text
stringlengths
112
651k
id
stringlengths
47
47
dump
stringclasses
9 values
url
stringlengths
13
1.77k
file_path
stringlengths
125
142
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
40
143k
score
float64
2.52
5.19
int_score
int64
3
5
Shattering of Liberal Consensus and the American Involvement in Vietnam War Events facilitated by both the emergence of civil rights movements and the assassination of U.S president J. Kennedy were key elements in shattering the liberal consensus in the 1960s. Liberal ideologies that had been well-established since the 1950’s in the USA came apart in 1968 with the upcoming civil rights movements in the early 1960’s. This intact phenomenon was closely related to the America’s economic success. Liberalism advocated for eradication of poverty by empowering the minority through education. It held a school of thought that it is only through education that people would compete equally in the job market. The notion that the Civil Rights Act (1964) vis-à-vis education would resolve the ills of discrimination did not hold. It is proper adoption and application of theories such as Keynesian’s economics that guaranteed economic success. This constant growth of economy fueled the liberal belief that economic problems as well as civil rights will be resolved. However, questions have been raised about how such fundamental ideologies could be shattered and why. Factors attributed to the fall of the liberal consensus are, for instance, Vietnam War, diminishing economy and the upsurge of the civil rights movements.The Vietnam War’s impact on the economy is an example of signals for activism by civil rights movements. The Civil Rights and Black movements in the 1960’s were led by intelligent and visionary leaders. Iconic figures such as Martin Luther King and Malcolm X led these movements. These organizations in the early 1960s were fighting for equal rights and they included the Nation of Islam, Student Nonviolent Coordinating Committee (SNCC), Revolutionary Action Movement (RAM), Organization of American Unity (OAAU), Black Panther Party, and Students for a Democratic Society (SDS). These movements organized conferences, held rallies, and made publications to express their beliefs and to show how many American people were oppressed and in particular the black minority. For instance, SDS organized a demonstration on 17th April 1965 protesting the Vietnam War. The movement also requested economic freedom and a paradigm shift from the capitalist economy. However, this did not last long; its fall came in the late 1960s. Students from a Democratic Society gained its influence and massive support from the disorderly social systems which promoted oppression of the racial minorities. RAM which was formed in 1963 by black college students advocated for a Marxist revolution in a military-styled campaign. Its activities did not last for long and in1967 its leadership was attacked by law enforcement agencies. In 1966, activists in California formed Black Panthers after being frustrated with persistent oppression and inspired by philosophies of Malcolm X. They requested equality for all, end of Vietnam War, and better education services. The Montgomery Bus Boycott in 1955/1966 and subsequent recognition of Rosa Parks as “Mother of the Modern day Civil Rights Movement" and the 1954 Brown v. Board of Education Topeka landmark ruling also formed the base for the revolutionary change . Although these civil rights movements continued their revolution crusade, they were drastically affected by the fact that their leaders had been killed. Malcolm X was assassinated in 1965 whereas Martin Luther King Jr. was assassinated in 1968. However, with their continued activism, major achievements, for instance, government recognition and the enactment of Civil Rights Act were recorded. This became a wake-up call to the government that a paradigm shift was a necessity. It is thus undisputable that human rights movements were paramount in changing the face of events and the status quo in various aspects of liberalism in the 1960s. The rights movement has thus been paramount in the democratization process in U.S both at international and internal levels. Time and again, rights movements were regarded as a threat to the established social order. Failure to understand the right movement’s contradictions imposed potential delay on shattering liberalism. Today, accolades are given to Martin Luther’s dream even though many liberals, such J. Edgar, fear the capacity of rights movements to cause dissatisfaction within America. Following the death of U.S president, John F. Kennedy, there were a lot of changes regarding the issue of liberalism as supported by the president. According to Pierson, progressive liberalism was at stake in 1968 despite narratives regarding America’s liberalism weakness and optimism that it could be successfully perfected. There was a speculation that Kennedy’s assassin was an affiliate to the radical right and hence liberals could not believe that Lee Harvey was in fact a communist. Most leaders argued that Kennedy`s death was a casualty while others saw his death as a result of the Americans anger and hatred. The basics of liberalism changed during1963-1968 with Kennedy’s death having a pivotal role in this change. It is worth noting that during the decade preceding the 1960s, liberalism had been future oriented and progressive. By 1968, liberalism had changed significantly with the liberals now claiming that America’s prosperity was founded on despoiling the environment and materialism. The liberals labeled America as a country of dictators signifying a change in discourse and indicating an end of the American liberalism. In the 1950s, there was a lacked consensus on what liberalism meant, but this trend changed after 1963 in that it was transforming from a new deal’s programmatic liberalism to a liberalism based on ideas. In defense of this change, the liberals termed the changes as an evolution based on a new liberal tradition. Following the assassination of Kennedy, people from North East regions started to move to South West. Cultural issues emanating from the assassination of Kennedy were also the main factored in the course of liberalism change. Initially, liberalism was based on the American exceptionalism but all these beliefs changed after Kennedy’s death with liberals taking an adversarial stand against the USA, and this has continued for years. As Pierson notes, the change in liberalism signaled an increasingly high instantiation with regard to the American experience. According to Hilsman, liberalism became deeply divided in the aftermath of Kennedy’s assassination and was highly characterized by revolution and irrationalism. Being incapable of coming to an agreement regarding Kennedy’s assassination, the liberals established the ideology of a martyred president who died for a country that did not deserve it. Due to the failure to consider Kennedy as a democrat assassinated by communists, the liberals set the stage for the destruction of liberalism. America’s Involvement in Vietnam The Vietnam War was one of the worst consequence resulting from the U.S intervention and control over the affairs of other countries in a bid to further its interests. Being one of the longest wars in U.S history, the Vietnam War was fought for about ten years starting from 1965. The Vietnam War was the most unpopular war ever fought by America in the twentieth century. The war resulted into the death of approximately 60,000 Americans and 2 million Vietnamese people. Many people though were skeptical regarding the role of U.S in the Vietnam War describing it as the worst blunder and /or sin while others saw it as a noble act or an idealistic effort of the U.S to protect South Vietnam from the totalitarian French government (Arthur, 1966). Following the Second World War, Ho Chi Minh of Vietnam was highly instrumental in helping the American pilots who had been downed during the war and was also involved in gathering intelligent information for America regarding Japan. It is due to this involvement that Vietnam established ties with the USA and thus made their goal of an independent Vietnam known to Indochina. The area covering Vietnam was a significant concern during and after the Second World War (Rotter, 1987). This concern attracted the support of Stalin, America and Chiang in advocating for the conversion of Indochina to a trusteeship hence establishing its independence rather than remaining a French colony. Later, even with the influence of FDR in place, America offered support to France for maintaining Indochina as a French colony despite the resistance of Vietnamese people. The colony status led to an even stringent French rule over Vietnam resulting into the death of millions of Vietnamese people. Despite repeated calls by Vietnamese leaders such as Ho Chi Minh in the 1940s to American officials including President Truman to help them stop French rule, the USA ignored these requests. Following U.S and French negligence, Vietnam sought for help from the communists to fight for its independence thus prompting the USA to take a non-involvement approach to the French-Vietnam conflict. Dissatisfied with the involvement of communists in Vietnam problem, America became more withdrawn from the issue of assisting Vietnam even though American experts could not prove this affiliation. Following the differences in opinion existing between the states revolving around the affairs regarding Vietnam, a conflict between the United States and South East Asia powers escalated. This is because the U.S opposed communism as it held the notion that communists lacked the capacity to govern and also could not manage important regions and resources. Following an intensified conflict between Vietnam and France, the French withdrew their control over Vietnam and thus transferred power to Vietnamese Bao Dai. Though recognized by the USA, Bao, on the contrary, was not recognized by the Vietnamese as their leader as he served the goals of France and the USA. At that time Vietnam was divided into South and North Vietnam, and America was dealing with Bao and France that by now was losing considerably in terms of their hold on the region. The U.S thus started support Ngo Dinh Diem since it was believed that it would be easier to work with them through Ngo Dinh rather than Bao. Dinh seemed to be more submissive to the plans of the USA. He lived in the USA during the war between Indochina and France, and he became the first president of South Vietnam. This was after being ‘democratically’ elected due to U.S intervention. America had immense influence on the elections as both candidates for South Vietnam presidency: Ngo Dinh and Bao Dai were the U.S’s favorites. Ngo’s election was as a result of much coercion by the U.S dictating to Vietnamese people how to vote. The USA even went to an extent of beating the Vietnamese who opposed their ideas. The USA supported the CIA Vietnamese forces which were particularly instrumental in Ngo’s unfair election. Following the victory (98.2 %), US advisors had counseled Ngo to declare at least 70% victory to make it seem real, but he refused. These initial experiences that Vietnam had with the Western ‘democracy’ soured their relation with U.S leading to deep rooted distrust of American systems and its involvement into the affairs of Vietnam. In 1956, the USA interfered with the national elections called through the peace accords after noting that Ho Chi would likely become the victor in the open elections. During Ngo rule American troops offered enormous support to protect him from any attempts to seize him. For instance, both the America’s military forces and CIA were very instrumental during President Kennedy’s rule in countering any opposition force in Vietnam. The USA provided financial support to Ngo Dinh to help him set up a militant government system that would effectively handle opposition and enhance the enforcement of laws which he passed in favor of the USA. These laws impoverished Vietnamese people and denied them the freedom to worship. This was a strategic move by the U.S to indirectly suppress Vietnamese communists while trying to unite North and South Vietnam. In 1963, America supported Vietnamese forces, which assaulted demonstrators from South Vietnam advocating for freedom to worship. America by all means tried to provide Diem (Ngo Dinh) with all possible support. Despite the existence of the Geneva accord, Lansdale continued to intimidate Vietnamese people by reporting of a new war supported by the USA, hence more people moved southwards and hence strengthening his supporters’ bloc even more. In the long last, President Kennedy’s administration realized that Diem was not the best leader to rely on to further their interests in Vietnam. Kennedy thus proposed a military coup against Diem through the CIA. In 1963, the USA gave about $40,000 to destroy Diem’s government. America had thus successfully supported and then brought down a monster. It is in 1965 that America got involved in the Vietnam War officially supporting minor interests of the Vietnamese through which the U.S would also benefit. U.S intervention would be particularly paramount to Diem in fighting the Southern Communist-based guerillas: Viet Cong, a political organization, was a great threat to Diems influence in the south. Supporting Diem, the U.S, apart from the catholic refugees’ movement to south, initially deployed approximately 2,000 military personnel and later reinforced this number to 16,300 in 1963. In 1965, President Johnson made the war escalate even further by launching air strikes and ground forces in North Vietnam. The 1968’s Tet Offensive made America change its position in the war, making U.S oppose the war. U.S president Richard Nixon called for Vietnamization and directed the withdrawal of the American troops from South Vietnam, thus enabling the south to fight the war more intensely. In 1970, Nixon tried to deter North Vietnamese forces by deploying the U.S forces to destroy Cambodia’s communist supply establishments. Based on Cambodia’s neutrality, this sparked anti-war protests especially in the nation’s campuses. Thus in the name of ‘democracy’ the USA neglected the freedom and rights of Vietnamese people. According to president Johnson, America was involved in the war to assert the independence and freedom of people of South Vietnam even though this was not the case as the USA supported France, Vietnam’s colonial master. In a bid to further America’s interest in Vietnam, most U.S presidents in one way or another tried to demonize Vietnamese leaders who were against colonialism. The Vietnam War thus was a big lie that the United States government told to both US and Vietnamese people.
<urn:uuid:2b5369aa-485c-41de-bec9-7a7e4f8b5854>
CC-MAIN-2019-18
https://super-dissertation.com/essays/politics/shattering-of-liberal-consensus-and-the-american.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578641278.80/warc/CC-MAIN-20190424114453-20190424140453-00211.warc.gz
en
0.973981
2,835
3.34375
3
A Cat May Look At a King Meaning Definition: A person of lower status is still able to do certain things in the presence of a person of higher status. There is some debate over the exact meaning of this proverb. Some people argue that it means that regardless of status, a person is always allowed to look at another. Origin of A Cat May Look At a King This proverb first appeared in the year 1562 in a book of proverbs written by John Heywood. Some hear and see him whom he heareth nor seeth not But fields have eyes and woods have ears, ye wot And also on my maids he is ever tooting. Can ye judge a man, (quoth I), by his looking? What, a cat may look on a king, ye know! My cat’s leering look, (quoth she), at first show, Showeth me that my cat goeth a caterwauling; And specially by his manner of drawing To Madge, my fair maid. Examples of A Cat May Look At a King This example dialogue involves a couple that is out at a bar. A stranger keeps staring at the woman. Bobby: That guy over there won’t stop looking at you. Is it bothering you? Jennie: Well, of course, I find it sort of creepy. Bobby: I can go tell him to stop if you want. Jennie: No, that’s okay. It’s not worth it. After all, a cat can look at a king. One friend is talking to another about his boss. Andrew: I need some advice. I’m having an issue with my manager. Aaron: I guess I can give advice. What do you want to know? Andrew: Well, my manager just happens to sit behind my computer. My computer is just below my eye level. This means that when I’m working on a spreadsheet, or checking my email, or doing anything at all on the computer, it looks like I am staring right at him. Aaron: Oh, that’s a little awkward. Andrew: So, today he asked me why I was always staring at him. Aaron: Obviously, you explained that you were just looking at the computer, right? Andrew: That’s what I should have done. I accidentally said that a cat can look at a king. Aaron: Yeah, that makes it way more awkward. This excerpt is from an article that ponders whether audiences can laugh at the British royal family. - On one level, in its sub-plot – following a Shakespearean model with brilliant bravura and cat-can-look-at-a-king presumption – it explores Prince Harry’s predicament, sketching out feelings of anguish about his royal function and lack of freedom (for all his playboy antics) that we can only guess at. –Telegraph The second excerpt uses the proverb to mean that lower status and higher status news outlets can compete with each other. - Then, too, there’s the immeasurable influence of the Internet, and social media, which have leveled the playing field between actual and phony news outlets. The old saying “A cat can look at a king” can be recast: Thanks to technology, a Breitbart News can look at a New York Times, or a CNN, or a Time magazine. –Media Village A cat can look at a king is a proverb which implies that no matter how high your status is, you can’t control everything. Others will always be your equals in some way.
<urn:uuid:a9625686-4525-488b-9e4b-abd4740918c4>
CC-MAIN-2019-18
https://writingexplained.org/idiom-dictionary/a-cat-may-look-at-a-king
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578641278.80/warc/CC-MAIN-20190424114453-20190424140453-00211.warc.gz
en
0.953721
771
3.078125
3
There is insufficient evidence for the effectiveness of a drug that is being used increasingly to prevent life-threatening bleeding in women after giving birth in community settings in low income countries, according to a review of all the available research published today (Monday) in the Journal of the Royal Society of Medicine. Misoprostol (brand name Cytotec) was originally developed for treating gastric ulcers, but is increasingly used in low- and middle-income countries for preventing postpartum haemorrhage (PPH). It is given to women during labour to prevent uncontrolled bleeding, and it is included on the World Health Organisation's Essential Medicines List for this use. However, researchers led by Professor Allyson Pollock from the Centre for Primary Care and Public Health at Queen Mary, University of London (UK) identified 172 studies on the use of misoprostol during labour and found that only six had enough information to enable them to review whether or not the drug was effective in preventing PPH in rural and community settings in low income countries. The six studies failed to provide sufficient evidence that the drug worked and most had problems with study design and the fact the findings were not applicable generally. "Current evidence to support the use of misoprostol in home or community settings in low- and middle-income countries for the prevention of postpartum haemorrhage is, at best, inconclusive," said Professor Pollock. "Yet, despite there being no proper evidence of benefit, the WHO and some countries have put it on the Essential Medicine Lists and the drug is being pushed hard by networks of global public-private partnerships and industry in low- and middle-income countries. Countries such as Nepal, India and Uganda are promoting and using it. We urge the WHO to urgently review its decision to put misoprostol on its Essential Medicines List." According to WHO estimates, there were 342,900 deaths related to pregnancy and childbirth in 2008, most of them occurring in developing countries. A quarter of these are thought to be associated with PPH while giving birth. The main risk factor for PPH is anaemia, which is easily treated if it is diagnosed. But without antenatal screening for the condition it is impossible to identify women who may have developed it and who are at increased risk of life-threatening bleeding during labour. "The most effective preventive strategy for PPH is prevention of anaemia, good antenatal care including good hygiene and sanitation and good care during labour," said Professor Pollock. "Developed countries would not dream of giving women misoprostol during labour on the basis of the current evidence, yet industry and health practitioners are pushing it hard in developing countries." One of the reasons that misoprostol is popular in developing countries is that it is a fairly stable drug that doesn't degrade if not kept in cold storage conditions, and which does not have to be given intravenously. For this reason, it is more likely to be used outside hospitals, in settings such as the home and local community when women go into labour. "Countries should be concentrating on improving their primary care facilities, rather than thinking there is a pill to prevent every ill," said Professor Pollock. "Misoprostol is being used inappropriately at present, and the money being spent on purchasing the drug would be better spent elsewhere, for instance, in ensuring there are skilled attendants during delivery and adequate antenatal services that can detect and help to prevent complications." "Rethinking WHO guidance: review of evidence for misoprostol use in the prevention of postpartum haemorrhage", by Christina Chu, Petra Brhlikova and Allyson Pollock. Journal of the Royal Society of Medicine 2012: 105: 336-347. doi 10.1258/jrsm.2012.120044 Published online at: http://jrsm.
<urn:uuid:3a2ccde2-f278-4625-aa83-4d4cf42cfd15>
CC-MAIN-2019-18
https://www.eurekalert.org/pub_releases/2012-08/qmuo-net082012.php
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578641278.80/warc/CC-MAIN-20190424114453-20190424140453-00211.warc.gz
en
0.962909
797
2.8125
3
As early as the second and third decades of the 16th century the Italian Renaissance, particularly in certain paintings, showed signs of turbulence and unrest. At times painters such as Raphael, Correggio and, to a certain extent, Titian rejected its values. In fact an artistic movement, which came to be called Mannerism, was about to appear. It was an individual and personal mode of expression, pre-eminently intellectual, which no longer derived from other well-known masters or from the consolidated Renaissance pattern. This style not only gained the support of artists aware of the crisis in Renaissance values, but it also appealed to the taste, habits and cultural viewpoint of a particular social class throughout Europe. From a historical point of view it is well known that all this coincided with a moment of great moral uneasiness in Italy, a country then passing through the crisis of the Reformation without knowing how to set up opposing autonomous values. The causes of this artistic experience were varied, but the effects similar: the rejection of the classic ideal in the portrayal of the human figure, and of poetic values in imaginary settings. In Florence, Mannerism, first hinted at in the works of Andrea del Sarto, is found in the works of Pontormo, Rosso, Beccafumi and Bronzino. Engaged on paintings and frescoes, both religious and secular, these men disclosed an ideal of beauty dignified and expansive in its gestures and unusual in its expression. They favoured abstract spaces in rhythmic compositions, figures delineated with a more conscious, fragmented out- line, artificial lighting and a gamut of new colours, some iridescent some metallic. In Jacopo Pontormo's Descent from the Cross (Sta Felicita, Florence) the colour is pale and watery but in his Visitation, at Carmignano, there is a closely reasoned development of rhythmic, ample forms rendered sonorous by pink, green and orange.
<urn:uuid:1caf8c48-a9a3-4df6-8a7c-e6b8a189ba09>
CC-MAIN-2019-18
https://www.privateart.co.uk/art-blog/archives/05-2017
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578641278.80/warc/CC-MAIN-20190424114453-20190424140453-00211.warc.gz
en
0.948099
406
3.28125
3
- Pamphlets capture the diverse attitudes and opinions of often-neglected segments of society - More than 25,000 rare items capture a century of controversies, from slavery to suffrage - An exceptionally valuable and little-used record of American history, culture and contemporary life Created to cajole, convince, inform and edify the American people on nearly every issue of the day, pamphlets have had a powerful impact on American life. As America’s population grew rapidly and printing costs declined, the use of pamphlets exploded in the 19th century. Revealing passionate views and perspectives not seen in other print genres, these rare items addressing slavery, suffrage and dozens of other divisive issues include speeches, orations, debates, sermons, treatises, tracts, narratives, poems, songs, memoirs, announcements, legal notices and more. The under-explored views of overlooked segments of society Now this unique online resource—produced from the New-York Historical Society’s extraordinary collection of pamphlets—provides more than 25,000 short works printed in every region of the United States. Key to the study of race, ethnicity and gender in the 19th and early 20th centuries, these pamphlets span 100 years of American life, from the Jacksonian Era through the dawn of the Jazz Age. Researchers will find outstanding coverage of contentious topics related to politics and government, religion and religious movements, art and entertainment, business and economics, health and medicine, education, immigrants and ethnic groups, American Indians, slavery and the Civil War, African Americans, Hispanic Americans, women, and science and technology. Perspectives not found in books, periodicals or newspapers Pamphlets represent a genre of printed materials written by authors from an unusually large socio-economic range. Few Americans in the 19th century could afford to publish bound books; however, many more had the means to print pamphlets. As with broadsides and other ephemeral items, pamphlets are a hard-to-find class of primary source materials, rarely collected and catalogued. More so than the heavily researched more traditional print genres, they offer scholars and students in American history, culture and contemporary life fresh opportunities for insight into a wide spectrum of American society. Awaiting discovery…a newly available record of the past This invaluable collection of newly digitized pamphlets from one of the world’s leading historical societies will open up a new world of research materials for scholars and students in such disciplines as history, communications, political science, literature, sociology, gender and ethnic studies. Picking up where Early American Imprints ends, American Pamphlets, Series 1, 1820-1922 is fully integrated into America’s Historical Imprints for seamless searching with Afro-Americana Imprints, American Broadsides and Ephemera, and related collections. About the New-York Historical Society The New-York Historical Society, one of America’s pre-eminent cultural institutions, is dedicated to fostering research and presenting exhibitions and public programs that reveal the dynamism of history and its influence on the world of today. Founded in 1804, New-York Historical has a mission to explore the richly layered history of New York City and State and the country, and to serve as a national forum for the discussion of issues surrounding the making and meaning of history. Image: Louis Lang, Return of the 69th (Irish) Regiment, N.Y.S.M. from the Seat of War, 1862-1863. Oil on canvas. Collection of the New-York Historical Society “Spanning more than 100 years, this collection of American pamphlets is a rich well of historical primary sources. Students and scholars will use these artifacts as focal points to illustrate larger social movements in the U.S. The direct appeals and strong opinions found in these scarce materials will spark interest and generate fresh interpretations and lively discussions. “Pamphlets lend themselves to creative assignments like student-curated exhibits, in which students build context through further research. The ability to narrow searches by state is particularly valuable for connecting students to their local community's history and for teachers needing primary sources that connect with each state's unique curricular outcomes.” — Priscilla Finley, Humanities Librarian, University of Nevada, Las Vegas “American Pamphlets, 1820-1922, represents an interdisciplinary treasure trove for students and faculty in a host of academic fields, including history, literature, political science, sociology, and anthropology. Providing a unique window into America's past, these pamphlets will be highly useful to researchers trained in the New Historicism, cultural studies, and other methods." — Mark Kamrath, Professor of English, University of Central Florida “Pamphlets were used as a relatively inexpensive way to distribute diverse opinions and wide-ranging information to a large number of people. This new digital collection of thousands of searchable pamphlets will appeal to a broad audience interested in American political, social, educational, religious, and cultural history between 1820 and 1922. Students and researchers will find an enormous amount of unique and eclectic material related to ideas, events, institutions, and people of the time.” — David Lincove, Professor, History, Political Science, Public Affairs & Philosophy Librarian, Ohio State University “American Pamphlets, 1820-1922, a new Archive of Americana module, is an amazing collection of a highly desirable genre for research and teaching. Pamphlets are wonderful, cross-disciplinary primary sources. They are short, to the point and have their biases exposed. They reveal a great deal about the society of a time and a place, and many in the later 19th century include interesting illustrations as well. This newly digitized collection, beginning with Series 1 from the New-York Historical Society, will be heavily used. Faculty will employ them in the classroom, undergraduates will find them surprisingly accessible, and graduate students will mine them for their masters’ theses and dissertations.” — Donna McCrea, Head of Archives & Special Collections, History Librarian / Associate Professor, University of Montana-Missoula A Selection of Notable Pamphlets Organized by Subject Politics and Government General Committee of Independent Republican Young Men of the City and County of New-York. Standing Rules & By-Laws of the General Committee of Independent Republican Young Men of the City and County of New-York. New-York: Printed by W. Applegate, 257 Hudson Street, 1834. Brooks, Erastus. The controversy between Senator Brooks and "+John," Archbishop of New York: growing out of the speech of Senator Brooks on the church property bill, in the N.Y. State Senate, March 6, 1855. New York: De Witt & Davenport, . Roosevelt, Robert Barnwell. Is Democracy Dishonesty? Are Four Men to Rule New York with a Rod of Iron? Is the Popular Voice to be Stifled at the Ballot-box?: Speech of Hon. Robert B. Roosevelt, Delivered at the Municipal Reform Meeting, Held at Cooper Union, in the City of New York, Sept. 4, 1871. New York: Journeymen Printers’ Co-operative Association, 1871. • Concerns Tammany Hall corruption Rogers, Edward H. Eight hours a day’s work: a lecture. Boston: Printed at the Office of the "Weekly American Workman" . Swinton, John. The Tompkins Square Outrage: Appeal of John Swinton, Addressed to the Legislature, Through the Committee on Grievances, and Delivered in the Assembly Chamber at Albany, March 25th, 1874. [Albany, N.Y.?: s.n., 1874]. • Refers to an incident of police brutality in New York Post, Louis Freeland. Our despotic postal censorship. Chicago: Public Publishing Company, . • Discusses the Post Office ban on Lucifer, the light-bearer, a newspaper Religion and Religious Movements Hole in the Wall, or a Peep at the Creed-Worshippers. [Philadelphia?: s.n.], 1828. • Reveals the contentious religious debates in early nineteenth-century America Hicks, Elias, 1748-1830. Notes of a Discourse, Delivered at the Rose-Street Meeting-House, on the Fifth Day of April, 1829. New-York: Printed and published by Elliot & Palmer, 1829. • A pamphlet by the controversial Quaker Elias Hicks Infidel Society for the Promotion of Mental Liberty. The Meteor of Light, Containing the Minutes and Proceedings of the Infidel Convention, Held in the City of New York, May 4th, 5th and 6th, 1845. Boston: Printed by J.P. Mendum, 1845. • A rare anti-religious tract An appeal to the Christian public, on the evil and impolicy of the church engaging in merchandise: and setting forth the wrong done to booksellers, and the extravagance, inutility, and evil-working, of charity publication societies. Philadelphia: King & Baird, 1849. Bible Argument: Defining the Relations of the Sexes in the Kingdom of Heaven. [Oneida, N.Y.?: s.n., ca. 1850]. • Lays out the doctrines of the Oneida Community regarding sexual practices New York (State). Laws of the State of New York Relating to Religious Incorporations Compiled by Lockwood Lawrence and Crosby, Esqs. New-York: N.S. Parkhurst, stationer and printer, 1855. Proceedings of a Meeting in Relation to St. Ann's Church for Deaf-mutes: Wednesday, May 19, 1858. New-York: George F. Nesbitt & Co., printers and stationers, corner Pearl and Pine Streets, 1858. • Inscribed "N.Y. Historical Society from Thomas Gallaudet". Treat, Joseph. God, religion, and immortality: an oration, delivered at the Paine celebration in Cincinnati, Sunday, January 29, 1860. Cincinnati, O.: Published by the Committee, 1860. • An atheist, rationalist speech delivered in Cincinnati in 1860. Chase, Moses. The End. Vision which Moses Chase saw in 1849. [Baltimore: s.n., 1861?]. • A Mormon prophecy of the Civil War Cradlebaugh, John. Utah and the Mormons: Speech of Hon. John Cradlebaugh, of Nevada, on the Admission of Utah as a State, Delivered in the House of Representatives, February 7, 1863. [Washington?: L. Towers & Co., 1863?]. • Argues against the admission of Utah as a state, and includes graphic descriptions of the Mountain Meadows Massacre to support this argument Magie, David. A Sermon Preached on the Occasion of the First Occupation of the Westminster Presbyterian Church, Elizabeth, New Jersey, Sunday, December 29, 1867. New-York: Francis Hart, 1868. Andrews, C. W. (Charles Wesley). On the Incompatibility of Theater-going and Dancing with Membership in the Christian Church: an Address of the Clergy of the Convocation of the Valley of Virginia, to the People of their Respective Parishes. Philadelphia: Office of Leighten Publications, 1872. The American Battle of Dorking: America in 1980. [New York: s.n., ca. 1874]. • The anonymous author, inspired by British writer George Tomkyns Chesney’s Battle of Dorking, prophesizes that, by the year 1980, the United States will be a Catholic state under Papal authority. Business and Economics Fisk, Theophilus. The Banking Bubble Burst, or, The Mammoth Corruptions of the Paper Money System Being Relieved by Bleeding: Being a History of the Enormous Legalized Frauds Practised Upon the Community by the Present American Banking System. Charleston, S.C.: Printed and published at No. 63 Wentworth Street, 1837. • Concerns the financial panic of 1837 A System of Credit For a Republic and the Plan of A Bank for the State of New-York. Albany: Printed by Packard and Van Benthuysen, 1838. Prospectus of the Shooters Island Petroleum Refining & Storage Co., Richmond County, New-York. New-York:George F. Nesbitt & Co., printers and stationers, 1865. • Shooters Island, off the northwestern shore of Staten Island, is currently a wildlife sanctuary, though it was once home to an oil refinery. The Resumption of Specie Payments and the Funding of Public Debt. New York: Lange, Hillman & Lange, 1869. Rosecrans, William S. Mexico. [United States: s.n., 1870]. • Discusses establishing a national banking system for Mexico and is accompanied by a leaflet stating that “Residence in Mexico enabled me fully to know her condition, and put me in good relations with the political parties of that country…” Tyler, Daniel F. How to Get Rich! Written for Poor Men, and Young Beginners of Life, by their Affectionate Friend Uncle Ben, Who Was Once in Both These Conditions, but is Now in Neither. New York: Charles M. Cornwell, steam book and job printer, 1871. Farming Near Home, or State Legislation Against Hard Times, Being Suggestions for an “Act” to Facilitate the Settlement of Land, the Promotion of Agriculture, Civilization and Co-operation, and for the Relief of Labor and Capital Within the Boundaries of the Older States. [United States]: Published by R.J. Wright, [1878?]. Private Commercial Mathematical and Classical Study, Corner of Smith and Livingston Streets, Brooklyn, of W.F. Walker, A.M. New-York: Pudney & Russell, printers, no. 79 John-Street., MDCCCLII . Some Facts About our Public School System: an Address Delivered at the Twenty-third Annual Meeting of the New York State Association of School Commissioners and City Superintendents, Utica, Feb. 19, 20, 21, 1878. [New York (State)?: s.n.], 1878. Short Unit Syllabus for Special Naturalization Classes in Evening Elementary Schools (tentative). New York: Stillman Appellate Printing Co., 1922. Immigrants and Ethnic Groups Archibald, John. On the Contact of Races Considered Especially with Relation to the Chinese Question. San Francisco: Towne & Bacon, book, card and fancy job printers, 1860. Horatio Seymour als Staatsmann und Patriot (The War-Record of a Democratic Statesman and Patriot). New York: Druck der "New Yorker Staats-Zeitung," [186-?]. • A German-language pamphlet printed in New York Proceedings of the First National Convention of the Fenian Brotherhood: Held in Chicago, Illinois, November, 1863. Philadelphia: James Gibbons, printer, 333 Chestnut Street, 1863. • The Fenian Brotherhood was an Irish republican organization, founded by immigrants in 1854. Lieber, Francis, 1800-1872. Lincoln oder McClellan?: an die Deutschen in Amerika. [Philadelphia: King & Baird, 1864]. • Pamphlet directed at German voters in the 1864 presidential campaign A Chinese Enterprise: No. 40 East 14th Street. [New York: s.n., 1870?]. • Advertising brochure for a Chinese physician in New York, with illustrations Moss, William R. Making Americans, How and Why: Addresses by a Lawyer, William R. Moss, Chairman, Committee on Americanization, the Chicago Association of Commerce, an Educator, Peter A. Mortenson, superintendent, Public Schools of Chicago. [Chicago?: s.n., 1920?]. • A pamphlet on the education of immigrants Friends of Irish Freedom. National Council. Friends of Irish Freedom: policy adopted December 29, 1920: the following resolutions were, on motion of Hon. Daniel F. Cohalan, unanimously adopted at the meeting of the National Council, Friends of Irish Freedom, held at New York, December 29, 1920. New York City: Allied Printing Trades Council, [1921?]. Ross, William P. (William Potter). Early Creek History: Speech of Hon. William P. Ross at the Tullahassee Manual Labor Boarding School, July 18th, 1878. [Muskogee, Creek Nation, Indian Territory, Okla.]: Office of the Indian Journal, [1881?]. Armstrong, Samuel Chapman. Indian Education in the East, at Hampton, Va., and Carlisle, Penna., an Address Delivered in Boston, Mass., October, 1880. Hampton, Va.: Normal School Steam Press, 1880. Coombs, S. F. (Samuel F.) Dictionary of the Chinook jargon: as spoken on Puget Sound and the Northwest, with original Indian names for prominent places and localities with their meaning: historical sketch, etc. Seattle, Wash.: Lowman & Hanford Stationery & Print. Co., [1891?]. Bull, William L. A Friendly Criticism on the Attitude of the Indian Rights Association Towards White Settlers in Relation to the Indians, and Especially to the Utes, of Southwestern Colorado. [Colorado?: s.n., 1893]. Slavery and the Civil War Pinckney , Charles Cotesworth. An address delivered in Charleston: before the Agricultural Society of South-Carolina, at its anniversary meeting, on Tuesday, the 18th August, 1829. Charleston: Published by order of the Society, printed by A. E. Miller, no. 4, Broad Street, 1829. • A justification for slavery and the treatment of those enslaved. Proposals for Forming a Free Produce Company, in the City of New-York. New-York: W. Applegate, printer, 257 Hudson-street., [1832?]. • A proposal by several Quakers in New York to create a store house for produce grown by means other than slave labor Ohio. General Assembly. Joint Select Committee on the Colored Population of Ohio. Report of the Committee on the Colored Population of Ohio: Mr. Worthington, from the Select Committee on the Colored Population of Ohio, made the following report... [Ohio?: s.n., 1833?]. • Unrecorded pamphlet on fugitive slaves in Ohio American Anti-Slavery Society. Examination of Mr. Thomas C. Brown, a Free Colored Citizen of S. Carolina, as to the Actual State of Things in Liberia in the Years 1833 and 1834, at the Chatham Street Chapel, May 9th & 10th, 1834. New-York: S.W. Benedict & Co., 1834. • Interview offers insight into the lives of American immigrants to the early Liberian republic Republican Committee of Seventy-six. The Northern Man with Southern Principles, and the Southern Man with American Principles: or, A View of the Comparative Claims of Gen. William H. Harrison and Martin Van Buren, Esq., Candidates for the Presidency, to the Support of Citizens of the Southern States. Washington [D.C.]: Printed by Peter Force., 1840. Hill, Pascoe Grenfell. Fifty Days on Board a Slave-Vessel in the Mozambique Channel. In April and May, 1843. New York: J. Winchester, New World Press, . Cook, John E. (John Edwin). Confession of John E. Cook, Brother-in-Law of Gov. A.P. Willard, of Indiana, and One of the Participants in the Harper's Ferry Invasion, Published for the Benefit of Samuel C. Young, a Non-Slaveholder, Who is Permanently Disabled by a Wound Received in Defence of Southern Institutions. Second edition. [Charlestown, W. Va.?: s.n.], c1859. Elliott, James Habersham. The Bloodless Victory, a Sermon Preached in St. Michael's Church, Charleston, S.C., on Occasion of the Taking of Fort Sumter. Charleston: printed by A.E. Miller, No. 3 State-Street., 1861. United States of America. State of New-York, ss. By This Public Instrument, Be It Known To All Whom the Same Doth or May Concern, That I [blank] a Public Notary ... Do Hereby Certify … That [blank] Black Man, Mariner … Is a Free Man and Citizen of the United States of America ... [New York: s.n., not after 1863]. Conway, Thomas W. Report on the Condition of the Freedmen, of the Department of the Gulf, to Major General N.P. Banks, Commanding, by Chaplain T.W. Conway, U.S.A, Superintendent Bureau of Free Labor. New Orleans: H.P. Lathrop, printer, 1864. Bancroft, George. Oration Pronounced in Union Square, April 25, 1865. [New York: Schermerhorn, Bancroft & Co., 1865]. • Speech that movingly conveys the nation’s sorrow at the death of Abraham Lincoln Mandeville, Sumner. Sermon by Rev. S. Mandeville, Delivered at the House of Peter R. Sleight, LaGrange, Dutchess County, December 10, 1865, on the Occasion of the Burial of the Remains of 1st Lieut. David B. Sleight (late of Co. I, 150th reg., N.Y.S.V.) Who … Was Killed in Action Near Averysboro, N.C., While Gallantly Driving the Enemy, March 16th, 1865. Poughkeepsie, N.Y.: Platt & Son, printer, 1865. Davis, Noah. New York Soldier's Home: its Necessity, its Proposed Inmates, and the Progress of the Work. New York: B. Stradley, printer, 1877. • Provides valuable information about the establishment of soldiers’ homes after the war, and about war work in general Frost, D. S. Funeral sermon of Lieut. A.L. Sanborn, 1st Reg’t U.S. Colored Troops, murdered at Norfolk, Va., by Dr. D.M. Wright, July 11, 1863: preached at Thetford, Vt., Dec. 8, 1863. [Vermont?: s.n., 1863?]. • Includes letters from Anson L. Sanborn to his mother, p. 13-14 South Carolina. General Assembly. A Bill to Establish and Regulate the Domestic Relations of Persons of Color, and to Amend the Law in Relation to Paupers, Vagrancy and Bastardy. [South Carolina: s.n., 1865]. • Preliminary text of South Carolina’s black codes. Includes manuscript corrections and notes. Aldridge, Joshua. Resolute and Earnest Action. [New York: s.n., between 1865 and 1872]. • A political pamphlet written during Reconstruction by an African American New Yorker and the brother of Ira Aldridge, the famous Shakespearean actor of the European stage Colored National Labor Convention (1869: Washington, D.C.). Proceedings of the Colored National Labor convention: Held in Washington, D.C., on December 6th, 7th, 8th, 9th and 10th, 1869. Washington, D.C. Printed at the Office of the New Era, 1870. Cox, Samuel Sullivan. Economy—Education—Mixed Schools: Speech of Hon. S.S. Cox, Member of Congress from New York City, on the Education and Civil-Rights Bills, Delivered Jan. 13, 1874 ... Washington: Government Printing Office, 1874. Douglass, Frederick. Frederick Douglass, on the Exodus. [United States: s.n., 1879?]. • Contains a series of resolutions submitted by Douglass at a meeting in Hillsdale, Washington, D.C., in 1879. Cf. Blight, David. Frederick Douglass' Civil War. Henderson, Joseph White. The Colored Man and the Ballot. Oakland, Cal.: Henderson and Humpfrey, 1888. Madan, Cristóbal F. Contestacion a un Folleto Titulado: Ideas Sobre la Incorporacion de Cuba en los Estados Unidos, por Don José Antonio Saco. [New York]: Imprenta de "La Verdad", Calle de Nassau, no. 102, . • Early Spanish-language pamphlet printed in New York Allo, Lorenzo. La Esclavitud Domestica en sus Relaciones con la Riqueza: Discurso Pronunciado en el Ateneo Democratico Cubano de New York, en la Noch del 1o. de Enero de 1854. New-York: Oficina tipográfica de J. Mesa, Calle Ann, no. 21, 1854. • A Spanish language discussion of slavery in Cuba, printed in New York. Channing, William Ellery. La Esclavitud. Nueva York: Juan M. Davis, impressor, Calle de Pearl no. 207, 1864. • Spanish translation of Channing’s classic work, Slavery, printed in New York. Translator’s note at end shows the work’s relevance to slavery in Cuba. Watkins, N. Female Preaching Defended by N. Watkins, Minister of the Primitive Methodist Church, Albany, to Which is Added, a Sermon by Miss R. Watkins. Albany: Printed for the subscribers, 1832. The lady’s self-instructor in millinery, mantua making and all branches of plain sewing: With particular directions for cutting out dresses, etc. New York: Burgess, Stringer, & Co., 1844. Austin, Harriet N. Tracts of the National Dress-Reform Association. No. 1. [United States: s.n., 1851?]. • Advocates shorter skirts and more loosely constructed garments for women as conducive to greater health and freedom of movement. Woman’s Rights Convention (1855: Boston, Mass.). Reports on the Laws of New England, Presented to the New England Meeting Convened at the Meionaon [Boston], Sept. 19 and 20, 1855. [Boston?: s.n., 1855?]. Blackwell, Elizabeth. Address on the Medical Education of Women. New York: Baker & Duyckinck, 1856. • Blackwell, the first woman to earn an M.D. in the United States, notes the importance of making medical education, especially hands-on instruction, available to aspiring female physicians. Ward, Henry Dana. Programme of the Young Ladies’ Institute, 38 West Twenty-Third Street. New-York: Printed by D. Fanshaw, corner Nassau and Ann-Streets, 1857. • Offers valuable details about the curriculum at a girls’ school in the middle of the nineteenth century Ingersoll, Henrietta Crosby. A Woman's Plea for Partial Suffrage. [Washington, D.C.?: s.n., 186-?]. • Interesting early suffrage pamphlet. Hillside Seminary (Montclair, N.J). Catalogue and Circular of Hillside Seminary, a Family Boarding School for Young Ladies, Montclair, New Jersey. New York: Francis & Loutrel, steam printers and bookbinders, 1862. • Includes lists of current students and alumnae Hamilton, Gail. A Call to My Countrywomen. [United States: s.n., 1863?]. • Provides insights into the participation of women in the discourse about the Civil War St. Saviour’s Sanitarium (New York, N.Y.). St. Saviour's Sanitarium, Inwood-on-the-Hudson: a Home for the Care of Women Addicted to the Excessive Use of Alcohol or Drugs, Incorporated in 1892, and Under the Charge of the Sisters of St. Mary of the Episcopal Church. [New York: s.n., not before 1892]. Health and Medicine Medical Society of the State of New York (1807- ). A System of Medical Ethics Published by Order of the State Medical Society of New-York. New-York: Printed by William Grattan, 3, Thames-Street, 1823. Sargent, Lucius M. A Brief Epistle from Dr. Ziba Sproule: Respectfully Addressed to Ladies of the Upper Ten Thousand, and the Millions Below, Widows, Wives, and Mothers, Sisters, Cousins, and Maiden Aunts. [United States: s.n., 1855?]. • Anti-tobacco tract. Notes that cancer of lip and tongue may be linked to smoking. Johnson, A., Dr. The Family Dentist: Being a Summary of Hints and Suggestions Highly Important to all Persons, but Especially so to Parents and Others Having the Management of Children. New York: J. McLoughlin, 1856. • Manual by a dentist whose practice was located at 73 East Twelfth Street in New York. New York Infirmary for Women and Children. The New-York Infirmary for Women and Children, 64 Bleecker Street, Corner of Crosby. New York: D. Fanshaw, printer, [1856 or 1857]. • A work contributing to our understanding of the history of public health in New York Hudson, Erasmus Darwin. Mechanical Surgery: Artificial Limbs, Apparatus for Resections, Apparatus for Ununited Fractures, Feet for Limbs Shortened by Hip Disease, Arms and Hands. New York: Baker & Godwin, printers, [1867?]. Slimmins, Elihu. The Alpha and Omega of Bathing: Inspired, Respired and Transpired at Angell's Turkish Baths, 61 Lexington Avenue, Cor. Twenty-fifth St., N.Y. [New York]: T.F. Leslie & Co.’s typography, 335 B’dway, . Baldwin, Simeon Eben. The Natural Right to a Natural Death. [St. Paul, Minn.: s.n.], 1899. • A pamphlet on the ethics of death and dying New York (State). Dept. of Health. Sleeping and Sitting in the Open Air, Issued by the New York State Department of Health. Albany: New York State Department of Health, [1917?]. • Concerns the treatment of tuberculosis New York League for Americanism. The public health is menaced: organized physicians, dentists and druggists point to danger that lurks in Davenport compulsory health insurance bill: public health service would be crippled, medical professions demoralized, the people enslaved by huge political machine and excessive taxation ...Syracuse, N.Y.: New York League for Americanism, . Science and Technology Hopkins, George F. Observations on electricity, looming, and sounds; together with a theory of thunder showers, and of west and north west winds. To which are added, a letter from the Hon. Thomas Jefferson, and remarks by the Hon. Samuel L. Mitchill. New-York: Printed and sold by Hopkins & Morris, No. 9, Nassau-street., 1825. Henry Rawls & Co. Catalogue of Philosophical Apparatus Illustrative of the Physical Sciences … Manufactured and Sold by Henry Rawls & Co., no. 57 State Street, Albany. Albany: Printed by J. Munsell, 1839. Pennington, John H. A System of Areostation, or Steam Aerial Navigation. Washington City, D.C.: Printed at the Index Office, 1842. James, Charles T. A lecture on the comparative cost of steam and water power, delivered at Hartford, Conn.—Feb. 1844. Newburyport [Mass]: Printed by Morss and Brewster, 1844. Tallmadge, James. Address of Gen. James Tallmadge Delivered at Castle Garden in the City of New York at the Close of the Twentieth Annual Fair of the American Institute. New York: R. Craighead, Printer, 1847. Vergnes, Maurice. Electricity Considered in its Application to Motive Power. New York: John F. Trow, printer, 1857. Shaw, R. Tennent. Flax and Hemp Cotton: Communication of R. Tennent Shaw to Hon. J.K. Morehead, of Pennsylvania, [Hon.] William M. Bailey, of Rhode Island, [Hon.] John A. Warder, of Ohio, Appointed by Hon. Isaac Newton … to Award the $20,000 Appropriated by the Last Congress, to Discover a Sure and Safe Process of Cottonizing Flax and Hemp as a Substitute for Cotton. New York: Chas. A. Mignard, printer, 1864. • An attempt at producing a substitute for Southern cotton during the Civil War; includes a sample of the material. Pleasonton, A. J. On the Influence of the Blue Color of the Sky in Developing Animal and Vegetable Life: as Illustrated in the Experiments of Gen. A. J. Pleasonton, Between the Years 1861 and 1871, at Philadelphia. Philadelphia: Inquirer Book and Job Print, 1871. • Printed on blue paper, with a blue wrapper. The New Atomic, or Steam Coal-Gas Manufacture for Light and Heat. Philadelphia: James Crutchett, 1878. • Relates to the application of new technologies in nineteenth-century America. Electric Light, its Dangers, to Owners of Real Estate. [New York: s.n., 1881]. Dickerson, Edward N. Joseph Henry and the Magnetic Telegraph: An Address Delivered at Princeton College June 16, 1885 by Edward N. Dickerson. New York: Charles Scribner’s Sons, 1885. American Society of Civil Engineers. A Few Notable Engineering Works in New York City. [New York: s.n., 1905 or 1906]. • Booklet consists of 22 illustrations of notable buildings, bridges, and other structures of the period. Art and Entertainment Remarks Upon the Athenæum Gallery of Paintings, for 1831 August 17. [Boston]: I.R. Butts, printer, . Welcome to Charles Dickens: the Boz Ball, to be Given Under the Direction of a Committee of Citizens of New York, at the Park Theatre, on the Evening of the Fourteenth of February Next. New York: J.C. House, printer, 1842. • Accompanied by a printed invitation to the ball, and a ticket for a dinner in Dickens' honor at the City Hotel, February 18th, 1842 Moreheid, J. N. Lives, Adventures, Anecdotes, Amusements, and Domestic Habits of the Siamese Twins. Raleigh, N. C. Printed and published by E.E. Barclay, 1850. Barnum, P. T. (Phineas Taylor). Illustrated Memoir of an Eventful Expedition into Central America: Resulting in the Discovery of the Idolatrous City of Iximaya … and the Possession of Two Remarkable Aztec Children, Maximo (the Boy), and Bartola (the Girl) … New York: Wynkoop, Hallenbeck & Thomas, printers, 1860. • Fictitious account written by P.T. Barnum. History of Charles Nestel, Surnamed Commodore Foote, and Joseph Huntler, Surnamed Colonel Small, the Two Smallest Men Living. [New York]: 1862. Torrey Brothers, printers, 13 Spruce Street, New York., . Gerry, Elbridge T. The Mumler "Spirit" Photograph Case: Argument of Mr. Elbridge T. Gerry, of Counsel for the People, Before Justice Dowling, on the Preliminary Examination of Wm. H. Mumler, Charged with Obtaining Money by Pretended "Spirit" Photographs. New York: Baker, Voorhis & Co., 1869. Barnum, P. T. (Phineas Taylor). Admiral Dot, the smallest man in the world. ...: with P.T. Barnum’s Great Traveling Museum, Menagerie, Caravan and Hippodrome. [New York?: s.n.], 1874. Sharpless, John T. (John Townsend). Description of the American Wild Swan: Proving it to be a New Species, Cygnus Americanus. [United States?: s.n.], 1832. • Audubon’s copy, inscribed "J.J. Audubon, Esq., London". “With over 25,000 pamphlets available, dating from 1820 through 1922, the New York Historical Society, in collaboration with Readex, a Division of NewsBank, has unleashed a wealth of information that covers a multitude of topics. From the Cuban Revolution to rum to embroidery, the subjects are varied and provide a unique snapshot of contemporary societal thoughts and concerns….Useful to historians, academics, and students, American Pamphlets provides easy searching and a menagerie of ways to browse its content. From genre and subject to place of publication and language, the information can be sorted and searched with users’ ease and accessibility in mind….While many places have collections of pamphlets, this is the first large scale digitization of American pamphlets….The Readex American Pamphlets collection is an excellent database for researchers and university students. It provides a delightful snapshot of contemporaneous views and thoughts on a variety of topics from the cultural to the political.” — Kevin Klesta, Metadata Archivist, State Archives of North Carolina, in Reference Reviews (Vol. 30, No. 5, 2016) “Pamphlets are source material for studying contemporary opinions and events of history. … But they are notoriously hard to collect, arrange, and catalog ….The scope and variety of the materials included in this new online collection assembled by Readex in collaboration with the New-York Historical Society are very broad….Having more than 25,000 of these rare items available online for close inspection is a great thing." — D. K. Blewett, College of DuPage in Choice (March 2016) “With unique content combined with the superb quality and accessibility, American Pamphlets, Series 1, 1820–1922 is a remarkable product. It will serve researchers from high school to postdoctoral studies and beyond. Large public and university libraries will be interested, and other institutions serving scholars in American politics, history, culture, gender and ethnic issues, religion, and education should consider.” —Library Journal (Nov. 1, 2015)
<urn:uuid:27aca656-bd94-4adc-af32-0b4e73a15118>
CC-MAIN-2019-18
https://www.readex.com/content/american-pamphlets-series-1-1820-1922-new-york-historical-society
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578641278.80/warc/CC-MAIN-20190424114453-20190424140453-00211.warc.gz
en
0.866551
8,347
3.65625
4
EPA: Clean Water Act (CWA) The EPA protects the nation’s water supply through the Clean Water Act. The Clean Water Act establishes the basic structure for regulating discharges of pollutants into the waters of the United States and regulating quality standards for surface waters. Under the CWA, EPA has implemented pollution control programs such as setting stormwater management standards for communities, developments, businesses and residential areas. The EPA has also set water quality standards for all contaminants in surface waters. Loss of infiltration from urbanization The porous and varied terrain of natural landscapes like forests, wetlands and grasslands traps rainwater and snowmelt and allows them to filter slowly into the ground. In contrast, impervious (nonporous) surfaces like roads, parking lots and rooftops prevent rain and snowmelt from infiltrating, or soaking, into the ground. Most of the rainfall and snowmelt remains above the surface, where it runs off rapidly in unnaturally large amounts. Storm sewer systems concentrate runoff into smooth, straight conduits. This runoff gathers speed and erosional power as it travels underground. When this runoff leaves the storm drains and empties into a stream, its excessive volume and power blast out stream banks, damaging streamside vegetation and wiping out aquatic habitat. These increased storm flows carry sediment loads from construction sites and other denuded surfaces and eroded stream banks. They often carry higher water temperatures from streets, roof tops and parking lots, which are harmful to the health and reproduction of aquatic life. The loss of infiltration from urbanization may also cause profound groundwater changes. Although urbanization leads to great increases in flooding during and immediately after wet weather, in many instances it results in lower stream flows during dry weather. Many native fish and other aquatic life cannot survive when these conditions prevail. NPDES (CWA Section 402) The National Pollutant Discharge Elimination System (NPDES) permit program, established under the federal Clean Water Act, controls water pollution by regulating sources that discharge pollutants to waters in the United States. Municipalities are required to apply for NPDES permit coverage in order to operate the storm sewer systems. Under this permit, operators are required to develop and implement a stormwater management program to reduce the discharge of pollutants to the maximum extent practicable to protect water quality. Communities that do have storm sewer systems must create and enforce a stormwater management program that outlines the minimum standards that must be met in order to satisfy the requirements of their NPDES permit and to ultimately comply with the CWA. There are six minimum control measures for every stormwater management program: - Public Education and Outreach - Public Participation/ Involvement - Illicit Discharge Detection and Elimination - Construction Site Runoff Control - Post-Construction Runoff Control - Pollution Prevention/Good Housekeeping Minimum Measure #5: Post-Construction Stormwater Management Controlling post-construction runoff, the fifth minimum requirement of the NPDES program, sets forth more standards for property owners to adhere to once construction is complete. New development and redevelopment projects that disturb greater than or equal to one acre, including projects less than one acre that are part of a larger common plan of development or sale that discharge into the MS4 must have controls in place that would prevent or minimize water quality impacts. This includes: - Strategies which include a combination of structural and/or non-structural best management practices (BMPs) appropriate for the community; - Use an ordinance or other regulatory mechanism to address post-construction runoff from new development and redevelopment projects to the extent allowable under State, Tribal or local law; and - Ensure adequate long-term operation and maintenance of BMPs. It is the responsibility of land owners, whether commercial or residential, to manage runoff from their properties. Per federal law, a stormwater pollution prevention plan (SWPPP) is required before any development can occur on their land. This includes site assessment, erosion and sediment control BMPs; good housekeeping BMPs; post construction BMPs; and operations, maintenance, and inspections schedules. Structural BMPs include: storage practices such as wet ponds and extended-detention outlet structures; filtration practices such as grassed swales, sand filters and filter strips; and infiltration practices such as infiltration basins and infiltration trenches. EPA recommends that you ensure the appropriate implementation of the structural BMPs by considering some or all of the following: pre-construction review of BMP designs; inspections during construction to verify BMPs are built as designed; post-construction inspection and maintenance of BMPs; and penalty provisions for the noncompliance with design, construction or operation and maintenance. Stormwater technologies are constantly being improved, and EPA recommends that your requirements be responsive to these changes, developments or improvements in control technologies. It is very important the land owner(s) be familiar with the post-construction BMPs onsite, because once construction is complete it is their obligation to maintain them. By adhering to the post-construction criteria set forth in the SWPPP, and understanding the local, state, and federal stormwater regulations, land owners can avoid civil, state, or federal fines. Most Phase I & Phase II cities (cities with populations over 50,000) require a stormwater utility fee for all property owners in order to fund their stormwater program. These fees are generally based on the amount of impervious surfaces located on the property. Property owners may also be required to install stormwater management facilities on site to mitigate post-construction runoff. The EPA can take civil and criminal action against any party that is in violation of the Clean Water Act. The EPA can also act in place of state or local governments that are not properly enforcing environmental regulations.
<urn:uuid:695d5b95-6847-4988-a893-f1553ecc2e14>
CC-MAIN-2019-18
https://www.rrstormwater.com/epa-requirements-stormwater-management
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578641278.80/warc/CC-MAIN-20190424114453-20190424140453-00211.warc.gz
en
0.927253
1,198
3.890625
4
It's difficult to talk about Big Data processing without mentioning Apache Hadoop, the open source Big Data software platform. But Hadoop is only part of the Big Data software ecosystem. There are many other open source software projects that are emerging to help you get more from Big Data. Here are a few interesting ones that are worth keeping an eye on. Spark bills itself as providing "lightning-fast cluster computing" that makes data analytics fast to run and fast to write. It's being developed at UC Berkeley AMPLab and is free to download and use under the open source BSD license. So what does it do? Essentially it's an extremely fast cluster computing system that can run data in memory. It was designed for two applications where keeping data in memory is an advantage: running iterative machine learning algorithms, and interactive data mining. It's claimed that Spark can run up to 100 times faster than Hadoop MapReduce in these environments. Spark can access any data source that Hadoop can access, so you can run it on any existing data sets that you have already set up for a Hadoop environment. Apache Drill is "a distributed system for interactive analysis of large-scale datasets." MapReduce is often used to perform batch analysis on Big Data in Hadoop, but what if batch processing isn't suited to the task at hand: What if you want fast results to ad-hoc queries so you can carry out interactive data analysis and exploration? However if you don't want to use Google's Dremel on a software-as-a-service basis, Apache is backing Drill as an Incubation project. It's based on Dremel, and its design goal is to scale to 10,000 servers or more and to be able to process petabytes of data and trillions of records in seconds. Download Drill source code Using D3.js you can create dynamic graphics using Web standards like HTML5, SVG and CSS. For example, you can generate a plain old HTML table from an array of numbers, but more impressively you can make an interactive bar chart using scalable vector graphic from the same data. That barely scratches the surface of what D3 can do, however. There are dozens of visualization methods -- like chord diagrams, bubble charts, node-link trees and dendograms -- and thanks to D3's open source nature, new ones are being contributed all the time. D3 has been designed to be extremely fast, it supports Big Data datasets, and it has cross-hardware platform capability. That's meant it has become an increasingly popular tool for showing graphical visualizations of the results of Big Data analysis. Expect to see more of it in the coming months. HCatalog is an open source metadata and table management framework that works with Hadoop HDFS data, and which is distributed under the Apache license. It's being developed by some of the engineers at Hortonworks, the commercial organization that's the sponsor of Hadoop (and which also sponsors Apache). The idea of HCatalog is to liberate Big Data by allowing different tools to share Hive. That means that Hadoop users making use of a tool like Pig or MapReduce or Hive have immediate access to data created with another tool, without any loading or transfer steps. Essentially it makes the Hive metastore available to users of other tools on Hadoop by providing connectors for Map Reduce and Pig. Users of those tools can read data from and write data to Hive’s warehouse. It also has a command line tool, so that users who do not use Hive can operate on the metastore with Hive Data Definition Language statements. Other open source big data projects to watch: Storm. Storm makes it easy to reliably process unbounded streams of data, doing for real-time processing what Hadoop did for batch processing. Kafka. Kafka is a messaging system that was originally developed at LinkedIn to serve as the foundation for LinkedIn's activity stream and operational data processing pipeline. It is now used at a variety of different companies for various data pipeline and messaging uses. Julia. Julia is a high-level, high-performance dynamic programming language for technical computing, with syntax that is familiar to users of other technical computing environments. Impala. Cloudera Impala is a distributed query execution engine that runs against data stored natively in Apache HDFS and Apache HBase. Paul Rubens has been covering IT security for over 20 years. In that time he has written for leading UK and international publications including The Economist, The Times, Financial Times, the BBC, Computing and ServerWatch.
<urn:uuid:c17a071e-296a-466e-a861-66e8bc3aae1c>
CC-MAIN-2019-18
http://mobile.enterpriseappstoday.com/data-management/4-hot-open-source-big-data-projects.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.930636
961
2.625
3
Stem Cells refer to those progenitor cells that are characterized by the ability to renew themselves and have the potential to differentiate into one or more types of cells. Differences between protocols with stem cells from bone marrow and from umbilical cord blood from stem cells from fat tissue. First, it is helpful to understand differences of the stem cells from each source. Potential and quantity: Bone marrow has a natural concentration of hematopoietic stem cells. These cells create blood that is transferred to the blood stream of the body, and can be combined with a mixture of growth factors to create millions of pluripotent progenitor cells. The quantity of stem cells extracted from the bone marrow is defined by volume when the doctor performs the extraction. Because the bone marrow regenerates constantly, it is possible to perform periodical extractions according to the requirements of the procedure without causing side effects to the patient. Umbilical cord blood is rich with hematopoietic stem cells, because at time of birth these stem cells are “traveling” from the liver (where the blood is produced for the fetus) towards the bone marrow (where the blood is produced after the birth). This mixture contains tens of millions of multipotent progenitor cells. The quantity of cord blood collected is limited to the residual volume of blood in the umbilical cord at the time of birth and is not possible to extract additional same cord blood afterwards. Access to bone marrow requires a small access to the inside of the bone. This procedure is invasive and local anesthesia is used during the extraction. The extraction could be performed at any time on any person as long as normal operation procedures and sterility cautions are performed. Use of bone marrow has some limitations for allogeneic procedures (see paragraph on compatibility) when a compatible donor is necessary. Collecting umbilical cord blood is not an invasive procedure, because it is taken immediately after the baby is born and before the placenta gets removed. The extraction can only be performed at the time of the childbirth and should be done following normal hygienic practices to avoid contamination of the cord blood. In both cases compatibility works similarly. When the donor and the recipient are the same person (autologous), compatibility is a complete match. If the donor and the recipient are different (allogeneic), HLA compatibility tests must be performed before any procedure. The HLA test identifies 6 markers; some bone marrow treatments are possible only with compatibility of 6 out of 6, or 5 out of 6 matched markers; while umbilical cord blood has more flexibility, allowing procedures with 4 of 6 matched markers. Use of any allogeneic procedures is limited by the necessity of finding a compatible donor. Manipulation and storage A collection procedure must be performed for any source of stem cells. The more complicated the procedure, the higher the probability of contamination of the stem cells or of collecting a reduced amount. Bone marrow is not processed to extract the stem cells needed for storage or transport, preventing reduction of the amount of stem cells. Umbilical cord blood generally goes through a separation process of its components and also through a process of cryopreservation. Some volume of stem cells will be lost due to the nature of the processes required to collect, separate and cryogenically preserve the cells. The cells can be stored in this way for a very long time. ProgenCell performs only autologous protocols, performing the infusion immediately after extraction and activation of stem cells. These protocols do not require the separation of blood into components, nor storage, transport or cryopreservation, eliminating the possibility of contamination and decrement in the cellular quantity and viability introduced by these steps. ProgenCell uses total bone marrow for the infusion, infusing not only stem cells but also the growth factors and all components of the bone marrow. Umbilical cord blood stem cells began to be used in 1988 as alternative to bone marrow. Today it is commonly used for treatments related to the hematologic system of the human body, in nonhereditary diseases. Worldwide more than 70 diseases can be treated with stem cells, and these treatments have been performed mainly on children due to the relationship between the weight of the patient and the amount of stem cells required for treatment. They are an excellent alternative in cases where there is no compatible family member and the search for a compatible person is difficult or counter-productive. Extracting bone marrow from a baby would typically be contraindicated. Storing the umbilical cord blood when the baby is born is recommended since it is relatively easy harvesting and store, and can be made readily available. Storage in private banks gives the family the advantage of having it available at any time, with guaranteed compatibility of these miraculous cells for the child, and a strong likelihood of compatibility for another family member. Bone marrow has been used in procedures since the 1950´s in hundreds of thousands of cases to date. It is commonly used for the treatment of hematological malignancies, congenital immunodeficiencies and others. It does not make sense economically to have bone marrow banks because of the cost required to harvest and store the cells, in addition to the invasive procedure through which the donor must undergo. That is why the extraction only takes place when a patient requires the cells and a compatible donor is located. Some societies have enormous lists of donors with known HLA markers, facilitating the search of a compatible donor for the patient. Conclusion: Experience with bone marrow is greater than with umbilical cord blood. Because of the flexibility of multiple extractions of bone marrow it is a “limitless” source of stem cells. For autologous use, the availability and compatibility are not obstacles. Because ProgenCell performs extraction of bone marrow and immediate infusion, this eliminates the need for handling, storage and transport. IMPORTANT: If you are considering a procedure with stem cells from any source, it is important to take the following considerations: Know the source, the donor. When an allogeneic procedure is performed, there is a high risk of tissue rejection causing Graft-Versus-Host-Disease (GVHD). The HLA compatibility of the donor is very important, as well as having comprehensive blood tests to screen for infectious diseases (CMV, Hepatitis C, etc) and a complete clinical history record to avoid donors with predispositions to hereditary diseases. Supplier. In order to avoid complications in a procedure, the product is important; therefore it must a standard of quality such as Good Manufacturing Procedures. Otherwise the cells could be unusable if they were not handled carefully under these high standards during the separation process, packaging, cryopreservation, transport, thawing, etc. Amount. Tissue regeneration requires a minimum amount of stem cells to be able to repair damaged tissues. The amount needed is tied to the weight of the patient and other medical factors. A single cord-blood unit may not have enough stem cells to treat an adult. There has been some success with technology being developed to cultivate these cells ex vivo, growing the number available.
<urn:uuid:a67c0046-64bd-4cee-a9c2-3aa513dc8cd3>
CC-MAIN-2019-18
http://progencell.com/resources-and-support-for-stem-cell-therapy/what-are-stem-cells/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.928901
1,462
3.78125
4
Pages that link here: You can’t find more iconic “medieval” castle than Neuschwanstein, created in the late 19th century with the specific goal to emulate romanticized architecture of Renaissance castles. Learn more about this highly influential castle here. Warwick Castle is one of the castles created during Norman invasions of England that managed to distinguish itself by quickly becoming the center of the attention of the English nobility and royalty, who rebuilt it several times and crafted it into one of the most popular castles of medieval and modern England. Burg Eltz is one of the best preserved European castles that had a purpose of housing several noble families from central Germany. Built for comfort and exclusivity, this castle is today one of the major tourist attractions from Germany. Read more about its history here. Château de Chenonceau is one of the most modern Renaissance castles in France, managing to attract 1.3 million visitors each year (second only to Palace of Versailles in Paris). This incredibly beautiful castle was in the center of the French national history ever since it was created, and here you can read all about it.
<urn:uuid:d841c1a5-dd30-4a42-b9ea-47a43c6742dd>
CC-MAIN-2019-18
http://www.famouscastles.net/picture/neuschwanstein-view-from-marienbrucke/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.962928
238
2.546875
3
Gardening is a centuries-old pastime loved by many people. You can do it for pleasure, or for feeding a family. If you want to learn more about gardening, then this is the article for you! Shoveling soil that is mostly clay can be difficult because of the hardness of the soil, and because it sticks to the shovel. One way to get around this problem is to coat the shovel with wax. Use a clean cloth to spread the wax evenly. This will keep the soil from sticking, and prevent rusting of the tool. Learn about plant varieties so you can choose the ones with the best yields. Traditional strains are often out-performed by hybrids that have been bred for cold tolerance or disease resistance. You need to consider beginning the plants into pots. Then, you can plant the seedlings into your garden. This raises the chances of the plants growing until adulthood. This also helps tighten time between plantings. Your seedlings will be ready to go in as soon as you remove the previous set of mature plants. Plant bulbs in your garden if you want flowers through spring and summer. Bulbs are generally very simple to grow and hearty, as well; they will continue to grow for years. Remember that different bulbs will bloom at all different times of the year, so if you are careful to choose the right bulbs, you will see blooms in the early spring, and have flowers all the way to late summer. Before you plant seeds, pre-soak them for a night somewhere dark. You then want to place a small amount of seeds in a container that’s smaller and then fill it up with water to the top. The water will hydrate the sends, giving them a head start once you plant them. Your seeds will then have the best chance possible to survive to maturity. Protect your delicate deciduous shrubs from harsh elements. Fragile shrubs, that are planted in pots, should be covered to protect them during the cold season. You want to then tie the tops of the canes together, and cover them with a sheet or blanket. This is better than using plastic to wrap the plant, as more air can circulate. If your garden contains lots of short plants, purchase some gardening knee pads. If you spend a large portion of your gardening session on your knees, it could create pain over time. Wear knee pads meant for gardeners so that you’ll be more comfortable when kneeling in your garden. Boiling away unwanted weeds is an odd, but productive method used in many gardens. The safest herbicide that you can use in your garden is a simple pot of boiling water. Literally pour the water on the weeds, avoiding any wanted plants near them, and watch the weeds die over time. Boiling water damages the weed roots and will inhibit future growth. Get a wheelbarrow and a kneeling stool to work in your garden. In order to relieve stress on your knees when gardening, always use a small garden stool to be more comfortable. Using a wheelbarrow or wagon to transport heavy loads of dirt will help protect you from back injuries so make sure that you have one. When landscaping and gardening in autumn, choose plants and trees with vibrant colors. That idea is actually far from the truth. When it comes to vivid foliage, autumn offers the best opportunity to view it. You can find beautiful maple and beech trees in many different fall colors. Some very good shrubs to choose are barberry, hydrangea, and cotoneaster, which is a member of the rose family. As mentioned before, gardening has been appreciated by millions of people throughout the centuries. At one time, most people saw gardening as the sole means of providing food for their family. Today, gardening is still done for need but also for profit and pleasure. Whatever reason pulls you in to gardening, the information you have read in this article should help you to enjoy the process just that much more. Enjoy the rewards that gardening provides!
<urn:uuid:93af1557-64ee-4370-80d6-ece1e98b1cee>
CC-MAIN-2019-18
http://www.gardening-with-me.com/creative-ideas-and-practical-gardening-advice-10/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.95634
823
2.71875
3
About the DOT Challenge DOT, which stands for Do 1 Thing, is a challenge that encourages you to make simple lifestyle changes, known as DOTs, which have a positive impact on our environment. Most of these planet-saving changes can be implemented immediately, most likely won’t cost you anything and, in fact, will probably save you money. The DOT Challenge encompasses four categories; - Water: Implementing water-saving techniques saves money and diverts less water from our dams, lakes and rivers. Conserving water can also reduce water and waste-water treatment costs, along with the amount of energy needed to manage them. - Waste: The amount of global food waste produced could feed billions of people. Unfortunately, that wasted food often ends up in landfills, turning into methane gas that heats up the atmosphere. - Conservation: Did you know that the FDA doesn’t actually regulate the ingredients used in most personal care and of these products contain chemicals that are potentially dangerous to humans and the environment. Some products hygiene products such as makeup, perfume and body lotion. - Energy: Most of our energy use comes from fossil fuels like petroleum and coal that provide electricity and gas to power our growing energy needs. These resources are non-renewable which means that we will eventually run out. Braam Malherbe and Wayne Robertson have been a committed team, participating in DOT to raise awareness for many years. The two take on extreme and often physically challenging trips like running around the world or rowing a race from Cape Cod to Rio, which is their most recent undertaking. They rely on their own physical strength and mental fortitude, but beyond that, they rely on people like you donating to these important causes and taking up the DOT Challenge for yourselves to spread the message. So what’s your one thing today? This information is courtesy of the DOT Challenge website; http://dotchallenge.org/#challenge and Linda’s interview with Braam in 2014.
<urn:uuid:b36fc90d-175c-45ab-90dc-df47369d0d5e>
CC-MAIN-2019-18
http://www.tappinginshow.com/dot/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.952834
411
2.984375
3
Looking for things to do in Chiang Mai? Search out the different Buddhas at the Buddhist temples around the city. Most of the Buddhas you’ll encounter at these wats are in the Chiang Saen or Lanna style from 11th and 18th centuries. At the time, Northern Thailand was part of the Lanna kingdom. The Buddhas of this second-largest city in Thailand tend to have round faces with Mona Lisa smiles. Because Buddhist monks shave their heads, I’ve always thought of the Buddha as having set the original example. But depictions of the Buddha actually show tight curls framing his head. His nose can be on the long and narrow side — or even a bit pig-like (at least when seen from below). The ears are always elongated, like those kids who had spacers but took them out, only to have their stretched-out lobes flop back and forth. You can tell that I’m not the biggest fan of this look, but the idea is that the Buddha is then able to hear all that’s needed in the world. His torso tends to be on the slightly plump side, tapering to a narrower waist. In some depictions, the Buddha is bare-chested and sometimes draped in a saffron cloth. Other Buddhas have this one-shouldered robe as part of their design. Now and then, especially on smaller Buddhas that aren’t the central focus of a viharn (the main area of worship at a temple), you’ll see Buddhas covered in gold leaf. Buddha Meaning for Each Day of the Week Statues of the Buddha feature various poses, eight of which are tied to days of the week: Sunday: The Open-Eye Posture, standing, as he did under the bodhi tree, for seven days after reaching enlightenment, contemplating the suffering of all living things. Monday: Preventing Calamities, standing, causing torrential rain to fall upon the city of Vesali, which was invaded by devils that feasted on the living and the dead. Tuesday: The Reclining Buddha, humbling a proud giant named Asurindarahu. Wednesday: This day is divided into two poses, depending on the time of day. Before noon: Holding an Alms Bowl, standing, collecting the food for the day — a practice still performed by Buddhist monks. After noon: Resting With a Monkey and an Elephant, seated, seeking refuge from arguing monks in the Palilayaka, or Palelai, Forest. The monkey offers the Buddha a beehive, while the elephant presents a water pot. Thursday: Meditation, sitting in a yoga posture, when the Buddha vowed not to leave his spot on the grass until he reached enlightenment. Friday: Contemplation, standing, under the banyan tree, wondering how the heck he’ll explain his teachings, or dharma, about the cause of suffering. Saturday: Seated Under the Naga Hood, meditating and protected from rain by Mucalinda, the seven-headed King of the Naga. As the central image in a wat, more often than not, the Buddha is sitting cross-legged, one leg on top of the other, with one hand in his lap, palm upward, and the other draped downward over his leg. This is the Calling the Earth to Witness position, which symbolized the Buddha’s moment of enlightenment. Some of the Buddhas are standing, and you’ll also find a few Reclining Buddhas, which I personally like to call Sleepy-time Buddhas. Around the 16th century, the statues of the Buddha were made of a thin alloy, though some were even cast with gold. Here’s a sampling of the Buddhas we found around town. –Wally
<urn:uuid:e25bbcb8-6eb6-4145-8c51-27754d19e27f>
CC-MAIN-2019-18
http://www.thenotsoinnocentsabroad.com/?category=THAILAND
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.956464
812
2.703125
3
Last session, we looked at behavioural theories of leadership. The tl;dr for this time is that the first theories of leadership were focused on the idea that there were definable and more or less universal leadership traits, which could be identified and classified; and these could, possibly, also be learned/taught, depending on your beliefs about the effectiveness of cognitive behavioural therapy. As we concluded, also, there’s a few problems with this way of approaching leadership. Leaving aside the cognitive behavioural therapy issue, as businesses began to globalise researchers began to question the idea that leadership traits could, in fact, be universal: as we’ve seen in Game of Thrones, the skills you need to be Khal of the Dothraki are clearly not the skills needed to be Warden of the North or Hand of the King. Many other researchers, including but not limited to feminist and postmodernist scholars, questioned the degree to which such traits could even be identified; consider that in Westeros, Cersei’s leadership abilities were largely ignored by everyone except the audience for six seasons. Most importantly, any researchers generally argued that behavioural theories as structured appear to take place in a vacuum, without reference to the wider circumstancers in which leaders actually lead. Or, to put it another way, you can be Queen of Meeren only as long as the people aren’t actually in open revolt against you. This led to more contingency-based theories of leadership. As the name suggests, their unifying premise is that different times call for different leaders, and the people who lead are determined by the circumstances in which they arise. A good example in Westeros is the High Sparrow. Under normal circumstances, the High Sparrow is unlikely to have risen any, well, higher than a local priest or travelling mendicant; people who are comfortable, well-fed and happy with their circumstances don’t generally wind up joining charismatic religious movements. However, with the rulership of the kingdom in turmoil, many people clearly questioning the fitness of the nobility to govern (as we see in the satirical play that Arya witnesses on Braavos), the population in such economically dire straits as to starve for want of a small amount of money, and the church which supports the system clearly corrupt and in hock to the nobles, people are willing to listen to outsiders who seem to offer an alternative way of living. Game of Thrones leaves unanswered the question of whether or not the High Sparrow would have made a better ruler than the Lannisters or Targaryens; certainly there was potential in his movement for a tyrannical fascist theocracy to arise, but there was also potential for a regime in which peasants led longer and happier lives (consider what might have happened had his alliance with Margaery Tyrell succeeded). And the High Sparrow also fits the behavioural theories of leadership in having many of the traits of the charismatic leader, for instance. But, as the critics of the behavioural theories argue, having the traits is not enough: you need the circumstances as well. The High Sparrow is only one of many cases in Westeros which illustrates that behavioural theories need to be tempered with a little context to consider how leaders are made as well as born. Next week: I’ll be at Eastercon! I’ll try and compose a post beforehand, but if I don’t… next episode will discuss power-based theories of leadership, with a particular focus on Sansa Stark.
<urn:uuid:97e8c8b6-6f52-47b1-8b3c-4191b4aca695>
CC-MAIN-2019-18
https://adoctorofmanythings.wordpress.com/2019/04/11/contingency-based-leadership-theory-the-high-sparrow/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.974869
709
2.65625
3
When Christy Crawford realized how much her elementary students at Bronx Community Charter School loved their drumming class, she decided to work percussion into her computer science lesson plan. The idea: offer her kids an entry point into the world of code with a cultural activity that spoke to them. Christy and the school’s drumming instructor, Sekou O’Huru, worked together to create a lesson that used his expertise in rhythm to fully engage the class. Watch as students tap out unique rhythms, learning to write and debug HTML—to amazing results. WHEN TO USE: Christy’s lesson is a one-day activity that can be adapted to students at any grade level or learning background to introduce the concepts of syntax and fixing broken code. Christy found it works well at the beginning of a school year or when introducing a new unit. HOW TO IMPLEMENT: > Before class: - Invite your school’s music teacher to collaborate in a joint lesson. “Within the first few weeks of school, most teachers have witnessed a unique talent in one or two peers. Find that peer you admire and ask them to brainstorm ideas with you over lunch,” says Christy. > In class: - Have students follow a leader and tap their fingers on the desk in a pattern that helps them memorize the basic syntax of HTML, Java, or any other programming language. Instruct them to use that same beat to assist in debugging when a line of code fails to run. If you don’t have a music instructor at your school, try other mnemonic devices or physical activities geared towards aiding memorization. HOW TO ADAPT: - Continue to help students build their code vocabulary through mnemonic devices and activity. Encourage them to “tap it out” when they get stuck. - Consider teaching more syntax debugging techniques inside the programming environment. - Teach students to move to advanced semantic debugging by showing them how to Google errors and recognize common mistakes. - Ask students to consider how different musical genres might contribute to different understandings of programming or to explore connections between CS and other artistic endeavors. - Bring music into your lesson planning. "Music is a staple of my teaching," says Christy. "Any subject that I can put to music to introduce a concept or idea, or to make rote learning easier, is a good thing."
<urn:uuid:f3bad2f9-ffc5-4fbb-9d63-f42dae6b88c1>
CC-MAIN-2019-18
https://blueprint.cs4all.nyc/resources/3/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.937576
492
3.78125
4
Last time on FAIC I defined unification as a fancy word for taking a system of statements that contain placeholder variables and finding values for those variables which make the statements all true. We’ve seen that we can do that with mathematical statements (also known as “equations”) and that the type unification algorithm described in Milner’s paper does so for type assumptions. Last time I posed the question: what about arbitrary expressions in a programming language? Sure, why not? Let’s look at an example typical to functional languages. In many functional languages we have the binary operator head :: tail, which takes two values; the head of a list, say, a number, and the tail, say, a list of numbers, possibly empty. The result is a new list of numbers. nil is an expression that is used for the empty list. Suppose we make this equation h0 :: h0 :: nil = 2 :: h1 h1 are variables in the mathematical sense, not in the sense of elements of a programming language, and similarly, the equality is logical equality, not an operator in any programming language. From now on I’m going to label these “holes” with the letter h and a number to disambiguate them, so that it is clear when I am talking about a hole that needs something filled into it. What we’re looking for here is “what expressions could we put into h1 that would make these two program fragments mean the same thing?” The only values are to substitute 2 :: nil for h1, which gives us 2 :: 2 :: nil on both sides. Maybe the answer was immediately obvious to you, and maybe it was not, but regardless it is not 100% clear whether there is a straightforward algorithm that gives you values for the holes when presented with such a unification problem. The syntax might be throwing us off a bit, and it’s not very general. What if instead of an operator :: we just called a function like we do in C#, a function that took a head and a tail? Such a function is traditionally called “cons”, because it constructs a list: cons(h0, cons(h0, nil)) = Again, remember that we are looking for expressions that we can sub in for the holes that make the equality true. In this form it is a bit easier to see the algorithm. The first argument to cons on the left is h0, the first argument on the right is h0 must be 2, and perhaps you see how it goes from there. We could also model this as a parse tree. cons cons / \ / \ h0 cons = 2 h1 / \ h0 nil I find that with the tree diagram it becomes much easier to see what the solution is. I’m not going to go through the whole algorithm here, but maybe you see how it goes. Basically, we recurse through the tree, solving unification problems on the children, and then we check the results to see if there were any contradictions. This algorithm that I’ve failed to adequately describe is called the first-order unification algorithm, and it can solve any simple unification problem in linear time; it produces a substitution if one exists or fails if it does not. What do I mean by “simple” unification problem? Well, notice that this simple algorithm would fail if given the problem add(h0, 10) = h0 would unify with 10 would not unify with 1, and we’d get a unification failure, even though obviously there is a value for h0 that makes the equation true. Unification algorithms that understand additional facts about arithmetic or other domains are “unification modulo theory”. Similarly, unification algorithms that involve the lambda abstraction are “higher order unification” algorithms. The higher-order unification problem is in general not solvable, but that’s a topic for another day. Similarly, it is I hope easy to see how unifying one equation generalizes to multiple equations; you just unify on each equation, and then check to see if you deduced contradictions, and then combine the solutions together. All of this was meant to introduce what I really want to talk about, which is antiunification. If unification is the process of finding values of variables that induce certain statements to be all true, what on earth could the opposite of that be? Next time on FAIC: We’ll find out.
<urn:uuid:c4a69a01-fa69-464d-911c-3a99cf2b1a0c>
CC-MAIN-2019-18
https://ericlippert.com/2018/10/26/unification-part-2/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.942162
961
3.421875
3
The sand cherry (Prunus cistena), or purple-leaf cherry, is an ornamental cherry tree known for its pinkish flowers and red-purple leaves. It’s found in U.S. Department of Agriculture hardiness zones 2 through 8. Sand cherry trees, which can also be kept as shrubs, are short lived due to their vulnerability to pests and diseases. Some of the tree's more common diseases include black knot, verticillium wilt, powdery mildew, honey fungus and fireblight. The University of Illinois lists black knot disease as being the most troublesome for the sand cherry. Characterized by the hard black galls that form on branches and twigs, black knot (Dibotryon morbosum) is most infectious in the spring or early summer when the knots release their spores. Keeping the tree or shrub properly pruned helps to prevent the disease. Applying liquid sulfur, rock dust milk or a mixture of soured cow's milk, baking soda and water (2 cups milk and 5 tablespoons soda per gallon of water) can aid in the treatment of the disease. Verticillium wilt causes wilting followed by yellowing, defoliating and die back. The fungi Verticillium albo-atrum and Verticillium dahlia are the causative agents for the disease, which has no cure. Verticillium wilt starts in the roots and works its way up the tree, creating a gum that eventually plugs the tree's vascular system, resulting in the visible symptoms. Trees with the disease should be removed, roots and all, and no new trees should be planted in the same spot for several years. To keep sand cherries healthy and help prevent the disease, use fertilizers high in potassium and low in nitrogen. Keep pruning tools sterilized and avoid damaging the roots or lower trunk. Other Fungal Diseases Another common disease of the sand cherry is powdery mildew, infamous for the white powdery growth it produces on leaves and stems. It may be spread by wind, water and insects. To prevent powdery mildew, keep water from collecting on the leaves, water only during the day and keep debris from around the base of the tree. Honey fungus is a lay term for armillaria (Armillaria mellea). The disease often begins with leaf wilt followed by rapid death of the tree. In some trees, a decline in shoot growth, a heavy crop of fruit or cones, abnormally small leaves and gradual dieback may also signal the disease. Gummy exudates and white fungal sheets may be seen on the trunk as well. The key to preventing armillaria is to keep the tree healthy, namely by watering and feeding appropriately and preventing injury. Other fungal diseases such as leaf spot can also be a problem. Treatments for powdery mildew can include liquid sulfur, rock dust milk, soured cow's milk, garlic oil or liquid kelp. Rock dust compost and vinegar added to the water enhance the tree's vitality, helping it to combat honey fungus and other wood-decaying diseases. Fireblight is a bacterial disease that affects the sand cherry. Twigs of the infected tree appear water soaked before becoming dark, dry and sunken. Cracks may appear in the sunken areas. Terminal ends of the twigs and branches appear burned or rusty. Some branches form what is called a “shepherd's crook.” Infected branches should be pruned and disposed of. However, sulfur may be helpful as well as spraying with compost tea and liquid kelp. Compost tea is made by placing compost in a burlap bag or old pillowcase and placing it in a bucket of water for three or more days. Sometimes a tree or shrub can appear to have a disease, but is actually damaged by environmental factors. Some of these include frost injury, herbicide injury, drought, overwatering and nutrient deficiencies. Frost and herbicides can both discolor and kill leaves. Wilting results from drought and overwatering, while both overwatering and nutrient deficiencies can result in chlorosis or leaf yellowing. Prevent deficiencies by applying rock dust or rock dust compost to the soil. - Missouri Botanical Gardens: Prunus x cistena - University of Illinois Extension: Purple-leafed Sand Cherry - Morton Arboretum: Black Knot of Ornamental Cherry and Plum - University of Illinois Extension: Verticillium Wilt [shrubs and trees] - Guernsey Department of Commerce and Employment Plant Protection Services: Honey Fungus - Colorado State University Extension: Diseases of Landscape Ornamentals - University of Georgia Extension: Fireblight Causes and Treatments - Natural Pest Control; Andrew Lopez - Dick Luria/Photodisc/Getty Images
<urn:uuid:464fbfd6-840d-4474-926a-e515d1fa9610>
CC-MAIN-2019-18
https://homeguides.sfgate.com/sand-cherry-diseases-83578.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.925027
1,004
3.625
4
No new science, no new data, no new scenario and consequently no new cause for panic. Dr David Whitehouse, GWPF Science Editor It’s been a long heatwave in much of Europe which has prompted questions like ‘what is the influence of climate change on this year’s heatwave?’ Some claim that it’s twice as likely to occur, while others claim that climate change is making it worse. “This is the face of climate change,” says Professor Michael Mann. There is a feeling in the hot air that this summer is showing the way of the future. ‘Expect this kind of thing more often’, is the cry. Whatever way the evidence points, wherever the argument goes or the temperature changes in the future, the media have loved the “Earth’s on Fire,” headlines. But if you thought that was bad wait for the apocalypse. A new paper claims were are heading to a “Hothouse Earth,” and perhaps soon. Cue the heatwave fever on steroids. The first thing to bear with the paper that suggest this is that it is a “Perspective” paper in the Proceedings of the National Academy of Science of the USA. Fig1 from paper.(Click on image to enlarge). — The possible trajectories of the Earth. Towards a hothouse — or an region of stability, if we take drastic action. Yet, it is not a research paper and contains nothing new in the way of climate science. It is a future scenario pieced together by quoting selected (cherry-picked) references with a lot of hand-waving in-between. The author’s say it’s not conclusive, and they hope it’s not going to be true. They have a responsibility to ask the question, they claim, admitting it’s extreme. The report starts as it continues. It says the formalisation of the Anthropocene – the controversial ‘geological’ epoch in which mankind allegedly dominates natural processes – is being considered by the stratigraphic community. Just a few days after this paper was accepted for publication, the International Commission on Stratigraphy decided against endorsing the Anthropocene, saying that we live in the Meghalayan Epoch instead. However the authors then go on to say that it is actually irrelevant what the geological community decides, they are going to claim the Anthropocene exists anyway. Human activity, they conclude, now rivals geological forces. So the authors ask, ‘Is there a tipping point’, a threshold, in climate change and where might it be? How much will the Earth warm and how fast? Earlier this year a paper in Nature revised the calculation of how greenhouse gases drive up the planet’s temperature. It reduced the range of possible end-of-century outcomes by more than half and concluded that any worst-case scenarios were unlikely. It’s not mentioned in the “Perspective.” Fork In The Road The paper’s conclusion is that we have already broken out of the Ice Age-Interstitial see-saw of the Late Quaternary (last 1.2 million years), and that the one degree C temperature rise since pre-industrial times is nearing the upper envelope of interglacial conditions. “The Earth system may have already passed the ‘fork in the road’ of potential pathways,” they write, suggesting that the next glaciation might not happen. Next they speculate that, “biogeophysical feedback may be stronger than normally assumed.” This whole scenario moves into what many would regard as extreme scientific speculation. There is no real evidence in the scientific literature that a rise of global temperatures by two degree C above pre-industrial temperatures will be a tipping point. The most recent report by the IPCC rejected such doomsday scenarios as highly unlikely. There is no new science that this is a threshold after which global warming will become unstoppable. No new science, no new scenario and consequently no new cause for panic. But that’s not the message in the media. There is nothing wrong with presenting an extreme scenario in order to highlight possibilities and to stimulate research. But as far as presenting it to the public, and as far as reporting it by the news media, it is essential to put it into the context of scientific facts and research. The vast majority of climate scientists are not predicting a Hothouse Earth. This provocative paper contradicts the scientific state of climate research. If it is a warning then it should not be presented as a prediction. It does not warrant all the lurid headlines. But it has been a very hot summer and a cool approach and rational perspective has gone out of the window like the hot exhaust from an air-conditioning unit. In the words of Dr Phil Williamson of the University of East Anglia quoted in the media, “In the context of the summer of 2018, this is definitely not a case of crying wolf.” Yeah, right. Source: The GWPF via Watts Up With That? August 7, 2018 at 04:44PM
<urn:uuid:65abe19c-61a7-4898-88d9-0753c801247b>
CC-MAIN-2019-18
https://iowaclimate.org/2018/08/07/hothouse-earth-an-extremely-dodgy-preposition/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.942957
1,069
2.765625
3
Canadian World War II heroes: Lt. Robert Hampton Gray leads eight Corsairs in an attack against Japanese military targets – and never returns. August 9, 1945: World War II is coming to an end. A Canadian, Lt. Robert Hampton Gray, leads eight Corsairs in an attack against Japanese military targets. To everyone’s surprise, Gray undertakes a suicidal assault on an armed escort ship in Onagawa Bay on the island of Honshu, the mainland of Japan. Posthumously, he’s awarded the highest military honour: the Victoria Cross. In this documentary, filmmaker Ian Herring journeys to make sense of Gray’s final act and determine the meaning of heroism in peacetime. Lieutenant Gray, born 1917 in Trail, B.C., went to school at the University of Alberta and the University of British Columbia before joining the Canadian Navy in 1940. One of only 13 who qualified as pilots in the Fleet Air Arm, he also served as lieutenant on board the HMS Formidable in 1944, and has been praised for his work during an attack on the German battleship Tirpitz in Alten Fjord. Shortly before his death he was awarded the Distinguished Service Cross for aiding in the destruction of a destroyer near Tokyo. Neither Lieutenant Gray nor his plane have ever been found. But his name survives as one of Canada’s World War II heroes. It’s inscribed on the Sailor’s Memorial in Halifax, Nova Scotia and his Victoria Cross, the last to be awarded to a Canadian, is on display at the War Museum in Ottawa.
<urn:uuid:45c92415-fb87-4cdb-8dba-0f3cf69f3655>
CC-MAIN-2019-18
https://parallaxfilm.com/episode/last-battle-of-hampton-gray/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.966454
327
3.09375
3
April 12, 2016 BACKGROUND AND MOTIVATION Currently there are relatively few prophylactics or therapeutics for viruses, and most that do exist are highly pathogen-specific or have undesirable side effects or other disadvantages. We have developed a radically new, broad-spectrum antiviral therapeutic/prophylactic that has the potential to revolutionize the treatment of viral infections. Our Double-stranded RNA Activated Caspase Oligomerizer (DRACO) approach selectively induces apoptosis (cell suicide) in cells containing viral double-stranded RNA (dsRNA). DRACO should recognize virus-infected cells and rapidly kill those cells without harming uninfected cells, thereby terminating the viral infection while minimizing the impact on the host (PLoS ONE 6:e22572, 2011; Nature Biotechnology 29:885, 2011; U.S. patents 7,125,839, 7,566,694, and others pending). We have previously created an initial version of DRACO and shown that it is nontoxic and effective against 18 different viruses in 13 mammalian cell types. We have also demonstrated that DRACO is nontoxic in mice and rescues mice from lethal challenges with H1N1 influenza, Amapari arenavirus, Tacaribe arenavirus, and Guama bunyavirus in preliminary trials. Our DRACO approach and results have been called “visionary” by the White House (National Bioeconomy Blueprint, April 2012, p. 9), named one of the best inventions of the year by Time magazine (November 28, 2011, pp. 58, 78), and featured on the BBC Horizons TV program (2013). The herpesvirus family includes several pathogens of great clinical and commercial interest, including herpes simplex 1 and 2 (HSV, which can cause oral, ocular, and genital infections), cytomegalovirus (CMV, a major cause of birth defects and ocular infections, and also a concern for the aging population), Kaposi’s sarcoma-associated herpesvirus (KSHV or HHV-8, which can cause sarcoma and lymphoma), Epstein-Barr virus (EBV, which can cause Burkitt’s lymphoma and other cancers), and varicella zoster virus (VZV, which causes chickenpox and shingles). Members of the herpesvirus family cause lifelong infections, and existing antiviral drugs can help to control their symptoms but cannot cure the infections or ensure that they cannot be transmitted to other people. In principle these viruses should be susceptible to our DRACO approach, although we have not yet tested DRACO against any of these viruses. Out of the wide range of possible DRACO designs, the one we have now is simply the first we tried. It is almost certainly not the best, even for the viruses we have already tested, and it may or may not be effective against viruses in the herpesvirus family. As drug trials proceed from cells to mice to higher animals to humans, the trials become much more expensive, longer in duration, able to test fewer possibilities per experiment, and higher profile and thus more politically detrimental to further research funding if there is a failure. As just one example, a cell experiment set up by one person might test 2000 wells of cells with different DRACOs and other 2 conditions within a few days, whereas an equally laborious and more expensive mouse experiment might run for several weeks and test only 54 mice, or 6 different conditions (9 mice per condition). Trials with larger animals are even more time- and resource-intensive. Moreover, if a drug design is later found to be inadequate in advanced animal trials, one might have to go back to the very beginning and repeat all the cell and animal trials with alternate and hopefully better drug designs, making the total costs and delays even greater. Thus before proceeding with animal trials for herpesviruses, it is much faster and ultimately much less expensive and less risky to test thoroughly in cells to identify the best DRACO for herpesviruses, and the next-best DRACOs that could be used if the front-runner fails in later trials for any reason. Testing and optimizing the design of new therapeutic molecules in early experiments is a widely accepted practice called structure-activity relationship (SAR) analysis. Therefore, we would like to use the SAR approach to produce several different DRACOs with various dsRNA-detection domains, apoptosis-induction domains, and cellular delivery tags that should be effective against these viruses, test their efficacy against members of the herpesvirus family in multiple cell types, and iterate and optimize the DRACO designs in order to develop the most effective DRACOs, which could subsequently be tested in animal models of these viruses. We will proceed as quickly as we can with the proposed experiments for herpesviruses, but we need to be thorough or else the risk and cost of a failure further down the road become too high. We should be able to complete the optimization of DRACO against members of the herpesvirus family in cells within four years. The estimated cost of this work is approximately $500K per year, or $2M total over the four years, to cover all necessary costs for lab space, equipment, reagents, personnel, and other expenses. The requested funding and the proposed work are critical for helping to move DRACO through the “valley of death” that it is currently in. The early results against other viruses look very promising, but preclinical animal trials and clinical human trials for viruses such as herpesviruses are quite some distance away, and other sponsors have not been willing to fund DRACO to cross that valley. If the requested funding can enable us to demonstrate and optimize DRACO performance against clinically and commercially important herpesviruses in cells, pharmaceutical companies and other sponsors should be willing to carry DRACO through preclinical animal and clinical human trials for these viruses. Although our initial version of DRACO has been effective against a number of viruses, the dsRNA binding domain, apoptosis induction domain, delivery tag, and other structural features of the DRACO design may need to be optimized to maximize efficacy against herpesviruses, for example in order to optimize binding to herpesvirus-related dsRNA, overcome natural resistance strategies incorporated in herpesviruses, and maximize DRACO delivery to herpesvirus-infected cells and the nuclei thereof. Therefore, we propose a SAR experimental campaign to test and optimize DRACOs against herpesviruses in multiple cell types. Specifically, we propose to: • Restart our DRACO production and testing capability, and produce sufficient quantities of DRACOs and negative controls for cell trials against herpesviruses. Multiple DRACOs with different domains will be produced and tested in parallel to conduct the work as 3 efficiently as possible, minimize technical risks, and optimize DRACO performance. DRACOs will be expressed from pET vectors transformed into Rosetta BL21(DE3) E. coli and purified using nickel columns to bind His6-tagged proteins following our standard protocols. For quality control, each newly produced batch will be tested in our proven models such as rhinovirus challenge of normal human lung fibroblast (NHLF) cells before being used in new experiments. Negative controls to be produced will include just the dsRNA-binding domains of DRACOs with appropriate delivery tags, just the apoptosis-induction domains of DRACOs with appropriate delivery tags, and DRACO-free extract produced and purified from the same E. coli strain using the same methods as DRACO. These negative controls will help to ensure that any observed antiviral activity is due to the intended function of intact DRACO and not to other factors. • Test multiple herpesvirus strains in different human and animal fibroblast, macrophage, and neuronal cell lines in order to verify the best cell/virus systems, cell density, virus dose, assay schedule, and other protocol conditions for measuring viral replication and cytopathic effects. 96-well plates of cells will be challenged with virus at varying multiplicities of infection. We will develop and validate quantitative polymerase chain reaction (qPCR) assays for measuring viral titers in supernatants collected from viruschallenged cells on specified days after infection. We have previously developed qPCR assays for a number of other viruses. In addition to viral titers, cytopathic effects and cell survival will be evaluated by daily visual inspection and by adding Promega CellTiter 96 on selected days and measuring absorbance at 490 nm on a 96-well plate reader. Assay schedules, viral doses, and other parameters will be optimized for these cell/virus systems. • Conduct tests of DRACOs and negative controls against herpesvirus strains in these validated cell models. 96-well plates of cells will be challenged with virus at varying multiplicities of infection. DRACO will be added at fixed times before or after cells are challenged with virus, with groups of 8 wells per condition. Criteria for demonstrating DRACO efficacy will include measurable reductions in viral titers in the supernatant of virus-challenged cells, measurable reductions in virus-induced cytopathic effects, and/or measurable increases in cell survival in virus-challenged wells. • Use the results against herpesviruses to improve the DRACO dsRNA binding domain, apoptosis induction domain, delivery tag, other structural features, and production and administration protocols to maximize efficacy against herpesviruses. We already have a large number of designs for DRACO domains and methods, and these experiments will help to select the best ones for herpesviruses. We can do multiple rounds of iteration between producing improved DRACOs and testing them against herpesviruses. This ability to rapidly iterate in cells should help to identify and optimize the best lead DRACOs as quickly and inexpensively as possible before proceeding to animal trials. We should be able to complete the optimization of DRACO against members of the herpesvirus family in cells within four years. The estimated cost of this work is approximately $500K per 4 year, or $2M total over the four years, to cover all necessary costs for lab space, equipment, reagents, personnel, and other expenses. This work should demonstrate that DRACOs are effective against infections by multiple herpesviruses, and this data should be very important for persuading major sponsors to fund and advance DRACOs through animal trials and hopefully human trials for these viruses. The results of the proposed work will also hopefully lead to follow-on research to test DRACOs against additional herpesvirus strains or members of other virus families.
<urn:uuid:76811331-05a6-4eed-8627-f0c4cff355c9>
CC-MAIN-2019-18
https://riderinstitute.org/blogs/news/102137030-testing-and-optimizing-draco-therapeutics-against-members-of-the-herpesvirus-family
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.931784
2,227
2.765625
3
In economics, a durable good or a hard good is a good that does not quickly wear out, or more specifically, one that yields utility over time rather than being completely consumed in one use. Items like bricks could be considered perfectly durable goods because they should never wear out. Highly durable goods such as refrigerators or cars usually continue to be useful for 3 or more years of use, examples of consumer durable goods include automobiles, household goods, sports equipment, medical equipment and toys. Nondurable goods or soft goods are the opposite of durable goods and they may be defined either as goods that are immediately consumed in one use or ones that have a lifespan of fewer than 3 years. While durable goods can usually be rented as well as bought, while buying durable goods comes under the category of investment demand of goods, buying non-durables comes under the category of consumption demand of goods. Several units may be used to measure the durability of a product according to its field of such as years of existence, hours of use. The life span of household goods is significant for sustainable consumption, the longer product life spans could contribute to eco-efficiency and sufficiency, slowing consumption in order to progress towards a sustainable consumption. Cooper proposed a model to demonstrate the role of product life spans to sustainable production and consumption. Coase conjecture Industrial organization Pacman conjecture Planned obsolescence Putty-putty The bond market is a financial market where participants can issue new debt, known as the primary market, or buy and sell debt securities, known as the secondary market. This is usually in the form of bonds, but it may include notes and its primary goal is to provide long-term funding for public and private expenditures. The bond market has largely dominated by the United States. The bond market is part of the market, with bank loans forming the other main component. The global credit market in aggregate is about 3 times the size of the equity market. Bank loans are not securities under the Securities and Exchange Act, bonds are typically not secured by collateral, and are sold in relatively small denominations of around $1,000 to $10,000. Unlike bank loans, bonds may be held by retail investors, bonds are more frequently traded than loans, although not as often as equity. Nearly all of the daily trading in the U. S. bond market takes place between broker-dealers and large institutions in a decentralized over-the-counter market. However, a number of bonds, primarily corporate ones, are listed on exchanges. Bond trading prices and volumes are reported on FINRAs Trade Reporting and Compliance Engine, an important part of the bond market is the government bond market, because of its size and liquidity. Government bonds are used to compare other bonds to measure credit risk. The yield on government bonds in low risk countries such as the United States or Germany is thought to indicate a rate of default. The primary way to default is to not pay in full or not pay on time, the Securities Industry and Financial Markets Association classifies the broader bond market into five specific bond markets. In the United States, approximately 10% of the market is held by private individuals, amounts outstanding on the global bond market increased by 2% in the twelve months to March 2012 to nearly $100 trillion. Domestic bonds accounted for 70% of the total and international bonds for the remainder, the United States was the largest market with 33% of the total followed by Japan. As a proportion of global GDP, the market increased to over 140% in 2011 from 119% in 2008. The considerable growth means that in March 2012 it was larger than the global equity market which had a market capitalisation of around $53 trillion. Growth of the market since the start of the slowdown was largely a result of an increase in issuance by governments An economic system is a system of production, resource allocation, and distribution of goods and services within a society or a given geographic area. It includes the combination of the institutions, entities, decision-making processes. As such, a system is a type of social system. The mode of production is a related concept, all economic systems have three basic questions to ask, what to produce, how to produce and in what quantities, and who receives the output of production. The study of systems includes how these various agencies and institutions are linked to one another. The analysis of economic systems traditionally focused on the dichotomies and comparisons between market economies and planned economies, and on the distinctions between capitalism and socialism, the categorization of economic systems expanded to include other topics and models that do not conform to the traditional dichotomy. Today the dominant form of organization at the world level is based on market-oriented mixed economies. Economic systems is the category in the Journal of Economic Literature classification codes that includes the study of such systems, there are multiple components to economic systems. Decision-making structures of an economy determine the use of inputs, distribution of output, the level of centralization in decision-making. Decisions might be carried out by industrial councils, by a government agency, in one view, every economic system represents an attempt to solve three fundamental and interdependent problems, What goods and services shall be produced, and in what quantities. How shall goods and services be produced and that is, by whom and with what resources and technologies. For whom shall goods and services be produced and that is, who is to enjoy the benefits of the goods and services and how is the total product to be distributed among individuals and groups in the society. Thus every economy is a system that allocates resources for exchange, the system is stabilized through a combination of threat and trust, which are the outcome of institutional arrangements. The means of production may be owned privately, by the state, a decision-making system, this determines who is eligible to make decisions over economic activities. Economic agents with decision-making powers can enter into binding contracts with one another, a coordination mechanism, this determines how information is obtained and used in decision-making. An incentive system, this induces and motivates economic agents to engage in productive activities and it can be based on either material reward or moral suasion. The incentive system may encourage specialization and the division of labour, organizational form, there are two basic forms of organization and regulators. Economic actors include households, work gangs and production teams, joint-ventures, economically regulative organizations are represented by the state and market authorities, the latter may be private or public entities An economist is a practitioner in the social science discipline of economics. The individual may study and apply theories and concepts from economics and write about economic policy. A generally accepted interpretation in academia is that an economist is one who has attained a Ph. D. in economics, teaches economic science, the professionalization of economics, reflected in academia, has been described as the main change in economics since around 1900. Economists debate the path they believe their profession should take, surveys among economists indicate a preference for a shift toward the latter. Most major universities have a faculty, school or department. However, many prominent economists come from a background in mathematics, political science, sociology, getting a PhD in economics takes six years, on average, with a median of 5.3 years. The Nobel Memorial Prize in Economics, established by Sveriges Riksbank in 1968, is a prize awarded to each year for outstanding intellectual contributions in the field of economics. The prize winners are announced in October every year and they receive their awards on December 10, the anniversary of Alfred Nobels death. In contrast to regulated professions such as engineering, law or medicine, in academia, to be called an economist requires a Ph. D. degree in Economics. A professional working inside of one of many fields of economics or having a degree in this subject is often considered to be an economist. In addition to government and academia, economists are employed in banking, accountancy, marketing, business administration, lobbying. Politicians often consult economists before enacting economic policy, many statesmen have academic degrees in economics. Economics graduates are employable in varying degrees depending on the regional economic scenario, small numbers go on to undertake postgraduate studies, either in economics, teacher training or further qualifications in specialist areas. Nearly 135 colleges and universities grant around 900 new Ph. D. s every year, incomes are highest for those in the private sector, followed by the federal government, with academia paying the lowest incomes. As of January 2013, PayScale. com showed Ph. D. economists salary ranges as follows, all Ph. D. economists, $61,000 to $160,000, Ph. D. The largest single grouping of economists in the UK are the more than 1000 members of the Government Economic Service. This figure compares very favourably with the picture, with 64 percent of economics graduates in employment. Some current well-known economists include, Ben Bernanke, Chairman of the Federal Reserve from 2006 to 2014, milton Friedman, Nobel Memorial Prize in Economic Sciences laureate in Economics Frank Horace Hahn FBA was a British economist whose work focused on general equilibrium theory, monetary theory, Keynesian economics and monetarism. A famous problem of economic theory, the conditions under which money can have a value in a general equilibrium, is called Hahns problem after him. Frank Hahn was born on 26 April 1925 in Berlin to Czech parents and his father was a chemist by profession and a writer. The family moved to Prague in 1931 and left for England in 1938 and he and his brother were educated at Bournemouth School from when he was 13, a school for which he retained an abiding enthusiasm. He married Dorothy Salter, an economist, in 1946, as a student, he had been part of the Hayek–Robbins seminar at LSE, and he once said his wife had been an original member of the Mont Pelerin Society. Hahn began his career in 1948 at the University of Birmingham. In 1960 he joined the University of Cambridge - as a Fellow of Churchill College, in 1967 he moved to the London School of Economics, where he received his first professorship. He returned to Cambridge as Professor of Economics five years and his inaugural lecture On the notion of equilibrium in economics was delivered on 28 February 1973. From 1990 to 1996 Hahn directed the PhD program of the Economics Department at the University of Siena and he eventually became Emeritus Professor at Cambridge. Frank Hahn, by his own admission, was influenced in economics by John Hicks, W. M. Gorman, Takashi Negishi and he in turn influenced a large number of colleagues and students. He died in Cambridge on 29 January 2013, following a short illness and he is survived by his wife Dorothy, née Salter, whom he had married in 1946. The Share of Wages in the Trade Cycle, Economic Journal, the Share of Wages in National Income, Oxford Economic Papers vol.3 No.2. The Rate of Interest in General Equilibrium Analysis, Economic Journal, gross Substitutes and the Dynamic Stability of General Equilibrium, Econometrica vol 26 pp. 169–70. The Patinkin Controversy, Review of Economic Studies vol, the Stability of Growth Equilibrium, Quarterly Journal of Economics vol. Money, Dynamic Stability and Growth, Metroeconomica vol.13 No.11, a Stable Adjustment Process for a Competitive Economy, Review of Economic Studies vol 39 pp. 62–5. A Theorem on Non-Tatonnement Stability with T. Negishi, Econometrica vol.30 No.3, on the Stability of a Pure Exchange Equilibrium, International Economic Review, vol. The Stability of the Cournot Oligopoly Solution, Review of Economic Studies vol.29 pp. 329–33. On the Disequilibrium Behavior of a Multi-Sectoral Growth Model, Economic Journal The Theory of Economic Growth, A survey, with R. C. O. Matthews, Economic Journal vol 74 pp. 779–902 Huw David Dixon, born 1958, is a British economist. Dixon was a fellow of the CEPR from 1991–2001, a member of the Royal Economic Society council, and he has been on the Editorial Board of the Review of Economic Studies, the Journal of Industrial Economics. He edited the Controversies section of the Economic Journal and has been the Chair of the Royal Economic Society Conference 1992, Dixon has a wide scope in terms of the areas of economics he has researched and published in and he has been described as one of Europes leading economists. The topics include, Bertrand–Edgeworth models with strictly convex costs, francis Edgeworth developed the analysis of the model of Bertrand competition in a setting where firms had constant marginal cost up to capacity. Dixon explored how this could be generalized to the case of convex costs and he established the existence of a mixed-strategy Nash equilibrium, and of an Epsilon-equilibrium in a large market, and in other aspects. The use of capital to alter the way firms compete in oligopoly by altering their marginal cost, Dixon explored the implications of evolutionary ideas for oligopoly theory and learning. He developed one of the first models of endogenous aspirations in economics and this is an idea that was much explored in many other papers by him and more recently. This paper was the first to demonstrate in a general equilibrium model that the fiscal multiplier could be increasing with the degree of imperfect competition in the output market. The reason for this is that competition in the output market tends to reduce the real wage. When government spending is increased, the increase in lump-sum taxation causes both leisure and consumption decrease. The greater the degree of competition in the output market. Hence the fiscal multiplier is less one, but increasing in the degree of imperfect competition in the output market. Other topics include imperfect competition in macroeconomics, nominal rigidity, most of his work is New Keynesian. Dixon supports the High Speed 2 development for the United Kingdom and he has contributed to The Times Higher Education Supplement multiple times regarding economics. He has authored a book Surfing Economics, which explores New Keynesian economics, the Natural Rate, Bounded Rationality, Social Learning, cardiff Business School, Huw Dixon Official website huwdixon. org Thomas Robert Malthus Thomas Robert Malthus FRS was an English cleric and scholar, influential in the fields of political economy and demography. Malthus himself used only his name, Robert. Populations had a tendency to grow until the class suffered hardship and want and greater susceptibility to famine and disease. Malthus wrote in opposition to the view in 18th-century Europe that saw society as improving. As an Anglican cleric, Malthus saw this situation as divinely imposed to teach virtuous behaviour, Malthus criticized the Poor Laws for leading to inflation rather than improving the well-being of the poor. He supported taxes on imports, because food security was more important than maximizing wealth. His views became influential, and controversial, across economic, social, pioneers of evolutionary biology read him, notably Charles Darwin and Alfred Russel Wallace. The seventh child of Henrietta Catherine and Daniel Malthus, Robert Malthus grew up in The Rookery, petersen describes Daniel Malthus as a gentleman of good family and independent means. A friend of David Hume and Jean-Jacques Rousseau, the young Malthus received his education at home in Bramcote, and at the Warrington Academy from 1782. Warrington was an academy, at the end of its existence. Malthus entered Jesus College, Cambridge in 1784, there he took prizes in English declamation and Greek, and graduated with honours, Ninth Wrangler in mathematics. He took the MA degree in 1791, and was elected a Fellow of Jesus College two years later, in 1789, he took orders in the Church of England, and became a curate at Oakwood Chapel in the parish of Wotton, Surrey. Malthus came to prominence for his 1798 essay on population growth, in it, he argued that population multiplies geometrically and food arithmetically, whenever the food supply increases, population will rapidly grow to eliminate the abundance. He wrote the text in reaction to the optimism of his father. Malthus constructed his case as a response to writings of William Godwin. The Essay gave rise to the Malthusian controversy during the next decades, the content saw an emphasis on the birth rate and marriage rates. The neo-Malthusian controversy, or related debates of many later, has seen a similar central role assigned to the numbers of children born. In 1799 Malthus made a European tour with William Otter, a college friend, travelling part of the way with Edward Daniel Clarke and John Marten Cripps, visiting Germany In macroeconomics, a multiplier is a factor of proportionality that measures how much an endogenous variable changes in response to a change in some exogenous variable. For example, suppose variable x changes by 1 unit, which causes another variable y to change by M units, two multipliers are commonly discussed in introductory macroeconomics. In monetary microeconomics and banking, the money multiplier measures how much the money supply increases in response to a change in the monetary base, the multiplier may vary across countries, and will vary depending on what measures of money are considered. For example, consider M2 as a measure of the U. S. money supply, if a $1 increase in M0 by the Federal Reserve causes M2 to increase by $10, the money multiplier is 10. Multipliers can be calculated to analyze the effects of policy, or other exogenous changes in spending. For example, if an increase in German government spending by €100, with no change in tax rates, causes German GDP to increase by €150, other types of fiscal multipliers can be calculated, like multipliers that describe the effects of changing taxes. Keynesian economists often calculate multipliers that measure the effect on demand only. American Economist Paul Samuelson credited Alvin Hansen for the inspiration behind his seminal 1939 contribution, here, t is the tax rate and m is the ratio of imports to GDP. It is assumed that b >0, the general method for calculating short-run multipliers is called comparative statics. That is, comparative statics calculates how much one or more endogenous variables change in the short run, the comparative statics method is an application of the implicit function theorem. Dynamic multipliers can be calculated and that is, one can ask how a change in some exogenous variable in year t affects endogenous variables in year t, in year t+1, in year t+2, and so forth. A graph showing the impact on some variable, over time, is called an impulse-response function. The general method for calculating impulse response functions is called comparative dynamics. In the tableau économique, one sees variables in one period feeding into variables in the period, and a constant rate of flow yields geometric series. Complex multiplier Local multiplier effect Multiplier uncertainty Social Multiplier Effect The Great Depression was a severe worldwide economic depression that took place during the 1930s. The timing of the Great Depression varied across nations, in most countries it started in 1929 and it was the longest and most widespread depression of the 20th century. In the 21st century, the Great Depression is commonly used as an example of how far the economy can decline. The depression originated in the United States, after a fall in stock prices that began around September 4,1929. Between 1929 and 1932, worldwide GDP fell by an estimated 15%, by comparison, worldwide GDP fell by less than 1% from 2008 to 2009 during the Great Recession. Some economies started to recover by the mid-1930s, however, in many countries, the negative effects of the Great Depression lasted until the beginning of World War II. The Great Depression had devastating effects in both rich and poor. Personal income, tax revenue and prices dropped, while international trade plunged by more than 50%, unemployment in the U. S. rose to 25% and in some countries rose as high as 33%. Cities all around the world were hit hard, especially dependent on heavy industry. Construction was virtually halted in many countries, farming communities and rural areas suffered as crop prices fell by about 60%. Facing plummeting demand with few sources of jobs, areas dependent on primary sector industries such as mining and logging suffered the most. Even after the Wall Street Crash of 1929 optimism persisted for some time, john D. Rockefeller said These are days when many are discouraged. In the 93 years of my life, depressions have come, prosperity has always returned and will again. The stock market turned upward in early 1930, returning to early 1929 levels by April and this was still almost 30% below the peak of September 1929. Together and business spent more in the first half of 1930 than in the period of the previous year. On the other hand, many of whom had suffered losses in the stock market the previous year. In addition, beginning in the mid-1930s, a severe drought ravaged the agricultural heartland of the U. S, by mid-1930, interest rates had dropped to low levels, but expected deflation and the continuing reluctance of people to borrow meant that consumer spending and investment were depressed. By May 1930, automobile sales had declined to below the levels of 1928, prices in general began to decline, although wages held steady in 1930 John Maynard Keynes John Maynard Keynes, 1st Baron Keynes CB FBA, was a British economist whose ideas fundamentally changed the theory and practice of macroeconomics and the economic policies of governments. His ideas are the basis for the school of thought known as Keynesian economics and he instead argued that aggregate demand determined the overall level of economic activity and that inadequate aggregate demand could lead to prolonged periods of high unemployment. According to Keynesian economics, state intervention was necessary to moderate boom, Keynes advocated the use of fiscal and monetary policies to mitigate the adverse effects of economic recessions and depressions. He and other economists had disputed the ability of government to regulate the business cycle favorably with fiscal policy. When Time magazine included Keynes among its Most Important People of the Century in 1999, the Economist has described Keynes as Britains most famous 20th-century economist. In addition to being an economist, Keynes was a servant, a director of the Bank of England. John Maynard Keynes was born in Cambridge, Cambridgeshire and his father, John Neville Keynes, was an economist and a lecturer in moral sciences at the University of Cambridge and his mother Florence Ada Keynes a local social reformer. Keynes was the first born, and was followed by two more children – Margaret Neville Keynes in 1885 and Geoffrey Keynes in 1887, Geoffrey became a surgeon and Margaret married the Nobel Prize-winning physiologist Archibald Hill. According to the economist and biographer Robert Skidelsky, Keyness parents were loving and they remained in the same house throughout their lives, where the children were always welcome to return. Keyness mother made her childrens interests her own, and according to Skidelsky, because she could grow up with her children, they never outgrew home. In January 1889, at the age of five and a half and he quickly showed a talent for arithmetic, but his health was poor leading to several long absences. He was tutored at home by a governess, Beatrice Mackintosh, in January 1892, at eight and a half, he started as a day pupil at St Faiths preparatory school. By 1894, Keynes was top of his class and excelling at mathematics, in 1896, St Faiths headmaster, Ralph Goodchild, wrote that Keynes was head and shoulders above all the other boys in the school and was confident that Keynes could get a scholarship to Eton. In 1897, Keynes won a scholarship to Eton College, where he displayed talent in a range of subjects, particularly mathematics, classics. At Eton, Keynes experienced the first love of his life in Dan Macmillan, despite his middle-class background, Keynes mixed easily with upper-class pupils. In 1902 Keynes left Eton for Kings College, after receiving a scholarship for this to read mathematics, Alfred Marshall begged Keynes to become an economist, although Keyness own inclinations drew him towards philosophy – especially the ethical system of G. E. Moore. Keynes joined the Pitt Club and was an member of the semi-secretive Cambridge Apostles society. Like many members, Keynes retained a bond to the club after graduating, before leaving Cambridge, Keynes became the President of the Cambridge Union Society and Cambridge University Liberal Club Induced demand, or latent demand, is the phenomenon that after supply increases, more of a good is consumed. This phenomenon, called induced traffic, is a factor to urban sprawl. The inverse effect, or reduced demand, is true Latent demand has been recognised by road traffic professionals for many decades, and was initially referred to as traffic generation. In the simplest terms, latent demand is demand that exists, once additional capacity is added to the network, the demand that had been latent materializes as actual usage. In New York, it was seen in the highway-building program of Robert Moses. Similarly, the building of the Brooklyn-Battery Tunnel failed to ease congestion on the Queens-Midtown Tunnel, J. J. Leeming, a British road-traffic engineer and county surveyor between 1924 and 1964, described the phenomenon in his 1969 book, Road Accidents, Prevent or Punish. Leeming went on to give an example of the effect following the opening of the Doncaster Bypass section of the A1 in 1961. By 1998, Donald Chen quoted the British Transport Minister as saying The fact of the matter is that we cannot tackle our traffic problem by building more roads. An aphorism among some traffic engineers is Trying to cure traffic congestion by adding more capacity is like trying to cure obesity by loosening your belt. According to city planner Jeff Speck, the text on induced demand is the 1993 book The Elephant in the Bedroom, Automobile Dependence and Denial, written by Stanley I. Hart. In fact, this is one of the key justifications for construction of new road capacity, a change in the cost of travel results in a change in the quantity consumed. This can be explained using the supply and demand theory. For roads or highways, the supply relates to capacity and the quantity consumed refers to vehicle-kilometres travelled, the size of the increase in quantity consumed depends on the elasticity of demand. A review of research suggests that the elasticity of traffic demand with respect to travel time is around −0.5 in the short-term. This indicates that a 1. 0% saving in time will generate an additional 0. 5% increase in traffic within the first year. In the longer-term, a 1. 0% saving in time will result in a 1. 0% increase in traffic volume. In the short term, increased travel on new road space can come from one of two sources, diverted travel and induced traffic, diverted travel occurs when people divert their trip from another road or retime their travel. Induced traffic occurs when new automobile trips are generated and this can occur when people choose to travel by car instead of public transport, or decide to travel when they otherwise would not have
<urn:uuid:3717ad2a-25b5-45bc-9012-4fc8af90ca49>
CC-MAIN-2019-18
https://wikivisually.com/wiki/Effective_demand
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.964195
5,590
3.0625
3
- slide 1 of 3 Verbal communication is often one of the issues that those on the autism spectrum live with daily. It doesn't mean they are ignoring you or that there are physical problems with the ears or physical items linked with oral communication. What it does mean is that you need to try something besides talking if you want to communicate with the individual who has autistic communication issues. Don't give up help on verbal communication, just understand that there may be other steps you need to take before you can assist the autistic individual in verbalizing their thoughts. - slide 2 of 3 Try a Digital Conversation with a PC Thankfully, technology can help us with these issues. A minimal requirement would be to have a computer of some sort. If you feel you aren't ready for that step yet, then try some of the Leap pad programs for young learners. These programs are such that the individual takes an electronic pencil and presses on a picture in the book. The book then says the name of the picture. In this way, your child can begin to understand the sounds that are equated with the pictures. On way to be sure that you are using the right technology is to have open communication with your health care provider. They can tell you what kind of tools will be beneficial to the autistic learner. Working with health care providers and educators can be very helpful when using new technology. However, make sure to do your own research and make it possible for you to present ideas to those involved with the autistic child. - slide 3 of 3 Things to Consider Here are some things to consider when using technology to assist with communication in autism. - Flickering screens. It is found that some students with autism are irritated or otherwise bothered by flickering screens. Keep this in mind if you plan to use a computer as laptops don't seem to have the flickering problem that some other screens may have. - Motor skills. Some autistic students have problems with their motor skills and may need to have hardware that makes it easier for them to use the computer. Such hardware may include trackballs, switches and touch screens. - Simple software. Autistic students may be distracted by certain sounds. They may focus on those sounds and forget why they are actually using the program. This may lead to the autistic student doing things like repeatedly hitting an answer to get the response they are enjoying. If this seems like a likely situation then you may want to research software to avoid these issues. - Irritation by sounds. Some sounds irritate some autistic students. Check the program you want to use to see if these sounds are used. You want to avoid these to obtain optimum results. These are just some of the items offered along with some things that should be considered when purchasing hardware and software to assist in dealing with autism. Autism Communication Resources: Computers and Technology Worried about communicating with an autistic child? Though autism affects the communication skills of the autistic person, techniques have developed to adapt to this issue. This series explores some of the communication issues faced as well as providing tips on overcoming some of these issues
<urn:uuid:4cc3dbd5-e411-46f4-886d-c42948697c13>
CC-MAIN-2019-18
https://www.brighthubeducation.com/special-ed-neurological-disorders/28624-technology-to-improve-communication-in-students-with-autism/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.9631
631
3.484375
3
Elephant Avoids Poachers & Makes it to her Golden Years It is not often in this day and age of rampant poaching that one finds an elephant having died of old age. But that is exactly what the BHAPU (Bumi Hills Anti-Poaching Unit) rangers found on patrol recently. A previously known elephant carcass, probably an old female, most likely to have been a herd matriarch, was initially found in December 2015. Her carcass, which was submerged under a stream in which she had died – was largely inaccessible then, so was revisited now with the lower water levels. The lower jawbone (which is routinely collected by field staff for aging research criteria) showed, remarkably, that this elephant had lived a full and long life – thus escaping the ravages of poaching. Elephants have six sets of molars during their lifetimes, each erupting at a particular age and wearing down at a particular rate. These six teeth (all molars) are situated in each side of the upper and lower jaws, but only two sets are in use at any one time. As an elephant grows older, the molars move forward in the jaw and eventually the one at the front breaks off in sections and falls out. Often, pieces break off the front of this tooth before it falls out. As the teeth move forward, another molar is erupting at the back of the tooth row. Each new tooth is larger than the one before it. The photos above show her peaceful resting place, the team examining the area and the lower jaw and what remains of the sixth molar, which is well and truly worn down to gum level literally. It can also been seen that there is no other tooth erupting behind it. And so she ended her long life and one cannot help but wonder what she had seen and experienced during her long life…
<urn:uuid:d9d1a1be-ffd9-46e8-98ae-4b16d377612e>
CC-MAIN-2019-18
https://www.bumihillsfoundation.org/elephant-avoids-poachers/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.984624
387
3.234375
3
- Low sound level - Low height - No vibration transmission - FRP Casing, free of maintenance and corrosion - Internals fully made in plastic materials - Modular design - Integrated frame support - Epoxi coated fans Cooling towers bring a cold and dry air mass in counter-flow to hot water that comes from an industrial or air conditioning process. Part of this water evaporates, cooling the rest. The necessary heat for this is approx.597 Kcal/liter. The cold water produced is returned into the process to re-initiate the cycle. The equipment with this evaporative refrigeration principle are very important for energy efficiency in industrial processes. The difference between the required cold water temperature and the wet bulb temperature (called cooling limit distance), is significant to determine the size of the tower. The smaller the cooling distance is, the bigger the interchanging surface is needed. The limit distance must be of at least 3-4º C. In open cooling towers there is a close contact water-air, which is bigger thanks to the fill packings, that provide a big surface of exchange, and allow towers to be smaller.
<urn:uuid:15cff502-118a-4c87-99b7-102f51925ff0>
CC-MAIN-2019-18
https://www.ewk.eu/index.php/producto/en/ewk-d
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.917526
240
3.21875
3
Principles of Fire Behavior and Combustion, 4th Edition $113.95 Sale Price Based on the National Fire Academy's Fire Behavior and Combustion model curriculum. Without a comprehensive grasp of how fires start and spread, informed decisions on how to best control and extinguish fires can not be made. Principles of Fire Behavior and Combustion, Fourth Edition will provide readers with a thorough More » Based on the National Fire Academy's Fire Behavior and Combustion model curriculum. Without a comprehensive grasp of how fires start and spread, informed decisions on how to best control and extinguish fires can not be made. Principles of Fire Behavior and Combustion, Fourth Edition will provide readers with a thorough understanding of the chemical and physical properties of flammable materials and fire, the combustion process, and the latest in suppression and extinguishment. The Fourth Edition of this time-tested resource is the most current and accurate source of fire behavior information available to fire science students and on-the-job fire fighters today. Principles of Fire Behavior and Combustion, Fourth Edition features: - Complete coverage of the National Fire Academy's Fire and Emergency Services Higher Education (FESHE) Fire Behavior and Combustion model curriculum. - A clear, reader-friendly style to help simplify even the most challenging subject matter. - Practice problems incorporated throughout the text to help bridge the gap between theory and application on the fireground. Table of Contents Chapter 1 Fire Measurement and the SI System of Units Chapter 2 Chemical Elements and Compounds: Atoms and Molecules Chapter 3 Physical and Chemical Change Chapter 4 Flow of Fluids Chapter 5 Heat Transfer Chapter 6 Combustion, Fire and Flammability Chapter 7 Fire Characteristics: Gaseous Combustibles Chapter 8 Fire Characteristics: Liquid Combustibles Chapter 9 Fire Characteristics: Solid Combustibles Chapter 10 Combustion Products Chapter 11 Smoke and Heat Hazards Chapter 12 Movement of Fire Gases Chapter 13 Fire Fighting Chemicals Chapter 14 Computational Modeling of Fire Firefighters Bookstore Item # 1855 How to extinguish a fire depends largely on the source of the blaze and the surrounding materials and substances that influence its spread. In your career as a firefighter, you are likely to encounter fires that are influenced by numerous variables. That is why it is important to be familiar with the pages of Principles of Fire Behavior and Combustion, 4th Edition, a comprehensive learning resource that focuses on fire behavior and combustion and principles of fire behavior. Trusted Source Material Much of the material in Principles of Fire Behavior and Combustion, 4th Edition is based on the National Fire Academy's Fire Behavior and Combustion model curriculum. Created from years of firefighting research and experience, material from this model curriculum comprises some of the most respected knowledge in the field of firefighting. The information you take from the text can be directly applied to training operations and fighting real fires that burn out of control. The text covers everything you need to know about the behavior and combustion of fires including flow of fluids, heat transfer, fire characteristics of gaseous combustibles, fire characteristics of liquid combustibles, and fire characteristics of solid combustibles—to name a few. Once you have a firm grasp of the information in the text, you will be prepared to fight practically any type of fire regardless of its source and the conditions that allow it to burn. Life Saving Tactics Knowing how to diagnose fires in terms of behavior and combustion makes you a more efficient firefighter. Proposing a plan of action quickly can be essential for preventing fatalities, and saving the building or residence from total destruction. If you were trapped in a burning building, would you want the help of firefighters who have a firm understanding of how fire behaves and combusts or the help of firefighters who don’t possess this knowledge? The answer is clear. Start Studying Today Principles of Fire Behavior and Combustion, 4th Edition is one of the most important firefighting books you can purchase. As new firefighters soon discover, not every blaze exhibits the same behavior or type of combustion. Knowing how to asses the differences between one kind of blaze and another is essential for fighting fires efficiently. If you need to learn more about how different types of fires behave and combust, order this highly regarded text from our online store today.
<urn:uuid:c192e5f8-663c-4826-ba59-a8db7a84adf3>
CC-MAIN-2019-18
https://www.firebooks.com/products/principles
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.882786
901
3.078125
3
Mining and Corporate Social Responsibility: Scotbar Proprietary Limited (10 pages of text) The chief executive officer of Scotbar Proprietary Limited (Scotbar) in Queensland, Australia, decided to develop a process to convert sandstone to sand, a technique that large multinational mining companies failed to perfect. The stakes could not have been higher, with global environmental disaster looming and the world quickly depleting its reserves of construction sand, severely affecting coastal communities and destroying marine ecosystems in the process. After spending years and millions of dollars on research, Scotbar appeared to have developed a process to produce construction sand, although more expensive than natural sand. Scotbar decided not to patent its process in hopes that more companies would adopt it and thereby reduce the harmful impact of mining on the environment. Was Scotbar’s approach to sustainability through innovation an effective response to the environmental legacy of more traditional mining processes? Was the company’s approach to intellectual property appropriate in this context? This case is suitable for use in undergraduate and graduate level courses on corporate social responsibility, sustainability, or entrepreneurship. The case raises several issues related to sustainable mining, such as the balance between profit and planet, the role of regulation, and the management of intellectual property. After completion of this case, students will be able to - describe the concept of sustainability through innovation and the associated challenges of balancing profit and sustainability objectives; - explain ethical and moral theories such as the triple bottom line, and apply these to a real-life example; - outline the challenges of finding markets for new sustainable alternatives to existing unsustainable products; and - assess the role of intellectual property, including copyrights and patents, to support sustainability. Mining, Quarrying, and Oil and Gas Extraction Australia, Small, 2017 $4.25 CAD / $4.25 USD Printed Copy $3.75 CAD / $3.75 USD Permissions $3.75 CAD / $3.75 USD Digital Download
<urn:uuid:e13cd838-6261-490c-ab2a-ad702a95332d>
CC-MAIN-2019-18
https://www.iveycases.com/ProductView.aspx?id=96118
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.916453
406
2.78125
3
Kids will have fun practicing skip counting by 2s, 5s, and 10s in this FREE Printable April Math Craft for Kindergartners. FREE Printable April Math Craft We love making math fun! This spring skip counting math craft helps Kindergarten age kids practice counting by 2s, counting by 5s, and counting by 10s with a really fun skip counting activity perfect for April. Start out by printing the page (s) for the Skip Counting Kite Math Craft you want to make. There is a kite for each of the number Kindergartners typically learn to count by: counting by 10s, then counting by 5, and finally counting by 2s. Skip Counting Math Craft Have students color the kite and all the tassels to skip count by the number listed on the kite. Then, cut out the kite and colored kite tail pieces. Finally, attach a piece of yard to the back of the kite with a piece of tape and then begin attaching the kite tail pieces to skip count in order. How cute is this April Math Craft for Kindergarten? It is such great practice skip counting and makes a beautiful decoration for April too! Download April Math Craft for Kindergarten By downloading from my site you agree to the following: - This is for personal or personal classroom use only - This may NOT be sold, hosted, reproduced, or stored on any other site (including blog, Facebook, Dropbox, etc.) - Graphics Purchased and used with permission - I offer free printables to bless my readers AND to provide for my family. Your frequent visits to my blog & support purchasing through affiliates links and ads keep the lights on so to speak. Thanks you!
<urn:uuid:fe0beecc-eb55-443c-b000-4114a120465c>
CC-MAIN-2019-18
https://www.kindergartenworksheetsandgames.com/2019/03/free-printable-april-math-craft.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.935549
364
3.34375
3
Snacks. Whether it is ice cream, cookies, or cupcakes, most of us find it hard to say no to these irresistible goodies. Unfortunately, too much snacking can cause health problems in the long term because of their high sugar content. Some people have chosen artificial sweeteners, like sucralose and aspartame, to avoid sugar. In theory, it sounds like a good idea. Sucralose and aspartame appear to be a healthier option than granulated sugar, but unfortunately, these sweeteners do more harm than good. Did you know that sucralose reduces good gut bacteria, releases toxins, and links to type 2 diabetes? Did you know that aspartame is linked to at least 90 symptoms, including headaches and memory loss? There are some people who do not consume artificial sweeteners and believe that they are healthier for that reason alone. Unfortunately, most of these people are unaware of the amounts of sugar that exist in many products that they consume on a daily basis. For example, ketchup and salad dressing both have heavy amounts of sugar. For some people, condiments do not appear to raise any fears because they will argue that only small amounts of it are used. The problem is that they do not consider how often they use those condiments in their meals on a daily basis. It is even worse when these same people also indulge in the typical type of snacks like cookies, cupcakes, ice cream, and pies. Consuming large amounts of sugar on a daily basis can lead to diabetes and other health problems in the long term. So, how can a person snack in a healthier manner? Consider these healthy snacks when you have the urge to munch on something between meals. 1. Cranberries with almonds This snack choice can be prepared in seconds. Throw them both in a bowl and enjoy. Cranberries and almonds provide a great combination of nuttiness, sweetness, and crunchiness to the consumer. Almonds are high in protein and low in carbohydrates, while cranberries are high in antioxidants and low in sugar. If you are not a fan of almonds, you can substitute it with sunflower seeds. They are high in protein too. 2. Boiled eggs with coconut flakes Many people think that eggs should be reserved for breakfast. Unless you are a person who eats a lot of eggs, you might actually be open to the idea of having it as a snack. Boiled eggs are not typically appealing, especially eaten alone. However, coconut flakes really makes the difference. Adding a teaspoon of coconut flakes with each small bite makes it a tasty treat. Both eggs and coconuts are excellent sources of essential fatty acids (EFAs). Furthermore, eggs are a good source of protein (6 grams per egg), while coconuts are a source of Vitamin E, Vitamin K, and iron. 3. 100% cocoa with honey Chocolate. Almost everyone loves it. Although, many people love chocolate because of the added sugar. There is an ever-growing amount of stores that sell chocolate with higher cocoa content and less sugar. While it may be difficult, it is not impossible to find 100% cocoa. You can buy it online or from a specialty store. Cocoa is high in antioxidants, while honey has small amount of B vitamins and minerals. Honey has also been known to improve memory, boost energy, and reduce seasonal allergies. This is why I recommend honey over regular sugar. Although, I would suggest limiting the honey to one tablespoon since a tablespoon of honey equals to 12 grams of sugar. Two ounces of cocoa with a tablespoon of honey should be adequate for a snack. 4. Pumpkin seeds with sea salt When most people think of pumpkins, they think of pumpkin pie. However, there is more to a pumpkin than pie. Pumpkin seeds are a rich source of zinc, alpha-linolenic acid (a plant-based omega 3), and manganese. They have also been known to lower blood sugar levels. Often, when you buy pumpkin seeds, many of the packaged products are already salted with table salt. I would recommend buying unsalted pumpkin seeds and adding sea salt to them. Sea salt has 50+ trace minerals and is not as processed as table salt. While both salts contain iodine (a necessary mineral), table salt is heavily processed, leaving the salt without many of its initial nutrients. Granola is still one of the most popular snack foods. It is a healthier alternative to cookies, cupcakes, and ice cream. There are many granola products that can be found in dozens of grocery stores. Although, it is better to make your own granola to avoid the processed counterparts, which contain preservatives and unnatural sweeteners. It is also ideal because you get to choose which fruits, nuts and seeds that you want in your granola. Most fruits, nuts and seeds are abundant in nutrients but you still need to be mindful of the sugar content. That is why it is best to create a granola mix that is low in fructose sugar and carbohydrates. The final word I am not saying that sugar is the enemy. It is only the enemy when we eat too much of it. I am only advocating that people become more conscious about their daily consumption of it. If you want to avoid it altogether, eating more protein will dramatically reduce your sugar cravings.
<urn:uuid:453238f7-7429-4473-99e8-621d786fd49b>
CC-MAIN-2019-18
https://www.lifehack.org/325932/more-unhealthy-snacks-try-these-tasty-alternatives
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.959183
1,103
3.265625
3
Sometimes size does matter: A new study finds that the shorter your telomeres—snips of proteins and DNA at the ends of your chromosomes—the more susceptible you may be to catching a cold, according to a study published in the Journal of the American Medical Association. In a recent experiment, researchers measured telomere length in blood samples of 152 healthy people. Then the scientists deliberately tried to infect the volunteers with a common cold virus. The result: The participants with shorter telomeres in their white blood cells were more likely to become ill. While a portion of your telomere length is genetically determined, you still have the ability to impact their size. “Your lifestyle is absolutely critical in telomere length—it plays a huge role,” says David Gilley, Ph.D., a professor of medical and molecular genetics at Indiana University School of Medicine. Read on to discover how you can revitalize your telomeres—and slow down their shrinkage. - Make time to meditate. Three months of regular meditation increased levels of telomerase—an enzyme that lengthens telomeres and protects cells—according to a recent University of California study. Start with just 10 minutes a day of sitting quietly, focusing on deep belly-breathing. - Hit the gym. In a study in the Archives of Internal Medicine, scientists found that those who frequently exercise have longer telomeres than individuals who lead sedentary lifestyles. In fact, the research indicated that the exercisers were biologically 10 years younger than those who favored the couch over the gym. - Quit smoking. Cigarettes speed up the rate at which telomeres shorten, Gilley says. This isn't just important in the fight against colds: Scientists have long believed that shrinking telomeres also contribute to the aging process. If you liked this story, you'll love these:
<urn:uuid:0554d426-cbfa-4674-8620-64942e67dd9e>
CC-MAIN-2019-18
https://www.menshealth.com/health/a19518761/3-surprising-ways-to-fight-a-cold/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.946295
385
3.171875
3
- Amphibious Vehicles - Fighting Vehicles - Marine Corps Equipment - Marine Corps Vehicles - Military Vehicles - Transport Vehicles Manufacturer: United DefenseService: USMC Armament: Mk 19 40 mm grenade launcher or M242 Bushmaster 25mm gun; M2HB .50-caliber machine gun Engine: Detroit Diesel 8V-53T (P-7), Cummins VT 400 903 (P-7A1) Range: 300 miles; 20 nm in water Speed: 20 mph off-road, 45 mph surfaced road, 8 mph water Crew: 3 crew, 25 Marines From ship to shore to objective, no equipment better defines the distinction and purpose of Marine Corps expeditionary capabilities than the AAV-7 Amphibious Assault Vehicle. Designed to assault any shoreline from the well decks of Navy assault ships, AAVs are highly mobile, tracked armored amphibious vehicles that transport Marines and cargo to and through hostile territory. The AAVP7A1 is an armored assault amphibious full-tracked landing vehicle. The vehicle carries troops in water operations from ship to shore, through rough water and surf zone. It also carries troops to inland objectives after ashore. The AAV7A1 is the newest Assault Amphibian in a series that started with the Roebling ALLIGATOR. The Alligator was developed over a period of 7 years, starting in 1932. The first "Gators" were a disappointment, in that the water speed was only 2.5 mph. The land speed was 25 mph. Through design changes, and by using larger engines, the water speed of the Alligator was increased to 8.6 mph by 1939. In 1940, Roebling built a new model which was designated the CROCODILE. The Crocodile had a land speed of 25 mph and a water speed of 9.4 mph. The LVT-1 was a direct copy of the Crocodile, except that it was fabricated from sheet steel instead of aluminum. The LVT-1 was in production from 1941 to 1943. Being heavier, the land speed of the LVT-1 was 18 mph and the water speed was 7 mph. A 6-cylinder, 146 hp Hercules engine was used for power. The LVT-1 was propelled by two endless chains fitted with cleats, both in the water and on land. The first LVT-1's were used as logistic support vehicles only. They were not armored and carried no armament, however, this soon changed. At the Battle of Tarawa, bolted on armor plate was used and the vehicles were equipped with one to four 30 cal. machine guns. The second generation of LVT's was the LVT-2. This vehicle was developed in 1941 and was in production from 1942 to 1945. The LVT-2 was the basic design for a series of vehicles used during WW II. This family of vehicles included the: LVTA1, LVTA2, LVT4, LVTA4, and LVTA5. A few of the LVTA5s were modified in 1949 and continued in service until the mid 1950s. These vehicles were powered with 7-cylinder radial aircraft engines built by Continental Motors. These engines developed 220hp, their service life was very short. Major overhaul was scheduled for 100 hours, however few ever lasted that long. The transmission was a 5 speed, manual shift SPICER that incorporated a manually operated steer differential. This transmission had been developed for the M-3 light tank. As a result, the transmission was too narrow for the LVT. This problem was overcome by using four final drives. The internal finals were bolted to the transmission / differential gear case and supported by two mounting yokes. The external final drives were bolted to the hull and powered the drive sprockets. This generation of LVTs was used through the Okinawa campaign in 1945.
<urn:uuid:3d89e89a-5c27-4966-b4f9-4c92035cb91d>
CC-MAIN-2019-18
https://www.military.com/equipment/aav7-amphibious-assault-vehicle
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.978633
799
2.734375
3
Wildland Fire Assessment System (WFAS) AVARR NDVI Greenness Reference is the comprehensive source of images, data archives, and methods for handling. These images, derived from a satellite sensor, have been produced weekly since 1989, producing a historical record of vegetation phenology that can be used to characterize current vegetation greenness. They can be used to cross-reference with drought assessments and other characterizations of plant development, moisture stress, and curing. Cloud cover can have a significant impact on image quality in portions of the image. While not an estimate of live fuel moisture, spatial distribution of NDVI estimates and its climatological derivatives can provide important insight to past and current vegetative state and overall landscape flammability during the growing season. There are several depictions that allow you to evaluate the current NDVI status: - Normalized Difference Vegetation Index (ND) is the current derived value from which all the other climatological depictions are derived. - Departure from Average Greenness (DA) portrays the absolute difference between current value and the historic average greenness for the corresponding week of the year based on all years 1989-last year. - Relative Greenness (RG) portrays how green the vegetation is compared to how green it has been over the historical reference period (1989-last year). Because each pixel is normalized to its own historical range, all areas (dry to wet) can appear fully green at some time during the growing season. - Visual Greenness (VG) portrays vegetation greenness compared to a very green reference such as an alfalfa field or a golf course. The resulting image is like what you would expect to see from the air. Normally dry areas will never show as green as normally wetter areas. This image of Departure from Average Greenness is for September 12, 2011
<urn:uuid:822bd584-208a-4ada-9ce8-8ebe8bb01049>
CC-MAIN-2019-18
https://www.nwcg.gov/publications/pms437/fuel-moisture/vegetative-greenness
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00371.warc.gz
en
0.935085
376
3.1875
3
ANALYZESection: SQL Commands (7) Index Return to Main Contents NAMEANALYZE - collect statistics about a database ANALYZE [ VERBOSE ] [ table [ ( column [, ...] ) ] ] ANALYZE collects statistics about the contents of tables in the database, and stores the results in the pg_statistic system catalog. Subsequently, the query planner uses these statistics to help determine the most efficient execution plans for queries. With no parameter, ANALYZE examines every table in the current database. With a parameter, ANALYZE examines only that table. It is further possible to give a list of column names, in which case only the statistics for those columns are collected. - Enables display of progress messages. - The name (possibly schema-qualified) of a specific table to analyze. Defaults to all tables in the current database. - The name of a specific column to analyze. Defaults to all columns. In the default PostgreSQL configuration, in the documentation takes care of automatic analyzing of tables when they are first loaded with data, and as they change throughout regular operation. When autovacuum is disabled, it is a good idea to run ANALYZE periodically, or just after making major changes in the contents of a table. Accurate statistics will help the planner to choose the most appropriate query plan, and thereby improve the speed of query processing. A common strategy is to run VACUUM [vacuum(7)] and ANALYZE once a day during a low-usage time of day. ANALYZE requires only a read lock on the target table, so it can run in parallel with other activity on the table. The statistics collected by ANALYZE usually include a list of some of the most common values in each column and a histogram showing the approximate data distribution in each column. One or both of these can be omitted if ANALYZE deems them uninteresting (for example, in a unique-key column, there are no common values) or if the column data type does not support the appropriate operators. There is more information about the statistics in in the documentation. For large tables, ANALYZE takes a random sample of the table contents, rather than examining every row. This allows even very large tables to be analyzed in a small amount of time. Note, however, that the statistics are only approximate, and will change slightly each time ANALYZE is run, even if the actual table contents did not change. This might result in small changes in the planner's estimated costs shown by EXPLAIN [explain(7)]. In rare situations, this non-determinism will cause the planner's choices of query plans to change after ANALYZE is run. To avoid this, raise the amount of statistics collected by ANALYZE, as described below. The extent of analysis can be controlled by adjusting the default_statistics_target configuration variable, or on a column-by-column basis by setting the per-column statistics target with ALTER TABLE ... ALTER COLUMN ... SET STATISTICS (see ALTER TABLE [alter_table(7)]). The target value sets the maximum number of entries in the most-common-value list and the maximum number of bins in the histogram. The default target value is 100, but this can be adjusted up or down to trade off accuracy of planner estimates against the time taken for ANALYZE and the amount of space occupied in pg_statistic. In particular, setting the statistics target to zero disables collection of statistics for that column. It might be useful to do that for columns that are never used as part of the WHERE, GROUP BY, or ORDER BY clauses of queries, since the planner will have no use for statistics on such columns. The largest statistics target among the columns being analyzed determines the number of table rows sampled to prepare the statistics. Increasing the target causes a proportional increase in the time and space needed to do ANALYZE. SEE ALSOVACUUM [vacuum(7)], vacuumdb [vacuumdb(1)], in the documentation, in the documentation This document was created by man2html, using the manual pages. Time: 05:34:14 GMT, December 24, 2015
<urn:uuid:3449d998-c991-4216-9d19-5b793ffe4eb0>
CC-MAIN-2019-18
http://4e00.com/manpages/man7/analyze.7.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.874664
903
2.515625
3
Symbiosis (from Ancient Greek sýn "with" and bíōsis "living") is close and often long-term interaction between different biological species. In 1877 Bennett used the word symbiosis (which previously had been used of people living together in community) to describe the mutualistic relationship in lichens. In 1879, by the German mycologist Heinrich Anton de Bary, defined it as "the living together of unlike organisms." The definition of symbiosis is controversial among scientists. Some believe symbiosis should only refer to persistent mutualisms, while others believe it should apply to all types of persistent biological interactions (i.e. mutualistic, commensalistic, or parasitic). Some symbiotic relationships are obligate, meaning that both symbionts entirely depend on each other for survival. For example, many lichens consist of fungal and photosynthetic symbionts that cannot live on their own. Others are facultative, meaning that they can, but do not have to live with the other organism. Symbiotic relationships include those associations in which one organism lives on another (ectosymbiosis, such as mistletoe), or where one partner lives inside the other (endosymbiosis, such as lactobacilli and other bacteria in humans or zooxanthelles in corals). Endosymbiosis is any symbiotic relationship in which one symbiont lives within the tissues of the other, either in the intracellular space or extracellularly. Examples are rhizobia, nitrogen-fixing bacteria that live in root nodules on legume roots; actinomycete nitrogen-fixing bacteria called Frankia, which live in alder tree root nodules; single-celled algae inside reef-building corals; and bacterial endosymbionts that provide essential nutrients to about 10%–15% of insects. Ectosymbiosis, also referred to as exosymbiosis, is any symbiotic relationship in which the symbiont lives on the body surface of the host, including the inner surface of the digestive tract or the ducts of exocrine glands. Examples of this include ectoparasites such as lice, commensal ectosymbionts such as the barnacles that attach themselves to the jaw of baleen whales, and mutualist ectosymbionts such as cleaner fish. Mutualism is any relationship between individuals of different species where both individuals derive a benefit. Generally, only lifelong interactions involving close physical and biochemical contact can properly be considered symbiotic. Mutualistic relationships may be either obligate for both species, obligate for one but facultative for the other, or facultative for both. Many biologists restrict the definition of symbiosis to close mutualist relationships. A large percentage of herbivores have mutualistic gut fauna that help them digest plant matter, which is more difficult to digest than animal prey. Coral reefs are the result of mutualisms between coral organisms and various types of algae that live inside them. Most land plants and land ecosystems rely on mutualisms between the plants, which fix carbon from the air, and mycorrhyzal fungi, which help in extracting minerals from the ground. An example of mutual symbiosis is the relationship between the ocellaris clownfish that dwell among the tentacles of Ritteri sea anemones. The territorial fish protects the anemone from anemone-eating fish, and in turn the stinging tentacles of the anemone protect the clownfish from its predators. A special mucus on the clownfish protects it from the stinging tentacles. Another example is the goby fish, which sometimes lives together with a shrimp. The shrimp digs and cleans up a burrow in the sand in which both the shrimp and the goby fish live. The shrimp is almost blind, leaving it vulnerable to predators when above ground. In case of danger the goby fish touches the shrimp with its tail to warn it. When that happens both the shrimp and goby fish quickly retreat into the burrow. One of the most spectacular examples of obligate mutualism is between the siboglinid tube worms and symbiotic bacteria that live at hydrothermal vents and cold seeps. The worm has no digestive tract and is wholly reliant on its internal symbionts for nutrition. The bacteria oxidize either hydrogen sulfide or methane which the host supplies to them. These worms were discovered in the late 1980s at the hydrothermal vents near the Galapagos Islands and have since been found at deep-sea hydrothermal vents and cold seeps in all of the world's oceans. There are also many types of tropical and sub-tropical ants that have evolved very complex relationships with certain tree species. Commensalism describes a relationship between two living organisms where one benefits and the other is not significantly harmed or helped. It is derived from the English word commensal used of human social interaction. The word derives from the medieval Latin word, formed from com- and mensa, meaning "sharing a table". Commensal relationships may involve one organism using another for transportation (phoresy) or for housing (inquilinism), or it may also involve one organism using something another created, after its death (metabiosis). Examples of metabiosis are hermit crabs using gastropod shells to protect their bodies and spiders building their webs on plants. A parasitic relationship is one in which one member of the association benefits while the other is harmed. Parasitic symbioses take many forms, from endoparasites that live within the host's body to ectoparasites that live on its surface. In addition, parasites may be necrotrophic, which is to say they kill their host, or biotrophic, meaning they rely on their host's surviving. Biotrophic parasitism is an extremely successful mode of life. Depending on the definition used, as many as half of all animals have at least one parasitic phase in their life cycles, and it is also frequent in plants and fungi. Moreover, almost all free-living animals are host to one or more parasite taxa. An example of a biotrophic relationship would be a tick feeding on the blood of its host. Amensalism is the type of symbiotic relationship that exists where one species is inhibited or completely obliterated and one is unaffected. This type of symbiosis is relatively uncommon in rudimentary reference texts, but is omnipresent in the natural world. An example is a sapling growing under the shadow of a mature tree. The mature tree can begin to rob the sapling of necessary sunlight and, if the mature tree is very large, it can take up rainwater and deplete soil nutrients. Throughout the process the mature tree is unaffected. Indeed, if the sapling dies, the mature tree gains nutrients from the decaying sapling. Note that these nutrients become available because of the sapling's decomposition, rather than from the living sapling, which would be a case of parasitism. Symbiosis and evolution While historically, symbiosis has received less attention than other interactions such as predation or competition, it is increasingly recognized as an important selective force behind evolution, with many species having a long history of interdependent co-evolution. In fact, the evolution of all eukaryotes (plants, animals, fungi, and protists) is believed under the endosymbiotic theory to have resulted from a symbiosis between various sorts of bacteria. The biologist Lynn Margulis, famous for her work on endosymbiosis, contends that symbiosis is a major driving force behind evolution. She considers Darwin's notion of evolution, driven by competition, to be incomplete and claims that evolution is strongly based on co-operation, interaction, and mutual dependence among organisms. According to Margulis and Dorion Sagan, "Life did not take over the globe by combat, but by networking." Symbiosis played a major role in the co-evolution of flowering plants and the animals that pollinate them. Many plants that are pollinated by insects, bats, or birds have highly specialized flowers modified to promote pollination by a specific pollinator that is also correspondingly adapted. The first flowering plants in the fossil record had relatively simple flowers. Adaptive speciation quickly gave rise to many diverse groups of plants, and, at the same time, corresponding speciation occurred in certain insect groups. Some groups of plants developed nectar and large sticky pollen, while insects evolved more specialized morphologies to access and collect these rich food sources. In some taxa of plants and insects the relationship has become dependent, where the plant species can only be pollinated by one species of insect. - ^ σύν, βίωσις. Liddell, Henry George; Scott, Robert; A Greek–English Lexicon at Perseus Project - ^ "symbiosis". Oxford English Dictionary. Oxford University Press. 2nd ed. 1989. - ^ a b Wilkinson 2001 - ^ Douglas 1994, p. 1 - ^ Douglas, Angela E. (2010), The symbiotic habit, New Jersey: Princeton University Press, pp. 5–12, ISBN 978-0-691-11341-8 - ^ Isaac 1992, p. 266 - ^ Saffo 1993 - ^ Douglas, Angela E. (2010), The symbiotic habit, New Jersey: Princeton University Press, p. 4, ISBN 978-0-691-11341-8 - ^ a b c d Moran 2006 - ^ a b c Ahmadjian & Paracer 2000, p. 12 - ^ Sapp 1994, p. 142 - ^ Nardon & Charles 2002 - ^ a b Ahmadjian & Paracer 2000, p. 6 - ^ Toller, Rowan & Knowlton 2001 - ^ Harrison 2005 - ^ Lee 2003 - ^ Facey, Helfman & Collette 1997 - ^ Cordes 2005 - ^ Piper, Ross (2007), Extraordinary Animals: An Encyclopedia of Curious and Unusual Animals, Greenwood Press. - ^ Nair 2005 - ^ Ahmadjian & Paracer 2000, p. 7 - ^ Townsend, Begon & Harper 1996 - ^ Wernegreen 2004 - ^ Ahmadjian & Paracer 2000, pp. 3–4 - ^ Brinkman 2002 - ^ Golding & Gupta 1995 - ^ Schüßler, A. et al. (2001), "A new fungal phlyum, the Glomeromycota: phylogeny and evolution", Mycol. Res. 105 (12): 1416, http://journals.cambridge.org/action/displayAbstract?fromPage=online&aid=95091. - ^ Sagan & Margulis 1986 - ^ Harrison 2002 - ^ Danforth & Ascher 1997 - Cheating (biology) - list of symbiotic organisms - list of symbiotic relationships - multigenomic organism - Symbiosis (chemical) - Ahmadjian, Vernon; Paracer, Surindar (2000), Symbiosis: an introduction to biological associations, Oxford [Oxfordshire]: Oxford University Press, ISBN 0-195-11806-5 - Burgess, Jeremy (1994), Forum: What's in it for me, New Scientist, http://media.newscientist.com/article/mg14119115.200-forum-whats-in-it-for-me--jeremy-burgess-examines-therole-of-cooperation-within-natures-competitive-ways-.html - Boucher, Douglas H (1988), The Biology of Mutualism: Ecology and Evolution, New York: Oxford University Press, ISBN 0195053923 - Cordes, E.E.; Arthur, M.A.; Shea, K.; Arvidson, R.S.; Fisher, C.R. (2005), "Modeling the mutualistic interactions between tubeworms and microbial consortia", PLoS Biol 3 (3): 1–10, doi:10.1371/journal.pbio.0030077, PMC 1044833, PMID 15736979, http://www.pubmedcentral.nih.gov/articlerender.fcgi?tool=pmcentrez&artid=1044833, retrieved 2007-09-23 - Brinkman, F.S.L.; Blanchard, J.L.; Cherkasov, A.; Av-gay, Y.; Brunham, R.C.; Fernandez, R.C.; Finlay, B.B.; Otto, S.P.; Ouellette, B.F.F.; Keeling, P.J.; Others, (2002), "Evidence That Plant-Like Genes in Chlamydia Species Reflect an Ancestral Relationship between Chlamydiaceae, Cyanobacteria, and the Chloroplast", Genome Research 12 (8): 1159–1167, doi:10.1101/gr.341802, PMC 186644, PMID 12176923, http://www.csa.com/partners/viewrecord.php?requester=gs&collection=ENV&recid=5449063, retrieved 2007-09-30 - Danforth, B.N.; Ascher, J. (1997), "Flowers and Insect Evolution", Science 283 (5399): 143, doi:10.1126/science.283.5399.143a, http://www.sciencemag.org/cgi/reprint/283/5399/143a.pdf, retrieved 2007-09-25 - Douglas, Angela (2010), The Symbiotic Habit, Princeton University Press, ISBN 0-19-854294-1 - Douglas, Angela (1994), Symbiotic interactions, Oxford [Oxfordshire]: Oxford University Press, ISBN 0-19-854294-1 - Facey, Douglas E.; Helfman, Gene S.; Collette, Bruce B. (1997), The diversity of fishes, Oxford: Blackwell Science, ISBN 0-86542-256-7 - Golding, RS; Gupta, RS (1995), "Protein-based phylogenies support a chimeric origin for the eukaryotic genome", Mol. Biol. Evol. 12 (1): 1–6, PMID 7877484 - Harrison, Rhett (2002), "Balanced mutual use (symbiosis)", Quarterly journal Biohistory 10 (2), https://www.brh.co.jp/en/experience/journal/32/ss_3.html, retrieved 2007-09-23 - Harrison, Maria J. (2005), "Signaling in the arbuscular mycorrhizal symbiosis", Annu. Rev. Microbiol. 59: 19–42, doi:10.1146/annurev.micro.58.030603.123749, PMID 16153162 - Lee, J. (2003), "Amphiprion percula" (On-line), Animal Diversity Web, http://animaldiversity.ummz.umich.edu/site/accounts/information/Amphiprion_percula.html, retrieved 2007-09-29 - Isaac, Susan (1992), Fungal-plant interactions, London: Chapman & Hall, ISBN 0-412-36470-0 - Isaak, Mark (2004), CB630: Evolution of obligate mutualism, TalkOrigins Archive, http://www.talkorigins.org/indexcc/CB/CB630.html, retrieved 2007-09-25 - Moran, N.A. (2006), "Symbiosis", Current Biology 16 (20): 866–871, doi:10.1016/j.cub.2006.09.019, PMID 17055966, http://linkinghub.elsevier.com/retrieve/pii/S0960982206022123, retrieved 2007-09-23 - Nardon, P.; Charles, H. (2002), "Morphological aspects of symbiosis", Symbiosis: Mechanisms and Systems. Dordercht/boson/London, Kluwer Academic Publishers 4: 15–44, doi:10.1007/0-306-48173-1_2 - Powell, Jerry (1992), "Interrelationships of yuccas and yucca moths", Trends in Ecology and Evolution 7 (1): 10–15, doi:10.1016/0169-5347(92)90191-D, PMID 21235936 - Nair, S. (2005), "Bacterial Associations: Antagonism to Symbiosis", in Ramaiah, N, Marine Microbiology: Facets & Opportunities;, National Institute of Oceanography, Goa, pp. 83–89, http://drs.nio.org/drs/handle/2264/74, retrieved 2007-10-12 - Roughgarden, J.; Gomulkiewicz; Holt; Thompson (1975), "Evolution of Marine Symbiosis--A Simple Cost-Benefit Model", Ecology 56 (5): 1201–1208, doi:10.1046/j.1420-9101.2000.00157.x, JSTOR 1936160 - Saffo, M.B. (1993), "Coming to terms with a field: Words and concepts in symbiosis", Symbiosis. 14 (1-3), http://www.csa.com/partners/viewrecord.php?requester=gs&collection=ENV&recid=3004656, retrieved 2007-10-05 - Sagan, Dorion; Margulis, Lynn (1986), Origins of sex: three billion years of genetic recombination, New Haven, Conn: Yale University Press, ISBN 0-300-03340-0 - Sagan, Dorion; Margulis, Lynn (1997), Microcosmos: Four Billion Years of Evolution from Our Microbial Ancestors, Berkeley: University of California Press, ISBN 0-520-21064-6 - Sapp, Jan (1994), Evolution by association: a history of symbiosis, Oxford [Oxfordshire]: Oxford University Press, ISBN 0-19-508821-2 - Sapp, Jan (2009), The New Foundations of Evolution. On the Tree of Life, New York: Oxford University Press - Toller, W. W.; Rowan, R.; Knowlton, N. (2001), "Repopulation of Zooxanthellae in the Caribbean Corals Montastraea annularis and M. faveolata following Experimental and Disease-Associated Bleaching", The Biological Bulletin (Marine Biological Laboratory) 201 (3): 360–373, doi:10.2307/1543614, JSTOR 1543614, PMID 11751248, http://www.biolbull.org/cgi/content/full/201/3/360 - Townsend, Colin R; Begon, Michael; Harper, John D. (1996), Ecology: individuals, populations and communities, Oxford: Blackwell Science, ISBN 0-632-03801-2 - Weiblen, G.D. (2002), "How to be a fig wasp", Annual Review of Entomology 47 (1): 299–330, doi:10.1146/annurev.ento.47.091201.145213, PMID 11729077 - Wernegreen, J.J. (2004), "Endosymbiosis: lessons in conflict resolution", PLoS Biology 2 (3): e68, doi:10.1371/journal.pbio.0020068, PMC 368163, PMID 15024418 Inter-species biological interactions in ecology Wikimedia Foundation. 2010. Look at other dictionaries: Symbiosis — Sym bi*o sis, n. [NL., fr. Gr. symbi wsis a living together, symbioy^n to live together; sy n with + ? to live.] (Biol.) The living together in more or less imitative association or even close union of two dissimilar organisms. In a broad sense… … The Collaborative International Dictionary of English symbiosis — 1877, as a biological term, mutually beneficial association of two different organisms, from Mod.L., from Gk. symbiosis a living together, from symbioun live together, from symbios (one) living together (with another), partner, from syn together… … Etymology dictionary symbiosis — [sim΄bī ō′sis, sim΄bēō′sis] n. [ModL < Gr symbiōsis < symbioun, to live together < syn , together + bios, life: see BIO ] 1. Biol. the intimate living together of two kinds of organisms, esp. if such association is of mutual advantage:… … English World dictionary symbiosis — symbiosis. См. симбиоз. (Источник: «Англо русский толковый словарь генетических терминов». Арефьев В.А., Лисовенко Л.А., Москва: Изд во ВНИРО, 1995 г.) … Молекулярная биология и генетика. Толковый словарь. symbiosis — index coalescence Burton s Legal Thesaurus. William C. Burton. 2006 … Law dictionary symbiosis — ► NOUN (pl. symbioses) Biology ▪ interaction between two different organisms living in close physical association, especially to the advantage of both. DERIVATIVES symbiotic adjective. ORIGIN Greek sumbi sis , from sumbioun live together … English terms dictionary symbiosis — [[t]sɪ̱mbio͟ʊsɪs, baɪ [/t]] 1) N UNCOUNT Symbiosis is a close relationship between two organisms of different kinds which benefits both organisms. [TECHNICAL] ...the link between bacteria, symbiosis, and the evolution of plants and animals. 2) N… … English dictionary symbiosis — noun (plural symbioses) Etymology: New Latin, from German Symbiose, from Greek symbiōsis state of living together, from symbioun to live together, from symbios living together, from syn + bios life more at quick Date: 1622 1. the living together… … New Collegiate Dictionary Symbiosis — Symbiose Pour les articles homonymes, voir symbiose (homonymie). Association symbiotique d une bactérie et de l aulne dans un nodule f … Wikipédia en Français symbiosis — n. [Gr. symbiosis, life together] 1. The mutually beneficial living together of individuals of two different species. 2. Interrelationship of different species of organisms, ranging from beneficial, to neutral, to dehabilitating; symbiotic a; see … Dictionary of invertebrate zoology
<urn:uuid:dd69b0b1-8f60-4e78-9d42-8cbf069f049e>
CC-MAIN-2019-18
http://enacademic.com/dic.nsf/enwiki/24879
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.76532
5,021
3.890625
4
CONQUEST AND RESISTANCE ENGLAND 1066 TO 1088 CONQUEST AND RESISTANCE ENGLAND 1066 TO 1088 Everyone in England knows the date 1066, for in that year England changed forever. Most will connect 1066 with the Battle of Hastings, but Hastings was the culmination of a series of major events that had taken place that year. When the saintly and childless King Edward died the king's council, the Witan, gathered to elect a new king. Finding no suitable member of the Royal Family, they decided to make Harold Godwinson, Earl of Wessex, the new king. Of Danish Royal blood through his mother, he had in fact been effectively running the kingdom for several years. Under his care England had prospered. Harold faced a challenge to his new throne from the Norwegian king Harald Hardrada, who claimed to be Christendom's best warrior. Harald invaded the north of England with a fleet of 360 longships manned by men from all over the Viking world. After defeating the local army at Fulford, he took York. King Harold Godwinson marched 200 miles in six days, caught the Viking army off guard and killed Hardrada and most of his men. The English victory was such, that only 24 longships were needed to get the Viking survivors home. Whilst celebrating the victory feast news was given to King Harold that another challenger had landed, Duke William the Bastard of Normandy. Harold gathered the remnants of his army and rapidly marched south to meet the new threat. Outside Hastings, blocking the strategic roads to the main city of the realm, London, and Winchester, where the treasury was, and with reinforcements still arriving, the English army was defeated. King Harold died and with him fell his household troops and the flower of the English nobility. The impression of many people, especially those not of English birth, and including a surprising number of history academics, is that that was that, having lost their king, most of the nobility and the best fighting men, the English then stopped resisting the Norman's and that the Conquest, as such, took effect immediately King Harold died. Nothing could be further from the truth. From the rear guard action at the Battle of Hastings, know as the Fight at the Fosse, where Norman casualties were higher than even those of the main battle, to the final quenching of resistance some twenty years later, the Normans knew little peace from their English subjects. Indeed has it ever ended? Those who know the English class system with its continuous snipping would say that the struggle against the 'Norman Yoke' continues to this day. After Hastings William advanced on London by a circular route that started via Kent, burning a ring of fire around the country's main city. The advance was resisted and met much armed resistance. Meanwhile the Witan had proclaimed as king the young Edgar Æþeling, last scion of the old Wessex royal line. William moved towards London to enforce his will before the remaining English nobility were able to regroup around Edgar and start an organised resistance. Indeed an attempt to secure the southern approach to London Bridge by part of his army had failed at Southwark. As a result of this and William's problems with the local populace resistance to his foraging parties, that he was forced to take a considerable detour to Wallingford, well west of London, before he could find a safe and defensible place to cross the Thames. Even then it was uncertain what the reaction of the Londoners would be to his army. London, upon the advice of Aldred, Archbishop of York, and Earl Morcar of Northumberland together with his brother Edwin, Earl of Mercia, submitted. Even so there was an armed skirmish, which resulted in the massacre of many Londoners. William's coronation was on midwinter's day, and shortly after he returned to Normandy taking the surviving English nobles with him. The English resistance first showed itself, not in armed defiance, but in stubbornness, when the monks at Peterborough not only elected one of their own to replace the recently deceased abbot, but sought out Edgar Æþeling, whom they declared was the true king, to approve the appointment. William was not amused and sent armed men to display his wroth. Fortunately William was always gold hungry and allowed himself to be bought off with a hefty fine. But the real trouble in 1067, was brewing in the hilly Marcher land of the Welsh border. Here two Norman Earls who belonged to families settled in the area during the reign of King Edward the Confessor, used the confusion caused by William's seizing of the throne, to extend their land holdings at the expense of the local English thanes. They attacked those lands held by Edric, soon to become known as 'the Wild'. This Edric is thought by many to be the Edric the Steersman who commanded the Channel fleet in 1066. There was already bad blood between Edric and his Norman neighbours and now it exploded into open warfare. In revenge for raids on his land Edric, in alliance with two Welsh princes, Bleððyn and Rhiwallon, devastated Herefordshire and eventually sacked Hereford itself, before retreating back into the hills ahead of the new king's revengeful army. Meantime, King Harold's mother, Gytha encouraged the people of Devon to rise up and William had major problems subduing them, especially in retaking the city of Exeter. At the same time, the other main claimant to the English throne, Edgar Æþeling, had escaped the Norman king's clutches and gone to Scotland with his family and a large number of important men. The south was also restive and later in the year, the men of Dover invited Eustace of Boulogne to help them in their insurrection. This uprising was soon put down without the presence of King William himself. The people of the north were also chafing under Norman rule. William advanced upon them with his army, burning and laying waste as he went, The men of Northumberland lacked the confidence to take part in a battle and either submitted or fled into Scotland to join the other refugees there. In the autumn two of King Harold's sons, who had gone to the Norse east coast of Ireland, came and raided the west country, where the Celtic Cornishmen joined them in arms. They plundered and ravished the countryside to such an extent that eventually even the English lost patience and joined with local Norman garrisons to expel them. In the following year of 1068, King William appointed a certain Robert de Comines, Earl of Northumberland, without asking the locals if they would accept him instead of the English Earl Morcar. The result was that the men of Northumberland massacred Robert and 900 of his men whilst they were staying in the city of Durham. Edgar Æþeling took advantage of this and came from Scotland and received the men of Northumberland at York. William moved up fast from the south and surprised the Northumbrians. Hundreds were slain and the city torched. 1069 and Harold's sons were back, raiding the west country again. Unfortunately for them they met defeat at the hands of Earl Brian of Penthievre, and fled back to Ireland. At the same time Edric the Wild and his Welsh allies had broken out from their Marcher hills and took Shrewsbury before moving on to Chester. William had to leave them to their own devices as he had his hand's full dealing with an uprising in Northumberland lead by Morcar and his brother Edwin supported by the Danish king, Swein Esthrithson, who also had a claim to the English throne. Fighting alongside them were the Earls Waltheof and Gospatrick, together with Edgar Æþeling. The Normans in York were slaughtered, with Earl Waltheof's exploit of slaying a hundred Frenchmen with his long-axe as they tried to escape through a gate, ending up in heroic verse. William moved north again laying waste as he went. The Danes took to their ships and commenced raiding the east coast, seeking assistance from their relations in the Danelaw part of England, which included the marshy wetlands of the Fens, where other trouble was brewing. William left part of his army to watch them whilst he crossed the Pennine hills to face the threat posed by Edric and the Welsh princes, who now had a formidable army bolstered by the men of Cheshire and Staffordshire. William rode with his men and joined Earl Brian, who had marched up from the West Country after beating Harold's sons. Edric became wary and withdrew to the hills with his Herefordshire and Shropshire men. The Welsh, with the remaining English, marched on and were defeated at the battle of Stafford. William then devastated the land about and laid it waste. A further revolt in the West Country, that seemed to be aimed at individual Normans, fizzled out in the face of forces drawn from London and the south east and through internal dissent amongst the insurgents. William now dealt with the Northumberland problem, a problem that had grown with the stepping up of revolt in the Fens lead by a local landholder, Hereward the Wake. After a hard march north along a route determined by violent resistance, broken bridges and swollen rivers, William took and re-entered York without a fight. The Danes had fled and the men of Northumberland, dispirited by William's ability to advance despite the hazards set before him by both nature and English, fled into the hills, pursued by King William's men. With grim determination, William's army set about destroying homes and crops, and extinguishing all human and animal life from the Humber to the Wash. Those that avoided violent death died from exposure or starvation. The bloodletting didn't stop William from celebrating Christmas at York, complete with a feast served on silver plate especially brought up from Winchester. Christmas over, William chased the men of Tees around the Cleveland hills. William's harrowing of the north had its effect on the leaders of the northern rebellion, as Waltheof and Gospatrick both came to an accommodation with him. The king made his way back to York in atrocious conditions, seeking bands of Englishmen as he went, and suffering heavy losses of men in the process. Here he re-erected the castles the Anglo-Norse had burned down and re-garrisoned them. He was now able to turn his attention to Chester, which was defiantly refusing to recognise him. Chester was at the northern extremity of the Welsh Marches and at the same time offered access to the Norse based in Ireland, should they decide to help their relations living in Cumberland. In January 1070, a Norman army set off across the Pennines in bad weather through land that offered them no sustenance as they themselves had laid it waste. William's army suffered badly in the hills to both weather and English attacks. The men, who were mainly mercenaries from the northern provinces of France, mutinied, so he abandoned them to their fate. With a reduced force consisting of only Normans, he arrived at Chester, and it submitted without a fight. He then busied himself building castles to hold the north down. He also spent money on buying the Danes, under their leader, Jarl Osbjorn, off with a large Danegeld. The revolt in the Fens, lead by Hereward, had been strengthened by refugees from the harrowing of Northumberland, including Earl Morcar. At the same time Osbjorn taking the bribe had weakened it. However, whilst his brother, Jarl Osbjorn, and his fleet had been bought off, King Swein of Denmark and his new fleet hadn't! What happened during the years 1070 and 1071 is as much legend as recorded fact. We know that William made at least two unsuccessful attempts, either in person, or through a lieutenant, to take the Isle of Ely where Hereward and his forces were based. We also know that Hereward kept his Danish allies paid by allowing them to sack Peterborough and its Cathedral, now controlled by a Norman Abbot. What we do not know are the exact happenings, or the sequence of events. Eventually Swein, perhaps seeing himself in a no win situation, allowed himself to be bought off. The Normans took later Ely after local monks betrayed secret causeways through the Fens that would allow an army access to the Isle. Although Ely fell in 1071, Hereward escaped and, with a band of followers, remained a thorn in King William's side for many years to come. 1072 and the trouble came from the Scots with their numbers swelled by many English, including Edgar Æþeling. William took an army across the border and confronted Malcolm King of Scots at Abernethy. Malcolm accepted the inevitable and made peace. By 1073, William felt that at last he had conquered England. Just as well, as his French subjects in Maine were revolting. The army that William took with him to bring his French subjects to heel was largely English. These Englishmen showed that they had watched their Norman masters well, for they devastated Maine in the same manner as the Normans had Cheshire and Northumberland. But, apart from some banditry, England was quietly brooding both that year and the following. The storm broke in 1075 with the "Revolt of the Earls. The two Earls were both half English and half French, and both had supported William in his claim for the throne in 1066. Ralf, Earl of East Anglia, was English on his father's side and had been born in Norfolk, but grew up in Brittany. Roger, Earl of Hereford, English on his mother's side and born in Hereford, was Ralf's brother-in-law. They plotted to bring in Danish support, they also tried to bring in both Edric the Wild and Earl Waltheof. Waltheof declined to be involved in the plot, but also declined to betray them. If successful, the simultaneous rising of the Earls would have cut England in two. Somehow the timing got out of alignment and William was able to crush Roger, before dealing to Ralf. The only memorable event was the defence of Norwich by Ralf's new bride, Emma, where she withstood siege for three months after her husband had left to seek aid from the Danes. The fleet of 200 ships arrived too late to lift the siege. Of the Earls: Ralf made it to his Breton holdings to be joined by his wife, and there he continued his fight against the Normans. His punishment was losing all right to his English lands. Earl Roger was also disinherited. Unfortunately for him he had been captured and spent the rest of his life in prison. Earl Waltheof, having refused to take part in the revolt, had none-the-less to swear an oath of secrecy. Taking the advice of Lanfranc, the Archbishop of Canterbury, he revealed the whole plan to King William. At first the king accepted Waltheof's protestations of innocence but, some say on the information given to him by his niece Judith, Waltheof's wife, he later charged the Earl of Northumberland with treason and had him beheaded. The English and many Normans were aghast at the execution. Soon miracles were reported at Waltheof's tomb and it rapidly became a place of pilgrimage. Many contemporaries said that King William's luck changed from then onwards as a result of Divine judgment. William's troubles were now mostly in France or the borders with Scotland whence Malcolm and his English supporters came to raid. The Welsh too were a cause for concern. The only major problems from the English came in 1080, when the men of Gateshead slew the Bishop of Durham and a hundred Frenchmen, and 1086 when Edgar Æþeling was again in revolt. But to the very end of his reign, the following year, William was threatened by the Danes, who knew that any landing they made on the East Anglian or Northumberland coasts would find support from their relatives in the Danelaw. Even during those later years, when it seemed that the English were getting used to having Norman masters, things were not that peaceful. Evidence of this is the Murdrum fine. Because of the high rate of homicide being suffered by the Normans and their French allies, King William legislated that all Frenchmen who settled in England after the invasion were to be in the king's peace and therefore he was their protector in an alien land. Its introduction was recognised at the time as being necessary due to the hatred of the Normans by the English and their attacks on them. The fine was a high one of 46 Marks. The sum was to be paid by the lord of the dead man to the Crown if the perpetrator was not hastily caught. If the killer could not reimburse the victim's lord, then the Hundred where the crime had been committed had to. In view of the strength and longevity of the English resistance to the Norman Conquest, why did it fail? A vital element was King William's determination and immense energy that saw him going from one end of the country to the other, fighting the flames of resistance and stamping on the smoldering embers of resentment. Another important element was that, once an area had been secured, castles were raised and garrisoned to keep the locals in check. But the key element was that the viable leadership of any English resistance was effectively neutralised when King Harold was killed at the Battle of Hastings. There was no king, and therefore no leadership or heart in the remaining English. Until a new king was elected, the defence of the realm devolved on the noble ealdormen - who were either dead, or recovering from Stamford Bridge or Fulford. Under the ealdormen came the king's thanes and shire-reeves (people like Edric the Wild or Hereward the Wake, Harold's son Swein or any one of a myriad other resistance leaders who remained a problem to the Normans) who did continue the fight against William in their own regions. Those English nobles who were left after the defeat on Senlac Ridge seemed to be driven solely by their own personal quest for survival, co-operating with each other on occasions, only to head off on their own agenda when it suited them. Without decisive leadership, no English army could take the field. That was advantageous to William, giving him time to recover, take London and Winchester and force the acknowledgement of his accession from the remaining members of the Witan. But it did take until 1075 until William felt confident in his control of England. Then it was the turn of Anglo-Norman barons to rebel against him, claiming a wish to return to the laws and rights of Englishmen during the rule of Edward the Confessor. And always there was the threat of Viking invasion, supported by the men of the Danelaw. Slowly the English and Normans came together through the necessity of living side by side and also through marriage. With many of the rank and file Normans, and their French colleagues, being men of small worth, they had little option, but to mix in with their English neighbours, leaving their noble masters to carry on the illusion of being truly French. But even they, with their children being raised by English nannies and their English reeves and stewards managing their estates, became first Anglo-Norman, and then English. An Anglo-Norman chronicler, Orderic Vitalis, who wrote in 1125, even applauded the continued resistance of the English to William the Bastard! Written by Geoff Boxell, author of the novel 'Woden's Wolf' which covers the period above. Sources: Ordericus Vitalis - Ecclesiastical Historii, Geoffrey Gaimer - Gesta Herwardi, William of Malmesbury - De Gestis Regum Anglorum, The Anglo-Saxon Chronicle
<urn:uuid:25dedd52-a44d-4dd1-9b0a-f005704797c9>
CC-MAIN-2019-18
http://geoffboxell.tripod.com/resist.htm
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.986641
4,152
3.609375
4
Honing machine introduction of knowledge: Honing Machine (honing machine): The use of the workpiece surface finish honing Power Honing grinder. Mainly used in automobiles, tractors, hydraulic parts, bearings, aviation and other manufacturing honing the workpiece hole. Honing machine has vertical and horizontal. Vertical honing machine spindle working stroke is shorter, for honing the cylinder and cabinet hole and so on. Inlaid with Whetstone honing head by the vertical placement of the spindle is rotated, while the hydraulic device drivers mainly as vertical reciprocating feed motion (see machine). Horizontal honing machine working stroke is longer, for honing hole depth of up to 3000 mm. Horizontal placement honing head does not rotate, only for axial reciprocating movement of the workpiece is rotated by the spindle, bed Central features supporting a workpiece support center frame and honing rod guide frame. In the process, the honing stone head in a radial expansion and contraction under the action of the feed mechanism, the workpiece machined to the desired step size. The new hydraulic honing machine honing head swelling and shrinkage. Honing machines are mostly semi-automatic, often with automatic measuring devices, but also incorporate automatic production line work. In addition to processing bore honing machine, there are other surface machining cylindrical honing machines, honing machines bearing raceway, flat honing machines and honing machines and other surfaces. DC Power Honing supply has positive and negative two electrodes , the high potential of the positive electrode , the negative electrode potential is low, when the two electrodes connected to the circuit after the circuit between the two ends to maintain a constant potential difference is formed in the external circuit to the cathode the negative electrode current. The difference between the water level alone can not maintain steady flow , while continuing to help pump water from the lower to send uphill to maintain a certain level difference can form a steady flow of water . Similarly , alone electrostatic field generated by the charge can not maintain a steady current, and DC power supply means , you can use the non-electrostatic effect ( referred to as "non- static electricity " ) to the positive charge at the cathode of the lower potential the internal power supply to return to the positive electrode at a high potential , in order to maintain the potential difference between two electrodes , thereby forming a steady current. Therefore, a DC power source is an energy conversion device , which the other forms of energy is converted to electric energy supply circuit to maintain a steady current flow. DC power in a non- static electricity is generated by the negative point cathode . When the DC power supply and the external circuit is turned on, the power supply external ( external circuit ) , as driven by the electric force , formed by the cathode to the anode current. In the internal power supply ( internal circuit ) , the role of the non- static electricity so that current flows from the negative electrode a positive electrode, so that the flow of charge to form a closed loop. Linear regulated DC power supply steady flow Performance of the power supply itself is a significant amount of power of the force characteristic , which is equal to unit charge from the negative electrode to move the positive electrode through the power supply internal work done by non- static electricity . When the power supply provides energy to the circuit when the power P is equal to the supplied power of the force E and the current I between the product , P = EI. Another feature of the amount of power to its internal resistance ( short resistance ) R0, when the current I through the power , the power loss of internal heat power ( per unit time, the Joule heat generated ) is equal R0I. When the power of the positive and negative poles is not connected , the power supply in the off (open ) state, then the power supply potential difference between two electrodes is equal in magnitude on the power of the force . In the circuit state does not occur with non- electric energy conversion. When the load resistor connected to the power poles to form a closed loop , through the internal power supply current to flow from the negative cathode , then , the power provided by the power delivered to the external circuit EI equal to the power of UI (U is the positive power supply and potential difference between the anode ) and the heat dissipated in the internal resistance of the power R0I , EI = U IR0I. Thus , when the power supply to provide power to the load resistor , the power supply potential difference between the poles U = E-R0I.
<urn:uuid:22456def-cb5a-46dd-ad83-e6fda7395318>
CC-MAIN-2019-18
http://www.superabrasives-tools.com/key-power-honing-30/new-4.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.909143
939
3.265625
3
The City of Rio de Janeiro and the World Bank launched today during the Rio+20 Summit a ground-breaking, city-level program to put into action the city’s goals for low-carbon development. Certified according to ISO standards, the Rio de Janeiro Low Carbon City Development Program will help Rio de Janeiro monitor and account for low carbon investments and climate change mitigation actions across different sectors in the city. The Program is a business model that can be applied to other cities around the world. Cities currently account for over two-thirds of the world’s energy consumption and 70 percent of global greenhouse gas emissions. This is a timely initiative as the City of Rio de Janeiro prepares for a massive influx of investment, particularly in infrastructure, ahead of the FIFA World Cup in 2014 and the Summer Olympics in Rio in 2016. The Program assists Rio in securing a low-carbon growth trajectory and respecting the city’s rich natural resources. "Rio de Janeiro is a leader in the area of climate change mitigation. We were the first Brazilian city to set concrete and bold goals to reduce greenhouse gas emissions. At the end of this year, Rio will have reduced its emissions by 8%. By 2020, this will amount to 20%. We have a large emissions inventory and, with the support of the World Bank, we are launching a transparent and reliable method to account for all of the city’s mitigation activities," said Eduardo Paes, Mayor of Rio de Janeiro. Rio de Janeiro’s target is to secure 2.3 million metric tons of emission reductions through 2020, which is the equivalent of 20 percent of the city’s 2005 emissions. The city aims to achieve this target through a variety of projects and policies across a number of urban sectors. Some of these are already underway, such as doubling the city's network of bike paths, the opening of the first of four exclusive Bus Rapid Transit (BRT) lanes, and the universalization of basic sanitation in Zona Oeste, the city's most populous area. The Rio Low Carbon City Development Program implements a framework of data collection and analysis to promote low carbon projects, as well as quantify and validate emission reductions over time. Emission reductions from the Program may be either accounted towards Rio’s targets or sold as carbon offsets. The Program includes two initial pilot projects in the areas of urban forestry and non-motorized urban transport (bicycling), and it will expand to other sectors over time. “We are honored to have Rio as one of our key partners in addressing the two mega-trends of the 21st century: urbanization and climate change,” said Hasan Tuluy, World Bank Vice President for Latin America and the Caribbean. “The ISO certification for such a comprehensive, municipal climate change program is a first-of-its-kind and turns Rio’s Low Carbon City Development Program into a business model for climate change mitigation at city-level.” Home to the world’s largest urban forest Rio de Janeiro is home to the largest urban forest worldwide (19,000 ha). The city has undertaken a vast reforestation and maintenance effort over the past 28 years, and plans to reforest up to 1,300 hectares of degraded land by 2016. The Rio Low Carbon City Development Program will quantify the carbon stored and sequestered annually in this forest using an innovative tool called iTree. Besides quantifying carbon, the tool helps value services provided by urban trees, such as reduced heating and cooling needs for buildings, removal of urban air pollution, and reduced risk of landslides, among others. In addition, the urban forestry pilot project will build local capacity in the area of forest sampling and analytics by working in partnership with the Brazilian and U.S. Forest Services, local NGOs, and the reforestation teams from the City of Rio. Promoting greener urban transport With a population of about 6 million, motorized transport accounts for almost 70 percent of trips in Rio de Janeiro and about 45 percent of the city’s total emissions. The city is implementing a public bicycle-sharing system and expanding its bicycle pathways. Alternate methods of transport will help to ease Rio’s traffic congestion and improve the safety and mobility of all residents. The Rio Low Carbon City Development Program will help to measure the emissions reduced by expanding the bike-sharing system and bicycle pathways. The Program is expected to expand to other sectors in the near future, including bus rapid transit lines, recycling policies, energy efficiency in buildings and street lighting, and others. The Rio Low Carbon City Development Program was jointly developed by the City Government of Rio de Janeiro and the World Bank, with the financial support of the World Bank Institute’s Climate Change Practice Group through its Carbon Finance-Assist Program. DNV KEMA Energy & Sustainability has confirmed the Program’s compliance with the requirements of the new Low Carbon City Development Program Assessment Protocol, which includes ISO 14064-2 and ISO 14001. The Program is managed by Rio’s City Hall, and the Rio-based Instituto Pereira Passos (IPP) will house all data related to emission reductions generated under the Program.
<urn:uuid:b4f25ea8-ff83-4488-8b37-5b6947d143f5>
CC-MAIN-2019-18
http://www.unpan.org/PublicAdministrationNews/tabid/115/mctl/ArticleView/ModuleID/1467/articleId/32120/Default.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.928015
1,068
2.875
3
Managing cancer pain This information gives information about cancer pain. There is a wide variety of safe, effective options for controlling pain. If pain is not well-managed, it can affect your ability to work, to enjoy normal activity and to relate to family and friends. Pain is an uncomfortable and unpleasant sensation and emotional experience that occurs when tissues in the body are damaged. You could experience pain for only a short period or you could have chronic pain which could impact on your quality of life. Either way it should be treated. If pain is present it could be caused by many factors. Pain can be a side effect of treatments, such as chemotherapy, radiation treatment, surgery or a medical procedure. Pain can occur because of a tumour pressing on bone, nerves or body organs. Infection can cause pain. Pain can develop from conditions unrelated to cancer, such as headaches, arthritis and muscle strain. Early treatment is always more effective. You can take the following steps as an active participant in your health care: - Do not wait to be asked about pain. The earlier you let your doctor know about it, the easier it is to treat. You are the expert – only you know how you are feeling. - Using descriptive words to describe your pain is helpful for your doctor, for example, sharp, shooting pain, aching, gnawing, or burning. - If possible, take a friend or family member to appointments. - Try rating your pain from 1 to10. - Does anything make your pain better or worse, for example, changing position, using a hot-water bottle or ice pack? - Does pain keep you awake? Keep a diary of your pain – when it begins, when it peaks, when you take medications, how much these help, and what you were doing at the time the pain occurred. - If your doctor prescribes pain medication, give the doctor or nurse feedback on whether it works. - Take your medication exactly as prescribed. - Watch out for side effects and report them to your doctor or nurse. - Common side effects include constipation, nausea and drowsiness. All of these can be managed if the doctor or nurse know about them. Tell your doctor or nurse if you are feeling anxious or depressed. Relieving anxiety and depression is an important part of controlling pain. This may be done effectively by talking with family, friends, your health care team, or a counsellor. Sometimes medication may be prescribed to relieve anxiety and depression. - For some types of pain, nerve-blocks and radiation treatment can be effective. - Complementary therapies, such as massage or relaxation techniques may relieve pain. - Specialized equipment, such as mattresses, a V-pillow, a sheepskin, a cushion or bed cradles can be helpful if you are spending a lot of time sitting or lying. Ask your nurse for advice. - Know how to reach your doctor or nurse after hours. Don’t believe these myths about pain medication - Pain medication is addictive. FALSE. People do not get high from pain medication and it is not addictive. - Pain medication will stop working if you use it for a long period of time. FALSE. If tolerance develops, your doctor can safely increase your dosage, prescribe a different drug, or use a combination of drugs. - If medication does not work right away, it will not work at all. FALSE. Everyone responds differently to different drugs, and it may take time to find the right combination. - Living with pain is a sign of strength. FALSE. If your pain is under control you will feel better. KEEP ALL MEDICATION OUT OF REACH OF CHILDREN AND OUT OF SIGHT. This information was written in October 2010 by the Cancer Society. It is reviewed every three years. For cancer information and support phone 0800 CANCER (226 237).
<urn:uuid:590967c6-8d9c-4923-8534-a9332fdd6a0c>
CC-MAIN-2019-18
https://auckland-northland.cancernz.org.nz/cancer-information/treatment/managing-cancer-pain/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.934386
812
3.140625
3
Michelin has created a concept for a tech-enabled, bio-based airless tyre that can be rebuilt according to the road surfaces conditions, providing a sustainable and safe product that the company says could last for the entire life of vehicle. Easily recyclable and using organically-derived materials, the Vision concept tyre will be embedded with sensory technology that is able to detect road conditions, maintenance requirements, and other safety-related information and communicate them to the vehicle. Each tyre is synced up with the vehicles communication and satellite navigation system, warning the driver if the tyres on the vehicle are deemed unsuitable for the route ahead. Should that tyre be lacking, Michelin envisages a situation whereby users can stop at a service station to have their tyres rebuilt using 3D printing technology, in much the same way as if refuelling or recharging a vehicle. Michelin received official recognition for the futuristic tyre from the editors of Time magazine, which applauded the tyre for its innovation and included it in its latest publication. Terry Gettys, global head of research and development at the Michelin, said the French tyre company was honoured. We believe the Vision concept is as beautiful as the natural world that inspires it, combining multiple technologies that together project the course for Michelins innovation in the years ahead, said Gettys. The ideas presented in the Vision concept have taken hold among vehicle designers, demonstrating a feasible vision of how the tire can provide essential contributions to sustainable mobility in the future. Michelin appears in Time magazines 25 Best Innovations of 2017, which is out now. These stories from Bio-Based World News may also be of interest
<urn:uuid:80d3ab88-8436-43d9-82d7-2c52b0cec83b>
CC-MAIN-2019-18
https://biomarketinsights.com/michelins-vision-airless-organic-rechargeable-and-connected/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.94634
340
2.65625
3
COLLATIONS table provides information about collations for each character set. COLLATIONS table has these The collation name. The name of the character set with which the collation is associated. The collation ID. Whether the collation is the default for its character set. Whether the character set is compiled into the server. This is related to the amount of memory required to sort strings expressed in the character set. The collation pad attribute. SELECT COLLATION_NAME FROM INFORMATION_SCHEMA.COLLATIONS [WHERE COLLATION_NAME LIKE 'wild'] SHOW COLLATION [LIKE 'wild']
<urn:uuid:c0ca29cd-b049-4a3c-a43b-fb7848cfb8ce>
CC-MAIN-2019-18
https://dev.mysql.com/doc/refman/8.0/en/collations-table.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.830833
137
2.8125
3
00:01 Consider a simple class that implements the queue data structure. It has an array where it stores the data, a method to push a new item into the queue, and a method to pop an existing item from the queue. 00:18 An issue with this implementation is that there is nothing constraining the items that are pushed to the queue to match the items that are popped from the queue. Let's demonstrate this by creating a queue. 00:31 You can push a variable of any type onto the queue, for example, a number, or by mistake, you can even push a string. Later on, when you pop an item, the developer might think it is always a number. It is safe to call, for example, the two preceding function on the popped item, but then you get runtime errors. 00:54 Such errors can be hard to track down in a large codebase. One solution, and in fact the only solution for languages that don't support generics is to go ahead and create special classes just for these constraints. 01:13 For example, a quick and dirty number queue would extend the queue and enforce the constraint on the pushed item to match the value that is returned when the item is popped. Internally, it'll just call the super-implementation. 01:32 Now, if you use a specialized data structure class, pushed items will be limited to the correct data type. Mistakes will be caught at compile time. For example, if you try to push in a string, it's going to complain, and you can fix these mistakes at compile time instead of having runtime errors. 01:53 Doing class specialization this way by class inheritance can quickly become painful. For example, if you want a string queue, you have to go through all this effort again. What you really want is a way to say that whatever the type of stuff you push is the same as the type of stuff you pop. 02:10 This is why programming languages need generics to allow you to specify such constraints at compile time. Since TypeScript supports generics, we can add a generic parameter to the queue class. You are free to call it whatever you want, but we will call it t-value to indicate that it is a type of the value. 02:32 We will constrain the pushed items to match this type, and also constrain the popped items will match this type. Now we can use this generic class instead of having to specialize it. We simply instantiate the generic type when we create the queue. You can see that the type flows through to autocomplete on the pop method as well. 03:01 Note that the constraint between the push and the pop methods was there even when we left it as untyped, raw JS. In that case, it was implicit, and you would have to figure out a way to explain it to the user. 03:32 For example, here we are creating a queue where each item must have a name property of type string. If you go ahead and push the correct data structure, TypeScript will be very happy with it. However, if you make a typo in the data structure -- for example, misspell the name property --, you will get a nice compile-time error. 03:55 Bugs like these can be hard to track down, but with generics, you can offload that work to the compiler. You can also use generics to constrain members of a simple function. For example, a reverse function for an array D will return an array of D. The constraint here is between the function argument and the function return value. 04:20 Within the function, you simply clone the array using slice, and return the reversed version of the clone array. Let's go ahead and create an array of objects. Each item in the array will have a name property, which is pointing to a string. We can go ahead and reverse the items in the array using the reverse function. 04:48 Because of the generic constraint, TypeScript knows that the reversed array is also an array of similar objects. If you try to push an item with an invalid data structure, you get a nice compiler error. Similarly, if you try to read an invalid property on a popped item, you will get a compiler error. You also get autocomplete for the correct property.
<urn:uuid:21a76d9c-4591-4e99-93b7-7d70f466a65e>
CC-MAIN-2019-18
https://egghead.io/lessons/typescript-generics-using-typescript
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.905601
899
2.921875
3
A little inspiration on how we can use sound to enhance wellbeing…. Living at a time in which sound is everywhere and silence is scarce, our bodies and minds are reacting to an overload of frequencies every day. From the subtle hum of the refrigerator, to car engines, chirping birds, aeroplanes, our favourite songs and our own voices – sound effects us on a profound level without us even knowing. Emotions, thoughts, the body’s cells and organs, heartbeat and nervous system respond to sound, so how can we tell which sounds are healthy and which can harm? How is sound used as therapy, and can we find every-day sounds to help us heal and rebalance? With a recent explosion in the popularity of sound healing as a therapeutic tool, and a simultaneous rise in silent retreats, it seems we’re all beginning to understand that we can use both sound and silence to enhance health on a deep level. Gong baths and sound soirees are currently the ‘new thing’ amongst wellness enthusiasts of the West, gathering in candlelit halls and lying draped in soft blankets, surrounded by ambient tones of crystal singing bowls and deep metal gongs. In a sound healing session, wither one-to-one or as a group, you can expect to experience a multitude of instruments such as chimes, shakers, rain sticks, bells, bowls, drums, and even the practitioner’s own voice. Each aspect of the session (‘sound journey’ as they’re sometimes referred to as a nod to shamanic traditions) can have leave a profound and lasting impression upon the listener, and it turns out we haven’t just ‘discovered’ sound healing, but – much like Yoga, Ayurveda, Meditation and Chinese Medicine – have re-connected with it after thousands of years. Sound has been utilised in various cultures for as long as recorded history. Going back at least 3,000 years, the Vedic tradition of reciting mantras and hymns from sacred texts is thought to be the world’s oldest surviving organised vocal tradition. In shamanic cultures, Icaros have been used for eons to help enhance the healing power of plants and plant medicine, whilst Mesopotamian cultures considered music an art, with scriptures mentioning professional musicians and even notated music. Indeed, civilisations were writing music all those years ago, and the oldest known melody known as the ‘Hurrian Hymn’ was discovered in Syria in the 1950s, written upon a clay tablet and preserved for over 3,400 years. 3,400 years later, we’re still writing music, developing new sounds, heading out to see music being performed, and dancing to rhythms and beats just like we have for thousands of years. Sound Healing & Stress Reduction Both dancing to music and listening to it have been shown time and time again to reduce stress levels, release endorphins and bring the nervous system into a more balanced and health-promoting state. This calmer state of being is incredibly helpful for reducing blood pressure, slowing breathing and heart rate, thus having a knock-on effect to the whole body and everything we do with it, like sleeping better, making healthier food choices, feeling more energised, and generally being a little more content. Certain frequencies have been shown to be most effective at inducing different types of responses, as you may know if you’ve already taken a dive into the world of Binaural Beats. The 528 hertz frequency is known as the ‘miracle frequency’, and is thought to have a genuine healing effect upon DNA, and is the very same frequency used by genetic biochemists. Renowned medical researcher Dr. Leonard G. Horowitz goes as far as to say “528 cycles per second is literally the core creative frequency of nature. It is love”. Sound healers will often use specially made tuning forks to bring the body into a different state, and whilst an un-weighted tuning fork can emit the sound of 528 hz, a weighted tuning fork (one which is placed on the body) literally sends the vibration and essence of the sound through someone, so they can feel and experience the tone whether their hearing is optimal or not. Whilst the old adage ‘you are what you eat’ is something most of us have heard, we may not consider that we’re not just what we eat, but that we’re made up of each and every experience we digest each day. Other than foods, all other inputs we come across have to be ‘digested’ by the brain, body and subtle channels – every sight we see has to be taken in, processed and either kept in the brain or allowed to leave if it’s unimportant, and in the very same way, sounds have to be ‘digested’ by us too. We can think of sound as not just something swirling around us, but something that travels in, around and through us too. Just as we may think of the nutrition of our food, we can also consider the nutrition of our sound. If we could measure sound like we do superfoods, the best kind may be the 528hz frequencies and binaural beats, but sometimes the most natural and oldest sources ofsound are the most healing. Head outside and away from roads and air traffic, and you’ll begin to tune into the sounds of nature; leaves rustling in the wind, birdsong, rushing water and insects, if you live near a beach maybe it’s the waves that provide a natural sound source for you – and these are the sounds available to us that can be most healing. Published in the journal of Scientific Reports, a test involving participants listening to either the sounds of nature or manmade sounds whilst undergoing a brain activity scan, and asked to perform tasks afterwards. What the results showed were that those listening to the nature had a overall more external-focussed attention (associated with decreased symptoms of worry, rumination, narcissism and selfishness) and also a decrease in stress levels. If however, we were to decipher the toxins of the sound world, this would be 19hz, as it can elicit feelings of fear, dizziness, discomfort, possible panic attacks and blurred vision. If you’re looking to ‘hack’ your way to health, other helpful frequencies for decreasing stress and anxiety include the barely audible 17hz (the lower end of blue whale sounds), 174hz – apparently a natural anaesthetic, 396hz, and 432hz. To experience the wonder of sound healing, look up your nearest session, and head outside for a wonder in nature to find your own free health-promoting frequencies!
<urn:uuid:ff124682-fb49-4087-8dd2-230315e42e28>
CC-MAIN-2019-18
https://emmanewlynyoga.com/2019/01/22/sound-healing-nutrition-for-the-soul/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.957721
1,398
2.625
3
A microlens is a small lens, generally with a diameter less than a millimetre (mm) and often as small as 10 micrometres (µm). The small sizes of the lenses means that a simple design can give good optical quality but sometimes unwanted effects arise due to optical diffraction at the small features. A typical microlens may be a single element with one plane surface and one spherical convex surface to refract the light. Because micro-lenses are so small, the substrate that supports them is usually thicker than the lens and this has to be taken into account in the design. More sophisticated lenses may use aspherical surfaces and others may use several layers of optical material to achieve their design performance. A different type of microlens has two flat and parallel surfaces and the focusing action is obtained by a variation of refractive index across the lens. These are known as gradient-index (GRIN) lenses. Some micro-lenses achieve their focusing action by both a variation in refractive index and by the surface shape. Another class of microlens, sometimes known as micro-Fresnel lenses, focus light by refraction in a set of concentric curved surfaces. Such lenses can be made very thin and lightweight. Binary-optic micro-lenses focus light by diffraction. They have grooves with stepped edges or multilevels that approximate the ideal shape. They have advantages in fabrication and replication by using standard semiconductor processes such as photolithography and RIE. Micro-lens arrays contain multiple lenses formed in a one-dimensional or two-dimensional array on a supporting substrate. If the individual lenses have circular apertures and are not allowed to overlap, they may be placed in a hexagonal array to obtain maximum coverage of the substrate. However, there will still be gaps between the lenses which can only be reduced by making the micro-lenses with non-circular apertures. With optical sensor arrays, tiny lens systems serve to focus and concentrate the light onto the photo-diode surface, instead of allowing it to fall on non-photosensitive areas of the pixel device. Fill-factor is the ratio of the active refracting area, i.e. that area which directs light to the photo-sensor, to the total contiguous area occupied by the microlens array. In the 17th century, Robert Hooke and Antonie van Leeuwenhoek both developed techniques to make small glass lenses for use with their microscopes. Hooke melted small filaments of Venetian glass and allowed the surface tension in the molten glass to form the smooth spherical surfaces required for lenses, then mounting and grinding the lenses using conventional methods. The principle has been repeated by performing photolithography into materials such as photoresist or UV curable epoxy and melting the polymer to form arrays of multiple lenses. More recently microlens arrays have been fabricated using convective assembly of colloidal particles from suspension. Advances in technology have enabled micro-lenses to be designed and fabricated to close tolerances by a variety of methods. In most cases multiple copies are required and these can be formed by moulding or embossing from a master lens array. The master lens array may also be replicated through the generation of an electroform using the master lens array as a mandrel. The ability to fabricate arrays containing thousands or millions of precisely spaced lenses has led to an increased number of applications. The optical efficiency of diffracting lenses depends on the shape of the groove structure and, if the ideal shape can be approximated by a series of steps or multilevels, the structures may be fabricated using technology developed for the integrated circuit industry, such as wafer-level optics. This area[clarification needed] is known as binary optics. Micro-lenses in recent imaging chips have attained smaller and smaller sizes. The Samsung NX1 mirrorless system camera packs 28.2 million micro-lenses onto its CMOS imaging chip, one per photo-site, each with a side length of just 3.63 micrometer. For smartphones this process is miniaturized even further: The Samsung Galaxy S6 has a CMOS sensor with pixels only 1.12 micrometer each. These pixels are covered with micro-lenses of a equally small pitch. Micro-lenses can be also made from liquids. Recently, a glass-like resilient free-form micro-lenses were realized via ultra-fast laser 3D nanolithography technique. The sustained ~2GW/cm^2 intensity for fs pulsed irradiation shows its potential in high power and/or harsh environment applications. Wafer-level optics (WLO) enables the design and manufacture of miniaturized optics at the wafer level using advanced semiconductor-like techniques. The end product is cost effective, miniaturized optics that enable the reduced form factor of camera modules for mobile devices. The technology is scalable from a single-element CIF/VGA lens to a multi-element mega pixel lens structure, where the lens wafers are precision aligned, bonded together and diced to form multi-element lens stacks. As of 2009 the technology was used in about 10 percent of the mobile phone camera lens market. Single micro-lenses are used to couple light to optical fibres while microlens arrays are often used to increase the light collection efficiency of CCD arrays. They collect and focus light that would have otherwise fallen onto the non-sensitive areas of the CCD. Micro-lens arrays are also used in some digital projectors, to focus light to the active areas of the LCD used to generate the image to be projected. Current research also relies on micro-lenses of various types to act as concentrators for high efficiency photovoltaics for electricity production. Combinations of microlens arrays have been designed that have novel imaging properties, such as the ability to form an image at unit magnification and not inverted as is the case with conventional lenses. Micro-lens arrays have been developed to form compact imaging devices for applications such as photocopiers and mobile-phone cameras. In optical microscopes, two microlens arrays can be used to realize uniform illumination. By placing two microlens arrays into the illumination path of a microscope, a coefficient of variation of the illumination uniformity between 1% and 2% can be achieved. Another application is in 3D imaging and displays. In 1902, Frederic E. Ives proposed the use of an array of alternately transmitting and opaque strips to define the viewing directions for a pair of interlaced images and hence enable the observer to see a 3D stereoscopic image. The strips were later replaced by Hess with an array of cylindrical lenses known as a lenticular screen, to make more efficient use of the illumination. Hitachi have 3D displays free of 3D glasses using arrays of microlens to create the stereoscopic pictures felling. More recently, the availability of arrays of spherical micro-lenses has enabled Gabriel Lippmann’s idea for integral photography to be explored and demonstrated. Colloidal micro-lenses have also enabled single molecule detection when used in conjunction with a long working distance, low light collection efficiency objective lens. Micro-lens Arrays are also used by Lytro to achieve Light Field Photography (Plenoptic Camera) that eliminates the need for initial focusing prior to capturing images. Instead, focus is achieved in software during post-processing. In order to characterize micro-lenses it is necessary to measure parameters such as the focal length and quality of transmitted wavefront. Special techniques and new definitions have been developed for this. For example, because it is not practical to locate the principal planes of such small lenses, measurements are often made with respect to the lens or substrate surface. Where a lens is used to couple light into an optical fibre the focused wavefront may exhibit spherical aberration and light from different regions of the microlens aperture may be focused to different points on the optical axis. It is useful to know the distance at which the maximum amount of light is concentrated in the fibre aperture and these factors have led to new definitions for focal length. To enable measurements on micro-lenses to be compared and parts to be interchanged, a series of international standards has been developed to assist users and manufacturers by defining microlens properties and describing appropriate measurement methods. Microoptics in natureEdit Examples of micro-optics are to be found in nature ranging from simple structures to gather light for photosynthesis in leaves to compound eyes in insects. As methods of forming micro-lenses and detector arrays are further developed then the ability to mimic optical designs found in nature will lead to new compact optical systems. - Hooke R, Preface to Micrographia. The Royal Society of London. (1665). - Popovic CD, Sprague RA, Neville Connell GA, "Techniques for monolithic fabrication of microlens arrays", Appl. Opt. 27 1281–1284, (1988). - Daly D, Stevens R F, Hutley M C, Davies N, "The manufacture of microlenses by melting photoresist". Proceedings of seminar "Microlens Arrays", May 1991. IOP Short Meeting Series No 30, 23–34. - Kumnorkaew P, Ee Y, Tansu N, and Gilchrist J F, "Investigation of the Deposition of Microsphere Monolayers for Fabrication of Microlens Arrays", Langmuir, 24, 12150-12157, (2008) - Borrelli, N F. Microoptics technology: fabrication and applications of lens arrays and devices. Marcel Dekker, New York (1999). - Veldkamp W B, McHugh T J. "Binary optics", Scientific American, Vol. 266 No. 5 pp 50–55, (May 1992). - S. Grilli; L. Miccio; V. Vespini; A. Finizio; S. De Nicola; P. Ferraro (2008). "Liquid micro-lens array activated by selective electrowetting on lithium niobate substrates". Optics Express. 16 (11): 8084–8093. doi:10.1364/OE.16.008084. PMID 18545521. - Jonušauskas, Linas; Gailevičius, Darius; Mikoliūnaitė, Lina; Sakalauskas, Danas; Šakirzanovas, Simas; Juodkazis, Saulius; Malinauskas, Mangirdas (2017-01-02). "Optically Clear and Resilient Free-Form µ-Optics 3D-Printed via Ultrafast Laser Lithography". Materials. 10 (1): 12. doi:10.3390/ma10010012. PMC 5344581. PMID 28772389. - "Wafer-Level Camera Technologies Shrink Camera Phone Handsets", Photonics.com, August 2007[permanent dead link]. - J. H. Karp; E. J. Tremblay; J. E. Ford (2010). "Planar micro-optic solar concentrator". Optics Express. 18 (2): 1122–1133. doi:10.1364/OE.18.001122. PMID 20173935. - F.A.W. Coumans; E. van der Pol; L.W.M.M. Terstappen (2012). "Flat-top illumination profile in an epi-fluorescence microscope by dual micro lens arrays". Cytometry Part A. 81 (4): 324–331. doi:10.1002/cyto.a.22029. PMID 22392641. - Ives FE. Parallax stereogram and process of making same. US Patent 725,567 (1903). - Hess W. Improved manufacture of stereoscopic pictures. UK Patent 13,034 (1912). - Lippmann G. "Epreuves reversibles. Photographies integrales", Comptes Rendus 146 446–451 (1908). - Stevens R F, Davies N. "Lens arrays and photography". The Journal of Photographic Science. Vol 39 pp 199–208, (1991). - Schwartz JJ; Stavrakis S; Quake SR (2010). "Colloidal lenses allow high-temperature single-molecule imaging and improve fluorophore photostability". Nature Nanotechnology. 5 (2): 127–132. doi:10.1038/nnano.2009.452. PMC 4141882. PMID 20023643. - "Archived copy" (PDF). Archived from the original (PDF) on 2012-09-16. Retrieved 2012-09-16.CS1 maint: Archived copy as title (link) - Iga K, Kokburn Y, Oikawa M. Fundamentals of microoptics. Academic Press, London (1984). - ISO 14880-1:2001. Optics and photonics - Microlens arrays - Part 1: Vocabulary - ISO 14880-2:2006. Optics and photonics - Microlens arrays - Part 2: Test methods for wavefront aberrations - ISO 14880-3:2006. Optics and photonics - Microlens arrays - Part 3: Test methods for optical properties other than wavefront aberrations - ISO 14880-4:2006. Optics and photonics - Microlens arrays - Part 4: Test methods for geometrical properties. - Land M. "The optics of animal eyes". Proc Royal Institution, vol 57, pp. 167–189, (1985) - Duparré J. et al., "Microoptical telescope compound eye". Optics Express, Vol. 13, Issue 3, pp. 889–903 (2005).
<urn:uuid:9f4a6953-fe4b-49e8-a321-9adf0bf4ce15>
CC-MAIN-2019-18
https://en.m.wikipedia.org/wiki/Microlens
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.855801
2,936
4.15625
4
- Epilepsy IS an invisible Disability and can extremely debilitating. - Epilepsy is a common condition that affects approximately one in 103 people. It is usually diagnosed in childhood and in people over the age of 65, but it can affect any one. - There are two main types of seizure – generalised and focal. Generalised seizures involve large areas on both sides of the brain, whilst focal seizures affect a specific region. - Between 500 and 1,000 people with epilepsy die of SUDEP in the UK each year, usually whilst asleep/alone, and most of these deaths are thought to be caused by a severe convulsive seizure affecting vital functions such as breathing or heart rhythm. - Uncontrolled seizures can damage the developing brain and early diagnosis and treatment are critical. - Although for approximately 30% of epilepsy diagnoses, the cause of epilepsy is known (or strongly suspected and referred to as ‘symptomatic epilepsy’), in approximately 60% of cases the cause of epilepsy is not known, and it is then called ‘idiopathic epilepsy’. - Approximately two thirds of people with epilepsy are able to control their seizures with anti-epileptic drugs (AEDs). However, unfortunately, most AEDs cause unwanted side effects, which can lower the quality of a person’s life considerably. Side effects can include weight gain, sleepiness, confusion, unsteadiness, lowered efficacy of the contraceptive pill and harm to an unborn baby. - A major side effect of epilepsy and AEDs is memory loss. - At least one in every eight people with epilepsy also has depression. Depression contributes to poor quality of life for people with epilepsy, and there is evidence that links depression with poor seizure control. Despite this, epilepsy services at all levels (GPs, hospitals and specialist consultants) rarely detect it. If a good method of identifying depression in epilepsy can be found, more people might benefit from being seizure free in the future. Myth: There is only one type of seizure—a convulsion. The truth: In fact, there are more than 40 different types of seizures, and a convulsion is not the most common kind. Seizures can take many forms including a blank stare, involuntary movement, altered consciousness, a change in sensation or a convulsion. ** All facts taken from Epilepsy Research **
<urn:uuid:3a5984a3-ff70-4fe6-8229-879c4cd783e4>
CC-MAIN-2019-18
https://thewallflowerinwonderland.com/epilepsy-facts/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.952256
486
3.828125
4
THE IMPACTS OF I.C.T ON THE TEACHING AND LEARNING OF HEALTH EDUCATION IN COLLEGE OF EDUCATION, IKERE-EKITI. The use of the Internet and the web as well as the emerging of different communication channels have brought the world closer and contributed to the concepts of globalization and the extended enterprise also, the information society demands a workforce that can use technology as a tool to increase productivity and creativity. The educational sector at large has been one of the beneficiaries of the use of different information and communication technology tools and techniques. Information is a key resource for student teaching, learning, research, and publishing. This research work examines the impact or effect of emerging information and communication technology tools in teaching and learning of Health Education, identifying the reliable sources of information, effectively accessing these sources of information, synthesizing and communicating that information to colleagues and beneficiaries and the need for effective methods of information processing and effectiveness of using unconventional technologies in delivering Health Education knowledge in Nigeria. BACKGROUND TO THE STUDY To meet the demands and expectations of increasing global competition, contemporary Health Educators require a range of generic skills such as analytical and problem-solving skills, personal and interpersonal communication skills, management, negotiation and organizational skills, together with the ability to apply these skills in a range of unique situations. Teaching and learning strategies should move away from procedural tasks and memorizing professional standards towards more conceptual and analytical teaching and learning. One of the most important questions that currently face research in Health education is what causes an individual to adopt new information technologies? Are they factors that relate to his/her inherent personality and background or is the acceptance of information technology driven by other external factors that can be influenced by educators and managers. This concern is a direct result of the technological advancements occurring all over the world. Over the past decades, technological developments and innovations have been progressing at an exponential rate. The impact such technological advances can be felt at the individual, organizational and societal levels through the use of personal computers, the Internet, the world wide web, cell phones, and digital cameras in different daily activities. Moreover, on the professional level, the diffusion of computers and the use of the Internet and different software applications have facilitated researches and academic excellence ensuring quality, speed and accuracy. On the knowledge diffusion level, the learning process has also been dramatically affected by those technological advances with multi-implications on information dissemination and knowledge acquisition. The use of information technology in classrooms allows schools to expand their markets, respond to the business and environmental requirements, support cross cultural and cross functional teams of students to engage and work together and allows faster and more practical cooperation between lecturers from various nations while maintaining the targeted level of quality delivery of knowledge in education. The use of information technology in the classroom can allow more time and space flexibility for lecturers and students to use the educational materials. It can also allow for continuous testing of students of the contents of such materials, and allow the students more freedom in taking initiatives, learn on their own, be more creative, and individually study at their own pace. As Nigeria is striving hard to play a leadership role in Africa, particularly in the period of pragmatic and competitive science and technology, there is an urgent need to pay more prominent attention to the improvement of teaching and learning particularly in Nigerian tertiary institutions. This entails the adoption of information, communication technology (ICT) in the institution. The ICT is an invaluable intervention of this modern time. Its inherent attributes such as accuracy, high speed performance, reliability and capability to store very large amount of data have made it possible for its applicability to all human endeavours including teaching, learning and research in educational institutions. This study is specifically set out to critically appraise the role of information, communication technology as a change agent for higher education in Nigeria. It also examines the implication and challenges of ICT on the development of higher education in Nigeria. Education is one of the most important needs for the wellbeing of individual and that of the society. Thus, education is a powerful instrument of social, political, and economic progress, without which neither an individual nor a society can attain professional growth. Information and communication technology (ICT) is an indispensable part of the contemporary world. In fact, culture and society have to be adjusted to meet the challenges of the information age. Information and communication technology (ICT) is a force that has changed many aspects of people’s ways of life. Considering such fields as medicine, tourism, travel, business, law, banking, engineering and architecture, the impact of ICT in the past two or three decades has been enormous. ICT encompasses a range of applications, communications and technologies which aid information retrieval and research communication and administration. These include: Internet access, electronic mail, CD-ROMS, telephone, on line databases, library services and fax machines. It has become a global phenomenon of great importance and concern in all aspects of human endeavour, spanning across education, governance, business, labour, market, shares, productivity, trade, agriculture, commerce and others. Haddad and Draxier (2002) indicated that ICT contributed to effective learning through expanding access, promoting efficiency, improving the quality of learning and improving management systems. According to Obeng (2004), ICT is now regarded as a utility such as water and electricity and hence has become a major role in education, learning and research in general, agriculture, health, commerce and even in poverty alleviation by generating or creating new jobs and investment opportunities. ICT is an indispensable part of the contemporary world. The field of education has certainly been affected by the penetrating influence of ICT worldwide and in particular developed countries. ICT has made an impact on the quality and quantity of teaching, learning and research in the tradition and/or distance education institutions using it (Kwacha, 2007). According to Ololube, Ubogu and Ossai (2007), the introduction of ICT usage, integration and diffusion has initiated a new age in educational methodologies, thus it has radically changed traditional method of information delivery and usage patterns in the domain as well as offering contemporary learning experience for both lecturers and students. As a tool for addressing challenges in teaching and learning, technology has the capabilities for delivery, management and support of effective teaching and learning. As a change agent, it is capable of changing the content, methods and overall quality and quantity of teaching and learning, thereby reducing teachers’ or lecturers’ workload and ensuring constructivist inquiry-oriented classroom. Moreover, ICT a central force in economic and social shifts that has technology skill critical to future employment of today’s students. Thierer (2000) pointed out that the role of technology in teaching and learning is rapidly becoming one of the most important and widely discussed issues in contemporary education policy. Experts in the fields of education have agreed that, if ICT is properly used, it holds great promise to improve teaching and learning in addition to shaping work-force opportunities. Thus, this study set out to critically appraise the role of information communication technology as a change agent for higher education in Nigeria. Information Communication Technology has tremendously be a source of blessing to mankind. Various industries and fields of professions has felt the impact of technological innovations through the use of ICT In bringing the fastest and accurate outputs and ease the ways of resolving problems. STATEMENT OF THE PROBLEM Information Communication Technology (ICT) relevance and positive effects as instructional resource for the teaching and learning of Health Education in Colleges of Education, Ikere-Ekiti is a noticeable improvement among the institutions and academic output. It is noted that uses of ICT equipment in teaching and learning of Health Education in Colleges of Education does not only assist the Lecturers in carrying out their job effectively but also render qualitative service output to the entire academic community of the Nation. OBJECTIVES OF THE STUDY In spite the introduction of modern ICT equipment, this research work will look deeply in the impacts of ICT on the teaching and learning of Health Education in Colleges of Education, Ikere-Ekiti, Ekiti State in Nigeria. Finally, it is the objectives of this research work to fish both the relevance and problems of ICT in the teaching and learning of Health Education in Colleges of Education in Nigeria in the Era of modern Information communication Technology. SIGNIFICANT OF THE STUDY The introduction of ICT into Nigerian tertiary education clearly changes the way education is conducted. Not only is it possible to work with distance learning and achieve a chosen collaboration between colleges and universities, ICT is also paving the way for a new pedagogical approach where students are expected to play more active role than before. Using information and communication technology (ICT) as a tool in education, students should be able to communicate, create preservatives in power point, and interact with colleagues and teachers using technology and so on. For countries to benefit from technological development a cadre of professional has to be educated with sound ICT backgrounds with various computer platforms and software environment. Darkwa and Anao (2004) highlighted the impact of ICT on tertiary institution are as follows: – It enhances both academic and business research by tertiary education lecturers and students with the advent of internet, researchers and students will have the opportunity to access a lot of information for various assignments in a more innovative way. Researchers can have full access to various kinds of information and even known relevant areas of critical concern and interest. It also offers them to know the demand of industry and conduct research to meet industry’s expectations. In no doubt, ICT has provided full access to students on all kinds of information for their studies and writing of dissertations and thesis. – ICT solves the problem of lack of tertiary education lecturers. With the current state of acute shortage of academic facility and staff facing by our tertiary institutions, we could leverage ICT through video conferences so that students on various campuses pursuing the same or similar programme/course could be linked to benefit from a lesson, which they lack lecturers simultaneously. – ICT reduces pressure on tertiary education admission process. In our tertiary education today, the pressure on academic admissions processes have been reduced, it has made it easy for money to be accessed easily. With the growing number of computer literacy in our society, more ICT centers could be established in selected areas. The universities and polytechnics could then be linked to these centers. – ICT helps students in sharing of ideas. With the use of ICT, ideas can be shared online, as students and lecturers can enhance their skill remarkably through the creation of online communication. This will allow and provide opportunity for researcher and lecturers to have information and ideas. Also, the teaching methods have been improved whereby students no longer write notes during lectures when teaching in class, because the lecturer teaching has compiled almost everything from the Internet. – Registration of course and details of examination and other services are being offered online, thereby reducing pressure during course registration. With the use of ICT, students pay their school fees online and check their results after every examination, able to provide strong support for all these requirements and examples of the world-class settings for competency and performance based curricula that make sound of the affordance of these technologies. However, these advantages are hindered by the presence of several challenges that arise from the use of various information and communication technologies, including the need for expensive infrastructure and large startup costs, finding qualified instructors, and the lack of face to face instruction, which may diminish the students interpersonal, social, and communication skills. These issues are further intensified in developing countries due to the lack of a complete infrastructure including the main building blocks such as financial resources, human resources, information recourses and technological resources. The level of Health Education in developing countries is rather low and Nigeria is not an exception. Therefore, it is crucial to find ways to speed up the educational process of its citizens and one of the venues could be distance learning and computer based technologies, which could lead to a cheaper process and yet as effective and as efficient. However, to date most of the implementations took place in developed nations and there is an urgency to test the environment in a developing setting (Rose and Straub, 1998, Dahawy et al, 2002). Furthermore, information now plays a vital part in the lives of individuals, organizations and institutions and information literacy is the key to the optimum use of information. The state of education and skills emphasized the importance of ICT and information literacy as vital components in the development of life skills, workplace skills and citizenship. This research work will help the Governments, Ministry of Education in Nigeria, Students and readers to understand those benefits that Information Communication Technology embodies which we have neglected with in the past. In understanding this on the side of the government, it will allow them to rethink and work towards real implementation of it thereby creating a room for the rapid growth and development of the education sector of this country. At the other hand, it will go a long way to create an avenue for more academic research. Haven known this, it is worthy to conclude that the main beneficiaries of this study lies on the government and other readers respectively. In view of this study, the following research questions have been formulated to ascertain how ICT could have be a catalyst to effective use of information by students. - What types of ICTs are available to Health Education Students for use? - To what extent do Health Education students make use of ICT? - What are the reasons for Health Education Students use of ICT in education? - What are the problems Health Education Students face with the use of ICT? - What are the solutions preferred to the problems face with the use of ICT by Health Education Students? Ho1: Modern ICT facilities are not adequately available in Nigeria Colleges of Education. Ho2: Lecturers in Colleges of Education in Nigeria do use ICT facilities in teaching and learning of Health Education. Ho3: There is a great significant relationship between usage of Modern ICT facilities and Lecturers’ productivity as reflected in students’ academic results 1.7 SCOPE OF THE STUDY The scope of this research work focused strictly on the effects of information communication technology (ICT) in teaching and learning of Health Education in Nigeria. This work will lead us to the evolution of ICT in Nigeria and also examine how the academic field (teaching and learning) is fairing in this Era of Information Communication Technology. 1.8 LIMITATION TO THE STUDY On the course of this research, the following problems were encountered, like short time frame. Financing problem, scarcity of information or data, etc. this is due to mainly, the wide scope of this study which emphasizes on a complexity of numbers of colleges of education in Nigeria. Now, the implication is that the short time frame mapped out for this research work posed a problem of assessing these programs as whole, but that doesn’t threat the authentication and quality of this work. Again, enough financing of the accomplishment of this work became a problem in the sense that gathering information was costly, the researcher needed enough money to gather them. 1.9 DEFINITION OF TERMS - Information Communication Technology (ICT): is generally refers to ‘computers and computing related activities’. Computers and their application play a significant role in modern information management, other technologies and/or systems also comprise of the phenomenon that is commonly regarded as ICTs. According to UNESCO (2002) information and communication technology (ICT) may be regarded as the combination of ‘Informatics technology’ with other related technology, specifically communication technology. Informatics refers to the science dealing with the design, realization, evaluation, use and maintenance of information processing systems, including hardware, software, organizational and human aspects, and the industrial, commercial, governmental and political implications of these. - INFORMATION: facts or details that tell you something about situation person events. - COMMUNICATION: It is the transmission of information or idea. From it means the use of mechanical arts and applied science e.g. Engineering. - EDUCATION: Is what prepares an individual to accommodate and to contribute positively to the development of his/her society. - COMPUTER: It is an electronic device that accepts data as to give information as an output. - NEPAD: New Partnership for Africa Development. - C.T: Information Communication Technology. HOW TO ORDER FOR COMPLETE PROJECT MATERIAL » Bank Branch Deposits, ATM/online transfers (Amount: ₦3,000 NGN) |Bank: FIRST BANK Account Name: OMOOGUN TAIYE Account Number: 3116913871 Account Type: SAVINGS Amount: ₦3,000 AFTER PAYMENT, TEXT YOUR TOPIC AND VALID EMAIL ADDRESS TO 07064961036 OR 08068355992 OR Click Here| |Bank: ACCESS BANK Account Name: OMOOGUN TAIYE Account Number: 0766765735 Account Type: SAVINGS Amount: ₦3,000 AFTER PAYMENT, TEXT YOUR TOPIC AND VALID EMAIL ADDRESS TO 07064961036 OR 08068355992 Click Here| |Bank: HERITAGE BANK Account Name: OMOOGUN TAIYE Account Number: 1909068248 Account Type: SAVINGS Amount: ₦3,000 AFTER PAYMENT, TEXT YOUR TOPIC AND VALID EMAIL ADDRESS TO 07064961036 OR 08068355992 Click Here|
<urn:uuid:282a7c83-6776-4762-be94-333692510a85>
CC-MAIN-2019-18
https://tycomputer.com.ng/impacts-c-t-teaching-learning-health-education/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.939457
3,628
2.90625
3
A reliable source for Assembly Machinery information and a resource for accessing leading Assembly Machinery and suppliers. Assembly machinery, also known as automation equipment, is any equipment that assists and partially or fully automates a manufacturing process. Automation equipment may be partially human operated, automated with human supervision, or fully automated past programming and maintenance. Assembly equipment is essential to the functioning of a wide variety of broad industry applications, such as products assembling and finishing. It is also essential to a wide range of more specific manufacturing and assembly processes like custom coating, cutting, grinding, forming, marking, molding, packing, riveting, smoothing, turning, and welding. We find automation equipment working independently or integrated into systems, both where they replace human contact that could lead to product contamination or harm, and where they help create and assemble parts and products. Examples of systems in the former category include those that take place in food and beverage processing plants, medical device assembly applications, and medical research facilities. Examples of systems in the latter category include those that take place in factories and manufacturing plants. All in all, automation equipment is integral to systems operations and solutions in industries such as computer, electronics, microelectronics, semiconductor, telecommunications, electrical, fiber optics, aerospace, automotive, food and beverage, agriculture, furnace and heat treatment, plumbing, medical device and healthcare, lab and research, waste processing, and general manufacturing. Read More… Automation Equipment ManufacturersAssembly machinery, also known as automation equipment, is any equipment that assists and partially or fully automates a manufacturing process. Automation equipment may be partially human operated, automated with human supervision, or fully automated past programming and maintenance. ATI is a recognized leader in Automated Assembly Products and Services. To stay competitive, take advantage of our products such as Auto-fed Part Placers, Pick & Place Mechanisms, Placer/Presses, and Feed Systems. Generally, we say that the concept of automated machinery was born in 1908, with Henry Ford and his automotive assembly line. While Mr. Ford was certainly the person that popularized the assembly line, a man named Ransom Olds actually patented it before him, in 1901. His assembly line increased productivity in his plant by 500 percent, despite the fact that it still required a lot of manual labor. (His method required that his worker carry heavy parts from one station to another.) Another pre-Ford automation system was the automated bottle blowing machine. Manufacturers first began using this in 1905. Previous to implementing it, six workers could manufacture about 2,880 bottles every twelve hours. After implementing it, four workers could manufacturer about 17,280 bottles in twenty-four hours. This revolutionized the bottling industry and made bottled products much more affordable. Automated Blender Loading System – VAC-U-MAX Despite Olds’ earlier patent and the success of automated bottle blowers, because he made such an impact, we consider Henry Ford to be the father of the assembly line, from which is descended automation equipment. In 1908, Henry Ford, in an effort to increase productivity on the assembly floor of his new car company, created the assembly line. He first implemented his assembly line in 1913. He used a conveyor rail to shuttle car parts to his workers, rather than have them move them around themselves as they did before. Not only did this make things faster, it also made the work less physically taxing. Though workers still used their hands at first, the idea was the same: stand in one place, performing one task over and over again, rather than assembling an entire product yourself. The assembly line revolutionized manufacturing processes because reduced production times from hours to minutes. After seeing its success, manufacturers from industries other than automotive manufacturing quickly jumped on board and applied similar solutions to their own applications. For example, in 1919, engineers designed the first automated equipment for the paper industry. This equipment, a sectional electric drive control, allowed paper manufacturers to create high quality paper products for newspapers on a much larger scale. In 1930, Japanese engineers set the stage for synchronized automation when they developed reliable electric timers that featured protective relays and micro-switches. These made it possible for machines to talk to one another with humans. As Japan transitioned after World War II, its engineers innovated once again. Under a decade after the war ended, Japan was leading the world in automation, especially automated car assembly. In the 1969, while a graduate student at Stanford, an American engineer named Victor Scheinman invented the Stanford Arm, which was a robotic arm with six axes capable of performing multiple functions. Robotic arms like his became very important after this, allowing for controlled movements such as turning, lifting, lowering, and clamping. In fact, his robotic arm kicked off an entire industry devoted to manufacturing automated industrial robots. The next step towards full industrial automation took place in the 1980s, when engineers began using computer technology in manufacturing systems. Specifically, they integrated Computer Numerical Control (CNC) and Computer Integrated Manufacturing (CIM) into their production processes. This change allowed for more precision and higher volume product productions. Over the years, engineers developed other computer control systems and computer design systems, such as computer aided design (CAD) and computer aided manufacturing (CAM). Today, computer control systems continue to be an important component of all custom automation systems. By the turn of the 21st century, automated equipment was a staple of manufacturing. Even so, it continued to advance. For example, within the last ten years, engineers have developed 3D printing, also known as additive manufacturing, which allows manufacturers to print 3D products from blueprints designed on the computer. Since the fully human assembly line has given way to automated machinery, the efficiency and capabilities of machining have increased again by leaps and bounds. Automation equipment does have some limitations and disadvantages, such as high initial costs and their lack of human-level language comprehension and pattern recognition. However, as technology advances, we can expect automation capabilities to advance along with it. Assembly machines are valued for their ability to consistently produce high quality results that reduce both material and labor costs; once programmed, they can carry out repetitive tasks accurately at fast speeds. Assembly machinery is usually an element of a larger production system, most often a conveyor belt assembly line. As a part of such a system, individual assembly machines each perform one construction action as the product moves down the line. Examples of other types of automation equipment used in industrial processes include axial inserters, radial inserters, bulk feeders, injection molding systems, laser marking and component sequencers, and material handling systems and plastic processors. In addition to those more specific types mentioned above, suppliers deal in a few different main styles of automation equipment. These include manufacturing automation, factory automation, and robotic automation. Manufacturing automation equipment is designed to make parts and products. It primarily handles applications related to quality control, materials handling, and, of course, general manufacturing. Manufacturing automation equipment is also both computer programmed and controlled. Factory automation equipment is exactly like manufacturing automation equipment, except that it is designed for more general movement functions inside factory or warehouse systems. Factory automation equipment typically performs tasks like computer-controlled lifting, computer-controlled lowering, computer-controlled grasping, computer-controlled product moving, etc. Robotic automation equipment, or industrial robotics equipment, is a subgroup of machines (robots) that may serve any type of application. Like so many others, robotic machines may be integrated into preexisting systems, or they may stand alone. Either way, robots are designed to move tools, devices, or parts in preprogrammed movements. Among other tasks, they may provide welding, painting, assembling, material handling, machining, and moving services. Assembly machinery and automation equipment may be found in many forms because they are not subject to the constraints of any one standard arrangement or setup. Thus, no two pieces of automated machinery or two assembly systems have the exact same components. However, automation systems often include components like lifts, conveyor belts, pick and place equipment, and palletizers. Assembly machinery and automation equipment offer so many advantages to a customer. First, automated systems can work in environments where humans cannot, such as spaces with extreme temperatures, or radioactive or toxic atmospheres. Second, they offer faster, more accurate production. All the while, they lower labor costs and all but eliminate human error. In addition, it is easy for manufacturers to customize automation systems and devices. Finally, users can maintain automation equipment systems easily with routine quality checks. Design and Customization Most suppliers accept custom automation equipment orders, and will manufacture machines to specific dimensions, with specific combinations of functions. Custom automation equipment manufacturers will design your custom automation systems per the details of your application, such as the number of steps your system takes to render services or produce products, the volume or quantities you produce daily/hourly, the size of your factory, and your standard requirements. Note that you may purchase not just one piece of custom automation equipment, but a whole slew of custom machines. For your application, manufacturers will assemble products so that they combine with the various parts and devices of each seamlessly and create a larger functioning system. Learn more about your custom automation systems options by talking over your application with potential suppliers. Safety and Compliance Standards Generally speaking, automation equipment is beholden to a few different safety and compliance standards. These include the U.S. Department of Labor’s safety standards (equipment safety, consumer safety, operator safety, food safety, etc.), OSHA’s Federal Register notices (rules and official standard interpretations related to occupational safety), ASTM’s (American Society for Testing and Materials) machine and tool safety standards and ANSI’s (American National Standards Institute) machine and tool safety standards. In addition to these general standards, you may be required to work with automation equipment that meets more specific standards. For example, if you are working with food or drugs, your automation equipment needs to meet the FDA (Food and Drug Administration) standards for safety, quality, and cleanliness in packaging, processing, and the like. Likewise, if you are working with medicines or drugs for the international community, your machines must meet the standards of ISPE (International Society for Pharmaceutical Engineering), such as GAMP (Good Automated Manufacturing Practice) or CGMP (Current Good Manufacturing Practices). To learn more about which safety standards for which your automation equipment should have certification, talk to your industry leaders. Once you’ve done that, before agreeing to work with any company, make sure that company has the capabilities to design products to those standards. In order to maintain your custom automation equipment in compliance with such standards, and to generally keep it running well, you need to keep a maintenance schedule. During maintenance, you need to check to make sure all of your equipment’s hardware and electrical parts are still firmly installed, clean, and lubricate your equipment. In addition, you need to make sure that everything is in alignment and the controls are working as they should. Taking measures such as these will keep your custom equipment healthy, happy, and humming along nicely. Choosing the Right Manufacturer for You Automation equipment is complex, and it can make or break your application. For this reason, it’s incredibly important that you work with an automation equipment manufacturing company that understands your needs and is equipped to make you customized machinery. Not only that, but it is important that you work with a company willing to produce high quality custom automation solutions no matter your budget. Find a supplier like this by checking out those we have listed on this page. You’ll find their information, complete with company profiles, interspersed in between these chunks of information. As you look over their services, keep your requirements at the forefront of your mind. Pick out three or four you believe could best fulfill these requirements, then reach out to each of them to discuss them. After you’ve done that, compare and contrast your conversations. Who can work with your budget and deliver solutions to you on time? Who can manufacture your products to the safety and quality standards you require? Who can and will do everything you need? Figure out which company that is and go with them. Good luck!
<urn:uuid:c8089f57-9956-42c4-bc5e-3f14d9550191>
CC-MAIN-2019-18
https://www.assemblymachinery.com/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.952622
2,524
3.03125
3
After you store measurements and other data in your data logger’s tables, how do you access that data to perform operations in your CRBasic program? Where can you get an all-access pass to your data? This article will explain how you can use a special CRBasic syntax to simplify the coding of your program to access your data and perform various operations. Typically, programs written for Campbell Scientific data loggers use one or more data tables to store measurements, calculations, and variable states. The rows of a data table are called records, and the columns are called fields. The tables in which the data records are stored are defined by DataTable()/EndTable instructions, as well as by output processing instructions. Here is an example of this type of definition: After the data is stored in tables, you can access it using a special CRBasic syntax that follows this form: TableName.FieldName. This syntax accesses the value stored in a specific field of a specific table. Optionally, you can append the syntax with a field name index and records back using this format: TableName.FieldName (FieldName Index, Records Back). Note: When Records Back = 1, you are accessing the most recent record. This example shows how to use the CRBasic syntax to take some data (yesterday’s maximum air temperature), which is stored in a data table, and write it to a Public variable named YesterdayMaxAirTemp. To do this, use the syntax YesterdayMaxAirTemp = Daily.AirTemp_Max,where Daily is the TableName, and AirTemp_Max is the FieldName. Your DataTable() might look like this: Additionally, to calculate the change in average air temperature over the previous seven days, your expression would look like this: AirTempDiff = Daily.AirTemp_Avg(1,1) – Daily.AirTemp_Avg(1,7) You can find more information about additional data table syntaxes, as well as programming examples, in the CRBasic Editor. Follow these steps to access this resource: I hope this article has helped you discover an all-access pass to your data. By using the CRBasic syntax to simplify your coding, you should be able to easily access and use your stored data. If you have any questions or comments, feel free to post them below.
<urn:uuid:c11452cf-27f3-433c-9f3e-830a8fab7572>
CC-MAIN-2019-18
https://www.campbellsci.co.uk/blog/programmatically-access-stored-data-values
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.865088
486
2.953125
3
These posts are opinion and research articles representing youth perspectives around education. Our experiences through the system and voice on where we believe education should be headed. Fixed mindsets believe that much of who we are and what we are capable of – both good and bad – is largely predetermined. Growth mindsets on the other hand, embrace failure, try new things, and believe that they can become good at anything through persistence and a willingness to try new strategies in the face of difficulties… How we can create growth mindsets in our interactions and in our education systems, primarily at the school level? This is the first article in a three-part series. Part II will explore the structure of the educational systems in Australia’s English-speaking counterparts, the US and the UK, and how these better align with the economic and social priorities of their respective nations. Part III will use these insights in an attempt to paint a broad picture of what an ideal Australian secondary and tertiary education system could possibly look like. I believe that all 7.5 billion people can bring value to our world, we just need to foster the right mindsets and environments to reach that potential.
<urn:uuid:c92c57aa-addf-4855-a87d-0bed3b86d2c0>
CC-MAIN-2019-18
https://www.futurescollective.com/blog-the-collective-education
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.949063
235
2.59375
3
A guest post by Andy Neill, senior product manager at HighQ With many companies and people around the world relying on artificial intelligence, considering the implications of how AI programs can act and affect outcomes (positively and negatively) is too important to avoid. And people, not technology, have the answers. Discussions will continue on what role ethics has in the deployment of AI, but some guidance already exists. In 2017, the House of Lords appointed a select committee on AI. The role of members is to consider the economic, ethical and social implications of advances in AI. As part of its 2017-2019 session report, the committee suggested the following AI code: - AI should be developed for the common good and benefit of humanity. - AI should operate on principles of intelligibility and fairness. - AI should not be used to diminish the data rights or privacy of individuals, families or communities. - All citizens have the right to be educated to enable them to flourish mentally, emotionally and economically alongside artificial intelligence. - The autonomous power to hurt, destroy or deceive human beings should never be vested in AI. This code is similar to Isaac Asimov’s laws of robotics created in 1942. Seventy-six years down the line, narrow AI now actually exists and has progressed further than it would have been possible to imagine so long ago. How does ethical AI impact the legal industry? A fundamental part of the law focuses on justice and ethics. At a recent Law Society event, Professor Richard Susskind recommended that AI practitioners become familiar with the study of ethics, as he did as a law student. He suggested that one cannot look to regulation, to the letter of the law, to tell you what is ethical and what is not; you can only use the law to find out what is ‘legal’ and what is not. There’s also a question of morality, or whether you ‘should’ do something, compared to whether it is permitted. When designing a legal AI system, outcomes must be described in terms of features — what the system will do in response to an action. In any system, unexpected outputs are treated as bugs or undesirable outcomes. In regular programming, one then reviews the code to find the logical programming error that a human has made, and changes it, so the bug is fixed. In AI, specifically machine learning, the system has created its own logic, so the code cannot be changed. So with legal AI, we have to either restrict the techniques used to build artificially intelligent programs to those that can be interrogated to understand their reasoning, or restrict the domain we’re working on to one where there is significant human oversight. In practical terms, that means focusing on the extremes in any given case, not on average or typical inputs when trying to find bugs, because an ethical bug is most likely to appear at the margins. How can we ensure that legal AI is ethical? The test criteria for AI systems dealing with legal matters should be explicitly defined to include scenarios revolving around the marginalised in society. Law firms dealing with volume insurance claims are a prime example. In order to make their processes as efficient as possible, these companies create an AI system that automatically classifies claims as ‘settle’ or ‘contest’. The system is trained based on thousands of previous examples. They’re confident that it can predict which category a claim should sit in. Before going live, they must ensure that their newly formed AI has not accidentally learned the wrong lessons, therefore putting an unethical AI agent to deal with real human dilemmas. The issue could be that the AI has found some hidden metadata, or patterns, in their training data, meaning it made the right outcome, but for the wrong reasons. For example, let’s say that the AI system learned that cases from particular postcodes should always be contested, rather than settled. To avoid this, before the AI agent is created, the firm should check with its ethics panel (a management panel with oversight to approve) the terms of this AI agent, and what constraints there should be. If there isn’t an ethics panel in place, the Law Society recommends that there should be. This would review proposed AI solutions, discuss their dimensions and approve them if they meet ethical standards. Following the creation of the AI agent, there should be a round of ethical testing, alongside functional testing, to ensure that the AI has not learned the wrong lessons. Humans need to think about unethical outcomes of the newly created AI, and therefore must test to ensure that ethical boundaries are not being breached. This is a prime law for lawyers who are trained in ethics, not for AI designers and engineers, who are trained in computer science, maths and physics. The aim of this is to uncover unethical behaviour by the AI, and try and trip it up by giving it deliberately biased data, to see if it comes up with biased outcomes. By retrospectively uncovering the rules that the machine learning algorithm has internalised, you can make sure that they’re going to pay attention to the correct facets, and not to bias or unethical features, such as a claimant’s race or gender. Lawyers are trained and have studied ethics. They must be utilised to succeed in creating ethical AI programs.
<urn:uuid:9a5cbcb7-b815-49f6-9503-67b728f36679>
CC-MAIN-2019-18
https://www.legalfutures.co.uk/blog/whats-artificial-about-ethical-ai-in-the-law-everything
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.953161
1,104
3.140625
3
Metaculus Help: Spread the word If you like Metaculus, tell your friends! Share this question via Facebook, Twitter, or Reddit. 20 more languages extinct by 2021? Linguists estimate that humans use around 7,000 languages. Only a few are considered global or widespread languages. The others, although spoken by small regional groups, are often key to the identity and heritage of their respective cultures. Only 102 languages are considered "International" or "National" and are spoken by 60% of the world's population, despite comprising only 1.4% of all documented modern languages. Globalization, including internet connectivity, international trade, and international travel elevate the importance of these top languages, particularly the six languages with the most speakers: Chinese, Spanish, English, Arabic, Hindi, and Portuguese. Globalization can endanger languages as well because rising generations learn regional and national languages instead of local or traditional dialects. Estimates of endangered languages range from around 20% to around 50% of all documented languages. Hundreds of languages have already been lost, and the current language death rate is between four and six languages per year. Ethnologue, an annual report on language status, reports that 360 languages reported as "living" in their first 1951 report have since been classified as "extinct." 423 languages are considered "nearly extinct," meaning that the only user are aging speakers who have little opportunity to use the language in everyday life. But technology can also help preserve and revitalize languages, with digital documentation and language resources aiming to save some of the most critically endangered languages. Linguists also track languages that are "reawakening," including seven in the United States currently enjoying a resurgence. Will language loss rates increase by the end of the decade? This question will resolve as positive if the 2021 edition of Ethnologue lists more than 380 extinct languages since 1951, which would indicate a language loss rate greater than four per year, and an acceleration in language loss. Metaculus help: Predicting Predictions are the heart of Metaculus. Predicting is how you contribute to the wisdom of the crowd, and how you earn points and build up your personal Metaculus track record. The basics of predicting are very simple: move the slider to best match the likelihood of the outcome, and click predict. You can predict as often as you want, and you're encouraged to change your mind when new information becomes available. With tachyons you'll even be able to go back in time and backdate your prediction to maximize your points. The displayed score is split into current points and total points. Current points show how much your prediction is worth now, whereas total points show the combined worth of all of your predictions over the lifetime of the question. The scoring details are available on the FAQ. Note: this question resolved before its original close time. All of your predictions came after the resolution, so you did not gain (or lose) any points for it. Note: this question resolved before its original close time. You earned points up until the question resolution, but not afterwards. This question is not yet open for predictions. Metaculus help: Community Stats Use the community stats to get a better sense of the community consensus (or lack thereof) for this question. Sometimes people have wildly different ideas about the likely outcomes, and sometimes people are in close agreement. There are even times when the community seems very certain of uncertainty, like when everyone agrees that event is only 50% likely to happen. When you make a prediction, check the community stats to see where you land. If your prediction is an outlier, might there be something you're overlooking that others have seen? Or do you have special insight that others are lacking? Either way, it might be a good idea to join the discussion in the comments.
<urn:uuid:48beb2cd-4afd-483d-9a30-6895d38eaac5>
CC-MAIN-2019-18
https://www.metaculus.com/questions/322/20-more-languages-extinct-by-2021/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.943523
789
3.125
3
New Mexico’s history is intriguing in a way that differs from the rest of the country. I could feel it as I looked at the rugged landscape, witnessed the native influences and sampled the traditional cuisine. Nowhere is this feeling more evident than at Taos Pueblo. Inhabited for over 1,000 years, Taos Pueblo is the only living Native American community to receive the designation as a UNESCO World Heritage site and a National Historic Site. The Pueblo is made entirely of adobe. It’s a stroking structure comprised of many individual homes, built side-by-side in layers with common walls. Today, 150 Native Americans live within the walls of the Pueblo with over 1,900 Taos Indians living on the surrounding Taos Pueblo lands. While the Pueblo evokes the feeling of a living museum, it is actually a living working community. Its residents still speak the native language, Tiwa. They follow traditions which include no electricity or running water within the Pueblo walls. The church of San Gerónimo within the Pueblo is a beautiful example of Spanish mission architecture. Sadly, the original church was destroyed in the Taos Uprising in 1847—its ruins still stand next to the Pueblo’s cemetery. The oral traditions and native language of the Taos tribe are unwritten and unrecorded. Sacred traditions are off-limits to non-tribal members. But at the annual Taos Pueblo Powwow—a gathering of spiritual leaders and tribal members—costumed dancers, singers and other ceremonies provide a glimpse into the intriguing story of these remarkable Native Americans. Terri Marshall is a New York City based freelance writer and editor for several publications. She specializes in multi-generational travel, road trips, and cultural travels for international and domestic destinations. You can find more about her work at www.trippingwithterri.com.
<urn:uuid:f17ff9a4-b42e-48c8-abd6-197bdd19a260>
CC-MAIN-2019-18
https://www.newmexico.org/blog/post/taos-pueblo/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.941978
403
2.921875
3
As a nurse and nursing student, you will learn how to assess the deep tendon reflexes. In this article, I will discuss how to assess the achilles tendon reflex along with a video demonstration. The deep tendon reflex examination is part of the neuro assessment for the nursing head to toe assessment. This assessment is usually conducted during the head-to-toe nursing assessment. Nurses do not routinely assess the deep tendon reflexes unless they work in settings such as labor and delivery or neurology or a patient’s condition warrants it (electrolyte imbalances etc.). Why do nurses assess the deep tendon reflexes? It helps evaluate the lower motor neurons/fibers at certain levels of the body. For example, the triceps reflex evaluates C7 to C8, and the brachioradialis reflex evaluate C5 to C6. Grading Scale for Deep Tendon Reflexes 4+ Hyperactive (clonus) 3+ Brisker than normal (hyperreflexive) 1+ Diminished (hyporeflexive) Demonstration on How to Assess Achilles Deep Tendon Reflex How to Assess the Achilles Deep Tendon Reflex - Find the achilles tendon. - Locate the heel of the foot and dorsiflex the foot. The achilles is found right above the heel. - Now have the patient dangle the foot while you dorsiflex it. - While the foot is dorsiflex, tap with the reflex hammer briskly on the achilles tendon. Expected Response of the Achilles Deep Tendon Reflex You will see the foot plantarflex.
<urn:uuid:a8cc9740-11ac-4ecd-97c6-ebf016ed0b6a>
CC-MAIN-2019-18
https://www.registerednursern.com/achilles-heel-deep-tendon-reflex-assessment/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00411.warc.gz
en
0.773054
346
2.671875
3
Question: What is the first sign of a heart attack? A heart attack! Or… is it? There are several factors that create stress for the heart and circulation. The primary factor is hypertension, or the tension caused in how we respond to our environment. When the body is under relentless stress from the realities of daily life, such as lack of quality sleep, lack of sufficient dietary nutrients (poor digestive absorption), an inability to detoxify (secondary to the stress response), or posture alterations (e.g. text neck, seated posture), it will produce cortisol. This stress hormone will cause blood vessel constriction. If constriction is constant, the effect on the heart (the pump for circulation) is to beat faster and stronger to push blood through the shrunken blood vessel channels out to the capillaries. We are left unable to get oxygen and nutrients to distant tissues. If the pressure continues to increase, the system will eventually fail, which looks like a heart attack, arrhythmia, ventricular contractions, or [insert medical diagnosis of your choosing]. All of this assumes the blood cells themselves are being efficiently created and removed. We have a wide range of red blood cell sizes often overlooked on common blood labs. These will indicate your body’s ability to create blood, which is important because it is your body’s vessel for carrying oxygen and nutrients to tissues and cells as well as removing carbon dioxide and waste/toxins out of cells. As we damage the walls of these tubes, cholesterol begins to build in the arteries as an attempt to barrier off the damage, further restricting the blood vessel. Inability to carry oxygen, nutrients, and waste through the system causes more backups. Now that our body is really under stress, we begin to show signs of liver and gallbladder congestion (e.g. elevated liver enzyme panels, cholesterol, weight begins to accumulate around the midsection) and even kidney problems (e.g. low back pain, kidney stones). Ever see those care engine oil commercials where the viscosity causes built up in the engine leading to ultimate failure? Similarly, the more our body is under stress, the smaller the tubes are for blood to flow. So, while a heart attack comes on rapidly, there are in fact many signs and symptoms to watch out for ahead of a potential heart attack. You may experience midback problems, jaw tension, shoulder tension, low back pain, immune problems, chronic anything, stress from life, and never have a heart attack. However, with US rates of heart attacks at more than 1 per minute, do you want to wait till you have one to do something about it? If you feel tension in your body, get a massage. It’s great way to help you relax. But in addition to the temporary relief we can experience from a massage, we can also maximize our nervous system’s ability to handle the stress when we leave the massage table. Patients often come in thinking that the pain they have been dealing with for 5 years is normal — tension, lack of energy, or an inability to process information quickly, accurately, and efficiently. If that is your reality, then be sure to make an appointment with your Brain Based Chiropractor as soon as possible.
<urn:uuid:7d6e22b3-5a18-4d2e-803b-a52e7d935a63>
CC-MAIN-2019-18
http://inspirelifechiropractic.com/tag/viscosity/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00011.warc.gz
en
0.945368
671
3.171875
3
Formulas are a part of our lives. Numerical and logical thinking play a part in each of these everyday activities, and in many others. We all need the basics but having a more advanced knowledge in math such as geometry, algebra and metric system always helps. Sorry, but copying text is forbidden on this website! The abutments will then press into the ground; because every action will generate an equal and opposite reaction , the ground will push back and create a resistance. Watching the News The polls are in! Time factor affects everyone around the world. First set up the following Table where the quantity is the product of work rate and the time to work together: The time, T, is the total time it would take all the employees to scan the files together. We get the following equation which can only be solved by using algebra: The uses of math for the layperson are essentially endless. Homework is a battleground and she is not even interested in having books read to her. Historically, mathematics has been a subject that many students struggle with. Algorithms are used every day by major search engine companies to help refine searches for the person behind the keyboard. What you'll notice in the above graph is that there is a nearly linear downward trend of my grocery spending. There are several steps needed in order to solve this problem and answer the questions. In our everyday living, we do many things that are related to other things — although not as precisely as in mathematics — and we give values, assign meanings, and so on. The flight departs at 8 a. Making appointments and having a time schedule that works for you requires math. Recipes for different foods vary either in terms of ingredients used or simply by the number of ingredients. For important information about the educational debt, earning, and completion rates of students who attended Grantham's programs, visit. And decorators need to know that the dimensions of their furnishings and rugs will match the area of their rooms. Thus, the flight takes one hour and 40 minutes, not -20 minutes as the time traveler would experience. Even simple maths equations are just around us, like spherical shapes of soap bubbles, ripples on the surface of water. Communication theories take into account different components that describe the nature and dynamics…. Their decisions are based on production costs and on the weather forecast -- which isn't always accurate. Lastly, as a parent who over-schedules after school activities it has been very convenient to be able to drop in to Mathnasium as and when we can depending on sports activities and homework. In terms of home improvement, math can also help the homeowner answer other questions as well. Before the mathematics rules people use barter system. When am I ever going to use math? Obviously math can play a significant role in how someone progresses towards their weight loss goals. Bridges are complex constructions because they have to be able to support varying amounts of weight across large spaces. Deciding where to visit is just the first of a whole bunch of questions. You are making the decision based on how much you 've already turned the knob and the temperature that amount of turns has created. Mathematics is the universal language of our environment, helping mankind explain and create within it for thousands of years. But most importantly, she's understanding the math. This week, Education World tells you about eight great math sites plus a few bonus sites that demonstrate relevance while teaching relevant skills. When am I ever going to use this? During ancient times in Egypt, the Egyptians used math's and complex mathematic equations like geometry and algebra. Algorithms are calculations used to compile a large amount of data and variables into an equation, spitting out the best possible answer. Recipes call for ounces and cups and teaspoons — all measurements, all math. Since my daughter start going to Mathnasium I can notice a big deal of progressive improvement of my daughter. There are many uses of mathematics in real life most likely in jobs like accounting, banking , store manager or just working at a simple fast food store. He knows now that he can do it. You don't want to end up having many tiles or making multiple trips to the store to buy when a little math could have saved you both time and money. These are very simple applications of mathematics. In real life the use of Mathematics can be applicable to every aspect, field, profession and subject etc. For example, in , an elementary activity, students chart their own water use, compare it to that of students around the world, and answer questions about what they've learned. Have you honestly thought about how math is involved in your everyday? You can also compute the cost of microwaving your leftovers or playing computer games. With a little math and some numbers from your utility bill, you can easily calculate how much money you spend leaving the lights on all the time. Probably the single most cited practical application for math in our everyday life is for money management. In our fast-paced, modern world, we can easily get distracted and find the time has blown by without accomplishing what we meant to. It's easy, accessible and cost effective. The work rate, r, in the table is the reciprocal of the time it would take the employee to complete the task by themselves. A good understanding of maths in everyday life is essential for making sense of all the numbers and problems life throws at us. Using a little bit of math can help you cook the right amount of food, so no one is left hungry. These are all applications of mathematics. The most common and essential application of mathematics in daily life is in financial management like spending, investing and saving. Math can help us do many things that are important in our everyday lives. My daughter dislikes schoolwork and doesn't see the value in it - she struggles with math, reading and writing and has always been quiet and unengaged in class. Y is called the dependent variable, and x the independent variable. Here's an example from my personal life: My car was low on coolant so I decided that I needed to fill up the reservoir with some more. This skill also will help them pick the best bank account. While you may not sit down and solve a tricky differential equation on a daily basis, calculus is still all around you. However, even hourly earners will need to know if their working hours multiplied by their rate of pay accurately reflects their paychecks.
<urn:uuid:abf841ba-01b0-4f83-b6de-9c7fbfc3d3b4>
CC-MAIN-2019-18
http://vandgrift.com/application-of-mathematics-in-everyday-life.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00011.warc.gz
en
0.964289
1,302
2.609375
3
Dr. Weeks’ Comment: Cancer cells are adaptive and mutate constantly especially when stressed. Lowering dietary sugar is recommended since cancers preferentially eat glucose but now we see how glutamine can be used when sugar is low. Therefore, glutaminase inhibitors are being studied. Stay tuned! Source: Johns Hopkins Medicine –Study highlights role of glutamine in absence of glucose in growth of B cell tumors Newswise ”” Cancer cells have been long known to have a “sweet tooth,” using vast amounts of glucose for energy and for building blocks for cell replication. Now, a study by a team of researchers at Johns Hopkins and elsewhere shows that lymph gland cancer cells called B cells can use glutamine in the absence of glucose for cell replication and survival, particularly under low-oxygen conditions, which are common in tumors. Writing in the Jan. 4, 2012, edition of Cell Metabolism, Anne Le, M.D., and a team of investigators collaborating with the Johns Hopkins Brain Science Institute, say the finding is critical for developing innovative cancer therapies because it offers “proof of concept” evidence that curbing the growth of B cell cancers can be accomplished by inhibiting a glutamine enzyme called glutaminase. Le notes that although little is known about glutamine’s role in the growth of B cell cancer, the amino acid circulates in the blood at the highest level among the 20 amino acids that do so. The tricarboxylic acid cycle (TCA or Krebs cycle) is classically regarded as a pathway for glucose oxidation. However, the experiments by Le and the team show that B cells oxidize glutamine when glucose is absent. The study also found that when oxygen is scarce, there is enhanced conversion of glutamine to glutathione, an important agent for controlling the accumulation of oxygen-containing chemically reactive molecules that cause damage to normal cells. When the investigators used a glutaminase inhibitor, cancerous growth of B cells was stopped in petri dishes. “The flexibility of the TCA cycle in using both glutamine and glucose pathways may be important for cancer cells to proliferate and survive, especially under the low-oxygen and nutrient-deprived conditions often encountered in the tumor microenvironment,” says Le. Now, perhaps, scientists can exploit that survival strategy to stop cancer, according to former Johns Hopkins scientist Chi Dang, M.D., now at the Abramson Cancer Center at the University of Pennsylvania. “A broader and deeper understanding of cancer cell metabolism and cancer cells’ability to reprogram biochemical pathways under metabolic stress can be a rich ground for therapeutic approaches targeting tumor metabolism,” he says. In addition to Le, an assistant professor in the Department of Pathology at the Johns Hopkins University School of Medicine, other researchers from Johns Hopkins who participated in this study include Sminu Bose, Arvin Gouw, Joseph Barbi, Takashi Tsukamoto, Camilo J. Rojas and Barbara Slusher. The Johns Hopkins Brain Science Institute, where Tsukamoto, Rojas and Slusher are faculty, is pursuing the development of new glutaminase inhibitor drugs.
<urn:uuid:ab676b9c-1f5b-45fd-a2f6-25da54fc8d68>
CC-MAIN-2019-18
http://weeksmd.com/2012/03/adaptive-cancer-cells-eat-glutamine-when-sugar-is-low/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00011.warc.gz
en
0.932124
659
3.015625
3
You should naturally be able to get all the nutrients you need from the food you eat provided it is a well-balanced diet comprised of whole foods, including fruits and vegetables but this doesn’t necessarily mean that it’s time to clean out your medicine cabinet and flush all your supplements down the drain. Multivitamin and mineral supplements are essential. The typical diet nowadays, which contains processed or junk food, is far from nutritious. Here are 13 things you should know about supplements: - Supplements are not a replacement for food rather they should be taken to provide additional nutrients when your diet may be lacking. - Most dietary supplements are safe, but not everyone needs to take all of them to maintain or improve their health. - Some supplements may have side effects and may cause adverse problems if you have certain health conditions. - Dietary supplements are regulated by the Food and Drug Administration (FDA) as foods, not drugs; therefore, unlike medicines, they can’t claim to cure, treat or prevent a disease. - Some supplements such as multivitamins, calcium and vitamins B, C, and D have been shown to enhance health in different ways such as supporting bone health, preventing cell damage and helping the body absorb calcium. - A typical vegan diet does not contain animal products such as meat, milk, and other dairy foods. Therefore, vegans can supplement with Vitamin B12 to minimize their risk of developing low blood levels of this essential vitamin. - Herb supplements such as comfrey (blackwort) and kava have proven effective in treating cancer among other ailments and anxiety respectfully, but they are linked to liver damage. - Mineral supplements such as iron, boron, and selenium can also be dangerous when taken in large doses over extended periods of time. - Some dietary supplements have been shown to interact with prescription medications, or even with each other and may build up to toxic levels in the body. - Research shows that about 95% of all bodybuilding supplements are not safe and are generally a waste of your hard-earned money. For example, plant sterol supplements are effective for reducing cholesterol levels. However, a research study has uncovered that they can accumulate in heart valves and lead to stenosis. - While the health effects and chemical makeup of some common supplements need more study, obviously supplements that are not derived from vitamins and minerals such as fish oil (which promotes heart health among other things) has been shown to have the most science-based evidence to support its use. - In order to be on the safe side when looking for a specific supplement to support your need, your doctor or a registered dietitian should be your first port of call because he or she can help you find out what you need. - Always check for seals of approval that ensures the supplement is not only safe and but also effective in its intended purpose.
<urn:uuid:39c08514-bfbe-4d1d-850d-c406d91683e4>
CC-MAIN-2019-18
http://www.bundaberghealthfoods.com.au/tag/supplements/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00011.warc.gz
en
0.954014
593
2.84375
3
I write a lot about how effective mindfulness exercises can be at reducing stress and improving our physical and mental health. If you are like I was in my anxious days, you might be doubtful. You might ask why or how does it work. Well here is a great article by Warren Tryon from Psychology Today that seeks to answer that question. Mr. Tryon speaks to three key concepts - neuroplasticity, rumination, and mindfulness itself. (You can skip down to the "Neuroplasticity" header if you’re not interested in the super science-y introduction.) Neuroplasticity is the brain's way of learning, remembering, and healing itself. The brain is a great big network of nerve cells that send messages to each other by shooting chemicals across the gaps between them, known as synapses. You can imagine these networks of nerve cells and synapses as a network of highways, streets, and back roads. Over time back roads may turn into large streets, which may in turn, become a highway. We've all seen that old house on the side of a highway and thought what the road must have been like when its first family built it. Well our brains' neural networks are a bit like that - certain pathways can grow and become stronger and more ingrained over time. However, unlike our paved streets and highways, the brain is also good at downgrading pathways that aren't used as much anymore. This process of upgrading and downgrading the pathways between the nerve cells and synapses of our brains is one way to think of neuroplasticity. Now Mr. Tryon's second concept, "rumination," is a bit of a scary one, especially if you're feeling depressed or anxious, so I won't spend too much time on it. "Ruminating" has a specific psychological definition, but basically, when you feel your brain is stuck in a rut, you are "ruminating." This happens when your brain is trying to solve something, but makes no progress. Maybe you always shoot your solutions down (depressive thinking). Or maybe you continuously come up with new problems as soon as you solved the last one (anxious thinking). Bottom line, this type of thinking, this "rumination" is not constructive and it makes us feel terrible. Even worse, this "rumination" can combine with our brain's awesome neuroplasticity to expand those pathways in our brain and hard wire in that repetitive thinking. So now we feel terrible AND our brain helps us relive it again and again. Awesome. However, the beauty of neuroplasticity is that it works both ways. Just as rumination can utilize neuroplasticity for evil, so too can mindfulness use its power for good. As Mr. Tryon writes, "The simplest definition of mindfulness is paying attention to one’s experience in the present moment." When we do mindfulness-based exercises, like yoga and meditation, we shift our attention away from the repetitive thoughts or the troubles of the day and instead focus on the physical world around us - the pattern of our breathing, the movement of the trees, the sound of the wind, the heat of the sun. As we routinely shift our focus in that way, our brain downsizes those pathways in our brain that were so built up by our "rumination." And just as our painful repetitive thoughts used neuroplasticity to hard wire themselves into our brains, so too can mindfulness re-wire our brains so that we automatically shift our focus to the present. How cool are our brains?! Hopefully now you have a better idea of why mindfulness can help. Maybe now you'll go try that yoga or meditation you were putting off. You don't need to do those mindfulness exercises to feel better, but they sure do help. It's science.
<urn:uuid:c385369b-c78d-4aa2-8b8c-2d383e7b3e2d>
CC-MAIN-2019-18
http://www.panicandanxietycoach.com/classroom/2015/10/12/article-why-does-mindfulness-work
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00011.warc.gz
en
0.967055
779
2.546875
3
Recognising the critical issues facing our oceans, the United Nations put in place the Sustainable Development Goals (SDGs) as a universal call to action to end poverty, protect the planet and ensure that all people enjoy peace and prosperity. SDG #14 is an urgent call for action, action for a sustainable future for our oceans and therefore our planet. Why is SDG14 so important? We are dependent on ocean health for our very survival. The temperature, chemistry, currents and life of the world’s oceans drive our planet’s global systems. The very systems that make the Earth habitable for humankind. How we sustainably manage our most vital resource is essential for humanity as a whole. How does BLUE align with SDG14? We started making BLUE in 2015 when WWF had just released its Living Blue Planet Report stating half of all marine life has been lost in the last 40 years, and that by 2050 there would be more plastic in the sea than fish. The same year (2015) countries around the planet adopted the 2030 Agenda for Sustainable Development and the 17 Sustainable Development Goals (SDGs). BLUE tells the story our generation needs to hear. The film’s themes directly align with SDG14 including: preventing and significantly reducing marine pollution; minimising and addressing the impacts of ocean acidification; ending unsustainable and illegal fishing practices; and setting aside and conserving more coastal and marine protected areas. BLUE’s overarching themes are to sustainably manage and protect our most precious resource now and as a legacy for future generations to come. How you can take action The most important function of the SDGs is they provide a road map of what needs to be done and why. They provide a set of goals that can be applied to individuals, communities and organisations. They provide a way to evaluate what we are doing towards a sustainable future. Our future. It’s important to note that some of the goals are actually set pretty low as they are global goals, taking into account small island nations, developing and developed countries. It’s a framework of guidelines that can be adapted to your community, your country, your region. Not all goals may apply but the important thing is to note that a line has been drawn in the sand. Think how your local community, local council, workplace, school, business, can put actions in place to align with SDG14.
<urn:uuid:4a2f0d9b-5003-4925-9439-0add274d0856>
CC-MAIN-2019-18
https://bluethefilm.org/sdg14
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00011.warc.gz
en
0.937896
496
3.375
3
The municipal flag of New Orleans is the representative banner of the city of New Orleans, Louisiana. The flag has a large white field that contains three gold fleurs-de-lis and is bordered on the top by a red stripe and from below by a blue stripe. The presence of the fleur-de-lis, a stylized depiction of a flower and a traditional French symbol, demonstrates the city's French heritage and strong ties to France. The city of New Orleans adopted its official flag in January 1918, having selected its design from nearly 400 ideas submitted to its Citizen's Flag Committee in preparation for the city's bicentennial celebration. The red, white, and blue flag emblazoned with gold fleurs-de-lis combined one proposal's suggested color scheme with decorative elements from another. The patriotic color scheme was suggested by Bernard Barry, then employed as an engraver at A. B. Griswold and Co., jewelers, and the fleurs-de-lis idea is attributed to Gustave Couret, a draftsman with the Diboll, Owen, and Goldstein architectural firm. The official flag of the city of New Orleans was named by the city council in January 1918. The white field is the symbol of government, the blue stripe represents liberty, and the red stripe represents fraternity. The white field is five times the width of the stripes. The three fleurs-de-lis grouped in triangular form represent New Orleans under the principles of government, liberty, and fraternity. Die meisten Serienflaggen sind üblicherweise 150x90cm / 5x3 'oder 90x60cm / 3x2', was oft der Fall ist variieren vom offiziellen Größenverhältnis. Wir bieten jetzt eine speziell angefertigte offizielle Größenoption für unsere vielen unserer Flaggen an.
<urn:uuid:dbd92638-904b-495c-a5e1-b06dddfe18a7>
CC-MAIN-2019-18
https://diversityflags.com/de-lu/4073/new-orleans-flag
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00011.warc.gz
en
0.795227
412
3.078125
3
EdResearch is designed to make finding and evaluating relevant research both easy and inspiring for time-pressed teachers, educationalists and education policymakers. Whether you want to inform your strategic planning, consider new approaches or find a solution to a particular challenge, it's good to have access to research-based evidence, analysis and insights at your fingertips. The use of research to support evidence-informed teaching practice continues to be an education hot topic. It's an Ofsted requirement for schools and can impact positively on every aspect of education – from smarter use of teachers' time to improved student outcomes. But naturally, opinion often differs among researchers and teachers as to what good research looks like, what evidence is 'valid', which research is genuinely helpful in the classroom and which interventions are practical. What EdResearch includes The EdResearch search engine currently signposts over 500 pieces of research (mostly dating from post-2010) and continues to grow on a daily basis. Our policy is to include all types of education research and evidence to encourage discussion and debate. After all, even the most narrow or controversial research can be informative in certain contexts. We don’t offer judgments on the quality of the research, its methodology or relevance. We leave this to the professionals. But to help you assess the validity and usefulness of each piece of research, we encourage our EdCentral members – those at the chalkface of education – to rate and review what they find. The rating and reviews for each piece of research are clearly visible, to help members gauge how the theory measures up to practice, and form their own opinion from the variety of perspectives and insights different people may contribute. Everybody who leaves a rating or review – whether it be to flag up the merits or demerits of a particular piece of research – is contributing to a body of shared knowledge that will help support teachers, schools and pupil outcomes. Our Smart Search is designed to help you find whatever is most relevant to your current professional interests – be it national policy or specific classroom/curriculum-based approaches. For each piece of research, you'll find: - a handy overview of what the research offers - useful details about the piece (publisher, author, dates, CPD opportunities etc.), - links to the research itself, plus information about the author(s) and related commentary - ratings and reviews provided by the EdCentral community. EdResearch entries include: - research papers - and more ... Submit your own education research? We encourage education researchers to upload their own research for inclusion. Whether you work within a research body, an HEI or a school that has undertaken its own Action Research, you can upload and/or link to your research using this form. Not already an EdCentral member? Teachers can join for FREE. Click here to sign up today and access EdResearch immediately The content on EdCentral is provided for general information - and inspiration - only. It is not intended to amount to advice on which you should rely. You must obtain professional or specialist advice before taking, or refraining from, any action on the basis of the content on our site. Although we make reasonable efforts to update the information on our site, we make no representations, warranties or guarantees, whether express or implied, that the content on our site is accurate, complete or up-to-date.
<urn:uuid:349676cf-711e-4f9f-b175-93734bb7c167>
CC-MAIN-2019-18
https://edcentral.uk/about-edresearch
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00011.warc.gz
en
0.938638
685
2.671875
3
For The Epoch Times Do you recall the article, “How to Evaluate Good Art?” published in the 17 – 30 October 2014 issue of the Epoch Times? This article is a technical supplement to it. The five pillars of art appreciation are subject matter, form, colour, lines or brushstrokes, and composition. 1. Subject Matter Subject matter basically signifies what the work is about, or what its theme is. Examples of subject matter include still life (Photo 1), scenery (Photo 2), calligraphy and so on. Form refers to how accurately the objects are depicted. However, there is a difference between accuracy and exaggeration. Occasionally, the artist makes a conscious effort to distort or create an amplified effect (i.e. exaggerate). Photo 3 illustrates an excellent display of form by a world-class portrait artist—notice the superb resemblance to the actual human form and facial expression. An artist can use a variety of colour schemes and techniques to achieve certain effects. Colours contribute to the realism of the artwork, and they can be used to evoke emotions. Photo 4 reflects the artist’s masterly skills in the use of colour—the play of light on the girl’s lustrous hair, the life-like quality of her beautiful eyes, and the strong emotion in the piece. 4. Lines or Brushstrokes Lines or brushstrokes are fundamental elements of Chinese and Western art. You may recall hearing of this term in your first art lesson. (Photo 5: this artwork is done purely in ink; notice the distinct lines and strokes.) Lines and brushstrokes are the fundamentals of visual art. Composition refers to the way objects are arranged relative to one another in a visual space. It is used to create balance, a sense of depth, or to draw the viewer’s focus to the intended subject matter. This aspect usually differentiates an average art piece from a good piece of art. (Photo 6: An example of good composition, in terms of how the people, the field and the building are arranged within a relatively small piece of art). These five pillars are called the aesthetic technicalities of fine art appreciation. In order to understand art at a more intimate level, it may be necessary to further study the philosophical, historical and cultural heritage of the artwork. This will be covered in the next installment of this series. Howard, his wife and his parents actively promote both local and foreign fine arts. They co-manage Da Tang Fine Arts in The Adelphi, #B1-31. From 20 to 30 November 2014, there will be three major art fairs held in Singapore. This will be an opportune time to hone your skills based on what you’ve learnt from my contributions. For those who are keen to obtain free admission tickets to any of these art fairs, you may contact me through the contacts listed on the right. Appreciate Art. Art Appreciates. The photo caption for the article titled ‘How Does Fine Art Improve Our Creativity?’ published in the previous issue of Epoch Times should read ‘(L – R) Mdm Grace Chiang (Howard’s Mum), Artist Wu Xue Li, Mr Howard Yu, Director of Da Tang Fine Arts and Mr Lau Tai San, VP of SCCCI at the launch of the two-month long Art Exhibition held by Da Ta Fine Arts, in Rendezvous Hotel Singapore on 31 October 2014.’ Epoch Times apologises for the error.
<urn:uuid:b21fb035-4cd7-4031-80c3-6ab79d52c1e2>
CC-MAIN-2019-18
https://epochtimes.today/the-5-pillars-of-art-appreciation/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00011.warc.gz
en
0.917217
736
2.953125
3
Archaeologists Unearth 5,000 Year Old Remains of a Possibly Transgendered/Gender Queer Cave Person What do we believe about the Cavemen? They were a primitive and barbaric people who spent their time killing each other and beating women over the head with clubs when they wanted sexy times. However, one reality that Archaeological remains recently unearthed is that a primitive tribe in the Czech Republic may have been pretty tolerant towards their gender queer folk. (I know this article is two years old, but I think it’s still relevant) We’ve heard it all before. Homosexuality is unnatural! It’s a plague of the modern age! Blah, blah blah. Maybe the real plague of the modern age is how poorly we treat those with nuanced gender and sexual orientations. In many different tribal cultures around the world, gender deviance was an acceptable part of life. The Europeans who wrote about Native American tribes stated that there were a few men who would dress and act like women, and were treated as perfectly normal people by the tribe. In some cultures around the world, there are more than 2 accepted genders. In parts of Indonesia, there are five accepted genders. I discuss this more in a previous post: more than two genders? With regards to the skeletal remains mentioned above, they are a male skeleton who was given a woman’s burial rite. The archaeologists do not believe that this was a mistake, since the culture they were studying was very careful and precise with burial rites. Men in this culture were traditionally buried lying on their right side with their heads pointing west, but this man was instead buried on his left side with his head pointing east, which is how women were typically buried. He was also buried with female items, such as an egg shaped pot. Now, we can’t jump to conclusions here. This evidence doesn’t necessarily prove that this caveman was transexual or gay. However, it does shed light on an ancient culture’s willingness to bend gender norms. Definitely some interesting food for thought.
<urn:uuid:27590ca2-e3dd-456a-ab17-e6378478a496>
CC-MAIN-2019-18
https://metal-gaia.com/2013/10/18/archaeologists-unearth-5000-year-old-remains-of-a-possibly-transgenderedgender-queer-cave-person/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00011.warc.gz
en
0.986693
428
2.71875
3
Dogs can suffer from a variety of health problems ranging from intestinal parasites, skin disease and ear infections, eye problems, digestive upset and dental disease. Many of these conditions can cause uncomfortable symptoms for our canine companions. Any pet with severe or persistent symptoms should receive a full veterinary evaluation and workup. Pets with milder or acute symptom flare-ups can be often helped with over the counter medications and topical therapies. Tapeworms are common in dogs and are usually transmitted by ingesting fleas at some point. Other dogs may become infected by ingesting feces of other animals. Tapeworms may cause abdominal bloating, as well as mild digestive upset and anal irritation and itching. Many animal guardians will find flat rice-like segments crawling out of the anus near the tail or even directly in the feces of infected animals. Virbantel is an excellent product that contains two strong worming medications affective against roundworms, hookworms, and tapeworms. HomeoPet Wrm Clear is a natural alternative that is also sometimes effective. In severe cases, prescription medications like Droncit, Cestex or Drontal Plus may be prescribed by some veterinarians. Because of the role fleas play in the life cycle of tapeworms, it is important to implement good flea control with topical products like Advantage II or Frontline Plus in both managing and preventing tapeworm infection. Because humans can become infected it is important to implement treatment and prevention strategies against tapeworms. Worms are a chronic problem in dogs and are also a concern for families. Many pets' intestinal worms can infect humans, and children are particularly at risk. Intestinal worms are especially a problem in young puppies. Left untreated, worm overgrowth may lead to loss of appetite, vomiting, diarrhea, anemia and even death in severe cases. Virbantel is a broad spectrum wormer that can control roundworms, hookworms, and tapeworms. Use Panacur C to control roundworms, hookworms, whipworms, and some tapeworms. Many animal guardians will use over-the-counter Ivomec to worm many dogs, however, careful attention to dosing must be followed to avoid overdose and toxicity. HomeoPet Wrm Clear is a natural alternative for some animal guardians, as is diatomaceous earth. Iverhart Max is a relatively new oral prescription wormer that is often quite effective in treating and preventing intestinal worms, as well as heartworms in many pets. Hot spots often develop as a consequence of inhalant/contact allergies, food allergies or flea bite allergies. Use Be Soothed Tea Tree Oil Skin Relief to kill germs and heal hot spots. This topical spray also fights yeast, bacteria, ringworm and other fungal infections in dogs. HomeoPet Hot Spots is an excellent natural alternative for short term relief of localized topical skin inflammation. In addition, Betagen Spray, Excel Hydrocortisone Spray, and Genesis Topical Spray are also effective options for many hot spots. When bacterial or yeast infections strike our dogs, there are many effective topical treatment options that can alleviate symptoms. Three of my favorite shampoos in these circumstances are KetoChlor Shampoo, Malaseb Shampoo and Malapet Medicated Shampoo. All of these shampoos are effective when there is patchy hair loss and rashes from bacteria, ringworm or yeast. It is also important to implement preventative flea control on all dogs with excellent products such as Frontline Plus, Advantage II, Comfortis or Revolution. Topical shampoo therapy may also help lessen the discomfort of itching and allergies in affected dogs. Epi-Soothe Shampoo and Relief Shampoo are effective options. It is important to allow 7-10 minute contact time for the shampoos to have maximal effect. Oral antihistamines including Chlorpheniramine and Diphenhydramine also may help many allergic pets. Oral fatty acids including Nordic Naturals Omega-3 Pet, Super Pure Omega 3 Soft Chews, Be Well and The Missing Link Ultimate Skin & Coat may often enhance the effectiveness of oral antihistamines or topical shampoo therapy. Yucca Intensive is nature's alternative to steroids without the steroid side effects. It is a natural remedy for itching anywhere on the body, especially the skin and may be used orally or applied directly to the skin. HomeoPet Skin and Itch is an often effective combination homeopathic remedy that may be helpful in some cases. Dental disease is very common in adult and senior dogs and may affect over 3/4 of dogs at these ages. Left untreated, dental disease can lead to dental tartar buildup, gum inflammation/infection, drooling, mouth odor and eventual tooth loss. Dental disease may also lead to infection and inflammation of many other organ systems, including the heart, liver and kidneys. Many dogs need periodic ultrasonic scaling and cleaning at the veterinarian to maintain optimal dental health. Use C.E.T. Enzymatic Toothpaste with enzymes to attack bacteria and odor in your dog's mouth. Dogs love the taste so it is easy to gain their cooperation. Veterinary dentists say that brushing several times weekly is the single best way to help your dog's gums and teeth. Adding C.E.T Aquadent or Be Fresh Dental Care Solution to your pet's water can help with oral health in those dogs who are difficult to handle. Two of my favorite natural products to maintain dental health include Leba III and Vetzlife, which often reduce bacteria and plaque in the mouths of affected pets. Ear infections are very common presentations in small animal veterinary practice, and often are secondary to underlying inhalant/contact allergies and/or food allergies. Hormonal conditions such as a low thyroid may also predispose to secondary ear infection. Certain breeds like cocker spaniels and various retrievers are also prone to ear infections because of the anatomic shape of the ear canals and the buildup of moisture, wax and discharge. Zymox Otic Enzymatic Solution Hydrocortisone Free and Zymox Otic Enzymatic Solution with Hydrocortisone are ideal for ear infections that occur in dogs who do not like to have their ears fussed with. Zymox does not sting or have an offensive odor, and can often resolve long-standing yeast and bacterial infections that have been nonresponsive to other therapies. Nothing does a better job than 1-800-PetMeds Ear Cleansing Solution at keeping the ear environment inhospitable for yeast and bacteria. Use Ear Cleansing Solution every time your dog is bathed or goes swimming to help maintain healthy ears. The ear cleansing solution may also be used safely and preventively in those allergic breeds prone to ear wax build-up and infection. Other compatible products include Epi-Otic Advanced Ear Cleaner and Dermapet malacetic otic to help keep ears clean and dry. Use Eradimite Ear Mite Treatment to resolve irritating, itchy mite infections. Repeat every 2 days to kill mites and relieve your dog of suffering. Mites are contagious, so it is important to treat all pets that may be infected. Many animal guardians will over diagnose their pets with ear mites as a cause of ear discomfort and inflammation. In adult pets yeast and/or bacterial overgrowth are much more common causes of ear infections in pets. The only way of definitive diagnosis of ear mites is through a microscopic exam of ear discharge done by a veterinarian. Eyes that are red and water are painful. Red and inflamed eyes may be due to allergens, foreign bodies or bacterial or viral infections. In severe cases eye ulcers or scratches on the cornea may be seen, which are considered medical emergencies. Deeper eye diseases including glaucoma and retinal diseases may also cause red and inflamed eyes. It is for these reasons that any pet with severely or chronically red or inflamed eyes should receive a full veterinary exam and evaluation. Immediately use LiquiTears to flush and soothe your pet's eyes. This will prevent further irritation and relieve dryness. Paralube Vet Ointment can also be applied to dry and inflamed eyes. I have also found topical cod liver oil, one drop in affected eyes 3 to 4 times daily, also effective in reducing redness, dryness and inflammation. If eye ulcers or other deeper diseases of the eye have been ruled out, than prescription Neo Poly Dex Ophthalmic can be helpful. Excessive shedding can be unhealthy, cause pain and discomfort, and lead to skin problems. Excessive shedding can be due to poor diet or dietary allergies, as well as internal metabolic illness and disease. Any pet who chronically sheds should receive a full medical exam and evaluation. Shed Terminator Chews for Dogs is an excellent oral supplement that has a unique blend of vitamins and omega 3 fatty acids for a healthy coat. Excellent natural diets including Evo, Nature's Variety Dog Food and Halo Dog Food may also help reduce unwanted shedding by providing superior nutrition to our pets. Fatty acid supplements including Nordic Naturals Omega-3 Pet, Super Pure Omega 3 Soft Chews, Be Well and The Missing Link Ultimate Skin & Coat also make excellent supplements in helping reduce shedding when used long term. Soft, loose diarrhea is the sign of a problem in the intestines, often an invasion by bad bacteria. There can be many causes of diarrhea in dogs, including parasites, viral infections, dietary/food allergies, dietary indiscretion, and toxicity, metabolic diseases of the liver, intestinal tract, pancreas or thyroid. Use Fast Balance G.I. and restore the friendly bacteria that return your pet's gut to normal. Feeding broth or a bland turkey and sweet potato home-cooked diet can also help a dog's digestive tract recover from mild or acute diarrhea NaturVet Digestive Enzymes Plus Probiotics is an excellent source of digestive enzymes that can help with digestion and lessening diarrhea. Adding Vetasyl to meals can help as a source of soluble fiber, as well as help regulate bowel movements. If diarrhea persists or is bloody, a full veterinary exam and evaluation for some of the above underlying diseases is recommended. Combatting obesity is a beneficial way to reduce joint dysfunction, and lower the risk of other health issues such as diabetes. I find that feeding dogs low carb, low grain diets in moderate amounts is very effective, along with a good exercise program.
<urn:uuid:4662fb5e-e77e-49e2-8820-46ab4b161e27>
CC-MAIN-2019-18
https://www.1800petmeds.com/education/common-health-problems-dogs-23.htm
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00011.warc.gz
en
0.934571
2,165
2.765625
3
Asthma can develop in childhood, in adolescence, and, as I have experienced, later in life as an adult. However, the only type of asthma that has been linked to shortened height is asthma that develops during childhood. I don’t have asthma, but I can remember some classmates as early as third and fourth grade that needed to carry an inhaler. In one government study, 1,000 children with mild to severe asthma between the ages of 5 and 12 were given inhaler treatments for their asthma. They were given twice-a-day treatments for over four years so that the effects of the medication used could be studied more closely. The children were split into three groups with the first taking budesonide, an inhaled corticosteroid medication. The second group received nedocromil, an inhaled non-steroid medication, and a third group received a placebo. All participants in the study also received albuterol, which is a drug for relief from acute asthma symptoms. The children in the first two groups grew slower at a noticeable rate, but only the children who took budesonide remained shorter, the rest of the participants eventually caught up and started to grow normally. The results were called surprising, one researches commented, because it has always been assumed that the shortened height caused by budesonide was temporary like the other non-steroid medication. The study however, didn’t continue into adulthood so the study wasn’t able to reveal if the participants remained slightly shorter later in life. Other similar studies have been conducted and the ensuing results have conceded that children who take corticosteroid medication through an inhaler for childhood asthma are more likely to be about a half inch shorter as adults. That’s not much of a difference in height, but it does give valuable information about the treatments used for childhood asthma. It raises the question “should we give budesonide to children for asthma?” There are other medications that work, as the study reveals. Perhaps steroids are not the wisest choice of childhood medications. Though the study ultimately found that the height difference in adults who received steroid treatments for asthma as children was usually no more than half an inch, it illuminates an important underlying question. That question is “what other childhood drugs have effects that carry on into adulthood?” If doctors have always assumed that a growth stunt is temporary with steroids used to treat asthma, what else has been ignored and dismissed but actually has repercussions for children when they reach their maturity? - Kelly, H. W., Sternberg, A. L., Lescher, R., Fuhlbrigge, A. L., Williams, P., Zeiger, R. S., et al. (2012). Effect of inhaled glucocorticoids in childhood on adult height. The New England Journal of Medicine, 367, 904-912. - Smith, R. (2012, September 4). Asthma inhalers in childhood linked to shorter height: research. The Telegraph. - Boyles, S., & Chang, L. (2012, September 4). Asthma drug shown to stunt growth. WebMD.
<urn:uuid:949f6979-a5f0-458f-a9da-de941c447601>
CC-MAIN-2019-18
https://www.babymed.com/blogs/jaclyn-stewart/why-childhood-asthma-may-effect-height-adult
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00011.warc.gz
en
0.969696
656
3.1875
3
Kidney stones are very common problem in India and around the globe. It can occur in all age groups. Recently a survey reported that a lot of women in India are suffering with kidney stones during pregnancy. Hence we decided to do this blog on Indian Diet Plan for Kidney Stones. Read on to know about what should be your diet for renal calculi. Image :Copyright: designua / 123RF Stock Photo What is a kidney stone? According to national kidney foundation a kidney stone is a hard mass that forms from crystals in the urine. Nephrolithiasis is the medical term for kidney stones. Natural chemicals in the urine generally stop stones from forming. Abnormality in this function leads to a kidney stone. A kidney stone may be the size of a pinhead or it can be as large as a grapefruit. It can obstruct the urinary pathway causing acute pain and bleeding or blocking the flow of urine. Types of Kidney stones Not all kidney stones are made up of the same crystals. The different types of kidney stones include: - Calcium: Calcium stones are the most common. They can be made of calcium oxalate (most common), phosphate, or maleate. - Uric Acid: This is more common in men than in women. They can occur in people with gout or those going through chemotherapy. This type of stone develops with acidic urine. - Struvite: Mostly found in women with urinary tract infections. These stones can be large and cause urinary obstruction. These stones are caused by a kidney infection. Treating an underlying infection can prevent the development of struvite stones. - Cystine: Cystine stones are rare. They occur in both men and women who have the genetic disorder cystinuria. With this type of stone, cystine — an acid that occurs naturally in the body — leaks from the kidneys into the urine. What Causes kidney stone? - Sedentary lifestyle - Working for long periods in direct sunlight, - Excessive alcohol consumption - Excess tea, and coffee consumption - Indulgence in high fat and sugar loaded indigestible foods - Negligible intake of fresh vegetables - Drinking very less water - Very high protein diet What are the Symptoms of Kidney Stones ? - Burning sensation while urinating - Increased urine frequency - Acute pain in the flanks radiating towards urethra In extreme cases, - Fever with chills might also be associated - Bleeding through the urinary tract How to Treat Kidney Stones ? Before we see the general Indian Diet Plan for Kidney Stones, Let us first see the treatment for kidney stones. he treatment for kidney stones varies depending on the type of stone and the cause. Small stones with minimal symptoms: - No invasive treatment required. - Drink 2 – 3 litres of water. - Pain relievers for mild discomfort with kidney stones. - Alpha blocker is prescribed. It relaxes the muscles in your ureter, helping you pass the kidney stone more quickly and with less pain. Large stones with severe symptoms: - Use of sound waves to break up stones known asextracorporeal shock wave lithotripsy (ESWL). It breaks the stones into tiny pieces that can be passed in your urine. - Surgery to remove very large stones in the kidney, percutaneous nephrolithotomy. - Using anureterscope to remove stones. It breaks stones into pieces which passes in the urine. - Parathyroid gland surgery in certain cases which is caused by overactive parathyroid glands. Home remedies for treatment of kidney stones: Indian Diet Plan for Kidney Stones comprises of various Home remedies from our ancient Indian books. some of the most beneficial home remedies for kidney stones are mentioned below. Pomegranate is highly astringent in nature. Drink a glass of its juice daily or add them to salads or toast. Boil two figs in a cup of water for 15-20 minutes and drink it on an empty stomach early in the morning. High consumption of animal protein can lead to kidney stones. Switch to plant-based protein diet. Add chia seeds, spirulina, green peas, beans, sprouts and soy to your diet. Horse gram / Kulthi : Horse gram dal helps in breaking down bigger stones and then washing them away through urine. Consume 50 – 60 gm kulith dal 2 times a day to treat your kidney stones and avoid the re-occurrence. This is a medicinal plant and very commonly found in India. It helps tremendously in breaking the stone and in eliminating these stones from the body. It is highly anti – inflammatory and antimicrobial and thus helps in Kidney stones and Urinary tract infections. Banana stem Juice : Yes , It is mentioned in our ancient books and Ayurveda swears by it. Banana Stem juice really helps in reliving your from the pain of kidney stones and helps in eliminating it. Insoluble fiber reduces calcium in the urinary tract and binds it to the intestines. Thus calcium is less available to make kidney stones. Include fiber rich whole grains, legumes, fruits, oats, millets and vegetables. What foods are high in oxalates? Beware of the high levels of oxalate in vegetables which is the one of the major causes of stones. Let’s check the list of high oxalate foods. - Sweet potatoes What should I drink for kidney stones? Water is the best option. But to increase fluid intake you can consume - Unsweetened fresh fruit juices - Barley water - Infused water - Pomegranate juice - Banana stem Juice For all kidney stones drink plenty of fluids, unless you have kidney failure. Water helps to dissolve kidney stones fast. The darker the colour of your urine, the more water you need. When your urine is clear or light coloured, you know you’re getting your water right. Consume at least 8 – 10 glasses water daily. What is the best thing to eat when you have kidney stones? One must have - Low sodium, - Low refined sugar, - Normal protein - Flexible oxalate foods and - Ample fluids. Oxalate management is proportional to urine oxalate. Indian Diet Plan for Kidney Stones : So here is a sample of Indian Diet Plan for Kidney Stones. This plan was made to help you understand how you can use the above mentioned foods and home remedies in your daily diet to get rid of Kidney stones. So here it goes , Indian Diet Plan for Kidney Stones. Sample Indian Diet Plan for Kidney Stones: - Early Morning on Empty stomach: 1 teaspoon Mix of basil leaves and honey or 2 figs boiled in a cup of water OR – Eat 4-5 Patthar chatta leaves. 1 cup Wheat bran Flakes with Milk + 1 pomegranate 1 bowl of vegetable daliya + 1 pomegranate 1 glass banana stem juice OR Lemon juice OR Barley water 1 cup salad + 2 Chapatis or 1 cup Brown Rice + 1 cup horse gram Dal + 1 cup Vegetable (avoid dark green leafy vegetables) + 1 glass buttermilk (add little hing for pain relief ) - Evening snack: ½ cup Poha or Upma + 1 glass Barley Water - Late evening: 1 glass Lemonade OR Banana stem Juice Same quantity as lunch - Bed time: 1 cup Milk (no sugar) What foods to avoid if you have kidney stones? - Reduce oxalate intake:The list is mentioned above. - Reduce sodium: It is a part of salt. Sodium is in many canned, packaged, and fast foods. Look for foods labelled: sodium free, salt free, very low sodium, low sodium, reduced or less sodium, light in sodium, no salt added, unsalted, and lightly salted. Check for hidden sodium, such as sodium bicarbonate, baking powder, disodium phosphate monosodium glutamate, or MSG, sodium nitrate or nitrite. - Limit animal protein: Replace some of the meat and animal protein with beans, dried peas, and lentils, which are plant-based foods that are high in protein and low in oxalate - Get enough calcium from foods: In the right amounts, calcium can block other substances in the digestive tract that may cause stones. It is best to get calcium from plant-based foods such as calcium-fortified juices, cereals, breads, some kinds of vegetables, and some types of beans. Ayurvedic remedies for Kidney Stones: According to Ayurveda, improper diet and lifestyle leads to aggravation of all three doshas. There is impairment of the digestive fire causing formation of toxins (ama) in the body. These toxins travel down the channels carrying urine. The aggravated doshaswith toxins cause its crystallization and leading to the formation of kidney stones. Ayurveda concentrates on dietary changes and also the use of diuretic and stone-dissolving herbs in acute cases. The system is then cleaned and strengthened using toning and rejuvenating preparations. - Panchakarma therapy is a very effective means of cleansing the body internally in order to help it regain strength. - 1 teaspoon of powdered preparation of equal quantities of the bark of three-leaved caper tree (varun), puncture pine (gokhru), thatch grass (kas) and horse gram (kulthi). 3-4 times a day with water. - Soak 2 teaspoon of radish seeds in a cup of water, boil and reduce it to half. Strain and drink 1/2 cup of it twice a day. - Boil 10-12 basil leaves in 1 cup of water for 15 minutes. Mix 1 teaspoon of honey in it and take twice a day. Note – You can add these Ayurveda remedies to our Indian Diet Plan for Kidney Stones. How to prevent kidney stones? - Studies have shown that the Dietary Approaches to Stop Hypertension (DASH) diet can reduce the risk of kidney stones. - To prevent calcium stone eat less salt and ready to eat products or outside food. Consume enough dairy products to get daily dose of calcium. - To prevent oxalate stone avoid dark green vegetables, nuts, and chocolate as much as possible. As they are high in oxalates. - To prevent uric acid stones, cut down on high-purine foods such as red meat, organ meats, and shellfish. Follow a healthy diet that contains mostly vegetables and fruits, whole grains, and low fat dairy products. Limit sugar and alcohol because it can increase uric acid levels in the blood. No crash diets. - Eat a balanced diet that is moderate in animal protein like chicken, fish, and eggs. Excess protein may trigger kidney stones. - Increase daily fiber intake. Include whole grains, millets, oats, daliya and variety of fruits and vegetables. - Drink lemonade, its vitamin C helps to prevent kidney stones. - Benefits of Apple cider vinegar on Kidney stones , treatment and side effects - Diet plan to reduce Uric acid More needs to be known about various foods and beverages and their impact on kidney stone formation. Hydration is the key. Ample amount of water, a correct diet and a thorough knowledge of foods is required. Following the above mentioned Indian diet plan for kidney stones will definitely help you in finding relief in your pain and treating your stones. Please feel free to ask us your query by leaving a comment below. We would try to revert to you at the earliest.
<urn:uuid:70dd09b9-c4ad-46de-8ea4-9589401b28a6>
CC-MAIN-2019-18
https://www.dietburrp.com/indian-diet-plan-for-kidney-stones/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00011.warc.gz
en
0.906866
2,470
2.984375
3
Our resources offer comprehensive information and advice about development and education for people with Down syndrome. See and Learn Speech See and Learn Speech is designed to help children with Down syndrome develop clearer speech. It offers activities to teach young children to hear and produce speech sounds, to hear the differences between sounds, to develop their speech sound system, and to produce clear speech. See and Learn Language and Reading See and Learn Language and Reading is a structured teaching programme that is designed to teach young children with Down syndrome to talk and to read. The programme is evidence-based and easy to use at home and at school. See and Learn Numbers See and Learn Numbers is designed to teach young children to count, to link numbers to quantity, to understand important concepts about the number system and to calculate with numbers up to 10. A Reading and Language Intervention for Children with Down Syndrome (RLI) RLI is an evidence-based teaching programme designed for children with Down syndrome aged 5 to 11 years. RLI was evaluated in a randomized controlled trial and found to improve average rates of progress compared to ordinary teaching. Down Syndrome Issues and Information Our Down Syndrome Issues and Information books offer comprehensive information about development, education and adult living for people with Down syndrome. Most are now out of print, but are available as PDF ebooks from our online stores. We are working on new editions and expect to publish these as books and ebooks in 2018.Buy (USA) Buy (UK) Our films offer practical guidance to support effective early intervention and education for children with Down syndrome. They include Activities for babies with Down syndrome, Speech and language activities for preschool children with Down syndrome and Inclusion in practice - Educating children with Down syndrome at primary schools.Learn more
<urn:uuid:8320c51a-952e-4aea-a92d-cf7ce5b6a474>
CC-MAIN-2019-18
https://www.down-syndrome.org/en-us/resources/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00011.warc.gz
en
0.958416
360
4.15625
4
A study led by the University of Granada (UGR) has shown that doping is not only a problem exclusive to professional sports, but also occurs in amateur sports. In an article published in The Sport Psychologist journal, researchers warn that it is necessary to increase control over the doping problem also in popular cycling, conducting campaigns to raise awareness and prevent the consumption of performance-enhancement drugs (PEDs). The team of scientists who carried out this work is made up of researchers from the universities of Granada and Elche, in addition to the Spanish Cycling Federation. According to Medical News Today, to do this, they investigated the relationship between the use of performance-enhancement substances (measured by an anonymous questionnaire) and a number of psychosocial variables: attitude towards doping, self-esteem, self-efficacy and perception of doping substances among cyclists (false consensus effect). The main novelty of this study is that it was performed with a sample of 2003 amateur (non-professional) cyclists, who participated in the race called Quebrantahuesos (named after the bearded vulture, in Spanish) held in Sabiñánigo (Huesca) in 2012. All racers voluntarily participated in a survey conducted by the researchers. The results showed that 8.2% of the sample admitted to having consumed or habitually consuming PEDs. Said consumption was associated with a higher probability of perceiving substance use in cycling as something normal (the so-called 'false consensus effect'), with a more permissive attitude towards doping, and with a lower self-efficacy. Another important factor related to the consumption of doping substances by amateur cyclists who participated in the study was their experience (current or previous) in competitive cycling (at any level): the greater the experience, the greater the likelihood of consuming performance-enhancement drugs. Source article: Relationship between Self-Reported Doping Behavior and Psychosocial Factors in Adult Amateur Cyclists, Zabala, Morente-Sánchez, Sanabria, Mateo-March, Miguel Hernandez, The Sport Psychologist, doi: 10.1123/tsp.2014-0168, publish 1 March 2017.
<urn:uuid:2a471d81-6e57-4991-8eae-cd16fa0a71e9>
CC-MAIN-2019-18
https://www.ncadd.org/blogs/in-the-news/need-to-control-doping-in-amateur-athletes
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00011.warc.gz
en
0.946916
457
2.65625
3
Fish seek two things in particular: food and shelter. Both of these elements change in the winter, food becomes more scarce, and in many parts of the country so do their options for shelter. As temperatures drop, the stream will freeze; places for fish to hide change and so do the places with greatest food-generating potential. Undercuts by slower moving may get blocked by ice. But, as global warming takes effect and we experience a 65 degree weather in January when it warms up, the ice opens up and reveals a new kind of structure that anglers can target: ice shelves. Some time ago I was reading an article by Ralph and Lisa Cutter in California Fly Fisher. In the article, Ralph describes putting on his winter clothes and dry-suit and diving into a semi-frozen Sierra Nevada lake to observe fish and bugs underwater. He describes diving underneath the large ice-shelf to explore the unexplored parts of a frozen lake. I clearly remember the image of cave diving coming into my mind, but I physically felt very cold while reading his words. While I do not have the article to quote from, he describes finding a big concentration of bugs – midges I believe – right at the edge of the ice shelf. Food? Check. Further, most streams and lakes will not freeze to the bottom. The ice that forms in the majority of parts will be a shelf, meaning there will be plenty of places to hide underneath. A predator coming from above would have to piece through the ice to get to the fish. Shelter? Check! Areas where water is flowing into may stay open and are also likely to have a better amount of food coming in. For example, take a look at the foam line in the first picture below, on the opposite side of the stream, the amount of ice there is smaller despite the shadow. And, as they say “foam is home”, as it often indicates places of stronger turbulence that may have taken bugs down as the water plunged into the pool, or water with slightly faster velocity that carries with it some food. I have also noticed fish cruising under ice in places with slower water. In multiple occasions I would see their shadows gliding below the ice. They would come out and often “sip” right by the edge of the ice shelves as in the picture below, reinforcing Ralph’s observation that there are bugs at the edge of the ice. Can you spot the fish in the picture below? This was one fish I did not catch, on purpose. He was very close to the shore, a greenback cutthroat. I spotted him coming from below the ice and eating every time he stepped out of his protected ice cave. He seemed to sip down a bug every minute precisely. I just watched him, in awe, and somehow was able to resist the temptation to cast my fly to him. “Too easy” I thought. Plus, he was having it hard enough with little water that would soon freeze again. It is one of the few fish I have not cast a fly to but remember clearly. I still get as much joy from that memory as from any fish I have ever caught. But, I couldn’t resist his neighbor…
<urn:uuid:c13b4b42-0eaa-4124-8754-5de02113e9ee>
CC-MAIN-2019-18
https://www.tenkarausa.com/ice-shelf/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00011.warc.gz
en
0.977256
665
2.859375
3
Bitcoin lightning network Scaling Bitcoin is perhaps the most debated topic in the cryptocurrency ecosystem. In order for a cryptocurrency to work as a currency, it must be able to provide fast, cheap and seamless transactions for its users. At the moment, Bitcoin’s capacity to handle transactions is terribly limited. Currently the Bitcoin network can only handle around 7 transactions per second. By comparison the Visa credit card network is able to process 24,000 transactions per second. The solution to solving the limitation in the number of transactions which can be processed by the network has been a lengthly debate. For over two years, there has been passionate discussion amongst developers on how to build out the Bitcoin network to meet the increasing number of users who wish to use the platform. In the Bitcoin ecosystem, all transactions that are submitted to the Bitcoin network are vetted by independent computers known as miners. Once a transaction has been validated, it gets included into what is known as a “block” along with other transactions which are also processed. Approximately every ten minutes, a new block is “closed” such that transactions are grouped into blocks which are cryptographically tied to the previous block, creating the Blockchain. The issue of the transaction limit arises because each transaction requires data space, and each block has a maximum capacity of one megabyte. As Bitcoin continues to become more and more accepted as a payment method, the ability of the network to scale to meet the demand is a very pressing issue. When the Bitcoin network is flooded with an excessive number of transactions, the one megabyte block becomes full, and transactions are pushed off into future blocks. In order to avoid this, Bitcoin users are able to boost their transaction fee to jump the processing queue of their transactions, pushing back transactions with normal fees to future blocks. This bottleneck creates a slow, unreliable and expensive user experience. Bigger block size One solution to this issue is to simply increase the block size from one megabyte to whatever size is required in order to process the rising volume of transaction demand. This is what the current Bitcoin Cash (BCH) hard fork of Bitcoin has implemented. The Bitcoin Cash block size currently stands at 32 megabytes, and the developers have signalled that they will keep increasing the block size to meet future demand on their network. However, it’s argued by Bitcoin developers that increasing the block size is a temporary fix to an unending issue, and have compared it to increasing the lanes on a highway which inevitably only leads to more traffic and future congestion. Increasing the block size also makes the network exponentially harder to secure because the attack surface continually grows in size. Furthermore, verifying bigger blocks requires larger and larger data centres, leading to fears of network centralisation. Off chain solution Therefore Bitcoin (BTC) has taken a different approach to scaling its network. Rather than increasing the block size, the Bitcoin developers are working to optimise the use of the limited one megabyte block size. Their solution is to take transactions “off chain” and use second layer solutions to confirm transactions, then utilising the Bitcoin Blockchain as the final settlement layer. The Bitcoin Lightning Network is a second layer solution which is currently being developed on top of the Bitcoin Blockchain. In simple terms, the network will allow a series of transactions to occur off chain, and then eventually settle on the Blockchain such that each “on chain” transaction will have millions, if not billions of transactions within it. The Lightning Network works by users creating what are known as payment channels which enable users to send Bitcoin to each other. These channels allow two parties to send multiple payments to each other, with each individual transaction not hitting the Blockchain until the channel is closed. Taking a step further, users can reach other users through channels as well. Bitcoin lightning network example For example, if Alice has a channel open with Bob, and Bob has a channel with Charlie, and Charlie has a channel with Doug, then Alice is able to send Doug funds through Bob and Charlie. The Lightning Network will allow funds to “net out”, meaning that if Alice owes Bob $10, Bob owes Charlie $10, and Charlie owes Alice $10, the network will net out these balances through a series of transactions in lightning speed. Lightning will also allow users to send micro payments, for example to a broadcaster for every second of video that they watch. Instead of sending sixty payments to the Blockchain for watching a minute of video, only two transactions will register (opening and closing the channel) on the Blockchain after the user has finished watching a video. In short the Lightning Network allows two parties to open a channel for multiple payments, and the payments that are made through that channel will not hit the Blockchain until the channel is closed. This is significant, as arguably unimportant Bitcoin transactions for cups of coffee and other small purchases will no longer require the immense computational power required by the Bitcoin network. If all goes to plan, as the Lightning Network rolls out and is implemented alongside the Bitcoin network, it will create a fast, cheap and reliable solution for scaling Bitcoin.
<urn:uuid:36716657-d80f-41c5-a504-b5f4d147ac37>
CC-MAIN-2019-18
https://www.ultimatemoney.com.au/bitcoin-lightning-network/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00011.warc.gz
en
0.941967
1,035
2.59375
3
In the practice of yoga we have what are known as prana vayus. Prana, meaning “life force” in Sanskrit, is chiefly associated with the breath in Western yoga. However, prana is actually divided into five “winds” or vayus that rule different parts of the body and its systems. These winds are similar to chakras as they have both physical and symbolic properties. Each vayu rules a spatial direction: up, down, inward-upward, spiraling inward and everywhere, respectively. Prana : There is a good reason why the word “prana” has been tied to the breath in Western speak, and this is because the vayu known specifically as the prana vayu governs respiration, swallowing, sensory intake and the mental body. Prana vayu governs inward-upward direction and is located primarily in the throat and heart chakra. When prana vayu is weak, we may misperceive the reality of our surroundings – think of imbalanced prana vayu as intake malfunction in the mental or emotional body. To keep prana vayu strong and healthy, try Leo Yoga or Libra Yoga. Apana : Downward prana is known as apana, located in the lower abdomen (sacral chakra) and pelvis (root chakra). Apana governs elimination in both the physical body (through excretion, urination and menstruation) as well as the subtle body. Just as when the root chakra is weak, we are more susceptible to feeling ungrounded or disconnected from the earth when apana is compromised. To keep apana vayu strong and healthy, try seated or standing poses that require a lot of pressure through the root chakra or feet, such as in Taurus Yoga or Scorpio Yoga. Samana : Spiraling-inward prana is known as samana, located at the solar plexus chakra. Samana translates as “balanced” or “middle” force, so named not only because it lies in the center of the body, but also because it serves as the ultimate point of interconnection for all of the other vayus. Samana governs agni, or “digestive fire,” as well as absorption/assimilation, consolidation, metabolism, homeostasis and discernment. To keep samana vayu strong and healthy, try twisting and folding poses that constrict the organs of the lower abdomen. See Cancer Yoga or Virgo Yoga. Other poses performed on the stomach help spread the fire of samana throughout the rest of the body. Udana : Upward prana is known as udana, located primarily in the throat chakra. Udana governs speech, expression and growth. Balanced udana manifests as articulate and open communication as well as good posture. Try Aries Yoga or Gemini Yoga. Vyana : All-over prana is known as vyana and encompasses the entirety of the human body and spirit, extending infinitely in all directions. Although it does not have an actual location, I associate vyana with the crown chakra. Vyana prana is compromised whenever we feel spiritual disconnect from the Universe. Try Sagittarius Yoga or Pisces Yoga to restore your faith and bliss.
<urn:uuid:24096961-e017-463c-8417-8e246743d459>
CC-MAIN-2019-18
http://astroyogalove.com/faq/what-are-prana-vayus/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.951259
693
2.546875
3
This article relies too much on references to primary sources. (March 2017) (Learn how and when to remove this template message) Anussati (Pāli; Sanskrit: Anusmriti) means "recollection," "contemplation," "remembrance," "meditation" and "mindfulness." It refers to specific meditative or devotional practices, such as recollecting the sublime qualities of the Buddha, which lead to mental tranquillity and abiding joy. In various contexts, the Pali literature and Sanskrit Mahayana sutras emphasize and identify different enumerations of recollections. The three recollectionsEdit The Three Recollections: - Recollection of the Buddha (Pali Buddhānussati, Skt. Buddhanusmrti, Tib. Sans- rgyas -rjes-su dran pa) - Recollection of the Dhamma (Pali Dhammānussati, Skt. Dharmanusmrti, Tib. Chos- rjes- su dran pa) - Recollection of the Sangha (Pali Saṅghānussati, Skt. Sanghanusmrti: Tib. dge -hdun- rjes- su dran pa) The Dhammapada declares that the Buddha's disciples who constantly practice recollection of the Three Jewels "ever awaken happily." According to the Theragatha, such a practice will lead to "the height of continual joy." Unlike other subjects of meditative recollection mentioned in this article, the Three Jewels are considered "devotional contemplations." The Three Jewels are listed as the first three subjects of recollection for each of the following lists as well. Recollection of the BuddhaEdit The standard formula when recollecting the Buddha is: - Iti pi so bhagavā arahaṃ sammā-saṃbuddho vijjācaraṇasaṃpanno sugato lokavidū anuttaro purisadammasārathī satthā devamanussānaṃ buddho bhagavā ti - 'Indeed, the Blessed One is worthy and rightly self-awakened, consummate in knowledge & conduct, well-gone, an expert with regard to the world, unexcelled as a trainer for those people fit to be tamed, the Teacher of divine & human beings, awakened, blessed.' It has been suggested that the Recollection of the Buddha identified in the Theravada canon might have been the basis for the more elaborately visual contemplations typical of Tibetan Buddhism. Another way of saying worthy is that the Tathagata is the pure one. Well-gone can also be interpreted as the accomplished one, or the well-farer. Blessed could be replaced by the word holy, but he was also often referred to as "The Blessed One". Recollection of the DhammaEdit The Teaching of the Buddha has six supreme qualities: - Svākkhāto (Sanskrit: Svākhyāta "well proclaimed" or "self-announced"). The Buddha's teaching is not a speculative philosophy but an exposition of the Universal Law of Nature based on a causal analysis of natural phenomena. It is taught, therefore, as a science rather than a sectarian belief system. Full comprehension (enlightenment) of the teaching may take varying lengths of time but Buddhists traditionally say that the course of study is 'excellent in the beginning (sīla – Sanskrit śīla – moral principles), excellent in the middle (samādhi – concentration) and excellent in the end' (paññā – Sanskrit prajñā . . . Wisdom). - Sandiṭṭhiko (Sanskrit: Sāṃdṛṣṭika "able to be examined"). The Dharma is open to scientific and other types of scrutiny and is not based on faith. It can be tested by personal practice and one who follows it will see the result for oneself by means of one's own experience. Sandiṭṭhiko comes from the word sandiṭṭhika which means visible in this world and is derived from the word sandiṭṭhi-. Since Dhamma is visible, it can be "seen": known and be experienced within one's life. - Akāliko (Sanskrit: Akālika "timeless, immediate"). The Dhamma is able to bestow timeless and immediate results here and now. There is no need to wait for the future or a next existence. The dhamma does not change over time and it is not relative to time. - Ehipassiko (Sanskrit: Ehipaśyika "which you can come and see" — from the phrase ehi, paśya "come, see!"). The Dhamma invites all beings to put it to the test and come see for themselves. - Opanayiko (Sanskrit: Avapraṇayika "leading one close to"). Followed as a part of one's life the dhamma leads one to liberation. In the "Vishuddhimagga" this is also referred to as "Upanayanam." Opanayiko means "to be brought inside oneself". This can be understood with an analogy as follows. If one says a ripe mango tastes delicious, and if several people listen and come to believe it, they would imagine the taste of the mango according to their previous experiences of other delicious mangoes. Yet, they will still not really know exactly how this mango tastes. Also, if there is a person who has never tasted a ripe mango before, that person has no way of knowing exactly for himself how it tastes. So, the only way to know the exact taste is to experience it. In the same way, dhamma is said to be Opanayiko which means that a person needs to experience it within to see exactly what it is. - Paccattaṃ veditabbo viññūhi (Sanskrit: Pratyātmaṃ veditavyo vijñaiḥ "To be meant to perceive directly"). The Dhamma can be perfectly realized only by the noble disciples (Pali: ariya-puggala) who have matured in supreme wisdom. No one can "enlighten" another person. Each intelligent person has to attain and experience for themselves. As an analogy, no one can simply make another know how to swim. Each person individually has to learn how to swim. In the same way, dhamma cannot be transferred or bestowed upon someone. Each one has to know for themselves. Knowing these attributes, Buddhists believe that they will attain the greatest peace and happiness through the practice of the Dhamma. Therefore, each person is fully responsible for his or her self to put it into practice for real. Here the Buddha is compared to an experienced and skillful doctor, and the Dhamma to proper medicine. However efficient the doctor or wonderful the medicine may be, the patients cannot be cured unless they take the medicine properly. So the practice of the Dhamma is the only way to attain the final deliverance of Nibbāna. These teachings ranged from understanding karma (Pāli: kamma) (literal meaning 'action')) and developing good impressions in one's mind, to reach full enlightenment by recognizing the nature of mind. Recollection of the SanghaEdit The standard formula when recollecting the Sangha is: - 'The Sangha of the Blessed One's disciples who have practiced well... who have practiced straight-forwardly... who have practiced methodically... who have practiced masterfully — in other words, the four types [of noble disciples] when taken as pairs, the eight when taken as individual types — they are the Sangha of the Blessed One's disciples: worthy of gifts, worthy of hospitality, worthy of offerings, worthy of respect, the incomparable field of merit for the world.' Practicing masterfully, or practicing with integrity, means sharing what they have learned with others. The five recollectionsEdit The six recollectionsEdit The Six Recollections are: The Buddha tells a disciple that the mind of one who practices these recollections "is not overcome with passion, not overcome with aversion, not overcome with delusion. His mind heads straight, ... gains joy connected with the Dhamma..., rapture arises..., the body grows calm ... experiences ease..., the mind becomes concentrated." The ten recollectionsEdit As Ten Recollections, the following are added to the Six Recollections: In the Pali canon's Anguttara Nikaya, it is stated that the practice of any one of these ten recollections leads to nirvana. The Visuddhimagga identifies the Ten Recollections as useful meditation subjects for developing concentration needed to suppress and destroy the Five Hindrances during ones pursuit of Nibbana. In terms of the development of meditative absorption, mindfulness of the breath can lead to all four jhanas, mindfulness of the body can lead only to the first jhana, while the eight other recollections culminate in pre-jhanic "access concentration" (upacara samadhi). The recollection of death is connected with the Buddhist concept of not-self: devotees recollect on the inevitability of their own demise, and in that way learn to understand that their physical body is not a permanent self. To often reflect in such a way, is believed to strongly affect the devotee's motivations and priorities in life, and to help the devotee become more realistic. ^ For one accomplished in meditative concentration, there is the possibility of attaining the recollection of one's own past lives (pubbenivāsānussati). In this case, anussati is not a meditative subject to achieve jhanic absorption or devotional bliss; it is the actual fruit of practice. An example of one who has achieved such a power is described in the following manner by the Buddha in the "Lohicca Sutta" (DN 12): - "With his mind thus concentrated, purified, & bright, unblemished, free from defects, pliant, malleable, steady, & attained to imperturbability, he directs & inclines it to knowledge of the recollection of past lives (lit: previous homes). He recollects his manifold past lives, i.e., one birth, two births, three births, four, five, ten, twenty, thirty, forty, fifty, one hundred, one thousand, one hundred thousand, many aeons of cosmic contraction, many aeons of cosmic expansion, many aeons of cosmic contraction & expansion, [recollecting], 'There I had such a name, belonged to such a clan, had such an appearance. Such was my food, such my experience of pleasure & pain, such the end of my life. Passing away from that state, I re-arose there. There too I had such a name, belonged to such a clan, had such an appearance. Such was my food, such my experience of pleasure & pain, such the end of my life. Passing away from that state, I re-arose here.' Thus he recollects his manifold past lives in their modes & details...." - Rhys Davids & stede. - For an example, see reference to this type of recollection in Dhammapada, Ch. XXI, vv. 296-8 (Buddharakkhita, 1996 Archived July 13, 2006, at the Wayback Machine). - Buddharakkhita (1996) Archived July 13, 2006, at the Wayback Machine. - Thanissaro (2002) Archived July 2, 2006, at the Wayback Machine. - Gunaratana (1988) Archived March 3, 2016, at the Wayback Machine. - Vandanā, The Album of Pali Devotional Chanting and Hymns Archived November 14, 2012, at the Wayback Machine - Thanissaro (1997a) Archived June 21, 2006, at the Wayback Machine. - Kammalashila (2003), p. 227 Archived November 1, 2006, at the Wayback Machine. For an example of the subject of a typically Tibetan Buddhist visualization, see Tara (Buddhism). - "A pure science of mind and matter" S.N. Goenka. cit. 'Meditation Now: Inner Peace through Inner Wisdom', S.N.Goenka; VRP, Pariyatti Publications - The Buddha had in fact required that his teaching be scrutinized to see for oneself. Thathagathappavedito bhikkave dhamma vinayo vivato virochathi, no patichchanto. (Anguttara Nikayo, Thika Nipatho, Harandu vaggo, Sutta 9) The Dharma vinaya of Thathagata shines when opened for scrutiny, not when kept closed. - AN 3.70 (Thanissaro, 1997b) Archived June 21, 2006, at the Wayback Machine. - Anālayo (2006), pp. 46-7; and, Rhys Davids & Stede (1921-5), p. 45. - For more information about the import of passion, aversion and delusion in Buddhism, see kilesa. - Thanissaro (1997a). As suggested by this quote and discussed further below, Gunaratana (1988) states that meditation on these recollected subjects leads to "access concentration" but not to higher jhanic attainment. - Bimalendra Kumar, ANUSMRITI IN THERAVADA AND MAHAYANA TEXTS, Buddhist Himalaya VOLUME XI 1999–2005 (COMBINED ISSUE)"Archived copy". Archived from the original on 2007-09-28. Retrieved 2007-08-30.CS1 maint: Archived copy as title (link) - For canonical material associated with the recollections of death, body and breath Bullitt (2005) Archived May 17, 2016, at the Wayback Machine refers readers to the mindfulness (sati) practices identified in the Satipatthana Sutta. - Buddhaghosa & Nanamoli (1999), p. 90; and, Rhys Davids & Stede (1921-5), p. 45. - AN 220.127.116.11 – 18.104.22.168 (SLTP, retrieved from "BodhGayaNews" at http://www.bodhgayanews.net/tipitaka.php?title=&record=5554)[permanent dead link]. - See, for instance, Buddhaghosa & Nanamoli (1999), p. 90 ff. - Harvey, Peter (2013). "Dukkha, non-self, and the "Four Noble Truths"" (PDF). In Emmanuel, Steven M. (ed.). A companion to Buddhist philosophy. Chichester, West Sussex: Wiley-Blackwell. p. 35. ISBN 978-0-470-65877-2. - Goodman, Charles (2013). "Buddhist meditation" (PDF). In Emmanuel, Steven M. (ed.). A companion to Buddhist philosophy. Chichester, West Sussex: Wiley-Blackwell. p. 569. ISBN 978-0-470-65877-2. - Anālayo (2006), p. 47. - Thanissaro (1998) Archived July 13, 2006, at the Wayback Machine. - Rhys Davids & Stede (1921-5), p. 45; Fischer-Schreiber et al.. (1991), p. 10; and, Nyanatiloka (undated) Archived November 17, 2006, at the Wayback Machine. - Anālayo (2006). Satipaṭṭhāna: The Direct Path to Realization. Birmingham, England: Windhorse Publications. ISBN 1-899579-54-0. - Buddharakkhita, Acharya (1996). Pakinnakavagga: Miscellaneous (Dhp XXI). Available on-line at http://www.accesstoinsight.org/tipitaka/kn/dhp/dhp.21.budd.html. - Buddhaghosa, Bhadantacariya & Bhikkhu Nanamoli (trans.) (1999), The Path of Purification: Visuddhimagga. Seattle: BPS Pariyatti Editions. ISBN 1-928706-00-2. - Bullitt, John T. (2005). General [Sutta] Index: Ten Recollections. Available on-line at http://www.accesstoinsight.org/index-subject.html#recollections. - Fischer-Schreiber, Ingrid, Franz-Karl Ehrhard, Michael S. Diener & Michael H. Kohn (trans.) (1991). The Shambhala Dictionary of Buddhism and Zen. Boston: Shambhala. ISBN 0-87773-520-4. - Gunaratana, Henepola (1988). The Jhanas in Theravada Buddhist Meditation. Kandy, Sri Lanka: Buddhist Publication Society. ISBN 955-24-0035-X. Available on-line at http://www.budsas.org/ebud/jhanas/jhanas0a.htm. - Kamalashila (1996, 2003). Meditation: The Buddhist Art of Tranquility and Insight. Birmingham: Windhorse Publications. ISBN 1-899579-05-2. Available on-line at https://web.archive.org/web/20061101181404/http://www.kamalashila.co.uk/Meditation_Web/index.htm. - Nyanatiloka Mahathera (undated). Buddhist Dictionary: Manual of Buddhist Terms and Doctrines. Available on-line at https://web.archive.org/web/20070312055853/http://www.yellowrobe.com/dictionary. - Rhys Davids, T.W. & William Stede (eds.) (1921-5). The Pali Text Society’s Pali–English Dictionary. Chipstead: Pali Text Society. A general on-line search engine for the PED is available at http://dsal.uchicago.edu/dictionaries/pali/. - Thanissaro Bhikkhu (trans.) (1997a). Mahanama Sutta: To Mahanama (1) (AN 11.12). Available on-line at http://www.accesstoinsight.org/tipitaka/an/an11/an11.012.than.html. - Thanissaro Bhikkhu (trans.) (1997b). Muluposatha Sutta: The Roots of the Uposatha (AN 3.70). Available on-line at http://www.accesstoinsight.org/tipitaka/an/an03/an03.070.than.html. - Thanissaro Bhikkhu (trans.) (1998). Lohicca Sutta: To Lohicca (DN 12). Available on-line at http://www.accesstoinsight.org/tipitaka/dn/dn.12.0.than.html. - Thanissaro Bhikkhu (trans.) (2002). Tekicchakani (Thag 6.2). Available on-line at http://www.accesstoinsight.org/tipitaka/kn/thag/thag.06.02.than.html. - The Ten Recollections: A Study Guide, by Thanissaro Bhikkhu (1999).
<urn:uuid:164b80a4-d2e0-4047-a3e0-d599901be467>
CC-MAIN-2019-18
http://conceptmap.cfapps.io/wikipage?lang=en&name=Anussati
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.860978
4,275
3.59375
4
This Treehouse Chapel has been alive since Louis IX. In the late 1600s the tree survived a lightning fire that hollowed out the center. Interpreting this occurrence as a holy event, the local priest at the time called for the tree to be turned into a church. The tree was still growing under the kingdom of Louis IX and it survived the Hundred Years War with the English, The Black Death, the Reformation and the Revolution. I thought this photo deserved to be big. An artists version of it, that I found pretty cool. Update: A few photos of what it looks like today:
<urn:uuid:344a2c84-b0f0-4f1d-83a4-a227f88834ae>
CC-MAIN-2019-18
http://curious-places.blogspot.com/2011/02/oak-chapel-allouville-bellefosse-france.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.964901
125
2.59375
3
Approximately 40% of the Earth's terrestrial surface comprises drylands, which are home to more than 2 billion people. These arid areas, which include such diverse ecosystems as deserts, savannahs and tropical dry forests, are threatened by over-exploitation and desertification. With this global problem in mind, scientists at the FAAB are engaged in cutting-edge basic and applicable research to empower sustainable agricultural solutions in arid areas where traditional or conventional methods of agriculture are difficult – or impossible – to implement. Research at the FAAB is focused in two main directions: 1. Soil-Plant-Atmosphere continuum in relation to environmental stress Much of the land that has the potential for agriculture is arid or semi-arid, and plants growing in such areas are subject to harsh environmental conditions (such as drought, high salinity, temperature extremes, and high light intensities) that significantly reduce productivity. The problem is compounded by the increasing salinization of soils due to irrigation malpractices, global warming, and desertification. Scientists at the FAAB conduct research directed to understand the different components of the Soil-Plant-Atmosphere continuum and to enhance crop tolerance to stress, develop biotechnological methods for sustainable crop production, and finding new agricultural uses for inherently tolerant dryland plants. Fields of research include plant biotechnology, molecular biology, metabolomics, physiology, ecophysiolohy, breeding, epigenetics, biochemistry, soil physics, soil chemistry and micrometeorology. The research effort in aquaculture biosystems is focused on two main themes, microalgae and fish farming. R&D on microalgae seeks to maximize the commercial potential of microalgae to produce a variety of biochemicals (such as carotenoids, polyunsaturated fatty acids and algal biofuels) by exploiting the conditions in arid zones—high solar irradiance, high temperatures, and the year-round availability of brackish or seawater. Research on fish is also based on the exploitation of arid-zone resources, in this case the large aquifer beneath the Negev Desert. Research activities focus on fish biology, nutrition and diseases. This research effort is complemented by research on dryland animal adaptations and parasitism. For many of the inhabitants of drylands, livestock production is the major form of agriculture, yet it is also one of the main causes of environmental degradation due to factors such as overgrazing and trampling of vegetation. Scientists at the FAAB are developing innovative solutions to allow sustainable dryland animal production that makes efficient use of water resources with minimal impact on the environment. Prof. Jhonathan E. Ephrath, Director
<urn:uuid:01b363cc-1fb4-4b2c-85d8-c3607d0f90fc>
CC-MAIN-2019-18
http://in.bgu.ac.il/en/bidr/FAAB/Pages/default.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.926435
567
3.75
4
Abstract and Keywords Social media are defined as applications and websites that allow users to share content, usually of their own making. Social media users include individuals and organizations across a broad range of social strata. Key social work organizations, such as the National Association of Social Workers and the Association of Social Work Boards, have begun noting the proliferation of social media usage in education and practice and have begun developing guidelines to govern their use. The American Academy of Social Work and Social Welfare, in their Grand Challenges of Social Work initiative, highlighted social media as an important area of growth for research and education. Despite the field’s nascent enthusiasm, practical and ethical concerns persist. This article defines social media; discusses its usage in social work practice, research, and education; and discusses the ethical and practical considerations in each domain. Social Media Definition and Concepts Social media have changed the way people live their lives: they have revolutionized how people keep in touch over time and space, learn about current events, and communicate with elected officials. The ubiquity of social media in everyday life has impacted how social media are defined and understood. Social media are defined as applications and websites that allow users to create and share content (Carr & Hayes, 2015). An application (also known as an “app”) is defined as a software program that allows a user to generate or modify content. Websites ** are defined as one or more pages located on the World Wide Web (WWW) connected via hyperlink, generated and maintained by the same entity. Social media facilitate the creation and dissemination of content for a variety of purposes, such as entertainment and education. For instance, users can create and share written content (blogs) via Tumblr, WordPress, Medium, or Blogger. Short-form written information, also referred to as microblogging, can be shared via Twitter. Microblogs, as well as long-form content applications like Facebook, can also be used to generate and share images and video. Instagram, Vine, and YouTube are social media applications that primarily use image and video content (Robbins & Singer, 2014). These are just a few examples of current platforms social media users utilize to share content. Social media may include social networking elements, as in the case of Facebook or Twitter, but they are first and foremost defined by the creation and dissemination of user-generated content (Carr & Hayes, 2015). Interactions on social media are mediated through user-generated content, requiring little to no user-to-user interaction. Said another way, social media users can choose whether to interact with a user, their content, both, or neither. Further, social media users can choose how they present themselves, or whether to present themselves at all, translating into an ability to control whether and how one networks with other users (Carr & Hayes, 2015). There are two key distinctions to keep in mind when defining social media. The first concerns the difference between social media sites and social networking sites. As described above, social media enable users to generate and share content. Social media users may disseminate content with little to no interaction with other users. In contrast, social networking sites are defined as WWW-based services that allow users to create a profile, connect to other like-minded or familiar users specific to that site, then “view and traverse their list of connections and those made by others within the system” (Carr & Hayes, 2015, p. 49). The second distinction concerns the relationship between the Internet, the WWW, and social media. The Internet is defined as the infrastructure underlying the global network of computers, while the WWW is an application that facilitates communication between computers that are part of the Internet. Social media require the Internet, but not the WWW. The distinction allows for the inclusion of Internet-based apps, like Snapchat and Instagram, that operate within a closed computer system, as social media sites. In addition to the centrality of the Internet and user-generated content, social media are also characterized by their directionality. Social media users can choose whether to interact with other users in a specific group, all of the users in their network, or all users of the site (Carr & Hayes, 2015). Further, social media users can chose the direction of their interactions: toward themselves or toward their network. Social media are often described as a “millennial” pursuit, referring to persons born between 1981 and 2001, and as being most prevalent among mainstream populations. However, recent research indicates that social media usage is much more demographically distributed (Perrin, 2015). While 90% of persons aged 18 to 29 are on social media, 65% of adults aged 30 to 65 are also social media users. Across binary definitions of gender, social media usage is comparable, with 68% of women and 62% of men claiming to use social media (Perrin, 2015). Across mainstream ethnic and racial categories, social media usage appears comparable between groups: 65% of whites and 65% of Hispanics use social media. Disparities remain, however, when examining social media usage among already marginalized groups. For example, only 35% of those over the age of 65, 50% of low-income households, and 54% of black households are reported to use social media. These figures highlight some of the tensions social workers experience when incorporating social media into practice, teaching, research, and education. Social Media and Macro Social Work Practice The proliferation of the Internet and the advent of social media have revolutionized community organizing around the world. From Occupy Wall Street (Juris, 2012; Tufekci, Freelon, & Gleason, 2013) and the Arab Spring (Howard et al., 2011) to the Black Lives matter movement (DeFreece & Carney, 2016), social movements are using social media to engage citizens and organize actions. The general ease of access to social media through the proliferation of the smartphone allows for content to reach more people using fewer resources. Further, when social media sites have a social networking component, the ability of the message to spread to vastly different networks multiplies, as when things are said to go “viral.” Social Media and Policy Advocacy Social media have also impacted the ways in which individuals and groups engage in policy advocacy. For example, since the election of Donald Trump there have been several attempts by Congress to repeal the Affordable Care Act (ACA). Policy advocacy organizations have leveraged social media to get millions of Americans to directly petition their elected officials with the hashtag #KilltheBill and offering real-time mapping of nearby protests (Indivisible, 2017). Spontaneous protests have erupted in congressional and senate offices, as well as during hearings (Gabbat, 2017). Social media, particularly as accessed through cell phones, has become the preferred coordination tool for social movements around the world (Shirky, 2011). Social media have not only altered the manner with which social movement organize and advocate with elected officials and policymakers, they have also changed the way elected officials and other policymakers engage their constituents. For example, Facebook has an “election integrity” team which works with elections commissions around the world to ensure that election-related pages and accounts are accurate and transparent (Laposky, 2017). The 2008 and 2016 US presidential elections saw campaigns pouring millions of dollars into Facebook, Twitter, and Google Ads (Sanders, 2016). As a result, there were concerns during the 2016 US presidential election that Google searches could adversely impact the election results (Schultz, 2016). An ongoing government investigation is examining the way other countries may have used Facebook ads to influence the election (Entous, Timberg, & Dwoskin, 2017). As a result of this investigation, Facebook has dramatically changed the way application developers can access and use Facebook data (Kastrenakes, 2018). Social Media and Issue Advocacy Macro social workers have begun to employ social media in their own advocacy efforts. The Special Commission to Advance Macro Practice in Social work, initiated by the Association of Community Organization and Social Administration (ACOSA), was launched to advocate for the importance of macro practice to the profession writ large (Reisch, 2017). As part of the advocacy effort, #MacroSW was developed to connect macro social work practitioners around the United States. The hashtag serves to disseminate macro social work teaching resources, employment opportunities, and related advocacy efforts. A weekly twitter chat is also held using the hashtag, enabling macro practitioners and social work scholars to discuss various topics of importance. Recent scholarship has examined the effectiveness of social media use for advocacy. Sitter and Curnew (2016), examining the use of social media for community-based advocacy, identify three forms of social media engagement: call-to-action, blending offline and online efforts in real time, and platform integration. Saxton, Niyirora, Guo, and Waters (2015) examine the use of hashtags for policy advocacy on Twitter by organizational members of a national patient advocacy organization. The authors show that the use of hashtags increased the level of engagement by “followers” of the organizations—individuals who are part of the social network of the advocacy organizations online. Challenges in Using Social Media in Macro Social Work Practice Many possibilities exist for social media use in macro social work practice, but challenges remain. Chief among these challenges are the remaining demographic gaps in social media usage, of particular concern to social workers invested in working with marginalized populations. A universal concern among social work practitioners is the ability to maintain the confidentiality of groups and individuals. For example, the ubiquity of social media has resulted in a plethora of methods to anonymously access the content generated by individuals of social media sites like Twitter and Facebook. One such mechanisms is an application protocol interface (API), which allows web-based applications to communicate with each other and exchange information: both Twitter and Facebook have streaming APIs which allow apps to download information about site users. It is important for social workers to become familiar with these technologies so they will be able to effectively guard against privacy breaches and the unintentional distribution of information. While macro social work practitioners have begun employing social media for advocacy campaigns, much remains to be understood concerning best practices and effective strategies. Macro social worker practitioners must understand the culture of the various social media outlets, particularly if attempting to scale an advocacy campaign. Leveraging social media for advocacy campaigns also depends largely on the scope of the campaign: the tools employed for city- or state-wide campaigns will look different than ones in which a neighborhood is attempting to organize around a given issue. In both cases, dedicated practitioners who understand the culture and language of the social media platform in question will offer the campaign the best chances of success. Social Media and Micro Social Work Practice Given the proliferation of social media, it is likely that social media are widely used by both clients and social workers. Facebook, LinkedIn, and Twitter are three examples of social media platforms through which both personal and professional information may be publicly available. The widespread use of social media by social work practitioners and the individuals and families with whom they work has implications for clinical practice, particularly with regard to boundaries and dual relationships, client privacy, and confidentiality (Reamer, 2013). Social media have created new ways for social workers to interact with clients (Reamer, 2014) and new ways for clients to access support and resources outside of the social worker–client dyad. While these developments bring the potential for creative engagement and intervention, the proliferation of social media has also created ethical tensions for social work practitioners and challenges for social workers engaged in clinical practice (Reamer, 2013). The recently released National Association of Social Workers (NASW), Association of Social Work Boards (ASWB), Council for Social Work Education (CSWE), and Clinical Social Work Association (CSWA) Standards for Technology in Social Work Practice outlines specific recommendations for social workers regarding their use of social media. The recommendations include developing a social media policy, maintaining clear professional boundaries with clients, and advocating for access to technological resources for clients who may otherwise have difficulty gaining access (NASW, 2017). Developing a Social Media Policy A clear social media policy that is in alignment with the ethics and values of the profession can mitigate confusion, safeguard against ethical misconduct, and assist in the maintenance of clear boundaries between the social worker and client. A social media policy typically includes information regarding the social worker’s use of electronic communication, including social networking sites, search engines, blogs, text, and instant messaging applications. Social work practitioners should review their social media policy with clients during the initial meeting and revisit the policy throughout the working relationship as questions arise (NASW, 2017; Reamer, 2013, 2014). Maintaining Professional Boundaries The distinction between the personal and the professional can become blurry if engagement in social media is not intentional. Traditional notions of professional boundaries can be inadvertently ignored, as personal information is made public via social media (Judd & Johnston, 2012; Westwood, 2016). As such, social workers must be knowledgeable about privacy settings and intentional about what types of information is available to the general public. Social workers and clients may share online connections or “friend” networks of which social workers may or may not be aware (NASW, 2017). Disclosure of personal information via social media will have a direct impact on the client–worker relationship. The NASW, ASWB, CSWE, and CSWA Standards for Technology in Social Work Practice state: Social workers who use technology to provide services should take reasonable steps to prevent client access to social workers’ personal social networking sites and should not post personal information on professional Web sites, blogs, or other forms of social media, to avoid boundary confusion and inappropriate dual relationships. Although social workers have a right to freedom of speech, they should be aware of how their personal communications could affect their professional relationship. (2017, p. 8) Advocating for Access Social workers’ commitment to social justice includes advocating for access to technological resources, particularly for marginalized populations that may otherwise not have equitable access to the benefits and resources available via technology (NASW, 2017). Individuals and families can benefit from connecting with others through social media, as these connections may enable them to gain access to needed social work services, acquire helpful information regarding social and health-related needs and challenges, provide connection to others for support, and facilitate participation in democratic processes that may directly impact their well-being. It is in the interest of social work practitioners to assess the technological resources available to their clients and to support their clients in learning ways to engage with social media when such engagement may be beneficial to their well-being. Examples of Social Media Use in Micro Practice When social workers are able to utilize social media in a manner that is in alignment with the values and ethics of the profession, social media open pathways for innovative methods of client engagement and intervention. For example, the Substance Abuse and Mental Health Services Administration (SAMHSA) partnered with Facebook and the National Suicide Prevention Lifeline to create a service geared toward intervening with individuals experiencing suicidal ideation. The service enables individuals to report a suicidal comment they see on Facebook, which will trigger an email to the individual who posted the comment encouraging them to call the National Suicide Prevention Lifeline. They also have the option to engage in a confidential chat session with a crisis worker by clicking on a link (Reamer, 2013; SAMHSA, 2011). Recent research has described benefits of social media engagement among populations of marginalized youth, including sexual minority youth (Craig, McInroy, McCready, Di Cesare, & Pettaway, 2015), transgender youth of color (Singh, 2013), and youth experiencing homelessness (Rice & Barham-Adhikari, 2014). For sexual minority youth, social media use can facilitate the creation of community, knowledge transmission, and self-expression. Sexual minority youth have also reported benefits to expressing their identities online prior to being open about their identities in their offline lives (Craig et al., 2015). Social media use can promote resilience among transgender youth of color, who experience widespread transprejudice and racism. In addition to connecting to other transgender people of color, youth in Singh’s (2013) study described receiving support via Twitter from “models of inspiration,” such as mentors or celebrities, and using social media to access support resources outside of their geographic region. Youth experiencing homelessness are often lacking in personal and social resources. In addition to connecting them to resources that assist in meeting their basic needs, social media provide access to positive social networks for youth experiencing homelessness. Connection to positive social networks is associated with engagement in fewer risk behaviors among youth experiencing homelessness (Rice & Barham-Adhikari, 2014). Social media influence the lives of marginalized young people and open possibilities for positive connections and access to resources that can improve their well-being. Thus, it would benefit practitioners working with marginalized young people to be knowledgeable about the social media platforms utilized by young people and recognize the critical role they play in supporting and connecting youth to community that might not be possible to youth in their offline lives (Craig et al., 2015). Practitioners can more competently serve young people through facilitating the constructive use of social media with their clients and consider the ways that social media engagement can function as prevention and intervention strategies to promote the overall health and well-being not only of marginalized youth but of all clients served. Practitioners may also find social media beneficial in increasing their competence to provide services to the clients with whom they work. For example, the True Colors Fund, a national organization working to address LGBTQ youth homelessness, created the 40 to None Network, a platform for service providers to gain access to best practices and policy updates regarding LGBTQ youth homelessness and to facilitate the exchange of practice-based dilemmas, questions, and answers among practitioners. Through the network, practitioners can access free educational modules, participate in online discussion groups, and share strategies for competently engaging a population that can be difficult to identify and engage in services and create a listing in a directory of service providers working with LGBTQ youth experiencing homelessness. In their directory listing, practitioners can provide examples of affirming aspects of their practice that may be of particular interest to LGBTQ youth experiencing homelessness, such as all-gender restrooms and non-discrimination policies that are inclusive of sexual and gender identity. Practitioners can also upload photos of the physical space in which they work, which allows potential clients to become familiar with the space before arriving in person. The organization has plans to turn the service provider directory into a mobile cell phone application to more readily assist youth experiencing homelessness in connecting with affirming service providers. Social Media and Social Work Research Social media have revolutionized the social science research enterprise through its production of “big data” (Grimmer, 2015; King, 2011). Data are being generated by humans at a depth and breadth unprecedented in human history, generating in turn new research questions and methods with which to answer them. Big data are defined here using the four V’s: volume, variety, veracity, and velocity (Fan & Bifet, 2012; Lukoianova & Rubin, 2014; Russom, 2011), The American Academy of Social Work and Social Welfare (AASWSW) in its Grand Challenges for Social Work initiative, has named the use of big and social data among the challenges to be addressed in two working papers . Social Media and the Grand Challenges for Social Work Coulton et al. (2015) underscore the need for social work researchers to begin developing methodological expertise in big data analysis, including social media data analysis. The authors note that social work is adept at using large administrative data sets, which will translate to foundational knowledge in big data curation and processing. The paper offers recommendations for building big data analysis expertise within a decade, including adopting data science education into master’s and PhD curricula and attracting and retaining scholars passionate about data (Coulton et al., 2015). Big data methods have been employed in child welfare to predict outcomes of interest (for a review, see Russell, 2015), but scholarship pertaining specifically to social media data methods has not yet emerged in the literature. Berzin, Zinger, and Chan (2015) underscore the importance of social work as the principal mental health provider in the United States. According to the authors, social media and other technologies promise to increase social workers’ capacity to deliver more efficient and effective services. Among the paper’s recommendations are increased expertise in areas like gaming, applications, and robotics for mental health service delivery. Social Media as Intervention-Delivery Mechanism An entire issue of the Journal of Technology in Human Services in 2016 was dedicated to examining the use of Web 2.0 technologies in social service delivery. Among the contributions was scholarship examining the intentions of counseling educators to teach students about mental health apps (East, Harvard, & Hastings, 2016), perceived effectiveness of online clinical supervision (Bender & Dykeman, 2016), the use of wireless sensors with mobile-based applications for child safety (Kinnunen et al., 2016), as well as an examination of how social work practitioners adopt technological advances in agency-based settings (Goldkind, Wolf, & Jones, 2016). The issue also offered an examination of social media as a medium for intergroup dialogue (Brady, Sawyer, & Crawford, 2016). Social Media as Data Source The use of social media as a data source in social work research is still an emergent area of inquiry. One key issue pertains to the lack of familiarity of many Institutional Review Boards (IRBs) with the data (Moreno, Goniu, Moreno, & Diekema, 2013). In addition, the classification of research using social media data is unclear: though generated by humans, social media data are often publicly available, either freely through an API or for a fee through a data archiver. Thus, one pertinent question for IRBs is whether social media data research is a secondary data analysis or an active recruitment study, where recruitment takes place through terms and licensing agreements. A related research consideration concerns the means by which social work researchers acquire and analyze social media data. Generally, social media data require basic knowledge of computer language coding, large data storage and retrieval, as well as an understanding of computationally intensive data analysis techniques. While methods to handle large volumes of text and numerical data types are well documented in other fields (see, e.g., Cesare, Lee, McCormick, Spiro, & Zagheni, 2018; Grimmer & Stewart, 2013), social work education has not yet included these methods in standard social work education or research. Further, ethical concerns regarding the use of individual data without appropriate consent, or identification of differences between terms of service agreements and social science informed consent, are equally problematic for social work research employing social media data. Social Media and Social Work Education It is incumbent upon social work educators to ensure that social work students develop competencies regarding the use of social media in social work practice. The NASW Code of Ethics (standard 4.01) calls upon social workers to “strive to become and remain proficient in professional practice and the performance of professional functions. Social workers should critically examine and keep current with emerging knowledge relevant to social work” (NASW, 2008). As such, social work educators must themselves be knowledgeable about the intersections of social media and social work practice, including the previously mentioned issues related to the development of a professional identity, boundaries and dual relationships, client privacy and confidentiality, so they can adequately prepare their students for contemporary practice with individuals, families, communities, organizations, and policy settings. In addition to educating their students about ethical social media use, social work educators have the opportunity to integrate social media into their courses to enhance social work students’ educational experiences. Utilizing Social Media in the Social Work Classroom Social media are changing the way we learn. However, social work education has sporadically incorporated the use of technology, and social media specifically, with inconsistent success rates (Hitchcock & Young, 2016). While many social work educators possess the necessary skills to utilize social media in their daily lives, those skills do not always translate into meaningful pedagogical uses for social media in the classroom (Hitchcock & Battista, 2013; Kilpeläinen, Päykkönen, & Sankala, 2011). Participatory culture provides a pedagogical framework for utilizing social media in social work education (Hitchcock & Young, 2016). The participatory nature of social media engagement enables social work students to create, articulate, and disseminate ideas, both consuming and producing knowledge while engaging with others. The benefits of utilizing social media in educational processes are multiple; social media are best used in social work courses when they help students to achieve learning goals and develop competencies related to the course (Robbins & Singer, 2014). Benefits include the creation of a more student-centered experience, enabling students to demonstrate their grasp of course material when creating social media content; the development of competencies regarding the impact of social media on individual consumers and communities, enabling social work students to more competently engage with clients; the cultivation of collaborative and participatory learning environments; and the extension and application of student knowledge outside of the classroom (Gikas & Grant, 2013; Hitchcock & Young, 2016). Educators across a range of disciplines have begun integrating Twitter, a microblogging platform, into their courses (Hitchcock & Young, 2016). Twitter’s mission is to “give everyone the power to create and share ideas and information instantly, without barriers.” As of 2017, Twitter had over 328 million active monthly users from around the globe. Twitter can be utilized in various ways to enhance student learning. Students may participate in backchannel discussions, which occur simultaneously with a live presentation and enable students to share their reactions, pose questions, and engage with the content being delivered. Students can use Twitter to stay abreast of current knowledge related to social work practice and policy and to contribute to public discourse (Hitchcock & Young, 2016). Educators can facilitate this process by showing students how to identify, follow, and create lists of movement leaders, organizations, advocates, and researchers working within their specific areas of interest, enabling them to curate their own learning based on their specialized interests. Engaging with other social work professionals via Twitter also enables students to begin developing a professional identity. A third way to utilize Twitter in the social work classroom is through Twitter live chats. A live chat refers to a scheduled time when a specific topic will be discussed using Twitter. A Twitter live chat, or “tweet up,” involves the use of a specific hashtag that allows individuals to follow along and contribute to the live discussion. For example, the National Clearinghouse on Families and Youth recently held a live chat (#NCFYTalk) with selected service providers and a documentary filmmaker to explore ways that film can help in the efforts to address youth homelessness. Hitchcock and Young (2016) detailed the implementation and evaluation of a Twitter live chat assignment in social work courses, finding that the assignment further developed students’ social work knowledge and facilitated student engagement with others. In addition to Twitter, some educators have embraced the use of Wikis in their courses. A Wiki is a website that allows its users to collaboratively create and edit its content. Kilpeläinen et al. (2011) described the use of Wikis in teaching social work theory. For the theory course, students were divided into groups responsible for specific topics, such as post-modern social work theories. Each group developed its own Wiki page, collaborating on the creation of content about their theme. They were also responsible for reviewing and commenting on other groups’ Wiki pages. Students responded positively to the collaborative process of knowledge production enabled by the Wikis and appreciated the self-driven nature of the learning process (Kilpeläinen et al., 2011). The use of Twitter and Wikis are two examples of ways social work educators have integrated social media into their courses. While students may possess social media skills, educator competence is integral to the successful integration of social media in the classroom. Robbins and Singer (2014) outline additional uses for social media in social work education, including expanding learning opportunities through collaborative agreements with social work programs in other geographic locations to create a more diverse learning experience; encouraging students to document real life instances of oppression and marginalization using their smartphones to provide real-life content integration into otherwise static discussions; creating content for podcasts, Twitter, or blogs about contemporary social issues being explored in class; and assisting students in the development of their own social media policies. Social Media and Field Education Field education is a core component of social work education, comprising 25% of the graduate social work curriculum, enabling students to receive, develop, and apply practical skills within an organizational setting (Voshel & Wesala, 2015). The NASW, ASWB, CSWE, and CSWA standards regarding technology and field instruction instruct field instructors to address technology use in organizational settings (NASW, 2017). As such, organizations that train social work students must provide clear guidance regarding social media use, particularly around what kind of contact between workers and consumers is permissible (Westwood, 2016). The development of an organizational social media policy that is in alignment with social work values and ethics is a recommended practice. Such a policy would be communicated to students during their orientation (Voshel & Wesala, 2015) and may vary depending on the mission and goals of the organization. In addition to the explanation of an organization’s social media policy, field instructors may wish to discuss with the student any variations between the organization’s social media policy and the school’s social media policy, as well as the use of both personal and professional social media (NASW, 2017). Field instructors play an important role in the education of social work students and in the development of their professional identities. Developing a professional identity and setting professional boundaries are topics that extend beyond the classroom into the field education experience and are important considerations in the training of social work students, in particular regarding their social media use (Westwood, 2016). A clear social media policy, modeled by the field instructor, can help social work students meet their organization’s expectations with regards to contact with clients. Further, field instructors can guide students in the development of a professional social media presence, discussing the type of information that should be available to the public and considering how the information may be perceived by potential employers and consumers (Westwood, 2016). According to Voshel and Wesala, “Agency social workers who are field instructors have the capacity to become great mentors to the next generation of social work students. They must be prepared to address social media related issues as a part of professional practice, particularly focusing on social media relationships” (2015, p. 69). When social work students are supported in the intentional development of a professional social media presence, their careers can be enhanced through an exchange of knowledge and connection to a professional network of colleagues. This article has offered an academic definition of social media; described the use of social media in social work practice, research, and education; and described areas undergoing further consideration. Social media have changed the way human beings live their lives, how they connect with others, and how they acquire information. Social work scholars and practitioners must advance their understanding of the digital world in order to remain relevant in the modern age. Important considerations include the effectiveness of social media as an intervention-delivery medium and as well as a research data source. Social Media in Social Work Education: Westwood, J. (2014). Social work and social media: An introduction to applying social work principles to social media: This book, edited by Joanne Westwood, introduces the use of social media in social work teaching and practice.Find this resource: Mining the Social Web: Russell, M. A. (2013). Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Google+, GitHub, and More. O’Reilly Media, Inc. This book by Matthew A. Russell discusses how to extract and analyze social media data using the R and Python languages.Find this resource: Bit by Bit: Social Research in the Digital Age: Salganik, M. J. (2017). Bit by bit: social research in the digital age. Princeton University Press. This book by Matthew Salganik offers best practices for social science research using computational methods and data (also known as computational social science).Find this resource: Bender, S., & Dykeman, C. (2016). Supervisees’ perceptions of effective supervision: A comparison of fully synchronous cybersupervision to traditional methods. Journal of Technology in Human Services, 34(4), 326–337.Find this resource: Berzin, S., Singer, J., & Chan, C. (2015). Practice innovation through technology in the digital age: A grand challenge for social work.Find this resource: Brady, S. R., Sawyer, J. M., & Herrera, S. C. (2016). Preparing social work students to practice in diverse communities through difficult digital dialogues. Journal of Technology in Human Services, 34(4), 376–393.Find this resource: Carr, C. T., & Hayes, R. A. (2015). Social media: Defining, developing, and divining. Atlantic Journal of Communication, 23(1), 46–65.Find this resource: Cesare, N., Lee, H., McCormick, T., Spiro, E., & Zagheni, E. (2018). Promises and Pitfalls of Using Digital Traces for Demographic Research. Demography, 55(5), 1979–1999.Find this resource: Coulton, C. J., Goerge, R., Putnam-Hornstein, E., & de Haan, B. (2015). Harnessing big data for social good: A grand challenge for social work. American Academy of Social Work & Social Welfare, Working Paper, 11, 1–21.Find this resource: Craig, S. L., McInroy, L., McCready, L. T., Di Cesare, D., & Pettaway, L. D. (2015). Connecting without fear: Clinical implications of the consumption of information and communication technologies by sexual minority youth and young adults. Clinical Social Work Journal, 43(2), 159–168.Find this resource: DeFreece, A., & Carney, N. (2016). All lives matter, but so does race. Humanity & Society, 40(2), 180–199.Find this resource: East, M. L., Havard, B., & Hastings, N. B. (2016). Mental health mobile apps’ instruction: Technology adoption theories applied in a mixed methods study of counseling faculty. Journal of Technology in Human Services, 34(4), 301–325.Find this resource: Entous, A., Timberg, C., & Dwoskin, E. (2017, September 5). Russian operatives used Facebook ads to exploit America’s racial and religious divisions. Washington Post.Find this resource: Fan, W., & Bifet, A. (2012). Mining data: Current status, and forecast to the future. SIGKDD Explorations, 14(2), 1–5.Find this resource: Gabbat, A. (2017, September 23). All hands on deck: Protesters to target healthcare bill at rallies across US. The Guardian.Find this resource: Gikas, J., & Grant, M. M. (2013). Mobile computing devices in higher education: Student perspectives on learning with cellphones, smartphones & social media. The Internet and Higher Education, 19, 18–26.Find this resource: Goldkind, L., Wolf, L., & Jones, J. (2016). Late adapters? How social workers acquire knowledge and skills about technology tools. Journal of Technology in Human Services, 34(4), 338–358.Find this resource: Grimmer, J. (2015). We are all social scientists now: How big data, machine learning, and causal inference work together. PS: Political Science & Politics, 48(1), 80–83.Find this resource: Grimmer, J., & Stewart, B. M. (2013). Text as data: The promise and pitfalls of automatic content analysis methods for political texts. Political analysis, 21(3), 267–297.Find this resource: Hitchcock, L. I., & Battista, A. (2013). Social media for professional practice: Integrating Twitter with social work pedagogy. Journal of Baccalaureate Social Work, 18(Suppl. 1), 33–45.Find this resource: Hitchcock, L. I., & Young, J. A. (2016). Tweet, Tweet!: Using live Twitter chats in social work education. Social Work Education, 35(4), 457–468.Find this resource: Howard, P. N., Duffy, A., Freelon, D., Hussain, M. M., Mari, W., & Maziad, M. (2011).Social science research network. Opening closed regimes: What was the role of social media during the Arab Spring? Indivisible. (2017). #KillTheBill events: Find an event. Indivisible.Find this resource: Judd, R., & Johnston, L. (2012). Ethical consequences of using social network sites for students in professional social work programs. Journal of Social Work Values and Ethics, 9(1), 5–12.Find this resource: Juris, J. S. (2012). Reflections on #Occupy everywhere: Social media, public space, and emerging logics of aggregation. American Ethnologist, 39, 259–279.Find this resource: Kastrenakes, K. (2018, March 21). Facebook will limit developers’ access to account data. The Verge.Find this resource: Kilpeläinen, A., Päykkönen, K., & Sankala, J. (2011). The use of social media to improve social work education in remote areas. Journal of Technology in Human Services, 29(1), 1–12.Find this resource: King, G. (2011). Ensuring the data-rich future of the social sciences. Science, 331(6018), 719.Find this resource: Kinnunen, M., Mian, S. Q., Oinas-Kukkonen, H., Riekki, J., Jutila, M., Ervasti, M., . . . & Alasaarela, E. (2016). Wearable and mobile sensors connected to social media in human well-being applications. Telematics and Informatics, 33(1), 92–101.Find this resource: Laposky, M. (2017, September 21). Facebook’s election ad overhaul takes crucial first steps. Wired.Find this resource: Lukoianova, T., & Rubin, V. L. (2014). Veracity roadmap: Is big data objective, truthful and credible?Find this resource: Moreno, M. A., Goniu, N., Moreno, P. S., & Diekema, D. (2013). Ethics of social media research: common concerns and practical considerations. Cyberpsychology, behavior, and social networking, 16(9), 708–713.Find this resource: National Association of Social Workers. (2017). NASW, ASWB, CSWE, & CSWA Standards for Technology in Social Work Practice.Find this resource: National Association of Social Workers. (2008). Code of ethics of the National Association of Social Workers.Find this resource: Perrin, A. (2015). Social media usage. Pew research center, 52–68.Find this resource: Reamer, F. (2014). Clinical social work in a digital environment: Ethical and risk management challenges. Clinical Social Work Journal, 43(2), 120–132.Find this resource: Reamer, F. (2013). Social work in a digital age: Ethical and risk management challenges. Social Work, 58(2), 163–172.Find this resource: Reisch, M. (2017). Why macro practice matters. Human Service Organizations: Management, Leadership & Governance, 41(1), 6–9.Find this resource: Rice, E., & Barman-Adhikari, A. (2014). Internet and social media use as a resource among homeless youth. Journal of Computer-Mediated Communication, 19(2), 232–247.Find this resource: Robbins, S., & Singer, J. (2014). From the editor: The medium is the message: Integrating social media and social work education. Journal of Social Work Education, 50, 387–390.Find this resource: Russell, J. (2015). Predictive analytics and child protection: Constraints and opportunities. Child Abuse & Neglect, 46(Suppl. C), 182–189.Find this resource: Russom, P. (2011). Big data analytics. TDWI best practices report, fourth quarter, 19(4), 1–34.Find this resource: Sanders, S. (2016, November 7). Social media’s increasing role in the 2016 presidential election. National Public Radio.Find this resource: Saxton, G. D., Niyirora, J. N., Guo, C., & Waters, R. D. (2015). #AdvocatingForChange: The strategic use of hashtags in social media advocacy. Advances in Social Work, 16(1), 154–169.Find this resource: Schultz, D. (2016). Could Google influence the presidential election? Science.Find this resource: Shirky, C. (2011). The political power of social media: Technology, the public sphere, and political change. Foreign affairs, 28–41.Find this resource: Singh, A. (2013). Transgender youth of color and resilience: Negotiating oppression and finding support. Sex Roles, 68(11–12), 690–702.Find this resource: Sitter, K. C., & Curnew, A. H. (2016). The application of social media in social work community practice. Social Work Education, 35(3), 271–283.Find this resource: SAMHSA (2011). Retrieved from https://blog.samhsa.gov/2011/12/13/new-partnership-between-facebook-samhsa-and-the-national-suicide-prevention-lifeline. Tufekci, Z., Freelon, D., & Gleason, B. (2013). #Occupy Wall Street. American Behavioral Scientist, 57(7), 966–982.Find this resource: Voshel, E., & Wesala, A. (2015). Social media & social work ethics: Determining best practices in an ambiguous reality. Journal of Social Work Values and Ethics, 12(1), 67–76.Find this resource: Westwood, J. (2016). Social media in social work education: Developing teaching and learning strategies. Routledge International Handbook of Social Work Education.Find this resource: Westwood, J. (2014). Social work and social media: An introduction to applying social work principles to social media. Social Work Education, 33(4), 551–553.Find this resource:
<urn:uuid:53dc432f-49da-43a3-991c-d19466a17c5a>
CC-MAIN-2019-18
http://oxfordre.com/socialwork/view/10.1093/acrefore/9780199975839.001.0001/acrefore-9780199975839-e-1327
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.90635
9,022
3.59375
4
Father’s Day was first celebrated in 1910, after Sonora Smart Dodd, of Spokane, Washington adamantly fought to have fathers nationally recognized for their importance to the family. She felt that good fathers who weren’t living up to the reputation of being sleazy, drunk, and lazy should be given just as much credit for the family’s well-being as the mother was being given. Grace Golden Clayton of Fairmount, West Virginia, is also accredited with the founding of Father’s Day. However, she campaigned for it on a more local rather than national level. Even though Mother’s Day caught on quickly, Father’s Day was slow to be accepted as a national holiday. Mother’s Day was designated a holiday in 1914, but Father’s Day didn’t become a permanent national holiday until 1972. In the past hundred years, social perspectives of fathers have drastically changed. Before 1910, fathers were usually profiled as being tough, practical, strict disciplinarians, and unsentimental. Fathers fulfilled the role of being the family’s hard working financial backbone and generally went un-noticed as human beings by other family members. Later, in the early 1900s, fathers started earning the reputation of being sleazy, drunk, and lazy, especially as single mother household rates rose higher. Either perspective projected images of fathers who seldom spent time with their children. Thus, Father’s Day gifts were mostly impersonal type items, possibly with a monogram added to the item to make it more personal. Now that modern technology and social gender roles have changed, fathers have been able to participate more in family life. Fathers are now usually profiled as fun-loving and caring, as well as hard working and strict disciplinarians. A change in the types of gifts given to dads has occurred due this altered perception. Family members now realize that Dad may want a gift that has nothing to do with what he needs. Dad may have hobbies and other interests besides work. These hobbies, interests, and emotions create a much wider range of possible gifts for Father’s Day. This year’s popular gift ideas are very diverse. They range from giving Dad a roll of duct tape to creating a special “man-cave” for him. Although tools are still included as popular gifts, the recommended tools are now tools used for hobbies rather than work related. Or they are tools that can be used for both pleasure and work. Paul Bianchina, writing for Inman News and NewsOK, suggests getting the following tools as gifts: Final Cut 7¼-inch saw blade, Craftsman cordless pruner (Model 74431), Tek4 Audio plus noise suppression headphones (Model RP4530), Dremel 8200 cordless rotary tool (Model 8200), Black & Decker 24 Volt cordless trimmer/edger (Model NST1024), and a Bosch Pocket Driver (Model PS21-2S). The ideal gift will depend on the individual dad. Customized apparel is considered suitable, especially if it relates to hobbies or favorite sports. Glenn Haege, a columnist for the Detroit News, prefers gifts like foam, rubber soled covers for work boots and shoes, form-fitting work gloves with gripping capabilities, a tool for cleaning grooves and crevices, a fire pit/grill mat, or a snow melting mat for the porch and sidewalk. Yet, Tim Spiro, who has collected sports and celebrity memorabilia for more than 40 years, would like more space for his “Spiro Hall of Fame” man-cave. Broadcaster and show host Kevin Rolston prefers spending a day with his kids without them complaining, doing the things he did as a kid. He would also like an art kit so he can create rudimentary paintings for his kids, as a returned favor for all the elementary school artwork they gifted him to display. Most of all, Mr. Rolston simply wants a hug from his kids for Father’s Day. Robert Weil, a small business owner from Boynton Beach, Florida, agrees with Kevin Rolston about spending time with his kids. For his Father’s Day gifts, Mr. Weil wants a private yacht charter for a dive trip on the Great Barrier Reef, or a special lunch date at his favorite restaurant in Boynton Beach. Most of all, Robert Weil wants to spend the day with his kids so he can enjoy getting to know them better. Bill Adams, a radio personality at 107.9 WIRK, also agrees with Kevin Rolston and Robert Weil. His dream gift is a trip to see a game at every Major League Baseball park, with his second choice being a beer making kit. However, he thinks the most priceless Father’s Day gift is any gift made by his children, even if he can’t figure out what it’s supposed to be. So this year, do something memorable with your dad for Father’s Day. Take lots of photos and collect souvenirs of the time together. Then as a final gift, help Dad to remodel a space so he can proudly display the photos and souvenirs.
<urn:uuid:602966c3-eb7e-4a9c-8579-2a1e8289b7ac>
CC-MAIN-2019-18
http://thehousingforum.com/fathers-day-is-on-june-20-2010-do-you-have-a-gift-ready-yet/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.967998
1,084
3.09375
3
Choosing what to plant together for the happiest, healthiest garden is called “companion planting.” Companion planting is the practice of growing plants next to each other for mutual benefit. This can happen because a companion attracts beneficial or repels harmful insects, or because the natural chemicals found in or produced by a plant improve flavor or growth. I have scoured the web for lists of what each vegetable likes and dislikes, put it all into a color-coded chart, and here you go! - Download the file here. - Look in the top row for the vegetable you are interested in. - The column of vegetables underneath is color coded. - Red is bad, yellow is good, green is best Try it out and let me know how it works for you!
<urn:uuid:8c128312-8962-41a0-9be0-9ada8f4bb46e>
CC-MAIN-2019-18
http://www.mysquarefootgarden.net/companion-planting/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.930862
164
2.796875
3
“The snow was endless, a heavy blanket on the outdoors; it had a way about it. A beauty. But I knew that, like many things, beauty could be deceiving.” ― Cambria Hebert, Whiteout Damage to trees and shrubs by heavy snow and ice accumulation, or by snow removal efforts, may produce plant symptoms that don't become evident until late spring or early summer. Connecting cause with effect can be difficult because the source of the damage is long gone by the time symptoms appear. Outright branch breakage remains obvious and easy to diagnose. However, serious damage to the vascular xylem may occur without branch breakage. Test this for yourself by listening closely as you slowly bend a winter-rigid tree branch. The slight cracking sounds you hear before the branch snaps isn't just the structural matrix failing, it's also the vascular tissue slowly coming apart. This can happen to branches weighted down with heavy snow or ice. If the branch doesn't break, the subtle disruption of vascular flow may not be revealed until late spring or early summer when leaves or needles on random branches rapidly turn brown. Snow removal efforts can also lead to difficult-to-diagnose damage this coming growing season. Of course, snow removal on streets, sidewalks, and parking lots is a necessity for safety reasons. On the other hand, spring snowmelt may reveal less-than-careful snow removal efforts. Large gouges in tree trucks. Broken branches on both trees and shrubs. I took pictures a few years ago of a large yew that had been ripped from its root moorings by an overzealous plow operator. The springtime bands of brown grass or browned shrubs next to sidewalks, driveways, and roadways are a dead giveaway that salt or some other deicing compound were used during the winter. However, salt-ladened snow thrown by a snow blower may provide one explanation for plant damage caused by high soluble salts concentrations in soils far from an obvious source (e.g. sidewalks, driveways, etc.). Sometimes, plant damage simply cannot be avoided. The challenge will be matching cause with the effect this coming spring. It's important to make notes now on where and how much snow was plowed into landscapes. Was the snow-laden with salt? How much and how often was a deicing chemical used? This is not about playing the blame game. It's about successfully diagnosing the myriad of plant damage symptoms caused by snow, ice, or snow removal this winter that may appear this coming growing season. Written notes can provide a helpful diagnostic context because our memories tend to melt away like snow. "Snowflakes are one of nature's most fragile things, but just look what they can do when they stick together." ― Vista M. Kelly
<urn:uuid:3edc85c3-5004-4d58-bc09-1b594707bb1c>
CC-MAIN-2019-18
https://bygl.osu.edu/index.php/node/1208
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.965784
580
2.84375
3
Civil War Battle of Fredericksburg The Red Badge of Courage: A New Kind of Courage The Red Badge of Courage… is the narrative of two processes: the process by which a raw youth develops into a tried and trustworthy soldier, and the process by which a regiment that has never been under fire develops into a finished and formidable fighting machine. —Sydney Brooks, unsigned review, Saturday Review, January 11, 1896, lxxxi, 44-5 on the Red Badge Home Page of the EDSITEment resource American Studies at the University of Virginia No intelligent orders are given; no intelligent movements are made. There is no evidence of drill, none of discipline. There is a constant, senseless, and profane babbling going on, such as one could hear nowhere but in a madhouse. Nowhere are seen the quiet, manly, self-respecting, and patriotic men, influenced by the highest sense of duty, who in reality fought our battles. It can be said most confidently that no soldier who fought in our recent War ever saw any approach to the battle scenes in this book… The book is a vicious satire upon American soldiers and American armies. The hero of the book … betrays no trace of the reasoning being. No thrill of patriotic devotion to cause or country ever moves his breast, and not even an emotion of manly courage. —General Alexander C. McClurg, letter to the Dial, April 16, 1896, XX, 227-8 on the Red Badge Home Page of the EDSITEment resource American Studies at the University of Virginia In The Red Badge of Courage, Stephen Crane presents war through the eyes—and thoughts—of one soldier. The narrative's altered point of view and stylistic innovations enable a heightened sense of realism while setting the work apart from war stories written essentially as tributes or propaganda. One early reviewer declared that reading the novel "impels the feeling that the actual truth about a battle has never been guessed before." But the conservative General Alexander C. McClurg, in the magazine "The Dial," attacked the work as a "vicious satire upon American soldiers and American armies," with a central character motivated neither by "thrill of patriotic devotion to cause or country" nor "an emotion of manly courage." Though Crane is critical of abstract sloganeering about the manly virtues prized by McClurg, he is far from dismissive of or uninterested in those virtues. McClurg regarded the novel as unpatriotic and cowardly. The novel's more nuanced exploration of such values will be explored by students with a close reading of Chapter 23 in comparison with a more traditional tale of combat and a systematic look at McClurg's accusations. Using their new understanding, students will be asked to select one of three published endings to The Red Badge of Courage best suited to their understanding of Crane's exploration of values in the novel. Note: This lesson may be taught either as a stand-alone lesson or as a companion to the complementary EDSITEment lesson The Red Badge of Courage: A New Kind of Realism. Provide examples of Crane's treatment of the "manly virtues" associated with war using support from the text of The Red Badge of Courage Describe the three published endings of The Red Badge of Courage and the difference each might make on a reader's interpretation of the novel. How does Stephen Crane treat "the process by which a raw youth develops into a tried and trustworthy soldier" in The Red Badge of Courage? What is the novel's view of values such as courage?
<urn:uuid:7d5e02c0-71fd-4609-8dbf-f72248861609>
CC-MAIN-2019-18
https://edsitement.neh.gov/event/civil-war-battle-fredericksburg
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.939102
730
2.75
3
Back in July 2017, the Ohio General Assembly passed legislation permitting students in the class of 2018 to graduate based on weakrecommended by the State Board of Education. These options allowed young people to receive diplomas without demonstrating standard . Rather, students could graduate via easier means such as school attendance, course grades, a senior project, or volunteer hours, among others. One of the chief concernsraised about offering lower-level graduation pathways is that they would be yet another manifestation of the “soft bigotry of low expectations”—the offensive belief that low-income students or students of color cannot meet the same standards as their peers. If indeed these alternative routes were used primarily by less advantaged groups, it should be cause for grave concern, especially as state legislators mull an extension of the weaker requirements to . Regardless of socioeconomic background, all young men and women deserve an equal opportunity to meet challenging standards, and they all need to be well-prepared for what comes after high school, whether that is college, career, or military service. Last December, state authorities released graduationfor the class of 2018. These include the percentage of students in each district who graduated by meeting the original versus alternative pathways. Unfortunately, the data are not reported by subgroup—something that absolutely should be done—so we don’t know with certainty how many low-income students or students of color graduated via the alternatives, either statewide or in each district. Nevertheless, the data are revealing. The following charts compare districts’ overall demographic data with the percentage of graduates meeting alternative requirements. Our interest is tracking districts that permitted relatively large numbers of students to graduate under less rigorous requirements. Thus, we consider the ratio of students using alternatives to districts’ overall graduation rates, thereby excluding non-graduates from the calculation. Figure 1 shows that higher-poverty districts generally had more young people graduate via low-level alternatives, suggesting that Ohio’s low-income students likely used these options more frequently than their peers. However, we do see some variation across districts of similar poverty levels. For example, at the 100 percent economically disadvantaged (ED) level, the fraction of districts’ graduates using alternatives ranges from about 10 percent to a staggering 70 percent. These differences indicate that, although higher-poverty districts were more likely to succumb to the lower bar, it wasn’t inevitable. Figure 1: Relationship between district poverty and graduates receiving alternative diplomas Source:. Note: This chart displays the correlation between districts’ percentage of economically disadvantaged students in all grades K–12 and the percentage of graduates (excluding non-graduates) in the class of 2018 who received diplomas through alternative routes. Figure 2 looks at whether districts that enroll more students of color, either black or Hispanic, were more likely to allow students to graduate via alternatives. We again see a correlation. Particularly troubling is the high rates of alternative use in districts serving upwards of 50 percent students of color. Among them are urban districts like Cleveland, which graduated 59 percent of its class of 2018 through alternatives; Youngstown at 59 percent; Dayton at 47 percent; Toledo at 46 percent; Trotwood-Madison at 43 percent; and Akron at 42 percent. The state’s largest school district, Columbus City Schools, which enrolls 66 percent students of color, graduated 39 percent of its class of 2018 via low-level alternatives. Notable also is the variation among the nearly all-white districts at the lower left-hand corner. Some districts—likely more economically disadvantaged, as suggested in figure 1—graduated upwards of 30 percent through alternatives, though others had very few students meet requirements in this way. Figure 2: Relationship between district students of color and graduates receiving alternative diplomas Source:. Note: This chart displays the correlation between districts’ percentage of black or Hispanic students in all grades K–12 and the percentage of graduates (excluding non-graduates) in the class of 2018 who received diplomas through alternative routes. * * * Some might look at these data and think, “Thank heavens Ohio enacted alternatives; otherwise a whole bunch of low-income and minority students would be roaming the streets without a high school diploma, and without much hope.” Others might think, “It’s the achievement gap, stupid. What else would you expect?” In our view, those are cynical, even reprehensible, interpretations of these high school graduation data. For starters, it’s important to remember that Ohio’s conventional graduation requirements aren’t unreachable. The end-of-course exam standards, for instance, ask students to achieve at about a—far short of true, college-ready targets. At the heart of it, however, they assume that young men and women of color, or those from less advantaged families, cannot work hard, accumulate knowledge and skills, and meet the state’s academic or career-technical standards. They assume that our schools, communities, businesses, and other civil institutions are utterly powerless to help young people achieve great things. To put it simply, they assume that “demography is destiny.” All these presumptions are false. To be sure, many students face significant challenges. But the standards set by the state are not impossible to achieve and one can point to any number of people who overcame barriers to reach them, often with the support of caring adults and educators who believed in them. We know of, right here in Ohio that are not only getting students to the high-school finish line but also fully equipping them for success in what comes next. But instead of believing in students and the power of a great education, how many students were routed last year into an “alternative” program and told by adults to stop trying to meet conventional state requirements? What message does that send, especially for young people of color or from poorer families? What opportunities for career advancement were lost when schools pulled the plug on their work towards meeting academic or career-technical goals? In a spot-on comment, state superintendent Paolo DeMaria has: “My mission is to keep pushing the system to break those correlations because I believe that poor children can learn to the levels of other students.” As lawmakers mull over yet another state board proposal that would create lower standards for the classes of 2021 and beyond, they should ask if it matches their beliefs about whether all students can learn. With any hope, their actions will affirm that, yes, every Ohio student is fully capable of meeting state standards. All students deserve the benefit of high expectations along with the time and support needed to reach them. Baking weak alternatives into graduation requirements, just so poor students and students of color can receive diplomas, is the soft bigotry of low expectations, and they deserve much better from our state leaders.
<urn:uuid:1ab77b18-7685-4957-8843-6b6c65e2dad5>
CC-MAIN-2019-18
https://fordhaminstitute.org/ohio/commentary/ohios-alternative-graduation-routes-soft-bigotry-low-expectations-rears-its-ugly
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.95649
1,401
2.734375
3
Cocaine’s effects on the teenage brainby Melissa Stamm Jun. 24, 2011, 2:23 PM Experimentation with drugs is common during the teen years. But the consequences of exposure to drugs like cocaine during this critical period for brain development remain unclear. To understand how cocaine affects the developing adolescent brain, Christine Konradi, Stephanie Sillivan and colleagues administered escalating doses of cocaine to “teenage” rats over a 12-day period – a model of “binge” cocaine exposure. When the rats reached adulthood, cocaine-exposed animals displayed decreased anxiety and fear-related learning – and increased levels of novelty-seeking – compared to untreated animals. The investigators also analyzed gene expression changes in the amygdala – the brain region involved in the processing and memory of emotional events – and found that genes belonging to pathways involved in brain development and wiring were affected. The results, published in Biological Psychiatry, suggest that cocaine exposure during adolescence may lead to mis-wiring in the developing brain and result in long-lasting behavioral problems, such as increased risk-taking, in adulthood. The research was funded by the National Institute on Drug Abuse and the National Institute of Mental Health.
<urn:uuid:392bd22f-4221-4d07-981b-b3549a504aee>
CC-MAIN-2019-18
https://news.vanderbilt.edu/2011/06/24/cocaines-teenage-brain/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.925712
251
2.984375
3
Internet is one of the many technologies that humans have invented that help in numerous functions of the operations that we perform regularly. Internet is the sole technology that has turned the World into a global village and has removed the barrier known as distance. People can communicate across the globe in seconds. Things and events happening in one part of the world can be seen from another part of the World, in the same way people are aware of things that are going on around the World. Internet makes it possible for companies to expand their business Worldwide and helps in sharing resources of one country with another (Forrest, 2002). As Internet is a very useful accessory for humans its value is also well understood by us. Internet also has a very good tracking ability of users that access it. Currently the concept of media globalization is on the rise and Internet is called the medium of the future as companies are shifting their focus towards Internet as a marketing tool. One of the most exciting feature of Internet currently is the online communities that can be found everywhere in numerous amounts. These communities are a way to bridge cultural and distance gaps between people sharing same interest or etc. These communities are places where people can get together and discuss and share experiences or carry out different activities. These communities are of basically two types. Browser based for example Facebook, Orkut, My Space and etc. These networking websites or social websites as they are known to be have people coming from around the world separated by distance, origin, and other demographic reasons but having same interests. In the same way the second type of communities is interactive based for example Counter Strike, World of War craft and etc. These interactive communities are places where people get together from around the World to play video games through the Internet. The concept for these communities is the same as for the browser based but the reason is different. The trend to be a part of these communities have increased immensely around the World today and people are taking out time from their busy schedules to play online games or register on these social networking websites (Weber, 2009). This trend has been equally capitalized by organizations with a proactive approach and they have made sure that any interaction with their potential consumers should not be avoided. Organizations and businesses have used the Internet and specially these communities to full capacity according to the technology at hand. Still this usage is being termed as the beginning or early stage of Internet usage by organizations to promote or advertise their product. There are many benefits of advertising and marketing on online communities but the most important point is to know how successful and effective your advertising and marketing strategy is. Here Internet wins the race from all other mediums of interaction in between the organizations and the people. The major benefit Internet provides is the closest measurement of how effective and efficient is your marketing and advertising on the Internet. A person’s behavior can easily be understood by analyzing the websites he or she visits over a time period. Internet provides this option through which a person can be kept under vigilance. The IP or the Internet Protocol helps in keeping an Internet user under observation without his or her knowing. The behavior can be easily analyzed by the Internet activity of the user (Rana, 2009). This differs from other research situations in a number of ways. If a person is unaware that he or she is being watched or observed than a physiological factor comes in. The person is quite normal in the activities that he or she performs and does not have this feeling on his mind of being watched. This helps in giving more natural and close to the reality results for any research. Hence too much faith can be placed on the analysis of objective data that has been obtained from websites, this is because as I explained earlier results are closer to the actual picture or the situation. This also results in a social image that the Internet creates due to its factuality and close to reality results. People consider the Internet to be a reliable source for obtaining data about anything. Viewing the use of Internet for research purposes can prove this. Using Internet as a research tool helps in digging much more out of the person that is being surveyed because of the new ways of interacting with a person and it also helps in finding out more and effective factors that are causing a problem or are solving the problem. People when interacting with Internet based surveys find it more secure to give out information as they know that their identity is undisclosed hence things that used to be ignored are being studied as well making it possible for the surveyor to get better and more efficient results out of the survey. This also helps in getting the correct amount of return for the money that is being spent on the survey. These online communities which have developed on the Internet and are increasing day by day have helped organizations and businesses a lot, but as we mentioned earlier it’s just an initial phase and a lot more is expected in the future. There are many advantages associated with online marketing on such communities. These include cheaper costs, high availability and reach. Internet ads are comparatively very cheap and are accessible to many by almost the whole World. These advantages make it necessary for these communities to spread around the Internet for the companies to advertise their products. Another special and unique feature of these communities is the fact that when people of the same interest get together according to the field or activity the community belongs to it becomes more than easy for organizations to find specifically their target market on the Internet (Preece, 2000). For example a community for house wives would typically be an ideal spot for a detergent making company to advertise their product at, in the same way sports wear would be typically advertised at any sports community. All these factors and some critical decisions while marketing your product that now don’t need to be taken just because it has been eased by the Internet have provided a great platform for businesses to flourish and advertise online and reap out maximum benefits. The easiest way to target these users would be to advertise on these communities which has already started on certain websites and online gaming zones. Bibliography Forrest E. (2002). Internet Marketing Intelligence: Research Tools, Techniques, and Resources. McGraw-Hill/Irwin. Hanson W. , Kalyanam K. (2006) Internet Marketing and e-Commerce, South-Western College Pub Preece J. (2000) Online Communities: Designing Usability and Supporting Sociability, Wiley Rana N. (2009) e-Marketing Intelligence – Transforming Brand and Increasing Sales – Tips and Tricks with Best Practices, Self-Help Publishers Weber L. (2009) Marketing to the Social Web: How Digital Customer Communities Build Your Business, Wiley.Sample Essay of StudyFaq.com
<urn:uuid:8014c4bf-fcf4-43d2-83d7-253ccf3c327c>
CC-MAIN-2019-18
https://studyscanner.com/online-communities/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.965339
1,344
3.015625
3
Not usually a question on everyone’s lips but the Internet is a vast and sprawling network that has become a part of our everyday lives. There’s no hiding from it. However, a surprising number of people, from all age ranges, simply don’t know who, how or why this revolutionary invention came to light. Today, we set out to answer that question. As you may imagine, the Internet wasn’t actually invented by one single person but rather a collective group of scientists and researchers. Before the actual invention of a working internet network, there had been decades of speculation that a system similar to today’s internet would exist. Many past inventors, including the famous Nikola Tesla, had played around with the ideas of a wireless data system all the back in the early 1900s. There were also several other concepts and internet-like ideas that floated around the decades. However, it wasn’t until the 1960’s when things started to come together. Inside the heart of MIT, J.C.R Licklider brainstormed a popular idea that was known as the ‘Intergalactic Network of Computers.’ During this research period, the creation of packet switching, a very effective technique for successfully sending and receiving electronic packets of data, occurred, one of the most significant contributions that led to the development of the internet we know and love today. Not long after, during the late 1960s, a working model of the internet was invented. It was known as ARPANET, short for the Advanced Research Projects Agency Network. To begin with, it was funded by the US Defence Department, used to connect several computers to one another to transfer data. This technology was innovative and was continuously researched throughout the years that passed. It wasn’t until two scientists, Vinton Cerf and Robert Kahn had worked together to invent what was known as the Transmission Control Protocol and Internet Protocol, more commonly known in today’s world as TCP/IP. This connected not only multiple computers to a network, but also multiple networks to one another. On New Year’s Day in 1983, ARPANET adopted the TCP/IP technology into their systems to create a vast network of networks. It was this network that most commonly looked and operated like the internet we know today. This is now known as the foundation of the modern-day internet. Furthermore, another scientist, Tim Berners-Lee, then took this model and transformed it in the early 1990s into a more recognizable form of internet that become known as the World Wide Web. Despite common misconceptions, as you can see, the Internet and the World Wide Web are two different concepts, but they work together to provide billions of people around the world with the service they love and need.
<urn:uuid:3ca093af-96d0-4b02-bfeb-c5798ccf4d89>
CC-MAIN-2019-18
https://viawriting.com/who-invented-the-internet/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.976328
576
3.546875
4
Net Metering is a billing method or a financial incentive provided by utilities to customers (commercial and residential) who have installed any form of small-scale distributed generation. This includes rooftop solar, small wind, biogas, micro-combined heat and power, micro turbines, or fuel cells. Virtual net metering is another method of net metering that allows customers that partake in a group or neighborhood shared renewable system to be credited for its electric production. The amount at which they are credited for is usually in proportion to their ownership of the shared renewable energy system. The rooftop solar or other forms of small-scale distributed generation are connected the grid, and when they are generating more power than the customer is using, excess power is transferred onto the grid. Net-metered customers are credited for the excess power that is going back to the grid, offsetting the cost of power drawn from the utility as well as the cost of installed small scale renewable energy or other distributed generation systems. Thiry-four states and the District of Columbia currently have mandatory statewide net metering policies and four states have a voluntary net metering policy. Voluntary net metering policies are offered in those states that do not have a mandatory statewide net metering policy, but the state’s public utility or public service commission allows certain utilities to offer net metering to customers who generate excess power. Six states have statewide distributed generation compensation rules other than net metering, where full retail rate compensation is not offered. States set capacity limits to regulate the system size of net-metered installations. States have taken different approaches to capacity limits depending upon customer type, utility type, or technology/application type. The capacity limits are represented either in kilowatt (kW) or as a percentage. Some states also set aggregate capacity limits as a percentage of the utility’s peak load/demand during a specific period or a baseline year. Some net metering policies may also specify ownership of renewable energy credits (RECs), which can be important to meeting the state’s Renewable Portfolio Standard (RPS). See our RPS map for more information. Last updated April 2019
<urn:uuid:12666e0a-d36b-48e0-adbf-d728c3d2665c>
CC-MAIN-2019-18
https://www.c2es.org/document/net-metering-programs/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.93166
441
2.984375
3
It should come as a surprise to no one that physical activity and exercise is good for you. What may come as a surprise to many is just how good it can be. Research reported in the British Medical Journal last week indicates that cycling to work has extraordinary health benefits. The research was carried out by a team of investigators at the University of Glasgow. They tracked 263,450 people for five years who traveled to work and lived in England, Scotland or Wales. The participants in the study were categorized based on the mode of transportation they took to and from work. The categories and their definitions are shown in the following table. |Transportation categories||How people got to work| |Non-active||Car, public transit or both| |Cycling||Cycling or cycling plus some walking| |Mixed-mode walking||Mixture of walking with car and/or public transit| |Mixed-mode cycling||Mixture of cycling or cycling plus some walking with car and/or public transit| The frequency of illness or death from different causes was measured within each of the categories. The researchers measured death from all causes, cancer incidence and death, and cardiovascular disease incidence and death. Cancer and cardiovascular disease are the leading causes of death in both the UK and the US. There are many factors that affect cancer and cardiovascular disease in addition to how a person travels to work. The researchers went to great lengths to control many of these factors. The analyses were carried out controlling for sex, age, ethnicity, deprivation (measured as a combination of household unemployment and overcrowding, and non-ownership of a car or home), other illnesses such as diabetes, hypertension and depression, body mass index, smoking, diet (alcohol, fruits and vegetables, red meat, oily fish, poultry, and processed meat), time spent walking for pleasure or engaged in strenuous sport, level of occupational physical activity, and sedentary behavior. This was an exceptionally well-controlled study. The effects of walking and cycling were measured by comparing them with the Non-active mode of transport. Cycling to work was associated with very large health benefits. Commuters who cycled to work had a 41% lower risk of dying from all causes than people who drove or took public transport. They also had a 46% lower risk of developing and a 52% lower risk of dying from cardiovascular disease, and a 45% lower risk of developing and a 40% lower risk of dying from cancer. Mixed-mode cycling was associated with good benefits that were not as large. Mixed-mode cyclists had a 24% lower risk of dying from all causes. They had a 32% lower risk of developing and a 36% lower risk of dying from cancer. There were no significant associations between mixed-mode cycling and cardiovascular disease. Walking to work was associated with a 27% lower risk of developing and a 36% lower risk of dying from cardiovascular disease. There were no significant associations between walking and any of the other measures. There were also no significant associations between mixed-mode walking and any of the measures. All of the observed benefits for both cyclists and walkers increased with the distance traveled. This is important because it means that even if you live too far from your job to cycle the entire distance, your health can benefit if you can ride a bike part of the way each day. One might be inclined to question the beneficial effects associated with cycling to work that are reported in the study simply because they are so large. Although the study was very well done, there are, as always, limitations. The researchers point out that they were unable to control for obesity and the participants in their study may have been healthier on average than the general population. In addition, the mode of transportation and the distance traveled were reported by the participants, not objectively measured by the investigators. Self-reported data is usually subject to higher degrees of bias, distortion or inaccuracy. Finally, while the study measured associations between health outcomes and modes of transit using a well-controlled prospective design, the evidence for a strong association between cycling and better health does not justify the conclusion that cycling was the cause of the observed health benefits. The results of this study are of obvious interest to anyone who travels to work and wants to avoid cancer and cardiovascular disease. The study should also be of interest to employers and municipalities. Cancer and cardiovascular disease are debilitating illnesses that have long-term effects. The study indicates that employers can reduce time lost due to illness by making it easy for their employees to cycle to work. It also suggests that the costs borne by municipalities for long-term treatment of people with cancer and cardiovascular disease can be reduced by making city streets safe and friendly for cyclists. Moreover, the size of the effects seen in the study indicate that the benefits reaped by employers and municipalities are likely to be substantial. Encouraging people to ride their bikes to work while making it safe for them to do so is a win-win for everybody. Kevin Murnane covers science, technology and video games for Forbes. His blogs are The Info Monkey & Tuned In To Cycling and he's The Info Monkey on Facebook & @TheInfoMonkey on Twitter.
<urn:uuid:c2cfdbfd-2981-4241-99cc-ab5d24b50c5f>
CC-MAIN-2019-18
https://www.forbes.com/sites/kevinmurnane/2017/04/25/new-research-indicates-cycling-to-work-has-extraordinary-health-benefits/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.977756
1,062
3.0625
3
What information do athletes want to obtain from fitness apps? How do they use the Internet of Things? How are attitudes towards sports and sporting equipment changing? Classic online surveys are only partially helpful. Qualitative market research yields findings that go far beyond what is discovered through answering online questionnaires. Methods of qualitative market research: The methods of qualitative market research were highly limited before digitalization. Usually, market research institutes carried out so-called focus groups, meaning group interviews in special studios. Alternatively, consumers were given journals with which to document, for example, training behavior or the use of products. A further possibility was participatory observation: Employees of a market research institute observed consumers and assessed behavior. The downside of these methods: Without special internet platforms, they are complex, expensive and time-consuming. The number of samples is small. Platforms such as ISPO OPEN INNOVATION offer new possibilities through qualitative online market research: Consumers are involved directly in the development process of products and supplies. They upload photos and videos to their comments, they discuss themes and introduce their own ideas. In what follows I shall take a deeper look at three methods of qualitative market research – community discussion, co-creation and product testing. 1. Market research through community discussion For example: On behalf of a large German sport insurer, the needs of users who received treatment after a sports accident were analyzed. The round 35,000 users of ISPO OPEN INNOVATION were invited to outline their accident reports online. Other users discussed the participants’ reports and moderators asked questions. In addition, an online questionnaire was developed and made live. From the nearly 500 responses and more than 50 accident reports, the company could clearly see which needs are paramount to consumers after an accident. The qualitative market research helped the insurer to adjust their products to clearly discernible customers needs. 2. Co-creation as a driving force Another example: The sport buggy manufacturer Thule was looking for applications for innovative online technology. The sport buggy was integrated into the Internet of Things with the help of sensors. More than 50 users gave tips and advice over ISPO OPEN INNOVATION about which applications can be realized with the help of technology. A great asset for the company: The qualitative market research helped Thule to identify the important applications for the company and at the same time, called attention to their product. 3. Product testing with a prototype A third example: The company Clim8 developed prototypes for a sports shirt which is connected to an app via sensors. More than 100 users received the T-shirt and app through ISPO OPEN INNOVATION. They could test it during their training. Climb8 also received valuable advice about the first impression the T-shirt made among athletes and how it proved itself in practice. This example of qualitative market research in the sports industry shows how companies can use the innovative possibilities of platforms such as ISPO OPEN INNOVATION. Whether in the phase of idea development, prototyping or market launch – consumer feedback through qualitative market research helps companies to make targeted decisions. Qualitative online market research Advantages Qualitative online market research fundamentally offers three major advantages: Advantage 1: Quality advantage Consultations do not take place in sterile market research studios, but directly in training. Photos, videos and comments can be uploaded directly from a smartphone to the platform. There they are discussed and market researchers index them behind the scenes. To motivate athletes, there there is a living image to the issues. Advantage 2: Swiftness The internet is quicker than other communication channels. Questions can be posed and discussed, and experience reports uploaded and supplemented. Companies no longer wait weeks or months for results, but only a few days. The speed advantage through online qualitative market research shows its value when manufacturers have to make fast decisions in the development of innovative products and offers. Through swiftness, the company gains valuable competitive advantages. Advantage 3: Price Focus groups, consumer diaries and accompanying observations are costly. So costly, that almost only large corporations can afford this form of market research. Project costs for online qualitative market research are considerably lower. - Acquisition costs for the panel decrease because communities like ISPO OPEN INNOVATION have a vibrant user base, which is quickly activated. - Implementation costs decrease because no additional market research employees must be made available for the survey and user contributions. - The exploitation costs also decrease, because market researchers’ software is supported by data analysis and its reconditioning. Conclusion: Higher quality, quicker and cheaper – online qualitative market research offers companies in the sports industry great opportunities to adjust their developments more closely to the needs of consumers. Video: How ISPO OPEN INNOVATION works About the author: Dr. Jens-Uwe Meyer is among the most innovative economic thinkers in the German-speaking world. He is a software architect and internet entrepreneur, keynote speaker and top management consultant. He is the author of ten books (amongst others “Digitale Disruption” (digital disruption), “Erfolgsfaktor Innovationskultur” (key to success, culture of innovation), “Genial ist kein Zufall!” (genius is no accident)) and more than 200 specialist articles in this area. He wrote his thesis at the Leipzig Graduate School of Management (HHL) about the innovation capabilities of companies and is part of the exclusive band of opinion formers at ‘manager magazin’. With his company Innolytics Dr. Meyer is one of the drivers of digitalization: He develops cloud based innovation and community software for companies.
<urn:uuid:921ab5f3-0294-40da-ae11-8776a0e3146b>
CC-MAIN-2019-18
https://www.ispo.com/en/markets/id_79707532/qualitative-online-market-research-methods-and-examples.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.949235
1,178
2.515625
3
Nelson Rock and Mineral Club The Devonian was a relatively long geological period, lasting from 417 to 354 million years ago. Globally, it was a time of great upheaval, as the two major continents of Euramerica and Gondwanaland drew closer together and the super-continent of Pangea began to form (see Figure 1). The associated tectonic activity gave rise to a number of major mountain zones, including the Appalachians in North America and the Caledonian mountains of northern Britain and Scandinavia. In Europe and North America, which straddled the Equator, arid conditions prevailed, and extensive areas of desert and shallow-water sandstones (the ‘Old Red Sandstone’) were laid down. Nevertheless, during this period, terrestrial life gained a more extensive foothold on land as vascular plants became abundant, and forests developed, while arthropods became widely established. In the seas, fish thrived, with the result that the Devonian has sometimes been called the ‘age of the fish’.
<urn:uuid:26ef0c7d-60f6-4ad1-82aa-8fc63ed63bf9>
CC-MAIN-2019-18
https://www.nelsonrmc.org/devonian-era.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.962938
216
3.8125
4
Unit tests should be designed to isolate and verify small parts of code. If your test strays into calls across multiple methods, you should think about your test and class design. Integration tests are important, but they serve a different purpose than unit tests. Don't confuse the purpose of unit tests with these other types of tests. Keep your unit tests small and simple and reflective of the business needs. Only write unit tests against your class's public interface, and use interfaces liberally. NUnit and Moq are crucial tools for effectively practicing TDD. NUnit is an easy-to-use and widely popular unit testing framework for .NET. It provides facilities to write unit tests that can be executed by a test running, quickly giving you results of your test run. Moq lets you create mocks and stubs of external resources and intra-application dependencies so that you know you're focusing on only the specific code under test. Moq lets you create objects that stand in for these resources and provide some limited functionality for the code under test to verify its functionality.
<urn:uuid:164a698a-ffd0-4bb4-b7ab-16177ec4d6f4>
CC-MAIN-2019-18
https://www.oreilly.com/library/view/professional-test-driven-development/9780470643204/ch002-sec016.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.931339
215
2.71875
3
The ancient and epic poem the Ramayana says that long ago there was a powerful Demon king named Ravana. His power blinded him with pride, deceived him into thinking he was larger than Dharma or Truth. Ravana stole a princess, Sita, another's wife, and a war was waged to get her back. And though Ravana was often blinded by pride, he was not completely blind to profound understanding. There was a moment in the tale where Ravana is mentally preparing to go to battle against Rama, the unbeatable prince, God incarnate. That night, he went up to a great tower, onto the roof of his palace, and suddenly had a great insight regarding time. With this understanding, he suddenly had a great feeling of freedom like a band had broken from his chest. He danced for all of the heavens looking on and with his last step felt as though he'd crushed the tight hold with which time had him. On his way down the stairs from the ramparts, Ravana is confronted by Kala, the god of time. Kala is old and decrepit and wasted like a skeleton. He tells Ravana that soon he will be in time's power and that Ravana will have to spend the rest of time paying for the sins of his lifetime. Ravana listens for a moment then scoffs, "You little liar!" Kala retorts,"What? You stole Sita and you'll pay-". "You are the thief and not I," said Ravana. "For a few moments' pleasure you take whole lives in payment. And whatever you give you steal back, by fraud, from hiding, when you're not watched. Death and misery are your good friends-but you are yourself unreal: you do not exist; you cannot steal from me." "Do you know who I am?" cried Kala. "A marketplace of sorrows," Replied Ravana Kala said, ". . . your home is empty your friends have died and all the good times are long gone . . . all must change and die . . . ." "We know better than that," said the Deamon King, "Love is eternal and we are beyond your reach. . . But I must be on my way now, I can't be late, and my time is far too valuable to waste on anything but daydreams. . . Good love never dies." (Buck, pp. 334-9) Despite his faults, Ravana exposes a startling truth: the past has dissolved, the future is an abstraction (has never been, really). All we have is now. We are always in the present. But despite the unreal natures of past and future, we seem to spend a lot of time there. Pining or regretting the past, biding time or biting our nails waiting for the future. What we need is here. What we have is now. I think what we really practice in yoga is presence. Presence with our breath. Presence with our muscles and bones in postures. Presence with other practitioner's in class. What we pay for when we go to a yoga class isn't the space, isn't the time to do yoga, isn't even necessarily instruction. What we get when we do yoga is a reminder to look inside and experience the timeless, the result of living continuously in the present. One morning I was sitting in Small Town Coffee House in Kapa'a Kauai soaking up the morning sun, feeling the tropical sweetness, and savoring a cup of jo when I looked over to the clock on the wall and instead of numbers pointing to the hour, each hour mark read, "Now." I believe clocks are mostly misunderstood: they only point to now but we translate what we read into what has or hasn't happened, into past or future. This week, break the illusion of time and practice being present. Yoga is a wonderful reminder about presence. We can practice presence at any moment of the day. What We Need Is Here Geese appear high over us, pass, and the sky closes. Abandon, as in love or sleep, holds them to their way, clear in the ancient faith: what we need is here. And we pray, not for new earth or heaven, but to be quiet in heart, and in eye, clear. What we need is here. Buck, William. Ramayana. Berkley, Los Angeles, London: University of California Press, 1976
<urn:uuid:2a7744d5-c398-47fc-aaa6-acfd7a9254d7>
CC-MAIN-2019-18
https://www.scottmooreyoga.com/blog/tag/Ravana
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.972313
931
2.875
3
DFID’s new education policy ‘Get Children Learning’ has called for a united effort by global and national leaders to address the learning crisis and ensure poor and marginalised children - who face the greatest challenges - are not left behind. ‘Get Children Learning,’ published last week, states that there is an urgent need for a “global focus on improving the quality of education to ensure children are learning the basics.” The policy, according to International Development Secretary Penny Mordaunt, sets out DFIDs plan to help prevent the "terrible waste of potential" when "half the world's children leave primary school unable to read or write.”The policy follows from a report by the International Development Select Committee published in November 2017 which called on DFID to focus on leaving no one behind in education to ensure the promise of the education SDG4 is realized. Key priorities and core themes The new education policy has a strong focus on the importance of evidence, noting that DFID will ‘expand our investment in high quality education research to ensure our, and others, investments are based on robust evidence’, including that DFID will ‘invest in research and evidence on what works to improve learning for highly marginalised children.’ The policy identifies that DFID intends to ‘demonstrate global leadership’ in building evidence through partnerships with other bilateral and multilateral agencies, UN agencies and foundations. Support by DFID to the Economic and Social Research Council (ESRC), including through the ESRC-DFID’s Raising Learning Outcomes Programme, is one example of DFID’s leadership in generating globally-relevant and contextually-grounded evidence. Many projects funded under ESRC-DFID programmes are aligned with the priorities of the new education policy, and so are in a strong position to contribute to strengthening the evidence-base in these areas. Some examples where ESRC-DFID funded projects link with the priorities in the Policy include: 1) Invest in good teaching: The policy identifies that ‘teaching quality is the most important factor affecting learning in schools but ensuring that every child is taught by a skilled and motivated teacher is a huge challenge for developing and conflict-affected countries’. A number of projects supported by the ESRC-DFID Strategic Partnership (the Joint Fund for Poverty Alleviation Research and Raising Learning Outcomes in Education Systems Programme) identify ways to support learning for children from disadvantaged backgrounds through the provision of quality teachers, the use of effective teaching strategies, and the adoption of innovative and alternative models of education. These include: - Improving teacher development and educational quality in China which explores teachers' professional development in China and the concept of professional learning communities to evaluate and enhance teacher quality and school effectiveness in secondary schools. - Effective teaching in rural Honduran secondary schools which examines a number of questions regarding factors to support effective teaching in poor, rural communities in Honduras. The research will also provide a unique opportunity to develop improved measures of educational quality and adolescent girls' empowerment. - Toward the Development of a Rigorous and Practical Classroom Observation Tool: The Uganda secondary school project which aims to develop an affordable, scalable, tool for assessing teacher practices and classroom processes, and assure its use in policy and practice in Uganda. - The Literacy Laboratory Project (LLP) under the Northern Uganda Literacy Program). This project aims to scale up and evaluate the Mango Tree literacy program, promoting reading and writing, especially in local languages, as a meaningful part of daily life in households and communities. - Assessment for Learning in Africa: Improving Pedagogy and Assessment for Numeracy in Foundation Years which focuses on improving these through developing teachers' and teacher trainers' pedagogical and assessment skills in extremely deprived urban areas in South Africa and Tanzania. Eighteen schools and three training colleges will be involved. 2) Back system reform which delivers results in the classroom: The policy emphasises the importance of education system reform across public and non-state sectors to help make education systems more accountable, effective and inclusive. Previous and on-going ESRC-DFID projects in this area include: - Education systems, aspiration and learning in remote rural settings aims to provide insight into how education systems can develop effective polices and interventions that work with young people's aspirations to enhance learning outcomes and address structural disadvantage in remote rural places - Facilitating Innovative Growth of Low Cost Private Schools: Experimental Evidence from Pakistan - Improving school governance and learning outcomes at scale: A randomized evaluation of the Madhya Pradesh School Quality Assessment program The most recent ESRC-DFID Raising Learning Outcomes in Education Systems Programme call focused on the theme of ‘Accountability,’ with the core question a number of research projects explore how do accountability relationships and processes within developing country education systems enable or inhibit the raising of learning outcomes. These projects which are just starting include a range of topics that will inform an evidence-base in this area: - Technology, Monitoring and Teacher Support in Niger - Accountability for gender equality in education: Critical perspectives on an indicator framework for the SDGs - Accountability, capacity and trust to improve learning outcomes in South Africa; a systems approach - Can schools' accountability for learning be strengthened from the grassroots? Investigating the potential for community-school partnerships in India - Improving Learning: Developing Measures of Accountability and Evaluating their Association with Students' Gains in Achievement in Nepal - Making the elementary schooling system in India work for disadvantaged learners: a cross-scalar comparative study of accountability relations - Disadvantage and Participation Accountability Processes: Theory and Evidence from School Development and Management Committees in Karnataka, India - Partnership Schools for Liberia: Impact on Accountability Mechanisms and Education Outcomes - Strengthening schools accountability mechanisms through participation: Addressing education quality and equity in Afghanistan and Pakistan - Organizational Perspectives on Accountability and Learning (OPAL): School Management Models and the Social Impact of Schooling in Mumbai and Kathmandu 3) Step up targeted support to the most marginalised: Alongside investments to improve the overall quality of education, the policy commits to focusing on three of the world’s most marginalised children: children with disabilities, children affected by crises and hard-to-reach girls. Its approach in this area will be based on ‘robust analysis of the particular barriers to learning that [they] face in each context’. Children with disabilities Recognising that disability continues to be one of the primary causes of educational exclusion, the policy commits to putting in place ‘the building blocks of inclusive reform for children with disabilities, including better data and more teachers and support staff with the skills to ensure children with disabilities learn’; ‘ensuring support for children with disabilities, helping them transition into mainstream education and learn’; and ‘support comprehensive and cost-effective interventions which include screening, assistive devices, teacher support, adaptive textbooks and parental and wider community engagement’. Many of these issues are being addressed by ESRC-DFID research, including projects recently published in the Impact Initiative’s ‘ESRC-DFID Research for Policy and Practice: disability and education.’ This highlights evidence from ESRC-DFID funded research on what governments must consider in order to ensure that children with disabilities benefit from quality education without discrimination or exclusion. The report includes evidence from the following projects: - Tikule Limodze (Let’s Grow Together) is gathering evidence related to the importance of early years education, and specifically the role of preschool caregivers in providing support to children with disabilities in rural Malawi. The project draws attention to the barriers to education faced by children with disabilities and highlights that quality training should be provided to early childhood education volunteer caregivers in the area of disability and inclusion. - The Teaching Effectively All Children (TEACh) project highlights that in order to ensure marginalised children such as children with disabilities are not excluded from the classroom it is vital that teachers are equipped with skills to teach in diverse classrooms. - “Constructing a Global Framework for Analysis of Social Exclusion From and Within Learning Systems” which is collecting data from six countries (Afghanistan, India, Sudan (Darfur State), Sierra Leone, Morocco and Tunisia). Evidence generated from this project shows that among countries (particularly those affected by conflict and crisis) children are less likely to attend school if they have disabilities. - The ‘Peer to Peer Deaf Literacy’ project looks at new ways of teaching literacy to deaf learners in India. By proposing that reform is best driven from within deaf communities themselves, the project has included deaf researchers who have developed a systemic innovation that has the potential to transform learning and improve literacy for sign language users. Children affected by crises The Policy makes three commitments in with respect to children affected by crises: multi-year investments in quality education in conflict and crises; responsive, joined-up delivery which protects education systems; and support for schools as safe spaces that promote children’s well-being: - The “Engaging teachers in peacebuilding in post-conflict contexts’ project” examines how teachers and teaching are supporting education for peacebuilding and how national and global policy dialogue can be enhanced to understand about teachers as agents of peacebuilding. - “Promoting Children's Learning Outcomes in Conflict-Affected Countries: Generating, Communicating, and Incorporating Evidence for Impact” is gathering evidence looking at school-based interventions around the world and whether these interventions work to promote effective teaching and children's learning outcomes. The policy focuses attention on the hardest-to-reach girls, including girls with disabilities and those affected by crises, as well as poor rural girls, pregnant girls and those vulnerable to early marriage. A number of research projects supported by the ESRC-DFID partnership offer evidence on the importance of improving access to quality education to girls. More specifically, projects in this area include: - “Gender, education and global poverty reduction initiatives” looks at how gender equality in and through schooling in contexts of poverty is understood and in what ways these are overcome. - Recognising that girls face particularly problems in continuing their schooling once they reach puberty, another project , Menstruation and the Cycle of Poverty:Does the provision of sanitary pads improve the attendance and educational outcomes of girls in school? has looked at whether the provision of sanitary pads improves the attendance and educational outcomes of girls in school in Uganda. A focus on leaving no one behind in education The messages from the Policy provide clear direction from DFID in their efforts towards focusing resources on the most marginalized, including on the poorest girls, children with disabilities and those affected by conflict; with particular emphasis on teacher quality. The policy is a welcome effort to raising education standards in some of the poorest parts of the world to ensure that the poorest and most marginalised children are able to access school and learn.
<urn:uuid:fa27e14e-1678-48d8-a9c3-94db4d0e8bda>
CC-MAIN-2019-18
https://www.theimpactinitiative.net/news/dfid-education-policy-2018-get-children-learning
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.937478
2,265
3.140625
3
Samarium: reactions of elements Reaction of samarium with air Samarium metal tarnishes slowly in air and burns readily to form samarium (III) oxide, Sm2O3. 4Sm + 3O2 → 2Sm2O3 Reaction of samarium with water The silvery white metal samarium is quite electropositive and reacts slowly with cold water and quite quickly with hot water to form samarium hydroxide, Sm(OH)3, and hydrogen gas (H2). 2Sm(s) + 6H2O(g) → 2Sm(OH)3(aq) + 3H2(g) Reaction of samarium with the halogens Samarium metal reacts with all the halogens to form samarium(III) halides. So, it reacts with fluorine, F2, chlorine, Cl2, bromine, I2, and iodine, I2, to form respectively samarium(III) bromide, SmF3, samarium(III) chloride, SmCl3, samarium(III) bromide, SmBr3, and samarium(III) iodide, SmI3. 2Sm(s) + 3F2(g) → 2SmF3(s) [white] 2Sm(s) + 3Cl2(g) → 2SmCl3(s) [yellow] 2Sm(s) + 3Br2(g) → 2SmBr3(s) [yellow] 2Sm(s) + 3I2(g) → 2SmI3(s) [orange] Reaction of samarium with acids Samarium metal dissolves readily in dilute sulphuric acid to form solutions containing the yellow aquated Sm(III) ion together with hydrogen gas, H2. It is quite likely that Sm3+(aq) exists as largely the complex ion [Sm(OH2)9]3+ 2Sm(s) + 3H2SO4(aq) → 2Sm3+(aq) + 3SO42-(aq) + 3H2(g)
<urn:uuid:c6859d6c-4367-47c4-bf46-161cc78200b1>
CC-MAIN-2019-18
https://www.webelements.com/samarium/chemistry.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530161.4/warc/CC-MAIN-20190421020506-20190421042506-00171.warc.gz
en
0.801369
452
2.984375
3
To watch other Voice of the Martyrs videos, visit the Voice of the Martyrs Video Page! During their journey across the Sea of Galilee, the disciples find their boat at the mercy of a savage windstorm. Waves toss the boat and a wind threatens to capsize it. In the midst of the chaos, a ghastly figure emerges from the darkness: a man who is walking on water. The disciples are terrified. “It’s a ghost,” they whisper to one another. “Take heart; it is I,” the figure, Jesus, says. “Do not be afraid.” Despite the thrashing waves, Peter calls out to Jesus, saying, “Lord, if it is you, command me to come to you on the water.” “Come,” Jesus says. So, Peter leaps out of the boat and onto the tumultuous waves. He walks across the waves to Jesus—only to notice the wind biting into his flesh. Stricken by fear, Peter begins to sink. He reaches out to Christ, who, true to his nature, saves Peter. However, Christ also has some harsh words for Peter: “Oh you of little faith, why did you doubt?” Why does Jesus rebuke Peter in this way? After all, Peter leaps out of the boat and onto the waves; many of us would be too fearful to do even that much! Shouldn’t Jesus say, “Nice try! You did much better than the other eleven disciples; they just stayed in the boat!” Many of us have heard the following explanation from pastors, church members, and leading Christian authors: “This story is a metaphor about the Christian life: Peter began to sink when he looked away from Jesus; therefore, we must always be sure to keep our eyes on Christ regardless of the storm that rages around us.” However, this isn’t what scripture says about this passage. As Christians, we need to be careful of the tool we use to interpret scripture. In the free world, we have many tools available to us: churches, seminaries, best-selling Christian authors. Turning to these is fairly simple and painless. However, in many countries these tools are scarce—the very act of owning a Bible is dangerous in and of itself. These Christians may not have a church to attend, or a seminary from which to graduate. Does this mean that they are disadvantaged? Of course not. Scripture emphasizes that the Holy Spirit is our teacher. Through baptism we receive the Holy Spirit, along with the promise that the Spirit will open to us all of the scriptures. Through the Holy Spirit, scripture interprets itself. What does this mean? Often, it means that as we continue to read the Bible daily, throughout our lives, the Holy Spirit will bring to mind scriptures that we have read and help us to understand how they all fit together. Take this passage of scripture, for example. Whenever we read and turn to something other than scripture to answer our questions, there is a high likelihood that we will miss the point of the passage. Did you notice, for example, that our go-to answer for this particular passage (“Peter fell when he took his eyes off Jesus, so we must learn to keep our eyes on him in stormy circumstances”) is actually more focused on what the scripture instructs us to do rather than what the scripture reveals about Christ? To whom should we turn, then? The Holy Spirit, of course. Allowing the Holy Spirit to guide us means that when we run across a difficult question—and no other scripture comes to mind—we content ourselves with bracketing the question for the present and continue to read. When we do this, we discover that, through the Holy Spirit, the Bible always answers its own questions. Therefore, we must learn to be patient and to trust that the Holy Spirit will eventually answer our questions. In this particular case, the Holy Spirit answers our question in Matthew 15. After travelling from Tyre to Sidon, Jesus and his disciples find themselves being followed by a Canaanite woman who shouts, “Have mercy on me, Lord, Son of David; my daughter is tormented by a demon!” Jesus does not respond to her plea. However, the woman continues to follow and shout. Eventually, the disciples run out of patience. “Send her away, for she keeps shouting after us,” they beg. So, Jesus turns to the woman and tells her, “I was sent only to the lost sheep of the house of Israel.” The woman is not deterred. She kneels before him and continues to beg for help. “It is not fair to take the children’s food and throw it to the dogs,” Christ says. This is no compliment. Such words would have pricked a sore place in any Gentile who chose to live among Jews. However, the woman’s response shows no trace of anger: “Yet, Lord, even the dogs eat the crumbs that fall from their masters’ table.” Jesus then praises the woman: “Woman, great is your faith!” When we read these words, we should be reminded of Christ’s response to Peter: “Oh you of little faith!” We should also wonder about this: What is the difference that Jesus sees between the two? After all, Peter walked on water; all the woman did was continue to talk! To understand this, we must first understand what the word “faith” means. In a Biblical sense, faith is confidence that God will always act according to his character as revealed in Scripture—action that we welcome in our lives. Faith is not only believing in God or trusting that he has forgiven us our sins, but being confident that Christ’s own character is fully operative in the world and in our own life. Believing in God is only the smallest part of what it means to have faith. In fact, you can “believe in God” without having faith in him. You can even admit that Jesus Christ is the son of God, without having faith. Having faith requires (1) knowing God’s character, and (2) trusting—and welcoming—that he will continue to act, in the world and in our own lives, according to his character revealed in scripture. One of the clearest glimpses we receive of this in the Bible is the Psalms. In the Psalms, children of God are constantly confessing their struggles and the great power of God in one breath. They have confidence that God is who he says he is—all powerful, all knowing, all-benevolent—and are therefore confused by the suffering that they experience. God has honored their faith by counting their prayers among his holy revelation. You could spend all your days in church and all your days in prayer without having faith in God. In fact, our prayers can become a practice of losing faith if we pray to God for things that are contrary to his character. Like the martyrs, we should cry out, “How long, O Lord, holy and true, until You judge those who live on the earth?” (Revelation 6:10), rather than, “What did I do that you wish for me to suffer?” What does all this have to do with the difference between Peter and the Canaanite woman? Quite a lot. The more faith we have, the more certain we are that the character of God (which is revealed to us in scripture through the Holy Spirit) will always be his character, and the more we welcome his acting according to that character in our lives. Furthermore, we will learn to hold God to this character—just like the Canaanite woman. Despite possibly never having read the scriptures (due her status as an “outsider” or “foreigner”), this woman knew something about Jesus. She had heard things about who he was and of what he was capable (otherwise, she would not be quite as persistent in begging him for help). Despite being ignored and rebuffed by Christ, this woman continues to believe the little she has heard about him and his character. The woman trusts—despite all evidence to the contrary—that (1) he is capable of healing her daughter and that (2) he would be willing to heal her daughter. And it turns out that the little this woman knows about Christ is right. Jesus not only listens to her and heals her daughter—he praises her faith. Despite knowing nothing about the Bible, this woman has faith. Peter, on the other hand, has spent years with Jesus. He has listened to his Lord speak, watched him heal the incurable, and calm storms. Peter knows the scriptures well and has been taught God’s character. Yet when the time comes, Peter ultimately trusts the fierce wind and doubts Jesus’ character to protect him in the midst of it. This is the difference between the two. God is not impressed by moments of great trust or extreme risk in your life. He is not even impressed by how much you trusted him in the past. Instead, he is interested in whether you will trust him—and what the scripture has told you about his character—in the next moment.
<urn:uuid:8a15f16a-f50e-4b57-ba11-4208f3bd5346>
CC-MAIN-2019-18
http://dotheword.org/2017/09/25/why-does-jesus-say-that-peter-has-little-faith/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578544449.50/warc/CC-MAIN-20190422055611-20190422081611-00331.warc.gz
en
0.973727
1,961
2.59375
3
GNU Emacs Lisp Reference Manual by Bil Lewis, Dan LaLiberte, Richard Stallman Publisher: Free Software Foundation 2009 Number of pages: 1025 This manual attempts to be a full description of Emacs Lisp. Emacs Lisp is more than a mere 'extension language'; it is a full computer programming language in its own right. You can use it as you would any other programming language. Home page url Download or read it online for free here: by Conrad Barski - Lisperati.com Anyone who has ever learned to program in Lisp will tell you it is very different from any other programming language. It is different in lots of surprising ways- This comic book will let you find out how Lisp's unique design makes it so powerful! by John McCarthy - The MIT Press The LISP language is designed primarily for symbolic data processing used for symbolic calculations in differential and integral calculus, electrical circuit theory, mathematical logic, etc. The manual describes LISP, a formal mathematical language. by David J. Cooper, Jr. - Franz Inc. The purpose of this book is to showcase the features of Common Lisp, and to give you a quick-start guide for using Common Lisp as a development environment. This guide gives you all the tools you need to begin writing Lisp applications. by Clark Weissman - Dickenson Publishing Company The chapters of this book expose the reader to the LISP formalism and give him an opportunity to acquire the necessary skills for processing symbolic data. Learning these skills is analogous to learning the rules of arithmetic ...
<urn:uuid:78b07e0f-587f-42bf-a895-abbb271e359a>
CC-MAIN-2019-18
http://e-booksdirectory.com/details.php?ebook=5938
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578544449.50/warc/CC-MAIN-20190422055611-20190422081611-00331.warc.gz
en
0.839763
323
2.84375
3
Ignoring an injury or playing sport whilst still in pain is often harmful and can lead to tremendous damage to the joints, ligaments and muscles. It will often lead to recurrent future injuries. Sports injury/injuries occur in athletic activities, they can result from acute trauma or overuse and can cause, pain, swelling and restricted range of motion Areas that can be affected include: “Make a change and get back on track after an injury”
<urn:uuid:ce36dffe-af8a-4520-b6de-4af4bc2344d2>
CC-MAIN-2019-18
http://www.burtonlatimerchiropractic.com/about/sports-injury/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578544449.50/warc/CC-MAIN-20190422055611-20190422081611-00331.warc.gz
en
0.936052
95
2.609375
3
Stem Cell Therapy: Unlocking the Healing Power of the Body What is Stem Cell Therapy? Stem cell therapy is a type of treatment option that uses stem cells to help repair damaged tissue causing (or the result of) chronic disease or injury. The therapy is usually performed relatively quickly through injections or infusions as an in-office procedure. What are the risks? As with all medical treatments there is a varying degree of risk. Today there are literally thousands of stem cell treatments being done daily, and most do not report adverse effects. Will it cure my condition? Stem cell treatments are effective for many conditions, and often help manage/reduce painful symptoms, but of course every individual responds uniquely to treatment. We are on constant alert for breakthrough solutions to offer the clients we serve the best possible results. Is there a cost for your patient advocacy service? No we are paid by the network of providers we serve. Our network is continually expanding as we identify the most successful treatments available and add those trusted providers. What conditions can be treated with Stem Cell Therapy? Most areas of the body can be treated. Currently there are thousands of clinical trials in process studying hundreds of treatments. (See clinicaltrials.gov.) Here are a just few examples of promising new developments: - Diabetes: Type 1 Diabetes is being treated in over 150 clinical trials with stem cells with positive results including improved blood sugar stabilization, and even sone improvement in pancreatic function. - MS: From Japan to Jordan stem cells are being tested on treating MS. The latest advances in experimental treatments in the United States have shown exceptional results. - Parkinson’s Disease: Patients with this condition develop difficulties with motor skills due to a progressive reduction in the production of the neurotransmitter dopamine. Certain stem cells (called Mesenchymal stem cells) have the ability to transform into dopamine secreting cells in the brain. This reverses dopamine decline and improves motor function. - Skin: As we age we naturally lose the elasticity in our skin that keeps it smooth. Stem cell injected into the derma layer have been shown to restore natural elasticity. - Orthopedics/Joint Therapy: With over 100 clinical trials underway for the treatment of joint issues including osteoarthritis, and daily treatments of joints using stem cells– stem cell therapy for joints is well on its way to mainstream medicine. A number of high profile athletes have returned to careers that previously would have ended had it not been for stem cell treatments, including Hines Ward of the Pittsburgh Steelers, Jarvis Green of the Denver Broncos, and Sidney Rice of the Seattle Seahawks. - Hair Loss: Every day we lose between 40-100 hairs of the 100,000+ on our heads. As we age, half of the male population and 30% of females lose the ability to replace the hairs at the rate they fall out. Stem cells have been shown to grow new hair in scientific studies. Today doctors are able to use stem cell therapy to restore hair loss naturally. The procedure is non-invasive and effective.
<urn:uuid:c29b3fdb-0858-4b1a-9ada-716a1822e27d>
CC-MAIN-2019-18
http://www.empoweredpatient.com/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578544449.50/warc/CC-MAIN-20190422055611-20190422081611-00331.warc.gz
en
0.94088
635
2.78125
3
Science Fiction was the original breaker of barriers. A place where writers could challenge social norms without alienating the audience. Get it? Alienating? Huh huh. Some of the earliest stories of space, technology, and exploration had no women or only sidekicks whose job it was to observe the action. Even the movies where the female lead is meant to be scientist in her own right becomes the glorified coffee bringer in the time before the second wave of feminism. Here’s a shout-out to the earliest women of sci fi whose creators tried to make them more than a pretty face to scream at the monster. Metropolis (1927): Maria The inspiration for the famous robot clone of herself who seduces an entire society, the actual Maria is a progressive freedom fighter and empathetic voice of the people. She has a soapbox that no one can push her from (until she’s kidnapped and nearly murdered that is). Still, her goal to free her people from the oppression working within the underground prison the upper-class has cast them into. Her character is brave, sincere, and, although a bit aggravating her sentimental speeches especially for a silent film, passionate. A part of this comes from her creators, Fritz Lang and his wife/creative partner at the time, Thea von Harbou. She was a novel writer first and always put research and logic behind her books and scripts. However, she would later cow tow to the Nazi Party in an attempt to protect her second husband, who was Indian born. The Day the Earth Stood Still (1951): Helen Benson I love Keanu Reeves and Jennifer Connelly, but nothing can beat Patricia Neal. Also that remake looked just awful. This Jesus allegory about atomic weaponry (you know it’s true) features a widow and single mom, Helen Benson, who is level headed and independent. She works, she looks out for her precocious youngster Bobby (because they are always named Bobby in the 50s), and still has her own social life with boyfriend that she doesn’t need. Her character is also brave. The military don’t dare to go near the impressive robot, Gort, except with heavy fire power. She instead has a moral compass that brings her face-to-face with Gort. The original short story that the film is based on, Farewell to the Master by Harry Bates, did not feature any leading ladies so Helen is the invention of screenwriter Edmund H. North. North also wrote Dishonored Lady, in which Hedy Lamarr plays a business women and party girl who suffers from a mental breakdown. On the feminist level, that movie sends mixed messages, but the character is still a well-written woman. Forbidden Planet (1956): Altaira “Alta” Morbius For those of you who have the words to Science Picture Double Feature memorized, yes, it’s that Forbidden Planet. Alta is an intelligent, but naive woman who has grown up without human contact beyond her father. This nod to Miranda from Shakespeare’s the Tempest (yes, science fiction can be classy) is suddenly surrounded by a ship-full of good looking young men led by Leslie Nielson. Alta faces these hormonal Earth men as her own science experiment, making out with each and commenting on the results like a curious child. Her character wears outfits considered scandalous for the 1950s, so are of course called out as inappropriate by ship’s captain (and don’t call me Shirley). Cyril Hume, the screenwriter on Forbidden Planet, was the man who adapted the Johnny Weissmuller Tarzan for the big screen as well as an early version of The Great Gatsby. I don’t know much about him beyond his IMDB credits, but he tried to create a woman who was more independent than women at the time were considered. Still, I object to her changing her style in order to accommodate the man she wanted to attract. Two steps forward and one step back. Flash Gordon (1930s & 1980): Dale Arden The most popular of the early science fiction sidekick love interests (yes, she is a sidekick, but she’s the sidekick love interest who inspired all other science fiction love interests of later science fiction). Dale was based on the comic strip character created Alex Raymond and enhanced by serialized films where she changes from a passenger on a doomed rocket who is constantly needing to be rescued to a reporter, scientist, and diplomat. . . who constantly needs to be rescued. Baby steps, I guess. Either way, without her we wouldn’t have Princess Leia. Point made. Images belong to Universal, Twentieth Century Fox, and Metro-Goldwyn Mayer
<urn:uuid:d5542611-e098-45a5-8fe5-b91aaed56152>
CC-MAIN-2019-18
http://www.fivesmilingfish.com/megans-blogs/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578544449.50/warc/CC-MAIN-20190422055611-20190422081611-00331.warc.gz
en
0.967154
988
2.71875
3
Exhibitions at The Textile Museum in Washington, D.C. aim not only to educate visitors about the artistry and cultural context of textiles, but the museum’s galleries also de-mystify the variety of textile techniques that have been developed around the world. Preparation for the museum’s fall exhibition, Colors of the Oasis: Central Asian Ikats, provided an opportunity to explain the complex process of making ikat to visitors. “We wanted to reveal the timeline of ikat production and show the public that its creation is a multi-step process,” explains Sumru Belger Krody, the exhibition curator. Ikat refers to both the type of fabric in the exhibition and the resist-dye technique used to create the cloth. To make ikat, parts of the warp (the yarns which run vertically) or the weft (horizontal) yarns are bound and placed in a series of dye baths. The parts of the yarns that are tied and protected resist the dye--allowing makers to produce multi-colored textiles through exposing the yarn to multiple dye baths. Unlike carpets or tapestries, the design of an ikat is articulated on the yarns before weaving begins. While planning for Colors of the Oasis, the curatorial team at The Textile Museum developed an idea for working with local students to help produce a three-dimensional model of the ikat-dyeing process. Museum intern and Maryland Institute College of Art graduate Suzannah Gerber helped connect the institution with the MICA Department of Fiber Arts, and instructor Christina Day took up the challenge. Day’s Fall 2009 Woven Imagery Class was a multi-level weaving class that explored image-making through weaving—and attracted BFA students with majors ranging from bookmaking to sculpture in addition to fiber arts. The class was invited into the museum in early fall 2009 for a tour of the space and a private lecture and ikat viewing led by the curator. “I wanted the group to understand that in addition to highlighting these ikat textiles as art,” says Krody, “we aimed to place them in a technical and cultural context.” The students learned about the traditional tools used in 19th-century Uzbekistan and left the museum facing the challenge: how does one best explain the ikat process to those who aren’t familiar with textiles? After creating a to-scale model of the gallery, the students broke into groups focused on mapping out the colors and design, building the wooden frame on which the warps are stretched and binding and dyeing the thread bundles. Student Alisa Alig, a printmaking major who was especially interested in Central Asian design motifs, created a bold illustration that students Alexandra Coyle and Maud Van Donkersgoed helped translate into a computer software program. The design was then manipulated to map out where the threads needed to be bound, loosened and bound again during the dyeing process. While the students took advantage of this 21st-century technology, dyeing the warp bundles in three different stages—yellow, red and blue—took the same time and care Central Asian artisans dedicated to their work centuries ago. “While it was a busy semester, the students were excited to be part of the exhibition,” recalls their instructor Day. Hanging in one of the last galleries in the exhibition, the finished models break out the dyeing process in three color stages and demonstrate to visitors the amazing complexity of the historic textiles surrounding them. The models frame a video slideshow of images of the students’ process paired with photos of contemporary ikat production in Uzbekistan, where this complex craft is experiencing a revival. This article first appeared in the September 2010 issue of Member’s Magazine. The MICA models are on view in Colors the Oasis through March 13, 2011.
<urn:uuid:9cb2db61-9046-43c3-a645-7dc1f446c29b>
CC-MAIN-2019-18
http://www.handeyemagazine.com/content/interpreting-ikat-21st-century
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578544449.50/warc/CC-MAIN-20190422055611-20190422081611-00331.warc.gz
en
0.951482
813
2.8125
3
Try this simple test: think of a number, then close your eyes and concentrate on it as hard as you can for half a minute. Do it now. Concentration is essentially a muscular action, rather than a mental exercise. To concentrate harder is to increase the level of muscular tension that accompanies the mental action. Did you squeeze your eyes tightly shut as you concentrated on your number? Did you wrinkle your brow, grit your teeth or clench your fists? Most people do all of these things when they are trying to hold a certain thought in their mind: in fact the tension involved is counterproductive to clear thinking - and to clairvoyance. It is extremely difficult for most people to make "wild" guesses or predictions. The brain has a well-established circuitry for dealing with the problems and decisions that it has to deal with. All the evidence is weighed up in an instant and an immediate, logical evaluation is made. Unless this familiar pattern is disrupted, there is little chance of establishing a new "psychic route". exercise should be carried out in a dimly lit room (not completely dark) at a time when there is no possibility of your being disturbed. The room should be warm and well-ventilated. Sit upright on a hard-backed chair, with your feet together on the floor and your hands folded loosely in front of you. Close your eyes and simply sit there for a few minutes, allowing your thoughts to wander. Open your eyes and become aware of the details of your surroundings. Adopt a "listening" attitude. Carefully study everything in your range of vision - but do not shift your position. Observe the floor, the walls, the various objects in the room. Make a mental note of as many details as you can. Next, allow your attention to expand to become aware of your general location. "See" the rest of the building in your mind's eye; the street outside, the surrounding area... Send your mind on an aerial recon-naissance of the city or the countryside around you. Get a strong sense of you exact location. Mentally return to the room, and once again probe it with your senses. Don't just see it; smell, taste, hear and feel everything around you. Try to extend your senses. "Feel" the walls from your chair. "Taste" the air in the room. Listen for the beat of your heart. Do not make any attempt to analyze these sensations; simply note them for what they are. After 10 or 15 minutes, close your eyes again and go through the mental reconnaissance process once more, this time keeping your eyes closed. "See" the room, the furniture and so on, in your mind. Visualize your surroundings as clearly and in as much detail as you can. After five or 10 minutes of this, take a few deep breaths and end the exercise. Most people have lost touch with their senses. The object of this exercise is to enable you to become more familiar with the range of your sensory process, to become aware of the relationship between the between your senses and your mental scope, and to strengthen your sense of self-location. This exercise should be carried out two or three times a week, for 20 minutes to one hour at a time. See if you can guess the identity of the next person to call you on the telephone. Straightway you will probably limit your choice to those people who be most likely to call you. Already you have made a logical assessment. Never mind. Just make your choice and - this is most important - write down the name of the person you feel will be the next to call. I suggest that you keep a large notebook specially for this purpose, to record all your impressions, predictions and guesses. Write down the date, time and your guess or prediction. If it turns out that you were correct, write this down. If you were wrong, this must also be faithfully recorded. A typical entry should look something like this: Sat/May 23/2.20pm - I feel that the next person to telephone me will be John. Outcome: 2.30pm - Incorrect. The next caller was my sister, Jane. You can make predictions and guesses about almost anything: the color of the next car to pass, the title of the next song to be played on the radio, and so on. You could even try predicting the following day's newspaper headlines. It is important that you keep a full and accurate record of all your hunches and predictions, whether they are right or wrong. Do not afraid to be wrong. The fear of getting it wrong is what leads some professional psychics to become adept at phrasing their pronouncements in such a way as to be retractable if incorrect: "I see you surrounded by flowers - have you celebrated a special occasion recently? No? Well, perhaps there's a wedding invitation on the way?" This kind of "fudging" discourages rather than develops ESP... Soon you will begin to know when your impressions are right or wrong, and you will learn to recognize the unmistakable feeling that accompanies high-quality psychic "flashes" of recognition. Look To Your Past To Predict The Future Memory plays a major part in the way we perceive the world around us, and in the way we form our impressions. Memory is especially important when it comes to psychic impressions. For example, a premon-ition of, say, a house on fire, will often have strong elements of a remembered fire. When I demonstrate clairvoyance by telling people about things that have happened or will happen to them, I feel as if I am remembering these events. And when the impressions come, it is a similar sensation to that which occurs when one's dream is "broken" - when you see or hear something that triggers recollection of a dream you'd forgotten. Sometimes the "memory" comes to me in a rush, all at once. I meet someone for the first time and in an instant I "remember" various events from his or her life - including events that have not yet happened. More often, however, the "memory" is vague and fragmentary. Memory is the psychic route. When you want to pick up psychic impressions from people or objects, do not attempt to project your mind into the future. Instead, you should behave as if the information you want was once known to you, but you have since forgotten it. Do not look for visions or voices in your ear: ESP impressions rarely come this way. Be receptive, instead, to the memory process.
<urn:uuid:ac312bd9-ee5e-44cc-b216-95c0760cbb39>
CC-MAIN-2019-18
http://www.zakmartin.com/mindpower.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578544449.50/warc/CC-MAIN-20190422055611-20190422081611-00331.warc.gz
en
0.962647
1,356
2.578125
3
By Nicole Perman Until recently, it seemed as though the short-tailed albatross would not be able to escape extinction. These endangered seabirds have been threatened first by hunting, and more recently by overfishing in the North Pacific and Bering Seas, and by their less-than-ideal primary breeding ground – a small volcanically active island called Tori-shima, located off the southern coast of Japan. As you can likely imagine, fishing hooks and volcanic eruptions make for a deadly combination, and albatross populations consequently took a nose dive. Fortunately, the story doesn’t end here. Thanks to the implementation of seabird deterrent devices, called streamers, short-tailed albatross have been making a comeback. Who doesn’t like a good underdog story? Streamers Save Seabirds Streamers, often made of long strips of plastic tubing, have been used successfully by fishing fleets to keep birds, such as the short-tailed albatross, at bay. While streamers may look like nothing more than plastic strips waving in the wind to the human eye, the albatross are fooled. To these seabirds, a row of streamers appears as a barrier. This illusion of a wall deters them from diving down to snag the bait, ultimately saving them from the hooks that have claimed so many of their kin. In fact, Alaska’s hook and line fleet – the first to implement streamers in the Bering Sea – found them to be 88 to 100 percent successful at keeping birds away from the hooks. The impact of these devices did not go unnoticed. Compelled by their success, WWF (World Wildlife Fund) made introducing them to other fishing hot spots around the world a priority. The Kamchatka Peninsula, jutting off of the eastern coast of Siberia and bordered by the Sea of Okhotsk and the Bering Sea, was at the top of their list. (WWF’s project was reported previously in: Reducing Seabird Bycatch in Russian Fisheries.) Despite the relative close proximity of WWF’s Arctic office in Anchorage, Alaska, and seeming ease of transferring a low-tech solution across the Bering Sea, WWF learned quickly that there were many obstacles that stood between them and implementing streamers abroad, starting when their first shipment of streamers was confiscated by Russian Customs in 2004. Even once the streamers made it to Kamchatka, WWF faced another hurdle: How can fisherman be convinced to use them? Streamers Save Seabirds… and Money Too WWF and other conservationists were undoubtedly in support of streamers for what they accomplished for seabird populations, but the captains and crews needed some convincing that rigging their fleets with streamers was worth the hassle. Through a comparative study of boats using streamers versus boats without them, experts from WWF found that the fleet not using streamers lost approximately $840,000 annually. So how is it that streamers save so much money? As previously demonstrated by the Alaskan fleet, when streamers are present, seabirds are less likely to dive for the bait. As a result, not only are seabirds spared from the fatal hooks, but the bait remains available for fish, making a greater harvest possible. Fishermen know well that more fish means more money, so the fleets of Kamchatka concluded that installing streamers and potentially saving that $840,000 was worth the extra elbow grease. The streamers effort in Kamchatka has evolved into a sustainable conservation project. Today, at least one Kamchatka fishing company manufactures its own streamers and makes custom-fit improvements, such as adding steel davits for easier deployment of streamers off the back of the boat. Most importantly, thanks in part to the commitment of WWF and the longline vessels now sporting streamers, short-tailed albatross numbers are on the rise around the Kamchatka Peninsula. In 2008, WWF researchers monitoring seabird bycatch spotted an average of only two albatross a day. By 2013, these researchers witnessed an average of 13 a day, even spotting as many as 33. These counts suggest an over 500 percent increase in albatross seen in this area in just five years. The Japanese Bird Migration Research Center has also confirmed the growth in this population, adding that banded short-tailed albatross from both Tori-shima and from Muko-jima Island – a new man-made, translocated colony – have been seen feeding in waters around Kamchatka in the Bering Sea. Best of all, according to records kept by Russian fishery observers during the 2013 season, zero short-tailed albatross were reported as bycatch. Here’s to more continued success of streamers and keeping this streak alive in 2014 and the years to come. WWF-U.S. received a grant for this work from the Lindblad-National Geographic Fund for Conservation, Research and Exploration in 2013. The Fund supports efforts to restore the health and productivity of the ocean, and to positively impact natural and human communities.
<urn:uuid:bf79cdbc-974b-4788-b5d6-598431774fd7>
CC-MAIN-2019-18
https://blog.nationalgeographic.org/2014/03/11/streamers-a-win-win-for-seabirds-and-fishermen-2/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578544449.50/warc/CC-MAIN-20190422055611-20190422081611-00331.warc.gz
en
0.963492
1,064
3.046875
3
By Gail Jefferson This report is a preliminary examination of lists occurring in natural conversation. It focuses upon the work which list-construction, as a task, allots to speakers, and some uses to which list-construction, as a resource, can be put by speakers. The presence of three-part lists are first noted. Speakers and hearers orient to their three-part nature. The completed list can then constitute a turn at talk and the hearer can monitor the third component as a sign of turn completion. Lists can thereby’ be a conversational sequential resource. By virtue of the three-part structure of some lists, members can orient to such matters as a “weak,” “absent,” or “missing” third part. Third items can be used to accomplish particular interactional work, such as topic-shifting and offense avoidance. Further, a list can be constructed by more than one speaker. This feature may be used for a range of activities, including the achievement of interactional accord in situations of impending discord. Read report here – List construction
<urn:uuid:439a3f14-b982-42a5-ab99-37c01e0e03f4>
CC-MAIN-2019-18
https://bookofthrees.com/list-construction-as-a-task-and-resource/?share=google-plus-1
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578544449.50/warc/CC-MAIN-20190422055611-20190422081611-00331.warc.gz
en
0.958489
231
2.625
3
All About Nutrition Education This month’s episode features two lovely women, Pam Koch and Isobel Contento, from the Nutrition Program at the Teachers College at Columbia University and the Tisch Center for Food, Education and Policy whose career focus is nutrition education. The conversation definitely gets in depth about nutrition education, in terms of how to teach it, whether it should be taught, what is appropriate to teach in school/at home and at different age levels, and why it’s important. We delve into their philosophies on nutrition and the food system. In the episode we discuss: - What nutrition education is and why it’s important as a field - Why we can’t simply trust our taste buds to guide our food choices - An approach to nutrition education that focuses on the “system” rather than blaming individuals - A simple basis/approach to eating a nutritive diet - The role of advertising and food companies in our food choices and overeating - What is a “just, sustainable food system” and what goes into creating that system - What is a “food desert” - How to teach nutrition and food skills to children of different ages - Politics of incorporating nutrition as a school topic - Why it’s important to eat well and how eating well influences behavior - The content and goals of the curriculums they have developed: “Choice Control and Change”. - The importance of portion size - How motivation works in general, and how to motivate people to eat better - Tactics to make the “right choice” the “easy choice” - Holistic education - Energy balance About the Guests Pamela Koch, EdD, RD the executive director of the Laurie M Tisch Center Food, Education & Policy at Columbia University. She is also a research associate professor of Nutrition Education. Pam conducts research about the connections between a just, sustainable food system and healthy eating. She translates the results from her research into useful resources such as curricula for schoolteachers and recommendations for policy makers. Pam is the primary author of the three Linking Food and the Environment (LiFE) curriculum series books: Growing Food; Farm to Table & Beyond, and Choice, Control & Change and coordinated the development, evaluation and dissemination of the LiFE. Pam frequently speaks about nutrition education and sustainable food systems at meetings and conferences across the country. Pam also collaborates with several groups conducting food and nutrition education and working to increase access to healthy, sustainable food around New York City. She completed her BS and MS degrees in nutrition at Rutgers University, The State University of New Jersey, and her EdD and RD from Teachers College, Columbia University. Isobel Contento, Ph.D., CDN is the Mary Swartz Rose Professor of Nutrition and Education and Director of the Program in Nutrition. She is also faculty director of the Laurie M. Tisch Center for Food, Education & Policy within the program. She conducts research on the design, implementation and evaluation of interventions that use evidence-based theory and strategies to improve health and reduce risk of overweight in youth emphasizing how the interactions among biology, personal behavior, and the food system affect eating patterns and weight. She translates the results of her research into the training of the next generation of nutrition educators, conducting workshops with practitioners, working with Dr. Pam Koch and others in developing curricula, writing a textbook, and speaking world-wide on how to motivate and facilitate health behavior change and provide environmental supports for change.
<urn:uuid:5c6bb848-2f8f-418f-805c-e3d87c46f14a>
CC-MAIN-2019-18
https://ccphotoandmedia.com/podcast/pafii-episode-6/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578544449.50/warc/CC-MAIN-20190422055611-20190422081611-00331.warc.gz
en
0.946539
736
2.78125
3
There is growing interest in the use of accounting frameworks to understand the value of the natural environment. These have the potential to inform planning, management and investment decisions that minimise risks and maximise opportunities for public and private benefit. Alongside efforts to develop natural capital accounts for large organisations and countries, accounts are being produced for natural features across smaller areas of land and water. This includes private estates, public parks and protected landscapes. This page is designed to provide ready access to guidance on how to produce accounts. See also our resource pages on the following related topics - Natural capital - an introduction - Economic valuation of ecosystem services - Green infrastructure and green networks - Mapping ecosystem services Landscape Institute Note on natural capital accounting The Landscape Institute has published a Technical Information Note on natural capital accounting. Workbook of England's Natural Capital Committee - This guide was published in April 2017 and has been written for any one who wants to use what the Committee refers to as "natural capital approaches" in making decisions about the natural environment. Corporate Natural Capital Accounting - Corporate natural capital accounting (CNCA) uses a balance sheet format for documenting natural capital assets and liabilities by organisations. A CNCA framework commissioned by the Natural Capital Committee was published in 2015. While primarily focused on business, the framework can be applied by other organisations. It was piloted by Lafarge-Tarmac, National Trust, The Crown Estate and United Utilities. It was used in the production of a Natural Capital Account for Beam Parklands in East London in 2015 (commissioned by the Greater London Authority). UK ecosystem and habitat accounts - This type of assessment uses ecological units (principally habitats) to appraise a range of benefits (ecosystem services) provided by the natural environment such as flood risk reduction, carbon sequestration and recreational opportunities. - Defra and Scottish Government have commissioned experimental ecosystem accounts for two counties in Scotland, as well as three National Parks and one Area of Outstanding Natural Beauty in England. The method is explained in a detailed Technical Annex that helps with replication of the method elsewhere. - National habitat accounts are also available for woodland and marine areas, commissioned by the Office for National Statistics. UK urban areas - A natural capital account for Greater Manchester was published in June 2018. The study estimated the natural environment to be a £25.2 billion asset to the people of Greater Manchester. - A natural capital account for the London Borough of Barnet was published in 2017. This report includes estimates of the monetary value of some of the largest benefits that natural capital assets within Barnet. - Alongside the natural capital account for Beam Parklands in East London (2015), an account for public parks in Sheffield was published in 2016 (this was presented at the Ecosystems Knowledge Network's Building Prosperous Cities conference in 2016). Natural Capital Protocol - The international Natural Capital Protocol has been developed by the business-led Natural Capital Coalition. It is a standard framework that covers four stages of incorporating the natural capital concept into business decision making. Yorkshire Water used it in a retrospective assessment of options for its Rivelin Water Treatment Works. National natural capital accounts - The UK Office for National Statistics has a natural capital project aimed at formulating methods suited to accounting for natural capital across the UK. This includes monetary estimates for select components of UK natural capital for the years 2007 to 2014, as well as experimental habitat accounts. The WAVES Programme, led by the World Bank, is encouraging incorporation of the value of the environment in national economic accounts. The UN System of Environmental-Economic Accounting is standardising methods to report on the relationship between the environment and the economy.
<urn:uuid:bcf88947-bf83-483e-8e76-7b44dd2c28aa>
CC-MAIN-2019-18
https://ecosystemsknowledge.net/resources/themes/accounting
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578544449.50/warc/CC-MAIN-20190422055611-20190422081611-00331.warc.gz
en
0.925709
755
2.625
3
In the current post, we will be focusing on introducing XFlow CFD by demonstrating an aerodynamic effect primarily observable in spheres or cylinders following certain trajectories while spinning at the same time. This effect is known as the Magnus effect, associated with spinning objects. A sphere for example travelling through mid-air while spinning at the same time , will drag air faster around one of its sides. This will consequently create a pressure gradient between the sides of the sphere, thus creating a lift force that will alter the sphere’s trajectory compared to a case with no spin. The lift force generated is equivalent to that of an airfoil, only the origin of the necessary air recirculation around the body is by mechanical rotation (the spin) and not by aerodynamic design ( the airfoil). XFlow is a next generation CFD software based on the Lattice-boltzmann method designed for a broad range of computational fluid dynamics simulations. XFlow’s latest release supports coupling with Abaqus for performing fluid structure interaction analyses. The Magnus effect will be demonstrated with a spinning football analysis in XFlow. Preprocessing in XFlow Herein the setting up of the spinning football analysis will be explained. In XFlow we will perform a 3d external type of analysis using a single phase flow model. The environment ( a segment of a football field in this example) as well as several analysis settings are given in Figure 1. Figure 1: Environment Figure 2: Settings The analysis type is external because in this way we do not need geometry to define our fluid domain (the football field segment), we can assign its dimensions and position in 3d space directly through the menu, as shown in Figure 2.So our domain type will either be a virtual wind tunnel or a generic rectangular domain ( for the physics and boundary conditions of this analysis, both options are equivalent). A single phase flow model will be used as a single fluid only (air in this case) will be present inside the fluid domain. Since our analysis is of external type, air properties are automatically assigned to the respectful tab (“ Materials” tab in XFlow). For this analysis gravity was not modelled however acceleration of gravity can be input in the external acceleration laws menu. The designated turbulence model is set to Automatic. XFlow then assigns the WALE model in order to model turbulence at the football’s boundaries. Turbulence generation is set to off, meaning that no additional turbulence will be introduced at the fluid domain boundaries as an initial condition. Figure 1 shows the fluid domain, the football field segment, having dimensions of 20x3(height)x8 meters. In terms of supported geometry for import, all major neutral formats are supported by XFlow (iges, step, stl). Additionally geometry can be designed in Xflow natively. XFlow also offers the possibility to include geometry for visualization ( post-processing) purposes only. This allows the user to exclude geometries that are of no interest for the cfd analysis –and therefore limit computational effort- while including them in order to have a more aesthetically refined end result. This is the case for the goal post geometry as indicated in Figure 3. Figure 3: Geometry Figure 4. Geometry Settings The main geometry of interest in this case will be the football. As was the case with the fluid domain assignment, the geometry can be positioned and oriented at will, inside the fluid domain. For demonstrating the Magnus effect, the ball’s behavor will be set to rigid body dynamics. So the ball will be modelled as fully rigid (non-deformable) and will have all 6 degrees of freedom set to free (set in the “ constraints” menu), allowing the ball to rotate and displace freely in 3d space. By setting the behavior to rigid body dynamics, the ball’s motion will be influenced by external forces or moments ( the Magnus force produced during ball-air interaction).The user can also assign the mass of the ball directly (as shown in Figure 4). For the initial conditions of the football’s trajectory, a linear velocity vector is given as well as an angular Y-axis velocity, the spin of the football (Figure 4). Figure 5 shows the domain discretization settings. Figure 5: Discretization scheme Figure 6: Discretization Settings It can be seen that 4 different discretization levels have been assigned. The far field discretization level is the coarsest (level 1). The football is discretized using one fourth of the far field’s discretization and the wake is discretized using one eight of the far field’s discetization. The option for extra refinement at the wake is enabled when the adaptive refinement algorithm is used(as in this analysis). This really efficient algorithm automatically tracks the wake evolution and refines it accordingly, in order to capture it effectively for post processing. An additional refinement level is added(level 2) in order to smoothly transition results between levels 1 and 3(“ refinement transition length” option). Last but not least, simulation time is set to 2 seconds, based on the football’s velocity and fluid domain dimensions (so that at least the football will cover the full length of the domain) and the time step is manually assigned to 0.005 seconds. This can be modified in order to find the optimum compromise between speeding up the computational time and maintaining the stability factor around 0.3, meaning that the quality of the results is satisfactory. Figure 7 shows the stability parameter for this particular simulation. The values of the stability parameter are within acceptable limits. Figure 7: Stability Parameter A video including the results is included below. These videos show the vorticity (how much the airflow swirls) of the airflow at the wake of the spinning football , the trajectory curve of the football where the effect of the Magnus force is evident as well as a spin detail of the football, on its way to the spot where even good goalkeepers cannot manage to save it. As a concluding remark, based on what was demonstrated, it can be seen that XFlow provides superior user friendliness and quickness in setting up even advanced cfd studies. Additionally the lattice discretization scheme overcomes mesh related difficulties of traditional CFD software. Even complex geometries can be included and discretized with a push of a button , reducing mesh generation ( a tedious process inherently present in traditional CFD software) time to a minimum.
<urn:uuid:5fc6917a-7cef-46d1-955b-9037a14d6f1e>
CC-MAIN-2019-18
https://info.simuleon.com/blog/xflow-cfd-demonstrating-the-magnus-effect
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578544449.50/warc/CC-MAIN-20190422055611-20190422081611-00331.warc.gz
en
0.905368
1,352
3.015625
3