excellent solvent for many substances. The chemical formula is hydrogen oxide (H2O). (McGraw-Hill Dictionary of Scientific and Technical Terms, 4th ed)Apoptosis: One of the mechanisms by which CELL DEATH occurs (compare with NECROSIS and AUTOPHAGOCYTOSIS). Apoptosis is the mechanism responsible for the physiological deletion of cells and appears to be intrinsically programmed. It is characterized by distinctive morphologic changes in the nucleus and cytoplasm, chromatin cleavage at regularly spaced sites, and the endonucleolytic cleavage of genomic DNA; (DNA FRAGMENTATION); at internucleosomal sites. This mode of cell death serves as a balance to mitosis in regulating the size of animal tissues and in mediating pathologic processes associated with tumor growth.Luminescent Measurements: Techniques used for determining the values of photometric parameters of light resulting from LUMINESCENCE.Deferoxamine: Natural product isolated from Streptomyces pilosus. It forms iron complexes and is used as a chelating agent, particularly in the mesylate form.Glutathione Reductase: Catalyzes the oxidation of GLUTATHIONE to GLUTATHIONE DISULFIDE in the presence of NADP+. Deficiency in the enzyme is associated with HEMOLYTIC ANEMIA. Formerly listed as EC 188.8.131.52.Singlet Oxygen: An excited state of molecular oxygen generated photochemically or chemically. Singlet oxygen reacts with a variety of biological molecules such as NUCLEIC ACIDS; PROTEINS; and LIPIDS; causing oxidative damages.Scopoletin: Plant growth factor derived from the root of Scopolia carniolica or Scopolia japonica.Peracetic Acid: A liquid that functions as a strong oxidizing agent. It has an acrid odor and is used as a disinfectant.Amino Acid Sequence: The order of amino acids as they occur in a polypeptide chain. This is referred to as the primary structure of proteins. It is of fundamental importance in determining PROTEIN CONFORMATION.Cyclic N-Oxides: Heterocyclic compounds in which an oxygen is attached to a cyclic nitrogen.Tooth Discoloration: Any change in the hue, color, or translucency of a tooth due to any cause. Restorative filling materials, drugs (both topical and systemic), pulpal necrosis, or hemorrhage may be responsible. (Jablonski, Dictionary of Dentistry, 1992, p253)Cytochrome-c Peroxidase: A hemeprotein which catalyzes the oxidation of ferrocytochrome c to ferricytochrome c in the presence of hydrogen peroxide. EC 184.108.40.206.Ferrous Compounds: Inorganic or organic compounds that contain divalent iron.Sodium Azide: A cytochrome oxidase inhibitor which is a nitridizing agent and an inhibitor of terminal oxidation. (From Merck Index, 12th ed)Mutation: Any detectable and heritable change in the genetic material that causes a change in the GENOTYPE and which is transmitted to daughter cells and to succeeding generations.Molecular Structure: The location of the atoms, groups or ions relative to one another in a molecule, as well as the number, type and location of covalent bonds.Cysteine: A thiol-containing non-essential amino acid that is oxidized to form CYSTINE.Gene Expression Regulation, Bacterial: Any of the processes by which cytoplasmic or intercellular factors influence the differential control of gene action in bacteria.Temperature: The property of objects that determines the direction of heat flow when they are placed in direct thermal contact. The temperature is the energy of microscopic motions (vibrational and translational) of the particles of atoms.Nitric Oxide: A free radical gas produced endogenously by a variety of mammalian cells, synthesized from ARGININE by NITRIC OXIDE SYNTHASE. Nitric oxide is one of the ENDOTHELIUM-DEPENDENT RELAXING FACTORS released by the vascular endothelium and mediates VASODILATION. It also inhibits platelet aggregation, induces disaggregation of aggregated platelets, and inhibits platelet adhesion to the vascular endothelium. Nitric oxide activates cytosolic GUANYLATE CYCLASE and thus elevates intracellular levels of CYCLIC GMP.Aerobiosis: Life or metabolic reactions occurring in an environment containing oxygen.Microbial Viability: Ability of a microbe to survive under given conditions. This can also be related to a colony's ability to replicate.Benzene DerivativesPyruvate OxidaseCattle: Domesticated bovine animals of the genus Bos, usually kept on a farm or ranch and used for the production of meat or dairy products or for heavy labor.Ferrocyanides: Inorganic salts of the hypothetical acid ferrocyanic acid (H4Fe(CN)6).Neutrophils: Granular leukocytes having a nucleus with three to five lobes connected by slender threads of chromatin, and cytoplasm containing fine inconspicuous granules and stainable by neutral dyes.Cell Line: Established cell cultures that have the potential to propagate indefinitely.Xanthine: A purine base found in most body tissues and fluids, certain plants, and some urinary calculi. It is an intermediate in the degradation of adenosine monophosphate to uric acid, being formed by oxidation of hypoxanthine. The methylated xanthine compounds caffeine, theobromine, and theophylline and their derivatives are used in medicine for their bronchodilator effects. (Dorland, 28th ed)Sulfenic Acids: Oxy acids of sulfur with the general formula RSOH, where R is an alkyl or aryl group such as CH3. They are often encountered as esters and halides. (From McGraw-Hill Dictionary of Scientific and Technical Terms, 4th ed)Crystallography, X-Ray: The study of crystal structure using X-RAY DIFFRACTION techniques. (McGraw-Hill Dictionary of Scientific and Technical Terms, 4th ed)Chloride Peroxidase: An enzyme that catalyzes the chlorination of a range of organic molecules, forming stable carbon-chloride bonds. EC 220.127.116.11.Electrochemistry: The study of chemical changes resulting from electrical action and electrical activity resulting from chemical changes.Acetylcysteine: The N-acetyl derivative of CYSTEINE. It is used as a mucolytic agent to reduce the viscosity of mucous secretions. It has also been shown to have antiviral effects in patients with HIV due to inhibition of viral stimulation by reactive oxygen intermediates.Cell Death: The termination of the cell's ability to carry out vital functions such as metabolism, growth, reproduction, responsiveness, and adaptability.Glutathione Disulfide: A GLUTATHIONE dimer formed by a disulfide bond between the cysteine sulfhydryl side chains during the course of being oxidized.MethemoglobinPeroxynitrous Acid: A potent oxidant synthesized by the cell during its normal metabolism. Peroxynitrite is formed from the reaction of two free radicals, NITRIC OXIDE and the superoxide anion (SUPEROXIDES).Protein Conformation: The characteristic 3-dimensional shape of a protein, including the secondary, supersecondary (motifs), tertiary (domains) and quaternary structure of the peptide chain. PROTEIN STRUCTURE, QUATERNARY describes the conformation assumed by multimeric proteins (aggregates of more than one polypeptide chain).Thioredoxins: Hydrogen-donating proteins that participates in a variety of biochemical reactions including ribonucleotide reduction and reduction of PEROXIREDOXINS. Thioredoxin is oxidized from a dithiol to a disulfide when acting as a reducing cofactor. The disulfide form is then reduced by NADPH in a reaction catalyzed by THIOREDOXIN REDUCTASE.Deuterium Exchange Measurement: A research technique to measure solvent exposed regions of molecules that is used to provide insight about PROTEIN CONFORMATION.Breath Tests: Any tests done on exhaled air.Signal Transduction: The intracellular transfer of information (biological activation/inhibition) through a signal pathway. In each signal transduction system, an activation/inhibition signal from a biologically active molecule (hormone, neurotransmitter) is mediated via the coupling of a receptor/enzyme to a second messenger system or to an ion channel. Signal transduction plays an important role in activating cellular functions, cell differentiation, and cell proliferation. Examples of signal transduction systems are the GAMMA-AMINOBUTYRIC ACID-postsynaptic receptor-calcium ion channel system, the receptor-mediated T-cell activation pathway, and the receptor-mediated activation of phospholipases. Those coupled to membrane depolarization or intracellular release of calcium include the receptor-mediated activation of cytotoxic functions in granulocytes and the synaptic potentiation of protein kinase activation. Some signal transduction pathways may be part of larger signal transduction pathways; for example, protein kinase activation is part of the platelet activation signal pathway.Enzymes, Immobilized: Enzymes which are immobilized on or in a variety of water-soluble or water-insoluble matrices with little or no loss of their catalytic activity. Since they can be reused continuously, immobilized enzymes have found wide application in the industrial, medical and research fields.Enzyme Inhibitors: Compounds or agents that combine with an enzyme in such a manner as to prevent the normal substrate-enzyme combination and the catalytic reaction.Enzyme Activation: Conversion of an inactive form of an enzyme to one possessing metabolic activity. It includes 1, activation by ions (activators); 2, activation by cofactors (coenzymes); and 3, conversion of an enzyme precursor (proenzyme or zymogen) to an active enzyme.Ferric Compounds: Inorganic or organic compounds containing trivalent iron.Disinfection: Rendering pathogens harmless through the use of heat, antiseptics, antibacterial agents, etc.Anaerobiosis: The complete absence, or (loosely) the paucity, of gaseous or dissolved elemental oxygen in a given place or environment. (From Singleton & Sainsbury, Dictionary of Microbiology and Molecular Biology, 2d ed)Dental Enamel Permeability: The property of dental enamel to permit passage of light, heat, gases, liquids, metabolites, mineral ions and other substances. It does not include the penetration of the dental enamel by microorganisms.2,2'-Dipyridyl: A reagent used for the determination of iron.Heme: The color-furnishing portion of hemoglobin. It is found free in tissues and as the prosthetic group in many hemeproteins.Magnetic Resonance Spectroscopy: Spectroscopic method of measuring the magnetic moment of elementary particles such as atomic nuclei, protons or electrons. It is employed in clinical applications such as NMR Tomography (MAGNETIC RESONANCE IMAGING).Pyrogallol: A trihydroxybenzene or dihydroxy phenol that can be prepared by heating GALLIC ACID.Binding Sites: The parts of a macromolecule that directly participate in its specific combination with another molecule.Respiratory Burst: A large increase in oxygen uptake by neutrophils and most types of tissue macrophages through activation of an NADPH-cytochrome b-dependent oxidase that reduces oxygen to a superoxide. Individuals with an inherited defect in which the oxidase that reduces oxygen to superoxide is decreased or absent (GRANULOMATOUS DISEASE, CHRONIC) often die as a result of recurrent bacterial infections.Phenols: Benzene derivatives that include one or more hydroxyl groups attached to the ring structure.L-Amino Acid Oxidase: An enzyme that catalyzes the oxidative deamination of L-amino acids to KETO ACIDS with the generation of AMMONIA and HYDROGEN PEROXIDE. L-amino acid oxidase is widely distributed in and is thought to contribute to the toxicity of SNAKE VENOMS.Ampyrone: A metabolite of AMINOPYRINE with analgesic and anti-inflammatory properties. It is used as a reagent for biochemical reactions producing peroxides or phenols. Ampyrone stimulates LIVER MICROSOMES and is also used to measure extracellular water.NAD: A coenzyme composed of ribosylnicotinamide 5'-diphosphate coupled to adenosine 5'-phosphate by pyrophosphate linkage. It is found widely in nature and is involved in numerous enzymatic reactions in which it serves as an electron carrier by being alternately oxidized (NAD+) and reduced (NADH). (Dorland, 27th ed)Oxygen Consumption: The rate at which oxygen is used by a tissue; microliters of oxygen STPD used per milligram of tissue per hour; the rate at which oxygen enters the blood from alveolar gas, equal in the steady state to the consumption of oxygen by tissue metabolism throughout the body. (Stedman, 25th ed, p346)Sulfides: Chemical groups containing the covalent sulfur bonds -S-. The sulfur atom can be bound to inorganic or organic moieties.Reducing Agents: Materials that add an electron to an element or compound, that is, decrease the positiveness of its valence. (From McGraw-Hill Dictionary of Scientific and Technical Terms, 5th ed)Spectrophotometry, Ultraviolet: Determination of the spectra of ultraviolet absorption by specific molecules in gases or liquids, for example Cl2, SO2, NO2, CS2, ozone, mercury vapor, and various unsaturated compounds. (McGraw-Hill Dictionary of Scientific and Technical Terms, 4th ed)Cerium: An element of the rare earth family of metals. It has the atomic symbol Ce, atomic number 58, and atomic weight 140.12. Cerium is a malleable metal used in industrial applications.Electron Transport: The process by which ELECTRONS are transported from a reduced substrate to molecular OXYGEN. (From Bennington, Saunders Dictionary and Encyclopedia of Laboratory Medicine and Technology, 1984, p270)Plant Leaves: Expanded structures, usually green, of vascular plants, characteristically consisting of a bladelike expansion attached to a stem, and functioning as the principal organ of photosynthesis and transpiration. (American Heritage Dictionary, 2d ed)Thiobarbituric Acid Reactive Substances: Low-molecular-weight end products, probably malondialdehyde, that are formed during the decomposition of lipid peroxidation products. These compounds react with thiobarbituric acid to form a fluorescent red adduct.Cystathionine gamma-Lyase: A multifunctional pyridoxal phosphate enzyme. In the final step in the biosynthesis of cysteine it catalyzes the cleavage of cystathionine to yield cysteine, ammonia, and 2-ketobutyrate. EC 18.104.22.168.Biosensing Techniques: Any of a variety of procedures which use biomolecular probes to measure the presence or concentration of biological molecules, biological structures, microorganisms, etc., by translating a biochemical interaction at the probe surface into a quantifiable physical signal.Onium Compounds: Ions with the suffix -onium, indicating cations with coordination number 4 of the type RxA+ which are analogous to QUATERNARY AMMONIUM COMPOUNDS (H4N+). Ions include phosphonium R4P+, oxonium R3O+, sulfonium R3S+, chloronium R2Cl+Thiocyanates: Organic derivatives of thiocyanic acid which contain the general formula R-SCN.Mass Spectrometry: An analytical method used in determining the identity of a chemical based on its mass using mass analyzers/mass spectrometers.Hot Temperature: Presence of warmth or heat or a temperature notably higher than an accustomed norm.NADH, NADPH Oxidoreductases: A group of oxidoreductases that act on NADH or NADPH. In general, enzymes using NADH or NADPH to reduce a substrate are classified according to the reverse reaction, in which NAD+ or NADP+ is formally regarded as an acceptor. This subclass includes only those enzymes in which some other redox carrier is the acceptor. (Enzyme Nomenclature, 1992, p100) EC 1.6.Dithiothreitol: A reagent commonly used in biochemical studies as a protective agent to prevent the oxidation of SH (thiol) groups and for reducing disulphides to dithiols.Base Sequence: The sequence of PURINES and PYRIMIDINES in nucleic acids and polynucleotides. It is also called nucleotide sequence.Reactive Nitrogen Species: Nitrogenous products of NITRIC OXIDE synthases, ranging from NITRIC OXIDE to NITRATES. These reactive nitrogen intermediates also include the inorganic PEROXYNITROUS ACID and the organic S-NITROSOTHIOLS.Aldehydes: Organic compounds containing a carbonyl group in the form -CHO.ThiomalatesProtein Binding: The process in which substances, either endogenous or exogenous, bind to proteins, peptides, enzymes, protein precursors, or allied compounds. Specific protein-binding measures are often used as assays in diagnostic assessments.NADP: Nicotinamide adenine dinucleotide phosphate. A coenzyme composed of ribosylnicotinamide 5'-phosphate (NMN) coupled by pyrophosphate linkage to the 5'-phosphate adenosine 2',5'-bisphosphate. It serves as an electron carrier in a number of reactions, being alternately oxidized (NADP+) and reduced (NADPH). (Dorland, 27th ed)Cyanides: Inorganic salts of HYDROGEN CYANIDE containing the -CN radical. The concept also includes isocyanides. It is distinguished from NITRILES, which denotes organic compounds containing the -CN radical.Peroxiredoxin III: A THIOREDOXIN-dependent hydroperoxidase that is localized in the mitochondrial matrix. The enzyme plays a crucial role in protecting mitochondrial components from elevated levels of HYDROGEN PEROXIDE.Spin Trapping: A technique for detecting short-lived reactive FREE RADICALS in biological systems by providing a nitrone or nitrose compound for an addition reaction to occur which produces an ELECTRON SPIN RESONANCE SPECTROSCOPY-detectable aminoxyl radical. In spin trapping, the compound trapping the radical is called the spin trap and the addition product of the radical is identified as the spin adduct. (Free Rad Res Comm 1990;9(3-6):163)Iron Chelating Agents: Organic chemicals that form two or more coordination links with an iron ion. Once coordination has occurred, the complex formed is called a chelate. The iron-binding porphyrin group of hemoglobin is an example of a metal chelate found in biological systems.Peptostreptococcus: A genus of gram-positive, anaerobic, coccoid bacteria that is part of the normal flora of humans. Its organisms are opportunistic pathogens causing bacteremias and soft tissue infections.Salicylic Acid: A compound obtained from the bark of the white willow and wintergreen leaves. It has bacteriostatic, fungicidal, and keratolytic actions.Electrolysis: Destruction by passage of a galvanic electric current, as in disintegration of a chemical compound in solution.Iodides: Inorganic binary compounds of iodine or the I- ion.Recombinant Proteins: Proteins prepared by recombinant DNA technology.Ultraviolet Rays: That portion of the electromagnetic spectrum immediately below the visible range and extending into the x-ray frequencies. The longer wavelengths (near-UV or biotic or vital rays) are necessary for the endogenous synthesis of vitamin D and are also called antirachitic rays; the shorter, ionizing wavelengths (far-UV or abiotic or extravital rays) are viricidal, bactericidal, mutagenic, and carcinogenic and are used as disinfectants.Rats, Wistar: A strain of albino rat developed at the Wistar Institute that has spread widely at other institutions. This has markedly diluted the original strain.Models, Biological: Theoretical representations that simulate the behavior or activity of biological processes or diseases. For disease models in living animals, DISEASE MODELS, ANIMAL is available. Biological models include the use of mathematical equations, computers, and other electronic equipment.Stress, Physiological: The unfavorable effect of environmental factors (stressors) on the physiological functions of an organism. Prolonged unresolved physiological stress can affect HOMEOSTASIS of the organism, and may lead to damaging or pathological conditions.Malondialdehyde: The dialdehyde of malonic acid.Spin Labels: Molecules which contain an atom or a group of atoms exhibiting an unpaired electron spin that can be detected by electron spin resonance spectroscopy and can be bonded to another molecule. (McGraw-Hill Dictionary of Chemical and Technical Terms, 4th ed)Amine Oxidase (Copper-Containing): A group of enzymes including those oxidizing primary monoamines, diamines, and histamine. They are copper proteins, and, as their action depends on a carbonyl group, they are sensitive to inhibition by semicarbazide.Tyrosine: A non-essential amino acid. In animals it is synthesized from PHENYLALANINE. It is also the precursor of EPINEPHRINE; THYROID HORMONES; and melanin.Escherichia coli Proteins: Proteins obtained from ESCHERICHIA COLI.Rats, Sprague-Dawley: A strain of albino rat used widely for experimental purposes because of its calmness and ease of handling. It was developed by the Sprague-Dawley Animal Company.Substrate Specificity: A characteristic feature of enzyme activity in relation to the kind of substrate on which the enzyme or catalytic molecule reacts.Luminol: 5-Amino-2,3-dihydro-1,4-phthalazinedione. Substance that emits light on oxidation. It is used in chemical determinations.Decontamination: The removal of contaminating material, such as radioactive materials, biological materials, or CHEMICAL WARFARE AGENTS, from a person or object.Hydrogenase: An enzyme found in bacteria. It catalyzes the reduction of FERREDOXIN and other substances in the presence of molecular hydrogen and is involved in the electron transport of bacterial photosynthesis.Metmyoglobin: Myoglobin which is in the oxidized ferric or hemin form. The oxidation causes a change in color from red to brown.DeoxyriboseChloraminesDitiocarb: A chelating agent that has been used to mobilize toxic metals from the tissues of humans and experimental animals. It is the main metabolite of DISULFIRAM.Vitamin K 3: A synthetic naphthoquinone without the isoprenoid side chain and biological activity, but can be converted to active vitamin K2, menaquinone, after alkylation in vivo.Endothelium, Vascular: Single pavement layer of cells which line the luminal surface of the entire vascular system and regulate the transport of macromolecules and blood components.Anti-Infective Agents, Local: Substances used on humans and other animals that destroy harmful microorganisms or inhibit their activity. They are distinguished from DISINFECTANTS, which are used on inanimate objects.Manganese: A trace element with atomic symbol Mn, atomic number 25, and atomic weight 54.94. It is concentrated in cell mitochondria, mostly in the pituitary gland, liver, pancreas, kidney, and bone, influences the synthesis of mucopolysaccharides, stimulates hepatic synthesis of cholesterol and fatty acids, and is a cofactor in many enzymes, including arginase and alkaline phosphatase in the liver. (From AMA Drug Evaluations Annual 1992, p2035)L-Lactate Dehydrogenase: A tetrameric enzyme that, along with the coenzyme NAD+, catalyzes the interconversion of LACTATE and PYRUVATE. In vertebrates, genes for three different subunits (LDH-A, LDH-B and LDH-C) exist.Culture Media: Any liquid or solid preparation made specifically for the growth, storage, or transport of microorganisms or other types of cells. The variety of media that exist allow for the culturing of specific microorganisms and cell types, such as differential media, selective media, test media, and defined media. Solid media consist of liquid media that have been solidified with an agent such as AGAR or GELATIN.Thermodynamics: A rigorously mathematical analysis of energy relationships (heat, work, temperature, and equilibrium). It describes systems whose states are determined by thermal parameters, such as temperature, in addition to mechanical and electromagnetic parameters. (From Hawley's Condensed Chemical Dictionary, 12th ed)Fluoresceins: A family of spiro(isobenzofuran-1(3H),9'-(9H)xanthen)-3-one derivatives. These are used as dyes, as indicators for various metals, and as fluorescent labels in immunoassays.Thiourea: A photographic fixative used also in the manufacture of resins. According to the Fourth Annual Report on Carcinogens (NTP 85-002, 1985), this substance may reasonably be anticipated to be a carcinogen (Merck Index, 9th ed). Many of its derivatives are ANTITHYROID AGENTS and/or FREE RADICAL SCAVENGERS.Myoglobin: A conjugated protein which is the oxygen-transporting pigment of muscle. It is made up of one globin polypeptide chain and one heme group.Indicators and Reagents: Substances used for the detection, identification, analysis, etc. of chemical, biological, or pathologic processes or conditions. Indicators are substances that change in physical appearance, e.g., color, at or approaching the endpoint of a chemical titration, e.g., on the passage between acidity and alkalinity. Reagents are substances used for the detection or determination of another substance by chemical or microscopical means, especially analysis. Types of reagents are precipitants, solvents, oxidizers, reducers, fluxes, and colorimetric reagents. (From Grant & Hackh's Chemical Dictionary, 5th ed, p301, p499)Electrodes: Electric conductors through which electric currents enter or leave a medium, whether it be an electrolytic solution, solid, molten mass, gas, or vacuum.Gene Expression Regulation, Plant: Any of the processes by which nuclear, cytoplasmic, or intercellular factors influence the differential control of gene action in plants.Biocatalysis: The facilitation of biochemical reactions with the aid of naturally occurring catalysts such as ENZYMES.DNA: A deoxyribonucleotide polymer that is the primary genetic material of all cells. Eukaryotic and prokaryotic organisms normally contain DNA in a double-stranded state, yet several important biological processes transiently involve single-stranded regions. DNA, which consists of a polysugar-phosphate backbone possessing projections of purines (adenine and guanine) and pyrimidines (thymine and cytosine), forms a double helix that is held together by hydrogen bonds between these purines and pyrimidines (adenine to thymine and guanine to cytosine).Chromatography, High Pressure Liquid: Liquid chromatographic techniques which feature high inlet pressures, high sensitivity, and high speed.Vitamin K: A lipid cofactor that is required for normal blood clotting. Several forms of vitamin K have been identified: VITAMIN K 1 (phytomenadione) derived from plants, VITAMIN K 2 (menaquinone) from bacteria, and synthetic naphthoquinone provitamins, VITAMIN K 3 (menadione). Vitamin K 3 provitamins, after being alkylated in vivo, exhibit the antifibrinolytic activity of vitamin K. Green leafy vegetables, liver, cheese, butter, and egg yolk are good sources of vitamin K.Cytochrome c Group: A group of cytochromes with covalent thioether linkages between either or both of the vinyl side chains of protoheme and the protein. (Enzyme Nomenclature, 1992, p539)Whales: Large marine mammals of the order CETACEA. In the past, they were commercially valued for whale oil, for their flesh as human food and in ANIMAL FEED and FERTILIZERS, and for baleen. Today, there is a moratorium on most commercial whaling, as all species are either listed as endangered or threatened.Colorimetry: Any technique by which an unknown color is evaluated in terms of standard colors. The technique may be visual, photoelectric, or indirect by means of spectrophotometry. It is used in chemistry and physics. (McGraw-Hill Dictionary of Scientific and Technical Terms, 4th ed)Plant Stomata: Closable openings in the epidermis of plants on the underside of leaves. They allow the exchange of gases between the internal tissues of the plant and the outside atmosphere.Flow Injection Analysis: The analysis of a chemical substance by inserting a sample into a carrier stream of reagent using a sample injection valve that propels the sample downstream where mixing occurs in a coiled tube, then passes into a flow-through detector and a recorder or other data handling device.Potassium Iodide: An inorganic compound that is used as a source of iodine in thyrotoxic crisis and in the preparation of thyrotoxic patients for thyroidectomy. (From Dorland, 27th ed)RNA, Messenger: RNA sequences that serve as templates for protein synthesis. Bacterial mRNAs are generally primary transcripts in that they do not require post-transcriptional processing. Eukaryotic mRNA is synthesized in the nucleus and must be exported to the cytoplasm for translation. Most eukaryotic mRNAs have a sequence of polyadenylic acid at the 3' end, referred to as the poly(A) tail. The function of this tail is not known for certain, but it may play a role in the export of mature mRNA from the nucleus as well as in helping stabilize some mRNA molecules by retarding their degradation in the cytoplasm.Guaiacol: An agent thought to have disinfectant properties and used as an expectorant. (From Martindale, The Extra Pharmacopoeia, 30th ed, p747)Light: That portion of the electromagnetic spectrum in the visible, ultraviolet, and infrared range.Disulfides: Chemical groups containing the covalent disulfide bonds -S-S-. The sulfur atoms can be bound to inorganic or organic moieties.Molecular Conformation: The characteristic three-dimensional shape of a molecule.Calcium: A basic element found in nearly all organized tissues. It is a member of the alkaline earth family of metals with the atomic symbol Ca, atomic number 20, and atomic weight 40. Calcium is the most abundant mineral in the body and combines with phosphorus to form calcium phosphate in the bones and teeth. It is essential for the normal functioning of nerves and muscles and plays a role in blood coagulation (as factor IV) and in many enzymatic processes. Download our free solidary book to support research on VHL disease
<urn:uuid:ba199d15-53f2-4504-9a06-3f085cc44b76>
CC-MAIN-2018-39
https://lookformedical.com/definitions.php?q=Hydrogen+Peroxide&lang=1
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.893008
10,741
3.546875
4
NASA finds Tropical Storm Gordon’s strength east of its center After drenching south Florida, Tropical Storm Gordon moved into the eastern Gulf of Mexico and is headed to the northwest. NASA's Aqua satellite found three areas of the strongest storms east of Gordon's center when it passed overhead on Sept. 4 . Infrared satellite data on Tuesday, Sept. 4 at 4:05 a.m. EDT (0805 UTC) from the Moderate Resolution Imaging Spectroradiometer or MODIS instrument aboard NASA's Aqua satellite revealed several strongest areas in Gordon where cloud top temperatures were indicative of strong storms and heavy rainmakers. In those areas, MODIS found coldest cloud tops had temperatures near minus 70 degrees Fahrenheit (minus 56.6 degrees Celsius). NASA research has found that cloud top temperatures that cold have the capability to generate heavy rainfall. At 5 a.m. EDT (0900 UTC), the National Hurricane Center or NHC noted "The storm has a small CDO [central dense overcast] with convective banding features primarily over the eastern semicircle of the circulation." It is in the eastern semicircle where Aqua found the strongest storms. There are numerous watches and warnings in effect as Gordon is forecast to track through the Gulf of Mexico and make landfall along the northern Gulf coast. NHC said A Storm Surge Warning is in effect for Shell Beach to Dauphin Island, Alabama. A Storm Surge Watch is in effect from west of Shell Beach to the Mouth of the Mississippi River and east of Dauphin Island to Navarre, Florida. A Hurricane Warning is in effect for. The mouth of the Pearl River to the Alabama-Florida Border. A Tropical Storm Warning is in effect for west of the mouth of the Pearl River to east of Morgan City, Louisiana, including Lake Pontchartrain and Lake Maurepas and from the Alabama-Florida Border to Okaloosa-Walton County Line, Florida.. At 8 a.m. EDT (1200 UTC), the center of Tropical Storm Gordon was located near latitude 28.1 degrees north and longitude 86.2 degrees west. That's about 190 miles (305 km) east-southeast of the mouth of the Mississippi River. Gordon is moving toward the west-northwest near 15 mph (25 kph). A west-northwestward to northwestward motion with some decrease in forward speed is expected over the next few days. NHC said that maximum sustained winds are near 65 mph (100 kph) with higher gusts. Some strengthening is expected today, and Gordon is forecast to be a hurricane when it makes landfall along the north-central Gulf Coast. Rapid weakening is expected after Gordon moves inland. On the forecast track, the center of Gordon will move across the eastern Gulf of Mexico today, and will approach the north-central Gulf Coast within the warning area late this afternoon or evening, and move inland over the lower Mississippi Valley tonight or early Wednesday, Sept. 5. For updates on Gordon, visit: http://www.nhc.noaa.gov
<urn:uuid:bd29f894-23f4-49f7-b98d-4376348131de>
CC-MAIN-2018-39
https://scienmag.com/nasa-finds-tropical-storm-gordons-strength-east-of-its-center/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.922134
626
2.8125
3
Last year, a video posted to Twitter captured two Facebook employees using a soap dispenser in an employee bathroom. The white employee places his hand under the dispenser and receives soap without incident. But when the black employee holds his hand under the dispenser, nothing happens. The sensor cannot recognize his hand. It was a small example of a problem that plagues the design industry. “If you have ever had a problem grasping the importance of diversity in tech and its impact on society, watch this video,” wrote Chukwuemeka Afigbo, who published it. Afigbo’s interaction with the soap dispenser demonstrates a failure in its design. It’s hard to imagine the same outcome would have occurred if the dispenser’s design team had tested the product with black users, or if the design team consisted of racially diverse employees. Examples of product design that fail on the ethics front are all too easy to find—like news feeds promoting fake news, ride-hailing companies psychologically exploiting workers, and virtual home assistants perpetuating negative gender stereotypes. It’s not that product designers don’t care about the ethical ramifications of their work—far from it. It’s that, too often, they assume that such considerations fall outside of their job description. Mike Monteiro, co-founder and design director of Mule Design and author of the influential essay “A Designer’s Code of Ethics,” says that this ignorance has become an issue with the rapid change in scope of design over the past decade. “Designers have been running fast and free with no ethical guidelines,” he told me. “And that was fine when we were designing posters and sites for movies. But now design is interpersonal relationships on social media, health care, financial data traveling everywhere, the difference between verified journalism and fake news. And this is dangerous.” Increasingly, though, the industry is taking ethics seriously. Every year at SXSW, John Maeda, the global head of computational design and inclusion at Automattic, presents the “Design in Tech Report,” which serves as a kind of State of the Union on design in technology. This year, Maeda focused on inclusion as the future of design. Maeda defines inclusive design as designing products for a broader audience—whether that’s people with disabilities, people living outside of the U.S., people of color, or older people. On his list of “the top 10 most critical issues and challenges currently facing design,” “ethics in design” came in third, behind “design not having a ‘seat at the table’ ” (No. 1), and “diversity in design and tech” (No. 2). While Maeda said in a direct message over Twitter that he’s not trying to make a business case for ethics in design, his argument at least partially relies on a business imperative: Inclusive design expands your product’s total market. (And in an industry soon to be dominated by artificial intelligence and machine learning, it’s a very useful, very human skill for a designer.) To illustrate the relationship between business and ethics in Maeda’s argument, take his analysis of an adjacent industry: Hollywood. In the final slides of his SXSW report, Maeda references the recent hit movie Black Panther as proof that inclusion pays off financially: A film featuring predominantly black and female characters has earned more than $1 billion worldwide. Maeda’s argument assumes that a business goal aligns with a moral one. But what about the case of the soap dispenser? A product that can recognize a wider range of skin tones could come with a higher price tag because it requires more advanced optic sensors. Similarly, Facebook and other tech companies that profit from advertising face calls to design less addictive products—an ethical move that would contradict business sense. Monteiro, who has been an advocate for ethics in design for years, points out the danger inherent to this kind of win-win argument: “They say you can’t ignore women because women have a lot of money, you can’t ignore gay people because gay people have a lot of money. So when do we start paying attention to refugees? When do we start paying attention to the poor? The business case can’t be the reason why we start acting like human beings because it leaves a lot of people out in the cold. We have to be better than that.” Vivianne Castillo, a user experience researcher at Weight Watchers with a background in counseling and human services, had a different reaction than Maeda to the success of Black Panther. She too references the film as a sign of inclusion’s potential—but she sees its financial success as a byproduct of, not the main incentive for, inclusion. More than money, the benefit is that “little boys and girls are seeing themselves as strong women or heroes,” she says. “They’re not the help, they’re not thugs. They’re respected and valued for what they have to contribute to the world.” Monteiro says that a lot needs to happen before designers can properly address ethical standards. He suggests taking cues from other industries, like medicine and law, where practitioners are regulated rather than assumed to behave ethically. Echoing the recent push for ethics classes in engineering higher education, Monteiro suggests that design education should include ethical training and that passing an ethics test should be a requirement for earning a design degree. Moreover, professional designers need to be licensed and reviewed—just like doctors and lawyers. Sure, there are bad actors in those fields, but at least there are mechanisms to deter or discipline them. What would this kind of training and monitoring entail? Ethical design means considering the context of the product you create. Designers need to learn how to think about moral questions for themselves: What are the long-term problems facing the industry you’re designing for? How does your design problem relate to or intersect with or contribute to them? At what environmental, cultural, and social cost does your design solution come? Who is your design solution serving, and who is it not serving? Are your team and testing representative of the populations impacted? How does your solution play into your users’ values, preferences, and behaviors? Take Airbnb as an example. Designers created the home-sharing platform with the intention of cultivating trust between hosts and guests, working from the research insight that this would eliminate users’ main apprehension. Their solution: Guests apply for a stay by mandatory sharing of a photo and personal information, creating a profile that the host then accepts or denies at his or her discretion. While this design solution aptly addresses the short-term question of how to convince users to book housing with Airbnb, it fails to consider the larger context in which the product exists—namely, an industry historically rife with discriminatory practices. Airbnb’s designers have inadvertently created an environment conducive to racism and discrimination by basing housing approval on information about a guest’s identity. Guests reported that their reservations were being denied or canceled based on their race or gender identity. After a Harvard study showed guests with stereotypically black names received fewer bookings on the platform than those with white-sounding names, the company planned to improve the situation. In addition to policy changes, Airbnb tasked its designers with delivering a more ethical design solution. This included creating a booking process that relies less on guest photos, designing a feature that prohibits hosts from accepting reservations for any time period that has already been denied to someone else, adding tools to flag discrimination or hate speech, and promoting the site’s instant booking option that does not require host approval. These design changes offered major improvement to Airbnb’s product from an ethical standpoint. As a product designer, I know that no mandate exists to integrate these ethical checks and balances in our process. While I may hear a lot of these issues raised at speaking events and industry meetups, more “practical” considerations can overshadow these conversations in my day-to-day decision making. When they have to compete with the workaday pressures of budgets, roadmaps, and clients, these questions won’t emerge as priorities organically. Most important, then, is action. Castillo worries that the conversation about “ethics in design” could become a cliché, like “empathy” or “diversity” in tech, where it’s more talk than walk. She says it’s not surprising that ethics in tech hasn’t been addressed in depth in the past, given the industry’s lack of diversity. Because most tech employees come from socially privileged backgrounds, they may not be as attuned to ethical concerns. A designer who identifies with society’s dominant culture may have less personal need to take another perspective. Indeed, identification with a society’s majority is shown to be correlated with less critical awareness of the world outside of yourself. Castillo says that, as a black woman in America, she’s a bit wary of this conversation’s effectiveness if it remains only a conversation. “You know how someone says, ‘Why’d you become a nurse or doctor?’ And they say, ‘I want to help people’?” asks Castillo. “Wouldn’t it be cool if someone says, ‘Why’d you become an engineer or a product designer?’ And you say, ‘I want to help people.’ ” Inclusion is a significant way for designers to do so. Other ethical design practices include considering the intersecting issues of accessibility, privacy, and time and attention. This is the vision we need to embrace for today’s designers—but it will only happen by design.
<urn:uuid:85bdc06d-c8ac-4ec9-8e03-c43d0f9a7968>
CC-MAIN-2018-39
https://slate.com/technology/2018/08/ethics-in-design-what-exactly-does-that-mean.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.959238
2,060
2.65625
3
A new report from Duke University finds an explanation for increases in the frequency of thyroid cancer in household dust. “Thyroid cancer is the fastest increasing cancer in the U.S., with most of the increase in new cases being papillary thyroid cancer” [PTC], said the study’s lead investigator, Julie Ann Sosa, M.D., MA, professor of surgery and medicine at Duke University School of Medicine in Durham, N.C. “Recent studies suggest that environmental factors may, in part, be responsible for this increase.” (1) Prior studies have shown that some flame retardants used in the home and in vehicles have a similar chemical structure to thyroid hormones and can disrupt thyroid function. The study measured the content of household dust as well as the incidence of chemicals in blood samples taken from occupants. The study used a post facto experimental design with test and control groups. All of the 140 participants lived in their homes for more than 11 years. This study established that these flame retardants - Appear in household dust in measurable quantities, where they can be inhaled by occupants and - The level of two of them found in dust and blood samples are associated with the probability of having PTC. The two problem chemicals identified in the study as elevating cancer risk belong to a class of chemicals, polybrominated diphenyl ethers (PBDEs). - Decabromodiphenyl ether (BDE-209). This is the most commonly used retardant, and appears to double the risk for thyroid cancer. - Tris(2-chloroethyl) phosphate (TCEP). Participants with high levels of TCEP in their house dust were more than four times as likely to have larger, more aggressive tumors that extended beyond the thyroid, according to the study. Participants with high levels of BDE-209 in their blood were 14 times more likely to have a version of the cancer that tends to be more aggressive. Why should you care? These chemicals are used as flame retardants in plastics (including TV cabinets), furniture, drapery backing, some carpets and in consumer electronics, both in home and in automobiles. Both exposure to these chemicals and the prevalence of thyroid cancer are increasing. Note: This research was funded by Fred and Alice Stanback, the Duke Cancer Institute, and the Nicholas School of the Environment at Duke University, and not by industry sources. What you need to consider: - Do you have a home air purification system? Not something that makes the air smell nice, but something that removes dust and other particles from what you breath. Maybe it’s time to invest or upgrade. - Read the labels on what you buy. - The Endocrine Society. “Exposure to common flame retardants may raise the risk of papillary thyroid cancer.” ScienceDaily. ScienceDaily, 2 April 2017. <www.sciencedaily.com/releases/2017/04/170402111311.htm>. - US Environmental Protection Agency, “Technical Fact Sheet — Polybrominated Diphenyl Ethers (PBDEs) and Polybrominated Bophenyls (PBBs),” January 2014. - Wikipedia, “Decabromodiphenyl ether.” https://en.wikipedia.org/wiki/Decabromodiphenyl_ether
<urn:uuid:399f8c3c-97ef-4c0e-8e96-7982fc4c5c7d>
CC-MAIN-2018-39
https://vlcrain17.wordpress.com/2017/04/03/flame-retardants-household-dust-and-thyroid-cancer/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.942571
713
2.921875
3
Research Director of the Adam Smith Institute, Sam Bowman, wrote a comment piece for The Spectator detailing the links between education quality and long-term economic growth found in the ASI's new report "Incentive to Invest: How education affects economic growth". Better capital makes us richer. That’s uncontroversial when it comes to fixed capital like machine tools and computers, but it’s also true of human capital. Better educated workers create more productive jobs, increasing the total amount of wealth in an economy. In a new Adam Smith Institute report released today, Incentive to Invest: How education affects economic growth, we found a very significant relationship between improvements in education and growth. In our model, a 10 per cent increase in TIMSS Advanced test scores generates a long-term 0.85 per cent increase in annual economic growth. We argue that getting more children into independent schools through vouchers may be the easiest way of improving outcomes, and thus growth. Read the full article here. The report, “Incentive to Invest: How education affects economic growth”, reveals that Britain could add billions of pounds to its long-term economic growth by increasing access to private education.
<urn:uuid:9ba5f794-c700-4967-ad3e-b5b2961696ee>
CC-MAIN-2018-39
https://www.adamsmith.org/news/asi-research-director-writes-for-the-spectator-coffee-house-the-state-should-send-many-more-poor-children-to-private-schools
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.934186
246
2.546875
3
Forty nine years ago, my father gave a powerful address to the Chicago Freedom Movement Rally at Soldier Field in Chicago, Illinois. There, he emphasized that Black and Brown families were living in "rat-infested slums." Worse, minorities were paying a higher rent for less space while Whites, paying less in rent, were enjoying higher-quality housing, with more square footage. He said that the time had come for the nation to end the "long and desolate night of slumism." Dr. King was primarily speaking to the powerful businessmen, politicians and judges, who had their vision, in his words, "blurred by political expedience rather than commitment" to improve the living conditions by failing to address the dehumanizing housing conditions that characterized Chicago's West Side. There were many "West Sides" in the United States in 1966. In spite of the implementation of the Fair Housing Act, unfortunately, there are still numerous communities throughout the United States that are similar to those my father described almost fifty years ago. And, due to recent events, the progress that has been made to ensure stronger policies to prevent this type of housing discrimination is being threatened. Late last month, The United States Supreme Court heard oral arguments in the case of Texas Department of Housing and Community Affairs v. The Inclusive Communities Project. The Roberts Court will rule on whether or not the Fair Housing Act's doctrine of "disparate impact" should be preserved, or rule that this tool for evaluating covert housing discrimination should be eliminated. Many who are well-versed on this issue believe that the Court will nullify this Act since, historically, the nine justices have not routinely intervened in cases when the lower appellate courts have been in agreement. Since there has not been a question of the law, I fear that the outcome of the case will be a blow to yet another progressive measure that the United States Congress passed shortly after the assassination of my father, Dr. Martin Luther King, Jr., in 1968. Long gone are the days of the liberal consensus that characterized the United States from Franklin Roosevelt's New Deal, to Harry Truman's Fair Deal, to John F. Kennedy's New Frontier, and finally, to, perhaps the most liberal reforms of them all -- Lyndon Johnson's Great Society. Johnson, a principal champion of liberal government, signed the landmark legislative acts that characterized the Second Reconstruction, a period from the middle 1950s to 1970 of steadily progressive measures to address centuries of inequities suffered by blacks. President Johnson understood that America could not continue to compete with the world with blacks and minorities as members of a permanent underclass. Unlike President Johnson, this current United States Supreme Court appears to be adopting a strategy of Deconstruction similar to its Nineteenth-Century predecessors. Those predecessors struck down the Civil Rights Act of 1875, which declared that all citizens, regardless of color, were "entitled to the full and equal enjoyment" of public accommodations. This decision cleared the way for widespread legal segregation as states began to immediately redraft their constitutions to legalize the discriminatory practices against African-Americans. Shamefully, the Court's systematic dismantling of Section 5 of the Voting Rights Act and the Court's anticipated modification of the Fair Housing Act may cause it to be remembered by history as a strict constructionist Court with neither heart nor soul. Within five years, it has erased the gains of almost 60 years of progressive reform that sought to foster a spirit of what my father called "interconnectedness." This is extremely detrimental to our nation, to our global citizenry and to the realization of the "Beloved Community." Dr. Bernice A. King is Chief Executive Officer of The King Center
<urn:uuid:363a3654-67da-42be-b6ee-a643ab12dcc2>
CC-MAIN-2018-39
https://www.huffingtonpost.com/bernice-a-king/fair-housing--supreme-court_b_6623624.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.963468
746
2.578125
3
Flavored water can give you a low-calorie or calorie-free zing when you need a hydrating boost, but it can also give you a dose of the artificial sweetener aspartame. While aspartame in low doses is safe for many and it is approved by the Food and Drug Administration, it does come with potential side effects. Mental health journalist John McManamy notes people suffering from a mood disorder, such as depression or bipolar disorder, are at an increased risk of aspartame’s negative effects. Video of the Day Negative Physical Effects Aspartame has the potential to riddle your body with negative side effects, according to FitWatch.com. Dizziness, headaches and vision problems are those that can wreak havoc on your head, along with fatigue and problems sleeping. Your digestive system can take a beating, with side effects that include nausea, vomiting, diarrhea and cramps. The most severe side effects affect your entire body and include a rash or case of hives, changes in your heart rate, difficulty breathing and, in the most extreme cases, convulsions or seizures. Negative Mental Effects Mood swings top the list of potential negative mental effects of aspartame, with highs, lows and sudden shifts from one mood to another. Exacerbated depression is another potential side effect for those who already suffer from depression or another mood disorder. Aspartame can also lead to memory loss or problems remembering things. Those who are not overly sensitive to food additives or suffering from a mood disorder have a better chance of reaping the positive side effects of aspartame. The artificial sweetener can enhance the taste of the flavored water without adding excess calories, a key to weight maintenance and loss. It can also reduce the risk of tooth decay since aspartame does not result in cavities and decay. Aspartame is also friendlier to diabetics than waters flavored with natural sugar or other sugary juices and drinks. Water flavored with aspartame is not the only option for a low- or zero-calorie drink. Regular water without any additives offers no chance of negative side effects from aspartame or other artificial sweeteners. Add a bit of zest to plain water with a squeeze of fresh lemon or lime. Flavored water is not the only drink or food item that contains aspartame, either. Diet sodas often rely on the artificial sweetener, as do cakes, candies, canned foods, jams, jellies and many other foods and drinks.
<urn:uuid:302ce0e7-1fb9-46aa-be46-f6e18c86cde5>
CC-MAIN-2018-39
https://www.livestrong.com/article/462561-the-side-effects-of-flavored-water-with-aspartame/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.923824
522
2.53125
3
June 26, 2018 It is finally summer—and Americans are leaving their homes in droves to enjoy the balmy temperatures and sunshine in their backyards, parks, pools, and beaches. Most of us feel that moderate exposure to sun improves our health, appearance, and mood. But we also know that too much of a good thing can be dangerous—causing everything from skin rashes to sunburns, to sun poisoning to cancer. So why is it that so few of us use sunscreen when we are out and about? Indeed, according to the U.S. Centers for Disease Control, fewer than 15% of men and 30% of women report applying sunscreen to their faces and other exposed skin when they leave the house (or the office) for more than an hour. Women are more likely than men to apply sunscreen to their faces, in order to avoid the aging effects of too much sun—–perhaps accounting for their greater usage. Sunscreen use is particularly low among men, non-Hispanic blacks, people with less sun-sensitive skin, those who do not get the recommended amount of weekly aerobic physical activity, and people with lower incomes (under $60,000), the CDC reports. Another demographic that is likely to skimp on sunscreen is teenagers. Following a study by William Paterson University in Wayne, New Jersey, in 2011, lead researcher Corey Basch, an associate professor in the school’s Department of Public Health, commented, “Unfortunately we found a decrease in the overall percentage of teens who reported wearing sunscreen—[down] from 67.7% in 2001 to 56.1% in 2011. And even when they do look for sunscreen, many Americans don’t know which type really is best for them. According to the Food and Drug Administration , that would be “broad spectrum” brands that protect against both ultraviolet A and B radiation with an SPF of 30 or higher. UVA rays are believed to be responsible for the aging and wrinkling of skin; UVB rays are the culprit that causes cancer. That seems easy enough, but, the CDC again has some bad news for us: Nearly 40% of sunscreen users were unsure if their sunscreen provided broad-spectrum protection. For those who could use some help with their choices, Consumer Reports ranks commercially available sunscreens each year. According to the researchers at Consumer’s Union, the following products scored 81 or higher overall and were rated excellent or very good for UVA and UVB protection: - La Roche-Posay Anthelios 60 Melt-in Sunscreen Milk SPF 60 ($36, or $7.20 an ounce, score of 100); - Equate Sport Lotion SPF 50 ($5, or 63 cents an ounce, score of 99; and - BullFrog Land Sport Quik Gel SPF 50 ($8.50, or $1.70 cents an ounce, score of 95). The magazine also rated the top spray and stick sunscreens—two of which rated highly: - Trader Joe’s Spray SPF 50+ ($6, or $1 an ounce, score of 100); and - Up & Up (Target) Kids Sunscreen Stick SPF 55 ($8, or $6.67 an ounce, score of 85). Among natural sunscreens, California Kids #Supersensitive Lotion SPF 30+ scored highest. It received an overall score of 55 and costs $20 a package, or $6.90 an ounce. The report recommends against using sprays on kids until researchers know more about the dangers of inhaling them. If you do use them, Consumer Reports suggest spraying the solution onto your hand, then rubbing it into your skin. Among the recommendations for applying such products are the following, according to the American Academy of Dermatology: - Apply sunscreen generously 15 minutes before going outdoors; - Use enough—at least one ounce for an adult (about the amount you can hold in your palm) to fully cover your body;. - Remember your neck, face, ears, tops of your feet, and legs; - Use a balm with an SPF of at least 15 for your lips; and - Reapply sunscreen at least every two hours, or immediately after swimming or sweating. Finally, using sunscreen should not be your only defense against the sun. For the best protection, the experts says, stay in the shade and wear protective clothing, a hat with a wide brim, and sunglasses, as well as sunscreen. Research contact: 1-800-CDC-INFO
<urn:uuid:eeae5e63-8327-4151-b868-820b5c9fbf19>
CC-MAIN-2018-39
https://www.poll-vaulter.com/the-best-protection-under-the-sun/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.944761
948
3.421875
3
If you want to go on eating regularly in a rapidly warming world, then live in a place that’s either high in latitude or high in altitude. Alternatively, be rich, because the rich never starve. But otherwise, prepare to be hungry. That’s the real message of the Intergovernmental Panel on Climate Change’s report on the impact of warming on human beings, released this week: the main impact is on the food supply. Of course, everybody who was paying attention has already known that for years, including the scientists. It’s just that scientists are professionally cautious, and will not say anything that they cannot prove beyond any shadow of a doubt. An ordinary person will look out the back window and say that it’s raining. A scientist will feel obliged to look out the front window and make sure that it’s raining on the other side of the house too. (Cats do the same, although they are not scientists.) Then he must consider the possibility that the drops that are falling on the window-pane are some other clear liquid, like vodka, and he must check that it’s not simply a back-projection onto the windows. Only then can he state with 95 percent confidence that it’s raining. (The other 5 percent allows for the possibility that he might just be hallucinating.) The standards for evidence in science are much higher than they are in ordinary life, which is why it has taken the scientists on the IPCC so long to announce the same conclusion that any ordinary mortal who looked into the question would have reached five or ten years ago. (The scientists really knew it, too, of course, but they couldn’t yet prove it to the required standard.) But the World Bank, for example, has long known approximately how much food production every major country will lose when the average global temperature is 2 degrees C higher. At least seven years ago it gave contracts to think tanks in every major capital to answer precisely that question. What the think tanks told the World Bank was that India will lose 25 percent of its food production. China, I have been told by somebody who saw the report from the Beijing think tank, will lose a catastrophic 38 percent. But these results have never been published, because the governments concerned did not want such alarming numbers out in public and were able to restrain the World Bank from releasing them. So, too, for example, the armed forces of many countries have been incorporating predictions of this sort into their scenarios of the future for at least five years. The Pentagon and the Central Intelligence Agency in the United States and the British armed forces have been doing it openly, and I have seen strong indications that the Russian, Indian, Pakistani, Chinese and Japanese armed forces are also doing so. When you look at the scenarios in detail, they do not just predict serious food shortages in most tropical and sub-tropical countries (which account for about 70 percent of the world’s population). They predict waves of refugees fleeing from these countries, a proliferation of failed states in the sub-tropics, and even inter-state wars between countries that must share the same river system when there’s not enough water to go around. That’s still farther than the IPCC is prepared to go, but to the military it’s as obvious as the nose on your face. As for what will happen to crop yields by 2050, assuming an average global temperature 3 degrees C higher by then, you have to go elsewhere for information. The military don’t plan that far ahead. But the World Resources Institute published a map recently that estimated the losses country by country by 2050, and according to the WRI’s calculations they are really bad by then. Crop yields are down everywhere in the Middle East and the Mediterranean countries. In Morocco, Egypt and Saudi Arabia, they are down by 50 percent. All of Africa is down except Lesotho, Rwanda and Kenya, which are all or mostly above 1,000 metres in altitude. Food production is down in almost all of South America except Chile, also very high, where it is up. Crop yields in North America are down too, except in Canada and a few US states right along the Canadian border. High latitude is even better than high altitude. In Europe and Asia, latitude is decisive. Countries far away from the equator will still be doing well; countries even a bit closer to the equator get hammered. Russia, Scandinavia, Germany and Poland will be producing more food than ever, but southern Europe including the Balkans and even France and Ukraine will have lost production. India, China, and all of South-East Asia will be sharply down, as will Australia – but Japan will be only a bit down and New Zealand will be sharply up. It pays to be an island, too. But this is not a “mixed” result, in the sense that it all works out about even. The total population of all the countries where food production will be stable or higher in 2050 will be less than half a billion. At least eight-and-a-half or nine billion will live in countries where food production has fallen, sometimes very steeply. It will be a very hungry world.
<urn:uuid:bf72776d-100b-4564-8122-faafc1124c52>
CC-MAIN-2018-39
https://www.the-star.co.ke/news/2014/04/03/the-world-facing-a-very-hungry-future_c919810
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160754.91/warc/CC-MAIN-20180924205029-20180924225429-00479.warc.gz
en
0.958083
1,089
2.59375
3
Our Curriculum is built around the 2014 National Curriculum Programmes of Study and EYFS Development Matters. We believe that children learn best when they are confident to ‘have a go’ and understand that they can learn from mistakes. We want children to know themselves as learners and how best to learn. We also believe that children learn well when they are engaged and excited about what they are learning and have therefore developed the Brimsdown earning Adventure. Our curriculum ensures that meaningful links are made between subjects and pupils have a voice when considering topic choice and how to learn the skills, knowledge and understanding laid down in statutory guidance.
<urn:uuid:543ea72c-9c34-4ab9-86a4-61bcbb4ded46>
CC-MAIN-2018-39
http://www.brimsdown.enfield.sch.uk/our-learning/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163146.90/warc/CC-MAIN-20180926022052-20180926042452-00079.warc.gz
en
0.975987
129
2.953125
3
Among pregnant women at high risk of preterm birth, those who eat fish a few times a week may be less likely to deliver early, a new study finds. Whether fish itself helps prevent preterm delivery is not clear, the researchers stress. But, they say, the finding is in line with the general advice that pregnant women eat up to two fish meals per week. The study, reported in the journal Obstetrics & Gynecology, included 852 pregnant women who were at higher than average risk of preterm delivery because they had delivered early before. Overall, 70 percent said they had averaged at least a half-serving of fish per week during the first 4 to 5 months of pregnancy. Of those women, 36 percent went on to have a preterm birth. In contrast, that rate was 49 percent among women who ate fish no more than once a month. In general, the researchers found, women who ate two or three servings of fish per week were about 40 percent less likely to deliver early than women who ate fish less than monthly. There was no evidence, however, that a higher fish intake was related to any further cuts in preterm-birth risk. "It wasn't that the more fish you ate, the better," said lead researcher Dr. Mark A. Klebanoff, of Nationwide Children's Hospital in Columbus, Ohio. In fact, he said, the benefit may not come from fish at all. The researchers tried to account for factors that could make fish-eaters different from other women -- like their weight, race, education levels and smoking habits. But, Klebanoff said, there could still be something else about fish-lovers that explains the connection. "Whether it's the fish itself or something else, we cannot say," Klebanoff told Reuters Health. "Fish may have health benefits," he said, "but a lower risk of prematurity is not necessarily one of them." Still, Klebanoff pointed out, the U.S. Food and Drug Administration and the American College of Obstetricians and Gynecologists (ACOG) already recommend that pregnant women eat up to two fish meals per week. The reasoning is that fish is generally considered a healthy choice, being a source of omega-3 fatty acids. However, fish are often contaminated with traces of mercury, which could harm the developing fetal nervous system. So the advice is for pregnant women to choose fish low in mercury -- like canned light tuna, salmon and shrimp -- and limit themselves to a couple servings per week. They should completely avoid certain fish high in mercury: namely, shark, swordfish, king mackerel and tilefish. "Our findings are in line with the recommendations that are out there from the U.S. government and ACOG," Klebanoff told Reuters Health. Exactly why fish intake was tied to the odds of preterm birth is not clear. The women in this study had all been part of a clinical trial looking at whether omega-3 supplements could curb the risk of preterm birth in high-risk women. And the trial found no benefit of the fatty acid over placebo pills. So why would fish intake, but not omega-3 supplements, be linked to a lower risk? One possibility, Klebanoff said, is that other nutrients in fish help lower the odds of preterm birth. Another is that the trial started women on omega-3 too late: they began taking supplements between the 16th and 21st week of pregnancy. The bottom line, according to Klebanoff, is that the findings support guidelines for women to eat up to a couple servings of low-mercury fish per week. "But you probably don't want to go over that," he said. It's not clear whether the current findings might be true of all pregnant women -- including, Klebanoff said, those at average, rather than increased, risk of preterm delivery.
<urn:uuid:1febdce7-369b-48d5-96e4-b2c1e7a8764c>
CC-MAIN-2018-39
http://www.foxnews.com/health/2011/04/25/fish-eaters-lower-risk-preterm-birth.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163146.90/warc/CC-MAIN-20180926022052-20180926042452-00079.warc.gz
en
0.976904
815
2.828125
3
As the one of most hideous acts it significantly destroys child’s future. It is a serious offense and outnumbering countries are fighting it by defining legislations against this form of crime. Abuse may be any form of mental, physical and sexual mistreatment that leaves a deep impact on the child’s state of mind. This may take place anywhere, starting from public places, school home to any place child goes and interacts with others. Abuse may take several forms and here are some basic ones. Mental abuse also known as emotional or psychological really negatively effects all around development of the child, especially in the social sphere. Rise of pessimistic attitude and loss of confidence are two main symptoms specific for this abuse. There are also two specific and totally extreme psychological conditions that display as a result of this abuse, child either becomes extremely passive or too aggressive. Physical abuse is known as any kind of physical injury done to a child. Unfortunately it is very often that people who are involved in this kind of situation, especially parents, do not realize they are doing any unethical act or criminal offense. They are not aware that they might harm the child mentality for a long term. Sexual abuse is being reported around the world on daily basis and in the same time a large number of such a cases goes unreported every year. This kind abuse is an act when older person uses the body of a child for sexual satisfaction. This is in the same time an extremely delicate situation and horrific form of violence. It affects child both, physically and psychologically. Child neglect refers to not taking care of the child properly in order of providing basic necessities like food, hygiene, shelter or clothing. It usually happens when parents are not physically or psychologically fit to take care of the child or when they are addicted to drugs or alcohol. Poverty and apathy may also lead to a child neglect. Substance abuse is a situation when child is exposed to any substance or its manufacture which has negative effect as immediately also on long term. Usual substances in these cases are alcohol, tobacco and drugs. Children usually become hardcore drug addicts or alcoholics, indulge in anti-social activities which brings bad future as for them also for the society. Child exploitation takes form as recruiting children for laborious tasks, child trafficking or prostitution. These are very punishable acts and may be presented as social and moral evil.
<urn:uuid:4112432b-4512-4ac6-8bac-54fef7ff9ea9>
CC-MAIN-2018-39
http://www.wholechildtricounty.com/tag/types/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163146.90/warc/CC-MAIN-20180926022052-20180926042452-00079.warc.gz
en
0.962573
480
3.125
3
| Moscow is the capital of the Russian Federation and, with a population of nearly 9 million, of the world's largest cities. Historical development of the city occurred in a way that defines modern-day Moscow. Moscow emanates outward from the city's center, which includes the area around the Kremlin, and stretches roughly 68 miles to the "Circular Highway". | Moscow is dominated by the architecture and majesty of the many churches, palaces, government buildings, and museums that give the city its readily identifiable skyline. Historical records first make mention of Moscow in the 12th Century, and some buildings, particularly the well-known Cathedrals, date back to as early as the 15th Century. Due to its central location and access to water and railways, Moscow is also an economic center for the Russian Federation. Among the chief components of Moscow's economy are textiles, engineering and metal processing, the manufacture of construction materials and chemicals, woodworking, pulp and paper production, and printing. Learn more about The Russian Federation
<urn:uuid:c37a8f84-13cc-41b3-bbc1-21cb785e54a7>
CC-MAIN-2018-39
https://clintonwhitehouse5.archives.gov/WH/New/Russia/moscow.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163146.90/warc/CC-MAIN-20180926022052-20180926042452-00079.warc.gz
en
0.963493
208
3.03125
3
Stamping Out Tropical Disease Story by Salma Warshanna-Sparklin Photographs courtesy of the Institute of the History of Medicine, The Johns Hopkins University When Tony Golda was 8 or 9 years old, his father introduced him to stamp collecting. As an adult, he merged that passion with his early work in international health. The result: 904 tropical disease related stamps from around the world. Roughly half are dedicated to malaria with the rest linked to 16 other tropical diseases, including exotics like Bartonellosis. They come from locales such as Iran, Swaziland, Yugoslavia and the Solomon Islands. “Stamps can give good insight into the endemic nature of diseases that to this day contribute to shortened life expectancy,” says Golda, MPH ’73. “They tell the story of individuals and countries involved in the treatment and control of these diseases over the years.” The full collection can be viewed in the Historical Collection of the Institute of the History of Medicine, located on the third floor of the Welch Library Building. Tony's Fave Five Country of Origin: U.S.A. Stamp: “Bartlett, Josiah.” Josiah Bartlett signed the declaration of independence and was a physician in Philly. He introduced the use of “Peruvian bark,” or cinchona, for the treatment of “malignant angina”—now known as malaria—in the U.S. in the mid 1700’s. TG: “It’s an interesting conjunction of events. It shows that even as early as the 1700’s, you have a physician who signed the declaration of independence, yet he used a substance that came from Peru by way of Europe to treat people.” Country of Origin: Nicaragua Stamp: “Adult spraying, microscope, protozoa, stain.” Field workers spray insecticide, or another substance, on standing water. A light coat of oil is known to suffocate a juvenile mosquito in larval form. TG: “It shows all the aspects of combatting malaria: research, treatment and control.” Country of Origin: Solomon Islands Stamp: “Malaria Eradication.” A microscope with the Solomon Island archipelago in the background. TG: “I like the scientific aspect of things and this stamp shows the use of microscopy in identifying the pathogen in the blood that causes the disease in question.” Country of Origin: Mexico Stamp: "Anti-Malaria Campaign." TG: “This was the first stamp ever specifically issued for an anti-malaria campaign.” It was also the very first public health stamp Tony Golda collected Country of Origin: Jugoslavia Stamp: “Non-Standard: Variant of Official Emblem.” This is a detailed rendering of what a mosquito looks like when taking a blood meal. TG: “So many of the pictures of vectors are cartoonish, and don’t show enough anatomical detail. But this is about as detailed as these get and you learn an awful lot by just looking at this drawing. You wouldn’t want to meet this guy in an alley!” Additional content available on desktop browsers.
<urn:uuid:84f77e9d-94fb-4272-9a60-4728b110b3c6>
CC-MAIN-2018-39
https://magazine.jhsph.edu/2014/fall/departments/collections-stamping-out-tropical-disease/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163146.90/warc/CC-MAIN-20180926022052-20180926042452-00079.warc.gz
en
0.949263
698
3.296875
3
Last week I saw Cathy O’Neil talk at Harvard: Part of the talk was on how algorithms – and black box algorithms, in particular – can create unfair outcomes. O’Neil goes into this topic in much more detail (but also in a very easy to read and understand way) in her book Weapons of Math Destruction. The talk was part of a conference honoring Harvard math professor Barry Mazur who was O’Neil’s PhD advisor. At the end of the talk one of the questions from the audience was (essentially): What can someone who has a focus on academic math do to help the public understand some of the problems inherent in the algorithms that shape our lives? O’Neil said (again, essentially) that a good approach would be to find ways to communicate the mathematical ideas to the public in ways that were not “gobbledygook.” Although I’m not an academic mathematician, this exchange was on my mind and I decided to try out a simple idea that I hoped would help the boys understand how small changes lead can lead to very unequal outcomes. There are no equations in this project, just our new ball dropping machine. First I asked to boys to look at the result of several trials of the machine dropping balls and tell me what they saw. As always, it is really interesting to hear how kids describe mathematical ideas: Next I tilted the board a bit by putting a thin piece of plastic under one side. I asked the boys to guess what would happen to the ball distribution now. They gave their guesses and we looked at what happened. One nice thing was that my younger son noticed that the tails of the distribution were changed quite a bit, but the overall distribution changed less than he was expecting: I’m sorry this part ran long, but hopefully it was a good conversation. To finish up the project I tried to connect the changes in the tails of the distribution with some of the ideas that O’Neil talked about on Thursday. One thing that I really wanted to illustrate how small changes in our machine (a small tilt) led to large changes in the tails of our distribution. I hope this project is a useful way to illustrate one of O’Neil’s main points to kids. Algorithms can create unfairness in ways that are hard to detect. Even a small “tilt” that doesn’t appear to impact the overall distribution very much can lead to big changes in the tails. If we are making decisions in the tails – admitting the “top” 10% of kids into a school, firing the “bottom” 10% of employees, or trying to predict future behavior of a portion of a population, say – that small tilt can be magnified tremendously. It may not be so easy for kids to understand the math behind the distributions or the ways the distributions change, but they can understand the idea when they see the balls dropping in this little machine.
<urn:uuid:489779d0-8d06-4fcb-b7ea-26233ebd2131>
CC-MAIN-2018-39
https://mikesmathpage.wordpress.com/2018/06/09/helping-kids-understand-the-math-of-unfair-algorithms-inspired-by-a-cathy-oneil-talk/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163146.90/warc/CC-MAIN-20180926022052-20180926042452-00079.warc.gz
en
0.973082
617
3.015625
3
Although a man named Robert Street would build the first working compressionless engine in 1794, it was Leonardo da Vinci who was the first to describe the idea back in 1506. See how much you know about the milestones in car engine history, from the early days of steam to the progression of internal combustion engines. How much do you know about how car engines work? And how much do you know about how the English language works? And what about how guns work? How much do you know? Lucky for you, HowStuffWorks is about more than providing great answers about how the world works. We are also here to bring joy to your day with fun quizzes, compelling photography and fascinating listicles. Some of our content is about how stuff works. Some is about how much you know about how stuff works. And some is just for fun! Because, well, did you know that having fun is an important part of how your brain works? Well, it is! So keep reading!
<urn:uuid:7a3597ee-2943-4ad7-83c6-10083b2ce1c2>
CC-MAIN-2018-39
https://quizzes.howstuffworks.com/quiz/how-much-do-you-know-the-history-car-engines
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163146.90/warc/CC-MAIN-20180926022052-20180926042452-00079.warc.gz
en
0.971597
203
3.28125
3
When it comes to acting, great abilities cannot be formed overnight. Instead, significant effort and training are required to form an individual skilled in his or her craft. One of the most necessary and yet difficult components of great acting is learning to rip past the facade that covers the actors themselves and the characters they create to reveal the true identities within. Each person and character alike is multi-faceted as opposed to being one-dimensional and static. These dimensions consist of the individual or character’s public persona, his or her deep-seated fears and vulnerabilities, and the tragic flaw. Training with an acting coach can both aid the actor in discovering these dimensions in himself as well as allow him to utilize these personal traits to create very real characters. Carl Jung espoused the belief that the human person creates a public persona as a means of protecting his true self from others and conveying an image of strength and security as a means for survival. This persona is exemplified in all areas of our lives; from how we move to the way we speak and interact with others. Characters also have personas that they create to protect their true selves from the rest of the world and actors must learn to utilize their own personas to create those of their characters. Although the public persona is the dimension that is the most easily recognizable and obvious in a character, it is only an exterior facade and not the core of the individual. However, the core of a person lies in their innate strengths, fears, and issues that travel with us from childhood into adulthood. Acting coaches are trained to teach actors to come face to face with their own childhood fears and issues in order to create a truly believable character with great depth and dimension. These difficulties from our childhood remain with us to adulthood and shape the persona that we create to protect ourselves. Both actors and the characters they create form their public personas as a means of defending themselves from these insecurities. Both actual persons and characters use this public persona to cover up their insecurities and fears so as to reduce their helplessness in the world. In order to become an exceptional actor, a student must learn to remove the superficial exterior of both his and his character’s public persona in order to uncover the true self. Quality coaches at The Robert Winsor Institute work to train actors in communicating the sacred and intimate core of a person’s soul and being. Every member of the audience has both a public persona as well as a deeper substance that has worked to create the exterior. Regardless of whether or not they are aware of this fact, creating a dimensional character will never fail to hit a chord with the watcher. The exceptional actor is one who is able to create such a character. The Robert Winsor Institute and its different platforms, has been around for many years. Young actors get to learn not only how to successfully book work in film, print TV and commercials, but they also become extremely assertive. The Robert Winsor Institute Acting Classes is a team of top entertainment industry teaching professionals providing valuable insider tips and services to empower your craft and career! For more details, visit: http://robertwinsorinstitute.blogspot.com/
<urn:uuid:ca5733bc-a0e6-4286-8fb3-e58dc57b4055>
CC-MAIN-2018-39
https://robertwinsorinstitute.wordpress.com/2016/12/12/acting-workshops-being-vulnerable/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163146.90/warc/CC-MAIN-20180926022052-20180926042452-00079.warc.gz
en
0.971474
651
2.796875
3
From our neighbors and friends to celebrities and politicians, most of us probably know at least one person who is trying to avoid eating gluten. In fact, as many as 29 percent of US adults have admitted they want to cut down on the amount of gluten they eat or eliminate it all together. Gluten-free diets are the craze at the moment, but despite their popularity, many people would have difficulty answering the question, “what is gluten?” Even people actively attempting to avoid eating gluten may not realize exactly what it is. What is Gluten? Gluten is a protein found in a few common grains: wheat, rye, and barley. Gluten is actually a combination of 2 proteins that come together in the presence of water. Glutenin and gliadin (proteins present in wheat, rye, and barley) will combine to form gluten when the flours are mixed with water. Kneading also helps with the formation of gluten, an important step in making yeast breads. Gluten is a necessary protein in bread baking since it provides that elastic quality to doughs (think pizza dough) that is necessary for a successful loaf of bread or pizza crust. Because gluten is a protein, it’s a very common ingredient in vegetarian meat substitutes. Most vegetarian chicken substitutes contain gluten. Seitan, a common vegetarian protein is predominately gluten. You can even buy gluten in a powdered form, often referred to as vital wheat gluten. This product is in the baking section of most grocery stores and can be used when baking with flours that are gluten-free, such as rice, quinoa, amaranth or oat flours. Adding this powdered gluten can help you achieve a similar texture to baked goods made with wheat, rye, or barley, making it a very useful baking product. Do you know individuals avoiding gluten? Do you think they have a clear understanding of what gluten is?
<urn:uuid:65526fff-7a6f-418e-86aa-19a8d107c2a1>
CC-MAIN-2018-39
https://www.fitwoman.com/blog/what-is-gluten/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163146.90/warc/CC-MAIN-20180926022052-20180926042452-00079.warc.gz
en
0.964862
395
2.828125
3
One of the most common justifications for seeking to restrict and ban the use of coal is that burning coal causes massive health dangers such as high mercury levels in our bodies. But does it? Let’s separate myth from truth. The myth in a sentence Burning coal to generate electricity releases dangerous amounts of mercury that cause birth defects and other problems. The truth in a sentence The myth in a paragraph Coal naturally contains mercury, a neurotoxin that can damage the nervous system, the brain and other organs. When we burn coal, that mercury gets released into the atmosphere and ultimately rains down into bodies of water. This leads to higher mercury levels in fish, which leads to higher mercury levels in our bodies when we eat fish. Those levels are dangerous, particularly to the fetuses of pregnant women, whose children can experience developmental problems and learning disabilities. Therefore, coal is a massive threat to public health. The truth in a paragraph Mercury, a metal element, exists naturally throughout the world--most notably in the oceans, which are estimated to contain hundreds of thousands of tons of mercury, as well as in the air, soil and consequently in most forms of plant and animal life in various concentrations and chemical forms. Mercury is released in the air in substantial, though by no means toxic, quantities by volcanoes and wildfires. It is released in far smaller quantities by coal plants--an estimated 2,000 tons of manmade sources vs. tens of thousands of tons from natural sources. The most relevant form of human exposure is methylmercury from marine life, which is substantially influenced by biological processes but not by human emissions. Consuming above average amounts of fish is not detrimental to human health. Coal plants are not a dangerous source of mercury. They are, however, an essential source of electricity, which is an essential of every aspect of modern food production and health care. The whole truth Mercury, a metal element, exists naturally throughout the world--most notably in the oceans, which contain an estimated hundreds of thousands of tons of mercury, as well as in most forms of plant and animal life. Mercury is released in the air by volcanoes, wildfires, and in far lesser quantities, the burning of coal. That mercury eventually settles on land or water, and constitutes a portion of the small amounts of mercury that exists in most living things. As the map below shows, the regions with the most airborne mercury concentrations (Rocky Mountain and desert areas) do not match the regions with most coal emissions (New England). Mercury, like any substance, is toxic in certain forms and doses and harmless in others. The form of mercury that is of particular concern to human health is called methylmercury (or monomethylmercury), a combination of mercury, carbon and hydrogen. Discussions of “mercury poisoning” are misleading, because mercury only becomes methylmercury under certain conditions, and methylmercury can only be absorbed by human beings in relevant quantities under certain conditions (for example, the element Selenium seems to prevent the absorption of methylmercury). While these are important scientific questions, they are essentially irrelevant to the issue of coal, which is a minor source of mercury--especially because it has little if any impact on the amount of methylmercury consumed by humans, as the accumulation of methylmercury in living organisms is dominated by natural, local, geological, chemical and biological processes, such as the microbiology of wetlands. The availability of mercury is not the key factor in the formation of methylmercury. Coal has been singled out for political, not scientific reasons. Coal is one of the most important supplies of affordable and reliable energy and it is not significantly impacting human exposure to mercury in the environment. Given those two facts, it is very disingenuous to use mercury emission reductions as an argument to restrict the use of coal. Shutting down coal power will make electricity more expensive and threaten human health, while the impact on mercury exposure would be so small that it will have no observable effect.
<urn:uuid:efa22565-e590-4e88-a0d0-e12f5752d5bf>
CC-MAIN-2018-39
https://www.forbes.com/sites/alexepstein/2015/11/24/the-truth-about-coal-and-mercury/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163146.90/warc/CC-MAIN-20180926022052-20180926042452-00079.warc.gz
en
0.950108
834
3.1875
3
China marks World Environmental Day with inaugural Environmental Prize China marked this year’s world environmental day with its inaugural environmental prize, which is being dubbed the ‘ecological civilization award’. The prize, which is the brain child of China’s Ministry of Environmental Protection, will be held every three years. The inaugural edition of the prize attracted environmentalists from provinces and regions all over China, from which the winners were picked based on the best environmental practices. Participants from Tibet, Xinjiang, Zhejiang and Sichuan emerged as the winners of the inaugural edition, and received special recognition for their efforts at environmental conservation. In total, 19 groups and 33 individuals were feted for this worthy course. Shen Yueyue, chairperson of the National People’s Congress (NPC)’s standing committee, congratulated the government for introducing the awards and said the government had shown its commitment to ecological conservation. He also urged all citizens in all walks of life to be confident and determined to conserve the environment and said the award winners had vital lessons for everyone to learn about creating favourable environments for ecological conservation. Alongside this year’s award event was an ecological symposium held in Beijing with a view to promote ecological conservation for a beautiful China. The symposium brought together environmentalists from all sectors. During the award ceremony, the ministry also revealed that 133 cities and counties in China had been termed as Ecology Friendly cities/counties. Re-igniting the passion for environmental conservation China has been lagging behind in matters of environmental conservation, with the government burying its head in the sand in regards to the pollution that has adversely affected agriculture in regions with major industrial cities. It is hoped that these awards will trigger a surge in patriotism among organizations, companies, businesses and individual citizens who now see the need to create conducive environments for ecological conservation. Published by Green Jobs Online - 7th June 2016
<urn:uuid:8b999de9-d8ee-42df-831a-b167c9f0ee7a>
CC-MAIN-2018-39
https://www.greenjobsonline.co.uk/news/latest-news/china-marks-world-environmental-day-with-inaugural-environmental-prize
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163146.90/warc/CC-MAIN-20180926022052-20180926042452-00079.warc.gz
en
0.963464
397
2.5625
3
We see groundwater as a water reservoir inside the earth crust. It is defined that the top of the groundwater reservoir is called water table, but we rarely ever ask ourselves how deep groundwater is or about its quality. A complete vision of the hydrogeological system requires the understanding of the current state of groundwater quality and quantity. Recent studies show the presence of brackish water in groundwater systems in almost the whole territory of the United States . We do not have that kind of information about South American aquifers, but we could infer that there are also sceneries of deep high salinity in our countries. What is brackish groundwater? Brackish groundwater is water located under the surface which is more saline than freshwater but less saline than seawater. This kind of water can be found in wetlands or deep aquifers. Brackish water is defined as groundwater with a concentration of total dissolved solids (TDS) in a range from 1000 to 10000 mg/L. A description of the different water classifications in relation to its salinity is shown below. The presence of brackish water can affect the availability and the cost of use of water. The concentration of chemical species associated to brackish water can exceed the Environmental Quality Standards, impacting irrigation, transport and storage. Why does freshwater become brackish water? It is important to see groundwater as a reservoir, or as a glass. In this glass, freshwater has been stored for years and the ions related to salinity, which are heavier than water molecules, tend to go to the deeper horizons because of gravity. To understand salinity we need to take into account that water is the universal solvent, and as the water moves in the groundwater systems, it will dissolve the minerals of the porous media and its amount of total dissolved solids will increase as the residence time is higher. In the following figure we can see the effect of geologic time in the groundwater distribution in arid aquifers and the high residence times involved. When talking about groundwater it is important to mention that the time scales considered can vary from years and so on (decades, centuries, millenniums). These processes affect the chemical composition of water. Some horizons may be more productive and present better conditions for exploitation, however, the presence of freshwater aquifers intercalated with brackish water aquifers, limit its potential of being a permanent freshwater source. We do not know about the distribution of salinity with depth in most of the aquifers in our region. This limits the understanding and evaluation of potential freshwater source aquifers. Human activity and climate change sceneries present challenges in aquifer management which need to involve the global state of water quality and distribution of groundwater. - Stanton, J.S., Anning, D.W., Brown, C.J., Moore, R.B., McGuire, V.L., Qi, S.L., Harris, A.C., Dennehy, K.F., McMahon, P.B., Degnan, J.R., and Böhlke, J.K., 2017, Brackish groundwater in the United States: U.S. Geological Survey Professional Paper 1833, 185 p., https://doi.org/10.3133/pp1833. - Non-renewable Groundwater Resources, 2006, Foster et al., IHP-VI Series on Groundwater Nr. 10, url: http://unesdoc.unesco.org/images/0014/001469/146997E.pdf - Salinity of deep groundwater in California: Water quantity, quality, and protection, Kang and Jackson, 2016, Stanford University, url: http://www.pnas.org/content/113/28/7768.full?tab=author-info
<urn:uuid:0fcd0daf-811f-4b1d-b3c7-e47987291d1f>
CC-MAIN-2018-39
https://www.hatarilabs.com/ih-en/is-brackish-water-present-in-all-aquifers-how-does-it-affect-groundwater
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163146.90/warc/CC-MAIN-20180926022052-20180926042452-00079.warc.gz
en
0.91671
794
3.828125
4
Comparative law is where the relationship between different legal systems is studied, and both the similarities and differences between them are analyzed. Various legal regimes such as Common law, Civil law, Social law, Jewish law, Chinese law and Hindu law are studied. Although legal scholars are believed to have always practised similar methodologies, comparative law is said to have originated from Europe back in the 18th Century. Comparative law is paramount. It has increased significantly in the present day and age of both economic globalization and democratization. It is an academic discipline that involves studying legal systems, including those in their constitutive elements, how they differ and using their elements to combine a system. Additional article on pluralism.ca. Comparative law has its purposes. It contributes to the unification of legal systems of larger or smaller scales. It perfects the effects of the legal systems and also helps attain a deeper knowledge of the effects of legal systems. Despite the Comparative law being different from other fields of law such as the International Law, it helps the United Nation Systems to analyze the laws of different countries regarding their treaty obligations. More on challenge.berkeleylawblogs.org. Sujit Choudry is the founding Director of Center for Constitutional Transitions. He is the I. Michael Heyman Professor of Law at the University of California, Berkeley – School of Law, check this on constitutionaltransitions.org. It is recognized internationally in its authority on Comparative Constitutional law and politics. Constitutional Transitions combine wide-ranging research agendas with broad field experiences and advise them on the processes of building the constitution including countries such as Egypt, Libya, Sri Lanka, South Africa, Tunisia, Jordan, and Ukraine. To date, Center for Constitutional Transitions has worked with over 50 experts from more than 25 countries. It also partners with a global network of multilateral organizations, NGOs and thinks tanks. Sujit Choudry has spoken and lectured in over 24 countries. His research has addressed a variety of issues in politics and comparative law. Sujit Choudry has also published book chapters, working papers, reports, and over ninety articles. Sujit Choudhry is an active member of the Executive Committee of the International Society of Public Law, Advisory Board for the Cambridge Studies in Constitutional Law, Editorial Board of the Constitutional Review and the International Advisory Council of the Institute for Integrated Transitions (IFIT). More to read about Choudhry on linkedin.com.
<urn:uuid:9fa998f6-c62a-4f85-877a-426cd4d3b9b1>
CC-MAIN-2018-39
http://appletonteachers.org/category/leading-law-educator/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00119.warc.gz
en
0.960003
500
2.59375
3
Understanding the historical context is key to understanding an inspector calls if you are sitting the higher tier, it will be especially important to. I saw this question in a past paper: 'to what extent is 'an inspector calls' a good title' what could i say to answer the question, because all i can t. Aqa gcse english literature an inspector calls english literature an inspector calls an aqa gcse english literature an inspector calls essay/coursework. Immediately download the an inspector calls summary, chapter-by-chapter analysis, book notes, essays, quotes, character descriptions, lesson plans, and more. Ocr gcse english literature qualification information including specification, exam materials, teaching resources, learning resources. A few lessons for an inspector calls act the mr birling's speech lesson looks at dramatic irony and links this to context there is also an extract question at. The edexcel international gcse in english literature specification gives the option of assessment by coursework or 100% examination offering teachers a broad choice. An inspector calls study guide contains a biography of jb priestley, literature essays, quiz questions, major themes, characters, and a full summary and analysis. View the wjec gcse english literature qualification, specification, training, past papers and other resources available for teachers and students gweld y cymhwyster. Oxnotes gcse/igcse revision gcse english literature theme of : an inspector calls the five themes of an inspector calls discussed on oxnotes are responsibility. A secondary school revision resource for gcse english literature about the plot, characters and themes in j b priestley's an inspector calls. The final speech- rachel jones during the inspector’s final speech priestly is attempting to convey a moral message to the audience.Everything you need to study for or to teach the edexcel certificate in english literature, including key documents and the latest news. Ldg home inspection, llc for radon and termite and have completed all the necessary coursework to be a certified and licensed home inspector both call. Best academic help starting from $798 per page get discount now best academic papers writing service - best in usa, inspector calls essay help. What is the function of the inspector in ‘an inspector calls’ grade descriptors for coursework on pieces of card – enough copies for sequencing in small. A free english literature essay on an inspector calls, by jb priestly this essay can help with gcse english coursework. An inspector calls exam questions present the change in sheila during the course of the play an inspector calls assessment and coursework gcse and. English literature aqa: 'an inspector but the final telephone call, announcing that a real inspector is on his way to ask an inspector calls essay/coursework. Students who searched for quality inspector: job description, duties and requirements found the following related articles and links useful. An inspector calls - key quotations “you’re squiffy” – sheila to eric (act 1) • shows eric/ sheila’s brother/ sister relationship • colloquial language.
<urn:uuid:6ef5f01c-7c4c-401e-b146-c6715e9006d0>
CC-MAIN-2018-39
http://bjessaykvlr.elranchitochicago.us/an-inspector-call-coursework.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00119.warc.gz
en
0.90006
653
2.765625
3
It’s the week before winter vacation and all through the school, not a student is listening, and that’s just not cool. The teachers are coming up with lessons out of thin air because they are practically burnt out by this time of year. If this is you, please keep reading… Boy do I know the feeling around this time of the year, so I have created some fun projects for your students to do that will be fun for them and fun for you too! Most of the following activities can be completed with materials you already have on hand or from what students have at home that they may not be using anymore. These are great ways to get rid of unwanted/un-needed items, engage your students while giving them a break, yet teaching them about recycling and giving all at the same time. So here they are! Coupon Books-Explain to your students that sometimes the best gift can be the gift of time. Encourage students to make coupon books for family members and/or friends with everyday art materials and creative minds. Here is the information sheet for more detail about the activity Coupon Book Activity Pillowcase tote bags– Got old pillowcases at home that you no longer use or ask your students to bring in theirs to make these quick and easy bags. Students may then decorate them with ribbons, sequins, rhinestones, etc. and they are great to use or inexpensive gifts to give away. Here is a tutorial for creating a tote vintage-pillowcase-grocery-tote-tutorial Recipe in a jar-Using basic baking ingredients and very inexpensive mason jars from the Dollar Tree or reusable jars from home, allow students to find basic recipes to put in a jar and give away as gifts for teachers, family members, and even friends-You may even want to use this idea for yourself. (This is also a great fundraising idea-wish I could have gotten this idea out sooner but it will be in my fundraising section!) Check out this website for some ideas for recipes to put in the jar-http://www.allfreecrafts.com/giftinajar/index.shtml Favorite Recipes Cookbook-Allow students to get a little creative and make small cookbooks to use as gifts. They can include their favorite recipes from the semester, find favorite foods that they enjoy from the internet or find recipes that they know people prepare around the holidays to make their holiday dinner preparations a lot easier. However, don’t just allow them to print them out and put them together, have them creatively decorate them almost like a scrapbooking cookbook that you see in the picture. Food gifts-Have students that are good at baking or enjoy cooking to make food gifts. Remind students that food gifts can be just as great as expensive gifts because everyone likes food and also this is very inexpensive depending on the type of food item you prepare. Also remind your students with this activity that packaging/presentation is everything! BIG FINALE-Handmade Gift Exchange-Of course this is the time of year when everyone wants to exchange gifts but it’s not always fair because everyone’s funds are not the same. So here is your chance and your students’ chance to get creative. Have a handmade gift exchange where you could have the entire class pull names and every gift has to be something hand made. Now all things listed above are great ideas, but don’t forget the other ideas that are in the clothing section of this website as well. This should be fun! So, being in the spirit of giving I will be having a drawing for a surprise Just FACS gift set! All you have to do is email me pictures of your students’ completed projects or yours for the holidays and your name will be entered into the drawing. The deadline to enter is Saturday, December 18, 2010. The winner will be announced on Sunday, December 19, 2010. Please email me at firstname.lastname@example.org HAPPY HOLIDAYS from JUST FACS!!!
<urn:uuid:9658d76a-bc33-42d4-986d-2a19ffc29657>
CC-MAIN-2018-39
http://justfacs.com/2010/12/the-week-before-winter-break/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00119.warc.gz
en
0.958909
844
2.671875
3
HISTORY | PHILOSOPHY | RELIGION | SCIENCE | ECONOMY | | SYNCHRONY |GENEALOGICAL TABLES | HISTORICAL MAPS | | SITE MAP |COMMUNICATIONS | SEARCH | HOME PAGE | | ITALIAN VERSION | THE DECREES OF EMPEROR THEODOSIUS THE TRADITIONAL RELIGION Locality: Roman Empire Age: IV century A.D. The decree of February 391: prohibited to enter in temples 24 February 391 the emperor Theodosius, said from the Christians " the Great", a person who has been baptized as a christian in 380, emitted the legislative provision " Nemo se hostiis polluat ", that: - renewed the putting to the ban of any sacrifice, public or private; - prohibited the traditional ceremonies of State still in use in Rome: - prohibited for the first time the access to the sanctuaries and the temples: " nobody can approach the sacrifical altars, can walk inside the temples or can worship images forged by human hands "; - forbade in an explicit way the apostasy from the Christianity , pain the loss of testamentary rights. The provision had been strongly wanted by the new minister of the Interior, the catholic Rufinus , and by saint Ambrosius bishop of Milan, in agreement with the groups of monks engaged to plunder and to destroy illegally pagan temples in the oriental provinces. The traditions and the patrimony of the classic culture were cancelled by a provision modeled on the behavior held by hebrew people towards the religion of the canaanitic people. The decree of 16 june 391: extension of the prohibitions The decree of 16 june 391, emanated in Aquileia, extends the previous dispositions also to Egypt, where Alexandria enjoyed, from ancient date, of special privileges relating to local cults, comprised the sacrifical ceremonies . The pagans pray in their homes Under the effect of the persecution many houses became cult places, where the pagans gathered in order to continue in their traditional religion. The third decree of 391: destroy the temples With the third decree of 391 the persecution intensified and many felt themselves authorized to begin the destruction of pagan buildings. In Alexandria the bishop Teophilus began a systematic campaign of destruction of the temples. The temple of Serapis, greek-egyptian divinity who united in himself Zeus and Osiris, was besieged by the Christians. The bishop Teophilus and the prefect Evagrius, together with the men of the military garrison, started the demolition work. The bishop Teophilus wanted to give good example giving the first stroke against the colossal statue of the God Serapis. Analogous episodes happened at Petra, Areopolis, Canopus, Heliopolis, Gaza and in many other localities. The emperor Theodosius never did take part in order to stop the Christians. In Gaul saint Martin of Tours did not want to remain behind regarding to the bishop Teophilus and began a destruction campaign. The fourth decree of 392: pain of death The fourth decree was emanated in Constantinople by Theodosius the 8 November of 392. According to the historians Williams and Friell " the decree was characterized by an absolute intransigence towards the local traditions that can be compared to that one of a dictatorial atheistic regimen which criminalized Easter eggs, the palm, Christmas cards, Halloween pumpkins and even some universal habits, as a toast ". The decree established: - the pain of death for people who carried out sacrifices and divinatory practices - the confiscation of the places where they carried out the rituals - heavy fines for the decurions who did not apply the law faithfully - the prohibition of libations, altars, votive offerings , torches, domestic divinity of the hearth, crowns and garlands, bands on the trees, etc. Williams S. - Friell G. Theodosius - The Empire at bay CONOSCERE LA STORIA PER CREARE IL FUTURO TO KNOW THE HISTORY TO CREATE THE FUTURE
<urn:uuid:213aaee6-de21-4009-8213-514cd34045ab>
CC-MAIN-2018-39
http://maat.it/livello2-i/editti-teodosio-i.htm
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00119.warc.gz
en
0.915033
894
3.125
3
Did you know that Auckland, New Zealand, is the first city to celebrate the New Year and Honolulu, Hawaii is the last to celebrate it? Around the world, New Year festivities begin on 31st December, New Year’s Eve. As the clock strikes midnight, everyone bids adieu to the old year and greet each other a ‘Happy New year’. The same date but different festivities in various countries make the New Year the most celebrated holiday. Let’s take a look at the different festivities followed by people around the world: New Year’s Eve celebrations around the world Spanish people believe that eating twelve grapes, at midnight of the New Year, brings good luck. Thus, at every stroke of the clock, at midnight on New Year, they pop in a grape. 2. Rio de Janeiro, Brazil The Copacabana beach is famous for hosting the largest New Year celebrations worldwide! Millions of people from around the world come here to attend the huge party. Traditionally, the local Rio public honors the beach by throwing white flowers into the sea. People also dress up in white as a good luck charm. Fireworks start on New Year’s Eve and continue till the next day. 3. United States Times Square in New York is a famous place where everyone gathers on New Year’s eve. The tradition is to drop the huge New Year’s eve ball from the Times Square flag pole when it is just 1 minute to midnight. When the ball drops, it releases thousands of confetti, messages on colored paper. These messages have been left by the local public days before the New Year celebrations. People from Southern United States believe in eating black eyed peas and turnip greens on New Year. The peas represent coins and the turnip greens represent dollars. They believe that by doing this, the New Year will bring them good money. 4. Sydney, Australia The world’s largest firework show on New Year’s is held here. Though the show lasts only for 12 minutes, starting at the stroke of midnight, the beautiful extravaganza attracts people to be a part of this celebration from all over the world. People here want the new year to bring in more money and prosperity. Thus, they dress up in polka dotted clothes and gather in streets and localities, throwing coins at midnight or by keeping coins in pots and shaking them in their own homes. For the Greeks January 1st is also Saint Basil’s Day, one of their forefathers. It is the day for gift giving, telling stories and leaving presents at midnight in children’s shoes. Every Greek family bakes a cake on this day which has a silver or gold coin hidden inside. The cake slices are passed to everyone and whoever gets the coin is believed to have a lucky year ahead. People in Japan, in the evening of December 31st, eat a bowl of a special type of noodles called ‘toshikoshisoba.’ While eating they listen to the sound of Buddhist temple bells which are rung 108 times at the midnight hour of New year and is supposed to remove all evils and sins. To read more interesting festivals for kids, click HERE
<urn:uuid:c95ac87e-eca5-417b-8669-8dc37e0d5cf5>
CC-MAIN-2018-39
http://mocomi.com/new-year-celebrations-around-the-world/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00119.warc.gz
en
0.934612
667
2.5625
3
E-Safety at St George's E-safety is a very important part of our work with children, families and staff. Increasingly our concerns about children's safety are linked to their behaviours online and using portable devices susch as mobile phones and tablets. We explicitly teach children about e-safety and work with our partners at Hi-Impact and NSPCC to promote e-safety from a very young age. We also run regular parents' meetings to develop their understanding of the risks online, gaming and with portable devices. All curriculum staff are trained in e-safety and receive regular updates. We have attached our policies, school presentations and some resources. We have also attached links and leaflets for families to promote e-safety at home. We actively encourage families to use NSPCC New Net Aware website as a 'go to' platform for E-safety. Please visit their website. We also signpost families to Think U Know Parents advice centre with videos and leaflets on E-safety advice. Further links include: Click on the links below to access: - CEOP's (Centre for Online Protection) Think U Know resources for parents. They offer practical guidance and advice for families that will help to keep your children safe. - Kids Smart provides advice for parents on different devices and software. A very practical guide for damilies. - Safer Internet Uk also offer invaluable advice for families and information how to report any online concerns. - NSPCC's excellent parents information advice on dealing with online safety.
<urn:uuid:7a546c56-b6e2-41dc-a255-019080103219>
CC-MAIN-2018-39
http://stgeorges.wirral.sch.uk/page/e-safety-at-st-georges/38208
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00119.warc.gz
en
0.941879
319
3.078125
3
Women’s belly button is one of the fascinating areas for many men. Many women adore the belly button by piercing it and wearing a jewel to add more beauty and glamour. However it is essential to keep the belly button hygiene to prevent it against any infection. Unless there is an infection in the belly, it would not produce any odor. Very often the smelly belly button is harmless and mainly due to keeping it less ventilated or moist most of the time. The area is dark and warm giving no breathing space for fresh air. Hence it becomes susceptible for bacterial or fungal infections that may produce bad smell. The presence of dead skin cells is also a reason for smelly belly. There is variety of factors that would cause bad smell in the belly button. Candida is the fungi that cause unpleasant smell in many of the private parts including belly button. The infection may also cause inflammation on the belly and it may also affect the navel area. For some people, it may build up pus like liquid on the belly that may ooze out. In rare case, the infection may develop into urachal cyst. It begins as small cracks on the umbilical cord and slowly progresses to develop into a cyst. Since it grows on the Urachus area the name urachal cyst is given. In that case, the affected person would get fever and abdominal pain. Eventually the cyst may burst one day upon which there will be leakage of yellowish fluid from the belly. If you have any of such symptoms, you need to consult your doctor without delay. Any smell on the belly button is indicative of fungal infection. The area should be kept clean and moist-free for preventing against any infection. The foul smell on the belly is due to the Candida infection and sometimes the underlying tissues may develop swelling. Many times, there may be smell in the belly button due to excess of sweat. The debris and other small particles get blocked in the opening of the belly causing foul smell. Some women prefer to pierce the belly button but would not bother to keep it in good condition. It may cause inflammation and pain if the piercing is not done through sterilized needles. When it develops into infection with swelling it could produce yellowish green liquid from the belly button which is called ‘Sepsis septicemia’. Smelly belly button can be treated by over the counter anti-fungal ointments and creams. Topical creams are readily available for treating belly smell. You can try the simple home remedy method of cleaning the affected area with anti-bacterial gel or soap thoroughly. Further you can apply hydrogen peroxide solution on the belly to get rid of foul smell. It is very effective to cure any type of infection. Alternatively you can clean the area with warm salt water once or twice a day. Common salt will absorb any leftover moisture in the belly giving no room for infection. It would also act as protective cover for preventing further infection on the belly. This method is easy and simple way of avoiding the smelly belly button. Once the salt gets hard in the area, you can simply wash it off with cold water. Try using few drops of nystatin liquid on the belly area for clearing any fungal infection.
<urn:uuid:d2f2e1bc-ef86-45a8-97b1-c9b659200802>
CC-MAIN-2018-39
https://diseasespictures.com/smelly-belly-button/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00119.warc.gz
en
0.942056
674
2.6875
3
17 Oct “La castanyada”, the chestnut tradition What are you associate with a word “autumn”? For many people autumn is a synonym of leaves on the floor and for others is a time to… Eat chestnuts! Do you know about the chestnut celebration in Spain? The “Magosto” or “Castañada” is a tradition that celebrates in the north of Spain, along the coast of Galicia, Cantabria, then in Cataluña, Aragón, Asturias and Castilla y León; in some places of Portugal, too. In both countries, this tradition takes place from 1st to 11th of November. The beginnings of this tradition comes drom All Saints Day, exactly on the 1st of November night. In the past, people had a family get together in an intimate night dedicated to the dead members of the family or friends. The ritual said that each chestnut that they’d ate at night represented one dead. During the Castanyada (castañada in Catalan), customarily people eat chestnuts with panellets, a sweet dessert that people buy or make at home during this celebration. In addition to this, it is common to eat boniatos (sweet potatos), some fruit and moscatel wine too. Moreover, if you walk around the city, you will see people selling roasted chestnuts. It is so delicious! Nowadays, the Castanyada is very influenced by the Halloween. A lot of people mix both traditions: they have dinner with their family or friends, and then go to celebrate Halloween night. It is a great plan!
<urn:uuid:c7a71f5d-c541-46fd-84ef-9b7806ee3a89>
CC-MAIN-2018-39
https://hotelarclarambla.com/blog/la-castanyada-the-chestnut-tradition/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00119.warc.gz
en
0.959503
351
2.515625
3
Symptoms and types of ear cancer Ear pain could indicate a more serious health issue such as inner ear cancer. Ear problems are not uncommon however, cancer in the ear is rare. Ear cancer is mostly found in the outer part of the ear, however, some symptoms are indicative of inner ear cancer. Ear cancer could be in three parts In case of outer ear cancer, the symptom is a spot or pink lump that does not go away in a month and stays. The main signs of middle ear cancer are hearing loss and earache. However, constant pain in the inner part of ear, headache, hearing loss, dizziness, or a ringing in the ear could be signs of inner ear cancer. The presence of cancer cells can be confirmed through the process of biopsy, where a small amount of tissue is taken from the problem area and analysed. Ear cancers can be treated through treatments such as surgery, radiotherapy and chemotherapy. Operations can be done to remove the affected parts but that can cause hearing loss and vertigo- loss of balance in the patients.
<urn:uuid:b983d75c-9ef8-4d35-adbe-8b892b5382de>
CC-MAIN-2018-39
https://newzhook.com/story/15455
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00119.warc.gz
en
0.960606
223
2.765625
3
“Pygmy perch swam across the desert” As regular readers of The G-CAT are likely aware, my first ever scientific paper was published this week. The paper is largely the results of my Honours research (with some extra analysis tacked on) on the phylogenomics (the same as phylogenetics, but with genomic data) and biogeographic history of a group of small, endemic freshwater fishes known as the pygmy perch. There are a number of different messages in the paper related to biogeography, taxonomy and conservation, and I am really quite proud of the work. To my honest surprise, the paper has received a decent amount of media attention following its release. Nearly all of these have focused on the biogeographic results and interpretations of the paper, which is arguably the largest component of the paper. In these media releases, the articles are often opened with “…despite the odds, new research has shown how a tiny fish managed to find its way across the arid Australian continent – more than once.” So how did they manage it? These are tiny fish, and there’s a very large desert area right in the middle of Australia, so how did they make it all the way across? And more than once?! The Great (southern) Southern Land To understand the results, we first have to take a look at the context for the research question. There are seven officially named species of pygmy perches (‘named’ is an important characteristic here…but we’ll go into the details of that in another post), which are found in the temperate parts of Australia. Of these, three are found with southwest Western Australia, in Australia’s only globally recognised biodiversity hotspot, and the remaining four are found throughout eastern Australia (ranging from eastern South Australia to Tasmania and up to lower Queensland). These two regions are separated by arid desert regions, including the large expanse of the Nullarbor Plain. The Nullarbor Plain is a remarkable place. It’s dead flat, has no trees, and most importantly for pygmy perches, it also has no standing water or rivers. The plain was formed from a large limestone block that was pushed up from beneath the Earth approximately 15 million years ago; with the progressive aridification of the continent, this region rapidly lost any standing water drainages that would have connected the east to the west. The remains of water systems from before (dubbed ‘paleodrainages’) can be seen below the surface. Biogeography of southern Australia As one might expect, the formation of the Nullarbor Plain was a huge barrier for many species, especially those that depend on regular accessible water for survival. In many species of both plants and animals, we see in their phylogenetic history a clear separation of eastern and western groups around this time; once widely distributed species become fragmented by the plain and diverged from one another. We would most certainly expect this to be true of pygmy perch. But our questions focus on what happened before the Nullarbor Plain arrived in the picture. More than 15 million years ago, southern Australia was a massively different place. The climate was much colder and wetter, even in central Australia, and we even have records of tropical rainforest habitats spreading all the way down to Victoria. Water-dependent animals would have been able to cross the southern part of the continent relatively freely. Biogeography of the enigmatic pygmy perches This is where the real difference between everything else and pygmy perch happens. For most species, we see only one east and west split in their phylogenetic tree, associated with the Nullarbor Plain; before that, their ancestors were likely distributed across the entire southern continent and were one continuous unit. Not for pygmy perch, though. Our phylogenetic patterns show that there were multiple splits between eastern and western ancestral pygmy perch. We can see this visually within the phylogenetic tree; some western species of pygmy perches are more closely related, from an evolutionary perspective, to eastern species of pygmy perches than they are to other western species. This could imply a couple different things; either some species came about by migration from east to west (or vice versa), and that this happened at least twice, or that two different ancestral pygmy perches were distributed across all of southern Australia and each split east-west at some point in time. These two hypotheses are called “multiple invasion” and “geographic paralogy”, respectively. So, which is it? We delved deeper into this using a type of analysis called ‘ancestral clade reconstruction’. This tries to guess the likely distributions of species ancestors using different models and statistical analysis. Our results found that the earliest east-west split was due to the fragmentation of a widespread ancestor ~20 million years ago, and a migration event facilitated by changing waterways from the Nullarbor Plain pushing some eastern pygmy perches to the west to form the second group of western species. We argue for more than one migration across Australia since the initial ancestor of pygmy perches must have expanded from some point (either east or west) to encompass the entirety of southern Australia. So why do we see this for pygmy perch and no other species? Well, that’s the real mystery; out of all of the aquatic species found in southeast and southwest Australia, pygmy perch are one of the worst at migrating. They’re very picky about habitat, small, and don’t often migrate far unless pushed (by, say, a flood). It is possible that unrecorded extinct species of pygmy perch might help to clarify this a little, but the chances of finding a preserved fish fossil (let alone for a fish less than 8cm in size!) is extremely unlikely. We can really only theorise about how they managed to migrate. What does this mean for pygmy perches? Nearly all species of pygmy perch are threatened or worse in the conservation legislation; there have been many conservation efforts to try and save the worst-off species from extinction. Pygmy perches provide a unique insight to the history of the Australian climate and may be a key in unlocking some of the mysteries of what our land was like so long ago. Every species is important for conservation and even those small, hard-to-notice creatures that we might forget about play a role in our environmental history.
<urn:uuid:c8968e64-8f9d-4788-b04e-4578d35e394c>
CC-MAIN-2018-39
https://theg-cat.com/2018/06/20/how-did-pygmy-perch-swim-across-the-desert/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00119.warc.gz
en
0.965109
1,365
3.09375
3
You'll be crying over the repair bill. Starting with all '96 models sold in the U.S, and therefore many other countries, there is now a second oxygen sensor after each catalytic converter, along with the ones in front that have been there since the '80s. When the engine is running properly, the front oxygen sensor(s) will switch from "rich" to "lean" about twice per second. During lean periods, unburned oxygen is stored in the catalyst. During rich periods unburned hydrocarbons mix with that oxygen and are burned. The Engine Computer adjusts the average fuel / air mixture by adjusting the ratio of lean times to rich times. That makes for lowest emissions. All the rear oxygen sensors do is monitor the exhaust gas leaving the catalytic converters to see if it's staying somewhat lean or somewhat rich. If the converter is working properly, those sensors will switch between rich and lean perhaps once every minute or two. If the converter isn't completely cleaning up the emissions, the rear oxygen sensor will switch between rich and lean a little faster; lets say once per minute. As the converter loses more of its efficiency, the switching rate might increase to three times per minute. If the converter stops doing anything at all, no change will take place in the composition of the exhaust gases, so the front and rear oxygen sensors will switch at exactly the same rate. Before it even gets that bad, the faster rear switching rate is what the Engine Computer looks at to determine the converter isn't doing anything. It will set a diagnostic fault code, "catalytic converter efficiency". Operation of the front, or "upstream" oxygen sensor works with the Engine Computer and its other sensors to PREVENT excessive emissions. The catalytic converter takes care of those emissions that occur in spite of our attempts to create clean exhaust. The rear oxygen sensor just makes sure that is happening. Thanks to this system, you can suck on today's cars' tail pipes and live to tell about it. Emissions are mostly carbon dioxide and water vapor. Besides the harmful emissions resulting from removing the converter, two other things will happen. There are well over 2,000 potential diagnostic fault codes that can be set by the Engine Computer. About half of them refer to something that could have an adverse affect on emissions, and those are the ones that must turn on the Check Engine light. It's plain to see that removing the converter will set that "converter efficiency" code and turn the light on. Now, since the light is already on, how will you ever know if a totally different problem is detected? That problem could be a very minor one that will quickly turn expensive if ignored. The second problem is the Engine Computer is constantly monitoring dozens of sensor readings and operating conditions. Most of the time the computer compares numerous things to each other to figure out when something is wrong. For example, it knows that when the throttle position sensor is indicating the engine is at idle, it had better not be running at 4,000 rpm. Also, when starting a cold engine, the coolant temperature sensor and the intake air temperature sensor had better be reading the same temperature. When a problem is detected with a sensor, the computer knows it can't rely on its readings to test anything else it compares to them, so some of those self-tests will be canceled. It's not until the first problem is repaired that those tests will resume. If this goes on long enough, there's a good chance a second or third problem will develop, but if those tests are not taking place, they won't be detected. There won't be any related fault codes set. When you finally take the car to your mechanic, perhaps because now it has a running problem, all he has to go by is the first fault code that is in memory. His estimate for repair will be based on that code and his diagnosis. Once that repair is completed and he takes the car for a test drive, the self-tests resume, and that's when the second or third problems are detected, and new fault codes are set. Now he has to tell you more diagnosis time and parts are needed. We hate having to do that, and it's a common reason car owners unfairly assume we misdiagnosed the problem the first time. Without those diagnostic fault codes the computers give us, it would take days to test each circuit until we found the one with the problem, and if it's an intermittent problem that isn't acting up while we're in there testing, we'll never find it. That is what will happen if the catalytic converter is removed. If your engine develops any type of running problem, we are going to have to install a new converter first, then drive the car until a fault code sets, THEN return to the shop and start the new diagnosis. Why is removing the converter even coming into question? Friday, March 13th, 2015 AT 2:52 AM
<urn:uuid:f07e6459-92c5-40f3-b481-7f06f8ca6ad5>
CC-MAIN-2018-39
https://www.2carpros.com/questions/2008-mercedes-benz-c200-catalysts-filter-remove
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00119.warc.gz
en
0.961825
1,012
2.65625
3
Toxic Chemical Exposure Resource Directory VA Regional Training Letter DoD has performed air sampling at Joint Base Balad, Iraq and Camp Lemonier, Djibouti. Most of the air samples have not shown individual chemicals that exceed military exposure guidelines. The air sampling performed at Balad and discussed in an unclassified 2008 assessment tested and detected all of the following: (1) Particulate matter; (2) Polycyclic Aromatic Hydrocarbons; (3) Volatile Organic Compounds; and (4) Toxic Organic Halogenated Dioxins and Furans (dioxins). Each of the foregoing is discussed below with the exception of particulate matter, which will be discussed later in this letter. Polycyclic Aromatic Hydrocarbons. Polycyclic Aromatic Hydrocarbons (PAHs) are a group of over 100 different chemicals that are formed during the incomplete burning of coal, oil and gas, garbage, or other organic substances. Some of the PAHs that were tested for and detected are listed below. These results are from DoD testing at Balad from January through April 2007. Volatile Organic Compounds. Volatile Organic Compounds (VOCs) are emitted as gases from certain solids or liquids. They include a variety of chemicals, some of which may have short- and long-term adverse health effects. VOCs are emitted by a wide array of products numbering in the thousands. Examples include: paints and lacquers, paint strippers, cleaning supplies, pesticides, building materials and furnishings, office equipment such as copiers and printers, correction fluids and carbonless copy paper, graphics and craft materials including glues and adhesives, permanent markers, and photographic solutions. The following list reveals some of the VOCs that were tested for and detected at Balad. These results are from DoD testing from January through April 2007. Benzene Carbon Disulfide Methylene Chloride Pentane ** Acrolein and Hexachlorobutadiene were occasionally detected far above the MEG ratio—once over 1800 percent above the MEG for Acrolein and over 500 percent above the MEG for Hexachlorobutadiene. Toxic Organic Halogenated Dioxins and Furans. Dioxins are well known to VA because of their association with tactical herbicide use in Vietnam. Below is a list of the dioxins and furans detected at Balad from January through April 2007. 1,2,3,4,6,7,8 HPCDD 1,2,3,4,6,7,8 HPCDF 1,2,3,4,7,8,9 HPCDF 1,2,3,4,7,8 HXCDD 1,2,3,4,7,8 HXCDF 1,2,3,6,7,8 HXCDD 1,2,3,6,7,8 HXCDF 1,2,3,7,8,9 HXCDD 1,2,3,7,8,9 HXCDF 1,2,3,7,8 PECDD 1,2,3,7,8 PECDF 2,3,4,6,7,8 HXCDF 2,3,4,7,8 PECDF 2,3,7,8 TCDD 2,3,7,8 TCDF octachlorodibenzodioxin See Agency for Toxic Substance and Disease Registry, Department of Health and Human Services (retrieved Aug. 20, 2009, at http://www.atsdr.cdc.gov/tfacts69.html#bookmark02). See USACHPPM Report No. 47-MA-08PV-08/AFIOH. See U.S. Environmental Protection Agency Site at http://www.epa.gov/iaq/voc.html. See USACHPPM) Report No. 47-MA-08PV-08/AFIOH.
<urn:uuid:3a2a33a1-0a8d-4197-882c-05d61716bccf>
CC-MAIN-2018-39
https://www.burnpits360.org/Chemical-Health-Effects.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00119.warc.gz
en
0.871319
861
2.53125
3
In this section Flossing should be started when your child is around 2 to 3 years of age, under the direction of your child's dentist. Prior to this age, flossing is not necessary. Children usually need assistance with flossing until they are 8 to 10 years of age. The importance of flossing: Brushing teeth properly and consistently helps to remove most dental plaque, however, brushing alone cannot remove plaque that is located in places that a toothbrush cannot reach, particularly in-between teeth. In addition to removing plaque, flossing also helps to: - Remove debris that adheres to teeth and gums in-between teeth - Polish tooth surfaces - Control bad breath Flossing should take place at least once a day for two to three minutes each time to be most effective. Types of dental floss: Regular, consistent flossing is the single most important weapon against plaque, perhaps more important than the toothbrush. The different types of dental floss include the following: - Waxed and unwaxed - Flavored and unflavored - Wide and regular Your child's dentist or other oral healthcare provider can provide a demonstration of any of the following flossing techniques. They include: - Spool method (also called the finger-wrap method) - Cut off a piece of floss that is approximately 18 to 20 inches in length. Lightly wrap each side of the piece of floss several times around each middle finger. Next, carefully maneuver the floss in-between the teeth with your index fingers and thumbs in an up and down, not side-to-side motion. It is best to bring the floss up and down making sure to go below the gumline, forming a "C" on the side of each tooth. - Loop method (also called the circle method) - Cut off a piece of floss that is approximately 18 inches long, and tie it securely in a circle. Next, place all of the fingers, except the thumb, within the loop. Then, use your index fingers to guide the floss through the lower teeth, and use your thumbs to guide the floss through the upper teeth, making sure to go below the gumline, forming a "C" on the side of each tooth. Other flossing techniques: Flossing tools, such as a prethreaded flosser or floss holder may be helpful for people who are just learning how to floss, individuals with limited dexterity in their arms and/or hands, or persons who are flossing the teeth of someone else (particularly a child or disabled person). Irrigating devices, such as waterpicks, are not considered a substitute for brushing and flossing. These devices may be effective around orthodontic braces that retain food or in areas a toothbrush cannot reach. However, they do not remove plaque.
<urn:uuid:2a8f0655-0842-4fb7-8b3f-b94b6c68efd5>
CC-MAIN-2018-39
https://www.chw.org/medical-care/dental-care/dental-and-oral-health/flossing
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00119.warc.gz
en
0.943237
602
3.671875
4
New research suggests dealing with the loss of a loved one really could break your heart. We are bombarded by old wives’ tales about people who never recover after the death of their true love, but now it seems that bereaved individuals are at a greater risk of developing an irregular heartbeat for a year after the loss. This condition is known as atrial fibrillation and can heighten the chances of having a stroke or heart failure, with certain individuals more than 40 per cent more likely to develop this than someone who hasn’t experienced such grief. Researchers in Denmark examined data from 89,000 people diagnosed with atrial fibrillation between 1995 and 2014. This was then compared to health records collected from 886,000 healthy people. They discovered that 17,478 people who had been diagnosed with the condition had also lost a partner. The risk was greater when the death of a partner had been unexpected, while people aged under 60 and dealing with bereavement were more than twice as likely to develop atrial fibrillation. The study, which was published in U.K. medical journal Open Heart, determined that greatest risk was evident eight to 14 days after the death of a loved one. “The loss of a partner is considered one of the most severely stressful life events and is likely to affect most people, independently of coping mechanisms,” the scientists, from Aarhus University, wrote in the report. “In this large population-based study, the severely stressful life event of losing a partner was associated with a transiently increased risk of atrial fibrillation, which lasted for about one year. Researchers added that the risk was especially high for those who were young and those who lost a relatively healthy partner. Experts are calling for those dealing with bereavement to be monitored by their doctor to see if symptoms develop.
<urn:uuid:6442ac41-2daf-44df-bccf-f8a74eb3e1bf>
CC-MAIN-2018-39
https://www.cosmo.ph/health/health-report/can-you-really-die-from-a-broken-heart-a1128-20160408
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00119.warc.gz
en
0.984534
381
2.921875
3
The new figures have been released by the NHS and show that during 2011 there were more than 114,000 cases of self-poisoning in England, Wales and Northern Ireland (figures for Scotland are not available). In 2001 there were just 79,000 cases reported. According to the Royal College of Psychiatrists, self-poisoning is the most common form of self-harm treated in hospitals. Amy Ratnett, 28, told BBC Newsbeat that she began to self-poison when she was 21. Her first experience of self-poisoning was a suicide attempt but when it didn’t work she began taking overdoses as a form of self-harm. “I would come home from work on a Friday evening, take an overdose, call an ambulance, spend the weekend in hospital and then go back to work on a Monday as if nothing had happened,” she said. Self-poisoning can lead to organ failure and in some cases it can be fatal. The British Red Cross says more needs to be done to educate young people so they know how to deal with a friend who may be self-harming in this way. Campaign manager Paul Donnelly wants to provide young people with first aid information to prevent the rise in hospital admissions. The organisation has since launched a campaign offering tips to youngsters. Amy implores other young people to get support if they need it as there is always somebody who wants to listen. Mental health charity Mind says May tends to bring a spike in calls about self-harm, which they attribute to the exam period. To find out how a counsellor could help you, please visit our Self Harm page. View and comment on the original BBC article.
<urn:uuid:b4746903-0096-432e-b710-2b077df4f0b9>
CC-MAIN-2018-39
https://www.counselling-directory.org.uk/blog/2013/05/08/cases-of-self-poisoning-on-the-rise
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00119.warc.gz
en
0.979203
360
2.828125
3
Protected Voices: Safer Campaign Communications The FBI’s Protected Voices initiative provides cybersecurity recommendations to political campaigns on multiple topics, including safer campaign communications, to help mitigate the risk of cyber influence operations targeting U.S. elections. Hi, I’m Erica, a computer scientist with the FBI. In this video, we'll talk about how a few proactive communication practices can effectively enhance your campaign's overall cybersecurity. Given the importance of communications to a campaign, both in managing its operations as well as connecting with voters, it's no surprise that communications also represent a significant potential vulnerability. Communications can include personal and official email, messaging apps, and social media. Each of these forms of communication may be essential to running a successful campaign, but you should be aware of the potential dangers of cyber attacks through these various channels. Your campaign should use the most secure methods of communication to reduce the likelihood of intrusion. Keep in mind, most secure does not always mean practical. Security and convenience often work on a continuum—with the most convenient practices tending to be the least secure. Use your best judgment for what makes sense for your campaign. A common method used for securing communication is encryption. Encryption encodes information, making it unreadable to anyone but those who have a key to decode the encrypted data. This method can be very effective in ensuring your information remains safe from attackers. There are numerous ways to implement encryption so that even if an attacker gains access to your information, he or she will be unable to use it without a lot of effort. Look for trusted vendors of encrypted communication services for texting, email and voice; there are several solutions available, and some are free. To help prevent attackers from stealing information, don't keep more than you need. You can do this by disabling the “archive” and “save old messages” features on your communication devices and applications; these are typically defaulted to automatically save. Disabling this feature is the electronic equivalent of shredding documents. Depriving attackers of opportunities to attack can greatly improve your defenses. Ensuring only devices with a need to connect are granted connectivity to your systems will reduce the resources needed to monitor and defend networks. One way of doing this is to create access control lists. Access control lists typically consist of ‘white lists’ or ‘black lists.’ Whitelisting is a method of restricting access to only pre-approved devices or connections. Blacklisting involves denying access to devices which are presumed or known to be not trustworthy. Blacklisting and whitelisting are often based on device characteristics, such as a unique identifier, or the ways in which devices are trying to connect, such as a source IP address. Whitelisting, while more restrictive and secure, is often not practical for networks that need to respond to unknown users, like the constituents a campaign may be trying to reach. Blacklisting regions of the world that don’t have an approved or anticipated relationship with your campaign can greatly decrease the amount of threats your campaign faces. Communications infrastructure shouldn't be left on overnight when no one is in the office. When you leave for the day, turn off devices and, where possible, turn off your office Wi-Fi networks, which can offer adversaries a potential route into your operations. Ideally, personal devices wouldn't be used for campaign activities, but sometimes this can’t be helped, as campaigns often rely on personal devices for business. If your campaign uses personal devices, establish a written bring your own device policy, or BYOD. BYOD provisions should include installing special safeguards on personal devices to ensure protection against malware; full disk encryption—meaning all data on the device is encrypted; remote wiping of the device, in case it gets lost or stolen; and the ability to implement the timeliest updates. Devices should include lockout features for excessive incorrect login attempts, and default passwords and usernames should be changed. Another way to keep your campaign communications private is to use an encrypted app for secure messaging. You can easily find reputable, secure group messaging apps with a little research. If you use a secure messaging app to harden your communications, encourage all of your staff to also use that same app. BYOD provisions are often called ‘endpoint protections’ because they’re designed to protect the devices furthest outside of a network—the endpoints. We encourage your campaign to research reputable endpoint protection vendors. A great endpoint solution will also have the ability to monitor whether devices are remaining compliant. When finding an endpoint solution, look for one which will make sense for your campaign. Finally, create an incident response plan in case any of these protections fail—and review our video on incident response for some tips on drafting a plan. Having a plan and resources in place beforehand can be critical to minimizing or preventing harm when a crisis does hit. Remember, your voice matters, so protect it. - 09.04.2018 — Facebook Live Event: An Inside Look at Physical Fitness - 09.03.2018 — Smithsonian Assists FBI in Minnesota Ruby Slippers Case - 08.30.2018 — Protected Voices: Information Security (InfoSec) - 08.30.2018 — Protected Voices: Wi-Fi - 08.30.2018 — Protected Voices: Social Engineering - 08.30.2018 — Protected Voices: Virtual Private Networks - 08.30.2018 — Protected Voices: Router Hardening - 08.30.2018 — Protected Voices: Patching, Firewalls, and Anti-Virus Software - 08.30.2018 — Protected Voices: Passwords - 08.30.2018 — Protected Voices: Incident Response - 08.30.2018 — Protected Voices: Have You Been Hacked? - 08.30.2018 — Protected Voices: Cloud-Based Services - 08.30.2018 — Protected Voices: Browser and App Safety - 08.29.2018 — Seattle Detective Describes Sex Trafficker David Delay's Methods - 08.29.2018 — Seattle Special Agent Describes David Delay Sex Trafficking Case - 08.29.2018 — Seattle Sex Trafficking Survivor Shares Her Story - 08.28.2018 — Apply for the FBI Honors Internship Program - 08.03.2018 — Unexpected Agents at the FBI - 08.03.2018 — FBI Special Agent Careers – Law Enforcement
<urn:uuid:83f26067-a889-4b0b-82b6-9649692f0fdb>
CC-MAIN-2018-39
https://www.fbi.gov/video-repository/protected-voices-safer-campaign-communications-083018.mp4/view
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00119.warc.gz
en
0.905569
1,347
2.734375
3
Cilantro used to purify water Developing countries often can’t afford to use in-home water purification systems or more advanced technology to purify drinking water. There is a need for lower-cost, sustainable alternatives, and researchers are conducting studies on various natural materials that can latch on to heavy metals in a way that can filter water. Mexico, in particular, does not have a system to filter out heavy metals. Professor Douglas Schauer, Ph.D., from Ivy Tech Community College in Indiana, along with six of his students, traveled to Mexico’s Universidad Politécnica de Francisco I. Madero in Hidalgo. Their purpose was to study the effectiveness of an ingredient growing right in their backyards—cilantro. Schauer and his students worked with scientists from Mexico’s university in small-scale experiments. They found that cilantro may be more effective than some other methods, such as activated carbon, in removing heavy metals from water. Cilantro’s potential purification abilities could be attributed to the architectural structure of its cells, which lends itself to absorb heavy metals, researchers said. Schauer said their studies suggest that cilantro shows promise as a way to remove toxic heavy metals from water and that it could be used like tea-bags or reusable water filter cartridges to purify drinking water. Much more research, however, needs to be done to confirm the herb’s purification abilities. These findings were presented in the 246th National Meeting and Exposition of the American Chemical Society.
<urn:uuid:7acd9727-1f6a-4b7d-a12e-842f269d8a9a>
CC-MAIN-2018-39
https://www.healthcentral.com/article/cilantro_used_to_purify_water
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00119.warc.gz
en
0.949919
320
3.40625
3
The name Johnsyon was carried to England in the enormous movement of people that followed the Norman Conquest of 1066. It comes from the given name John and the name literally means "son of John." The given name John is derived from the Hebrew which means Jehovah has favored. The name was extremely popular in the Middle Ages as a result of the numerous connections between the name John and the Christian Church. Early Origins of the Johnsyon family The surname Johnsyon was first found in Lincolnshire , where many of the ancient and leading houses of the family name claim descent originally from the house of FitzJohn in Normandy , particularly that of one of the leading branches and oldest, the Johnsons of Ayscough-Fee. CITATION[CLOSE] Lowe, Mark Anthony, Patronymica Britannica, A Dictionary of Family Names of the United Kingdom. London: John Russel Smith, 1860. Print. Later, the Yorkshire Poll Tax Rolls of 1379 list many of the name: Willelmus Joneson; Willelmus Johnson, 1379; Robertus Johanson; Juliana Jonesson; Ricardus Joneson; and Robertas Jonson. CITATION[CLOSE] Bardsley, C.W, A Dictionary of English and Welsh Surnames: With Special American Instances. Wiltshire: Heraldry Today, 1901. Print. (ISBN 0-900455-44-6) Early History of the Johnsyon family This web page shows only a small excerpt of our Johnsyon research.Another 82 words (6 lines of text) covering the years 1296, 1375, 1503, 1572, 1637, 1629, 1675, 1644, 1713, 1680, 1689, 1659, 1719, 1689, 1719, 1688, 1775, 1682, 1735, 1717, 1719, 1797 and are included under the topic Early Johnsyon History in all our PDF Extended History products and printed products wherever possible. Johnsyon Spelling Variations Anglo-Norman names tend to be marked by an enormous number of spelling variations . This is largely due to the fact that Old and Middle English lacked any spelling rules when Norman French was introduced in the 11th century. The languages of the English courts at that time were French and Latin. These various languages mixed quite freely in the evolving social milieu. The final element of this mix is that medieval scribes spelled words according to their sounds rather than any definite rules, so a name was often spelled in as many different ways as the number of documents it appeared in. The name was spelled Johnson, Joneson, Jonson, Joynson and others. Early Notables of the Johnsyon family (pre 1700) Outstanding amongst the family at this time was Benjamin Jonson (1572-1637), an English playwright, poet, actor, and literary critic; Daniel Johnson (1629-1675), an English buccaneer born in Bristol, who sailed against the Spanish during the late 17th century becoming known among the Spanish as "Johnson the Terror"; Sir Nathaniel Johnson (1644-1713)... Another 78 words (6 lines of text) are included under the topic Early Johnsyon Notables in all our PDF Extended History products and printed products wherever possible. Migration of the Johnsyon family to Ireland Some of the Johnsyon family moved to Ireland , but this topic is not covered in this excerpt.Another 76 words (5 lines of text) about their life in Ireland is included in all our PDF Extended History products and printed products wherever possible. Migration of the Johnsyon family to the New World and Oceana Because of the political and religious discontent in England , families began to migrate abroad in enormous numbers. Faced with persecution and starvation at home, the open frontiers and generally less oppressive social environment of the New World seemed tantalizing indeed to many English people. The trip was difficult, and not all made it unscathed, but many of those who did get to Canada and the United States made important contributions to the young nations in which they settled. Some of the first North American settlers with Johnsyon name or one of its variants: Alice Johnson, who settled in Virginia in 1635; as did Abraham Johnson in 1648; Benjamin Johnson, who immigrated to Barbados in 1660; Thomas Johnson, who sailed to St. John's, Newfoundland in 1666. Johnsyon Family Crest Products - ^ Lowe, Mark Anthony, Patronymica Britannica, A Dictionary of Family Names of the United Kingdom. London: John Russel Smith, 1860. Print. - ^ Bardsley, C.W, A Dictionary of English and Welsh Surnames: With Special American Instances. Wiltshire: Heraldry Today, 1901. Print. (ISBN 0-900455-44-6)
<urn:uuid:d40f5b71-a04d-4b09-93e8-1a3cf4254df3>
CC-MAIN-2018-39
https://www.houseofnames.com/johnsyon-family-crest
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00119.warc.gz
en
0.930494
1,035
2.734375
3