text
sequencelengths
1
1
id
sequencelengths
1
1
dump
sequencelengths
1
1
url
sequencelengths
1
1
file_path
sequencelengths
1
1
language
sequencelengths
1
1
language_score
sequencelengths
1
1
token_count
sequencelengths
1
1
score
sequencelengths
1
1
int_score
sequencelengths
1
1
[ "The Evolution Deceit\nThe ability to think is one of the greatest blessings granted to people because only by thinking can people be aware of Allah's boundless power and the beauty of the universe He created. Only a thinking person realizes that the world has been created by divine wisdom in every detail, that death is near, and that there are certain obligations that are required to be met in this life. We are told in a large number of Qur'anic verses that only thinking people can heed advice and that they alone are capable of seeing the proofs of Allah's existence. Indeed, the very purpose of the revelation of the Qur'an is for people to think carefully about its verses, as is stated here: \"It is a Book We have sent down to you, full of blessing, so let people of intelligence ponder its Signs and take heed.\" (Surah Sad: 29)\nHowever, a large proportion of humanity regards thinking as a hardship. These people even believe that thinking is damaging to their lives and their set ways. According to this opinion, \"the greatest damage\" lies in reminding people of their responsibilities in this life and taking them out of the slumbering, empty minded state of heedlessness in which they find themselves. Like a kind of magic spell, this sleep makes people forget why they exist, that there is a purpose in life, and that one day they will die. Another form of this sleep is to be inundated by the daily routines. Perhaps these people feel they spend a great deal of time thinking, making decisions and finding answers, but in fact what they think about does not go beyond the details of their day-to-day needs and impulses. Their thoughts are not related to the purpose of human creation, how the world came into being or the fact that one day every living thing will be buried in the ground. Actions, statements and behaviour learned by rote, taught, and become accustomed to, have such a hold on these people that they do not even feel a need to think about more fundamental realities.\nJust as they evade thought, so too do these people escape hastily from warnings given by others; they turn their faces from belief in Allah, thinking about the verses of the Qur'an, and living by His guidance.\nBut nothing and nobody has been put on the face of the earth for an empty purpose. Allah created every detail in the universe for people to think about. In fact in the Qur'an, Allah announces that he created \"… death and life to test which of you is best in action…\" (Surat al-Mulk: 2) In this fleeting life, one is put to the test by all his or her deeds. A person has a great responsibility towards Allah Who created him and will resurrect him after death and call for an accounting for his deeds. Reading the Qur'an, taking heed of it, thinking about the verses and comprehending and applying them are amongst every person's principal responsibilities. Allah draws attention to this truth with the verse which reads,\"Do they not ponder these words? Has anything come to them that did not come to their ancestors the previous peoples?\" (Surat al-Mu'minun: 68)\nThinking people will conclude that such fine detail in the universe and its examples of flawless design mean that it cannot have come into being by accident and that there exists a Creator of all things. By thinking deeply about the miracles created around them and other proofs of Allah's existence, and observing the divine wisdom in the details which He has created, they will give themselves over to Him and live solely for the purpose of earning His approval. Aware of this truth, Satan wants them to live their lives in heedlessness, keep away from Allah's verses and hence to refrain from thought. Allah describes this purpose of Satan's in a verse of the Qur'an:\n[Satan said], \"… I will lie in ambush for them on your straight path. Then I will come at them, from in front of them and behind them, from their right and from their left... (Surat al-A'raf: 16-17)\nIn order to achieve this ultimate aim, Satan prepares very special situations to sink people into a state of heedlessness. For this purpose, he makes plans using people's weaker aspects, and attempts to make evil deeds attractive to people's egos. Unlike the faithful, people distanced from religious morality can end up in a state of spiritual heedlessness by forgetting Allah and not thinking about their purpose in life.\nFor example, Satan can easily waylay people in places of entertainment, because such places are conducive to wasting time and not thinking about anything. In these places what assumes the most importance are the clothes and accessories people wear, the money they spend, and the people around them. With the music so loud that people cannot hear one another, the air so full of smoke they cannot see one another, exploding flashbulbs, loud conversation and yelling, an environment is formed in which people who have no fear of Allah certainly cannot concentrate their attention or think.\nOf course it is a great blessing for people to enjoy themselves and come together with others they enjoy talking to. But these days places of entertainment are not those where the name of Allah is mentioned and where people recall their purpose in life. The purpose of creation is entirely forgotten. People who feel no fear of Allah in their hearts and spend their time in such places experience an atmosphere of heedlessness and are left in no condition to consider or understand warnings. In fact, one of the reasons why such people prefer these places is to forget everything and avoid thought, and they often say so. While a person who comes to such a place to, as he expresses it, escape from the troubles of the world, may have been behaving sensibly ten minutes earlier, now he starts to regard any excess as normal. In the name of enjoying themselves, these people see immorality of all kinds as reasonable and become insensitive to what is happening around them. In fact, in environments of this type, breaking plates, overturning tables, throwing napkins, attacks on others with obscene language, and fights reflect only a small part of the kind of heedlessness and immorality into which people can sink.\nConcert arenas, football stadiums and other places where large crowds gather only magnify this effect of heedlessness. A large number of people go to such places not to enjoy themselves or to watch an entertaining game or to listen to a beautiful voice but to shout, to fight and to cause trouble, in short to display ugly behaviour of every kind. In such environments, it is utterly impossible for people with no fear of Allah to extract from their minds a single useful thought. It only remains to be said that people in such an uncontrolled environment that encourages violence and immorality, are wide open to the whisperings of Satan so that the obedience of people to Satan's \"Don't think!\" order is ensured. Allah draws attention to this method of Satan's with this verse: \"Stir up any of them you can with your voice and rally against them your cavalry and your infantry and share with them in their children and their wealth and make them promises!..\" (Surat al-'Isra: 64)\nPeople whose lives are filled with work and going out to such places of entertainment, where heedlessness reigns, forget that one day they will meet the angel of death. And when they do, it is too late, because this person has passed his worldly life in pursuit of empty practices and has fled from consideration of the verses of the Qur'an. For a person who thinks about death, the transitory nature of life and his responsibilities towards Allah, it is impossible ever to accept such a heedless state. A person who knows that Allah can take his life at any moment and that there will be a reckoning for his every word, thought and action never lets these realities slip his mind in any environment whatsoever and does not surrender to heedlessness.\nFor a person to continue a life of heedlessness resembles his seeing a truck with brake failure hurtling towards him and failing to get out of the way-even though this is possible-while being fully aware that it is going to hit and crush him. During his life, a person can indulge in excess hundreds or thousands of times, can even spend his entire life in this way, but when death takes him, everything he has experienced is left behind. If a person has passed his time in heedlessness of the existence of Allah, he will realize on the day of his death that this way of life, described in ignorant societies as \"making the best of life,\" has brought him nothing but loss. He will feel regret for all the excesses he indulged in because he forgot Allah and the Day of Judgement. But heedless people ignore Allah's warnings:\nMankind's Reckoning has drawn very close to them, yet they heedlessly turn away. No fresh reminder comes to them from their Lord without their listening to it as if it was a game. Their hearts are distracted... (Surat al-Anbiya': 1-3)2009-08-15 22:15:33" ]
[ "<urn:uuid:68808cbb-e9b6-412a-aed9-44ee67706f46>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.evolutiondeceit.com/en/Daily-Comments/16535/Satans-command-Dont-think" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.975275993347168 ]
[ 1867 ]
[ 2.578125 ]
[ 3 ]
[ "Coal waste bank parameters given in new USBM report.\nBusch-RA; Backer-RR; Atkins-LA\nCoal Min Process 1975 Jul; 12(7):52-53\nThe study summarized in Bureau of Mines report of investigations 7964 was a direct result of the Buffalo Creek disaster of February 1972, which took the lives of 125 West Virginians. A task force was created to analyze the West Virginia embankment failure and to identify other potentially hazardous sites. The long-term objective was to develop means to determine modes of embankment failure and to develop means for safe disposal of the coal waste materials.\nOP; Journal Article\nCoal Mining & Processing" ]
[ "<urn:uuid:34a0bbdc-a7af-40f5-86df-11860ddf403e>" ]
[ "CC-MAIN-2017-30" ]
[ "https://www.cdc.gov/niosh/nioshtic-2/10009623.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423812.87/warc/CC-MAIN-20170721222447-20170722002447-00177.warc.gz" ]
[ "en" ]
[ 0.8727713823318481 ]
[ 140 ]
[ 2.796875 ]
[ 3 ]
[ "This two transistor metronome circuit can easily be built on an electronic breadboard. The circuit is easy enough for beginners in electronics consisting of only six components, a loudspeaker and a nine volt battery or 9V power supply.\nFind the circuit diagram for the metronome at the above link.\nThis LED flasher circuit, which is suitable for beginners in electronics, uses only two transistors to flash a tri-color LED between two different colors: red and green.\nClick the above link to see the circuit diagram." ]
[ "<urn:uuid:33bc521e-c210-4e6a-a5ec-5dd4defe6e36>" ]
[ "CC-MAIN-2017-30" ]
[ "http://blog.startingelectronics.com/category/circuits-for-beginners/page/2/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424549.12/warc/CC-MAIN-20170723102716-20170723122716-00217.warc.gz" ]
[ "en" ]
[ 0.8774471879005432 ]
[ 108 ]
[ 2.8125 ]
[ 3 ]
[ "- Diagnostic issues and capabilities in 48 isolation facilities in 16 European countries: data from EuroNHID surveys (2012)\n- Background: Highly infectious diseases (HIDs) are defined as being transmissible from person to person, causing life-threatening illnesses and presenting a serious public health hazard. The sampling, handling and transport of specimens from patients with HIDs present specific bio-safety concerns. Findings The European Network for HID project aimed to record, in a cross-sectional study, the infection control capabilities of referral centers for HIDs across Europe and assesses the level of achievement to previously published guidelines. In this paper, we report the current diagnostic capabilities and bio-safety measures applied to diagnostic procedures in these referral centers. Overall, 48 isolation facilities in 16 European countries were evaluated. Although 81% of these referral centers are located near a biosafety level 3 laboratory, 11% and 31% of them still performed their microbiological and routine diagnostic analyses, respectively, without bio-safety measures. Conclusions: The discrepancies among the referral centers surveyed between the level of practices and the European Network of Infectious Diseases (EUNID) recommendations have multiple reasons of which the interest of the individuals in charge and the investment they put in preparedness to emerging outbreaks. Despite the fact that the less prepared centers can improve by just updating their practice and policies any support to help them to achieve an acceptable level of biosecurity is welcome.\n- Infection control management of patients with suspected highly infectious diseases in emergency departments: data from a survey in 41 facilities in 14 European countries (2012)\n- Background: In Emergency and Medical Admission Departments (EDs and MADs), prompt recognition and appropriate infection control management of patients with Highly Infectious Diseases (HIDs, e.g. Viral Hemorrhagic Fevers and SARS) are fundamental for avoiding nosocomial outbreaks. Methods: The EuroNHID (European Network for Highly Infectious Diseases) project collected data from 41 EDs and MADs in 14 European countries, located in the same facility as a national/regional referral centre for HIDs, using specifically developed checklists, during on-site visits from February to November 2009. Results: Isolation rooms were available in 34 facilities (82,9%): these rooms had anteroom in 19, dedicated entrance in 15, negative pressure in 17, and HEPA filtration of exhausting air in 12. Only 6 centres (14,6%) had isolation rooms with all characteristics. Personnel trained for the recognition of HIDs was available in 24 facilities; management protocols for HIDs were available in 35. Conclusions: Preparedness level for the safe and appropriate management of HIDs is partially adequate in the surveyed EDs and MADs." ]
[ "<urn:uuid:07a244df-cc5e-4137-b6cc-4f188dd4311b>" ]
[ "CC-MAIN-2013-20" ]
[ "http://publikationen.ub.uni-frankfurt.de/solrsearch/index/search/searchtype/authorsearch/author/Philippe+Brouqui" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708766848/warc/CC-MAIN-20130516125246-00036-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9417329430580139 ]
[ 559 ]
[ 2.609375 ]
[ 3 ]
[ "This 93-million mile deep space mission might catch the next super solar storm\nIn 1859 — on a Thursday evening, in North America — crimson columns of light began to creep across the darkened horizon. These auroras wrapped around the world, from China to Cuba, and radios and telegraph systems sputtered and stopped working en masse. Thousands of people took to the streets to see the blood red sky, some dispatching fire trucks to put out the fire that surely had set the night ablaze, while others prayed, fearing the coming of end times.\nBut the source was neither earthly nor divine. Now known as the Carrington Event, the planet had been struck by a super solar storm — essentially a cloud of plasma, gas, and high energy particles spewed from the sun’s surface. And such a storm could happen again. Scientists estimate about a 10% chance of a solar storm hitting the Earth within the next 10 years — or, put another way, for the optimists among us, a 90% chance that it won’t.\nIn either case, in today’s hyperconnected world, we’ve got a lot more technology at stake than telegraph lines. According to a 2016 study by the European Space Agency, a solar geomagnetic storm could lead to costly losses in various industries, from aviation to power systems, totaling as much as €15 billion just in Europe.\nOne way to minimize this damage is to keep watch on the sun’s activity using satellites, giving us time to prepare for any solar events heading our way. Current monitoring satellites, which have been in orbit for more than 20 years, provide about 15 hours of advance warning.\nNow, a newly funded satellite mission by the European Space Agency (ESA), called the L5 Lagrange mission, could help us to forecast solar events up to a day or more ahead of time, says Juha-Pekka Luntama, head of ESA’s Space Weather Office.\nBeing able to accurately monitor solar weather events is crucial, because each type of event is unique, as are the consequences they carry.\nThis improved time owes to the L5 mission’s proposed position in space.\nWhereas existing space weather satellites are located on a straight line between the sun and Earth, at a point called L1, the new satellite will be placed off that line, at a point called L5, which is a better vantage point for observing solar storms. You can think of it in terms of baseball, where the solar storm is the incoming pitch, Luntama says. If you’re the catcher, it’s harder to gauge the speed or position of the pitch than if you’re sitting off to the side, watching with a speed gun.\nThe Lagrange mission will also place the satellite 150 million kilometers away from Earth, which is 100 times farther than the satellites at the L1 position. “This is the very first time that anybody is building an operational deep space mission,” Luntama says. “Just sending the data from that distance is challenging.”\nTo receive an uninterrupted stream of data, space agencies need consistent access to huge antennae, at least 35 meters in diameter, at ground stations around the world, he says. While ESA’s receiver network could handle the job in theory, those dishes are needed for several other missions, which is why the agency hopes to work with others, like NASA and Japan’s JAXA, to collect the data. International collaboration often comes into play in missions where the goal is to protect the Earth, Luntama says.\nBeing able to accurately monitor solar weather events is crucial, because each type of event is unique, as are the consequences they carry. These solar disturbances arise from changes in the sun’s magnetic field, and they take three general forms, which can occur separately or all at once.\nA solar geomagnetic storm can temporarily change the planet’s magnetic field.\nThe first is a solar flare. This flash from the sun’s surface can be seen from earth, if you have the right equipment and timing; it’s what amateur astronomers Richard Carrington and Richard Hodson happened to have observed before the event in 1859. Solar flares shower our atmosphere with extreme amounts of electromagnetic radiation, ionizing the upper layers. This ionization makes it hard for radio signals to get through the atmosphere, causing disruptions in things like satellite GPS receivers.\nThe second surprise the sun might serve up is a blast of high energy protons and electrons. While most of these energetic particles will be caught by the atmosphere, the electronics on satellites — including those monitoring the sun from the L1 position — may be damaged, temporarily or for good depending on the event. These pesky particles can also affect solar panels, degrading the panels over time.\nBut the event that could have the biggest impact on our day to day lives is a coronal mass ejection (CME). In this case, an explosion on the surface of the sun ejects a chunk of the sun’s plasma out into the void at speeds up to 3,000 km/s.\nThis cloud — a solar geomagnetic storm, can span hundreds of millions of kilometers wide and, upon collision with Earth, can even temporarily change the planet’s magnetic field.\nTo be clear, human life on the ground, as well as our dear personal electronic devices, like phones and laptops, are never in any danger from solar storms, Luntama says (adding that he gets this question a lot).\nOne effect a storm could have is on high frequency radio communications used in aviation. And while disruptions might hamper flight operations, the industry has redundancies in place to carry on safely if just more slowly, Luntama says, suggesting that the conditions may be like what you might expect in bad weather conditions.\n“There will be delays, there might be cancellations because the airports can’t run the take-offs and landings as efficiently as they do normally,” he says.\nAnother issue that’s minor but needs to be monitored is increased radiation exposure for astronauts and flight crews flying close to the poles, where radiation can seep into the upper atmosphere. The amount of radiation exposure a regular commercial flight passenger might experience during a solar storm isn’t dangerous, but a crew member serving multiple flights may need to be careful that they don’t exceed their recommended yearly radiation levels.\nThe biggest threat solar storms pose is to the power grid. A geomagnetic storm can deliver an extra jolt of current straight into power systems, overloading the grid and knocking out crucial house-sized transformers, which are expensive and difficult to replace.\nThe biggest threat solar storms pose is to the power grid. A geomagnetic storm can deliver an extra jolt of current straight into power systems\nWith advance notice, Luntama suggests that power companies could lower the grids’ loads or turn them off completely, as a costly but protective measure. Here’s where that extra half a day of warning time could be crucial. You can’t just turn off entire power grids by flipping a switch, Luntama says. These systems must be carefully ramped down over the course of days.\nIn case of any emergency, whether it’s a hurricane or solar storm, utility companies have business continuity plans, says Eileen Unger of Emergency Preparedness Partnerships, a New Jersey based company that helps businesses write and practice such plans.\nThese plans prepare for the loss of things like computer systems and communications, including how to revert to paper records or how many employees are needed to update customers in person. In the worst-case scenario, if all methods of communications were down, Unger says, companies might designate a location for employees to meet and receive further instructions.\nLuntama says, for individual citizens, the best thing you can do to prepare for solar storms is to understand their impact and not to panic.\nUltimately, the key to minimizing the damage caused by solar storms is long-term planning, Luntama says, and ensuring that governments around the world are investing in monitoring capabilities. Solar storms are one of the few threats where the entire planet is vulnerable, he says. “As mankind, we need to take this seriously.”" ]
[ "<urn:uuid:21203285-a3b2-43d1-b41b-63c47a87f1f0>" ]
[ "CC-MAIN-2023-14" ]
[ "https://www.freethink.com/space/solar-storm" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948868.90/warc/CC-MAIN-20230328170730-20230328200730-00791.warc.gz" ]
[ "en" ]
[ 0.9406670928001404 ]
[ 1724 ]
[ 3.421875 ]
[ 3 ]
[ "Books By George McNeish.\n|Home||About the Project||In The News||How to Donate||About 275 Thames St.||Picture Album||Volunteer Form||Past Events||Book||Slide Shows|\nA Book About the Fugitive Slave ChapelFor information about \"The Alternative\" my fictional history, go to alternative.fscpp.ca\nI am now working on two books simultaneously. In \"The Fugitive Slave Chapel of London Ontario\" I delve into its History and the history of the Slaves that came. I look into the conditions of Slavery in the South to get a glimpse of what these Fugitives were escaping from. From the little known fact I attempt to imagine the state of mind of these citizens that arrived in the mid 1800's. The conditions they met and the obstacles they had to overcome are explored.\nAbolitionist John Brown is rumoured to have spoken in the Church. I am about ninety percent sure this rumour is true. The 1926 reporter that claims to have spoken to two unnamed people who remembered the event seems to be adequate proof. The fact that the meeting needed to be kept secret explains why accounts of it are not widespread.\nIn this book I look into the life of John Brown. I examined accounts of his life as told by both his enemies and his friends. I read a speech given by a freed slave, Frederick Douglass, that started out uncomplimentary and turned into a glowing tribute to a white man who had greater influence on the abolition movement than any other single person.\nI am documenting the efforts of the Fugitive Slave Chapel Preservation Project and plan to document the move of the building when it happens. The book will also explore the possibilities for the future use of the building, what the building stands for and how the efforts the building was established for can be continued in the future.\nWhile researching this book I looked into the conditions that resulted in the Civil War. I read about its devastating effect and the struggles with reconstruction afterwards. I started to wonder if this war was really necessary.\nThus I began writing a historical fiction (The Alternative) were the Civil War never happened. I start with the birth of my first character on June 18, 1800. His name is Bobby Johnson and he was born to a Plantation owner that was a kind slave owner. His father was ridiculed for never whipping his slaves. Bobby gets involved in the religion of the South and begins to have doubts that slavery should even exist. When he goes to the north to study the Bible away from the influence of slavery he vows that he will never be a slave owner. He pleads with his father to free the slaves but his dad cannot see any way a plantation can be run without slave labour.\nRuthie born December of 1805 was born to the very opposite kind of slave owner. Her mother died when she was born and she was raised by the slaves that her father treated so cruelly. One slave, who she regarded as her best friend, becomes pregnant. When she learns the man responsible for this is her own father she is furious. She solidifies the friendship she has with the slaves, protects them from her father's cruelty and eventually meets and marries Bobby Johnson.\nTogether Bobby and Ruthie change history. In their passion to end slavery they prove not only that slavery is wrong, but if the black population is given a chance it can make great contributions to the economy of the whole society. Bobby and Ruthie employ free blacks on the plantation Bobby inherits, he encourages their education and he is paid back big time. His plantation becomes the wealthiest in the area. In 1845, when caterpillars destroyed most of the cotton in Louisiana, Bobby's free black labour figure out how to save his crop. Because of the inventiveness of his labourers and their interest in experimenting with agricultural techniques, the plantation is doing much better than those of his neighbours. Although met with jealousy and prejudice, the neighbours soon learn that, if they want to be successful, they need to copy his methods.\nBobby and his free black labourers are soon in much demand as they travel throughout the state of Louisiana and beyond teaching their techniques. By the time the rebels decide to attack the north, there is so little support that they have to abandon their plans. Bobby continues to teach his methods and insists that in order for it to work, not only do they need to abandon the idea of slavery, but the free black workers must be respected as the force that makes them successful. Therefore, not only is there no slavery in the south, but there is absolutely no prejudice as the African Americans are honoured for their contributions.\nI have not decided yet if these two works will be published as one volume or two.\nI would enjoy hearing your comments. You can contact me at [email protected].\nIf you would like to be notified when either book can be pre-ordered let me know that when you send an email.\nInformation about these books will be regularly updated. Below is a sample of the writing of George McNeish.\nHistoric Value of 275 Thames Street, London, Ontario, Canada\nThe Fugitive Slave Chapel of London, Ontario was built about 1848 presumably by fugitive slaves and perhaps other citizens of African descent. Little is known about how this building came into being but London land records show that trustees of the African Methodist Episcopal Church purchased the land at 275 Thames Street on October 14, 1847. One would speculate that the building would have been erected shortly after that date, but some sources put the date of construction as late as 1852.\nYou may wonder at the lack of documentation for a building of such historical value, but, at the time, these few fugitives from our southern neighbour were insignificant and even unwanted, so their activities were largely ignored. Fleeing from slavery meant that they had endured hard labour with no wages paid, so it is not surprising that they had very little when they arrived in London. What they did have was an ability to work and a desire to succeed, so, despite odds against them, they worked, bargained and prospered. With only the finances that labour could bring them, they naturally congregated in an area of London were real estate was cheap. The smelly hollow at Thames Street was such a place during the middle of the nineteenth century. The coming of the railroad in 1853 soon changed all of that. Real estate values escalated and the black community of London were soon known to hold greater value in real estate than their white counterparts.\nWhen they arrived in Canada all these fugitives wanted was an equal opportunity to work and earn a living. Some well intentioned people took it on their selves to raise money for those they regarded as unable to succeed on their own. Others who were not so well intentioned used the situation of the fugitives to solicit money which seldom got to the intended destination. Either way this was not wanted by the black community. Many narratives of fugitive slaves who came to Canada stated that they felt handouts would make people lazy and they preferred to work for what they could earn. Equal opportunity is the most they asked for, and that they did not get. The prejudice in Canada was often worse than they faced in slavery, but in Canada they were free and had protection of the law. This was enough to enable them to work hard and prosper under adverse conditions.\nFor more than 200 years the African American was told he was not human and could expect no human rights. He was brainwashed into thinking he had no capability to survive on his own and needed a master to look after his affairs. Many were so convinced of their inferior abilities that they made no attempt to escape slavery, but the ones who did manage to break the bonds of slavery proved that the common beliefs were utterly false. Not only did they succeed but they succeeded despite adverse conditions. They came together in small communities and helped each other to overcome obstacles. In slavery they had learned of the God of Christianity and many carried that belief with them when they came to Canada. White Christians would usually make them feel unwelcome, so they established their own churches. The African Methodist Episcopal Church was born in the south when Black Christians suffered segregation in the Methodist churches of that area. In 1856 it was considered to be unsafe for black ministers to travel to the USA for conferences and so the African Methodist Episcopal Church in Canada split from their parent organization to form the British Methodist Episcopal Church. Canada then was a British Colony and the Church wanted to honour the country that gave them freedom when they named their new organization.\nSometimes we tend to distance ourselves from human suffering when it happens to another group, but I take this very personally. Although I am not black, I am human, and slavery was a crime against humanity. Although the black population suffered more, slavery damaged all human society. Ancient forms of slavery were sanctioned in the Christian Bible but this more recent form was condemned back as far as the time of Moses. In ancient times one who owed money might sell himself into slavery or when enemies were captured during a time of war they would often be forced into slavery. Beginning in 1441 the first African Slaves were stolen from their homeland. The slave trade would continue to grow through the following centuries and would not end until the USA civil war ended it in 1865. In Exodus 21:16 we read, \"And he that stealeth a man, and selleth him, or if he be found in his hand, he shall surely be put to death.\" It is clear from this verse that man stealing has always been abhorred and even one in possession of a stolen man was to receive the most severe punishment. When the Christian Churches twisted the meaning of the Bible to justify this form of slavery they not only condemned an innocent population to slavery, they also condemned themselves to spiritual death. When someone is devoid of human spirit it is increasingly easy to do wrong and it gets more and more difficult to do what is right.\nToday we hear of terrible crimes perpetrated against the most innocent of our citizens. Young girls are brutally raped. Little children are kidnapped, used for sex and then murdered in an attempt to cover the original crime. The laws of the land keep these events down to a few cases, but imagine what would happen of these things were legal. What if, instead of condemning the child rapist, you protected his activity by law and made it illegal for the family of the child to interfere with his right. Now imagine this is your little daughter or son that is being raped by one who the law says you must respect as your master. This is just one example, if there is any other crime that repulses you more, imagine that one. I am not saying that these things were common place, but when we realize that such things still happen despite the law we can only assume they happened more often when the perpetrator had no fear of punishment. If the neighbours found out they would see him as a sick man but they would look the other way since he would have the right to do whatever he wanted with his property.\nMore common would be the breeding practices. Slaves were treated as livestock and as in livestock they had no rights to select a mate for themselves. The master would decide which slaves would produce the best offspring. When one mate was sold off another would be forced on the one remaining. Unlike livestock the master himself could also act as stud and do his own breeding. Anyone born of a slave woman was considered a slave and this master would sell off one of his own offspring as quickly as he would any other slave. Now imagine it was your mother, your sister or your daughter being forced into a sexual relation and used for breeding slaves for her master. She had no rights to her offspring. They were the property of her master who could do anything he wanted with them.\nI have painted this brief picture of the nature of slavery to show what the fugitives coming to London, Ontario were running from. Next we can look at how they got to Canada.\nThe journey from the South was made at great peril to the slaves. When one became a fugitive one was hunted down like a wild animal. Many masters wanted to teach their slaves that running was worse than staying and so they would not care if a runaway was returned dead or alive. Slave catchers preferred the dead or alive posters as they could collect the reward without needing to return a living person who would be constantly trying to escape. Even when returned alive it was not uncommon to whip the slave to death as a lesson to others on what happens to a runaway. Before a slave would run he had to accept that death was better for him than to stay in slavery.\nHaving never been paid for his labour, the fugitive had no money to pay for his journey north. He had to avoid public detection so he stayed clear of roads and any place where people may be found. Not knowing who he could trust he was forced to steal food and walk for many months. Even when a friend who could help was close by, he was often unaware. Sometimes, out of desperation he would be forced to approach a stranger. Sometimes he was rewarded with help, other times he was sent back to slavery or killed on the spot. Through the aid of the Quakers and the Underground Railway many fugitives were rescued with the rescuers sharing in the risk. It was illegal to help a runaway slave and anyone caught in this would be subject to huge fines and/or prison time. Yet many would take the risk because they followed a higher law and that law said oppression was wrong, even oppression that was sanctioned by the government. The underground rail-road provided depots were fugitives would be hidden while they had a chance to rest and eat. They were then given instructions on how to find the next depot and sometimes were even provided with transportation. If a fugitive slave could make his way to one of the terminals of the underground rail-road his chances of reaching Canada were greatly increased. Many of the Fugitives coming to Canada were helped by this organization run mainly by Quakers.\nWhether or not a fugitive found the underground rail-road his dangers were not past. Besides the danger from humans the fugitive was harassed by natural elements. He was at risk of being torn apart by wild animals. Heat, cold, rain or snow may overcome him. He may be forced of hide in swamps, contend with insects, snakes, leaches and worse without any protection whatsoever. With only stars to lead him he would often become lost in a blizzard and find that he had been going in the wrong direction when the sun arose on an unexpected horizon. Needless to say, many didn't make it, but death to them was better than the life they had known.\nNow imagine the terrible life you had as a slave. Top that with a perilous three month journey on foot while suffering from starvation and anything nature could throw at you. When you met the first person you have seen since you started from the South you knew not if he would be a friend or an enemy, but divine providence found you in favour and that person helped you get quickly to Canada. In Canada you found slave catchers were still searching for you in the border communities. You found there was a place called London that was further inland and afforded more protection against capture, so again you set out on foot being thankful for the small amount of help you have received. You now had the protection of the law and could find work along the way to pay for your food. Finally you arrive in London Ontario and someone directs you to a little chapel on Thames Street. You go in and kneel down to pray as you thank God that you made it. Many troubles lie ahead of you. You do not know where you will sleep, what you will eat or where you can find a job, but the kind people at the Chapel had previously gone through what you had and they understood your needs. Together you give a prayer of thanks and pray for continued guidance.\nThis is the significance of this little unassuming building that now needs a new home. This building symbolizes the overcoming of evil. This is a place where free men could pray. It is a reminder of a time we do not want to repeat. It is a symbol for continued justice and for continuing to fight for the rights of the oppressed. The North American Continent was wounded by slavery for more than two hundred years. A century and a half has elapsed since slavery was finally abolished but the wounds are still healing. The symptoms of slavery are being treated but the root cause still needs to be discovered or the disease of slavery will simply take on new forms. This is our present day challenge so that we can forever rid the world of oppression.\nWe have a symbol of freedom in London, Ontario. It is currently at 275 Thames Street. There are a lot of people who want to move it to 432 Grey Street where it can be restored and preserved. $65,000 is needed just to get the building moved. And additional amount estimated at $900,000 is needed to restore and add additional facilities needed to realize its full potential. A contribution to this cause is a contribution to world peace and the end of oppression of all kinds. Plans are under way to have a plaque displaying the names of major contributors made that will be displayed at this historical site.\nYou can contribute via internet at http://www.fscpp.ca/donate.html. Cheques can be sent to the Fugitive Slave Chapel Preservation Project, c/o Beth Emanuel BME Church, 430 Grey St, London, Ontario, N6B 1H3." ]
[ "<urn:uuid:159f23b9-1711-4639-bf0e-ea2580871fe6>" ]
[ "CC-MAIN-2017-26" ]
[ "http://fscpp.ca/book.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320338.89/warc/CC-MAIN-20170624203022-20170624223022-00328.warc.gz" ]
[ "en" ]
[ 0.9879373908042908 ]
[ 3584 ]
[ 2.5625 ]
[ 3 ]
[ "Local switching is switching in which traffic does not traverse the backplane of a switch but rather stays on a line card. This concept is positioned as a method for increasing the available bandwidth of a line card or reducing traffic on the backplane of a device. While the concept of local switching is sound and local switching has been successfully deployed on many types of devices, not all local switching implementations are equally effective.\nThe architecture of the SAN solution that is competitive with the Cisco\n® SAN solution is a three-tier stack of common application-specific integrated circuits (ASICs); see Figure 1. This architecture has the advantages of being simple and quickly built. However, it also has serious limitations due to routing decisions that occur independently at each ASIC.\nFigure 1. Competitive Director Architecture\nEach ASIC in this architecture makes autonomous routing decisions based on individual instances of the Fabric Shortest Path First (FSPF) routing protocol. Since each ASIC is independent, one ASIC cannot adjust traffic paths to accommodate load on another ASIC on the same line card, the same switching fabric, or another line card. This limitation leads to performance problems when one autonomous routing decision affects another autonomous routing decision.\nArchitecture and Local Switching\nTo fully understand local switching, you must understand the confines of the local switch. Local switching can be defined as the switching of traffic in a local domain. This domain may be an entire line card or, as in the case of competitive SAN solutions, only half of the ports of a line card (Figure 2).\nFigure 2. Competitive 48-Port Line Card Architecture\nIn Figure 2, the first local switch domains consist of line card ports 0 to 7 and 24 to 39, and the second local switching domain consists of line card ports 8 to 23 and 40 to 47. This numbering scheme is neither contiguous nor intuitive and may lead to deployment errors when you try to implement local switching.\nPerformance Problems When Mixing Local and Non-Local Switching\nNumerous tests have been conducted using different combinations of storage traffic that mix locally switched and non-locally switched traffic. The results of these tests indicate that, in some cases, locally switched traffic is affected by non-locally switched traffic, and in other cases, non-locally switched traffic is affected by locally switched traffic. Results are further complicated by routing policies that are configurable on the competitive switch. Figures 3 and 4 show some examples of traffic throughput inequities when locally switched traffic and non-locally switched traffic are mixed.\nFigure 3. Local Switch Test 1\nFigure 4. Local Switch Test 2\nAs can be seen from the test results, mixing locally switched traffic and non-locally switched traffic causes inconsistent traffic flows and affects the performance of some devices. Because the effect of the performance degradation is inconsistent, a SAN architect cannot design around this limitation and must instead require that the user never mix local switched and non-local switched traffic on competitive SAN directors.\nEffect of Port Density\nOne potential benefit of local switching is greater port density with higher per-port speeds. This benefit is achieved by having some traffic locally switched and other traffic non-locally switched. As the test results previously described showed, this scenario is not possible with competitive SAN directors. Some traffic is given preferential bandwidth, while other traffic is negatively affected. Because of this behavior, traffic should not be mixed between locally switched and non-locally switched. Because of the performance problems, this behavior also means that use of local switching limits the number of ports deployable per line card.\nTypical SAN deployments use fan-out ratios to determine the number of servers (initiators) per storage array (targets) ports. Storage vendors determine these fan-out ratios based on server type, application performance profile, and storage array port performance. These fan-out ratios vary, but typical ratios range from 8:1 (eight servers to one storage array port) to 20:1 or more. Using these values, Table 1 shows how the inability to mix locally switched and non-locally switched traffic leaves some ports unusable.\nTable 1. Local Switch Port Deployments\nAs can be seen in Table 1, the number of ports that cannot be deployed in local switched deployments can vary from as few as 2 ports (6 percent) of a 32-port line card to as many as 22 ports (46 percent) of a 48-port line card, depending on the initiator-to-target fan-out ratio. This limitation additionally affects the customer because this solution does not allow for network growth without extensive recabling of the entire competitive switch, ultimately limiting the number of deployable ports on the competitive SAN solution and requiring more chassis to be deployed.\nLocal Switching and Virtual Machine Deployments\nToday's data center is increasingly using virtualization to reduce the number of servers being deployed and to increase the utilization of the deployed servers. This virtualization is typically deployed in clustered solutions, grouping 8, 16, 32, or more servers in a cluster. Application performance for the servers must be consistent and must not vary based on the server on which the virtual machine is running.\nOne requirement of the server clusters is that all servers have the same access to the same storage, meaning that a SAN administrator must ensure that all server ports and storage ports are in the same local switch domain. This requirement cannot be met on the competitive SAN solution due to the small size of the local switch domain (a maximum of 24 ports). In addition, as performance tests have shown, mixing traffic between local switch domains causes performance inconsistencies that are in direct conflict with the requirement for equal performance for all servers in a cluster.\nLocal Switching and Cluster High Availability\nAnother consideration when looking at local switching is the fault domain of the solution. When initiators and targets are dispersed over multiple port groups and line cards, the failure of an ASIC or line card will affect only a small number of the devices in a cluster. When local switching is deployed, the failure of a single ASIC or line card will cause failure in an entire cluster of servers and storage devices.\nAlthough local switching is a valid method for potentially increasing performance, the usability of such of feature is ultimately determined by a vendor's implementation. The competitive SAN local switch implementation imposes too many restrictions to be used successfully:\n• The number of ports that can be deployed when using local switching is limited.\n• Performance degrades when locally switched and non-locally switched traffic are mixed.\n• The performance effect is unpredictable and cannot be designed around.\n• Deployments of virtual servers and clusters are limited.\n• High availability is compromised, and a single point of failure is created." ]
[ "<urn:uuid:563e15f1-fbc8-476c-a1db-90d58f90cc05>" ]
[ "CC-MAIN-2014-10" ]
[ "http://www.cisco.com/c/en/us/products/collateral/storage-networking/mds-9500-series-multilayer-directors/white_paper_c11-545453.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999653106/warc/CC-MAIN-20140305060733-00081-ip-10-183-142-35.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9267979860305786 ]
[ 1353 ]
[ 2.875 ]
[ 3 ]
[ "Oceana Bittersweet About CITES’ Failure to Protect Seven out of Eight Shark SpeciesAll Press Releases…\nPorbeagle Only Shark Species Granted Protection Against International Trade at CITES\nMarch 23, 2010\nContact: Dustin Cranor ( [email protected] | 954-348-1314, 954-348-1314 (cell))\nOceana, the world’s largest international ocean conservation organization, applauded the Convention on International Trade in Endangered Species’ (CITES) decision to protect porbeagle sharks threatened by the international trade of their meat during the 15th Conference of the Parties. However, Oceana called today a disaster for the seven other shark species (oceanic whitetip, dusky, sandbar, spiny dogfish and scalloped, smooth and great hammerheads) that were not included in Appendix II of CITES.\n“Porbeagle sharks finally received the trade protections they so desperately needed,” said Rebecca Greenberg, marine wildlife scientist at Oceana. “Without trade restrictions, these shark species will be pushed towards extinction. The oceans, livelihoods and local economies depend on these species.”\nMany shark populations have declined by up to 99 percent in recent decades. These shark species are threatened by the international consumer demand for shark products including fins, skins, meat and liver oil. The international shark fin trade is a multi-billion dollar business that is pushing many shark species to the brink of extinction. The fins, including those of hammerhead and oceanic whitetip sharks, are mainly sent to China for use in shark fin soup. Trade in shark meat, particularly to European markets, is also a major threat to spiny dogfish and porbeagle sharks.\nRegarding the failed proposals, Oceana’s marine scientist and fisheries campaign manager Elizabeth Griffin said, “It appears that science no longer matters. CITES is not fulfilling its obligation to protect species threatened by international trade. When will we realize that short-term profits will not last?”\nToday’s decisions to reject the other proposals will allow the unregulated international trade of the fins and meat from several of the world’s most vulnerable shark species to continue to decimate shark populations worldwide. According to Oceana, protection in CITES would have helped protect these populations.\nOceana is hopeful that some of these bad decisions on shark species could be reversed during the plenary session during the final two days.\nAbout Sharks and CITES:\nFrom March 13 to 25, representatives from 175 countries are meeting in Doha, Qatar, for the Convention on International Trade in Endangered Species’ (CITES) 15th Conference of the Parties. During these two weeks, countries will decide on the inclusion of eight shark species (oceanic whitetip, dusky, sandbar, spurdog, porbeagle and scalloped, smooth and great hammerheads) in CITES Appendix II. An Appendix II listing would require the use of export permits to ensure that the species were caught by a legal and sustainably managed fishery.\nEarlier this week, Oceana released a new report The International Trade of Shark Fins: Endangering Shark Populations Worldwide that describes the impact of the global shark fin trade on the world’s oceans. According to the report, up to 10 million kg of shark fins (equivalent to the weight of more than 2,000 adult African Elephants) are exported annually to Hong Kong by nearly 87 countries.\nSharks can be found in almost every ocean and play a vital role in maintaining the health of the oceans. Many shark populations have declined to levels where they are unable to perform their roles as top predators in the ecosystem, causing drastic and possibly irreversible damage to the oceans. According to the U.N. Food and Agriculture Organization, nearly half of the highly migratory shark species are now considered overexploited or depleted.\nTo learn more about Sharks and CITES, and for downloadable images, please visit www.oceana.org/CITES." ]
[ "<urn:uuid:9a9bce59-2661-4f78-aa7c-121ede2af50a>" ]
[ "CC-MAIN-2013-48" ]
[ "http://oceana.org/en/news-media/press-center/press-releases/oceana-bittersweet-about-cites-failure-to-protect-seven-out-of-eight-shark-species" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052995/warc/CC-MAIN-20131204131732-00093-ip-10-33-133-15.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9174583554267883 ]
[ 862 ]
[ 2.59375 ]
[ 3 ]
[ "Issues in Digital Technology in Education/Virtual Learning Environments\nWhat is a Virtual Environment And How did it come to be?\nA virtual learning environment (VLE) or virtual world, can be defined as an interactive simulated environment accessed by multiple users through an online interface. In order to fully appreciate he capacity of a VLE one must go back to the inception of the Internet. In 1969 The United States Defense Department created ARPANET a precursor to the Internet. Fifteen years later Islands of Kesmai, the first commercial MMORPG (massive, multiplayer, role play games) was launched on Compuserve. This is an example of early \"coming together\" on the Internet. At this time William Gibson publishes Neuromancer. In this work Gibson explores artificial intelligence, virtual reality, genetic engineering, and multinational overpowering corporations long before these ideas entered popular culture. By using words like \"cyber speak\" and \"cyberspace,\" Gibson provided the vernacular for an emerging technology and a generation. By 1992 Neal Stephenson's novel Snow Crash is published and in this work, a new vision of virtual worlds is created, contenting ideas about history, linguistics, anthropology, archaeology, religion, computer science, politics, cryptography and philosophy. In the late nineties most virtual worlds fade because the hardware and bandwidth requirements are too stringent and dot-com funding dries up at the end of the millennium.\n7 Commonalities to all Virtual Environments/Worlds\n1. All virtual environments are populated by avatars. An avatar is a computer user's representation of himself or herself, whether in the form of a 3D model or a 2D icon. In English, the word avatar has come to mean \"an embodiment or an bodily manifestation of the Divine.\" However, the Sanskrit word Avatara mean \"The descent of God\" or simply \"incarnation.\"\n2. All virtual environments provide a shared space. A place that allows many users from around the world to interact at once.\n3. All virtual environments host a graphical user interface. The world depicts space visually, ranging in style from 2D \"cartoon\" imagery to more immersive 3D environments.\n4. All the action in virtual environments takes place in real time.\n5. All virtual environments are interactive, and users can alter, develop and build with the environment.\n6. All virtual environments will continue if the user is not logged in.\n7. All virtual environments allow and encourage the formation of in-world social groups, teams, guilds, clubs, cliques, housemates, neighborhoods, etc.\nWhy are Virtual Environments created?\nVirtual environments have also been built for purposes other than gaming. The following section summarizes a few ways in which virtual environments are currently being used:\nCommercial Gaming: Tends to focus on a singular fictional theme and consistently follows formal conventions such as character-focused avatars, progression through an interactive narrative storyline, and a series of competitive events. These environments are strongly influenced by fantasy, science fiction, and anime genres of literature and film. The majority of virtual environments in existence today are commercial gaming world. •\nSocializing/ Online community building: These environments emphasize socializing rather than gaming. This environment offers a more open-ended experience and is strongly influenced by the cultures of text-based chat rooms. Although small-scale, casual games may be incorporated into a social world, participants are not necessarily there to win or play a game, but rather to socialize with other and in many cases create and decorate a personal space such as a home, room, or apartment. Social worlds tend to use settings based on idealized versions of reality. Most provide some basic building tools and the ability to host activities and events that revolve around a wide variety of topics.\nEducation: In most cases, educational worlds are sponsored by academic institutions or nonprofit organizations, although some educational worlds are sponsored by corporations. Educational worlds come in a wide variety of forms, including 3D recreations of museum and gallery spaces, computer programming tutorials, virtual libraries, and meeting spaces for online university courses.\nMilitary Training: Governments are using virtual environments to train their troops. Soldiers can practice high-risk combat situations in a safe, affordable environment. A variety of situations can be programmed, and depending on human interaction, different outcomes can be explored and addressed.\nVirtual Environments: Second Life\nSecond Life: Introduction\nOne of the virtual environments that has been popularized recently is Second Life. Second Life was launched on June 23, 2003 by Linden Labs. It is widely popular with individuals in their early 30s (Generation X), and, according to the Kzero research group, it has 13 million registered accounts, which makes it one of the largest virtual environments. To understand Second Life, it is important to make the distinction between virtual environments and Massively Mulitplayer Online Role-Playing Games (MMORPG). Whereas MMORPG are games where content is designed by developers and consumed by players, virtual environments are places where residents co-construct physical and social content through socialization and collaboration. The content of many virtual environments and in this case Second Life is co-constructed collaboratively by residents through creativity, invention, taking on identities, and experimentation. “Practices of the participants, their actions, conversations, movements, and exchanges come to define the world and continually infuse it with new meanings” (Thomas & Brown, 2007).\nSecond Life: Environment’s Characteristics\nSecond Life is a complex visual and audio-based 3D environment which is characterized by distributed networks as its residents are geographically, demographically, and generationally dispersed. Thomas & Brown (2007) also suggest that the distributed networks are, at the same time, co-present as, for any interaction to take place, residents’ avatars are in the same space.\nParticipatory Culture and Interaction\nAccording to Ondrejka (2008), another characteristic that makes Second Life unique is its participatory culture (culture of interacting, sharing, and collaborating) characterized by innovation and creativity. Participatory culture is integral for Second Life to function as the social and physical content of the environment is collaboratively authored, preserved, modified, and maintained by its residents (Robbins quoted in Arreguin, 2007) through the process of what Yowell (Yowell quoted in Arreguin, 2007) and Thomas & Brown (2007) call networked imagination. To explain this further, it is the collective or network imagination of Second Life residents that leads to the creation of urban and natural spaces where the residents congregate, and it is the collective imagination of the residents that results in defining the purpose to meet in those spaces. These purposes can range from social gatherings to educational initiatives such as lectures or workshops. Because it is the residents of Second Life who are the creators and developers of the physical and social content, the quality and complexity of this virtual environment depend entirely on residents’ agency, that is, their willingness, frequency, and quality of interactions.\nIt is up to the residents to decide to what degree they become involved in this space. This, according to Ondrejka (2008), largely depends on residents’ needs, desires, and constraints. It is also worthy to point out that, in contrast to interaction in other Web 2.0 applications such as blogging, wikis, or microblogging which is sequential, the interaction in Second Life and other similar virtual environments is always synchronous.\nLearning as Social Practice\nBecause the content is co-constructed by its residents, Second Life is an environment where learning occurs through social interaction. Ondrejka (2008) labels it as peer-to-peer pedagogy, learning which is modeled on the apprenticeship model put forward by Vygotsky (Vygotsky, 1978) and which takes place in communities of practice created by learners (Wenger, 1998). “Rather than requiring learners to become proficient in all Second Life skills, students are encouraged to become dependent on each other’s talents and strengths to the point of leading and teaching each other” (Arreguin, 2007). Learning in Second Life is predominantly driven by the needs of the individual. Ondrejka (2008) points out that there is no pre-set curriculum and that learning is regulated primarily by the needs of the learners. According to Robbins (Robbins quoted in Arreguin, 2007) knowledge is pulled by the learners rather than pushed at a student. Robbins also stresses that the roles of the learner and instructor change as a result of this; the learner becomes an instructor and the instructor becomes a learner. Learning in Second Life occurs through formal and informal instances that include conventions, conferences, workshops and demonstrations organized and led by more experienced residents or through informal peer-to-peer synchronous voice or text chats. Learning in Second Life is also supported by exchange of knowledge, expertise, and information through a mush-up of technologies that are adjacent to Second Life. Thus, Second Life residents continue to learn by interacting outside of Second Life by writing blogs, collaborating on wikis, joining facebook groups, exchanging twits on twitter or other microblogging applications, or participating in conversations on listservs, sharing images on flickr, and sharing resources on delicious or other social networking sites.\nSecond Life: New Learner/Shift in Learning\nResearchers who are exploring virtual environments point out that these environments are important to analyze for educators to understand what the characteristics of the 21st century learners are and how learning is changing as a result of these learners’ participating in these environments. Thomas & Brown (2007) argue that virtual environments exemplify a new type of learner and a significant shift in learning. Because residents can create new identities and take on new roles, the concept of identity expands. According to Thomas & Brown (2007), learner’s identity cannot be considered binary anymore (real life vs. virtual reality identity), rather, they argue, an individual’s virtual reality identity is supplemental to real world identity. Because of the semiotic characteristics of virtual environments, knowledge acquisition is also conceptualized differently. According to Thomas & Brown (2007), residents learn to BE rather than learn ABOUT concepts and ideas as it is done via traditional models of learning. Furthermore, they argue that knowledge gained in/required to function in virtual environments should not be treated in binary terms (virtual reality knowledge vs. real world knowledge) but it is supplemental to real life knowledge. Thus, virtual world residents construct their identity and knowledge both/and (not either outside/either inside the world) (Thomas & Brown, 2007). This new conceptualization of learner’s identity and the purpose of knowledge acquisition has led Thomas & Brown to believe that virtual environments such as Second Life and other spaces are important spaces to study as they are making a significant impact on today’s learners and their learning.\nArreguin, C. (2007). Best practices from the Second Life Community Convention Education Track 2007. Retrieved on June 15, 2008 from http://www.rezed.org/forum/topic/show?id=2047896%3ATopic%3A323\nOndrejka, C. (2008). Education unleashed: Participatory culture, education, and I=innovation in Second Life. Retrieved on June 18, 2008 from http://www.rezed.org/forum/topic/show?id=2047896%3ATopic%3A2550\nThomas, D. & J.S. Brown (2007). Why virtual worlds can matter. Working Paper. Retrieved on June 11, 2007 from http://www.johnseelybrown.com/needvirtualworlds.pdf\nVirtual Worlds Total Registered Accounts. Kzero Research. Retrieved on June 6, 2008 from http://www.kzero.co.uk/blog/wp-content/uploads/2008/05/virtual-world-numbers-q2-2008.jpg\nVygotsky, L.S. (1978). Mind in society: The development of higher psychological processes. Cambridge: Harvard University Press.\nWenger, E. (1998). Communities of practice: Learning, meaning, and identity. Cambridge University Press." ]
[ "<urn:uuid:8c387a2f-e792-4ae1-9093-ba00dae976c3>" ]
[ "CC-MAIN-2017-30" ]
[ "https://en.wikibooks.org/wiki/Issues_in_Digital_Technology_in_Education/Virtual_Learning_Environments" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426372.41/warc/CC-MAIN-20170726182141-20170726202141-00440.warc.gz" ]
[ "en" ]
[ 0.9284915328025818 ]
[ 2515 ]
[ 3.59375 ]
[ 4 ]
[ "When the tomb of King Tut was discovered in 1922, it ignited a worldwide craze for Egyptian Revival Jewelry. The discovery, along with the translation of the Rosetta Stone in 1822 and the opening of the Suez Canal in 1869, helped bring Egyptomania to a fever pitch in the West. But this interest in ancient civilizations dates back much further than these events, originating with the French Revolution and Napoleon’s campaign in Egypt. During his time in Egypt, the French monarch studied archaeology as a science and made many\ndiscoveries. When he returned to France, he brought home a treasure trove of inspiration. Napoleon continued to pursue an interest in Egypt and its ancient history.\nThis interest in Egypt spread to Europe and influenced not only the design of a wide range of products, but also the way we see and think about architecture, music, and art. It even permeated the fashion industry. Jewelry became a popular form of expression that reflected an individual’s interest in Egypt’s ancient culture. A lotus flower was often depicted in jewelry, with its symbolic association with the Sun god Aman-Ra. The ankh, a hieroglyph for life, was also an important motif in Egyptian jewelry. The Ba, a bird-like aspect of the ‘soul’ that could travel out of the tomb after death, was another key symbol in Egyptian culture. These motifs were used in many styles of jewelry, from heavy gold shield shaped brooches and earrings of the Victorian period to the more refined ‘Art Deco’ pieces that are still in vogue today.\nCloisonné enamel was also very popular among jewelers and was frequently used in the depiction of Egyptian motifs. The motifs, including ram’s head and scarab beetles, were also often carved in precious and semiprecious gemstones, for example, sapphire and lapis lazuli, which the ancients believed would protect the wearer from evil. In the late 19th century, when the craze for Egyptian motifs reached its peak, jewelers were not attempting to recreate ancient Egyptian motifs as accurately as they had done in the past, but rather to adapt them to a modern style. The Egyptian Revival movement was an apt name for this refined mash-up of two different eras and a fusion of artistic technique. Continue reading “Tut, Tut, Tut”\nWeaving fibers to form a fabric has been a part of human existence since ancient times. Weaving is the process of interlacing longitudinally oriented warp threads with horizontally oriented weft threads to form a woven fabric. Weaving is performed on a loom, a device arranged to hold warp threads under tension while allowing the weft threads to be sequentially added to them, to produce a fabric. The relative movement and positioning of the warp and weft threads during the weaving process results in a sequence of thread placements that together form a pattern in the finished fabric. To change patterns, the sequence of thread placements must be modified, a traditionally labor and time intensive process. Through the centuries, looms have had a variety of configurations, but their basic function has remained the same.\nLoom technology has seen a variety of innovations throughout history in a continuous effort to make fabric production faster, easier, and more cost-effective. The Jacquard machine invented by French weaver Joseph-Marie Jacquard (born 1752 in Lyon, France) revolutionized the field of weaving. His invention, which uses punch cards to represent a desired sequence of thread placements during operation of the loom, greatly reduced the labor involved in the process of weaving. Jacquard designed a device that would be attached to a loom to control the placement of individual warp threads according to a pre-set progression of steps represented and controlled by a pattern of holes in each of a set of punch cards. This allowed looms to not only produce complex textile patterns such as brocade, damask, and lace, but also to be changed quickly from one pattern to another. By simply exchanging a first set of punch cards for a second set of punch cards, the loom could be reprogrammed to produce a new fabric pattern. Jacquard looms are used for weaving all sorts of intricate patterned textiles. They could be programmed to weave a single pattern fabric or a combination of patterns with different colors. Continue reading “Programming Fashion”\nFashion is a way of creating new and distinctive designs that can be worn by different people in different settings. It is often a reflection of the times in which it is created, but it can also be influenced by, technology, culture, even religion. Before the mid-19th century, most clothing was home-made. Occasionally, a village dressmaker was available to make a made-to-measure dress. The wealthy often employed seamstresses who dealt directly, and often exclusively, with their patron. The rapid mechanization of fabric production led to the appearance of ready-to-wear stores that provided the middle classes an opportunity to move away from home-made garments.\nAniline dye printed fabrics were used for many of the garments that were produced in this period. They were woven according to a manufacturing method that caused the dyes to run down the surface of the fabric. This made the garments more textured and interesting. The process created fabrics that contrasted with the smoother, lighter-colored cottons and linens that were also popular at the time. Aniline dyes could also be applied to other materials to give them a more sophisticated appearance. One example is aniline colored velvet which was very popular through the 1890’s. It was made in a range of colors, from soft pink to dark red and sometimes bright purple. The Aniline colored velvet was a soft, comfortable fabric that clung to the body, revealing the wearer’s shape, and giving it an attractive drape. It was especially popular for evening dresses. Velvet was made in a range of textures, from fine to coarse. It was usually trimmed with delicate embroidery, lace, ribbons and beading. Continue reading “From Home-Made to Store-Bought Fashion”\nThe past centuries have seen a variety of cultural and technological shifts, and the fashion world has followed suit. These changes have also had a profound impact on the way we dress. In the 19th century, the commercialization of newly discovered aniline dyes for printed fabrics had a profound impact on fashion. The use of these synthetic dyes changed the way we colored fabrics, allowing manufacturers to scale up production. Aniline dyes made it easy for manufacturers to print on a wide range of fabric types all with consistent hue and tone of the color between batches. This allowed for the reemergence of the dyeing industry, which was formerly languishing because of its long dependency on expensive naturally derived pigments. Continue reading “Color My World: Aniline Dyes in Fashion”\nAround 1856 an 18-year-old British chemist named William Henry Perkin changed the world of fashion forever. He had been performing experiments seeking to replace the natural anti-malarial drug quinine. Instead of the colorless powder he had expected, he found that oxidizing aniline, a coal tar derivative, produced a reddish powder containing something far more exciting: an intense purple. Fashion would never be the same! This discovery led to the wide commercial availability of low cost, brightly colored fabrics that would be available to all. It also marked the beginning of a hugely profitable business. Continue reading “From Coal Tar to Couture: The Discovery of Aniline Dyes and The Effect Upon Fashion”" ]
[ "<urn:uuid:e56d49b2-9fd6-4b65-8044-45af74765b5f>" ]
[ "CC-MAIN-2023-14" ]
[ "https://blogs.duanemorris.com/fashionretailbrandedconsumergoods/author/swapicelli/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943746.73/warc/CC-MAIN-20230321193811-20230321223811-00170.warc.gz" ]
[ "en" ]
[ 0.9717521071434021 ]
[ 1590 ]
[ 3.203125 ]
[ 3 ]
[ "At the end of the training program, the participant will be able to:\n- Preparing for work activities relating to gemstone identification\n- Separating natural gemstone from imitations and its synthetic counterparts\n- Classifying gemstone into its species and varieties\n- Identifying gemstone treatment\n- Recording identification results\n- Introduction to gemstones basics, gemstones properties and geographical source.\n- Learn the functions of various tools, instruments and the correct interpretation of the results.\n- Practice the operation of handheld loupe, microscope, refractometer, spectroscope, polariscope, dichroscope, ultra-violet lamp, S.G. measuring and Duotester etc.\n- Emphasis on handheld loupe; the most common and important instrument used in the trade.\n- Introduction to more than 20 different types of gemstones in today¡¯s market, such as ruby, sapphires, emerald, aquamarine, garnet, kyanite, opal, quartz, spinel, topaz, tourmaline, tanzanite, zircon, pearl etc. How to identify assembled stones (doublet and triplet) and glass.\n- The importance of inclusions, different types of inclusions and identifying inclusions.\n- Learn how to positively identify various gemstones using the common standard gemological instruments.\n- Understand the different types of synthetic processes for gemstones, including flame fusion, flux melt and hydrothermal process, and the correct identification of these synthetic gemstones by learning their identification characteristics.\n- Understand the various treatment methods commonly applied to enhance gemstones which include dyeing, coating, oiling, heating, impregnation, glass filling, surface diffusion and beryllium treatment. Learn the techniques to identify stones that have undergone these treatments.\n- Intensive practical sessions." ]
[ "<urn:uuid:82bb66df-6c4b-463f-a28c-7258bb882613>" ]
[ "CC-MAIN-2017-30" ]
[ "http://ngi.com.sg/education_gemstoneID.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426086.44/warc/CC-MAIN-20170726082204-20170726102204-00018.warc.gz" ]
[ "en" ]
[ 0.8276711702346802 ]
[ 383 ]
[ 2.984375 ]
[ 3 ]
[ "“Never do anything by halves if you want to get away with it. Be outrageous. Go the whole hog. Make sure everything you do is so completely crazy it’s unbelievable…”\nIn case the quote didn’t give it away, today is Roald Dahl Day!\nToday marks what would have been the beloved author’s 100th birthday, so the celebration is extra special.\nFor more than 50 years Roald Dahl’s books has been an essential part of childhood. From “James and the Giant Peach” to “Matilda” his characters are beloved. More than sweet bedtime stories, his children’s books have a lot to teach their readers.\nThey taught us new words like scrumdiddlyumptious. They taught us how to think for ourselves. They taught us that the world isn’t perfect. Most importantly they taught us about the power of knowledge and goodness.\nBecause while Dahl’s world is not a perfect world, it is filled with hope. Hope in that kindness will overcome fear, hope that knowledge will win over ignorance, and hope in brighter and better future…which is something we could all use a little more of.\n“I began to realize how important it was to be an enthusiast in life. He taught me that if you are interested in something, no matter what it is, go at it at full speed ahead. Embrace it with both arms, hug it, love it and above all become passionate about it. Lukewarm is no good. Hot is no good either. White hot and passionate is the only thing to be.”\n~”My Uncle Oswald”\nMore on the Story: The New Yorker\n…just for fun:" ]
[ "<urn:uuid:6206ad8d-c45b-4903-a4c7-b3ff2923853f>" ]
[ "CC-MAIN-2017-26" ]
[ "https://the2womancrusade.com/2016/09/13/be-outrageous/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321309.25/warc/CC-MAIN-20170627101436-20170627121436-00030.warc.gz" ]
[ "en" ]
[ 0.9558345079421997 ]
[ 367 ]
[ 2.515625 ]
[ 3 ]
[ "Roraima (or [ʁoˈrãjma]) is the northernmost and least populated state of Brazil, located in the Amazon region.\nThe climate is tropical with an annual mean temperature of 26°C (78.8°F). Most of the state is located in the Amazon rainforest, with a small strip of savanna to the east. The state is rich in mineral deposits - especially gold, diamonds, cassiterite, bauxite, marble and copper. Many of these deposits are located in indigenous reserves, and illegal mining has resulted in frequent conflicts with the native population, especially that of the Yanomami and the Macuxi and allied groups.\nThe Monte Roraima National Park is located around one of the highest mountains of Venezuela, a 2,727 m high tepui known as Monte Roraima.\nExcept in the higher mountains where the climate is cooler but very wet, Roraima has an equatorial climate\n. This is a type of tropical climate\nin which there is no dry season\n– all months have mean precipitation\nvalues of at least 60 mm\n. It is usually found at latitudes\nwithin five degrees of the equator\n– which are dominated by the Intertropical Convergence Zone\n. The equatorial climate is denoted Af\nin the Köppen climate classification\n. Tropical rainforest\nis the natural vegetation in equatorial regions.\nThe Amazon represents over half of the planet's remaining rainforests\nand comprises the largest and most species-rich tract of tropical rainforest\nin the world\n. Wet tropical forests are the most species-rich biome\n, and tropical forests in the Americas\nare consistently more species rich than the wet forests in Africa\n. As the largest tract of tropical rainforest in the Americas, the Amazonian rainforests have unparalleled biodiversity\n. More than 1/3 of all species in the world live in the Amazon Rainforest.\nSince the beginnings of the 16th century, the region now considered the state of Roraima was disputed territory, because of its rich mineral reserves. It was sought by the Spanish, Portuguese, Dutch and English until the beginning of the last century. But in 1943, together with a section from the state of Amazonas, the Federal Government created the territory of Branco River, which became Roraima in 1962. In 1988, Roraima became a state by decision of the National Congress. The name of the state was taken from Monte Roraima, whose name comes from the Pemon words “roroi” (“cyan”) and “ma” (“large”).\nAccording to the IBGE of 2007, there were 405,000 people residing in the state. The population density was 1.8 inh./km².\nUrbanization: 80.3% (2004); Population growth: 4.6% (1991-2000); Houses: 97,465 (2005).\nThe last PNAD (National Research for Sample of Domiciles) census revealed the following numbers: 278,000 Pardo (Brown) people (68.8%), 81,000 White people (20.0%), 29,000 Black people (7.4%), 15,000 Asian or Amerindian people (3.8%).\nThe Brazilian Indian agency, (FUNAI) estimates the state's indigenous population at 30,715. The largest indigenous groups are the Macuxi (16,500) and the better-known Yanomami. (11,700) Much of the state's indigenous population lives in several large, legally recognized indigenous reserves and a number of smaller ones, totalling 46.13% of the land area of the state.\n: 74,181 (March/2007);\n: 148,000 (April/2007); Telephones\n: 67,000 (April/2007); Cities\n: 15 (2007).\nThe service sector\nis the largest component of GDP\nat 87.5%, followed by the industrial sector\nat 8.7%. Agriculture\nrepresents 3.8%, of GDP\n(2004). Roraima exports: wood\nShare of the Brazilian economy: 0.1% (2005).\nPortuguese is the official national language, and thus the primary language taught in schools. But English and Spanish are part of the official high school curriculum.\n- Universidade Federal de Roraima (UFRR) (Federal University of Roraima);\n- Centro Federal de Educação Tecnológica de Roraima (Cefet-RR);\n- Faculdade de Ciências Humanas, Biológicas e da Saúde (FCHBS);\n- Faculdade de Teologia de Boa Vista (Fatebov);\n- Faculdade Roraimense de Ensino Superior (Fares);\n- Faculdades Cathedral - Boa Vista (Cathedral-Boa Vista);\n- and many others.\nBoa Vista International Airport\nwas opened on February 19\n, and underwent its first big remodeling in 1998. The passenger terminal, runway and apron were all enlarged, and a separate taxiway\nwas built. The airport\nhas the capacity to receive 675,000 passengers\na year in total comfort\nThe blue of the flag represents the pure air and the sky of Roraima, the white strip symbolizes peace, and the green to the right represents the forests and fields. The star - symbolizing the state in the national flag of Brazil - is yellow, which symbolizes the mineral resources of the state. The red line in bottom stands for the equator\n, which cuts through the state. The flag was designed by the artist Mário Barreto, and was adopted by Law No.133 of June 14" ]
[ "<urn:uuid:90090e96-4a7f-4549-b7c2-4761477f00ee>" ]
[ "CC-MAIN-2013-48" ]
[ "http://www.reference.com/browse/Roraima" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345776833/warc/CC-MAIN-20131218054936-00089-ip-10-33-133-15.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.916933000087738 ]
[ 1226 ]
[ 3.46875 ]
[ 3 ]
[ "For divorcing parents, one of the biggest worries is that the shrinking budget will mean less money for their kid's activities and lessons. After separation, finding the resources to pay for two homes puts a strain on family finances. Often, one or both parents may draw a line in the sand, refusing to consider changes. The discussions become emotional before anyone does their homework about the real benefit of activities and lessons to their kids.\nThere is lots of research about raising healthy and happy kids. Here are some interesting findings:\n1. The value of PLAY\nA child's brain is constantly maturing during play. Children learn to solve problems, socialize, be self-reliant as well as develop imagination and creativity. Play can also be a source of physical development. Playing make-believe strengthens language skills and aids in proper social development. It's been said that the work of a child is play or to be more exact, learning through play.\nRecent studies show that children gain lifetime benefits from their exposure to what is called \"cultural learning.\" Cultural learning means the experiencing the arts and local heritage and culture, including libraries, museums and historical sites. Whether kids are creating, attending or participating, they benefit hugely from the opportunity.\nIn addition to the physical benefits of participation in sports, research shows that sport and physical activity can also have positive benefits on education. Through participation in sport and physical education, young people learn about the importance of key values such as:\n• Fair play\n• Respect for themselves and others, and\n• Following rules.\nBest of all, participation in sports teaches kids how to deal with competition and how to cope with both winning and losing.\nSport-based programs have been shown to improve the learning performance of kids, encouraging school attendance and a desire to succeed academically.\n4. Kids Clubs\nActivities offered by clubs help kids build on what they are learning in school. On top of that, clubs can give them a chance to become leaders -- a valuable experience they may not have in school. For some, being a helper in a service club, a soloist in a music club, or an artist making scenery in a drama club provides a safe place to experiment.\nBeing part of a club is a supervised constructive activity and limits the time that is available for less constructive activity, such as television watching, or computer surfing. Relationships are built with adult leaders and other kids. The adult leaders can serve as role models and provide support and guidance.\nKnowing that your adolescent is \"hanging out\" unsupervised after school can be a source worry. Spending time in supervised constructive activities provides opportunities to gain social skills from interactions with adults and other kids.\n5. Hanging out with the kids\nIt may come as a surprise to learn that studies show the time parents spend with their kids has risen dramatically since the mid-1990s. This is true across the board for men and women alike, despite education levels.\n\"It's taking them to school, helping with homework, bathing them, playing catch with them in the back yard,\" said Erik Hurst, an economist at the University of Chicago Booth School of Business. \"Those are the activities that have increased over the last 15 to 20 years.\"\nWhen kids are asked for their input, they report that they want parents who are less tired and less stressed.\nTips for Parents\nParents have more time to spend with their kids. Divorce means doing more with less. Kids want their parents less stressed and tired.\nHere are a few suggestions that hit all the boxes:\no Instead of chauffeuring your kids around, find at least one fun activity close to home that your kids can do once a week. That way, they can get themselves there and back.\no Go to Google. Type in \"Free things for kids to do in...\" your town or city. The opportunities are endless.\no Try and find the time to volunteer as a parent leader or coach at a club, team or organization that is of interest to your child.\no Get over the mess and make your home the fun destination for your kid's friends. No driving or funds required.\no Encourage your kids to play sports at school, through the local community centre or for older kids- help them arrange \"pick-up\" games locally.\nRemember, for kids, your less can be their more!\nEva Sachs and Marion Korn are the co-founders of Mutual Solutions, a service that provides separating couples with trusted, understandable, actionable and practical advice. For more information please visit www.mutualsolutions.ca." ]
[ "<urn:uuid:21fde2ef-477d-46bb-8f87-2f609992e316>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.huffingtonpost.ca/eva-sachs-and-marion-korn/divorce-kids-budget_b_1252324.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702749808/warc/CC-MAIN-20130516111229-00005-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9671865105628967 ]
[ 942 ]
[ 3.234375 ]
[ 3 ]
[ "Translate reward | into French | into German | into Italian | into Spanish\nDefinition of reward\na thing given in recognition of one’s service, effort, or achievement:the holiday was a reward for 40 years' service with the company he’s reaping the rewards of his hard work and perseverance figurativethe emotional rewards of being a parent a fair return for good or bad behavior:a slap on the face was his reward for his impudence a sum offered for the detection of a criminal, the restoration of lost property, or the giving of information.\nverb [with object]\nmake a gift of something to (someone) in recognition of their services, efforts, or achievements:the engineer who supervised the work was rewarded with a bonus show one’s appreciation of (an action or quality) by making a gift:an effective organization recognizes and rewards creativity and initiative\n) receive what one deserves:their hard work was rewarded by the winning of a five-year contract" ]
[ "<urn:uuid:5d3eac72-a8a4-4ccf-88d0-20e46734daab>" ]
[ "CC-MAIN-2013-20" ]
[ "http://oxforddictionaries.com/us/definition/american_english/reward" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00003-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9714100360870361 ]
[ 203 ]
[ 2.65625 ]
[ 3 ]
[ "DULUTH — It was only one day of work, but Dr. Arthur Aufderheide's observations gave researchers a valuable theory about a rare dinosaur discovery.\nAufderheide, a professor of pathology at the University of Minnesota Duluth, took part in the research of Leonardo, the most complete dinosaur fossil ever discovered. A documentary about it — \"Secrets of the Dinosaur Mummy\" — debuts at 8 p.m. Sunday on the Discovery Channel.\nLeonardo, a Brachylophosaurus and member of the hadrosaur family, was found in Malta, Mont., in 2001. It was first mummified and then fossilized, so it's made of stone with some original tissue probably present.\nAbout 77 million years old, it is the only dinosaur found that still has fossilized skin covering a large portion of its body, and other preserved internal parts, including the stomach and its contents: magnolias, ferns and conifers.\nAufderheide is a renowned expert and author of books in the field of paleopathology — the study of ancient diseases — and on the dissection of mummies.\n\"We contacted Dr. Aufderheide because every time we wanted to get information about the process of mummification, which is not something paleontologists usually have to deal with ... mummy specialists anywhere in the U.S. at any university would point to Dr. Aufderheide,\" said Joe Iacuzzo, project manager for the Leonardo Project in Las Vegas.\nAufderheide suggested to researchers that the area where Leonardo was found\n\"They may have simply prevented the decay of internal organs long enough for them to become fossilized,\" Aufderheide said.\nThe theory was important because researchers have wondered from the beginning: \"Why did nothing eat him? Why did his flesh and internal structures not rot away like virtually every other fossil ever found up until Leonardo?\" Iacuzzo said.\nOther \"dinosaur mummies\" discovered appear to have been preserved differently than Leonardo, he said.\nAufderheide works mainly with human bodies and had never seen a dinosaur until 2006, when he traveled to Malta — about 30 miles from the Canadian border — to help.\n\"I don't normally deal with that age group: millions of years,\" he said. \"Nine thousand [years ] is a lot for me.\"\nAufderheide has built a paleopathology database by examining several hundred mummies from around the world and the bones of many non-mummified remains. His 2003 book, \"The Scientific Study of Mummies,\" is the standard guidebook to paleopathology. He collaborated on a study of bones of ancient Romans in the early 1990s that confirmed they contained extraordinarily high levels of lead, which historians had put forth years before as a possible cause of the decline of the Roman Empire.\nThough Aufderheide is modest about his contribution, his ideas were important to researchers and supported another theory about how the dinosaurs of that period — 12 million years before the end of the dinosaur age — might have died.\nDr. David Eberth of the Royal Tyrrell Museum in Canada has said that a massive extinction occurred when hurricanes, starting in what was then the Gulf of Mexico, traveled through a shallow ocean separating the eastern and western parts of North America, Iacuzzo said.\nBecause there was no land mass to stop them, they grew stronger and created storm surges, including in what is now Montana, which created massive flooding that would have killed everything, Iacuzzo said.\n\"Especially larger animals, who would have a hard time treading water ... or grabbing on to a small floating object and ride out the storm,\" he said. \"That's one theory on why you find so many complete skeletons in that area.\"" ]
[ "<urn:uuid:02874bcd-ab58-4eb9-9e9b-5ade41627038>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.twincities.com/ci_10436090" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706635944/warc/CC-MAIN-20130516121715-00073-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9683911204338074 ]
[ 794 ]
[ 3.140625 ]
[ 3 ]
[ "What is SUB file?\nThe Subtitle File (.SUB) is a standard file extension used by the subtitle editor to store subtitles for multimedia files that are created with subtitle editing software. The file extension is used for subtitles included in movies, TV shows, and video games. The Subtitle File (.SUB) was first introduced by Microsoft Windows in 1995 with its release of Windows 95. Microsoft was hoping to make it easier for people to edit subtitles. Subsequently, Apple Inc released QuickTime 4 which supports the .SUB file extensions as well as the .SRT file extensions (used by Adobe Systems' Premiere). By 2002, QuickTime supported subtitle formats that include .SUBs. It also supported .SRT files that were created by Adobe's After Effects program. The use of preset subtitle\nSUB Format details\n|Full Name||Subtitle Format|\nSoftware, that convert SUB files\nThe easiest way to convert a SUB file is to save it in a different file format using dedicated software. Below you will find a list of software programs that can handle SUB files. Open your SUB file with one of them and save in another file format.\n- VLC media player\n- Jubler subtitle editor\n- Subs Factory\n- VLSub extension for VLC player" ]
[ "<urn:uuid:bd950739-1caa-4a96-9c7f-2df83a4fa6d4>" ]
[ "CC-MAIN-2023-14" ]
[ "https://converter.tips/file/sub" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943746.73/warc/CC-MAIN-20230321193811-20230321223811-00390.warc.gz" ]
[ "en" ]
[ 0.9198665618896484 ]
[ 292 ]
[ 2.96875 ]
[ 3 ]
[ "The Importance of History in the Classroom\nThe subject of history in the classroom and what students are learning or not learning has been the subject of recent polls. While I am not a favorite of poll results basic history information seems to have been lost in the classrooms of today. The history of our country is important and it is important that students learn basic historical facts and events that shaped our country.\nA recent poll indicated that only 25% of those who responded knew who the name of the first President of the United States. The one result raises questions not only of what is being taught but how it is being taught in our schools concerning our history. We are a young country compared to others in the world and we have a rich history like many others. Some may feel that learning about some events in our history is not important enough to be taught in our schools and some may even have textbooks which change certain events. Changing events and the environment in which they occurred is unacceptable.\nOur short history has seen many issues which shaped who we are as a country and it can have an impact on what our country will be in the future. To understand where we need to go as a country we must first understand from where we came as a country. Our rich history should be taught in such a way as to understand the events and issues that shaped them. From our beginnings as a country to where we are today our country had some major events. Some examples are the Revolutionary War, War of 1812, the Civil War, World War I and World War II.\nLeading our country in these periods and through these events have been several Presidents. The events noted in the previous paragraph are important as they had an impact on who we are as individuals and who we are as a country. To either ignore these events or reword them to be politically correct today would be wrong. I am not implying that this is occurring but the results of the poll cited in the beginning of this article raises questions as to what is being taught surrounding the subject of history.\nThe events previously cited each had significant reasons either for our involvement or actions that we took as a country. Granted we were not officially a country when the Revolutionary War began but we were developing as a country and we had the basic elements of a country as evidenced by the Declaration of Independence. The Declaration of Independence is the one single document that exhibited our will to make our own decisions separate from any other country. Those who came to our country in the early days had visions of a better life for themselves, their families and friends. When that vision was threatened decisions were made to change the path on which our young country was headed.\nWe as a country have been through much and it is important for those who will grow to be the leaders of tomorrow understand our past. This is what teaching about our history is all about. Teaching history as part of our school system is important but what is taught is just as important. Today there is great effort to be politically correct for fear of saying the wrong thing about issues of the past. Those who create the textbooks for our schools must understand they need to be less worried about being politically correct and present the facts as they happened. It is also important to identify in history classes as well as others that all the facts be presented not just a portion of them. Information which is left out of any topic in our schools can and will affect how the leaders of tomorrow will form a position on the issues that come before them." ]
[ "<urn:uuid:4929ad77-e2ed-409a-b07f-a321dc2f39a1>" ]
[ "CC-MAIN-2017-26" ]
[ "https://hubpages.com/education/The-Importance-of-History-in-the-Classroom" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323588.51/warc/CC-MAIN-20170628083538-20170628103538-00645.warc.gz" ]
[ "en" ]
[ 0.9875319600105286 ]
[ 703 ]
[ 3.375 ]
[ 3 ]
[ "The Importance of Financial Literacy to The Philosophy of a Hustler\nIn the philosophy of a hustler, financial literacy is an essential component for achieving success. The ability to understand and manage your money is crucial to growing and sustaining your business or personal finances. In this article, we will explore the importance of financial literacy and how it plays a vital role in the philosophy of a hustler.\nWhat is Financial Literacy?\nFinancial literacy is the ability to understand and effectively manage your personal finances. It includes the knowledge and skills needed to make informed decisions about money, such as budgeting, saving, investing, and managing debt. A financially literate person is equipped to make sound financial decisions and take control of their financial future.\nThe Importance of Financial Literacy in the Philosophy of a Hustler\nIn the philosophy of a hustler, financial literacy is critical to achieving success. Here are some reasons why:\n- Financial Goals: To achieve financial success, you must have specific goals and a plan to reach them. A financially literate hustler knows how to set realistic goals, create a budget, and manage their finances to achieve those goals.\n- Risk Management: As an entrepreneur or business owner, there are inherent risks involved. A financially literate hustler understands how to manage these risks through proper insurance coverage, savings, and investments.\n- Investment Opportunities: A financially literate hustler can identify and take advantage of investment opportunities that align with their financial goals. They understand the risks and rewards of different investment options and can make informed decisions.\n- Debt Management: A financially literate hustler knows how to manage debt effectively, avoiding high-interest rates and fees. They can make informed decisions about taking on debt and have a plan for paying it off.\n- Understanding Financial Statements: A financially literate hustler can read and understand financial statements, including income statements and balance sheets. This knowledge helps them make informed decisions about their business or personal finances.\n- Personal Financial Stability: Financial literacy is essential for personal financial stability. A financially literate hustler has a better understanding of how to manage their money and avoid financial hardship.\n- Generational Wealth: Building generational wealth is about more than just making money. It requires a deep understanding of financial literacy, including estate planning, tax management, and investing. A financially literate hustler can build a legacy of financial stability and success for their family and future generations.\nFinancial Literacy in Modern and Ancient Philosophy\nThe importance of financial literacy can be traced back to ancient philosophy. In the words of Aristotle, “The art of acquiring property is no doubt a part of the art of managing a household, for no man can live well, or indeed live at all, unless he be provided with necessaries.” This highlights the idea that financial stability and management are essential for personal well-being.\nIn modern times, financial literacy has become increasingly important as the economy has become more complex. Financial literacy education is now widely available, and many financial experts emphasize the importance of acquiring this knowledge.\nBooks on Financial Literacy\nIf you are looking to improve your financial literacy, there are many books available to help you get started. Here are some recommendations:\n- Rich Dad, Poor Dad by Robert Kiyosaki: This book teaches you about building wealth through financial literacy, real estate investing, and entrepreneurship.\n- The Intelligent Investor by Benjamin Graham: This classic book teaches you about value investing and how to analyze stocks.\n- The Total Money Makeover by Dave Ramsey: This book provides a step-by-step guide to taking control of your finances and getting out of debt.\nIn the Bible, there are many verses that emphasize the importance of managing money and being financially responsible. One such verse is Proverbs 21:20, which says, “The wise store up choice food and olive oil, but\nfools gulp theirs down.” This verse speaks to the idea of saving and planning for the future, rather than simply living in the moment and consuming everything without a thought for tomorrow.\nAnother biblical principle is the idea of stewardship. In Luke 12:42, Jesus says, “Who then is the faithful and wise manager, whom the master puts in charge of his servants to give them their food allowance at the proper time?” This verse emphasizes the importance of being a responsible manager of what we have been given, whether it’s money, time, or other resources.\nThe Bible also cautions against the love of money, warning that it can lead to all sorts of evil. 1 Timothy 6:10 says, “For the love of money is a root of all kinds of evil. Some people, eager for money, have wandered from the faith and pierced themselves with many griefs.” This verse serves as a reminder that money, while important, should never take priority over our spiritual well-being and personal values.\nUltimately, financial literacy is an essential component of the philosophy of a hustler. By taking the time to learn about money management, investing, and financial planning, individuals can develop the skills they need to take control of their financial future and achieve their goals. With a solid understanding of financial principles and a strong work ethic, anyone can become a successful hustler and achieve their dreams." ]
[ "<urn:uuid:a8fcb40d-a192-4e2a-bc7c-6c51c67cbb3c>" ]
[ "CC-MAIN-2023-14" ]
[ "https://www.marchustle.com/financial-literacy/the-importance-of-financial-literacy-to-the-philosophy-of-a-hustler/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943704.21/warc/CC-MAIN-20230321162614-20230321192614-00170.warc.gz" ]
[ "en" ]
[ 0.9358075857162476 ]
[ 1090 ]
[ 2.875 ]
[ 3 ]
[ "Table of Contents\nStrong and healthy vision makes almost every aspect of life easier. Most people are familiar with 20/20 vision, but 20/15 vision is even better. (Read More)\nIf you have 20/15 vision, you can see things at 20 feet that people with normal 20/20 vision can see at 15 feet. This means you have vision that is better than 20/20.\nEye doctors can perform various tests to determine vision acuity. (Learn More)\nSome people naturally have 20/15 vision. (Learn More) If your vision is not normal, there are things you can do to improve it.\nCorrective lenses and LASIK are both treatment options. With LASIK, the goal is improved vision, not necessarily 20/15 vision.\nWhat Is 20/15 Vision?\nVisual acuity describes how sharp a person’s vision is. To measure acuity, a person looks at numbers or letters according to a fixed standard at a given distance.\nNormal vision is considered 20/20 vision. This means you can see things at 20 feet that a person with normal vision can see at 20 feet. If you have 20/15 vision, you can see things at 20 feet that a person with normal vision can see at 15 feet. This means that 20/15 vision has greater acuity than 20/20 vision.\nThere are neurological and physical factors involved in determining visual acuity. These include:\n- Nerve sensitivity in the brain’s vision centers and retina.\n- How accurately the eye’s lens and cornea focus light onto the retina.\n- How well the brain interprets the information the eyes send to it.\nHow Is Vision Measured?\nVisual acuity is measured using the Snellen chart. Traditionally, this chart has a white background with black numbers or letters in varying sizes. While not as common, some doctors use video monitors that display images or letters.\nThe Snellen test is performed in the following way:\n- Cover one eye with your hand or a small paddle.\n- Stand 20 feet away from the chart.\n- The doctor will ask you to read a specific line and make note of the accuracy.\n- More than one line may be read.\n- The test is repeated on the other eye.\nThe doctor will use the visual acuity measurement on the smallest line you can read accurately to provide a vision assessment. For example, if the smallest line you can read accurately is the 20/15 line, you have 20/15 vision.\nThe chart’s top number describes how far you stood from the chart. With 20/15 vision, you were 20 feet away.\nEveryone should take a Snellen test according to their doctor’s recommendation. On average, kids should have their first test when they are old enough to work with the doctor to cover an eye and use the chart. How often they need to have the tests will depend on their results.\nOnce people reach age 60 or 70, it is normal to experience a slight decrease in visual acuity.\nMany people start to notice changes around middle age. These changes are normally with near vision more than acuity. Because of this, it is recommended to get a baseline eye examination around 40 years old.\nAs people get older, the lenses in the eyes start to lose their flexibility. This can make it more difficult to switch focus from far away objects to those that are near. Eye doctors refer to this as presbyopia. Bifocals or reading glasses might be needed to correct this issue.\nHow Can You Achieve 20/15 Vision?\nIt is possible to have 20/15 vision naturally. People can also achieve this level of visual acuity through corrective surgery, such as LASIK. However, undergoing corrective surgery does not guarantee that you will achieve 20/15 vision.\nIf LASIK results in vision that is better than 20/20, it is referred to as an overcorrection. For some people, it is not an issue, but it is possible that it can cause some discomfort for others. It may cause headaches, blurry vision, and eye strain in some cases.\nAs a result, 20/15 or better vision is never the goal of LASIK. The aim is to get vision that is close to 20/20 or simply to improve vision overall.\nHow Age Affects It\nWhether you have 20/15 vision due to surgery or naturally, it can decrease with age. With age, the following vision changes are normal:\n- It becomes more difficult to focus on close objects.\n- You need more light to see well.\n- It is harder to tell the difference between colors, such as black and dark blue.\nHow Much Better Is 20/15 Vision Compared to 20/20 Vision?\nOptometrists consider 20/20 vision to be normal, but it does not mean that someone has perfect vision. It is possible to have 20/20 visual acuity but still have other eye problems.\nAmong U.S. adults who do not wear corrective lenses, approximately 35 percent have 20/20 vision.\nWhen someone has 20/15 vision, they essentially have five more feet of clear visual acuity. This means they can see further with clarity than the average person.\nAgain, this higher level of acuity does not mean that the person has above-average vision overall. The entire picture of eye health and vision needs to be considered.\nIf you want to improve your vision, talk to an optometrist or ophthalmologist about your options. LASIK or other corrective eye surgery could help you to achieve better vision.\nVisual Acuity: Is 20/20 Perfect Vision? (April 2019). All About Vision.\nVisual Acuity Test. MedlinePlus.\nYour Vision After LASIK. (July 2019). Verywell Health.\nVision Changes as We Age: What’s Normal, What’s Not? (September 2016). University of Utah.\nGet an Eye Disease Screening at 40. American Academy of Ophthalmology.\nLASIK Risks and Complications. (August 2018). All About Vision.\nWhat Does 20/20 Vision Mean? (November 2016). American Academy of Ophthalmology.\nPrevalence of Refractive Error in the United States, 1999-2004. (August 2008). Archives of Ophthalmology." ]
[ "<urn:uuid:490d1a9e-519e-43a2-9266-2c878c4cb88d>" ]
[ "CC-MAIN-2020-10" ]
[ "https://www.nvisioncenters.com/lasik/20-15-vision/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146341.16/warc/CC-MAIN-20200226084902-20200226114902-00385.warc.gz" ]
[ "en" ]
[ 0.9379826188087463 ]
[ 1322 ]
[ 3.421875 ]
[ 3 ]
[ "Auditing is a business function used to review a company’s internal controls and accounting information processes. While small businesses may not use this function as frequently as larger businesses, it is an important function for safeguarding operations. Companies often develop a strategy or set of procedures to follow when conducting audits. This strategy often depends on the size of the company and scope of business operations.\nTwo types of audits are used frequently in business: internal and external. Internal audits usually are conducted by a company’s accounting staff. This audit is often less formal than external audits and is used primarily for managerial decisions. A public accounting firm or an individual certified public accountant (CPA) usually conducts external audits. These audits represent a professional third-party review of the company’s accounting information. External audits help outside business stakeholders make decisions about the company.\nBusiness strategies help companies set specific schedules when conducting internal and external audits. Internal audits can be completed as frequently as needed according to the company’s accounting policies. External audits may be required according to a lender, investor or government regulatory rules. Because external audits can be an expensive and time-consuming process, developing a business strategy audit process help limit these negative side effects of external audits.\nAudit strategies usually outline the specific business functions or processes reviewed during internal or external audits. These strategies often review specific financial or business information in a sequential and logical manner. Strategies include auditing cash management, fixed assets, payroll, general accounting or other specific business functions. Audits also may include specific limitations on the acceptable number of errors for each process. If more errors are found than acceptable, companies may widen the audit to determine the depth and breadth of these errors.\nCompanies often develop operational or compliance audit strategies in addition to financial audits. Operational audits ensure business departments complete functions according to standard operating procedures. This audit also may review an employee’s training and education on company policies. Compliance audits ensure companies meet specific guidelines relating to a third-party organization. Outside organizations can include government regulatory agencies, professional trade groups or licensing organizations.\nAudits can help companies streamline their operations and reduce wasteful operations. Companies often use audits to secure external financing from banks, lenders or investors. These audits provide these groups with information relating to the effectiveness of business operations and the company’s ability to remain a going concern. Audit strategies also can help companies create flexible operations so they can adjust to new or different business requirements.\n- \"Modern Auditing\"; William C. Boynton, Raymond N. Johnson and Walter G. Kell; 2001\n- Comstock/Comstock/Getty Images" ]
[ "<urn:uuid:97019c95-3d5f-403c-8ce6-bea162768d5b>" ]
[ "CC-MAIN-2017-26" ]
[ "http://smallbusiness.chron.com/business-strategies-auditing-4615.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321553.70/warc/CC-MAIN-20170627203405-20170627223405-00692.warc.gz" ]
[ "en" ]
[ 0.9184396862983704 ]
[ 532 ]
[ 3.171875 ]
[ 3 ]
[ "Although we do not know why Thorvald Hellesen chose to depict a balalaika in this painting, musical instruments in general were a frequent motif in cubist paintings. The relationship between the different art forms, such as music and painting, was also a theme that preoccupied many of the artists of the era. The balalaika has its origins in Russian folk music and is often used to articulate a quick, repetitive rhythm, and both musicality and rhythm typify Hellesen’s painting. The clear colours and the way in which the image is abstracted and dissolved into recurring forms help create a dynamic, pulsating visual harmony.\nAround 1920, Hellesen was a member of the progressive art community in Paris and became friends with artists such as Fernand Léger. He was one of few Norwegian artists to be inspired by cubism, but the painting also evinces a keen awareness of the other nascent movements of the time. Along with Ragnhild Keyser, Charlotte Wankel, and others, he is one of the leading Norwegian abstract modernists from the 1920s.\nHellesen was forgotten for a long time. Compared with his Norwegian contemporaries, his selected style was different and radical. He disappeared from the Norwegian art scene after his paintings met little understanding in his native country around 1920, and a decade later he stagnated as an artist. Around 1970 his production was rediscovered, however, and the subsequent appreciation of his art has ensured him a more rightful place in Norwegian art history.\nText: Øystein Ustvedt\nFrom \"Highlights. Art from Antiquity to 1945\", Nasjonalmuseet 2014, ISBN 978-82-8154-088-0" ]
[ "<urn:uuid:8a80d178-ccb9-42b8-bc8e-a3106f0ed734>" ]
[ "CC-MAIN-2020-05" ]
[ "http://samling.nasjonalmuseet.no/en/object/NG.M.03283" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250603761.28/warc/CC-MAIN-20200121103642-20200121132642-00309.warc.gz" ]
[ "en" ]
[ 0.9823216199874878 ]
[ 352 ]
[ 3.59375 ]
[ 4 ]
[ "To use all functions of this page, please activate cookies in your browser.\nWith an accout for my.chemeurope.com you can always see everything at a glance – and you can configure your own website and individual newsletter.\n- My watch list\n- My saved searches\n- My saved topics\n- My newsletter\nThe papaya (from Carib via Spanish), is the fruit of the tree Carica papaya, in the genus Carica. It is native to the tropics of the Americas, and was cultivated in Mexico several centuries before the emergence of the Mesoamerican classic cultures. Papaya is also known as PEnPe (Bengali: পেঁপে), fruta bomba (Cuba), lechoza (Venezuela, Puerto Rico, the Philippines and the Dominican Republic), mamão (Brazil), papaw (Sri Lankan English), Papol \\ Guslabu (Tree melon in Sinhalese), pawpaw or tree melon, as well as tree melon (木瓜) in Chinese and đu đủ in Vietnamese.\nIt is a small tree, the single stem growing from 5 to 10 m tall, with spirally arranged leaves confined to the top of the trunk; the lower trunk is conspicuously scarred where leaves and fruit were borne. The leaves are large, 50-70 cm diameter, deeply palmately lobed with 7 lobes. The tree is usually unbranched if unlopped. The flowers are similar in shape to the flowers of the Plumeria but are much smaller and wax like. They appear on the axils of the leaves, maturing into the large 15-45 cm long, 10-30 cm diameter fruit. The fruit is ripe when it feels soft (like a ripe avocado or a bit softer) and its skin has attained an amber to orange hue. The fruit's taste is vaguely similar to pineapple and peach, although much milder without the tartness, creamier, and more fragrant, with a texture of slightly over-ripened cantaloupe.\nAdditional recommended knowledge\nCultivation and uses\nOriginally from southern Mexico, Central America and northern South America, the papaya is now cultivated in most countries with a tropical climate like Brazil, India, South Africa, Sri Lanka and the Philippines.\nThe ripe fruit is usually eaten raw, without the skin or seeds. The unripe green fruit of papaya can be eaten cooked, usually in curries, salads and stews.\nGreen papaya is rich in an enzyme called papain, a protease which is useful in tenderizing meat and other proteins. Its ability to break down tough meat fibers was utilized for thousands of years by indigenous Americans. It is included as a component in powdered meat tenderizers, and is also marketed in tablet form to remedy digestive problems. Green papaya is used in Thai cuisine, both raw and cooked. Papain is also popular (in countries where it grows) as a topical application in the treatment of cuts, rashes, stings and burns. Papain ointment is commonly made from fermented papaya flesh, and is applied as a gel-like paste. Harrison Ford was treated for a ruptured disc incurred during filming of Indiana Jones and the Temple of Doom by having papain injected into his back.\nCaution should be taken when harvesting, as papaya is known to release a latex fluid when not quite ripe, which can cause irritation and provoke allergic reaction in some people. The papaya fruit and leaves also contains carpaine, an anthelmintic alkaloid which could be dangerous in high doses. Women in India, Pakistan, Sri Lanka, and other parts of the world have long used papaya as a folk remedy for contraception and abortion. Medical research in animals has confirmed the contraceptive and abortifacient capability of papaya, and also found that papaya seeds have contraceptive effects in adult male langur monkeys, possibly in adult male humans as well. Unripe papaya is especially effective in large amounts or high doses. Papaya is not teratogenic and will not cause miscarriage in small, ripe amounts. Phytochemicals in papaya may suppress the effects of progesterone.\nThe black seeds are edible and have a sharp, spicy taste. They are sometimes ground up and used as a substitute for black pepper. In some parts of Asia the young leaves of papaya are steamed and eaten like spinach.\nExcessive consumption of papaya, as of carrots, can cause carotenemia, the yellowing of soles and palms which is otherwise harmless.\nThe papaya fruit is susceptible to the Papaya Fruit Fly. This wasp-like fly lays its eggs in young fruit.\nCategories: Medicinal plants | Abortifacients\n|This article is licensed under the GNU Free Documentation License. It uses material from the Wikipedia article \"Papaya\". A list of authors is available in Wikipedia.|" ]
[ "<urn:uuid:0858de76-f57f-4224-9163-4e9af6373b15>" ]
[ "CC-MAIN-2023-14" ]
[ "https://www.chemeurope.com/en/encyclopedia/Papaya.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945289.9/warc/CC-MAIN-20230324211121-20230325001121-00000.warc.gz" ]
[ "en" ]
[ 0.9464332461357117 ]
[ 1090 ]
[ 3.21875 ]
[ 3 ]
[ "Paul J. Ponganis and Gerald L. Kooyman of the Center for Marine Biotechnology and Biomedicine at Scripps Institution of Oceanography provide the following answer.\nImage: COURTESY OF SCOTT HILL/ NOAA/NMML\nSome sea creatures exploit great depths. The biggest physiological challenges in adapting to pressure are probably faced by those animals that must routinely travel from the surface to great depth. Two such animals are the sperm whale and the bottlenose whale. From the days of whaling, these animals have been recognized as exceptional divers, with reports of dives lasting as long as two hours after they were harpooned. Today, with the use of sonar tracking and attached time-depth recorders, dives as deep as 6,000 feet (more than a mile below the surface of the ocean) have been measured. Routine dive depths are usually in the 1,500- to 3,000-foot range, and dives can last between 20 minutes and an hour.\nDiving to depth can result in mechanical distortion and tissue compression, especially in gas-filled spaces in the body. Such spaces include the middle ear cavity, air sinuses in the head, and the lungs. Development of even small pressure differentials between an air cavity and its surrounding tissue can result in tissue distortion and disruption¿a condition in human divers known as \"the squeeze.\" In some species of cetaceans, the middle ear cavity is lined with an extensive venous plexus, which is postulated to become engorged at depth and thus reduce or obliterate the air space and prevent development of the squeeze. Cetaceans also have large Eustachian tubes communicating with the tympanic cavity of the ear and the large pterygoid sinuses of the head. These air sinuses of the head have an extensive vasculature, which is thought to function in a manner similar to that of the middle ear and facilitate equilibration of air pressure within these spaces. Lastly, most marine mammals lack frontal cranial sinuses like those present in terrestrial mammals.\nAnother organ susceptible to compression damage is the lung. In deep-diving whales and seals, the peripheral airways are reinforced, and it is postulated that this allows the lungs to collapse during travel to depth. Such collapse has been observed radiographically and confirmed with blood nitrogen analyses in the deep-diving Weddell seal.\nCollapse of the lungs forces air away from the alveoli, where gas exchange between the lungs and blood occurs. This blunting of gas exchange is important in the deep diver because it prevents the absorption of nitrogen into the blood and the subsequent development of high blood nitrogen levels. High blood nitrogen pressures can exert a narcotic effect (so-called nitrogen narcosis) on the diver. It may also lead to nitrogen bubble formation during ascent¿a phenomenon known as decompression sickness or \"the bends.\" Collapse of the lungs in the deep diver avoids these two problems.\nLoss of gas exchange at depth has another important implication: the lungs of the deep diver cannot serve as a source of oxygen during the dive. Instead deep-diving whales and seals rely on large oxygen stores in their blood and muscle. Several adaptations enable this. First, these animals have mass specific blood volumes that are three to four times those found in terrestrial mammals (i.e., 200 to 250 milliliters of blood per kilogram body mass, in contrast to a human value of 70 milliliters blood per kilogram). Second, the concentration of hemoglobin (the oxygen-transport protein in blood) is also elevated to a level about twice that found in humans. Third, the concentration of myoglobin, the oxygen storage protein in muscle, is extremely elevated in these animals, measuring about 10 times that in human muscle." ]
[ "<urn:uuid:c6fe9ed2-e0b7-4ca6-bb6d-9ad595def276>" ]
[ "CC-MAIN-2013-48" ]
[ "http://www.scientificamerican.com/article.cfm?id=how-do-deep-diving-sea-cr" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164027414/warc/CC-MAIN-20131204133347-00091-ip-10-33-133-15.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.943550705909729 ]
[ 786 ]
[ 3.875 ]
[ 4 ]
[ "A UNIQUE SURVEY MONUMENT – WISCONSIN’S STATE CAPITOL\nThe idea of writing a story along with accompanying pictures of an interesting survey monument at first seemed like a difficult task. Even with years of field experience, most monuments have never been found to be very picturesque. But wait a minute, we do indeed have one to talk about. It is in fact Wisconsin’s State Capitol. The very center of its rotunda represents the section corner common to Sections 13, 14, 23, and 24, Township 7 North, Range 9 East, 4th Principal Meridian, Northwest Territory.\nThe December 1834 field notes of deputy surveyor Orson Lyon indicate that he headed north between sections 23 and 24, 40 chains to the quarter section corner “in lake”. (Surveyors back then could walk on water!) Continuing north at 51.28 chains he set a post on the north side of lake, tying it in to an 18” hickory and an 11” black oak. He continued north, and at 80 chains set the land as “rolling and 2nd rate”. Little did he realize that 72 years later the location of this plain old wood post would be marked with Wisconsin’s present-day Capitol. It lies on an isthmus running in a northeast-southwest direction between Lakes Monona (“3rd Lake”) and Mendota (“4th Lake”) on the north.\nIn researching the records, we were fortunate to have, within two blocks of the Capitol, the offices of the Board of Commissioners of Public Lands. There we found the original field books and a map of the township. But one thing remained a mystery: How in the world did Orson Lyon maintain a line of direction and distance when encountering the “3rd Lake” as he came up from the south? If the lake had been frozen over, we’d have the answer. Obviously, the original field notes, which have been preserved, were not prepared on the spot as the crew pressed onward. Mr. Lyon would have kept separate running notes and calculation sheets as he traversed around the lake, and then calculated his position on the far side. A second and more likely scenario might have been to establish a base line, say 10 chains to the east or west of the already established northbound section line, and at each end of this base line measured the angle to a distinct point at the far end of the lake. He then could compute its location – having two angles and the included side.\nOh, how they could have used GPS back then, and two-way radios to direct a lone flagman as he tried to communicate with the rest of the crew at the South end of the lake. We suspect that those “original notes” we find in the preserved field books were in fact the second generation of notes, and were prepared in the evening under candle light. The deputy surveyor was evidently not required to file his “scratch” notes and calculation work sheets while performing the surveys of the public lands at that time. However, in later years as the Public Land surveys moved westward, such notes were preserved and can generally be found today in those survey files.\nSo is the rotunda precisely centered on the Section Corner as intended? That was certainly the intention of George B. Post, architect for the state’s third capitol. The second capitol had been destroyed by fire in 1904. A drawing in the Capitol’s archives shows that the new Capitol’s center was to be placed at the center of the public square, which in turn was centered on the section corner. Members of the Madison Chapter of the Wisconsin Society of Land Surveyors (WSLS) have had a keen and ongoing interested in the relationship between the two positions. They have done extensive voluntary research, both in office and field, to reconstruct the section lines, and the street centerlines which fan out in six directions. In 1985, ceremonies were conducted in conjunction with the 200th Anniversary of the Public Land Survey System. With television and newspaper coverage, using an antique compass and chain, the Chapter reenacted the setting of the section corner with a brass disc. However, the Capitol Building commissioners rejected the idea of epoxying the disk onto the marble floor.\nAs the precise location of the section corner, it depends on which combination of monuments and street line extensions one might use to reset the corner. Relative to the massive size of the building and its rotunda, it can be safely said that its center is well within an acceptable error ellipse generated from the chapter’s measurements and computations.\nIn the meantime, WSLS is reviewing efforts to place a brass marker made by Berntsen International, marking the section corner on the floor directly below the Capitol’s main floor. An exhibit describing this unique survey monument, along with other surveying memorabilia is also being prepared for display in the Capitol’s museum on the sixth floor.\n─ Harold S. Charlier, Executive Director, Wisconsin Society of Land Surveyors, Waukesha, Wisconsin\nOriginally published in Lasting Impressions - A Glimpse into the Legacy of Surveying -Copyright © 2006 by Berntsen International, Inc." ]
[ "<urn:uuid:7dcd57e5-fed1-4ac6-a528-a24a94e636fd>" ]
[ "CC-MAIN-2020-05" ]
[ "https://www.berntsen.com/Famous-Monuments/Wisconsin-State-Capitol-Marker" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251671078.88/warc/CC-MAIN-20200125071430-20200125100430-00422.warc.gz" ]
[ "en" ]
[ 0.965938150882721 ]
[ 1097 ]
[ 3.015625 ]
[ 3 ]
[ "- This article is about the didactic poet. There was also an Aratus of Sicyon and an Aratus, son of Asclepius\n- For the crab genus, see Aratus (crab).\nAratus (Greek Ἄρατος ὁ Σολεύς) (ca. 315 BC/310 BC – 240 BC) was a Greek didactic poet, known for his technical poetry.\nHe was born in Soli\nin Cilicia and was a contemporary of Callimachus\n. He is known to have studied with Menecrates\n. As a disciple of the Peripatetic philosopher Praxiphanes\n, in Athens\n, he met the Stoic\n, as well as Callimachus\n, the founder of the Eretrian School.\nAbout 276 he was invited to the court of the Macedonian king Antigonus II Gonatas, whose victory over the Gauls in 277 BC Aratus set to verse. Here he wrote his most famous poem, Phaenomena (\"Appearances\"). He then spent some time at the court of Antiochus I Soter of Syria, but subsequently returned to Pella in Macedon (now located in the periphery of Central Macedonia, Greece), where he died about 240 BCE.\nAratus' major extant work is his hexameter poem Phaenomena\n(\"Appearances\"), the first half of which is a verse setting of a lost work of the same name by Eudoxus of Cnidus\n. It describes the constellations\nand other celestial phenomena. The second half of Phaenomena\n, \"on weather signs\", is chiefly about weather lore. Frequently referred to as the Diosemeia\n, and sometimes circulated separately under that title, it draws chiefly from a work on weather signs attributed to Theophrastus\n. The work as a whole has all the characteristics of the Alexandrian\nschool of poetry\n. Although Aratus was ignorant of astronomy, his poem attracted the favorable notice of 18 distinguished specialists, such as Hipparchus\n, who wrote a commentary upon it.\nAratus also wrote a number of other poems, many of an astronomical or technical nature.\nAratus enjoyed immense prestige among Hellenistic\npoets, including Theocritus\nand Leonidas of Tarentum\n. This assessment was picked up by Latin\npoets, including Ovid\nversions were made by none other than Cicero\n(fragmentary), Ovid (only two short fragments remain), the member of the imperial Julio-Claudian dynasty Germanicus\n(mostly extant), and the less-famous Avienus\nwas less enthusiastic. Aratus was also cited by Luke the Evangelist\nin the second half of Acts\n, 17.28, where he relates Saint Paul\n's address on the Areopagus\n. Paul, speaking of God\n, quotes the fifth line of Aratus's Phaenomena\nseems to be the source of the first part of Acts 17.28\n, although this is less clear):\n- Let us begin with Zeus, whom we mortals never leave unspoken.\n- For every street, every market-place is full of Zeus.\n- Even the sea and the harbour are full of this deity.\n- Everywhere everyone is indebted to Zeus.\n- For we are indeed his offspring... (Phaenomena 1-5).\nAuthors of twenty-seven commentaries are known; ones by Theon of Alexandria, Achilles Tatius and Hipparchus of Nicaea survive. An Arabic translation was commissioned in the ninth century by the Caliph Al-Ma'mun. He is cited by Vitruvius, Stephanus of Byzantium and Stobaeus. Several accounts of his life are extant, by anonymous Greek writers.\nThe Aratus crater on the Moon was named in his honour.\n- Two important recent editions of Aratus' work:\n- Douglas Kidd, Phaenomena, edited with introduction, translation and commentary, Cambridge, 1997.\n- Jean Martin, Aratos. Phénomènes, edited with translation and notes, 2 vols., Collection Budé, 1998.\n- The Apostle and the Poet: Paul and Aratus (Dr. Riemer Faber)\n- Review of above by Mark Possanza, BMCR (September 1999).\n- Hellenistic Bibliography, Aratus and Aratea compiled by Martijn Cuypers\n- \"Written in the Stars:Poetry and Philosophy in the Phaenomena of Aratus\" by Richard L. Hunter, Arachnion 2.\n- Suda On-Line: Aratus, with a list of works ascribed to Aratus; the Suda is a Byzantine encyclopedia.\n- Ancient Greek Scientists\n- A prose translation of Phaenomena Book I" ]
[ "<urn:uuid:aa43010e-5635-4847-b666-5ea58760ca40>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.reference.com/browse/aratus+sicyon" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00020-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9520388245582581 ]
[ 1022 ]
[ 3.078125 ]
[ 3 ]
[ "Bar Mitzvah/Bat Mitzvah\nMany people are surprised to find out that “becoming Bar/Bat Mitzvah” happens automatically when a Jewish boy reaches the age of 13 or when a Jewish girl reaches 12. The ceremony that has become one of the most familiar Jewish rites of passages is actually a rather recent addition in the context of Jewish ritual history. Only in the 14th century do sources begin mentioning a boy being called up to the Torah for the first time on the Sabbath coinciding with or following his 13th birthday. By the 17th century, boys were also reading Torah and delivering talks, often on talmudic learning, at an afternoon meal. Today the speech, usually a commentary on the weekly Torah portion, generally takes place during the Shabbat morning service.\n“For the Rabbis, the significance of this life-changing moment lay in the child’s new stage of physical, intellectual, and moral development. They saw 12 and 13 as the ages at which girls and boys, respectively, were no longer entirely subject to impulse, but were beginning to develop a conscience. The term Bar/Bat Mitzvah–which means “obligated to perform the Jewish mitzvot (commandments)–reflects the child’s newfound capabilities and responsibilities.” (ref)\nThe Bat Mitzvah ceremony observed today grew out of a broader societal focus on women’s rights, with the first American Bat Mitzvah occurring in 1922. The concept of a Bat Mitzvah ceremony within traditional Judaism is far more recent. Because Jewish law limits a woman’s religious responsibilities primarily to commandments that are not time-bound (meaning, not required to be performed at a particular time), a woman’s Jewish activity occurred primarily within the private, familial realm rather than the public, communal one. Beginning with Rabbi Mordechai Kaplan and the Reconstructionist Movement, this lifecycle event quickly spread throughout the Reform and Conservative movements, and variations of a Bat Mitzvah ceremony are found within many Orthodox communities as well.\nGenerally the Bar/Bat Mitzvah service takes place during the Sabbath morning service, where the child is called up to say the blessings over the Torah–his or her first aliyah. Children may read from the Torah; chant the haftarah, the weekly prophetic portion; lead some or all of the congregational service; and offer a personal interpretation of the weekly Torah portion, called a d’var Torah.\nThe year of intensive preparation that precedes the Bar/Bat Mitzvah ceremony itself helps ensure a transformative experience for the B’nai Mitzvah and their families. Here at Congregation Rodeph Sholom, the B’nai Mitzvah process begins with the Family B’nai Mitzvah Program, a family education class geared at learning about Jewish responsibilities to those in need and the world in general. Concepts such as tzedakah (financial justice) and gemilut chasadim (acts of loving kindness) are discussed and infused into the B’nai Mitzvah process by way of a family Mitzvah project. This project encourages parents and students to join together in acts of social justice, thereby connecting the idea of Bar/Bat Mitzvah with action in the world.\nFamilies will also explore issues of Jewish identity and belief to help build additional levels of meaning to the process. Topics include God, Prayer, Torah, and what it means to become a Bar/Bat Mitzvah. After these family classes, students will begin meeting with a cantor to learn prayers from the Shabbat morning service, as well as how to chant their Torah and Haftarah portions. In the midst of this training, students will meet with a Rabbi to delve into the meaning of their Torah portion and craft ad d’var Torah.\nThe ritual focus of the Bar Mitzvah was a source of discomfort to religious reformers in 19th-century Europe. They promoted an additional ceremony called confirmation, which focused on knowledge of the principles of the Jewish faith. Although first conceived for boys only, girls were included after about the first decade. Rabbi Isaac Mayer Wise, a leader of Reform Judaism in America, introduced confirmation in the United States in 1846 in Albany, New York.\nOriginally linked to home and school, the ceremony quickly moved to the synagogue and found a home in the holiday of Shavuot, which celebrates the giving of the Torah at Mount Sinai. Shavuot works well, due both to its timing at the end of the secular school year and its thematic connection with the Torah, the story of the Jewish people and its relationship with God. To distinguish confirmation from Bar Mitzvah, its supporters emphasized its focus on doctrine rather than ritual, its coeducational scope, and its occurrence at age 16 or 17.\nAt Congregation Rodeph Sholom, confirmation concludes the 10th Grade year in the religious school’s high school program. In this year, sophomores in high school explore their Jewish identities through theology and philosophy under the direction of the clergy. As they wrestle with issues of faith and belief, the students attempt to weave their own lives into the texts and traditions of Judaism. The year culminates with the confirmation class leading a Shavuot service for the entire congregation." ]
[ "<urn:uuid:d2064ceb-b4d6-47ae-bf59-41065309e4f0>" ]
[ "CC-MAIN-2020-05" ]
[ "https://rodephsholom.org/lifecycle/bnai-mitzvah-and-confirmation/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594391.21/warc/CC-MAIN-20200119093733-20200119121733-00273.warc.gz" ]
[ "en" ]
[ 0.9562856554985046 ]
[ 1120 ]
[ 3.328125 ]
[ 3 ]
[ "Realia: What, Where, and How to Get Realia for the German Classroom\nMost teachers of German make an effort to fill their classrooms with posters, flags, magazines, and various authentic materials that help create a \"German\" atmosphere for their students. During their travels in German-speaking Europe, good teachers are constantly thinking about items that they can bring back and use in the German classroom.\nEven though it's the best way, you don't always have to go to Germany to get classroom materials. If you can't travel to Germany right now, think about asking a friend or relative in Germany to send you some specific items from our list. We also list local and online sources for authentic materials for teaching German. Many authentic materials can be obtained for a reasonable cost at a local Trader Joe's (German-owned), from Teacher's Discovery, or various online sources.\nSometimes even the most dedicated teacher of German finds it difficult to know what to bring back or ask friends to send. That's why we have a list of suggested items and where to find them (often for little or no cost!). On your next trip to German-speaking Europe you'll have a plan for picking up realia and materials for your German classroom. This list of suggested classroom realia and authentic materials often goes far beyond the usual collection of German posters, magazines, or the occasional German McDonald's place mat.\nFirst, two hints and a few tips on item substitution or alternatives to realia, plus some practical ways to use realia in the classroom:\nHint 1: Learn to venture forth into office areas at stores, airports, train stations. Mentioning you are a teacher of German can act as a passport for access to areas and materials that \"normal\" people don't have.\nHint 2: Think outside the box. Just about any place in a German-speaking country can become a source of realia. Next time you're picking up a rental car in Germany, think of it as a treasure trove of materials you can use in your classroom! All you have to do is ask. You'll rarely get 'no' for an answer.\nMany kinds of print realia are suitable for digital scanning or conversion to an overhead transparency for instructional use. With a large projected image, you can discuss vocabulary and culture with the entire class. Later you could use a similar photocopied item for cultural or vocabulary exercises.\nRealia As Props\nCertain kinds of authentic materials lend themselves for use in language role-playing, simulations, or (video) skits. Don't bring back just one German cereal box (they can be flattened for packing), get several. Don't get just one Nutella tube, get several.\nA German Gift Guide?\nA bonus connected with bringing back German realia: many items are also suitable as small gifts! If you want to give people German playing cards as a gift, don't forget also to bring along a few more sets for the classroom.\nA Picture Is Worth a Thousand Words\nFor items that are too large or impractical to lug or ship home, take a picture! As a slide or overhead, it can serve as a teaching tool. You can't bring back a German billboard, but you can bring back a photo of that interesting billboard you saw in Berlin.\nThe Web is a good source of authentic print materials from German publications, but also for catalogs and pictures of German products and services. A classroom Web excursion to the German McDonald's site can be a good alternative activity to having actual McDonald's items or a good supplement for materials you have in the classroom. Save on shipping by combining a lot of items into one order, thus reducing the S&H cost per item.\nNEXT: A list of suggested authentic materials and where to get them...\nFOTO-WETTBEWERB: See the the winners of our 2004 German Classroom Photo Contest!" ]
[ "<urn:uuid:d9b531df-df43-4411-b130-3bd81a8523ba>" ]
[ "CC-MAIN-2013-20" ]
[ "http://german.about.com/od/teaching/a/realia.htm" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382920/warc/CC-MAIN-20130516092622-00029-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9478351473808289 ]
[ 801 ]
[ 2.765625 ]
[ 3 ]
[ "It is likely that you drive around feeling safe inside your car due to the airbags which are installed, and while it is true that vehicle airbags have saved numerous lives, there are some instances in which an airbag can cause injuries rather than protecting form them. In other words, the very device that is intended to save lives—and does save lives—can also be responsible for putting drivers at risk. The most recent generation of airbags are more sophisticated than we could have ever imagined. The computer in newer cars takes into consideration the weight of the person sitting in the seat, his or her position in the seat, whether or not a safety belt is being worn and the speed of the impact prior to deploying the airbag.\nWhen Technology Causes Problems\nAs high-tech and safety-conscious as this sounds, in truth today’s highly sophisticated airbags are not doing as good a job in protecting drivers and passengers as those in older vehicles. In fact, for drivers who are properly wearing their seatbelts, the risk of death was over twenty percent higher in those with the more sophisticated airbags as those in cars with the older style of airbags. For those in cars with newer-style airbags, those who were not wearing a safety belt at the time of a collision actually had less risk of death than those wearing a seat belt. It’s hard to imagine how this could possibly be true.\nAfter all, we have all been told time and time again that if you are not wearing a safety belt, the airbag could actually do more harm than good as your unrestrained body flies toward the airbag at the same time the airbag comes toward the body. When attempting to discover how the results could be valid, researchers determined that the modern airbags are being designed to accommodate those who are not buckled up, therefore deploy with considerably more force than in the past. This force can actually be a danger to those who are securely—and legally—belted in. The NHTSA are not certain of the explanation as to why the fatality rate for belted drivers went up, but states they will continue to study both the effectiveness and safety of airbags.\nThe Risk of Poorly Designed Airbags\nWhile it is estimated that airbags reduce the risk of death in a frontal car collision by as much as thirty percent, poorly-designed airbags nonetheless pose significant risks for the occupants of the vehicle as they may either deploy too forcefully or fail to deploy at all in the event of a crash. Passengers who are small in stature or children are at a much greater risk of injury when the airbag deploys than a normal-sized adult, and, in fact, poorly-designed airbags have been directly responsible for well over 4,000 deaths.\nThese deaths occurred when the airbag failed to deploy, or deployed with more force than necessary, killing the person it hit. The passenger airbag deploys in mere milliseconds at a rate of up to 200 mph. Even though the airbag looks like a big soft pillow, this huge explosion of energy can be deadly, especially to the shorter adult or child. The airbag inflates horizontally, flying directly toward the passenger’s head, resulting in serious or fatal brain trauma. Many automakers fail to properly test their airbags on small children, short females and tall males, rather test them only on the “normal” sized adult. Any airbag which deploys too aggressively can result in trauma to the face, head, neck and spine, and in rare instances can even lead to decapitation. Another common airbag defect is from crash sensors which erroneously trigger in low speed collisions—these same sensors can malfunction, preventing the airbags from deploying in a high speed crash.\nGetting the Help You Deserve\nIf you are the victim of a malfunctioning airbag which caused significant injury, you must seek the services of a personal injury attorney who is highly experienced in product liability issues. When a product which is designed to keep you safe actually causes your injuries, you need help in the form of a knowledgeable attorney. You deserve compensation for your medical expenses, lost wages and any pain and suffering you have experienced as a result of a faulty airbag, so don’t wait to get the help you need.\nContact Our Denver Car Accident Lawyers\nIf you or someone you love has been involved in a car accident, the experienced Denver car accident attorneys at Fuicelli & Lee are ready to help. We know how difficult life can be after a car accident and we work hard to ensure that you receive the maximum compensation for your injuries. Contact the law firm of Fuicelli & Lee, PC, for a free case evaluation. You pay nothing unless you receive a financial settlement or award. Call our office at 303-355-7202 or fill out our confidential contact form.\nFuicelli & Lee, PC Settles Car Accident for $462,500.00\nThe high settlement was no accident. I watched how hard Keith worked to get us to that point. Because of Keith’s hard work, I am now in a position to concentrate on fixing my pain with continued treatment.\nFuicelli & Lee, PC Negotiates Policy Limit Settlement of $250,000\nMr. Fuicelli is very accessible which is extremely important just in case you have a question or important information to pass along to him. He stays on top of your case with complete dedication and always updates you with information pertinent to your case." ]
[ "<urn:uuid:b3e84412-f2e9-4cf4-8f45-491985148027>" ]
[ "CC-MAIN-2017-26" ]
[ "http://coloradoinjurylaw.com/poorly-designed-airbags/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321536.20/warc/CC-MAIN-20170627185115-20170627205115-00407.warc.gz" ]
[ "en" ]
[ 0.9674720168113708 ]
[ 1126 ]
[ 3.171875 ]
[ 3 ]
[ "While searching Kepler data for exomoons, astronomers discovered the first Earth-mass planet that crosses in front of its host star.\nCambridge, Massachusetts – An international team of astronomers has discovered the first Earth-mass planet that transits, or crosses in front of, its host star. KOI-314c is the lightest planet to have both its mass and physical size measured. Surprisingly, although the planet weighs the same as Earth, it is 60 percent larger in diameter, meaning that it must have a very thick, gaseous atmosphere.\n“This planet might have the same mass as Earth, but it is certainly not Earth-like,” says David Kipping of the Harvard-Smithsonian Center for Astrophysics (CfA), lead author of the discovery. “It proves that there is no clear dividing line between rocky worlds like Earth and fluffier planets like water worlds or gas giants.”\nKipping presented this discovery today in a press conference at the 223rd meeting of the American Astronomical Society.\nThe team gleaned the planet’s characteristics using data from NASA’s Kepler spacecraft. KOI-314c orbits a dim, red dwarf star located approximately 200 light-years away. It circles its star every 23 days. The team estimates its temperature to be 220 degrees Fahrenheit, too hot for life as we know it.\nKOI-314c is only 30 percent denser than water. This suggests that the planet is enveloped by a significant atmosphere of hydrogen and helium hundreds of miles thick. It might have begun life as a mini-Neptune and lost some of its atmospheric gases over time, boiled off by the intense radiation of its star.\nWeighing such a small planet was a challenge. Conventionally, astronomers measure the mass of an exoplanet by measuring the tiny wobbles of the parent star induced by the planet’s gravity. This radial velocity method is extremely difficult for a planet with Earth’s mass. The previous record holder for a planet with a measured mass (Kepler-78b) weighed 70 percent more than Earth.\nTo weigh KOI-314c, the team relied on a different technique known as transit timing variations (TTV). This method can only be used when more than one planet orbits a star. The two planets tug on each other, slightly changing the times that they transit their star.\n“Rather than looking for a wobbling star, we essentially look for a wobbling planet,” explains second author David Nesvorny of the Southwest Research Institute (SwRI). “Kepler saw two planets transiting in front of the same star over and over again. By measuring the times at which these transits occurred very carefully, we were able to discover that the two planets are locked in an intricate dance of tiny wobbles giving away their masses.”\nThe second planet in the system, KOI-314b, is about the same size as KOI-314c but significantly denser, weighing about 4 times as much as Earth. It orbits the star every 13 days, meaning it is in a 5-to-3 resonance with the outer planet.\nTTV is a very young method of finding and studying exoplanets, first used successfully in 2010. This new measurement shows the potential power of TTV, particularly when it comes to low-mass planets difficult to study using traditional techniques.\n“We are bringing transit timing variations to maturity,” adds Kipping.\nThe planet was discovered by chance by the team as they scoured the Kepler data not for exoplanets, but for exomoons. The Hunt for Exomoons with Kepler (HEK) project, led by Kipping, scans through Kepler’s planet haul looking for TTV, which can also be a signature of an exomoon.\n“When we noticed this planet showed transit timing variations, the signature was clearly due to the other planet in the system and not a moon. At first we were disappointed it wasn’t a moon but then we soon realized it was an extraordinary measurement,” says Kipping.\nThis research was funded by NASA and the National Science Foundation. A paper detailing the findings has been submitted to The Astrophysical Journal. Its authors are Kipping (CfA), Nesvorny (SwRI), Lars Buchhave (Niels Bohr Institute), Joel Hartman and Gaspar Bakos (Princeton University), and Allan Schmitt (Citizen Science). The paper is available online.\nHeadquartered in Cambridge, Massachusetts, the Harvard-Smithsonian Center for Astrophysics (CfA) is a joint collaboration between the Smithsonian Astrophysical Observatory and the Harvard College Observatory. CfA scientists, organized into six research divisions, study the origin, evolution and ultimate fate of the universe.\nPublication: Accepted to ApJ\nPDF Copy of the Study: The Hunt for Exomoons with Kepler (HEK): II. Analysis of Seven Viable Satellite-Hosting Planet Candidates\nBe the first to comment on \"Astronomers Discover the First Earth-Mass Transiting Planet\"" ]
[ "<urn:uuid:f8c25041-0e3f-4390-9f9f-72758459c23e>" ]
[ "CC-MAIN-2023-14" ]
[ "https://scitechdaily.com/astronomers-discover-first-earth-mass-transiting-planet/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944996.49/warc/CC-MAIN-20230323034459-20230323064459-00388.warc.gz" ]
[ "en" ]
[ 0.9363827109336853 ]
[ 1067 ]
[ 3.8125 ]
[ 4 ]
[ "Rocky, wild, and windswept, there are few places on earth as rugged and foreboding as either the Cape of Good Hope or Cape Agulhas.\nLong believed to be the intersection of the Atlantic and Indian Oceans, the Cape of Good Hope possesses a dangerous, savage beauty, its rocky, frothy headlands only hinting at the turmoil below. On a good day, it’s even possible to believe that the Cape is little more than a scenic, soothing tourist destination: turquoise waters and white sand beaches belie the true, catastrophic potential of the Cape’s unrelenting, unforgiving storms.\nIn fact, on a bad day, the Cape of Good Hope more than lives up to its other name: Cape of Storms. With wind speeds exceeding 30 knots and waves of over five meters (a stunning sixteen feet), the Cape is also prone to sudden, unexpected cross currents. Indeed, many ships have foundered on its treacherous rocks, many a life extinguished on its angry shoals.\nAmong those who died on its shores was famed Portuguese navigator and explorer Bartolomeu Dias de Novais, the intrepid pioneer who first documented the Cape route (via the Atlantic and Indian Oceans) as a conduit for trade from Europe to Asia. Notably, Dias likely gave the Cape its unofficial, more ominous nickname (Cape of Storms), though the Portuguese king, John II, labeled it the Cape of Good Hope for the potential for riches and trade wealth.\nEither way, even this outstanding navigator could not overcome the trials and tribulations of the Cape; in May 1500, Dias is believed to have gone down with his ship near the Cape, the most famous victim of its brutal weather.\nYet for its barbarous reputation, the Cape of Good Hope is actually the southwesternmost (and not the southernmost) point of the African continent. Instead, that distinction belongs to Cape Agulhas, the true, geographical division between the Atlantic and Indian Oceans. The confusion likely stemmed from the fact that, at the Cape of Good Hope, ships would have to begin their eastward approach; lacking modern navigational instruments, this undoubtedly convinced navigators that this was truly the last, southernmost point of the continent.\nBeautiful, if in a foreboding, primal sort of way, Cape Agulhas is a quick, 2.5 hour car ride from Cape Town–an easy day or overnight trip. The cape and its surroundings are part of Agulhas National Park, a small, quaint park that encompasses the historic Cape Agulhas lighthouse, a number of shipwrecks, wine farms, and country towns, a whites and beach and lagoon, and a collection of hiking trails through the scraggly, scrawny bush.\nToday, both Cape Agulhas and the Cape of Good Hope are worthwhile destinations, fiercely scenic reminders of a wilder, more dangerous time in history, when men and women braved hellish storms and hurricane conditions for wealth, wonder, and glory." ]
[ "<urn:uuid:ff976b7d-d469-49a9-b519-849f1342919f>" ]
[ "CC-MAIN-2020-05" ]
[ "http://henristeenkamp.org/end-world-cape-agulhas-cape-good-hope/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250609478.50/warc/CC-MAIN-20200123071220-20200123100220-00394.warc.gz" ]
[ "en" ]
[ 0.9469449520111084 ]
[ 628 ]
[ 2.796875 ]
[ 3 ]
[ "March 7, 2018\nIt Can’t Be Magic: How Cellphones Work .\nHave you ever wondered what happens behind the scenes to make your cellphone work? How your friend can video chat with you when they’re in Hawaii and you’re in Texas or how you can drop a pin to tell someone where to meet you for dinner?\nIt doesn’t all happen magically. There’s actually an entire network of wireless and physical infrastructure making connections to ensure we have the highest quality wireless experience.\nSo how does a wireless network work?\nLet’s say you’re video calling a friend.\nWhile you listen to the video call ring as it seeks a connection, radio signals traveling over airwaves—called spectrum—are racing to a nearby cell site. To communicate with the cell site, your cellphone uses its antennas to act as a portable radio.\nThe cell site is positioned to perform its role of receiving and sending signals. Once it receives your signal, it transfers it to a local base station. The base station acts as a translator of sorts to send your video call to the core network.\nThe core network is the brain of the wireless network, routing your video call—as well as your traditional calls, texts, and data requests—to the right destination through network hardware, including servers, wiring, and transport technologies. Today, most network traffic—including your video call—goes through a data router on its way to the internet.\nOnce your video call data reaches the internet and connects to the appropriate servers, connection details return to a data router—the original one if you and your friend are in the same network, or one in your friend’s network if not—and move through the system to a cell site in your friend’s network. The cell site pings your friend’s phone and it rings.\nStill kind of magical, right?\nThe next generation of wireless, 5G, will increase the awe factor.\n5G networks are going to be up to 100 times faster, able to support 100x more devices, and be 5 times more responsive than current 4G networks, thanks to the capacity of new mid- and high-band spectrum, the density of new small cells, and new wireless technologies. As more small cells are located closer to our cellphones and other wireless devices, network delays will be reduced because some data can be processed locally without having to go all the way to the core network.\nDenser wireless networks will also be more resilient to help keep people connected at all times.\nSo there you have it. Wireless infrastructure relies on a blend of investment, innovation, and engineering to make your mobile experience so seamless, it’s almost like magic." ]
[ "<urn:uuid:fd8c4450-54b4-43b2-bedf-0684180e7c3b>" ]
[ "CC-MAIN-2020-05" ]
[ "https://www.ctia.org/news/it-can-t-be-magic-how-do-cellphones-work" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250597458.22/warc/CC-MAIN-20200120052454-20200120080454-00391.warc.gz" ]
[ "en" ]
[ 0.9249119758605957 ]
[ 566 ]
[ 2.96875 ]
[ 3 ]
[ "|Prime Minister of Czechoslovakia|\n5 April 1945 – 2 June 1946\n|Preceded by||Jan Šrámek|\n|Succeeded by||Klement Gottwald|\n11 June 1891|\n(now Czech Republic)\n|Died||2 May 1976\n(now Czech Republic)\n|Political party||ČSSD (1924-1948)\nZdeněk Fierlinger (11 July 1891, Olomouc – 2 May 1976, Prague) was a Czech diplomat and politician. He served as the Prime Minister of Czechoslovakia from 1944 to 1946, first in the London-based exiled government and later in liberated Czechoslovakia. His name is often associated with the merger of his Social Democratic Party with the Czechoslovak Communist Party after the communist coup in 1948. He was the uncle of Paul Fierlinger, the famous animator for numerous PBS cartoons.\nZdeněk Fierlinger came from an upper-class family. His ancestors came from German ethnics who had married the local people and assimilated as Czech people for centuries. He graduated from business school in 1910 and then worked as a sales representative in Russia. During World War I he joined the Czechoslovak Legion. For his bravery on battlefield Fierlinger was four times awarded by Order of St. George. Among other fights, he participated in the Battle of Zborov.\nAfter the war, Fierlinger returned to Czechoslovakia and joined the diplomatic service. He was successively ambassador to the Netherlands, Romania, the United States, Switzerland and Austria. During this period he was a close friend and collaborator of Edvard Beneš. In 1924 he joined the Czech Social Democratic Party.\nIn the Soviet Union\nBetween 1937 and 1945 Fierlinger held the post of envoy (and later ambassador) to the USSR. During his period in Moscow Fierlinger was very close to the leadership of the Czechoslovak Communist Party led by Klement Gottwald. This is evident, for example, when in 1943 when the Communists in conjunction with Fierlinger facilitated the signing of the Soviet-Czech peace treaty in Moscow on 12 December 1943 by Joseph Stalin and Edvard Beneš.\nThe end of war and arrival of the communists\nJust before the end of World War II in April 1945 Fierlinger became the exile chairman of the Czechoslovak government and remained such until the 1946 elections. He became a leading figure in the \"left-wing\" social democracy movement which sought the closest possible ties with the Czechoslovak Communist Party.\nBetween 1946 and 1948 Fierlinger was chairman of the Czech Social Democratic Party. After the communist coup in February 1948, Fierlinger acted as the chief proponent of the \"unification\" of the Social Democrats and the Communists. Through the unification of the party, he became a member of the Central Committee of the Czechoslovak Communist Party in 1948. According to American journalist John Gunther, Fierlinger was subsequently nicknamed \"Dr. Quislinger.\"\nZdeněk Fierlinger subsequently served as Deputy Prime Minister from 1948 to 1953, Minister of the State Office for religious affairs from 1951 to 1953, Chairman of the National Assembly from 15 October 1953 to 23 June 1964 and Minister in charge of the State. He remained a member of the Central Committee until 1966. In 1968, among other things, one of his last public acts was to lead a delegation in protest outside the Soviet Embassy." ]
[ "<urn:uuid:7f17d632-3400-411d-a438-cc1f931debc5>" ]
[ "CC-MAIN-2017-26" ]
[ "https://en.wikipedia.org/wiki/Zden%C4%9Bk_Fierlinger" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323588.51/warc/CC-MAIN-20170628083538-20170628103538-00698.warc.gz" ]
[ "en" ]
[ 0.9705339670181274 ]
[ 716 ]
[ 2.859375 ]
[ 3 ]
[ "David Thompson (1770-1857)\nBritish fur agent, surveyor, explorer, and cartographer David Thompson was born on the outskirts of London in April 1770. His Welsh father died before Thompson turned two years old, and the boy was placed at Grey Coat Hospital, where he received an education in writing, mathematics, and vocational skills. At the age of fourteen, he entered into an apprenticeship with the Hudson's Bay Company (HBC) and was sent to Fort Churchill. While working as a clerk, he developed a working knowledge of the Cree language and the natural history of Upper Canada.\nThompson spent the winter of 1789-1790 at Cumberland House on the Saskatchewan River, recuperating from a fractured leg. It was there that he met Philip Turnor, the HBC's most respected cartographer. Pursuing the opportunity with characteristic enthusiasm, Thompson emerged from Turnor's tutelage as a rising star in the company's surveying ranks. In the spring of 1797, he switched his allegiance to the rival North West Company in order to do more work as a cartographer. By the following June he had carried out an ambitious journey of exploration, where he produced a map with the first accurate positions of the Missouri River's bend through the Dakotas.\nIn 1799, Thompson married Charlotte Small, a mixed-blood Cree, and the following fall they were assigned to the North West Company's new Rocky Mountain House on the upper Saskatchewan River. Several of the company partners hoped to use this post as a staging area to develop a trade route from the Rockies to the Pacific via the Columbia River, but attempts to survey a route to the Columbia were not successful. In 1802, Thompson was posted to Peace River in northern Alberta.\nBy 1806, Thompson was a full company partner, and all the elements were in place for a push to the Columbia. In spring 1807, he led a party of nineteen, including Charlotte and their three small children, over what is now called Howse Pass. He established Kootanae House at the source lakes of the Columbia and began systematically building personal relationships with Natives and establishing logical trade routes. Over the next four years, Kootenai and Salish-speaking contacts guided him through the maze of eastern Columbia River tributaries that includes the Kootenai, Flathead/Clark Fork/Pend Oreille, Spokane, and Colville Rivers.\nIn January 1811, to escape Blackfeet threats, Thompson and a small party followed an Iroquois guide over Athabasca Pass, a more northerly trade route that became the standard connection between the Prairies and the Columbia District. In June of that year, he arrived at Kettle Falls (near present-day Colville, Washington). There, at the region's most important fishery and trade center, he constructed a twenty-six-foot cedar-plank canoe and set off downstream with two Iroquois paddlers, five voyageurs, and a San Poil couple hired as translators.\nThompson and his party intersected the route of Lewis and Clark's journey at the confluence of the Snake and Columbia Rivers and arrived at the recently constructed American fur post of Astoria. He lingered at the Columbia's mouth for only a few days. Back in Kettle Falls, he constructed another canoe and completed the first official survey of the length of the Columbia, pushing north to Boat Encampment at the base of the Athabasca Pass trail. After another winter at Saleesh House in Montana, Thompson traveled to Montreal with Charlotte and their five children, where the family settled.\nOver the next two years, Thompson, still employed by the North West Company, completed a pair of large maps of western North America that charted from Hudson Bay to the Pacific. These were the first maps to accurately detail the relationship among the Peace, Athabasca, Saskatchewan, and Missouri Rivers east of the Divide with the Fraser and Columbia drainages west.\nThompson performed significant work as chief surveyor for the International Boundary Survey between 1817 and 1827. He also continued to work on several more large maps of the West related to an atlas proposal sent to a London publisher. Still, he was plagued by financial problems from the time he resigned from the commission, and he never succeeded in getting either his atlas or his Travels in Western North America published. He and Charlotte died within two months of each other in 1857.\nDavid Thompson's legacy includes not only his Travels, generally recognized as a classic narrative of exploration, but also his meticulous field and survey notebooks, sheets of watercolors, letters describing the state of the interior during the period of contact, and maps of western North America. He also set in motion a viable fur-trade operation in the Columbia District, built on a respectful relationship with the peoples of the region.Written by:Jack Nisbet\n“Map of the North-West Territory.\" Archives of Ontario, Toronto.\nColumbia Journals/David Thompson. Ed. by Barbara Belyea. Montreal: McGill-Queen’s University Press 1994.\nJenish, D’Arcy. Epic Wanderer: David Thompson and the Mapping of the Canadian West. Lincoln: University of Nebraska Press, 2003\nLetter to J.M. Higginson, July 21, 1843, National Archives of Canada, Ottawa.\nNisbet, Jack. Sources of the River: Tracking David Thompson across Western North America. Seattle Sasquatch Books, 1994, new edition 2007.\nNotebooks, David Thompson Collection. Archives of Ontario, Toronto.\nThompson, David. Travels. Ed. by William Moreau. Toronto: Champlain Society, Seattle: University of Washington Press. (In press or Fall 2009?)." ]
[ "<urn:uuid:eeed5c65-12cf-4f2f-8964-2dc44cd222f0>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.oregonencyclopedia.org/entry/view/thompson_david/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00034-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9580107927322388 ]
[ 1185 ]
[ 3.390625 ]
[ 3 ]
[ "Carbon Fiber: Taking Consumer Goods to the Next Level\nWith new applications developing nearly every day, carbon fiber is allowing for advancements in the production of consumer goods. Carbon fiber offers manufacturers the opportunity to increase overall strength and reduce weight in areas they need it the most. In today’s consumer goods market, consumers can expect to find carbon fiber in products such as prosthetics, bicycles, and many more consumer products.\nTake a moment to review all of the areas that have turned to carbon fiber to take advantage of the benefits of this composite material.\nCarbon Fiber Composites in Performance Marine Racing\nCarbon fiber is an essential component of most modern day racing vehicles because of the undeniable properties it encapsulates. Advanced carbon fiber prepregs have a higher resistance to environmental corrosion factors, and performance marine racing teams are taking advantage of that. For example, Land Rover BAR (Ben Ainslie Racing) competes against some of the most skilled sailors in the world, and their team relies on carbon fiber composites to provide an advantage over the competition.\nCarbon Fiber Composites in Athletic Prosthetics\nThere is a limited variety of prosthetics that allow amputees the ability to partake in certain exercising activities. However, 3D printing and composites are paving the way for the production of more versatile prosthetics. Advancements in 3D printing and carbon fiber composites offer the ability for prosthetics to be designed and manufactured with the amputee’s lifestyle in mind. Carbon fiber structures are perfect aquatic prosthetics because of the material’s resistance to environmental corrosion.\nCarbon Fiber Composites in Bicycle Manufacturing\nPerformance bicycle manufacturers require materials such as carbon fiber to achieve the strongest, lightest product offering possible. Carbon fiber dramatically reduces the weight of critical components in performance bikes, allowing cyclist to maximize their speed. Bicycle manufacturers continue to push the limits of how light and durable a bicycle can possibly be. For example, supercar manufacturer, Bugatti, teamed up with PG Bikes to develop the world’s lightest bicycle weighing in at a mere 11 pounds. Carbon fiber composites are found in the frame of most high performance bikes, but Bugatti/PG’s development features carbon fiber in the bicycle’s rims, fork, handlebars, seat, and much more.\nCarbon fiber is the material of choice for extreme high strength and lightweight applications. Manufacturers continue to use carbon fiber composites in structures in new and unique ways. As mentioned above, carbon fiber is being utilized in some very cutting-edge applications such as performance yacht racing, producing athletic prosthetics, as well as manufacturing the world’s lightest bike. These are extreme examples of carbon fiber’s capabilities, however, we can expect to see great developments spring from these applications.\nWhy Choose Composites One as Your Carbon Fiber Supplier\nComposites One is the leading supplier in composite and high performance materials with carbon fiber being one of many product offerings. Our technical sales team is here to here to help you find the best material for your product, and our operations team ensures that we can get the material to you without causing a delay in your production cycle. Composite One helps manufacturers do their job better and faster by providing a total material solution. Contact us today for more information.\nHave questions? Contact Us." ]
[ "<urn:uuid:a16fc164-3084-4f78-9f0b-49893eb33f52>" ]
[ "CC-MAIN-2020-10" ]
[ "https://www.compositesone.com/carbon-fiber-taking-consumer-goods-to-the-next-level/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875148671.99/warc/CC-MAIN-20200229053151-20200229083151-00100.warc.gz" ]
[ "en" ]
[ 0.9271863102912903 ]
[ 681 ]
[ 2.59375 ]
[ 3 ]
[ "Districts among the many partners assisting 2017 LRP projects 01/05/2017\nBy Mike Beacom\nConservation districts are partners in half of the 2017 Joint Chiefs’ Landscape Restoration Partnership (LRP) projects announced in December. Through the program, the U.S. Forest Service and Natural Resources Conservation Service (NRCS) strive to work together to restore landscapes, reduce wildfire threats to communities and landowners, protect water quality and enhance wildlife habitat.\nIn 2017, five LRP projects in California, Michigan, Nebraska, Oregon, and Virginia will work with local conservation districts.\nCalifornia’s Coarsegold Resource Conservation District (RCD) will help the Cascadel Woods neighborhood reduce the risk of wildfire by removing dead trees adjacent to evacuation routes. “We also plan to spend part of the money in other communities in our district to help elderly/low-income homeowners remove dead trees within 100 feet of their homes,” said Coarsegold RCD Executive Director Anne Melrose.\nIn Nebraska, the Upper Niobrara White Natural Resources District will provide conservation grade seedlings to producers to reforest burned areas – most of which were damaged by 2012 fires. Participants can purchase these seedlings for 75 cents and plant them as windbreaks or to create new forest stands.\nThis year, the Forest Service and NRCS will invest more than $10 million in 10 new LRP projects located in nine states. Since 2014, USDA has invested more than $139 million in 49 projects, across 36 states.\n“This collaboration helps local partners meet the growing challenges faced by all stakeholders that comes with protecting communities, watersheds, forests, and woodlands from the devastating and costly impacts of wildfires and other threats, while protecting water resources, and improving wildlife habitat,” USDA Under Secretary for Natural Resources and Environment Robert Bonnie said.\nSummaries of this year’s 10 projects can be viewed on the NRCS website." ]
[ "<urn:uuid:ccc93299-5759-4bca-a610-dd23f842597c>" ]
[ "CC-MAIN-2023-14" ]
[ "https://www.nacdnet.org/2017/01/05/districts-among-many-partners-assisting-2017-lrp-projects/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943625.81/warc/CC-MAIN-20230321033306-20230321063306-00762.warc.gz" ]
[ "en" ]
[ 0.9255218505859375 ]
[ 402 ]
[ 2.546875 ]
[ 3 ]
[ "Squats for a Tight Calf\nSquatting is a whole-body, compound exercise that strengthens many of the major muscles of your legs, including your glutes, hamstrings and quadriceps. Tight calf muscles can make squats challenging, preventing you from reaching full depth with your thighs parallel to the floor. Modifying the exercise by raising your heels can help, as can stretching your calves to increase your ankle mobility.\nThe bulk of your calf is made up of two large muscles. The soleus arises from the back of the two long bones in your lower leg, the tibia and fibula. Overlying the soleus is the gastrocnemius, which originates from the back of your thigh bone, or femur, just above the knee. Both muscles insert onto the heel bone through the Achilles tendon. The function of both muscles is to point your foot, or to raise your heel if you're standing, an action called plantar flexion of the ankle. The opposite action, pulling the top of your foot toward the front of your shin, is called dorsiflexion.\nTo squat, stand with your feet a little wider than hip-width apart. Your toes should be slightly turned out. Keeping your back flat, bend your knees and hinge at your hips to lower your pelvis toward the floor. Track your knees in the direction of your toes. When your thighs reach parallel with the floor, stand up to return to the starting position. Keep your heels grounded throughout the movement. Bringing your arms forward as you lower can help to maintain your balance.\nModifications for Tight Calves\nTo squat with your thighs parallel with the floor, your ankles must be able to dorsiflex. Tight calf muscles can prevent full dorsiflexion, making it impossible to reach full depth without your heels lifting. If you have tight calves, you can elevate your heels on a board or a pair of weight plates to maintain your stability while squatting. However, elevating your heels may place more stress on your knees. As a long-term solution, you may also need to work on increasing the range of motion of your ankles by stretching your calves.\nTry These Exercises!\nIncreasing Ankle Mobility\nBefore starting your squat training session, warm up your whole body, including your calves, with easy, dynamic movements, such as jogging. To stretch your calf, lean your hands on a wall with your arms straight. Extend one leg back and bend your front knee. Press your back heel toward the floor until you feel a stretch in that calf. Keeping your back knee straight will stretch the gastrocnemius. Bending the back knee slightly as you continue to push back through your heel will target the soleus.\n- Darrin Klimek/Digital Vision/Getty Images" ]
[ "<urn:uuid:7b6f6993-16d7-46e4-9e70-dd610c1ecc7f>" ]
[ "CC-MAIN-2017-26" ]
[ "http://healthyliving.azcentral.com/squats-tight-calf-13520.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321961.50/warc/CC-MAIN-20170627235941-20170628015941-00243.warc.gz" ]
[ "en" ]
[ 0.9162370562553406 ]
[ 575 ]
[ 2.578125 ]
[ 3 ]
[ "It started with one question: Why doesn't everyone know who Nikola Tesla is?\nThe 'War of Currents' shaped our everyday way of life. From the light bulbs in your home to the wireless internet at the local cafe. History books in schools are riddled with Thomas Edison's greatest moments, so where is Nikola Tesla? Why don't more people know about the 'War of Currents'?\nWe have always thought the best way to learn something is through entertainment. From there, it evolved into playing cards. We thought everyone from all walks of life and passions can enjoy a good card game... why not put a history lesson in a deck of cards? Well, that's what we did!\nOur goal was to design a deck of cards that provided a feel of nostalgia, similar to the cards from the late 1800's/Early 1900's. We wanted to tell the story of the 'War of Currents' with our concepts.\nThe US Playing Card Company has been making playing cards since 1885. You history buffs might note that this is very close to the beginning of the 'War of Currents'. American Made, quality printing, and a tie in history. It was a perfect match-up for us!\nDuring our design phase we looked at a lot of early Bicycle playing cards, photographs, newspapers, patent images, and souvenir cards from The World's Fair of 1893. We really tried to incorporate as much REAL history and media into the deck. Even our number cards are modeled after the original Tesla/Edison patent images.\nOne of the ways we tried to tell the story of the 'War of Currents', through our imagery, is the process we took designing our face cards. First we split our two inventors, Edison and Tesla into Red and Black. Then we split the suits into different ages. So for example, older Nikola Tesla is on the King of Spades, while younger Nikola Tesla is on the King of Clubs.\nWe then placed an important person in the inventor's life as the Queen and Jack. As people's relationships change as they get older, so did our cards. When the inventors were younger, they worked along side each other. This means that you will find one red Tesla card and one black Edison card in your pack!\nSo what happens if you don't know who Nikola Tesla is or you have never heard of the 'War of Currents'? Don't worry, you are definitely not alone. We have included a mini history lesson on the two info cards(You know, the cards you never use). Within minutes, you will have an understanding of who the major players are and why the 'War of Currents' is a major historical event. Also, a description of the Chicago World's Fair of 1893 can be found on one of the jokers!" ]
[ "<urn:uuid:73a39543-e082-46f2-a7b4-4ea00a96b600>" ]
[ "CC-MAIN-2017-26" ]
[ "http://www.magicaplanet.com/ang/detail_magic_tricks_6566_5_30.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323711.85/warc/CC-MAIN-20170628153051-20170628173051-00190.warc.gz" ]
[ "en" ]
[ 0.9675168991088867 ]
[ 573 ]
[ 2.765625 ]
[ 3 ]
[ "Published in September 2019\nThis module is a resource for lecturers\nChallenges for Law Enforcement\nThe effective enforcement of wildlife and forest offences faces a myriad of challenges and obstacles.\nCombating wildlife trafficking is not considered to be a priority in many countries (Bennett, 2011; DLA Piper, 2014; Nurse, 2015; Nurse, 2013; UNODC, 2012; Wyatt, 2013; Wellsmith, 2011; WWF, 2015). Policymakers, police, prosecutors, and the judiciary often do not consider wildlife- and forest-related offences as serious crimes warranting special consideration and prioritization (Sundari Akella & Allan, 2012; Wellsmith, 2011). This issue is not limited to developing countries but has also been reported in countries such as Norway (Runhovde, 2016) and the United Kingdom (INTERPOL & UNEP, 2016). While there are some signs that the 'status' of wildlife trafficking is rising in some countries (INTERPOL & UNEP, 2016), many countries still pay minimal attention to this crime type.\nIn many jurisdictions, laws and regulations pertaining to wildlife trafficking and to other aspects of the wildlife and forest sector remain poorly developed and frequently suffer from significant gaps. Elements of criminal offences are sometimes not clearly articulated and defined. This often hinders effective investigation and prosecution. In some jurisdictions, relevant offences, if they do exist, are poorly drafted, leaving ambiguities and uncertainties that can obstruct prosecutions and that can be exploited by defence counsel (UNODC, 2012; Biegus & Bueger, 2017; Nurse, 2015). Where state officials are involved in wildlife trafficking, diplomatic immunity can hinder their prosecution and conviction. Furthermore, in some jurisdictions, the authorities and officers in charge to enforce wildlife trafficking offences lack the necessary enforcement powers.\nEnforcement of offences relating to wildlife trafficking is often hampered by a lack of proper resourcing and training (Bennett, 2011; Nurse, 2015; see also, Sundari Akella & Allan, 2012). In many countries, this is a problem relating to budgeting rather than a lack of resources. General law enforcement authorities often have little experience and competence in dealing with wildlife trafficking (Runhovde, 2016). Specialized agencies are often under-staffed, poorly trained, and under-funded. Furthermore, poor prosecutorial and judicial practices hinder a proper response to wildlife trafficking (UNODC, 2012). This often leads to environments in which poachers, traffickers and others involved in wildlife trafficking can operate with relative impunity (Biegus & Bueger, 2017). A lack of integrity of involved authorities and officials, which enables corruption, further exacerbates this problem.\nWhile national coordination and international cooperation are crucial in combating wildlife trafficking, individual officials and some enforcement agencies are unable or unwilling to work together with other agencies, share relevant information, use available resources and know-how, or cooperate across borders (Sundary Akella & Allan, 2012; see also EIA, 2016).\nExample: Challenges for law enforcement in the European Union\nA 2016 study revealed different challenges for the enforcement of laws relating to wildlife crime in EU Member States. Existing legislation in Member States demonstrated an insufficient and uneven level of enforcement. Further, only a minority of Member States had national action plans on wildlife crime (as recommended by CITES).\nImplementation and enforcement of wildlife crime-related laws were found to be mainly hindered by (1) a lack of sufficient staff and monetary resources, which translates into a low number of controls, and a lack of willingness to undertake costly enforcement measures and little time for cooperation and data sharing, (2) a lack of specialized knowledge on wildlife crime in administrative, enforcement and judicial bodies as well as a lack of specialized institutions, (3) a low level of sanctions applied, with the level of sanction not reflecting the severity of the crimes, and (4) a failure to use criminal sanctions and preference for administrative sanctions, often due to insufficient evidence.\n(European Parliament, Directorate General for Internal Policies, Policy Department A: Economic and Scientific Policy, 2016)" ]
[ "<urn:uuid:7eac3fd3-d882-428b-bf16-85e8e8ec47eb>" ]
[ "CC-MAIN-2020-05" ]
[ "http://www.unodc.org/e4j/ar/wildlife-crime/module-3/key-issues/challenges-for-law-enforcement.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251779833.86/warc/CC-MAIN-20200128153713-20200128183713-00389.warc.gz" ]
[ "en" ]
[ 0.9286143779754639 ]
[ 824 ]
[ 3.09375 ]
[ 3 ]
[ "Scientists Just Found a \"Zombie Volcano\" in New Zealand\nGeologists have discovered a massive magma chamber below the Earth's surface, sitting near some of New Zealand's most active volcanoes.\nThis was a surprising find, as magma chambers normally sit directly under volcanoes, not off to the side like these. Pressure buildup can cause the magma underneath a volcano to rise and pour out of it as lava, creating a volcanic eruption.\nBut this magma chamber is different. Geologists have nicknamed outliers like this one \"zombie volcanoes\" because they show signs of life where geologists normally wouldn't expect to find it. And there's probably quite a few of them out there.\n\"There's no need to panic, but chances are there are lots of bodies of magma dotted throughout the crust,\" Ian Hamling, a geophysicist at GNS Science in New Zealand, told Nature News.\nHamling and a team of scientists were using radar satellites to study the Taupo Volcanic Zone when they noticed an abnormal patch of magma that appeared to be rising. After sorting through previous data, Hamling figured out that the area has actually been slowly rising since the 1950s. During its peak growth, 9 million cubic meters of magma were bubbling into the chamber every year.\nIt's smaller than the magma chamber under Yellowstone, Hamling told Nature News, but it's still an impressive size.\nIt's unclear whether or not the zombie volcano could actually pose a threat, but so far there hasn't been any increase of volcanic activity in the area.\nGeologists say we'll probably find a lot more of theses zombie volcanoes now that radar satellites are becoming more advanced. They've probably always been lurking below the surface, we just had no way to detect them until now." ]
[ "<urn:uuid:7998f787-ee6a-432c-8d12-346c51cd15a7>" ]
[ "CC-MAIN-2020-05" ]
[ "https://www.mic.com/articles/145366/scientists-just-found-a-zombie-volcano-in-new-zealand" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251801423.98/warc/CC-MAIN-20200129164403-20200129193403-00384.warc.gz" ]
[ "en" ]
[ 0.9709014892578125 ]
[ 374 ]
[ 3.5625 ]
[ 4 ]
[ "The drug, known as “crocodile,” is synthesized from codeine and has been commonly used by as a substitute for heroin in Russia for the last few years. But its effects are much worse – some users have their skin peel off and parts of their bodies become gangrenous.\nAfter they begin using, addicts typically have a life expectancy of just a few years.\nUntil now, police haven't been worried about its spread in Germany, but authorities in the western city of Bochum said at least four homeless people have recently experienced symptoms associated with crocodile use.\nAll believed they had been using heroin, according to Heinrich Elsner, a doctor at an organization serving drug addicts called Crisis Assistance Bochum.\nBut he said they suffered the “catastrophic skin and soft tissue damage” that only crocodile causes.\nThe organization is offering to wean addicts off drugs through methadone treatments, though it is not yet clear if the physical damage is reversible.\nPolice, who admitted there was a “huge uproar” in Bochum's drug scene over the situation, said an investigation has been launched." ]
[ "<urn:uuid:8d4f9ea2-9c11-4b1f-a940-ce8b0e170c8c>" ]
[ "CC-MAIN-2017-26" ]
[ "https://www.thelocal.de/20111012/38161" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320257.16/warc/CC-MAIN-20170624101204-20170624121204-00663.warc.gz" ]
[ "en" ]
[ 0.9829119443893433 ]
[ 241 ]
[ 2.671875 ]
[ 3 ]
[ "There are four categories of aerobes:\nObligate aerobes - need oxygen to grow. In a process known as cellular respiration, these organisms use oxygen to oxidize substrates (for example sugars and fats) and generate energy.\nFacultative anaerobes - use oxygen if it is available, but also have anaerobic methods of energy production.\nMicroaerophiles - require oxygen for energy production, but are harmed by atmospheric concentrations of oxygen (21% O2).\nAerotolerant anaerobes - do not use oxygen but are not harmed by it.\nAerobic bacteria is crucial for live organic horticulture. Though respiration is crucial to life, the precise function that oxygen plays to maintain life is not readily understood. Essentially, in a microorganism that is capable of using it, oxygen enables food compounds to be totally digested. This ensures that every possible amount of energy will be used for maintaining the cell. So the aerobic bacteria have the advantage of metabolic efficiency. Aerobic bacteria can create twenty times more energy, with the equivalent amount of organic compounds, than anaerobic bacteria. What is more, aerobic bacteria aren’t generally known to produce horrible odors. One bacteria in the order of Actinomycetales, genus Streptomyces called actinomycetes, generate enzymes with volatile compounds which gives earth a fresh, clean smell. This is the good quality soil we smell when we instinctively hold a fist full of substrate up to our nose. Interesting how harmonious bacteria agree with us instinctively." ]
[ "<urn:uuid:fbcdae42-0ef7-4fb6-98c5-f96447722346>" ]
[ "CC-MAIN-2020-05" ]
[ "https://www.swo.today/aerobes" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250628549.43/warc/CC-MAIN-20200125011232-20200125040232-00535.warc.gz" ]
[ "en" ]
[ 0.8814364075660706 ]
[ 327 ]
[ 3.859375 ]
[ 4 ]
[ "Kindergarten Common Core High Frequency Word Cards\nThis bundle includes a word card for each of the 126 Kindergarten common core high frequency words. There are 94 high frequency words and 32 Dolch nouns included.\nThe words are to be introduced over the entire school year. I have included which words are to be introduced during each of the four 9 weeks and color coded them. The noun words have a patterned background color that matches the high frequency words they are to be introduced with.\nEach set of the 9 week cards has blank editable cards. These extra cards can be used to add any extra words you would like to put on your word wall.\nThese word cards will be great to use on a classroom word wall, in a word work center, or they can be given to each student to practice at school and at home." ]
[ "<urn:uuid:eefbad4a-21f4-4479-b7e5-295d20b976d0>" ]
[ "CC-MAIN-2017-30" ]
[ "https://www.teacherspayteachers.com/Product/Kindergarten-Common-Core-High-Frequency-Word-Wall-Words-Polkadot-EDITABLE-786341" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425381.3/warc/CC-MAIN-20170725202416-20170725222416-00341.warc.gz" ]
[ "en" ]
[ 0.9631903767585754 ]
[ 173 ]
[ 2.890625 ]
[ 3 ]
[ "This book provides a description of Einstein's work through imagined scenes from his life. Topics covered include time, relativity, and quantum physics. Simple, non-mathematical analogies are used to explain the physics.\n%0 Book %A Damour, Thibault %D October 1, 2006 %T Once Upon Einstein %P 199 %8 October 1, 2006 %@ 1-56881-289-2 %U http://books.google.com/books?id=h4TE-drSjRcC\nDisclaimer: ComPADRE offers citation styles as a guide only. We cannot offer interpretations about citations as this is an automated procedure. Please refer to the style manuals in the Citation Source Information area for clarifications." ]
[ "<urn:uuid:2563c948-47e6-4e85-9c0a-f77c8934a1af>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.compadre.org/relativity/items/detail.cfm?ID=3587" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708946676/warc/CC-MAIN-20130516125546-00002-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9167214035987854 ]
[ 152 ]
[ 2.578125 ]
[ 3 ]
[ "Join Brian Lee White for an in-depth discussion in this video Measuring frequency, part of Audio Foundations: EQ and Filters.\nFrequency, or the speed at which a soundwave oscillates back and forth, is measured in cycles per second, or hertz for short. In a graph charting amplitude Y, over time X, frequency is the rate of change in amplitude, or how many times the waveform cycles up and down per second. A 100 Hz tone pushes and pulls a speaker cone 100 times per second, while a 1 kHz tone would push and pull that same speaker cone 1,000 times per second.\nAs frequency increases, so does the perceived pitch of the soundwave. It's generally accepted that humans can perceive sounds from about 20 Hz to 20,000 Hz, or 20 to 20. Although sounds under 100 Hz are felt more than they are heard as the low-frequency vibrations resonate in our chest, more so than in eardrums. Likewise, our acuity for hearing higher-frequency sounds diminishes with age. As we grow older, or prematurely damage our hearing from over-exposure to loud environments, our ability to hear high frequencies can be severely reduced, sometimes to well under 10,000 Hz and lower, effectively cutting in half are 20 to 20.\nThis is why it is important to protect your hearing in loud environments, as your ability to perceive a wide range of frequencies will ultimately help you learn and use equalization better. But while frequency determines the pitch of a soundwave, that's only half the story. Amplitude. or the amount of energy in a soundwave's frequency oscillations, determines its perceived loudness, which we'll discuss in the next movie.\nAuthorBrian Lee White\n- Measuring frequency and amplitude\n- Understanding the relationship between frequency and pitch\n- Working with EQ controls such as bandwidth (Q) and gain\n- Using graphic EQ\n- Understanding the shelving and high-pass and low-pass filters\n- Creating focus with EQ\n- Creating complementary EQ curves\n- Performing frequency bracketing with filters\n- Automating EQ\n- Using frequency analyzers\n- Using harmonic generators to excite frequency content\nSkill Level Appropriate for all\nAudio Foundations: Compression and Dynamic Processingwith Brian Lee White2h 25m Appropriate for all\n1. Understanding Frequency and Amplitude\n2. Using Equalizers\n3. Advanced EQ Topics\n4. Additional EQ and Filtering Techniques\n6. An Interview with the Author\n- Mark as unwatched\n- Mark all as unwatched\nAre you sure you want to mark all the videos in this course as unwatched?\nThis will not affect your course history, your reports, or your certificates of completion for this course.Cancel\nTake notes with your new membership!\nType in the entry box, then click Enter to save your note.\n1:30Press on any video thumbnail to jump immediately to the timecode shown.\nNotes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote." ]
[ "<urn:uuid:04014feb-bee3-497b-8846-9e0d929f4718>" ]
[ "CC-MAIN-2017-26" ]
[ "https://www.lynda.com/Logic-Pro-tutorials/Measuring-frequency/86649/96458-4.html?w=0" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320227.27/warc/CC-MAIN-20170624064634-20170624084634-00696.warc.gz" ]
[ "en" ]
[ 0.9167195558547974 ]
[ 638 ]
[ 3.75 ]
[ 4 ]
[ "REGULAR sex can help delay the menopause, a study has revealed.\nExperts think frequently getting frisky may fool the body into thinking there is a chance of pregnancy.\nMiddle-aged women who romp weekly are 28 per cent less likely to experience the change over the next decade.\nAnd those who still have sex at least once a month have a 19 per cent reduced risk.\nMegan Arnot, from University College London, said: “The findings suggest that if a woman is not having sex, and there is no chance of pregnancy, then the body ‘chooses’ not to invest in ovulation as it would be pointless.\n“There may be a biological trade-off between investing energy into ovulation and elsewhere, such as keeping active by looking after grandchildren.”\nScientists say their findings back up the “grandmother hypothesis”, where older women contribute to the fitness of younger individuals by caring for grandchildren.\nThe average age for the menopause in the UK is 51, with around two million Brits affected at any one time.\nIt is triggered when the body stops making the hormone oestrogen and can cause a wide range of symptoms, including mood swings, poor sleep, joint pain and lack of concentration.\nMOST READ IN HEALTH\nThe study, in the journal Royal Society Open Science, followed nearly 3,000 women with an average starting age of 45.\nProf Ruth Mace added: “The menopause is an inevitability for women and there is no behavioural intervention that will prevent reproductive cessation.\n“Nonetheless, these results are an initial indication that menopause timing may be adaptive in response to the likelihood of becoming pregnant.”\n- GOT a story? RING The Sun on 0207 782 4104 or WHATSAPP on 07423720250 or EMAIL [email protected]" ]
[ "<urn:uuid:2490357a-1c9b-4026-94cc-497db532ba84>" ]
[ "CC-MAIN-2020-05" ]
[ "https://www.thescottishsun.co.uk/news/5171771/women-who-have-regular-sex-are-less-likely-to-suffer-early-menopause-doctors-discover/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251696046.73/warc/CC-MAIN-20200127081933-20200127111933-00472.warc.gz" ]
[ "en" ]
[ 0.9309905171394348 ]
[ 395 ]
[ 2.640625 ]
[ 3 ]
[ "As England and Scotland are both nations within the United Kingdom, it is easy to assume – as many of our clients do – that they share an education system. However, education is actually a highly devolved area that differs quite significantly across the United Kingdom.\nIn a previous post, we discussed how Cardiff’s New Curriculum for Wales is widening the gap between the English and Welsh models. In this post, we want to take look at Scotland’s education system and explain how it to differs from the English system.\nThe first thing to say is that Scotland has been distancing itself from Westminster’s approach to education for longer than Wales or Northern Ireland. Therefore, the Scottish system is characterised by its relative uniqueness from the other UK home nations.\nOne of the most structural differences between the English and Scottish systems surrounds the approach each government takes to centralization/devolution. England generally has a more centralized approach, whilst Scotland tends to devolve educational matters further down.\nEnglish local governments retain control of educational administration but have little to no power over the structures and curriculum that pupils follow during their time in education. In contrast, Scotland’s government awards powerful management roles to local governments and individual school senior leadership teams.\nAdditionally, there are some basic logistical differences that those considering a move to either England or Scotland should be aware of.\nOne example is pupil starting ages and cut-off months. In England, pupils need to be at least 4 years and 1 day old when they begin school. In Scotland, pupils generally start school a little later when they are 4 1/2 years old.\nIn addition, the Scottish school term starts and finishes earlier than it does in England; pupils will start the school year in mid-August and finish the year at the end of June. In England, however, the school semester begins in September and finishes in late July.\nIt is also noteworthy that class sizes tend to be slightly smaller in Scotland than in England.\nRegarding the curriculum, there are significant differences between England and Scotland, with both having individual merit.\nFirstly, basic numeracy and literacy skills remain the central focus of early years education for both administrations. Whilst these skills are embedded across the curriculum in both countries, a broader devolution of management in Scotland tends to widen the range of topics that get taught between different Scottish primary schools. In other words, the mediums and ways in which numeracy and literacy are taught are more fluid dependent on where you are in Scotland than they would be between the different regions of England; which tends to favour more uniformity in its approach. Though these discrepancies are somewhat limited during primary years.\nHowever, it is at the secondary school level where the curriculum and programme of assessment become more unrecognisable on each side of the border.\nThe Scottish Government sets guidelines for teaching and learning but does not prescribe a set national curriculum in the way that England does. There are no national-specific subject and timing requirements. Instead, Scotland opts for a more individualized approach that allows schools and local authorities to dictate their teaching based on pupils’ interests and needs.\nScotland labels this approach the Curriculum for Excellence (CfE). Where England follows the National Curriculum, Scotland’s approach focuses on a wider and more flexible scope of subjects. Therefore, the Scottish system can generally be thought of as a broader education but with slightly less depth than its English counterpart. The English model tends to be more specialist, whereas the Scotland approach can be considered more generalist.\nIn secondary schools in Scotland, new qualifications were established in 2014 by the Scottish Qualifications Authority (SQA). The qualifications in Scotland are labelled as National 1, National 2, National 3, National 4, National 5, Higher, and Advanced Higher. Internal assessments include National 1-4 qualifications, whereas National 5 as well as the Higher and Advanced Highers are externally assessed by the SQA.\nIn England, the National Curriculum sets out four National Curriculum Tests (NCTs) – commonly referred to by their previous name: SATS (Standard Attainment Tests). The four divisions in England are called Key Stages – which Scotland has abolished in favour of a more ‘seamless’ educational structure.\nEnglish points of assessment are at the end of year 2 (Key Stage 1 SATS), year 6 (Key Stage 2 SATS), as well as continuing internal assessment during Key Stage 3 years (years 7-9); and General Certificate of Secondary Education exams (GCSEs) which are taken in years 10 and 11. Following on from this, there is no requirement for pupils to remain in full-time education, though A-level and BTEC courses remain available throughout years 12 and 13.\nScottish universities, such as Edinburgh and St Andrews, currently have Undergraduate ‘home fees’ capped by the Scottish Government at £1,820 for the 2022/23 academic year. Whilst this might change in the future, ‘home fees’ are available for students who are residents in Scotland for a minimum of three years prior to starting their university course. This is a real positive for Scottish residents with children aspiring to university, as the standard tuition fee is £9250 for both UK (non-Scottish residents) studying at Scottish universities and all UK universities outside Scotland.\nIf you relocating from Scotland to England or vice versa, please do not hesitate to contact us for help and support with your children’s education. We have Scotland-based education consultants who are on hand to advise." ]
[ "<urn:uuid:3b116dbb-3365-4f53-a3aa-ba1afbab8551>" ]
[ "CC-MAIN-2023-14" ]
[ "https://lumoseducation.com/relocating-we-discuss-differences-between-the-english-and-scottish-education-systems/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.76/warc/CC-MAIN-20230322114226-20230322144226-00198.warc.gz" ]
[ "en" ]
[ 0.9607004523277283 ]
[ 1153 ]
[ 3.203125 ]
[ 3 ]
[ "The important information about the basic types of roofing materials\nOn what parameters to choose a roofing material\n- Loads on a roof. Besides specifications of deposits, it is necessary to consider a body weight of a covering and a roof (with all rafter system), as well as wind loads. Therefore it is necessary to learn the maximal parameters of specifications and weight of all roof to start to choose a roofing material.\n- Durability of the future roof. Here fire resistance enters. Here the main thing is to not spend many money for too abrupt material for not too abrupt structure (for example, a shed or technical facility). And for the house, certainly, to stint a covering it is not necessary. Otherwise avaricious will pay second time for repair.\n- The architectural decision on the taste. It depends on the material (the form, a structure, color). But not any roofing will easily lay down on your roof. For the some people types of roofing materials there are norms (for example, percent of a bias) on which application of a material is admissible or inadmissible at a covering of a roof.\nManufacturers establish warranty periods for a roofing at a compliance with rules of transportation, installation and operation. But many materials can serve much longer a warranty period.\nThe given type of a roofing represents the formed clay weight after roasting. As a result color of a tile becomes red-brown (How to install clay roof tiles). The size of such plates small (12×12 inches), and weight of everyone about 4,5 pounds. The ceramic tile happens: ordinary, flat tape, grooving tape, grooving stamped, 1-wave and 2-wave. Standard fastening of such tile is applied within the limits of a bias from 22 up to 60 degrees. If above additional fastenings and if below - establish qualitative ventilation and a waterproofing are necessary.\nIt is an alternative version to the previous type of a roofing which on a type anything from it does not differ. It happens convex and flat. The working bias varies from 20 up to 60 degrees. Huge plus is that such type of roof material in the course of time only types strength and does not lose the properties.\nBitumen tile cover with fiber glass, cellulose, polyester and a special paint. Owing to a bitumen rubber layer, the tile perfectly docks with adjacent sheets, creating an excellent waterproofing. Also it has good plasticity owing to what it can be bent hands somehow (especially it is useful at complex roofing). The choice of a bias amazes: from 12 degrees up to a maximum.\nWe have decided to deduce a metal tile under a separate subtitle as it is very widely widespread and popular among any roofs. It represents the leaf of the zinced steel covered by polymer. Owing to the invoice, from afar it seems, that it will consist of separate parts, but actually it is the whole leaf in 0,06 inches, which sizes great variety (depending on the sizes of each part of a roof, sheets can be cut off depending on necessary length). Approaches for any biases, beginning from 15 degrees. But up to 20 degrees it is desirable to improve hermetic sealing of joints.\nThe given material is made of the hot zinced steel which is then goffered for increase of rigidity. It is the most simple type of a covering roof. Such material is applied on any bias, beginning from 10 degrees and finishing the maximal size. As well as slate, profiled sheeting is used for a roofing of economic facilities, sheds and so on.\nSteel folded roof\nSteel folded roof are sheets of smooth steel. The comprehensible bias for the given roofing material begins from 20 degrees up to a maximum. Technology of installation following: sheets fasten with each other by means of gearing with an adjacent leaf. The turned out seam between sheets refers to a fold. The given type of a roofing covering can be seen on churches, old manors and industrial buildings.\nRoofing from natural materials\nSuch types of roofing materials are applied mainly on commercial buildings with objective of attraction attention of clients. For example, it can be restaurants, hotels, bars and constructions similar to them. As a material straw, a cane, a tree is applied.\nSeam roofing on the basis of copper and aluminum\nThis material is durable, nice and, as the consequence, dear roofing material. But it is justified. Copper remains plastic even at negative temperature. Besides, in due course under influence of vapors of carbonic gas and atmospheric precipitation copper becomes covered by a brown-green membrane which protects a material from corrosion, mechanical damages and ultraviolet. Aluminium too becomes covered by a protective film membrane." ]
[ "<urn:uuid:ea4a75f8-4983-4d4e-af63-ddd62a83fd74>" ]
[ "CC-MAIN-2017-26" ]
[ "http://houseunderconstruction.com/roof/types-roofing-materials.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320395.62/warc/CC-MAIN-20170625032210-20170625052210-00457.warc.gz" ]
[ "en" ]
[ 0.9237934350967407 ]
[ 980 ]
[ 2.546875 ]
[ 3 ]
[ "The battle in Wisconsin is not over collective bargaining rights generally but rather the appropriateness of those rights in the public sector. Readers may be surprised to learn about the very different histories and consequences of collective bargaining in the private and public sectors.\nIn the private sector, collective bargaining is used to equalize the power of employees and employers. When empowered by collective bargaining, private-sector workers needn't fear dismissal just because they seek a higher wage or better conditions. Accordingly, President Franklin D. Roosevelt and Congress enacted the 1935 National Labor Relations Act, which conferred collective bargaining rights on private-sector workers.\nHowever, no such rights were conferred on public-sector workers. In fact, both Roosevelt and later George Meany, the first president of the AFL-CIO, opposed collective bargaining for the public sector. Also, in California public employees already had protection against dismissal as a result of the Civil Service Act of 1913, which endows public employees with property-like rights over their jobs.\nStill, in 1962 the federal government gave collective bargaining rights to federal employees, and in 1977 California followed suit. However, because state employees already had civil service protections, collective bargaining wasn't needed to equalize their power with employers' power. As a result, collective bargaining for public employees in California changed the balance of power and - most importantly - gave public employees power over their compensation and benefits.\nIn the private sector, compensation and benefits are determined through negotiations conducted by unions representing employees and management representing shareholders. Neither side has influence over the other, and there is a healthy tension as each side works to increase its share of the pie. If unions don't deliver enough compensation and benefits, workers can make changes to union leadership. If management delivers too much compensation and benefits, shareholders can make management changes.\nBut in the public sector, no such healthy tension exists because unions can use campaign contributions to gain control of \"management,\" which in California's state government means the 120 legislators and the governor who together determine employee compensation and benefits. As a result of the focused power of the unionized public-sector workforce, management (i.e., legislators and governors) can end up being more responsive to public employees than to \"shareholders,\" that is, citizens benefiting from public services (e.g., students paying tuition at state colleges, parents taking kids to state parks, private-sector union workers building bridges, etc.) and taxpayers paying the bills.\nAccording to the Fair Political Practices Commission, by far the largest contributors to state political campaigns are public-employee unions. Just two of the unions - the California Teachers Association and the California State Council of Service Employees - spent more than $300 million on political activities over the last 10 years. And not coincidentally, since collective bargaining went into effect for state employees, state spending on employee retirement benefits has nearly doubled as a percentage of total state spending and now even exceeds state spending on the University of California and California State University by 40 percent.\nDuring the same period, state general fund spending on employee compensation and benefits grew at nearly three times the rate of state revenues, while general fund spending on higher education, parks and environmental protection was flat or lower, and student tuition costs rose.\nIn short, the more state revenues are directed to employee compensation and benefits for public employees, the less those revenues are available for private-sector union workers building infrastructure, students paying tuition and families using parks and recreation facilities, and the more burden on taxpayers.\nCollective bargaining is a good thing when it's needed to equalize power, but when public employees already have that equality because of civil service protections, collective bargaining in the public sector serves to reduce benefits for citizens and to raise costs for taxpayers. Citizens and taxpayers should consider this as they watch events unfold in Madison.\nCalifornia collective bargaining laws\n(Meyers-Milias-Brown, 1968) provides collective bargaining rights for public agency employees including firefighters, police officers and emergency medial personnel employed by cities, counties and some districts.\nSB60 (Rodda, 1975) granted collective bargaining rights to employees of K-12 schools and community colleges.\nSB839 (Dills, 1977) extended collective bargaining rights to most state employees, excluding higher-education employees.\nAB1091 (Berman, 1978) extended collective bargaining rights to employees of the University of California, the California State University and Hastings College of the Law.\nSource: Chronicle research" ]
[ "<urn:uuid:bcce253d-5677-44cd-b59e-65d3d5ba4fc5>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.sfgate.com/opinion/article/Should-public-employees-have-collective-2473273.php" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709805610/warc/CC-MAIN-20130516131005-00042-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9527828693389893 ]
[ 900 ]
[ 3.34375 ]
[ 3 ]
[ "A rapid assessment of the diversity of wildlife in Southern Guyana Region and the impact of human activity on the ecosystems there.\nOctober 6-28, 2006\nAn international team of research scientists from Guyana, Brazil, Venezuela, and the United States assisted by six Wai-Wai parabiologists. The expedition was organized by Conservation International in collaboration with the Smithsonian Institution with funding support from the Leon and Toby Cooperman Family Foundation and the Gordon and Betty Moore Foundation. Meet the Team >>\nThe Konashen Community Owned Conservation Area (COCA) in the Konashen Indigenous District of Southern Guyana. The area consists of 625,000 hectares (an area about the size of Delaware) of undisturbed forest, located in a tropical wilderness area.\nIt is one of the last large and intact pristine forest areas remaining in Guyana and includes the watershed of the Essequibo River. There were two study sites: one at the base of the Acarai mountains, the other along the north bank of the Kamoa river.\nHow it all came about\nIn February 2004, the Government of Guyana issued the residents of the Konashen Indigenous District an Absolute Title to their land making them the legal guardians of the area. They have minimal contact with the outside world and rely upon the forest for all of their needs.\nThe major form of economic activity is international wildlife trade, though they also harvest other materials from the forest for crafts. The Wai-Wai of the COCA recognize that their demands on the forest for natural resources are increasing, and must be managed sustainably.\nIn order to mitigate potential threats to their culture and resources and to determine the most efficient and sustainable method of continuing their traditional lifestyle, the Wai-Wai sought and gained the support of the government of Guyana and Conservation International – Guyana.\nIN DEPTH: Learn more about the Wai Wai.\nThe survey information collected will be used to establish baseline data on the biodiversity of the COCA for potential small scale ecotourism use to be managed by the Wai-Wai community . They will also establish user-thresholds and will develop a management plan for sustainable use and conservation of their land and its resources.\nIn addition, the team also assessed the stream and river water quality in the vicinity of the community and the populations of animals hunted and fished by the Wai-Wai.\nConservation International - Guyana’s support and participation in the survey demonstrated the organization’s commitment to a tri-partite Memorandum of Understanding (MOU) signed between the community of Masakenari, CI and the government of Guyana for collaboration to assist the Wai-Wai in developing a management plan for sustainable utilization of the resources.\nWithin the Konashen COCA one community (Masakenari), is made up of approximately 300 residents mainly of Wai-Wai ancestry who rely solely on the area for their sustenance and have recognized the need for sustainable utilization in light of their increasing demand for resources of the area.\nTherefore in addition to the assessment of the biodiversity of the area the survey also aimed to determine the sustainability of species and ecosystems utilized by the Wai-Wai, provided recommendations on the feasibility for conservation to policy makers and key stakeholders, provided data to guide management planning and highlighted species of concern such as those that are listed on the IUCN Red List.\nLEARN MORE: Read reports from each of the field teams." ]
[ "<urn:uuid:8e073721-f9e9-4e2c-ba5a-fd93dc8bddcd>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.conservation.org/where/south_america/guyana/konashen/pages/about.aspx" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00009-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9347788095474243 ]
[ 724 ]
[ 2.96875 ]
[ 3 ]
[ "Two new COVID-19 diagnostic tests have been developed that have a fast turnaround time and are able to differentiate between variants of the virus.\nThe tests have been developed by researchers at the University of Minnesota, with one able to detect COVID-19 variants and one able to differentiate other illnesses that have COVID-19-like symptoms.\nCRISPR/Cas9 system technology is used for both tests, and, using commercial reagents, the researchers describe a Cas-9-based methodology for nucleic acid detection using lateral flow assays and fluorescence signal generation.\nThe findings have been published in the journal Bioengineering.\nThe first rapid diagnostic test can differentiate between COVID-19 variants and can be performed without specialised expertise or equipment using technology like at-home pregnancy testing – producing results in about one hour.\nThe second, rapid and more sensitive test allows researchers to analyse the same sample simultaneously for COVID-19 (SARS-CoV-2), Influenza A and B, and respiratory syncytial virus by measuring fluorescence. These viruses manifest with similar symptoms, so being able to detect and differentiate them adds a new diagnostic tool to slow the spread of COVID-19. This test could be easily scaled up according to the researchers, as the necessary equipment is present in most diagnostics laboratories and many research laboratories.\nFirst author, Mark Osborn, PhD, assistant professor of Paediatrics at the University of Minnesota Medical School, said: “The approval of the SARS-CoV-2 vaccine is highly promising, but the time between first doses and population immunity maybe months. This testing platform can help bridge the gap between immunisation and immunity.”\nThe team is now seeking to enhance sensitivity and real-world application of this test in support of rapidly detecting and identifying COVID-19 variants in collaboration with the University of Minnesota’s Institute of Engineering in Medicine and Jakub Tolar, MD, PhD, Dean of the University of Minnesota Medical School." ]
[ "<urn:uuid:f8bb2b55-a0cc-4561-bab5-b816167f8b53>" ]
[ "CC-MAIN-2023-14" ]
[ "https://www.healtheuropa.com/new-rapid-covid-19-diagnostic-tests-can-differentiate-between-variants/106090/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948858.7/warc/CC-MAIN-20230328104523-20230328134523-00185.warc.gz" ]
[ "en" ]
[ 0.9371005296707153 ]
[ 415 ]
[ 3.140625 ]
[ 3 ]
[ "Paleoanthropologists have examined three fossilized limb bones of Sahelanthropus tchadensis, one of the oldest known species in the human family tree.\nSahelanthropus tchadensis is an extinct hominin that lived 7-6 million years ago (Miocene epoch) in west-central Africa.\nThe species’ first fossils were discovered in 2001 at three localities in the Lake Chad Basin, northern Chad.\nThe finds included three jaw pieces, several isolated teeth and a small but relatively complete skull nicknamed Toumaï.\n“This skull, and in particular the orientation and anterior position of the occipital foramen where the vertebral column is inserted, indicates a mode of locomotion on two legs, suggesting that Sahelanthropus tchadensis was capable of bipedalism,” said University of Poitiers paleoanthropologist Franck Guy and his colleagues.\nOne of the localities in the Lake Chad Basin also yielded two ulnae (forearm bone) and a femur (thigh bone).\nThese bones were tentatively attributed to Sahelanthropus tchadensis because no other large primate was found at this locality.\nIn the new study, Dr. Guy and co-authors compared the fossils to extant and extinct hominoid specimens, including extant apes (humans, common and bonobo chimpanzees, gorillas and orangutans), Miocene apes and fossil hominins representing Orrorin tugenensis, australopiths and early Homo.\nThey also used high-resolution micro-CT images taken from the original femur and ulnae to assess the inner morphology of the bones.\n“The structure of the femur indicates that Sahelanthropus tchadensis was usually bipedal on the ground, but probably also in trees,” the authors said.\n“This bipedalism co-existed in arboreal environments with a form of quadrupedalism, that is arboreal clambering enabled by firm hand grips, clearly differing from that of gorillas and chimpanzees who lean on the back of their phalanges.”\n“All these data reinforce the concept of a very early bipedal locomotion in human history, even if at this stage other modes of locomotion were also practiced,” they concluded.\nTheir paper was published this week in the journal Nature.\nG. Daver et al. Postcranial evidence of Late Miocene hominin bipedalism in Chad. Nature, published online August 24, 2022; doi: 10.1038/s41586-022-04901-z" ]
[ "<urn:uuid:27875ee9-dc9b-48ab-8303-7a08ed990d2f>" ]
[ "CC-MAIN-2023-14" ]
[ "https://thenewz.site/hominins-were-already-bipedal-7-million-years-ago-researchers-say/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950422.77/warc/CC-MAIN-20230402074255-20230402104255-00798.warc.gz" ]
[ "en" ]
[ 0.9313820600509644 ]
[ 575 ]
[ 3.53125 ]
[ 4 ]
[ "Whenever anyone mentions the Fourth of July, you can bet that everyone’s first thought is fireworks. These colorful little explosives go hand in hand with the holiday, in fact, this is so true that you can’t buy most fireworks in California unless the holiday is just around the corner. While this may be inconvenient for some people, this is actually required by law within the state of California.\nCalifornia has several laws regarding fireworks. Firstly, fireworks are divided into two categories within the state, they can either be “Dangerous” or “Safe and Sane” fireworks. Dangerous fireworks are what are seen at professional firework displays. Only people with special display licenses are allowed to set off dangerous fireworks within the state of California.\nOne of the most prominent laws regarding safe and sane fireworks, is that they can only be sold from noon on June 28th to noon on July 6th. Anyone can set off safe and sane fireworks, provided they are allowed to within their city or district. The problem there being that many places have banned people from setting off safe and sane fireworks on their own.\nThe restrictions set on fireworks are largely done to try and prevent any fires from starting. As most Californians know, wildfires are pretty common out here, which is why fireworks are banned in rural areas where a stray spark could set something ablaze. Due to their high fire risk, all safe and sane fireworks have to be approved by the State Fire Marshall.\nThe Fourth of July and fireworks are a lot of fun, however it is important to remember that fireworks can be dangerous when handled improperly. That is why, sometimes it is best to simply go to a professional show. Doing that will give you a much bigger show. No matter what you decide, just be sure to have a fun and safe Independence Day." ]
[ "<urn:uuid:63f67d68-fd38-42ea-bf1a-fab3a3fd62da>" ]
[ "CC-MAIN-2020-05" ]
[ "https://pennybailbonds.com/do-you-know-about-these-firework-laws-in-california/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251783342.96/warc/CC-MAIN-20200128215526-20200129005526-00243.warc.gz" ]
[ "en" ]
[ 0.9727497696876526 ]
[ 372 ]
[ 2.5625 ]
[ 3 ]
[ "Overview of avian influenza prevention, preparedness and response\nOn this page\nAvian influenza (AI) is a contagious viral infection that can affect several species of poultry, such as chicken and turkey, as well as pet and wild birds. AI viruses can be classified into two categories-low pathogenic (LPAI) and high pathogenic (HPAI)-based on the severity of the illness caused in poultry. HPAI viruses typically cause severe illness and mortality, whereas LPAI viruses typically cause little or no clinical signs. Most AI viruses are low pathogenic; however, some subtypes are capable of becoming highly pathogenic. Historically, only the H5 and H7 LPAI virus subtypes are known to have the ability to become highly pathogenic and they are considered notifiable.\nThe Government of Canada attaches high priority to the threat of AI and is devoting significant resources to prevent the introduction and spread of AI in Canada. The Canadian Food Inspection Agency (CFIA) is at the forefront of that effort.\nThe CFIA, working with a number of Government of Canada partners, has put in place a series of measures to limit the animal health risks-and associated economic repercussions of outbreaks-posed by AI. In the context of human health, these measures also reduce the potential risk that AI infection in birds will serve as the precursor to a human flu pandemic. International human and animal health authorities agree that efforts to protect human health are best directed at preventing, limiting and eradicating AI outbreaks in domestic poultry.\nPrevention and early warning\nThere are a wide range of AI viruses continuously circulating within wild bird populations. The majority of these do not cause serious illness in animals or humans. The first lines of defence against an outbreak of AI in domestic poultry are prevention measures and early warning systems. The CFIA, in collaboration with other Government departments, has put in place safeguards to limit the introduction and spread of AI in Canada's domestic poultry populations.\nThe Canadian Government uses two different bird surveillance programs to detect AI viruses posing threats to domestic poultry at the earliest possible moment. The first program targets wild birds; the second one focuses on domestic flocks.\nWild bird surveillance\nThe CFIA, Environment Canada, the Public Health Agency of Canada and the Canadian Cooperative Wildlife Health Centre collaborate to conduct an annual survey of AI viruses in wild birds. The survey partners expect to find a variety of AI viruses, most of which commonly circulate in wild birds with little or no impact on their health or the health of other animals. The survey includes sampling of live birds during the spring, summer and fall and continued year-round sampling of dead birds. The survey is intended to provide early detection of highly pathogenic AI in Canada and determine the presence and characteristics of the AI strains in North America's wild bird population.\nSurvey partners are particularly interested in AI viruses that are or have the potential to become highly pathogenic. These viruses, which include the H5 and H7 subtypes, can cause illness and death in poultry. The highly pathogenic H5N1 AI virus strain currently circulating in Asia, Africa and Europe has demonstrated the ability to affect poultry and wild birds, as well as humans and other mammalian species.\nSurvey results are reported as they are confirmed and are available at the Canadian Cooperative Wildlife Health Centre Web site.\nCommercial bird surveillance\nThe CFIA, in collaboration with industry, has designed a commercial bird surveillance program, called the Canadian Notifiable Avian Influenza Surveillance System (CanNAISS), to complement the wild bird survey. Samples are taken from live birds and tested in CFIA accredited labs. This survey helps us develop a better picture of AI viruses that might be circulating in Canadian poultry and can help to identify where breaches of on-farm biosecurity might have occurred and identify courses of corrective action. Additionally, abnormal patterns of flock productivity and mortality would be watched closely.\nInternational bird surveillance\nThrough international cooperation and information sharing, Canada continuously monitors AI developments around the world and adjusts import controls and disease response plans accordingly.\nAI virus can be transmitted directly from bird to bird through secretions and feces, and indirectly through human movement, contaminated feed, water and equipment. In light of the threat and risks associated with AI, increased attention has been drawn to the ongoing need to protect domestic poultry through the effective use of on-farm biosecurity measures. Biosecurity involves maintaining good hygiene practices and limiting exposure to external sources of contamination.\nMost poultry and egg production industry associations already have biosecurity guidelines in place for their memberships to reference. The CFIA's role involves promoting best practices and providing technical advice across industry so that all producers are using the most effective measures possible and that these measures are being applied in a uniform fashion across the country.\nThe CFIA recognizes that not all poultry and egg production in Canada is done by large producers that are members of industry associations. There are smaller producers who maintain small flocks, or what may be called \"backyard flocks.\" The CFIA, in collaboration with the provinces and territories, has implemented an awareness campaign for owners of these types of flocks to inform them of biosecurity best practices and encourage them to take the necessary steps to protect their flocks.\nImport measures for live birds\nThese measures apply to countries which are recognized as being free of highly pathogenic AI in their domestic flocks. Canada continues to prohibit trade in poultry, poultry products and birds with any country until domestic poultry are proven to be free of highly pathogenic AI.\nThese measures are consistent with guidelines established by the World Organization for Animal Health (WOAH; founded as Office International des Épizooties (OIE)) and provide a foundation for safe trade while protecting animal and human health. Canada's import controls were developed in consultation with provincial governments, the Canadian poultry industry and Canada's principal poultry and bird trading partners: the United States and the European Union.\nWhile it is extremely important to have early warning systems and prevention measures in place to keep AI out of Canada, similar effort must be directed toward being prepared for the possibility of an outbreak. Since 2004, Canada has experienced one high pathogenic AI outbreak and testing has identified many different AI viruses, including H5 subtypes, which were determined to be low pathogenic. During these incidents, many valuable lessons are learned and experience is gained.\nEmergency response team\nThe CFIA has a dedicated response team of experts that will be activated in the event of an AI outbreak. This group includes veterinarians, executive management and field staff, will oversee the CFIA's response and coordinate actions with federal, provincial and municipal partners.\nDevelopment of detailed procedures for response\nPreparedness requires that contingency plans be in place for every activity associated with an outbreak. Among the many detailed plans and procedures, there are plans for: humane and rapid destruction of infected flocks; minimizing the spread of virus; effective disposal of carcasses; movement restrictions on susceptible livestock and products; protecting the health and safety of staff deployed during an AI outbreak, protecting the health of farmers and producers during an AI outbreak, and capturing information in databases for epidemiological analysis of the outbreak.\nAvian Influenza scenarios and exercises\nThe CFIA conducts a number of internal and external exercises to further enhance preparedness for a possible AI outbreak. Internally, the CFIA continues to enhance its ability to respond through ongoing emergency preparedness workshops and training events. Externally, the CFIA participates in exercises with industry as well as other government departments and levels of government to test response to AI in different parts of Canada.\nPartnerships with other government departments, other levels of government and external bodies\nThe CFIA continues to work closely with other Government departments, other levels of government, the poultry and egg producing industries and the scientific and academic communities, all of which have a focus on AI.\nPartnerships with other federal government departments and agencies\nAt the Federal level, the CFIA's AI partners include, but are not limited to, Agriculture and Agri-Food Canada, the Department of Foreign Affairs and International Trade, Environment Canada, Health Canada, the Public Health Agency of Canada, Public Safety Canada and the Canada Border Services Agency.\nThe lead department or agency in the event of an AI outbreak is scenario dependent. If the scenario only involves animal health, then the CFIA will have the lead coordinating role in responding to the threat. If the scenario starts as an animal health issue, and then evolves into a human health issue, then the lead coordinating role would shift to the Public Health Agency of Canada. In the event that AI starts as a human health issue, the Public Health Agency of Canada would assume the lead role in coordinating the response.\nThe CFIA collaborates with these partner departments on AI and pandemic scenarios on an on-going basis.\nProvinces and territories\nThe CFIA continues to communicate with its counterparts in the provinces and territories to ensure that information, policies, procedures, strategies, plans and communications products are shared and coordinated.\nThe CFIA, in collaboration with provincial governments, is continuously reviewing and updating the joint Foreign Animal Disease Emergency Support Agreements, which define the roles and responsibilities of each partner in the case of a disease outbreak. These plans are based on four major disease control principles: rapid detection of newly infected livestock; halting the spread of the disease through movement controls and the rapid destruction of infected livestock; movement controls and surveillance on high risk livestock and proximal livestock; and preventing re-infection through the effective biocontainment of infective material (carcasses, manure and feed).\nIndustry and academia\nThe CFIA has solicited expertise from industry and the scientific and academic communities by striking an Avian Influenza Advisory Group. Representatives help to ensure that CFIA policies and action plans are sound. These consultations are ongoing and continue to provide valuable intelligence that helps to shape the CFIA's overall strategy to combat AI in Canada.\nPartnerships with international bodies\nThe CFIA collaborates with leading international bodies such as the WOAH, the Food and Agriculture Organization and the World Health Organization to share and distribute intelligence, and best practices with regard to combating Avian Influenza. The fight against AI is truly an international effort with many nations, including Canada, providing assistance to other areas of the world where resources may be limited and are needed to help contain the global spread of AI. This effort benefits all nations and serves the best interests of Canada.\nThe CFIA's National Centre for Foreign Animal Diseases in Winnipeg is recognized by the WOAH as an international reference laboratory for AI.\nIt is understood that responding to an AI outbreak will require additional human resources, equipment and facilities. The CFIA determines how much \"surge capacity\" will be needed to address a specific threat and then develops unique contingency plans to add resources and capacity as needed. This is especially true for AI. Surge capacity planning with regard to AI focuses on the following areas:\nInternal Staffing Reserve - ensuring the CFIA has enough staff, back-up staff and staff rotation for the duration of an AI outbreak.\nExternal Staffing Reserve - ensuring that the CFIA has identified trained persons not currently on CFIA staff, but having relevant experience, so that they can be deployed during an AI outbreak, if required.\nEquipment - ensuring that the CFIA can, at short notice, acquire and deploy the equipment required to address an outbreak of AI in Canada. This would include, but is not limited to, personal protective equipment for CFIA staff, vehicles, and depopulation equipment for the humane culling of infected animals.\nLaboratories - Six provincial laboratories have been CFIA approved for AI sample testing. The CFIA maintains four labs of its own so that it can also conduct AI testing. CFIA lab staff can be mobilized to move closer to an AI outbreak anywhere in Canada.\nThe CFIA recognizes that communication is a key component in Canada's national effort to prevent, contain and eliminate AI outbreaks.\nThe CFIA maintains ongoing and frequent communications with federal and provincial government partners, the animal health community, bird owners, industry, international disease control authorities and, most importantly, the Canadian public. Timely and transparent communication ensures that the most reliable and recent information is available to decision makers, stakeholders and Canadians. The CFIA recognizes that awareness and credible, science-based information are essential components of Canada's AI readiness and response capacity.\nIn the event of an outbreak of AI in Canada, Canadians can be assured that the CFIA has action plans to guide effective and efficient response operations. These plans draw from previous experience in Canada and abroad, and the most current internationally accepted understanding of AI.\nWhile specific response elements vary based on the virus and infected poultry species, the CFIA's actions generally include movement restriction, disease containment and surveillance components.\nAll infected flocks are humanely destroyed, and carcasses are disposed of in an environmentally acceptable fashion. Infected premises are thoroughly cleaned and disinfected before new birds can be introduced. Where highly pathogenic virus is present, flocks in the vicinity of infected premises and those from poultry operations that may have had contact with infected premises are also humanely destroyed and disposed of as a pre-emptive measure.\nSurveillance, quarantine and segregation\nBecause each outbreak situation is unique, CFIA responses are flexible and may differ based on a variety of factors. For example, some disease response protocols are species specific. What follows, therefore, is the general approach to surveillance and segregation after an outbreak of AI in domestic poultry has been confirmed.\nQuarantines restricting the movement of poultry and poultry products are placed on infected premises, poultry operations located in the vicinity of infected premises and other poultry operations that may have had contact with infected premises. Birds from quarantined premises are tested and monitored for evidence of AI infection\nThe CFIA may also ask domestic poultry producers to execute a segregation protocol. A segregation protocol seeks to minimize, if not eliminate, potential contact between wild birds and domestic or captive birds in the area after a case of HPAI has been confirmed.\nVaccination of birds against AI is not always practical, effective or economical in any given outbreak situation. The CFIA has studied vaccination as a strategy against the spread of AI and has created guidelines around its effective use. Vaccination is certainly one of many strategies that the CFIA may employ during an AI outbreak.\n- Date modified:" ]
[ "<urn:uuid:3877ec57-3d42-4677-b2a6-97e11144006d>" ]
[ "CC-MAIN-2023-14" ]
[ "https://inspection.canada.ca/animal-health/terrestrial-animals/diseases/reportable/avian-influenza/prevention-preparedness-and-response/eng/1375982718329/1375982719875" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949533.16/warc/CC-MAIN-20230331020535-20230331050535-00370.warc.gz" ]
[ "en" ]
[ 0.9481687545776367 ]
[ 2982 ]
[ 3.609375 ]
[ 4 ]
[ "Written by Jaelyn Molyneux, BA’05\nDon’t let the rolling foothills and casually grazing cattle of W.A. Ranches fool you. At 19,000 acres, those foothills add up to the largest outdoor classroom in North America.\nAnd those beef cows — about 900 Angus and 60 bulls — are the subjects of study and monitoring as part of a massive effort to expand the teaching, learning, research and community engagement around global beef production and animal welfare.\nW.A. Ranches is a working cow-calf ranch just northwest of Calgary. It was gifted to UCalgary by J.C. (Jack) Anderson and his daughter, Wynne Chisholm, BA’79, in 2018, instantly changing the game for agriculture research at the university.\n“We have this focus on the health and welfare of beef at the University of Calgary that didn’t exist before,” says Dr. Ed Pajor, PhD, director of W.A. Ranches and the Anderson-Chisholm Chair in Animal Care and Welfare in the Faculty of Veterinary Medicine. “When you have your own research station, you can manage the resource and take the lead in research programs.”\nAs the team got to understand the nuances of the expansive ranch, it launched several field research projects, including the “grimace scale.” That project involved hovering drones unobtrusively around calves to record their facial expressions at various times, identifying what they looked like when they were in pain and when they weren’t. That information helps producers and vets make informed decisions around the welfare of calves.\nThe ranch also provides infinite opportunity for cross-faculty research. Biomedical engineering, science and sustainability applications, and research have tapped into the ranch. For example, engineering student Jackson Cooper recently used the facility to test and validate computer coding to track collars on bulls. And partnerships with government and industry are growing — Alberta Innovates, Alberta Beef Producers and the Beef Cattle Research Council are just a few of the groups working with W.A. Ranches on research projects.\nThe ranch also spurred the creation of a six faculty-strong club called Team Beef, whose members meet monthly to kick around ideas and support each other and their students. “It’s the largest group of researchers working on beef in North America, especially at a vet school,” says Pajor.\nIf the first couple of years were all about getting to know the ranch, the next few are about continuing to build infrastructure to expand the teaching and research capabilities and open the gates to increased outreach through industry workshops and youth events. It’s an enviably wide and welcoming home on the range." ]
[ "<urn:uuid:7d411bd9-608f-410b-90f5-f78bd89f0675>" ]
[ "CC-MAIN-2023-14" ]
[ "https://archmagazine.ucalgary.ca/meanwhile-back-at-the-ranch/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950383.8/warc/CC-MAIN-20230402043600-20230402073600-00365.warc.gz" ]
[ "en" ]
[ 0.9594091176986694 ]
[ 567 ]
[ 2.921875 ]
[ 3 ]
[ "The forensic database of England and Wales is the largest in the world with profiles from over 3 million people. Samples can be taken without consent, not only from convicted criminals, but, also from all those arrested on suspicion of a recordable offence even if they are not subsequently charged. There has been little public debate on the database, in contrast to other applications of genetic technology, and, in particular, a lack of discussion on the inclusion of children despite the UN Convention on the Rights of the Child and the debate around children’s consent. The paper begins by briefly introducing the significance of the inclusion of children on the England and Wales National DNA database (NDNAD) in the context of current law. Next there is a report of the findings of a small focus group study carried out with children aged 10-12 and one of their parents, who were contacted through their schools. The study explored issues related to the inclusion of children on the NDNAD, including children’s responsibility and independence, and gathered responses to real life case studies about the taking of DNA samples from children. These findings are used to further support multi-disciplinary arguments on why the inclusion of children,between the ages of 10-12, may be considered controversial." ]
[ "<urn:uuid:9fa80a04-04b2-407a-bc2e-de2d88c203f3>" ]
[ "CC-MAIN-2013-48" ]
[ "http://www.research.lancs.ac.uk/portal/en/publications/bar-coded-children-an-exploration-of-issues-around-the-inclusion-of-children-on-the-england-and-wales-national-dna-database(ebb1cb8b-cc5c-4887-9e27-c8b9e7d69a60).html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345774929/warc/CC-MAIN-20131218054934-00092-ip-10-33-133-15.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9619901776313782 ]
[ 251 ]
[ 2.8125 ]
[ 3 ]
[ "Tips For Protecting Your Personal Data In The Cloud\nHowever, the possible threats to our data do not mean they cannot be made secure. Cloud security can be made effective if proper defensive measures are implemented.\nHere are a few practical tips, which will make your cloud experience risk-free.\nPerform Regular Data Backups\nOne of the most important things to consider while managing data is to ensure that you have backups for your data. It is always good to have electronic copies of your data so you can continue accessing them even if the original gets lost or corrupted.\nYou can either choose to back them up in some other cloud storage or manually back up in an external storage device. To be on the safer side, it would be great if you could do both since the latter will come in handy in times of poor or no internet connectivity.\nAvoid Storing Sensitive Information\nLet’s be honest. There is no such thing as actual privacy on the internet, and the rise in the number of identity thefts is standing proof of it. So it is always advisable to avoid storing information such as passwords, credit/debit card details etc. on the cloud.\nSensitive information could also be intellectual property such as patents and copyrights. Even if we take every possible precaution to protect them, these kind of information can land in another individual/company’s data management system somehow, which in turn can lead to potential data leakage.\nUse Cloud Services that Encrypt Data\nTo enjoy better privacy, always look for cloud storage services that offer local encryption for your data. This provides double security as the files will have to be decrypted to gain access. This method protects your data even from service providers and administrators. Taking a few preventive measures like this around data encryption can make your most sensitive information tightly secure.\nEncrypt Your Data\nBefore you upload your files onto the cloud, it is always beneficial to encrypt your data, even if the cloud storage automatically encrypts them. There are many third-party encryption tools that will apply passwords and encryption to files once you are done editing them so that they are encrypted before uploading.\nInstall Anti-virus Software\nAll the above security measures could be taken to secure your data, but sometimes the problem is not cloud security but the system you have logged in from. Hackers can easily access your account if there is no proper protection in place for your system. In such cases you are exposing yourself to viruses that provide penetration points. No matter how secure your cloud might be, your data could still be at risk if the device or files you’re using are infected with malware. Run anti-virus and/or anti-spy software to make sure that you aren’t inadvertently downloading malware from the cloud or exposing data to malware on your device.\nMake Passwords Stronger\nThis might be something you have heard over and over again. But still, it is very important to provide stronger passwords to prevent your files from being hacked. Apart from creating a strong and unique password, it is also important to change them frequently, and not share it with anyone. Most login pages these days have additional identification questions to confirm the authorised user.\nCloud computing has been a boon to the world of technology for obvious reasons. Not only does it allow data storage and management, but also helps in accessing data anytime, anywhere over the internet.\nWhile cloud computing comes in with a lot of advantages, but when the question of safety arises, we cannot be too sure as to how secure the data is, particularly the ones stored in a public cloud.\nThe security issues faced can be broadly categorised into concerns faced by cloud provider and those faced by the customer. Cloud service providers must ensure that their infrastructure is secure and their users’ data is protected. At the same time, customers must make sure they password-protect their apps and have other verification measures in place.\nVpsCity Cloud Storage Features\nA secure and reliable system to back up your essential files.\nFiles stored in the cloud can be retrieved remotely.\nAn affordable way of protecting important data.\nProvides mobility in the workflow of a company or business.\nOnline Backups & Archiving\nAn assurance of restoration of data from any unwanted failure or data loss from archive system.\nFiles are accessible from anywhere.\nServices with this feature will update your files to reflect any edits you make in real time.\nFile and Folder Permissions\nOnly users provisioned by the administrator, with active passwords, can access their account.\nBackup SQL Server, cPanel & Microsoft Exchange\nYou can backup your cPanel, mysql server, MS SQL server & Microsoft exchange data to our Idera Cloud backup server.\nWe use Bare-metal recovery technique in the field of data recovery and restoration.\nFTP Access & Subfolder Permission\nSubfolder permissions support for CIFS/SMB, AFP, FTP, and File Station.\nAll storage servers are monitored 24x7 and immediate action is taken if a problem is detected.\nCloud storage comes with its own set of advantages in many ways than one. But always bear in mind that security assurances are not guaranteed, yet possible. Adopting few security measures from our end, like the above, can go a long way in maintaining safe files on and off cloud.\nAlways better to be safe than sorry, right?\nSome of the commonly seen cloud computing security risks are:\n- Loss of sensitive data\n- Violation of existing regulatory controls\n- Malware infections\n- Hacked interfaces\n- Permanent data loss\n- Abuse of cloud service\n- Insider threat\n- Hijacking of accounts" ]
[ "<urn:uuid:032038f0-160c-4edf-9acb-ee066413cc37>" ]
[ "CC-MAIN-2020-10" ]
[ "https://www.vpscity.co.nz/blog/158/Tips-For-Protecting-Your-Personal-Data-In-The-Cloud-.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875148850.96/warc/CC-MAIN-20200229083813-20200229113813-00534.warc.gz" ]
[ "en" ]
[ 0.9230441451072693 ]
[ 1158 ]
[ 2.734375 ]
[ 3 ]
[ "- a coordinating writing goals chart, where you can post your students' names next to their individual goals (Pinterest inspired)\n- a self-check skills card, to help students check that they've addressed each skill\n- two writing conferences charts - for if you have one teacher or two teachers in your classroom\n- a SECOND writing anchor chart and set that is better suited for 1st grade and 2nd grade\n- a THIRD writing anchor chart and set that is suitable for 3rd and 4th\nNote: This preview is hosted on Google Docs. Once you open the file, click File > Download to save onto your computer!\nThis post is linked up with Manic Monday!" ]
[ "<urn:uuid:cc9f80e4-e827-4fcf-9a91-31013b9aaea6>" ]
[ "CC-MAIN-2013-48" ]
[ "http://aturntolearn.blogspot.com/2012/04/making-sentence-structure-easy-for.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164019123/warc/CC-MAIN-20131204133339-00052-ip-10-33-133-15.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9522021412849426 ]
[ 142 ]
[ 2.640625 ]
[ 3 ]
[ "- Why do nations trade?\nOne might argue that the best way to protect workers and the domestic economy is to stop trade with other nations. Then the whole circular flow of inputs and outputs would stay within our borders. But if we decided to do that, how would we get resources like cobalt and coffee beans? The United States simply can’t produce some things, and it can’t manufacture some products, such as steel and most clothing, at the low costs we’re used to. The fact is that nations—like people—are good at producing different things: you may be better at balancing a ledger than repairing a car. In that case you benefit by “exporting” your bookkeeping services and “importing” the car repairs you need from a good mechanic. Economists refer to specialization like this as advantage.\nA country has an absolute advantage when it can produce and sell a product at a lower cost than any other country or when it is the only country that can provide a product. The United States, for example, has an absolute advantage in reusable spacecraft and other high-tech items.\nSuppose that the United States has an absolute advantage in air traffic control systems for busy airports and that Brazil has an absolute advantage in coffee. The United States does not have the proper climate for growing coffee, and Brazil lacks the technology to develop air traffic control systems. Both countries would gain by exchanging air traffic control systems for coffee.\nEven if the United States had an absolute advantage in both coffee and air traffic control systems, it should still specialize and engage in trade. Why? The reason is the principle of comparative advantage, which says that each country should specialize in the products that it can produce most readily and cheaply and trade those products for goods that foreign countries can produce most readily and cheaply. This specialization ensures greater product availability and lower prices.\nFor example, India and Vietnam have a comparative advantage in producing clothing because of lower labor costs. Japan has long held a comparative advantage in consumer electronics because of technological expertise. The United States has an advantage in computer software, airplanes, some agricultural products, heavy machinery, and jet engines.\nThus, comparative advantage acts as a stimulus to trade. When nations allow their citizens to trade whatever goods and services they choose without government regulation, free trade exists. Free trade is the policy of permitting the people and businesses of a country to buy and sell where they please without restrictions. The opposite of free trade is protectionism, in which a nation protects its home industries from outside competition by establishing artificial barriers such as tariffs and quotas. In the next section, we’ll look at the various barriers, some natural and some created by governments, that restrict free trade.\nThe Fear of Trade and Globalization\nThe continued protests during meetings of the World Trade Organization and the protests during the convocations of the World Bank and the International Monetary Fund (the three organizations are discussed later in the chapter) show that many people fear world trade and globalization. What do they fear? The negatives of global trade are as follows:\n- Millions of Americans have lost jobs due to imports or production shifting abroad. Most find new jobs, but often those jobs pay less.\n- Millions of others fear losing their jobs, especially at those companies operating under competitive pressure.\n- Employers often threaten to export jobs if workers do not accept pay cuts.\n- Service and white-collar jobs are increasingly vulnerable to operations moving offshore.\nSending domestic jobs to another country is called outsourcing, a topic you can explore in more depth. Many U.S. companies, such as Dell, IBM, and AT&T, have set up call service centers in India, the Philippines, and other countries. Now even engineering and research and development jobs are being outsourced. Outsourcing and “American jobs” were a big part of the 2016 presidential election with Carrier’s plan to close a plant in Indianapolis and open a new plant in Mexico. While intervention by President Trump did lead to 800 jobs remaining in Indianapolis, Carrier informed the state of Indiana that it will cut 632 workers from its Indianapolis factory. The manufacturing jobs will move to Monterrey, Mexico, where the minimum wage is $3.90 per day.15\nSo is outsourcing good or bad? If you happen to lose your job, it’s obviously bad for you. However, some economists say it leads to cheaper goods and services for U.S. consumers because costs are lower. Also, it should stimulate exports to fast-growing countries. No one knows how many jobs will be lost to outsourcing in coming years. According to estimates, almost 2.4 million U.S. jobs were outsourced in 2015.16\nBenefits of Globalization\nA closer look reveals that globalization has been the engine that creates jobs and wealth. Benefits of global trade include the following:\n- Productivity grows more quickly when countries produce goods and services in which they have a comparative advantage. Living standards can increase faster. One problem is that big G20 countries have added more than 1,200 restrictive export and import measures since 2008.\n- Global competition and cheap imports keep prices down, so inflation is less likely to stop economic growth. However, in some cases this is not working because countries manipulate their currency to get a price advantage.\n- An open economy spurs innovation with fresh ideas from abroad.\n- Through infusion of foreign capital and technology, global trade provides poor countries with the chance to develop economically by spreading prosperity.\n- More information is shared between two trading partners that may not have much in common initially, including insight into local cultures and customs, which may help the two nations expand their collective knowledge and learn ways to compete globally.17\n- Describe the policy of free trade and its relationship to comparative advantage.\n- Why do people fear globalization?\n- What are the benefits of globalization?" ]
[ "<urn:uuid:ed47c50f-7615-43db-ae0e-0a36f31fedee>" ]
[ "CC-MAIN-2020-10" ]
[ "https://openstax.org/books/introduction-business/pages/3-2-why-nations-trade" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145713.39/warc/CC-MAIN-20200222180557-20200222210557-00102.warc.gz" ]
[ "en" ]
[ 0.958467960357666 ]
[ 1204 ]
[ 3.21875 ]
[ 3 ]
[ "Authorities report that while most snowballs aren’t bigger than a tennis ball, some of them have more than one meter in diameter.\n(Mirror Daily, United States) – After a freak storm had hit Siberia, giant snowballs began to appear in a coastal area. The mysterious icy spheres left behind by the terrible blizzard occupy an area of approximately 11 miles.\nAs strange as it would may seem, a large coastal area from Russian is currently occupying by spheres made of ice. While some of them are no larger than a tennis ball, some of them have more than one meter in diameter.\nAccording to the local authorities, the mysterious spheres appeared after a large storm that came out of nowhere. The coastal area where this phenomenon was sighted is near the Nyda village. The villagers said that they hadn’t seen anything remotely resembling these icy spheres.\nThe authorities stated that the giant snowballs are the result of a natural phenomenon. Due to the sudden weather shift, the wind’s speed increased. The constant flow of water combined with the howling winds shaped these spherical marvels.\nA similar phenomenon took place in the United States of America on Lake Michigan back in 2014. As scientists recall, after a polar vortex swept the shore of Lake Michigan, hundreds of giant snowballs washed up near Glen Arbor.\nAt that time, Joe Charlevoix, a meteorologist monitoring the phenomenon came up with an explanation to account for the event. As the scientists explained it at that time, the waters of Lake Michigan have temperatures slightly below the point of freezing.\nThis means that at all times there are ice fragments in the water. The movement of the waves forces the water to freeze in layers, thus creating these spherical objects. In the end, these giant snowballs are pushed by the wind, and end up on the shore.\nSergei Lisenkov, the acting press secretary of the AARI (Arctic and Antarctic Researcher Institute) offered a similar explanation. The scientists declared that there is indeed a natural phenomenon at work and that the spheres are the result of water and wind working together.\nIt’s quite plausible that the sphere’s themselves formed on the sea and were pushed on the shore by the bitter Siberian winds.\nThe giant snowballs might be just natural occurring phenomena in the eyes of others, but it would seem that they’ve managed to attract a very large crowd. People from all over Russia are going to the Nyda in order to view these spherical wonders for themselves and to take lots of selfies.\nImage source: Pixabay" ]
[ "<urn:uuid:32b8a3f6-0848-406b-88a5-6669a8633db8>" ]
[ "CC-MAIN-2023-14" ]
[ "https://mirrordaily.com/freak-storms-leaves-behind-giant-snowballs-mirror-daily/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950373.88/warc/CC-MAIN-20230402012805-20230402042805-00183.warc.gz" ]
[ "en" ]
[ 0.9566828608512878 ]
[ 533 ]
[ 3.015625 ]
[ 3 ]
[ "The North American porcupine is discovered throughout the bulk of the Canada and United States and into Mexico. While they made use of to be located in the southeastern parts of the US, they no longer live in that environment. The table listed below programs the variety of all of the varieties of porcupine discovered worldwide.\nPorcupine Habitat-Nests On the home front the porcupine has been videotaped as prolonged its environment concerning 15 miles, but usually remains very near to home. The animals normally just inhabit an area of one (1) to two (2) miles and this is cut drastically in the wintertime when they spend their time in just a few close trees. As with most pets, the men will wander off the outermost far from the house in search of a companion.\nPorcupine Benefits & Detriments to People and the Community\nPorcupines are both arboreal and ground environment pets and their nests, called dens, could be found in either environment. Thick brush and cavern sites will also offer a fine house for the porcupine. From the icy tundra of northern Canada via the desert southwest of the United States, to the cozy, near-tropical warmth of northern Mexico, North America has every kind of porcupine environment.\nThey also have program guard hairs and a thick, bristly undercoat. Indigenous Americans used the quills of the porcupines for hair brushes and decorations. The quills have a greasy kind coating on them that permits simpler infiltration right into an enemy! The quill’s layer is much slicker throughout the summertime when their diet plan is extra vitamins and mineral abundant. Click here https://leesokpei.wordpress.com\nPorcupines frequently slim down in the winter months. In fact, scientists approximate that they lose nearly 30% of the body weight through the chillier months. Porcupines in the Mountain ranges carry with them 50 plus wood ticks that could lug the Colorado Tick Infection.\nThey hardly ever spread the infection due to the fact that only adult ticks live on the porcupines and adults do not carry the virus. The quills have an antibiotic residential or commercial property just in the situation it is the porcupine that obtains stuck. The Porcupine quills are really the 3rd kind of hair located on the animal." ]
[ "<urn:uuid:0124c114-065d-4330-b032-1fcef6dc4b85>" ]
[ "CC-MAIN-2017-30" ]
[ "http://bluepoblano.com/porcupine-habitat-range/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424889.43/warc/CC-MAIN-20170724162257-20170724182257-00398.warc.gz" ]
[ "en" ]
[ 0.9531528949737549 ]
[ 486 ]
[ 3.109375 ]
[ 3 ]
[ "A lot of writers tend to describe things visually—but consider your other senses. Next to sight, the first thing many people will notice about a place is how it sounds.\nIs it loud? Is it quiet? If you dropped a blind character in the middle of it, what distinctive noises would he hear that could tell him where he is?\nIs it a city? Some things you might hear in a city include:\n- Traffic—lots of it, most of the time, even at night\n- The rumble of buses\n- Cars honking, engines revving and idling\n- Emergency sirens from ambulances, police units, and fire trucks\n- People talking, laughing and yelling (depending on where you are)\n- Music spilling from storefronts, bars, and restaurants\n- If you’re on a very crowded street, a rumble of footsteps\n- Wheels rumbling, clacking, and screeching as they slow and stop\n- Horns and whistles\n- The echoing voice of the PA announcements, if you’re in the station\nWhat do you hear and what makes it different from any other city? In Europe, sirens have a distinctive two-tone sound that lets you know where you are the second you hear it. Sadly, for reasons Britain phased out the two-tone siren and now London sounds just like any other big city. Ah, the good old days.\nIf it has large parks, different parts of it near those spaces will be quieter. If it has large sporting events, it might contain a stadium. Crowd sounds, lots of honking, etc. after games let out, people laughing, beer bottles shattering, etc. A smaller town will have some traffic noises at certain parts of the day, but unlike New York, it will quiet down when everyone has got to work or school. Parts of London can be surprisingly quiet at night—but that can be true of any big city.\nIf the town has a river through it, you’ll hear boat horns, and if it is a port city, most likely seagulls. This is not a given; I live smack in the bellybutton of the US and we have seagulls at the city landfill.\nMove to a more rural setting and you can have animal noises. Cows pretty much sleep at night, unless a farmer is weaning calves, and then you get to listen to them bawl for hours because they’re separated from their babies. Don’t ask me how I know this.\nSounds not only lend your setting atmosphere, but they can even contribute to the plot. Todash is a state where you can travel between worlds in The Dark Tower. It’s not a pleasant thing; unnerving chimes (kammen) herald your approach to this state. One of the ways you can go todash is to, um, die. When someone hears those chimes, shit’s about to get real.\nThe TARDIS in Doctor Who has its own sound; you can’t mistake it for anything else. In this case, it functions as a character tag, a unique identifying device that only goes with that character (and yes, the TARDIS is a character). You can use sound in the same way to distinguish your world. Hear it in your head and then put it on the paper. With practice and skill, your readers will hear it too.\nUseful information. Dropping by from the challenge.\nThanks for stopping by, Wendy! :)\nI’ve just popped over to your blog–what a great theme. I love London so much and I do love the tube. <3 Now I've got some catch-up reading to do!\nOn Fri, Apr 22, 2016 at 9:05 AM, Graphomaniac – Elizabeth West wrote:\nSound fascinates me–all sound from music and beyond. I don’t like some of it like loud vehicles, rap music cranked up, or lawnmowers in the early morning but I am acutely aware of sounds. I guess I have a very keen sense of hearing. I’ll sometimes mention a sound I’ve heard to my wife and she’s oblivious. I often have to let her know that her cell phone is ringing even though it’s in another room of our house or in her purse when we are out in public. Sound can really play a key role in describing setting.\nA to Z Challenge Co-host\nTossing It Out\nThat’s interesting, Arlee–have you noticed that sound is more prominent in your writing?\nOn Wed, May 4, 2016 at 10:07 AM, Graphomaniac – Elizabeth West wrote:\nThat’s what I was pondering while reading your post. I’m not sure, but I’m guessing I do use sound a lot. It might not stand out for me because sound is such an integral part of my experience.\nNow I’ll have to be more aware of this.\nI think a lot of writers probably do the same thing–most people use sight, since the majority of us are sight-oriented. Maybe some in whose work you notice other emphasis on a different sense (sound, smell, touch, etc.) are oriented that way.\nWe all need to mix it up a little to enhance the experience for readers. It’s difficult to remember everything! Writing is hard!\nOn Thu, May 5, 2016 at 11:54 AM, Graphomaniac – Elizabeth West wrote:" ]
[ "<urn:uuid:f742aca1-8c72-4d70-a6da-0afdff1732cb>" ]
[ "CC-MAIN-2023-14" ]
[ "https://aelizabethwest.com/2016/04/22/s-is-for-sound/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949701.56/warc/CC-MAIN-20230401063607-20230401093607-00187.warc.gz" ]
[ "en" ]
[ 0.9469195604324341 ]
[ 1185 ]
[ 2.734375 ]
[ 3 ]
[ "A month earlier, World War II had begun with the invasion of Poland by Nazi Germany. Oxford students were shaken by news of the war and confused about how, or even if, they should pursue their studies. On October 22, 1939, C.S. Lewis delivered a message to a gathering of students, offering perspective, insight, and encouragement on the situation.\nAvailable today in The Weight of Glory and Other Addresses, \"Learning in War-Time\" contains a number of profound remarks. One portion reads as follows: \"If we let ourselves, we shall always be waiting for some distraction or other to end before we can really get down to our work. The only people who achieve much are those who want knowledge so badly that they seek it while the conditions are still unfavourable. Favourable conditions never come.\"\nThere is much wisdom in these remarks. Life is full of ongoing \"distractions\"--things that, if we let them, will draw us away from what interests us, what's important to us, and even what God is calling us to accomplish. Sometimes these distractions are mundane and may even be part of our daily routine--surfing the internet, absorbing ourselves in social media, watching television, immersing ourselves in our smartphone, or just having to deal with the daily necessities of life. In other instances, distractions may be larger and more looming--financial pressures, employment transitions, serious health concerns, or a spiritual crisis.\nLewis is not telling us to avoid life or the daunting situations we may find ourselves in, but he reminds us that these sorts of events will always be with us to one extent or another. In short, \"some distraction or other\" will find its way into our lives (and never at a convenient time). If we wait for the perfect moment of favorable conditions, we'll be waiting a long time.\nHomeschooling can be like that--full of \"distractions\" and detours that life throws our way. Be encouraged in knowing that you're not alone in such circumstances. Know, too, that you can persevere and, despite the difficulties, enjoy teaching, learning, knowing, and understanding." ]
[ "<urn:uuid:9d6c43dc-c7e5-4922-b426-eb28d127075f>" ]
[ "CC-MAIN-2020-05" ]
[ "https://blog.sonlight.com/some-distraction-or-other.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00299.warc.gz" ]
[ "en" ]
[ 0.9464458227157593 ]
[ 440 ]
[ 2.78125 ]
[ 3 ]
[ "Inuk what? I can hear you say – Inukshuk. They are to be found all over the circumpolar world. Inukshuk is an Inuit word meaning “in the likeness of a human”. These are monuments of stones used for communication as well as survival. Traditionally it meant “someone was here” or “you are on the right path”. The Inukshuk serves a number of purposes really; for navigational or directional aids, marking a place of respect or as a memorial for a loved one, to indicate routes or places where fish can be found, and signifying places of power or a spiritual place. Almost always you will find a singular inukshuk, however, sometime they are arranged in sequences spanning great distances or they are grouped to mark a specific place.\nInukshuk are among the oldest and most important objects placed by humans in the Arctic landscape. They are now a familiar symbol of the Inuit and their homeland. Their tradition forbids the destruction of an Inukshuk.\nInukshuks come in a variety of sizes and in various forms: small or large, single rock or several rocks balanced on each other, round boulders of flat stones; whatever happens to be on hand really. The purpose of the marker is determined by the arrangement of the stones. The directions of the arms or legs might indicate the way to an open channel for navigation or a passage through mountains.\nThe Inukshuk was used as the logo of the 2010 Winter Olympics, which were held in Vancouver, Canada.\nWherever we have travelled in Canada we have come across inukshuks that have been built by the roadside, along rivers, on pebble beaches and in the mountains. All over Canada they can be found in shops made from all kinds of different materials. I love these markers and all the different uses they serve in this vast land." ]
[ "<urn:uuid:09202a90-9042-4982-a993-d09fbedab9e2>" ]
[ "CC-MAIN-2017-26" ]
[ "https://storki.wordpress.com/2013/10/09/inukshuk-some-history-on-the-iconic-symbol-of-the-north/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320077.32/warc/CC-MAIN-20170623170148-20170623190148-00488.warc.gz" ]
[ "en" ]
[ 0.9658716320991516 ]
[ 399 ]
[ 3.46875 ]
[ 3 ]
[ "Encyclopedia of Lakes and Reservoirs by Rhodes W. Fairbridge (Editor); Reginald W. Herschy (Editor); Lars Bengtsson (Editor)\nPublication Date: 2012-06-25\nLakes and reservoirs hold about 90% of the world's surface fresh water. The book contributes to the physical, chemical and ecological characteristics of lakes and reservoirs as well as describing their uses and environmental state trends in different parts of the world. Over 80 scientists from over 25 countries have contributed to the over 200 entries in a wide range of topics including acidification, artificialisation, biology, canals, climate change effects, chemicals, dams, dew ponds, drainage, ecological, eutrofication, evaporation, fisheries, geographical, geological, hydrological, hydro-electric power, nutrients, organic pollution, paleolimnology, reservoir capacities and depths, sedimentation and water resources." ]
[ "<urn:uuid:f851f505-2f60-4ad5-adec-88154b4ddf0a>" ]
[ "CC-MAIN-2023-14" ]
[ "https://libguides.lib.msu.edu/geology" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948673.1/warc/CC-MAIN-20230327154814-20230327184814-00195.warc.gz" ]
[ "en" ]
[ 0.8700689673423767 ]
[ 196 ]
[ 3.359375 ]
[ 3 ]
[ "What is scattering of light ?\nScattering is the phenomenon by which a beam of light is redirected in many different directions when it interacts with a particle of matter.\nFor example - when sunlight strikes molecules in our atmosphere, the light is redirected in many directions. The blue light is scattered more than the red light causing the sky to be blue.\nThis conversation is already closed by Expert\nthe phenomenon of change in the direction of propagation caused by the large number of molecules such as smoke, tiny water droplets, suspended particles of dust and air molecules present in the atmosphere is called scattering of light.\nThe phenomena of change in the direction of propagation of light caused by large number of molecules such as smoke , water droplets is called scattering of light\nhope it helps u thumbzz up plz\nThe spreading (or scattering) of light by particles in a mixture(like air, etc.) is called scattering of light.\nThere are many particles in the atmosphere (big ones like particles of fog & small ones like particles of gases which are not visible to the naked eyes). They are the ones responsible for the scattering of light.\nDo you know that sunlight consists of 7 lights/colours (violet, indigo, blue, green, yellow, orange & red(i.e.,VIBGYOR))? Well, it does...\nThere's more. The light in the violet region have shorter wavelength(you must have studied about wavelengths in IX std.) than the lights in the red region.\nNow it's time for the main answer of your Question.\nThe atmosphere consists of particles of different sizes. Very fine particles like the molecules of air, etc. having sizes smaller than the wavelength of visible light scatter light in the blue region and not red. So the red colour of the sun doesn't spread in the atmosphere making the sun appear red itself. But there's more. Sunlight also consists of lights in the Blue region. It is this light which is scattered by fine particles of the atmosphere. And this scattered around blue light(scattered in the sky), enters our eye. So, we feel the sky blue...\nBy the way, the sky doesn't appear red, as red is not scattered and appear to remain around the sun...( This is mainly during morning & evening)\nhope it helps....!!!!!" ]
[ "<urn:uuid:d0cebdb2-4859-47bd-9634-396f1149bbf5>" ]
[ "CC-MAIN-2017-26" ]
[ "https://www.meritnation.com/ask-answer/question/what-is-scattering-of-light/human-eye-and-colourful-world/3424059" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320570.72/warc/CC-MAIN-20170625184914-20170625204914-00611.warc.gz" ]
[ "en" ]
[ 0.9532490372657776 ]
[ 477 ]
[ 3.46875 ]
[ 3 ]
[ "Mediation is a method of alternative dispute resolution that is encouraged by the Courts, particularly in family law matters. A mediator is a neutral third party whose goal is to support the parties in a discussion about their conflict. Through the mediation process, it is hoped that the parties might develop a better understanding of their own and the other party's concerns and perspectives, and as a result, perhaps reach a resolution of their conflict without court intervention or litigation.\nParticipants are solely responsible for making decisions during the mediation process. There are many types of decisions that participants may make, including whether or not to pursue mediation, what topics are discussed, who should be involved in the discussion, how to explore additional information, what options are preferable, whether or not decisions are written, and so on.\nIt should be. The mediator should not make decisions for the participants or make any judgments of who is right or wrong. The mediator does not have a stake in any particular outcome and therefore, should treat all participants in a fair and balanced way. The main goal of the mediator should be to help create an environment for the parties to make voluntary and informed decisions. Not all mediators are the same, and there are many philosophical approaches to mediation. Anyone interested in mediation as a means of dispute resolution should request an initial consultation with the mediator to ensure he or she is a good fit for the parties.\nBonnie Westlin has been a qualified neutral under Rule 114 of the Minnesota Rules of General practice for family mediation since 2004. She is fully committed to supporting the decision-making of the parties with respect to all aspects of their dispute. Her mediation training has emphasized the transformative approach." ]
[ "<urn:uuid:6ebf081b-e0f1-4ee4-90e4-c26f359e6fbe>" ]
[ "CC-MAIN-2017-26" ]
[ "http://www.westlinlaw.com/frequently-asked-questions/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321536.20/warc/CC-MAIN-20170627185115-20170627205115-00453.warc.gz" ]
[ "en" ]
[ 0.9595249891281128 ]
[ 340 ]
[ 2.53125 ]
[ 3 ]
[ "Lesson 3: Nonfiction\n- Learning Goal\n- Identify and describe a nonfiction text.\n- Approximately 50 minutes\n- Necessary Materials\n- Provided: Independent Practice Worksheet\nNot Provided: Your Pet Dog by Elaine Landau, nonfiction books from classroom library\nwill review what we learned about fiction stories and how to identify them. I will discuss how some books are true stories. I will explain that in true stories the author writes a story that really happened or writes a book that gives the reader information about something. These are called nonfiction books. I will show the cover of Your Pet Dog by Elaine Landau and discuss how the picture on the cover looks like a real dog. I will do a picture walk, stopping at page 22, and point out that the pictures are of real dogs and that I think that this book is nonfiction.\nAsk: \"How did I decide whether the book is nonfiction?\" Students should respond that you looked at the pictures and thought about whether the things happening in the book are real or make-believe. If they are real, then the book is probably nonfiction.\nwill work together to do a picture walk of the rest of the book and discuss how each picture is of a real dog or real people working with a dog. We will read pages 22–23 and discuss the information we learn about doctors for dogs. We will discuss that this book is a nonfiction book.\nwill look at the cover and do a picture walk of several (nonfiction) books with your table group. You will identify one book that is nonfiction and explain why you think it is a nonfiction book. (Independent Practice Worksheet is provided.)\nTIP: For the Independent Practice, be sure to provide at least five examples of fiction and nonfiction books per student or group. At the end of the lesson, create a chart of all the nonfiction books the students found.\n(To see all of the ReadWorks lessons aligned to your standards, click here.)\nBuild Student Vocabulary personality\n|Tier 2 Word: personality|\n|Contextualize the word as it is used in the story||Ask the breeder about the dog’s nature and personality. When you choose a dog to take home as a pet, choose one with a good personality.|\n|Explain the meaning student-friendly definition)||Personality is the actions or qualities of a person or animal that make him/her different from another person or animal. The author of the text says that dogs have different personalities. This means that they act differently from other dogs.|\n|Students repeat the word||Say the word personality with me: personality.|\n|Teacher gives examples of the word in other contexts||My brother has a quiet, or shy personality. He does not talk a lot. My sister has a fun-loving personality. She loves parties and is always making jokes. She has many friends.|\n|Students provide examples||Think about your personality. How would you describe yourself? Tell me about it by choosing a personality word from a small group I write on the board. Say my personality is ________________________________.” (quiet, fun-loving, nice, friendly)|\n|Students repeat the word again.||What word are we talking about? personality|\n|Additional Vocabulary Words||damp, fierce|\nBefore teaching the lesson, explain that you are going to read a book about dogs. Dogs are thought to be the first wild animal that people have as pets. Dogs are descendents or relatives of the wolf family. Ask students if they think it would be easy to take care of a wolf. Then, explain that you are going to learn how to take care of a \"domesticated\" dog or a dog that can live with people." ]
[ "<urn:uuid:1430b250-2648-415f-a1b8-fcc67e63a533>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.readworks.org/lessons/gradek/genre/lesson-3" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704234586/warc/CC-MAIN-20130516113714-00044-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9426234364509583 ]
[ 782 ]
[ 3.90625 ]
[ 4 ]
[ "Former First Lady of the USA, Eleanor Roosevelt once said: “The future belongs to those who believe in the beauty of their dreams.” Whether you dream of becoming the next Jacquie Aiche or want to revolutionize the American home through your interior design ideas, a successful career in crafting might very well be within your reach. Teenagers with an interest in crafting and manufacturing are, however, often very unsure of the route they want to take career-wise. Countless questions arise, such as the relevance of a university degree, which can leave the young crafter feeling very overwhelmed and second-guessing his career choice. Luckily a few basic guidelines will go a long way in enabling young people to make the right decisions to ensure the best possible future outcomes.\nWhat educational qualifications are required?\nHigh school classes including shop, art and home economics can all teach future crafters a range of basic skills upon which they can build future career choices. While most universities and colleges in the USA offer varying qualifications in terms of crafting, a degree is by no means a prerequisite for a career in crafts. A bachelor degree can, however, be of benefit as it enables a student to gain experience in working with a variety of techniques and materials, thus expanding their work portfolios.\nMost tertiary qualifications include a number of business-related subjects such as finance and marketing that can be extremely beneficial for any student wanting to run his/her own business later in life. Craft artists will also benefit extensively from being apprenticed to a master craftsman. Seeing first-hand how various techniques are employed to craft an item is absolutely invaluable and cannot be taught during any theoretical lesson.\nWhat are the career prospects like for a crafter?\nMany crafters start out working for an organization, slowly learning all the tricks of the trade before taking a leap of faith and opting to start their own small business. Crafters that are self-employed have to work extremely hard to establish a sound reputation for themselves which, in turn, will help them to establish a solid customer base.\nInspiration and experience can luckily be obtained in many ways. The internet is inundated with information and ideas pertaining to crafts that could sell well, either online, from an actual shop, or both. Pinterest, in particular, showcases countless images that an avid crafter can draw inspiration from, permitting current concepts to be improved upon or to give birth to new, innovative ideas. If you have innovative ideas that will appeal to a niche market, and if your manufacturing process is sound, you will be able to attract and retain an impressive clientele.\nBeing a professional crafter can be a very rewarding career, both financially and in terms of giving you a sense of purpose. There are countless opportunities available to the professional crafter, both online and within their communities. There truly is no right or wrong way to go about forging a career for yourself. As long as you conduct a fair amount of research into the options available to you and make well-educated decisions you are bound to be a success.\nPhoto Credit: Clem Onojeghuo" ]
[ "<urn:uuid:c2f96c75-56e2-4838-9728-ef676655060c>" ]
[ "CC-MAIN-2020-05" ]
[ "https://makersrow.com/blog/2018/05/do-you-really-need-a-degree-to-become-a-professional-crafter/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250603761.28/warc/CC-MAIN-20200121103642-20200121132642-00332.warc.gz" ]
[ "en" ]
[ 0.9594144821166992 ]
[ 629 ]
[ 2.828125 ]
[ 3 ]
[ "Abraham Lincoln spent 14 formative years of his life, from the ages of 7 to 21, in Indiana . During this period, he grew physically and intellectually into a man. The people he knew here and the things he experienced had a profound influence on his life. His sense of honesty, his belief in the importance of education and learning, his respect for hard work, his compassion for his fellow man, and his moral convictions about right and wrong were all born of this place and this time. The time he spent here helped shape the man that went on to lead the country.\nDid You Know?\nThe towering 120-foot tall flagpole was originally placed in the island in the center of the plaza and was formally dedicated on July 12, 1931. It was later moved to its present location in 1944." ]
[ "<urn:uuid:0aa21989-858e-48e0-a536-8f9be622c838>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.nps.gov/libo/historyculture/a-lincoln.htm" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702298845/warc/CC-MAIN-20130516110458-00064-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9950544238090515 ]
[ 164 ]
[ 2.953125 ]
[ 3 ]
[ "Read more about which bean varieties to grow.\nRead more about planting dates for beans.\nTo extend the growing season, plant 2 crops 2 or 3 weeks apart. Keep picking the beans to encourage higher yield. Harvest the beans when the pods are full-sized but not bulging.\nThere are three different types of beans with different growth habits: bush, half-runner and pole-type.\nHalf-runner beans have a growth habit between that of bush and pole beans. They produce snap beans on runners up to 3 feet long, and can be grown as a bush-type or on trellises for support.\nPole beans are natural climbers and require support. Sturdy wooden poles 6 to 8 feet long tied together at the top and erected in the shape of a teepee offer good support. Plant 5 or 6 seeds in a circle 6 to 8 inches from each pole.\nScarlet runner beans are a type of pole bean that is quite ornamental, as well as productive and delicious. The vines grow rapidly, producing beautiful red flowers and beans, which may be harvested as snap beans when young and as green shell beans later. An added feature is that the flowers are attractive to hummingbirds.\nThere are different types of beans, bush and pole, and many different varieties. Snap beans, also known as string beans or green beans, are the most common; they are grown for their pods. Many varieties are available in both bush and pole types.\nAvailable varieties include standard round and flat-pod green, yellow wax and purple-pod types. Yellow wax beans taste about the same as green beans. Purple-pod beans turn green when cooked. Flat pod green snap beans are different in flavor and texture from round-pod ones.\nRead more about varieties of beans." ]
[ "<urn:uuid:bef3fbb7-dcd1-40b6-bc85-3e083c64c069>" ]
[ "CC-MAIN-2020-05" ]
[ "http://mgorange.ucanr.edu/Edible_Plants/?uid=79&sharebar=share&ds=530" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251687958.71/warc/CC-MAIN-20200126074227-20200126104227-00462.warc.gz" ]
[ "en" ]
[ 0.9472910761833191 ]
[ 363 ]
[ 3.09375 ]
[ 3 ]
[ "A variable capacitance diode is known as a varicap diode or as a varactor. If a diode is reverse biased, an insulating depletion region forms between the two semiconductive layers. In many diodes the width of the depletion region may be changed by varying the reverse bias. This varies the capacitance. This effect is accentuated in varicap diodes. The schematic symbols is shown in the figure below, one of which is packaged as common cathode dual diode.\nVaricap diode: Capacitance varies with reverse bias. This varies the frequency of a resonant network.\nIf a varicap diode is part of a resonant circuit as in the figure above, the frequency may be varied with a control voltage, Vcontrol. A large capacitance, low Xc, in series with the varicap prevents Vcontrol from being shorted out by inductor L. As long as the series capacitor is large, it has minimal effect on the frequency of resonant circuit. Coptional may be used to set the center resonant frequency. Vcontrol can then vary the frequency about this point. Note that the required active circuitry to make the resonant network oscillate is not shown. For an example of a varicap diode tuned AM radio receiver see “electronic varicap diode tuning,” Ch 9\nSome varicap diodes may be referred to as abrupt, hyperabrupt, or super hyper abrupt. These refer to the change in junction capacitance with changing reverse bias as being abrupt or hyper-abrupt, or super hyperabrupt. These diodes offer a relatively large change in capacitance. This is useful when oscillators or filters are swept over a large frequency range. Varying the bias of abrupt varicaps over the rated limits, changes capacitance by a 4:1 ratio, hyperabrupt by 10:1, super hyperabrupt by 20:1.\nVaractor diodes may be used in frequency multiplier circuits. See “Practical analog semiconductor circuits,” Varactor multiplier\nThe snap diode, also known as the step recovery diode is designed for use in high ratio frequency multipliers up to 20 gHz. When the diode is forward biased, charge is stored in the PN junction. This charge is drawn out as the diode is reverse biased. The diode looks like a low impedance current source during forward bias. When reverse bias is applied it still looks like a low impedance source until all the charge is withdrawn. It then “snaps” to a high impedance state causing a voltage impulse, rich in harmonics. An applications is a comb generator, a generator of many harmonics. Moderate power 2x and 4x multipliers are another application.\nA PIN diode is a fast low capacitance switching diode. Do not confuse a PIN switching diode with a PIN photodiode. A PIN diode is manufactured like a silicon switching diode with an intrinsic region added between the PN junction layers. This yields a thicker depletion region, the insulating layer at the junction of a reverse biased diode. This results in lower capacitance than a reverse biased switching diode.\nPin diode: Cross section aligned with schematic symbol.\nPIN diodes are used in place of switching diodes in radio frequency (RF) applications, for example, a T/R switch. The 1n4007 1000 V, 1 A general purpose power diode is reported to be usable as a PIN switching diode. The high voltage rating of this diode is achieved by the inclusion of an intrinsic layer dividing the PN junction. This intrinsic layer makes the 1n4007 a PIN diode. Another PIN diode application is as the antenna switch here for a direction finder receiver.\nPIN diodes serve as variable resistors when the forward bias is varied. One such application is the voltage variable attenuator. The low capacitance characteristic of PIN diodes, extends the frequency flat response of the attenuator to microwave frequencies.\nIMPact Avalanche Transit Time diode is a high power radio frequency (RF) generator operating from 3 to 100 gHz. IMPATT diodes are fabricated from silicon, gallium arsenide, or silicon carbide.\nAn IMPATT diode is reverse biased above the breakdown voltage. The high doping levels produce a thin depletion region. The resulting high electric field rapidly accelerates carriers which free other carriers in collisions with the crystal lattice. Holes are swept into the P+ region. Electrons drift toward the N regions. The cascading effect creates an avalanche current which increases even as voltage across the junction decreases. The pulses of current lag the voltage peak across the junction. A “negative resistance” effect in conjunction with a resonant circuit produces oscillations at high power levels (high for semiconductors).\nIMPATT diode: Oscillator circuit and heavily doped P and N layers.\nThe resonant circuit in the schematic diagram of the figure above is the lumped circuit equivalent of a waveguide section, where the IMPATT diode is mounted. DC reverse bias is applied through a choke which keeps RF from being lost in the bias supply. This may be a section of waveguide known as a bias Tee. Low power RADAR transmitters may use an IMPATT diode as a power source. They are too noisy for use in the receiver. [YMCW]\nDiode, gunn Gunn diode\nA gunn diode is solely composed of N-type semiconductor. As such, it is not a true diode. The figure below shows a lightly doped N- layer surrounded by heavily doped N+ layers. A voltage applied across the N-type gallium arsenide gunn diode creates a strong electric field across the lightly doped N- layer.\nGunn diode: Oscillator circuit and cross section of only N-type semiconductor diode.\nAs voltage is increased, conduction increases due to electrons in a low energy conduction band. As voltage is increased beyond the threshold of approximately 1 V, electrons move from the lower conduction band to the higher energy conduction band where they no longer contribute to conduction. In other words, as voltage increases, current decreases, a negative resistance condition. The oscillation frequency is determined by the transit time of the conduction electrons, which is inversely related to the thickness of the N- layer.\nThe frequency may be controlled to some extent by embedding the gunn diode into a resonant circuit. The lumped circuit equivalent shown in Figure above is actually a coaxial transmission line or waveguide. Gallium arsenide gunn diodes are available for operation from 10 to 200 gHz at 5 to 65 mw power. Gunn diodes may also serve as amplifiers. [CHW] [IAP]\nThe Shockley diode is a 4-layer thyristor used to trigger larger thyristors. It only conducts in one direction when triggered by a voltage exceeding the breakover voltage, about 20 V. See “Thyristors,” The Shockley Diode. The bidirectional version is called a diac. See “Thyristors,” The DIAC.\nA constant-current diode, also known as a current-limiting diode, or current-regulating diode, does exactly what its name implies: it regulates current through it to some maximum level. The constant current diode is a two terminal version of a JFET. If we try to force more current through a constant-current diode than its current-regulation point, it simply “fights back” by dropping more voltage. If we were to build the circuit in figure(a) below(a) and plot diode current against diode voltage, we’d get a graph that rises at first and then levels off at the current regulation point as in figure(b) below(b).\nConstant current diode: (a) Test circuit, (b) current vs voltage characteristic.\nOne application for a constant-current diode is to automatically limit current through an LED or laser diode over a wide range of power supply voltages as in the figure below.\nConstant current diode application: driving laser diode.\nIn Partnership with ON Semiconductor\nby Gary Elinoff\nby Gary Elinoff\nby Gary Elinoff" ]
[ "<urn:uuid:8d16e68c-469b-4aac-8b34-9da3fdcd812b>" ]
[ "CC-MAIN-2020-05" ]
[ "https://www.allaboutcircuits.com/textbook/semiconductors/chpt-3/other-diode-technologies/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250606226.29/warc/CC-MAIN-20200121222429-20200122011429-00049.warc.gz" ]
[ "en" ]
[ 0.9125665426254272 ]
[ 1770 ]
[ 3.3125 ]
[ 3 ]
[ "DNS security best practices: Preventing DNS hijacking, poisoning and redirection\nThe importance of DNS\nThe Domain Name System (DNS) is one of the fundamental protocols of the Internet. It provides a lookup service that converts domain names (like google.com) into IP addresses (like 192.168.0.0).\nWhile DNS has always been an important protocol, the growing use of cloud-based services has made it even more so. IP addresses of services (such as Microsoft 365 servers) change regularly, and the DNS system is necessary to ensure that users of these services are connecting to the correct device.\nA prime example of the importance of availability and security of the DNS infrastructure is the 2016 Distributed Denial-of-Service (DDoS) attack against Dyn, a widely-used DNS provider. During the attack against a single company’s servers, a significant number of major websites became inaccessible to a large number of users in Europe and North America.\nAddressing common threats to DNS security\nDNS can be attacked in a number of different ways. Among these are DNS DDoS, spoofing and amplification attacks.\nThe attack against Dyn is a classic example of a DDoS attack against DNS infrastructure. While the impact of a DDoS attack on Dyn was more widespread, these attacks can affect any organization. DNS is hierarchical, so an organization’s internal domains are governed by an internal DNS server (which can be the target of an attack).\nProtecting against DNS DDoS attacks requires deploying a DDoS mitigation solution. This should filter out malicious requests while allowing legitimate ones to continue through.\nA DNS spoofing attack occurs when an attacker causes a DNS server to send an incorrect response to a DNS query, enabling them to redirect users to attacker-controlled sites. This creates the opportunity for an attacker to steal sensitive data or attempt to exploit vulnerabilities in the user’s browser to drop malware.\nIn 2019, a large-scale DNS spoofing attack against Middle Eastern companies and government agencies was revealed. Cybercriminals would compromise DNS records for these organizations and redirect them to infrastructure that they controlled. After getting an SSL certificate for each domain, the attackers were able to decrypt and steal email and VPN credentials for these users.\nDNS hijacking or redirection attacks can occur when a computer connects to a malicious or compromised DNS server. Since a DNS server provides a conversion from domain names to IP addresses, a DNS server that provides an incorrect IP address will cause the client computer to visit the wrong website.\nDNS cache poisoning\nCaching is a common technique to decrease latency. A server will store a copy of a response to common queries, eliminating the need to fetch it for each individual user.\nDNS cache poisoning attacks are designed to place a false DNS record within a server’s cache. This is done by flooding a local DNS server with DNS responses in the hope that the one of the responses will match a request that the server recently sent out. If this is the case, the local DNS server will use the malicious response until the cache expires.\nMitigating DNS spoofing\nBoth DNS server operators and users can take action to protect against DNS hijacking attempts. DNS operators should:\n- Require multi-factor authentication for access to DNS servers\n- Keep DNS servers patched and up to date\n- Uninstall or disable unnecessary applications on DNS servers\n- Enable DNSSEC to ensure that DNS responses are digitally signed\nFor DNS users, detection of a hijacked DNS server can be more difficult. Some best practices include:\n- Using a free, trusted DNS such as Google Public DNS\n- Check historical data for a domain to see if its record has changed (may indicate a redirect attack if a record changed and it does not do so often)\n- Check age of issued certificate and cross-check with DNS record age (a new certificate after a domain change may indicate exploitation of DNS redirection attack)\nDNS amplification attacks use DNS servers to increase the impact of DDoS attacks. DNS is useful for these attacks because it uses UDP and has responses that can be much larger than the associated request.\nIn a DNS amplification attack, an attacker sends a DNS request to a DNS server with the source address spoofed to that of the target machine. The DNS server will respond to this query, sending a large amount of data to the target. Since DNS records are controlled by website owners, attackers can have custom domains designed to ensure that the target will receive much more data than the attacker receives. This amplifies the impact of a DDoS attack.\nBlocking DNS amplification attacks at DNS servers can be difficult, as it is hard to differentiate the target’s legitimate DNS requests from spoofed attack traffic. However, the target of a DNS amplification attack can perform filtering using stateful packet inspection that drops any inbound DNS responses for which there was not a corresponding outbound DNS request.\nThe challenges of DNS security\nThe DNS is one of the most important components of the Internet. Without it, websites become largely unreachable, since the DNS is responsible for translating domain names into the corresponding IP addresses. Only if a system already knows the IP address of the target site could it reach it without relying on DNS.\nBest practices for DNS security are the same as most other systems: restrict access, use MFA, enable security settings and keep everything up to date. However, the impact of a breach or loss of availability of DNS services makes taking these steps even more important.\n- Large DDoS attacks cause outages at Twitter, Spotify, and other sites, TechCrunch\n- Domain name server (DNS) Hijacking, Imperva\n- A Deep Dive on the Recent Widespread DNS Hijacking Attacks, Krebs on Security" ]
[ "<urn:uuid:ddd1ba7d-609a-408e-9bff-4c5babc6e5c9>" ]
[ "CC-MAIN-2023-14" ]
[ "https://resources.infosecinstitute.com/topic/dns-security-best-practices-preventing-dns-hijacking-poisoning-and-redirection/?utm_source=resources&utm_medium=infosec%20network&utm_campaign=course%20pricing&utm_content=related%20boot%20camp%20ad" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943746.73/warc/CC-MAIN-20230321193811-20230321223811-00753.warc.gz" ]
[ "en" ]
[ 0.9160053133964539 ]
[ 1203 ]
[ 3.296875 ]
[ 3 ]
[ "Despite society's love for all things bacon, most meat eaters shy away from actually seeing how pigs become pork. As the saying goes: \"There's a reason you take your children to pick apples but don't take them to a slaughterhouse.\"\nAfter a recent transport truck accident outside a pork-processing plant in Ontario, Canada, witnesses watched injured pigs suffer for hours without medical care or water before they were killed with bolt guns and their bodies thrown away as garbage — all despite offers from nearby sanctuaries to care for the pigs.\nThe incident has forced many people to confront the brutal realities of meat production, usually well hidden from the public.\nAround 7 a.m. Wednesday, October 5, a truck carrying nearly 200 pigs overturned on its way into Fearmans, a facility that kills approximately 10,000 pigs per day. Animal advocates heard about the incident, and many rushed to the scene.\nWhat they witnessed was horrific, says photographer and animal activist Julie O'Neill. \"The screaming of the pigs was incredible,\" she recalls. \"When I first got there at 9 a.m., it was pretty relentless — they were constantly screaming.\" About 40 pigs died in the accident, and several others were injured.\nFearmans employees, many dressed in office attire, came out and created a makeshift cardboard barricade so the public couldn't view the carnage, though advocates continued to take photos and videos.\nSeveral pigs were able to walk from the crash onto a nearby grassy area — their first and only taste of freedom — where they then collapsed. O'Neill witnessed one of the injured pigs rooting — a natural behavior where pigs use their snouts to dig in the grass or dirt. \"She was digging for the first time in her life. She was on grass, and her natural instincts kicked in.\"\nPigs — though generally viewed as a source of pork belly and bacon — are also cognitively sophisticated animals. They learn their names by 2 to 3 weeks old, communicate using more than 20 vocalizations, and are considered as intelligent as 3-year-old children. On a scale of animal cognition, they're ranked smarter than dogs and cats. But unlike dogs and cats, they're raised and slaughtered at the rate of 115 million per year.\nIt's difficult to comprehend the killing of 115 million pigs without witnessing the animals for yourself, says Anita Kranjc, founder of Toronto Pig Save, a Canadian animal advocacy organization dedicated to bearing witness to farm animals in the last moments of their lives. Kranjc and her followers are known for offering water and comfort to afraid, dehydrated pigs on transport trucks. \"By doing vigils, by being present, you make these abstract numbers real,\" Kranjc says.\nLooking into the eyes of animals about to die isn't for the faint of heart. Vigils frequently leave participants in hysterics.\nWhen Kranjc arrived on the scene of the Fearmans accident, she was dismayed to see that the company was attempting to hide the pigs' plight. \"I believe in the power of truth. We should have been able to see the victims. But they [Fearmans] know that people love animals, and if people see suffering and injured animals, they're going to sympathize and want to help them.\"\nShe recites Paul McCartney's famous quote: \"If slaughterhouses had glass walls, everyone would be a vegetarian.\"\nClearly, empathy doesn't bode well for bacon sales.\nGiving water to doomed, dehydrated pigs (outside the very same slaughterhouse) has previously landed Krajnc in jail, and the October 5 incident led to another arrest for obstructing a law enforcement officer. Determined to be with the injured pigs, she crossed the police line twice.\nThere were three injured pigs, in particular, that witnesses were able to see despite employees' attempts to block them. One pig, posthumously named Bonnie, was immortalized in several photographs that have since gone viral. Another pig — posthumously named Clyde — walked up to her as she lay, and the two were caught on camera, nose-to-nose.\nAdvocates begged for Bonnie to be released to a sanctuary, but employees ignored them. \"Every single slaughterhouse employee would not acknowledge our existence. They were obviously told: 'Don't look at them; don't talk to them,'\" O'Neill says.\nIn the end, Bonnie and the other injured pigs were shot with a bolt gun where they lay. These pigs were no longer viable for human consumption, so their bodies were picked up with forklifts and dumped into bins.\n\"This was a very unfortunate accident,\" Mary Jane Quinn, communications and marketing manager for Ontario Pork, said in a statement sent to Miami New Times. \"There were approximately 180 hogs on the truck. Of those, 138 were unharmed and were sent to the Fearmans plant for processing. The remainder either died in the accident or were seriously compromised. The hogs that were unharmed in the accident were examined by veterinarians from the Canadian Food Inspection Agency (CFIA) and approved for processing at the plant. The hogs that died or were seriously compromised in the accident could not be processed as per CFIA guidelines — food animals that die en route to the processing plant that are condemned or ordered destroyed are disposed of in accordance with the Canadian Health of Animals.\"\nThe surviving pigs that could walk were marched to the gas chambers. There, they were stunned with C02 before being killed. Though C02 is generally considered a more \"humane\" method of slaughter, video footage of the process has shown pigs thrashing and panicking before collapsing into convulsions. Investigations have revealed that many pigs are still conscious while being slaughtered.\nAs with American farms, there are few regulations governing how animals in Canada are raised and killed. According to the Canadian Federation of Humane Societies, however, it's typical for pigs to be raised on concrete floors and in extremely small pens. Females are often kept in gestation stalls — metal contraptions that prevent them from moving more than a few steps in either direction.\nThe journey to slaughter can be even more traumatic. National regulations allow animals to be transported for up to 52 hours without food, water, or rest, and Toronto Pig Save has filmed pigs hyperventilating while stuffed together in a sea of their own excrement. Trucks are often so packed that the animals can barely move.\nOne former truck driver told PETA that pigs are sometimes “packed in so tight their guts actually pop out their butts — a little softball of guts actually comes out.”\nSteve Jenkins — \"dad\" to Esther the Wonder Pig and founder of nearby Happily Ever Esther Farm Sanctuary — was onsite and begged Fearmans managers to allow him to take the hurt pigs. He had a trailer with him and had already lined up veterinary care. They refused to acknowledge his request.\n\"To think that the individuals who are responsible for the welfare of 'food animals' in Canada would prefer to see an injured animal denied medical care for hours and ultimately disposed of, as opposed to rehabilitated at a qualified sanctuary, is incomprehensible,\" he posted to social media.\n\"[The injured pigs] were waste; they were garbage to [Fearmans],\" O'Neill adds. \"They were downed animals, so they cannot be used for human consumption; they would go to rendering plants.\"\nIf you like this story, consider signing up for our email newsletters.\nSHOW ME HOW\nYou have successfully signed up for your selected newsletter(s) - please keep an eye on your mailbox, we're movin' in!\nIn other words, Fearmans chose to kill the injured pigs and throw away their remains rather than allow them to live out their lives in a sanctuary.\nVegan or not, when faced with the realities of what happens to animals raised for food, most humans find it disturbing. And though Ontario is a long way from Miami, meat production is no different in South Florida. There's even a Miami chapter of Kranjc's group, called Miami Animal Save. Activists stand outside area abattoirs, including Mary's Ranch in Hialeah (where people can choose the animal they want slaughtered). Protesters hold signs calling for compassion, bear witness to animals about to be killed, and are always looking for more people to join them.\nFor those who can't bear the idea of seeing these animals firsthand, Googling \"factory farming\" or \"slaughterhouse footage\" will reveal what goes on behind the closed doors of animal-processing plants. The images are worse than anything seen in horror movies The Purge and Hostel.\nIn the words of former cow farmer turned vegan activist Howard Lyman: \"If you visit the killing floor of a slaughterhouse, it will brand your soul for life.\" Just imagine how the pigs feel." ]
[ "<urn:uuid:bea857ce-022e-4a8d-a710-16f487add0a1>" ]
[ "CC-MAIN-2020-05" ]
[ "https://www.miaminewtimes.com/restaurants/pigs-injured-in-pork-truck-accident-slaughtered-thrown-in-garbage-despite-offers-for-sanctuary-8840178" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251778168.77/warc/CC-MAIN-20200128091916-20200128121916-00526.warc.gz" ]
[ "en" ]
[ 0.9837907552719116 ]
[ 1818 ]
[ 2.546875 ]
[ 3 ]
[ "OUTNUMBERED, a brief history of imposture is an audiovisual installation by Jasper Rigole that examines the strategies used in making documentaries, Fact Fiction novels and popular scientific equivalents.\nThe video projection in the first part of the installation shows a camera moving over an old school photograph, using the pan-and-scan effect. This technique is frequently used in documentary films to animate still archival footage. As the camera moves from one face to another, a voice explains who these students are and what their mutual relation is. According to the narration, the boys depicted are historical figures, some well known and others more obscure. They all seem to have a link to imposture." ]
[ "<urn:uuid:7c778210-0a14-48ed-94ff-c4f4baca8ebd>" ]
[ "CC-MAIN-2020-05" ]
[ "https://magpieaesthetic.com/outnumbered-a-brief-history-of-imposture/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250592394.9/warc/CC-MAIN-20200118081234-20200118105234-00345.warc.gz" ]
[ "en" ]
[ 0.9484532475471497 ]
[ 141 ]
[ 2.609375 ]
[ 3 ]
[ "All rocks are classified by their origin. Sedimentary rocks are classified in three types, which are inorganic, organic and chemical. All sedimentary rocks form from compaction and cementation. When rain falls down and breaks down existing rocks, this forms sediments which eventually are compacted and cemented together to form a clastic sedimentary rock.\nIn the rock cycle, sedimentary rocks are created after compaction and cementation. After sediment forms from weathering, erosion and deposition, sediment is created and compacted into a sedimentary rock.\nSiltstone is a sedimentary rock composed of silt and has a grain size of 0.006 to 0.004cm. Siltstone is often found in stream deposits and lake beds in Kansas. This rock has a color of grey, brown or reddish brown. Siltstone can form fossils by burial and cementation.\nConglomerate is another sedimentary rock. Conglomerate has rounded pebbles and has a beige, black or brown color to it. These rocks are found in streams and beaches with strong waves. This rock has coarse-grained sediments within fine grained.\nLimestone is a sedimentary rock composed of mainly of calcium carbonate in the form of mineral calcite. Skeletal fragments of marine organisms such as coral can be found in this rock. Limestone can be found in shallow water areas.\nThe map above shows where limestone can be found.\nThe map above shows where sedimentary rocks can be found in the U.S..\nIgneous rocks are another main rock type. Igneous rocks are formed by the cooling or solidification of magma or lava. The two types of igneous rocks are intrusive and extrusive. On the rock cycle, igneous rocks can be found after the crystallization of magma.\nThe red on the map represents where you can find igneous rocks in the U.S..\nIntrusive rocks are formed when magma cools slowly below Earth's surface. Intrusive rocks have large, well-formed crystals. Some examples of intrusive rocks are granite, gabbro and diorite.\nExtrusive rocks are formed when magma cools quickly above the Earth's surface. Most extrusive rocks have small crystals. Some examples of extrusive rocks are basalt, andesite and obsidian.\nGranite is a light colored igneous rock with large grains. This rock is composed of quartz and feldspar. Granite can be found in the continental plate of Earth's crust because it forms underground.\nGabbro is a coarse grained intrusive igneous rock. Gabbro is dark colored and consists of plagioclase and pyroxene. This rock can be found along mid-ocean ridges.\nObsidian is an extrusive igneous rock formed on the surface of Earth from cooled magma. This rock is a dark colored volcanic glass. Obsidian is composed of felsic lava.\nMetamorphic rocks are formed by extreme heat and pressure. Magma can cause any rock to form into a metamorphic rock. These rocks are classified by the texture which is foliated or nonfoliated. Some examples of metamorphic rocks are marble, schist and slate. In the rock cycle, metamorphic rocks are formed from heat and pressure of igneous or sedimentary rocks.\nMarble rock forms when limestone is exposed to heat and pressure. Marble is non-foliated and made up of very fine-grained mica.\nSchist is a foliated, course-grained metamorphic rock. This rock is composed of layers of different minerals.\nSlate is a fine-grained, foliated metamorphic rock composed of clay and volcanic ash. Slate is found where the continental crush is compacted.\nThe map above shows where you can find metamorphic rocks in the U.S..\nGeologists use rock hammers, hand lens and chisel-tip hammers. Rock hammers are used to split and break rocks. Hand lenses are used to help geologists identify rocks and see details. Chisel tip hammers are most often used for sedimentary rocks and fossils." ]
[ "<urn:uuid:174ff3de-8f44-49f7-a764-2bc11404dc7e>" ]
[ "CC-MAIN-2017-26" ]
[ "https://spark.adobe.com/page/vGkML02sBnRFc/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321536.20/warc/CC-MAIN-20170627185115-20170627205115-00406.warc.gz" ]
[ "en" ]
[ 0.9426276683807373 ]
[ 872 ]
[ 4.34375 ]
[ 4 ]
[ "|Building coastal resilience to reduce climate change impact in Thailand and Indonesia|\nLatest news and case studies from the Building Coastal Resilience to Climate Change Programme\nOther recent resources\nThe Thai language version of this report is coming soon.\nFor older newsletters and articles, see below\nIn heavily populated coastal areas of Thailand and Indonesia, high levels of erosion due to environmental degradation will be exacerbated by climate change impacts, such as rising sea levels and increased storm surge. The resulting intrusion of salt water into shallow fresh water areas will cause significant change to ecosystems and disrupt the livelihoods of those dependent upon them. Poor people in coastal areas are also exposed to increasingly frequent and severe weather events.\nIn response, Raks Thai Foundation and CARE Indonesia – in partnership with CARE Deutschland-Luxemburg (CARE DL) and PECCN – are implementing the 36-month ‘Building coastal resilience to reduce climate change impact in Southern Thailand and South Sulawesi, Indonesia’ (BCR-CC) project.\nThrough BCR-CC, CARE will work closely with coastal authorities and civil society organizations to progressively integrate climate change adaptation into sub-national development, environment and disaster risk reduction strategies and plans; and to design and implement innovative community-based adaptation activities that reduce risks from coastal hazards.\nThe project’ 2.1 million euro budget is funded through the European Commission’s Thematic Programme for Environment and Sustainable Management of Natural Resources Including Energy (ENRTP).\nWhat does climate change mean to us? - Impressions from a Monitoring visit in Southern Thailand\nStory from the Field: A fishing community takes own actions towards climate change resilience\nImpressions from CBA6: The Sixth International Conference on Community-Based Adaptation\nPublic Consultation process on climate challenges in Southern Sulawesi: Discussing CVCA findings\nInterview: BCR CC project supports the local government on development planning in coastal areas" ]
[ "<urn:uuid:2e18e240-5068-44e2-a475-c3a984a08d52>" ]
[ "CC-MAIN-2013-48" ]
[ "http://www.careclimatechange.org/adaptation-initiatives/bcr-cc" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052593/warc/CC-MAIN-20131204131732-00089-ip-10-33-133-15.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.8904502391815186 ]
[ 393 ]
[ 2.6875 ]
[ 3 ]
[ "31st March 2017 | International Solidarity Movement, Ramallah team | Madama, occupied Palestine\nThursday the 30th of March was Land Day, a day in which Palestinians and their supporters commemorate the loss of huge amounts of land, stolen by the Zionist colonisers in 1976. In Madama village, in the Nablus area, around 300 Palestinian activists with some internationals marched to the outskirts of their village to plant olive trees on village land which has been stolen by the extremist illegal settlement Yitzhar. This non-violent action came under heavy attack by the Israeli Forces with more than 45 people shot with rubber-coated metal bullets and many more suffering from tear gas inhalation.\nAt around 12pm the march set off from the centre of Madama with many people carrying flags and singing songs, including women, children and men. After climbing a steep street up onto the fields at the edge of the village people began to plant olive trees. There were Israeli Army vehicles and around 20 heavily armed soldiers waiting for the demonstration on the hillside. As people began to plant olive trees the soldiers started to shoot tear gas and rubber-coated metal bullets without any warning. Despite this repression, people continued to plant trees and a small group of people responded to the tear gas and rubber-coated metal bullets with stones.\nOver the next two hours or so, the Israeli forces became more and more aggressive firing rubber-coated metal bullets at anyone who was there, often at head height. If someone was injured and on the floor they would fire upon them again and at the people coming to rescue them, even if they were clearly marked as medics. According to the Red Crescent at least 45 people were injured by rubber-coated metal bullets throughout the demonstration. An activist from ISM was also shot with both a rubber-coated metal bullet and hit with a tear gas canister upon their lower legs whilst providing medical support to the injured.\nExtremist settlers from the illegal settlement of Yitzhar also came to attack the demonstration with stones. They were held off by the people of the demonstration and after talking to the army sat and watched the Israeli forces fire upon unarmed demonstrators.\nDespite this extreme repression of a group of unarmed demonstrators, people did not leave until all the trees were planted, demonstrating that this is their land and they will not be threatened into not using it.\nThe villages around the illegal Yitzhar settlement have suffered a huge amount since it was set up in 1983. The extremist inhabitants of this settlement regularly attack Palestinians with impunity, sometimes even killing them. They regularly intimidate Palestinians off their farm lands, attack buildings and lands in the local villages, throw stones at Palestinian cars, and, block roads, these attacks are done with the protection of the Israeli Army. Yitzhar is just one example of the over 196 illegal settlements built throughout the West Bank, supported by Israel, but deemed illegal by the international community." ]
[ "<urn:uuid:0f11b580-0108-44dd-918e-fba48b87064b>" ]
[ "CC-MAIN-2017-26" ]
[ "https://palsolidarity.org/2017/03/madama-village-marks-land-day-2017-many-people-shot/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320264.42/warc/CC-MAIN-20170624152159-20170624172159-00108.warc.gz" ]
[ "en" ]
[ 0.980534017086029 ]
[ 595 ]
[ 2.546875 ]
[ 3 ]
[ "Reverse Multiplication Tables- Find the Factors\nIn this reverse multiplication table worksheet, 3rd graders find the factors that correspond with the products that are given in 10 arrays. They place the factors in the top row and first column of the grids.\n3 Views 35 Downloads\nPatterns in the Multiplication Table\nExplore patterns in the multiplication table in order to deepen your third graders' understanding of this essential skill. Implement this activity as a whole-class lesson, allowing young scholars to work in pairs or small groups to...\n3rd - 4th Math CCSS: Designed\nNumbers in a Multiplication Table\nIdentifying patterns is a crucial skill for all mathematicians, young and old. Explore the multiplication table with your class, using patterns and symmetry to teach about square numbers, prime numbers, and the commutative and identity...\n3rd - 5th Math CCSS: Designed\nNew Review Reasoning About Multiplication and Area\nHow are area and multiplication related? It turns out that they are one in the same. Use a performance task to assess third grader's ability to reason about area using tiling and multiplication. They must demonstrate their ability to...\n3rd Math CCSS: Designed\nFind Missing Elements in Growing Patterns\nCombine prior learning about function rules and shape patterns in the third video of this nine-part series. Given a sequence of numbers, tables are used to identify and extend patterns in order to determine specific missing elements....\n6 mins 3rd - 5th Math CCSS: Designed" ]
[ "<urn:uuid:ddcb079b-50cb-440d-9477-ba263da14eeb>" ]
[ "CC-MAIN-2017-30" ]
[ "https://www.lessonplanet.com/teachers/reverse-multiplication-tables-find-the-factors" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500550969387.94/warc/CC-MAIN-20170728143709-20170728163709-00601.warc.gz" ]
[ "en" ]
[ 0.9015276432037354 ]
[ 318 ]
[ 4.3125 ]
[ 4 ]
[ "It is difficult for us to truly wrap our heads around how long the process of our evolution has taken. One of the most interesting methods of demonstrating this visually is to take a page out of Carl Sagan’s book and compare it to a calendar year.\nIf we say that the earliest hominids (who would eventually become humans) left the forest on January 1st at 12:00 am, the first Homo sapiens (that’s us!) didn’t arrive until December 23rd almost a full year later. And we didn’t develop agriculture until 1:03 pm on December 31st.\nOur modern society accounts for approximately the last 30 seconds of this evolutionary calendar yet so much of our current culture has been created during this time. The way we live is, in many ways, in stark contrast to the way we evolved to live, which has introduced numerous problems.\nIn this article, we’ll go over two of the ways we’ve changed over this last brief period of our timeline, and how to return to our evolutionary norms.\nDiurnal Sleep Schedule vs. 24-hour Lifestyle\nHumans are diurnal creatures. For thousands of years, we existed by sleeping at night and conducting whatever business needed conducting during the day. The vast majority of the reasons behind this, however, are no longer things we need concern ourselves with.\nWhether a species evolves to be nocturnal or diurnal is usually forced upon it by environmental factors. Humans fared better in the light of the day; we’re large creatures, so hiding from predators during the day was more difficult, and our eyes were well suited for seeing in the light.\nWhile technology has eliminated many of the environmental reasons for us being diurnal, we existed that way for long enough that our bodies evolved to need nighttime sleep. Because we’ve been diurnal for the vast majority of our evolutionary history, our brains have evolved to begin releasing a hormone called melatonin when light levels dip.\nToday, we surround ourselves with artificial light up until the moment we go to sleep. As a result, our bodies may not generate the melatonin necessary for fulfilling sleep. Even when we do turn down the lights, we often stare into our brightly lit phone screens, ironically waiting for sleep’s tender embrace while scaring it away.\nBut there are ways to correct this. Let’s start with the simplest way to hack your biology and get a better night’s sleep turn off ALL of the lights.\nOnce we understand that our bodies respond to reduced light we can make the logical choice to reduce the lighting. Start by putting down your phone. Staring at a phone or computer screen in an otherwise dark room is especially disruptive to your sleep cycle, so give yourself a rule that if the lights are off, your screens are off too.\nIf you have a TV in your bedroom, take it out. Charge your phone in another room, or at the other end of the bedroom, so you’re not tempted to look at it. Small changes like this can make a big difference in how we feel when it’s time to wake up in the morning.\nTake things further by embracing a no-screens rule for at least an 90 minutes before bedtime. Instead of watching TV or scrolling through your phone, try working on a (screen-free) hobby, meditating, or reading a book (good old-fashioned books are best, but we’ll allow an exception for front-lit e-readers since they don’t affect your eyes and brain the way a backlit screen does).\nThis will give your body time to ramp up its melatonin production without the disruption of a glowing screen, and you’ll find yourself naturally more ready for sleep when the time comes.\nHunter Gatherer vs. The Corporate Feeding Trough\nMuch like our sleep cycle, the diet our bodies expect has evolved over millions of years. For the vast majority of our species existence, we sustained ourselves on foraged roots and berries, and meats we were able to hunt. Our bodies evolved to process and make use of these types of food.\nIn the past century, however, the foods made available have changed drastically. Corporations, whose sole purpose is to turn a profit, now provide our foods. Foods are pumped full of preservatives in order to lengthen shelf life, and filled with sugars and salt to make them downright addictive to a large portion of the population.\nAs a result, our bodies are unable to process a lot of the ingredients in these new foods, which causes us to lose out on necessary nutrients. We fill up on high calorie, low nutritional value foods, and out bodies are forced to figure out what to do with all of the excess calories while still feeling like it’s deprived of the nutrients it needs.\nThis dietary chaos has brought on a huge rise in food-related medical conditions, such as diabetes and heart disease. As a comparison, studies of the few remaining hunter/gatherer tribes discovered that these people don’t traditionally develop these increasingly common ailments.\nThe Next Evolution: Where to Go from Here\nAgain, the solution is deceptively simple. Go back to eating what we were designed to eat.\nThat’s not saying you should start eating only what you can scavenge from the local park, though that methodology has seen some success. Rather, we should start preparing our foods from the simplest ingredients possible. Start slow, beginning with a couple of meals each week prepared with whole cuts of meat and fresh, seasonal produce.\nKeep the ingredients varied. In our past, we’d migrate with the seasons, and have a wide variety of foods as we moved. Before long, you’ll be ready to expand to having these types of meals more often than not, and your body will thank you.\nNobody’s advocating that we abandon all of the benefits of modern living and go back to living in the forests. But we should all respect our history as a species, and make a conscious effort to stay connected to those roots despite the modern cultural norms surrounding us.\nMaking small changes around your sleep and eating habits, based upon a deeper understanding of where we came from as a species, can help us regain some of the energy and healthfulness that we’ve lost." ]
[ "<urn:uuid:15cd951e-efda-4cbf-abf2-90047df84e95>" ]
[ "CC-MAIN-2023-14" ]
[ "https://clearimpact.io/two-ways-odds-biology-set-things-right/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943746.73/warc/CC-MAIN-20230321193811-20230321223811-00161.warc.gz" ]
[ "en" ]
[ 0.951312780380249 ]
[ 1310 ]
[ 3.515625 ]
[ 4 ]
[ "The electoral college will meet on 14 December 2020 and vote. They are widely expected to deliver a result showing Biden has won the election.\nHowever, individual states may have their Electoral College Certificate of Vote challenged when Congress meets in Joint Session to count the electoral votes cast for President and Vice President on 6 Jan 2021. This will be the newly elected Senate and House of Representatives, following the 2020 election.\nA \"formal objection\" must be made in writing and be signed by at least one Senator and one member of the House of Representatives, per the provisions of 3 U.S.C. §15.\nIn 1969, a challenge was made to attempt to overturn a vote of a faithless elector. In 2005, Representative Stephanie Tubbs Jones of Ohio and Senator Barbara Boxer of California objected to Ohio's electoral votes, alleging \"widespread irregularities\". Neither of these challenges succeeded.\nAn objection was also attempted in 2016 by a member of the House, but no Senator signed on.\nWill the results of the Electoral College be formally challenged in the House in 2021?\nThis question resolves positively if at least one formal objection to the 2020 electoral college vote is made in writing and signed by at least one Senator and one member of the House of Representatives, per credible media reporting. (Note that the objection does not need to succeed to count for positive resolution.)\nThis question resolves negatively if no such objection is made.\nThis question resolves ambiguously if the certification is not held by 6 Jan 2021. If somehow an objection is made after 6 Jan 2021 but the certification has taken place, the objection will not count for the purposes of this question and the objection will not affect resolution.\nIf an objection is made, this question will close retroactively to 24 hours before the date of the objection." ]
[ "<urn:uuid:80364952-c4c0-48f6-b0bd-cc2aa23a5b66>" ]
[ "CC-MAIN-2023-14" ]
[ "https://www.metaculus.com/questions/5844/electoral-college-results-challenged/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943471.24/warc/CC-MAIN-20230320083513-20230320113513-00567.warc.gz" ]
[ "en" ]
[ 0.973175585269928 ]
[ 363 ]
[ 2.515625 ]
[ 3 ]
[ "Telomeres are the Key to Longevity\nIn the heart or nucleus of a cell, your genes can be found on twisted, double-stranded molecules of DNA called chromosomes. On the very ends of the chromosomes are stretches of DNA called Telomeres. Telomeres are sections of genetic material at the end of each chromosome whose primary function is to prevent chromosomal “fraying” when a cell replicates. They also carry some secret knowledge of the way we age on a cellular level. To put it simply, Telomeres are like the plastic tip covers on shoelaces because they prevent chromosome ends from tearing, fraying and adhering to each other.\nOrthomolecular Nutrition and Wellness Center now offers a Telomere Test that can determine the length of a patient’s Telomeres in relation to the patient’s age.\nAs a cell ages, it divides and the Telomeres get shorter. When the Telomeres get too short, the cell will no longer be able to divide, therefore, it will cease to be active and ultimately the cell will die. This is part of a normal biological aging process. Unfortunately, it can also lead to cancer, disease and can put you at a higher risk for premature death. Much like a pencil eraser gets shorter each time it’s used; Telomeres get shorter each time a cell divides. Telomeres are like little dynamite fuses within our own bodies.\nIn addition, when the Telomere becomes too short, essential parts of the DNA can be damaged in the replication process. It’s at that point that scientists have noticed cells stop replicating. In humans, on average, a cell can replicate about 50 times before the Telomere becomes too short.\nTelomere length can affect the aging process. Research has found that when individuals were divided into two groups according to the lengths of their Telomeres, the group with longer Telomeres lived on average five more years then those in the group with the shorter Telomeres. This study, along with others like it, suggests that a person’s lifetime span may directly correlate with longer Telomere lengths.\nWhen a patient takes one of our Telomere Tests, they will receive a report which details their Telomere Score. This is calculated by looking at the patient’s average Telomere length in peripheral whole blood cells. This average is then compared to Telomere lengths from a population sample of the same age range of people to determine the patient’s Percentile Score. From these figures, we then can figure out a person’s biological age.\nThese results are telling and significant to both the practitioner and the patient. To date, age adjusted Telomere length is the best method to assess biological aging using structural analysis of chromosomal change in the Telomere. Orthomolecular Nutrition and Wellness Center offers a specified protocol with specialized therapies, as well as helpful lifestyle modifications and counseling which are all directed at slowing the loss of Telomere length. In turn, these adjustments can slow the aging process and potentially prevent a host of age-related diseases and premature death.\nOrthomolecular Nutrition and Wellness Center recommends a patient be tested once a year. The first Telomere Test will determine where the patient is on the biological age spectrum. If the test comes back with a less than desirable outcome, Orthomolecular Nutrition and Wellness Center’s qualified practitioners will offer specific counseling geared towards each patient’s situation. Once the patient’s specific protocol has been developed, they can begin to enact those changes to their lifestyle right away, thus, beginning the process of healing their body from the inside-out. We suggest that the patient comes back for follow up visits with the practitioner every three to four months to go over these modifications, answer any questions they may have and to discuss any concerns. We feel the optimal time to be retested is one year after the first test, with annual tests to follow. It is not unusual to see optimal differences in Telomere lengths after these changes and modifications have been made to a person’s life.\nA big part of the protocol specifically designed for each patient at Orthomolecular Nutrition and Wellness Center is based on nutritional supplementation in the form of our own high quality line of pharmaceutical and physician grade oral supplements, as well as IV Nutrition Therapy. Studies show that oxidative stress will shorten Telomere lengths and cause aging in cellular tissue. Antioxidant supplements can potentially reduce oxidative stress very efficiently. With the right (“Ortho”) amounts, increasing antioxidant capacity, at the cellular level, through targeted supplementation, proves critical to maintaining Telomere length. Recent evidence suggests that a high quality, balanced multi-vitamin will also help maintain Telomere length. Specifically, studies have linked longer Telomeres with levels of Vitamin E, Vitamin C, Vitamin D, Omega-3 Fatty Acids and Antioxidants, such as Resveratrol and Glutathione. In addition, homocysteine levels have been inversely associated with Telomere length, suggesting that reducing homocysteine levels via Folate and Vitamin B supplementation may decrease the rate of Telomere loss. Similarly, conditions such as cardiovascular disease, insulin resistance, diabetes, hypertension, atherosclerosis and even dementia affect Telomere length. Correcting subclinical nutritional deficiencies that may contribute to such diseases are crucial for Telomere maintenance.\nOrthomolecular Nutrition & Wellness Center offers a lifestyle and supplement protocol that will greatly reduce factors that attribute to the shortening of Telomeres, hence positively affecting your biological age. Call today to set up an appointment to get your Telomere Length Test and find out your biological age! Call 727-518-9808 or go to www.OrthoLiving.comfor more details." ]
[ "<urn:uuid:3f1b7b9f-7c84-4912-8eb1-c983c4b48e3f>" ]
[ "CC-MAIN-2017-30" ]
[ "http://www.orthomolecularnutrition.net/services/evaluation-testing-consultation/telomere-testing" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424945.18/warc/CC-MAIN-20170725002242-20170725022242-00515.warc.gz" ]
[ "en" ]
[ 0.9225980043411255 ]
[ 1226 ]
[ 3.625 ]
[ 4 ]
[ "I have to tell you, I really like Christian Kids Explore Chemistry. The next time we come to third grade Chemistry I would start out with Unit 1 of CKEC. It has 5 lessons covering:\n- Intro to Chemistry\n- Chemistry Tools\n- Elements (11 common)\n- Mixtures and Compounds\n- Solids and Liquids\n- Gas Laws\n- State Change\nThis is the main Chemistry text for third grade science. WTM encourages purchasing book 1 and 2 in this series for third grade. But in Bauer's own words, \"Even if she only completes the 30 experiments in Book I, she'll know more chemistry than 98 percent of American third graders.\" (WTM, p 173) This is a VERY EASY book to use, parent and child-friendly and not intimidating for those who don't love or know Chemistry themselves.\nIt is used in conjunction with one of these science encyclopedias. The The Usborne Internet-Linked First Encyclopedia of Science\nis a more elementary book suitable for this age group. The internet-linking information is really excellent for today's students. As a mom, I appreciate being able to let them continue their interest in a topic without leaving the house for the library. With the internet linking included in most of Usborne's encyclopedia, your student can research further while you continue school with a sibling. However, you are going to need the The Kingfisher Science Encyclopedia anyway as your student gets older, so my thinking is go ahead and get it now.\n-bought a bin to store it all in\n-specifically bought household things (like salt, ziplock bags, chalk, vinegar, etc) that I didn't already have doubles of because I wanted to ensure that I didn't (Murphy's Law) run out of something on experiment day.\n-I saved some money by using glass jam jars instead of buying something similar\nSee left sidebar for full list of materials needed.\nChemistry was something I 'got through' in high school. But this book was so engaging and interesting, and so clearly laid out the development of modern Chemistry, that I was unwilling to put it down. It is written in a conversational tone, and speaks directly to the reader. It makes the early alchemists and the later chemists into real people with real investigative passions.\nThere were two things that I really appreciated from this book which sort of surprised me: First, it was made evident that an intelligence was behind the elements. The book points out many ways that Chemistry is orderly, exact and not accidental. He doesn't say, \"God invented the elements and their properties\" but he has at least three paragraphs full of exclamation points and sentences which express wonder at the perfection that the chemists were astounded to find.\nSecond, the author repeatedly describes how the chemist had the wrong idea but experimented the right way; or he had just the right idea, but made the wrong conclusion. I found these instances very encouraging, especially for the young scientist, because it explains that trial and error is a crucial part of finding out facts of science. I don't want my kids to research a question, make a hypothesis, do an experiment, get an unexpected result, and count it a total failure.\nThe author also goes into some effort to show how the chemists of days past stumbled in a group effort spanning centuries to come to what is presently known as the Periodic Table. Until I read The Mystery of the Periodic Table, I thought that it was just a reference guide, and now I know it is a historical, methodical, even beautiful and interesting diagram.\nI plan on reading this book to my third grader at the beginning of her first study of Chemistry. Then, when we cycle back to Chemistry in seventh grade, she can read it on her own. I think it is an excellent value. I know of no other product like it that includes all the chemists and their experiments, sketches of their apparati, and how they worked off each other's contributions and change each others outlooks. It includes updates up to almost present day. It is an excellent explanation of many basic chemical elements; a few experiments; entirely comprised of biographies; easily God-glorifying; written in an exciting manner which carries the reader along.\nTeresa (Tracy) Dear" ]
[ "<urn:uuid:963b35ef-d772-4e4c-92ce-66cb5b295143>" ]
[ "CC-MAIN-2017-26" ]
[ "http://classicalcurriculum.blogspot.com/2009/08/adventures-with-atoms-molecules.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319992.22/warc/CC-MAIN-20170623031127-20170623051127-00628.warc.gz" ]
[ "en" ]
[ 0.9683566689491272 ]
[ 892 ]
[ 3.515625 ]
[ 4 ]
[ "Today, Ryedale Against Fracking and others are protesting in London to support the Friends of the Earth case against North Yorkshire County Council’s approval of the Third Energy project to use fracking on a twenty year old current “conventional” gas well pad.\nThey started with a demonstration outside chanting “No Fracking in North Yorkshire. No Fracking Anywhere”\nAlthough some protestors are evidently merely selfish, content to displace gas production to others while happy to ignore their own consumption, there are others who see more natural gas production as part of a wider issue that makes it harmful for climate change.\nOne view is that as the UK is removing coal from electricity generation anyway, the arguments over gas a bridge fuel are somehow irrelevant. Apart from ignoring how gas is over 50% of the UK power mix and 90% of heat demand, protestors don’t understand the global implications of even a UK ban on fracking. Slogans like “Take Back Control”, “Make America Great Again” or “No Fracking Anywhere” sound simple but in practice deliver little else except a brief frisson of good feelings. The reality is that it’s complicated.\nWhat is simple is that global warming has a global cause, and the number one cause is coal.\nChina has by far the highest CO2 emissions in the world, with more than one quarter of global emissions. Most of it comes from coal. China both produces and burns more coal than the rest of the world combined.\nChina coal consumption has at least reached a plateau, if not a peak. It’s done this via an “all of the above” solution of efficiency, increasing urbanisation, nuclear, renewables and increased gas use. Increased gas use depends on increased LNG imports from the world market.\nAs the UK North Sea declines, we may see 70% or more of UK gas imported by the 2020’s. Whether or not the UK then decarbonises the power market, the UK will continue to import the third of gas used for heating and the third used in industry. Both of these sectors have already made, and will continue to make, great efficiency gains. Nevertheless, the UK will still need some gas. Clearly if we do use gas and don’t produce (or even explore for) any UK onshore resources, the country will have to compete in global markets.\nThat will inevitably put up the price of gas, which may be of little consequence to the well-off retired people of North Yorkshire. It wouldn’t be unwelcome among gas producers as far away as the US, Russia, or Qatar either. The UK is such a small consumer that it won’t have a huge impact, but since the EU is one of the three key areas of gas demand along with Asia and the USA and doesn’t have much onshore production, a UK ban would have an impact greater than it might ordinarily have. The UK gas consumer thus punches above their weight.\nLeaving gas in the ground in Europe, or anywhere, puts up the price of gas for would be energy consumers anywhere. The price of gas is of declining importance in China as pollution concerns become more pressing. But there are plenty of places where emerging electricity demand has two simple choices: coal or no energy at all. One example is Sri Lanka.\n“In our energy sector, LNG-generated power plants are going to be the next futuristic power generation option. In order to bridge the gap of our energy supplies, we want to move away from coal to LNG. There is a high priority being given to that”\n“We have already identified two 300MW LNG-generated power plants that we plan to rollout. We are now projecting our power requirements for the next 20 to 30 years; we need to quickly move on to some energy options, which have less impact on the environment and LNG is one of those options,” Hakeem told Gulf Times on the sidelines of an investment forum hosted by Doha Bank yesterday. As a matter of policy, Hakeem said, government is now moving away from thermal power to LNG, adding that Sri Lanka’s coal-fired power plants “have created a lot of environmental issues” for the local community.\nSri Lanka has the gas option because of the low price of LNG on world markets thanks to the abundance of gas production engendered by fracking, currently 70% of US production.\nThis is just one example. Another could be thinking different about our backyards to help the global backyard. My LLE project has spoken about a possible swap of UK gas production that will enable any actual UK production to be virtually priced on Asian LNG hubs so that one South East Asian mega city can afford to build a new power plant using natural gas instead of the coal alternative they are also studying. I won’t say more except to say that many natives of the city already help and work Londoners via our National Health Service.\nDespite those who want to protect their backyard, we are in a global community. North Yorkshire may feel that they can take back control and stop that trend. No fracking anywhere doesn’t help the earth. It hurts it." ]
[ "<urn:uuid:14227f6c-ef3e-42ad-9e56-5f17d3b53041>" ]
[ "CC-MAIN-2017-26" ]
[ "http://www.reimaginegas.com/?p=3877" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323711.85/warc/CC-MAIN-20170628153051-20170628173051-00195.warc.gz" ]
[ "en" ]
[ 0.9385220408439636 ]
[ 1082 ]
[ 2.53125 ]
[ 3 ]
[ "By Symi Rom-Rymer\nIn an East German archive, three reels of silent film lay untouched and forgotten amid the chaos of World War II and its Communist aftermath. 40 years later, on an American airbase, a British film historian came across these reels simply titled, “Das Ghetto.” The deceptively simple name, however, belied the power of its contents.\nAs we quickly learn in A Film Unfinished, the recently released documentary about the making of “The Ghetto” by Israeli filmmaker Yael Hersonsky, “The Ghetto” refers to the Warsaw ghetto and the three reels of film are the missing companions to a fourth reel–discovered in the early 1960s. Until recently, that single reel was used by historians and Holocaust museums as an accurate account of the Jewish ghetto experience. (One might wonder why this was accepted as truth when it is doubtful that Jews would have access to camera, never mind the freedom to openly film their lives, but that is the subject for another post). Together, these four short films were the raw footage—shot in May of 1942–for a planned Nazi propaganda movie. The film was never completed and it is unlikely we will ever learn how the Nazis intended to use the material.\nHersonsky’s documentary is the first to examine the film in its entirety and to present a more accurate picture of its filming of the movie as well as of life in the Warsaw ghetto. The 63 minute work serves as the backbone of her film into which she intersperses three key organizing elements: poignant commentary from survivors of the ghetto watching the film for the first time, a reenactment of an interview between Willi Weis, one of the cameramen of the Nazi film, and an unnamed interrogator, and excerpts from diaries by Adam Cherniakov–head of the Warsaw ghetto Jewish Council–and Emanuel Ringleblum–the ghetto’s unofficial historian–about the making of the movie.\nHersonsky’s self-defined objective was to recontextualize the Nazi film before the last of the survivors die and leave future scholars unable to separate fact from fiction. Her painstaking process of peeling back the layers of misconceptions that surround the film and its subjects is thorough and crucial. But what makes this film more than just an educational aide, is how it challenges its audience to examine its own preconceptions of ghetto survival. Now that we know the circumstances of the making “Das Ghetto,” it would be easy to paint all of the scenes as clearly staged. But the film, perhaps unconsciously, also forces its audience to accept some hard truths about life in the ghetto–namely that for many imprisoned there, they lived as best they could. One scene depicts, for example, a group of young, attractive men and women smiling as they sunbathe in a patch of dirt. Without context, it would be easy to assume that this was staged, but in fact scenes like this did occur, even outside of the range of Nazi cameras. As one of the survivors commented as she watched, people were still concerned about how they looked even in the midst of all of the chaos and brutality around them. It was a way to maintain their humanity, their sense of self. Another scene showed a well-dressed woman ignoring beggar children on the street. Although we might chalk this, too, up to Nazi propaganda, another survivor simply offered the explanation that without this act of self-preservation, one could not survive. Later, as this same survivor cried as she watched two corpses lie untended on the sidewalk while saying that she was so happy that she could cry as she watched the frame. Her crying made her human, she said, something that she could not succumb to while living in the ghetto.\nWhen we view the Holocaust today, it is easy to see its victims in broad strokes of black and white. The primary goal of A Film Unfinished was to properly contextualize the subjects of the Nazi footage and to further demonstrate the chilling reach of the Nazi propaganda machine. But this film also succeeds in the far more difficult task. It offers its audience a glimpse of the shades of gray that hover, often ignored, just beneath the surface.\nSymi Rom-Rymer writes and blogs about Jewish and Muslim communities in the US and Europe. She has been published in JTA, The Christian Science Monitor and Jewcy.\nOne thought on “A Film Unfinished”\nThanks to everyone who makes an effort to open a window to the tormented past. Any small piece of factual history evidenced by those film adds to the broad picture of that time and helps us living to find the right perspective of what we all experience in the contemporary world." ]
[ "<urn:uuid:e7dffe45-e6a2-42de-b640-76a2290c3d69>" ]
[ "CC-MAIN-2023-14" ]
[ "https://dev.momentmag.com/a-film-unfinished/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950373.88/warc/CC-MAIN-20230402012805-20230402042805-00761.warc.gz" ]
[ "en" ]
[ 0.9712772965431213 ]
[ 982 ]
[ 2.828125 ]
[ 3 ]
[ "“Perhaps few actors have enjoyed such a cult following as the great Lon Chaney, whose remarkable makeup and acting skills have inspired generations of film lovers. I am pleased to present this article from my blog, Silent-ology, on the life and career of a man who became a legend in his own time. –Lea Stans”\n# # # # #\nLon Chaney, Hollywood’s Finest Character Actor\nPer a reader’s request, here is a piece on one of the greatest and most respected silent film legends–Lon Chaney. As you read this, I am currently at the San Francisco Silent Film Festival–and yes, I’ll be recapping every moment of it!\nThere was a popular, widespread joke back in the 1920s–“Don’t step on that spider, it might be Lon Chaney!” A joke which, of course, referred to his remarkable use of makeup and acting skills to create bizarre characters who stick in the popular imagination. Indeed, Chaney was one of the rare actors who was so skilled that he became a legend in his own time, graced with the title “The Man of a Thousand Faces”–a title which is linked with his name to this very day.\nHis birth name was Leonidas Frank Chaney, and he was born in Colorado Springs on April 1, 1883. His parents, Frank and Emma, were both deaf and mute. They had met at the Colorado School for the Education of Mutes, which had been founded by Chaney’s grandfather. Being the child of parents who couldn’t hear or speak, Chaney became adept at pantomime, which proved a useful training ground for his career–not only because of the pantomime used in early films, but because it made him more in tune with facial expressions and subtle gestures. When Chaney’s mother fell ill and developed rheumatism in her hands, she and Chaney reportedly would communicate only with their eyes.\nAs a young man Chaney quickly became set on having a stage career, and in 1902 he began working in vaudeville. He enjoyed a variety of stage roles and would also assist with Universalcostumes, makeup and choreography. In 1905 he married stage singer Cleva Creighton, and on February 10, 1906, their son Creighton Tull Chaney was born (he would one day go by Lon Chaney Jr.). It’s said that little Creighton was born premature and not breathing and that Lon, not knowing what else to do, rushed outside into the cold, knocked a hole in the ice of a lake and dunked the infant in the water, shocking him back to life.\nUnfortunately, the marriage proved to be an unhappy one, involving jealousy and Cleva’s growing drinking problem. In April 1913 the Chaneys were in Los Angeles where Lon was working at the Majestic Theater. One day Cleva went to the theater, stood in the wings and attempted suicide by drinking mercuric chloride. While this dark, dramatic gesture didn’t claim her life, it did destroy her singing voice and caused a scandal that essentially put an end to Chaney’s theatrical career. He would divorce Cleva and take custody of his son, and with his stage options now closed, he had no choice but to fall back on a less lofty line of work–acting in motion pictures. (At least, it was less lofty back in 1913.)\nHe became an extra at Universal, partly because of his skill with makeup, and soon proved himself to be a reliable supporting actor. His earliest role that we can confirm was in Poor Jake’s Demise (1913), starring comedians Max Asher and Louise Fazenda. In 1914 he would remarry a woman named Hazel Hastings, and it would be a happy and lasting union.\nOver the next few years, Chaney appeared in dozens and dozens of films, playing a wide variety of characters and often specializing in villains–an easy fit for a man with the square-jawed, rough-hewn face of a boxer or a steelworker. He grew deeply interested in creating detailed makeup effects and would photograph his various experiments to pinpoint what would be convincing onscreen. He kept his various greasepaints and other tools of transformation in a simple lunchbox–one day he would use a toolbox.\nChaney attracted attention as the villain Hame Bozzam in William S. Hart’s western Riddle Gawne (1918), but he got his breakthrough role in the drama The Miracle Man (1919). Chaney played a contortionist nicknamed “The Frog” who’s part of a gang that moves to a small town to escape the police. They discover that a faith healer has much of the town in thrall. They decide to scam the townspeople by having The Frog pose as a cripple and pretend to be miraculously healed and then use the resulting excitement to collect funds–supposedly for a chapel. But their plans go awry when a little boy really does experience a miraculous healing, and the gang’s, shall we say, “faith in fakery” is shaken.\nSadly, much of this intriguing The Miracle Man is lost, but luckily surviving clips show The Frog experiencing his “miraculous” healing. Chaney’s exceptional use of jerky body language to convey crippled limbs becoming straight is so convincing that to this day many people believe he was double-jointed, or at least knew how to dislocate his shoulders–not so. The performance put Chaney on the map as an exceptional and in-demand character actor.\nPicture-Play Magazine interviewed Chaney in 1920, and the writer noted with some surprise:\nThe longer I talked with Lon Chaney the more paradoxical he proved to be. I had expected to find he was a circus contortionist or, at least, a veteran character actor. He is merely a talented young man with a hobby for cooking, painting, wood carving, modeling in clay, and in grease paint. He contradicts all notions of what an actor and villain should be…Acting to him means the creation of a man, whereas most of our favorite actors portray their personalities as pigment, Chaney, like the artist of sculpting or painting, creates from an imaginative model which has nothing to do with himself.\nThis would prove to be a rare peek into Chaney’s home life. Soon he would shy away from interviews and steer clear of Hollywood social events, preferring to keep the focus on his characters. He would once say: “My whole career has been devoted to keeping people from knowing me. It has taken me years to build up a mystery surrounding myself, which is my stock in trade.”\nThe Penalty (1920) is a fascinating example of his commitment to that stock in trade. Chaney plays a criminal whose legs were unnecessarily amputated above the knee after a childhood accident, and who finally decides to take revenge on the doctor. Chaney tied his legs back with special harnesses and walked on his kneecaps to portray the amputee, which was so painful that he could only act for ten minutes at a time. Originally, the film included a shot at the end of Chaney walking down a staircase–to prove the actor did have normal legs.\nHis fame only increased with The Hunchback of Notre Dame (1923), a huge hit that featured his most extreme makeup. As the grotesquely deformed Quasimodo, Chaney used layers of cotton and colodium on his face and sported fake teeth and a 20-lb hump on his back, all of which took three hours to put together. He also used a brace to keep himself in a hunched-over position special contact lenses and (in the 1920s these would’ve been made of glass). He was paid the generous salary of $2500 a week–a big achievement for someone who, in his early Universal days, was once told he would never be worth more than $100 a week.\nOther iconic roles included the circus clown HE in He Who Gets Slapped (1924), the first film to begin production with the newly-formed MGM studio; Sergeant O’Hara in Tell It to the Marines (1926), which earned Chaney an honorary membership in the U.S. Marine Corps; and, of course, the titular Phantom of The Phantom of the Opera (1925). Chaney’s elaborate makeup was kept a complete secret, for maximum screen effect. Not only did the famous unmasking scene scare the daylights out of countless audiences (publicity stories claimed some people fainted), but it seems to have stuck in their minds long after other movie memories had faded. Even decades later, old-timers would recall their childhood terror of first seeing that ghastly face.\nChaney’s other iconic role is one we haven’t even seen–the ghoulish character from the thoroughly lost London After Midnight (1927). With his pointed teeth, long hair, and top hat, Chaney was the embodiment of many a Halloween haunted house decoration. Although it’s one of the most sought-after silent films (despite getting lackluster reviews in its own day), London After Midnight, unfortunately, shows no signs of turning up.\nTod Browning’s The Unknown is not only one of Chaney’s bizarre best but it also contains one of the rawest moments of horror in cinematic history. (SPOILERS at the end of this paragraph.) Chaney is Alonzo the Armless, a performer who secretly binds his arms to pose as a circus freak with a knife-throwing act (he keeps his hands out of sight so his double thumb can’t identify him as a former criminal). He falls hard for beautiful Nanon, a fellow performer who has a phobia of men’s arms and can’t stand being touched by them. But she’s comfortable around Alonzo, and he’s so head-over-heels in love that he decides to go through an unbelievably extreme act of devotion–have his arms amputated so they can be together. Unfortunately, his rival, the strongman, is able to overcome Nanon’s phobia and Alonzo finds out too late that he’s had his arms amputated for nothing–a truly horrifying moment of realization that Chaney plays to the hilt.\nChaney wasn’t enthused about the advent of talkies, feeling that if audiences heard his voice it would destroy his mystique. Eventually, he was talked into appearing in the crime drama The Unholy Three (1930), playing the ventriloquist Echo–and giving a solid performance. But sadly, it would be his final film. Lung cancer, which he had been secretly enduring for some time, finally claimed his life on August 26, 1930, after he began hemorrhaging uncontrollably. The news he had been taken to the hospital had moved countless fans to call the studio offering to donate blood, and the news of his death shocked both the public and the industry alike.\nFortunately, Chaney’s elaborate makeups were not doomed to obscurity. Today he continues to awe and inspire, one of the rare actors whose work is considered untouchable. And it’s moved some of his fans to declare, “Lon Chaney Shall Not Die!”\nHowe, Herbert. “A Miracle Man of Makeup.” Picture-Play Magazine, March, 1920.\nGebhart, Myrtle. “The Last of Mr. Chaney.” Picture-Play Magazine, September, 1930.\nEverson, William K. American Silent Film. New York: Da Capo Press, 1998.\nKoszarski, Richard. The Age of the Silent Feature Picture, 1915-1928. Berkeley and Los Angeles: University of California Press, 1990.\n“Chaney Dies As Fan Thousands Swamp Phone; Scores Offer Blood.” Variety, August 27, 1930.\nI highly recommend this classic documentary on Chaney’s life–another important source for this article!\n# # # # #\nSpecial Thanks to\nLea Stans and her blog ‘Silent-ology‘.\n~ ~ ~ ~ ~" ]
[ "<urn:uuid:6b0ac88d-ddb4-417b-8ac0-d4f693aea88e>" ]
[ "CC-MAIN-2023-14" ]
[ "https://vaudevisuals.com/lon-chaney-guest-blogger-lea-stans-from-silent-ology/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945289.9/warc/CC-MAIN-20230324211121-20230325001121-00766.warc.gz" ]
[ "en" ]
[ 0.9754335880279541 ]
[ 2683 ]
[ 2.59375 ]
[ 3 ]
[ "Wasan Saladdin Jema\nWasan Saladdin Jema\nGovernor General’s Gold Medal\nAll graduate students overcome obstacles to complete their degrees, but for Wasan Jema, those obstacles included a dangerous visit to Iraq.\nJema’s studies took her from Calgary to her home country to meet with research partners to build an assessment framework for ecosystem restoration of the Mesopotamian Marshlands – considered by some to be the location of the biblical Garden of Eden. The research was part of her Royal Roads’ Master of Science in Environment and Management studies.\n“Iraq is a war-torn country which has undergone a series of conflicts. I witnessed most of them,” she says.\n“I also witnessed two massive environmental disasters that were each caused by a single irrational decision maker – Saddam Hussein and Muammar Gaddafi. I witnessed the first when Saddam Hussein drained 90% of the Mesopotamian marshlands in order to suppress people involved in the rebellion against him who were hiding there. And Gaddafi’s manmade river project unnecessarily depleted the aquifers under the Sahara.”\nA microbiologist with 10 years’ teaching experience, first as a lab instructor at the University of Bagdad and as a lecturer in the School of Medicine at Elmergib University in Libya, Jema says the ecological devastation of her homeland was the motivation for her master’s research.\nRoyal Roads will recognize Jema’s work with a Governor General’s Gold Medal for the most outstanding thesis or graduate project at the university’s fall convocation ceremony Nov. 10.\n“To undertake this internationally important social-ecological study in a country that was literally falling apart around her is an immense achievement and can be extremely valuable for people in Iraq doing this kind of research,” Ling says.\nWith research participants displaced by the conflict, and infrastructure and Internet disrupted, communication and travel was not only difficult, but dangerous, Jema says.\n“The flow of danger from Mosul and lack of security went directly all over Iraq during the ISIS invasion. The security picture changed even in my area of Bagdad, and the bad situation generally in Iraq prevented me from even going outside. I was with my son and it was completely unsafe to go out.”\nBeyond the immediate need for personal safety, Jema was also aware of the needs of her research participants.\n“I needed to be aware of their religious or cultural affiliations and their points of view. Their privacy and anonymity was important for their safety,” Jema says.\nJema’s study incorporated data from Iraq’s Ministry of Water Resources and involved scientists from the University of Basra, Indigenous people and non-governmental organizations, like the Nature Iraq Foundation. The resulting assessment framework can be applied to detect changes in the ecosystem affected by multiple factors, including political disturbance.\nWhen the news arrived she was to receive this year’s Governor General Gold Medal, it came with resolve to carry on her environmental protection work.\n“I feel honoured, grateful and privileged, but this is also a big responsibility. I have to continue to do the good work in Iraq, or in any country, to help and to reflect the knowledge I received from Royal Roads,” she says.\n“Royal Roads changed the way I see the world and gave me the strength as an Arabic woman to fly back to the land that I love with courage and confidence. This is what Royal Roads did for me.”" ]
[ "<urn:uuid:96150915-eaef-447d-95fb-3c0d970b3d78>" ]
[ "CC-MAIN-2020-10" ]
[ "https://www.royalroads.ca/news-events/convocation/awards/wasan-saladdin-jema" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875147116.85/warc/CC-MAIN-20200228073640-20200228103640-00024.warc.gz" ]
[ "en" ]
[ 0.9639071226119995 ]
[ 731 ]
[ 2.59375 ]
[ 3 ]
[ "[ rey-dee-uhs ]\n/ ˈreɪ di əs /\nSave This Word!\nnoun, plural ra·di·i [rey-dee-ahy], /ˈreɪ diˌaɪ/, ra·di·us·es.\na straight line extending from the center of a circle or sphere to the circumference or surface: The radius of a circle is half the diameter.\nthe length of such a line.\nany radial or radiating part.\na circular area having an extent determined by the length of the radius from a given or specified central point: every house within a radius of 50 miles.\na field or range of operation or influence.\nextent of possible operation, travel, etc., as under a single supply of fuel:the flying radius of an airplane.\nAnatomy. the bone of the forearm on the thumb side.Compare ulna (def. 1).\nZoology. a corresponding bone in the forelimb of other vertebrates.\nMachinery Now Rare. the throw of an eccentric wheel or cam.\na rounded corner or edge on a machined or cast piece of metal.\nEntomology. one of the principal longitudinal veins in the anterior portion of the wing of an insect.\nCAN YOU ANSWER THESE COMMON GRAMMAR DEBATES?\nThere are grammar debates that never die; and the ones highlighted in the questions in this quiz are sure to rile everyone up once again. Do you know how to answer the questions that cause some of the greatest grammar debates?\nQuestion 1 of 7\nWhich sentence is correct?\nOrigin of radius\n1590–1600; <Latin: staff, rod, spoke, beam, originally, ray1\nWORDS THAT MAY BE CONFUSED WITH radiuscircumference, diameter, radius , tangent\nDictionary.com Unabridged Based on the Random House Unabridged Dictionary, © Random House, Inc. 2023\nBritish Dictionary definitions for radius\n/ (ˈreɪdɪəs) /\nnoun plural -dii (-dɪˌaɪ) or -diuses\na straight line joining the centre of a circle or sphere to any point on the circumference or surface\nthe length of this line, usually denoted by the symbol r\nthe distance from the centre of a regular polygon to a vertex (long radius) or the perpendicular distance to a side (short radius)\nanatomy the outer and slightly shorter of the two bones of the human forearm, extending from the elbow to the wrist\na corresponding bone in other vertebrates\nany of the veins of an insect's wing\na group of ray florets, occurring in such plants as the daisy\n- any radial or radiating part, such as a spoke\n- (as modifier)a radius arm\nthe lateral displacement of a cam or eccentric wheel\na circular area of a size indicated by the length of its radiusthe police stopped every lorry within a radius of four miles\nthe operational limit of a ship, aircraft, etc\nWord Origin for radius\nC16: from Latin: rod, ray, spoke\nCollins English Dictionary - Complete & Unabridged 2012 Digital Edition © William Collins Sons & Co. Ltd. 1979, 1986 © HarperCollins Publishers 1998, 2000, 2003, 2005, 2006, 2007, 2009, 2012\nScientific definitions for radius\n[ rā′dē-əs ]\nPlural radii (rā′dē-ī′) radiuses\nA line segment that joins the center of a circle or sphere with any point on the circumference of the circle or the surface of the sphere. It is half the length of the diameter.\nThe shorter and thicker of the two bones of the forearm or the lower portion of the foreleg. See more at skeleton.\nThe American Heritage® Science Dictionary Copyright © 2011. Published by Houghton Mifflin Harcourt Publishing Company. All rights reserved." ]
[ "<urn:uuid:31705194-14a2-47ed-8e04-7f25a2c32a03>" ]
[ "CC-MAIN-2023-14" ]
[ "https://www.dictionary.com/browse/radiuses" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949093.14/warc/CC-MAIN-20230330004340-20230330034340-00582.warc.gz" ]
[ "en" ]
[ 0.788905143737793 ]
[ 854 ]
[ 3.328125 ]
[ 3 ]
[ "Extragalactic sources in Cosmic Microwave Background maps\nWe discuss the potential of a next generation space-borne CMB experiment for studies of extragalactic sources with reference to COrE, a project submitted to ESA in response to the call for a Medium-size mission (M4). We consider three possible options for the telescope size: 1 m, 1.5 m and 2 m (although the last option is probably impractical, given the M4 boundary conditions). The proposed instrument will be far more sensitive than Planck and will have a diffraction-limited angular resolution. These properties imply that even the 1 m telescope option will perform substantially better than Planck for studies of extragalactic sources. The source detection limits as a function of frequency have been estimated by means of realistic simulations taking into account all the relevant foregrounds. Predictions for the various classes of extragalactic sources are based on up-to-date models. The most significant improvements over Planck results are presented for each option. COrE will provide much larger samples of truly local star-forming galaxies (by about a factor of 8 for the 1 m telescope, of 17 for 1.5 m, of 30 for 2 m), making possible analyses of the properties of galaxies (luminosity functions, dust mass functions, star formation rate functions, dust temperature distributions, etc.) across the Hubble sequence. Even more interestingly, COrE will detect, at , thousands of strongly gravitationally lensed galaxies (about 2,000, 6,000 and 13,000 for the 1 m, 1.5 m and 2 m options, respectively). Such large samples are of extraordinary astrophysical and cosmological value in many fields. Moreover, COrE high frequency maps will be optimally suited to pick up proto-clusters of dusty galaxies, i.e. to investigate the evolution of large scale structure at larger redshifts than can be reached by other means. Thanks to its high sensitivity COrE will also yield a spectacular advance in the blind detection of extragalactic sources in polarization: we expect that it will detect up to a factor of 40 (1 m option) or of 160 (1.5 m option) more radio sources than can be detected by Planck and, for the first time, from several tens (1 m option) to a few hundreds (1.5 m option) of star forming galaxies. This will open a new window for studies of the global properties of magnetic fields in star forming galaxies and of their relationships with SFRs.\na,b,1]G. De Zotti,11footnotetext: Corresponding author. a]G. Castex, c]J. González-Nuevo, c]M. Lopez-Caniego, b]M. Negrello, d]Z.-Y. Cai, b]M. Clemens, e]J. Delabrouille, c]D. Herranz, c]L. Bonavera, f]J.-B. Melin, g]M. Tucci, h]S. Serjeant, i,l]M. Bilicki, m]P. Andreani, n]D. L. Clements, o]L. Toffolatti p]and B.F. Roukema Prepared for submission to JCAP\nExtragalactic sources in Cosmic Microwave Background maps\nSISSA, Via Bonomea 265, 34136, Trieste, Italy\nINAF-Osservatorio Astronomico di Padova, Vicolo dell’Osservatorio 5, I-35122 Padova, Italy\nInstituto de Física de Cantabria (CSIC-UC), Avda. los Castros s/n, 39005 Santander, Spain\nCenter for Astrophysics, University of Science and Technology of China, Hefei, 230026, China\nAPC, 10, rue Alice Domon et Léonie Duquet, 75205 Paris Cedex 13, France\nDSM/Irfu/SPP, CEA-Saclay, F-91191 Gif-sur-Yvette Cedex, France\nDépartement de Physique Théorique and Center for Astroparticle Physics, Université de Genève, 24 quai Ansermet, CHâ1211 Genève 4, Switzerland\nDepartment of Physical Sciences, The Open University, Walton Hall, Milton Keynes MK7 6AA, UK\nAstrophysics, Cosmology and Gravity Centre, Department of Astronomy, University of Cape Town, Private Bag X3, Rondebosch, South Africa\nKepler Institute of Astronomy, University of Zielona Góra, ul. prof. Z. Szafrana 2, 65-246 Zielona Góra, Poland\nEuropean Southern Observatory, Karl-Schwarzschild-Straße 2, D-85748, Garching, Germany\nAstrophysics Group, Imperial College, Blackett Laboratory, Prince Consort Road, London SW7 2AZ, UK\nDepartamento de Física, Universidad de Oviedo, C. Calvo Sotelo s/n, 33007 Oviedo, Spain\nToruń Centre for Astronomy, Faculty of Physics, Astronomy and Informatics, Nicolaus Copernicus University, ul. Gagarina 11, 87-100 Toruń, Poland\nKeywords: cosmology: observations – surveys – submillimeter: galaxies – radio continuum: general – galaxies: evolution\nWe investigate the impact on studies of extragalactic sources of the planned fourth generation Cosmic Microwave Background (CMB) mission named Cosmic Origins Explorer plus (COrE). Various options are being considered. The COrE “light” concept envisages an effective telescope size of m and a 60–600 GHz frequency range with a total of 2040 detectors. More ambitious options, requiring substantive contributions from international partners (“COrE extended”), contemplate telescope sizes from m (baseline) to 2 m (although the last option is unlikely to fit within the M4 constraints) and a frequency range from 60 to 800 GHz (but we consider also the effect of an extension to 1200 GHz) with a total of 5800 detectors. The instrument comprises more than two times as many frequency channels as Planck, to make possible an efficient separation of foreground emissions. The very large number of state-of-the-art detectors ensures a much better sensitivity per channel.\nThe plan of the paper is the following. In Section 2 we discuss the source detection in CMB maps. In Section 3 we briefly describe the populations of extragalactic sources in the COrE frequency range. Section 4 is about the extraction of the rich information content on sources below the detection limit. In Section 5 we deal with counts in polarization. Finally, in Sect 6 we summarize our main results.\nThroughout this paper we adopt the fiducial CDM cosmology with best-fit Planck WP high-resolution CMB data of the Atacama Cosmology Telescope (ACT) and South Pole Telescope (SPT) experiments as provided by .\n2 Detection limits for CMB maps\nThe development of algorithms for point source detection has a long history in astronomy. Images produced by CMB experiments have from this point of view important peculiarities that make inadequate the algorithms consecrated by decades of successful usage in many wavebands, from radio to X-rays, such as CLEAN , DAOFIND and SExtractor . The peculiarities mostly follow from the limited angular resolution of CMB experiments.\nIn high resolution images intensity peaks on the angular scale of the Full Width at Half-Maximum (FWHM) of the telescope are due to either point sources or to detector noise and the highest significance peaks are straightforwardly interpreted as point sources. On the contrary, in CMB images also structure in diffuse emissions (the CMB itself and Galactic radiations) shows up on the FWHM scale, complicating the detection of point sources.\nOptimal methods for source detection in CMB maps need the knowledge of the probability density functions (PDFs) of each signal contributing to the “background” [for a review see 3]. In general, however, our knowledge of the PDFs is highly incomplete. A further complication comes from the non-stationarity of Galactic emissions, hampering the realization of detection methods valid throughout the sky. Still, methods able to efficiently filter out the “background” noise have been devised . The widely used matched filter characterizes the “background” noise in terms of its power spectrum. Although this approach has known limitations it constitutes a useful reference.\nThe power spectra at high Galactic latitude () of the astrophysical components present in COrE maps at selected frequencies (70, 150 and 353 GHz) are illustrated in Fig. 1. They were computed using the most recent version of the Planck Sky Model with an apodized Galactic mask (see the caption of Fig. 1). These figures illustrate the relative importance of the various contributions to the fluctuation field and how they vary with frequency.\nThe root mean square (rms) fluctuations, , are related to the power spectrum, , by \nis the solid angle of the instrument, is the experimental beam function, which for a Gaussian beam with standard deviation is well approximated by\nThe integral approximation to the sum holds if rad (so that the relevant ).\nPoisson fluctuations are uncorrelated. Hence the only non-zero term of the correlation function is the one at zero-lag and the power spectrum, which is the transform of the correlation function, is independent of :\nwhere are the differential number counts per steradian of sources weaker that the detection limit . Then\nwhich is the classical expression for the variance of a Poisson distribution of sources weaker than , within a solid angle defined by\nAdopting a Gaussian instrumental response function (the “beam” function), , in polar coordinates:\nThe dependence of rms fluctuations on frequency for diffraction limited observations with a 1 m, 1.5 m and a 2 m telescope is illustrated by Fig. 2. Figure 3 shows the trend of rms fluctuations with angular resolution at 3 frequencies. The relative importance of fluctuations due to unresolved point sources increases with frequency and with decreasing FWHM. Their dominant contribution in the FWHM range of interest here comes from radio sources up to about 150 GHz and from dusty galaxies at higher frequencies. While the radio sources have an essentially Poisson distribution, in the case of dusty galaxies the contribution of clustering dominates except on the smallest angular scales.\nThe above discussion illustrates why, in spite of the very high sensitivity of modern CMB experiments, they only provide shallow surveys of extragalactic sources. For example, the 90% completeness limits of the Planck Catalogue of Compact Sources [PCCS; 9] at 70, 100, 217 and 857 GHz are 776, 300, 180 and 680 mJy, respectively, while the instrumental noise limits at the same frequencies, for the 15 month survey, are , 131, 143, and 220 mJy, respectively [10, 11]. This means that the surveys are limited by fluctuations of sky signals, not by instrumental noise: there is a lot of useful information in the fluctuation field! A comparison between the PCCS 90% completeness limits at all Planck frequencies and the corresponding instrumental noise levels is presented in Fig. 4.\nA further cue comes from the consideration of the number of detections per resolution element. For example, the PCCS has 191, 629, 1409 and 6773 detections at 70, 100, 217 and 857 GHz, respectively, above the 90% completeness level in the extragalactic zone. This means that there are 1940, 1119, 1868 and 516 resolution elements per source, well above the values (30-40 resolution elements/source) usually corresponding to the confusion limit.\nA key issue is the ability of source extraction algorithms to filter out fluctuations due to diffuse emissions, such as the CMB and Galactic radiations. Figure 4 shows that the component separation algorithms developed for the Planck project [7, 12] are quite efficient at doing that: over a broad frequency range the PCCS 90% completeness limits are close to the fluctuations due to diffuse emissions. In other words most of their contributions to fluctuations are filtered out.\n2.2 Estimate of COrE detection limits\nTo estimate the detection limits for the three COrE options considered in this paper we have carried out realistic simulations of sky maps including all the relevant foregrounds as well as the instrumental noise for a three year mission. Simulations with resolutions arcmin have been carried out using the latest version of the Planck Sky Model [PSM: 2]. The PSM includes, in addition to a model of the CMB, Galactic diffuse emissions (synchrotron, free-free, thermal and spinning dust, CO lines), Galactic HII regions, extragalactic radio sources, dusty galaxies, thermal and kinetic Sunyaev-Zeldovich signals from clusters of galaxies. Each component is simulated by means of educated interpolations/extrapolations of the available data, complemented by state-of-the-art models.\nDistinctive features of the simulations are spatially varying spectral properties of synchrotron and dust; different spectral parameters for each point source; modelling of the clustering properties of extragalactic sources and of the power spectrum of fluctuations in the cosmic infrared background (CIB), in close agreement with the latest observational determinations.\nOn angular scales below 4 arcmin, reached at frequencies above –320 GHz (depending on the telescope size), the PSM has not been well tested yet. So, at high frequencies we have performed simpler simulations, taking advantage of the fact that, on small scales, the fluctuation field at high Galactic latitudes is dominated by extragalactic sources making up the CIB and fluctuations due to the CMB and to diffuse Galactic emissions can safely be neglected. The method developed by was used to distribute the sources on the sky consistent with the measured CIB power spectra at different sub-mm wavelengths [14, 15, 16], i.e. properly allowing for their clustering properties.\nThe source detection on simulated maps was performed using the IFCAMEX detection pipeline111http://max.ifca.unican.es/IFCAMEX and specifically its implementation of the second member of the Mexican Hat Wavelet family (MHW2). This wavelet is obtained applying the Laplacian operator two times on the two-dimensional Gaussian function. The MHW2 is used as a filter to reduce the contribution from the background, including both the small scale noise and the large scale diffuse emission from our own Galaxy, thus enhancing the detection efficiency. The analysis was carried out in projected flat square patches, corresponding pixels for HEALPix222http://healpix.sourceforge.net [Hierarchical Equal Area isoLatitude Pixelation; 17] maps with .\nFor this purpose the map was divided into partially overlapping flat patches. Dividing the sky map into small patches we can optimize the filter taking into account the statistical properties of the map in the vicinity of each source. In practice, we did first a blind run and then a second non-blind run at the position of each source detected in the blind run. The second step allowed us to remove artifacts in the blind catalogue, mostly due to border effects in the filtered images.\nSince the flat patches overlap, we can have multiple detections of the same source. The repetitions are removed, keeping for each source only the detection with the highest signal-to-noise ratio. Further details on the MHW2 and the IFCAMEX implementations can be found in and in . The IFCAMEX detection pipeline was previously used to build the New Extragalactic WMAP Point Source (NEWPS) catalogue [20, 21] and the part of the PCCS at GHz; it also being used to build the second Planck catalogue of compact sources (PCCS2) at the same frequencies. A different implementation of the same algorithm was used for the PCCS and PCSS2 catalogues at higher frequencies.\nThe detection limits, , that, according to our simulations, correspond to completeness and reliability in the “extragalactic zone” (), where Galactic emissions are quite low, are shown in Figs. 4 and 5. The values of obtained from the simulations are well approximated by the formula:\nIn the above formulae the various contributions to the fluctuation field have been computed using the equations given in Sect. 2.1. The CMB power spectrum corresponds to the Planck best fit cosmological parameters . The rms confusion fluctuations, , include the contributions of radio sources, of dusty galaxies and of galaxy clusters (Sunyaev-Zeldovich, SZ, effect). The Poisson contribution from radio sources was computed via eq. (2.6) using the model at frequencies of up to 100 GHz and the model at higher frequencies. The detection limit, , was computed iteratively. A check with the PSM has shown that the clustering of radio sources adds a negligible contribution (we recall that the PSM contains, down to faint flux density levels, real radio sources, at their real positions in the sky). The contributions of dusty galaxies and of galaxy clusters were computed using, respectively, the model by , that fits accurately the measured CMB power spectra, and the power spectrum of the thermal SZ effect measured by . These power spectra comprise both the Poisson and the clustering contributions.\n3 Extragalactic sources in the COrE frequency range\nBy a lucky (for CMB studies) coincidence the CMB peak occurs at a frequency close to a deep minimum of the intensity of the extragalactic background light as well as of the Galactic emissions. The steep increase with frequency of the dust emission spectrum in the mm/sub-mm region (typically ) while the radio emissions (synchrotron and free-free) decline makes the crossover frequency between radio and dust emission components only weakly dependent on their relative intensities. Moreover, dust temperatures tend to be higher for distant high luminosity sources, partially compensating for the effect of redshift. As a consequence there is an abrupt change in the populations of bright sources above and below mm: radio sources dominate at longer wavelengths, while in the sub-mm region dusty galaxies take over (Fig. 5).\nThe Planck Early Release Compact Source Catalogue [ERCSC; 33] reported sources extracted from maps built using the data obtained from the scans of the sky between 2009 August 13 and 2010 June 6, comprising the first all-sky survey and about 60% of the second. It was exploited by to derive counts of extragalactic radio sources in the range 30–217 GHz and by to investigate the statistical properties of infrared and radio extragalactic sources between 100 and 857 GHz.\nSubsequent releases of the Planck compact source catalogue benefited of additional data (15 months, “the nominal mission”, for the PCCS, full mission for the PCCS2) as well as of improved data processing. As a result, the completeness limits of the PCCS are fainter than those of the ERCSC by average factors of at LFI frequencies (30–70 GHz) and of in the range 100–353 GHz; the improvement is larger at higher frequencies: a factor of 3.5 at 545 GHz and of 4.5 at 857 GHz. No information is available yet on the PCCS2. However major improvements are not expected.\nDifferential counts at several frequencies of radio sources and of dusty galaxies are shown in Figs. 6 and 7, respectively. The Planck counts (yellow data points) were obtained from the ERCSC (the PCCS has not been exploited yet for this purpose). The 90% completeness limits of the PCCS and of the 3 COrE options are also shown. The scientific advances made possible by COrE are discussed in the following sub-sections.\n3.1 Classical radio sources\nCOrE covers the frequency range where the information on the spectral energy distribution (SED) of radio-loud Active Galactic Nuclei (AGNs) is still scanty: even the SEDs of very bright sources like [HB89] 0234+285 (Fig. 5) are not measured at sub-mm wavelengths. Yet, in this spectral region important spectral features, carrying essential information on physical conditions of sources, show up.\nObservations at mm/sub-mm wavelengths often reveal the transition from optically thick to optically thin radio emission in the most compact regions, i.e. on the maximum self-absorption frequency which roughly corresponds to the synchrotron peak frequency (in terms of ). A systematic survey in the COrE range will, for example, allow us to see if there are systematic differences in the synchrotron turnover frequencies between BL Lacs and flat-spectrum radio quasars, as would be expected if their jets have different distributions of the angular separations from the line of sight, implying different amounts of Doppler boosting. Correlations between turnover frequency and luminosity, which is also boosted by relativistic beaming effects, would help confirm current models.\nMajor high radio frequency flares have been observed in several compact radio sources [34, 36, 35], including the recent giant outburst of 3C 454.3 . Several mechanisms can yield strong variability of relativistically beamed sources [blazars; e.g. 35, and references therein]: shocks travelling along the jet, changes of the bulk Lorentz factor causing variations of the Doppler factor, changes of the viewing angle due, e.g., to precession of binary black hole systems or to helical trajectories of plasma elements or to rotating helical jets. Thus variability studies provide clues into the physical properties of emitting regions. Variability due to geometrical effects is expected to affect weakly if at all the source spectra, while shocks induce strong spectral variations with intensity peaks that generally move downwards in frequency with shock age. The COrE surveys may catch the rise of the flare at the highest frequencies, missed by ground based observations.\nAs for extended sources, the spectral break frequency, , at which the synchrotron spectrum steepens due to electron energy losses, is related to the magnetic field, , and to the synchrotron age, (in Myr), by GHz. The systematic multi-frequency study at the COrE frequencies will thus provide a statistical estimate of the radio source ages. On the other hand, at high redshifts the dominant energy loss mechanism of relativistic electrons may be inverse Compton scattering off CMB photons because the CMB energy density, which grows as , can exceed the magnetic energy density in radio lobes. As a consequence the synchrotron emission of extended, steep-spectrum, sources is suppressed with increasing redshift down to lower and lower frequencies, while compact sources are almost unaffected . This has obvious implications for the statistics of extended sources as a function of redshift and of the survey frequency. Detailed predictions depend on poorly known quantities, such as the distribution of magnetic field intensities, of source sizes and of injected relativistic electrons. A comparison of low-frequency ground based surveys with the high frequency surveys by COrE can provide key constraints on these quantities.\nExcess far-IR/sub-mm emission due to dust mostly heated by young stars is often observed from radio galaxies, particularly at high . COrE’s broad frequency coverage will allow an extensive study of the spectral energy distribution from radio to sub-mm wavelengths and therefore of the presence of dust in host galaxies and of the relationships between the radio emission and the evolutionary status of the host galaxies.\nAccording to the current notion, host galaxies of blazars are passive ellipticals . This view has however already been challenged by Planck observations of catalogued blazars associated to galaxies with intense star formation activity (3 examples are shown in Fig. 8). Since dust emission from the host galaxy is detectable by Planck only for nearby galaxies (but blazars are rare locally) or for extreme IR luminosities, these objects are likely only the tip of the iceberg. The higher sensitivity of COrE will allow us to extend the study to much larger samples, shedding light on the possible relation of the blazar phenomenon with star-formation activity.\n3.2 Special radio source populations\nHigh radio frequency surveys are crucial to investigate special classes of radio sources, self-absorbed up to cm wavelengths. A particularly important class of sources in this category are extreme GHz Peaked Spectrum (GPS) sources or high frequency peakers [HFPs; 41]. GPS sources are powerful [, compact (sizes kpc) radio sources with convex spectra peaking at GHz frequencies. Conclusive evidence that they correspond to the earliest stages of the evolution of powerful radio sources, when the radio-emitting region grows and expands within the interstellar medium of the host galaxy came from VLBI measurements of propagation velocities of up to , implying dynamical ages of years [see 42, for a review and references]. The identification of these sources is, therefore, a key element in the study of the birth of radio activity.\nPredictions for the counts of GPS sources have been worked out by [22, 43] and . Observational estimates are complicated by the contamination of candidate GPS samples by flaring blazars that also exhibit spectral peaks at GHz frequencies . Recent estimates differ by substantial factors, but the uncertainties are very large due to the poor statistics. found that only 3 sources with mJy selected over an area of about 6.1 sr could be classified as genuine GPSs, with a possible incompleteness by a factor of 2. On the other hand, have 2 confirmed GPSs with mJy, both with GHz, over a much smaller area; this would correspond to 24–155 (68% confidence limits for a Poisson distribution) GPSs over 6.1 sr. Only all sky surveys can produce significant samples of these rare objects, but they need to go deeper than Planck. COrE, especially with the largest telescope size, has the right properties.\n3.3 Local dusty galaxies\nThe (sub-)mm surveys performed by all-sky CMB experiments are the ideal way to carry out an unbiased census of dusty galaxies in the local neighbourhood, down to volume densities beyond the reach of more sensitive surveys over small areas of the sky, such as those carried out by Herschel. The Planck ERCSC has offered the first opportunity to accurately determine the luminosity functions in the very local Universe at several (sub-)millimetre wavelengths, unaffected by cosmological evolution , and to investigate their properties . These studies have not yet been extended to the PCCS.\nIn Sect. 2 we have shown that, at sub-mm wavelengths, COrE will reach, at 500–600 GHz flux densities a factor of , 6.7 and 9.6, for the 1 m, 1.5 m and 2 m option, respectively, fainter than the PCCS, i.e. to explore, respectively, a volume a factor of 8, 17 and 30 times larger. This means that COrE can detect at 600 GHz, from (1 m option) to (1.5 m option) to (2 m option) star forming galaxies out to in the “extragalactic zone” .\nThis redshift range is within that covered by the Sloan Digital Sky Survey (SDSS) whose DR10 release extends over 14,555 square degrees . Additional redshifts are provided by other, albeit shallower, large-area spectroscopic redshift surveys: the all-sky 2MASS Redshift Survey [2MRS; 50] and the IRAS PSC Redshift Survey [PSCz; 51]; the hemispherical Six-Degree Field Galaxy Survey [6dFGS; 52], and others, such as the Two-Degree Field Galaxy Survey [2dFGRS; 53]; see, e.g., for a compilation of redshift measurements, dubbed 2M.\nAccurate photometric redshifts have been obtained for many more galaxies detected by wide-angle surveys [55, 56, 57]. The 2MASS Photometric Redshift (2MPZ) sample of should be particularly useful in this respect due to its almost full sky coverage, suitable depth and size (1 million galaxies with a median ; for comparison, the median values of the low- peaks of the distributions in Fig. 9 are –0.03). In addition, COrE local dusty galaxies missed by 2MASS should be present in the WISE catalogue ; a large fraction, if not all of them, will have reliable photometric redshifts available over most of the sky [59, Bilicki et al. in prep.]. We expect that with the new data that will be accumulating in the coming years, particularly those from the Euclid slitless spectroscopy and from 4-metre Multi-Object Spectroscopic Telescope (4MOST) multifibre resolution spectroscopy of 10 million emission line galaxies, spectroscopic or photometric redshifts will be available for essentially all the galaxies detected by COrE.\nThe large number of galaxies for which spectroscopic or photometric redshifts will be available will make possible analyses of the properties of galaxies (luminosity functions, dust mass functions, star formation rate functions, dust temperature distributions, etc.) across the Hubble sequence. Of special interest will be the study of IR emission from IR-faint galaxies such as early-type or dwarf galaxies. Combining the COrE with the available multi-wavelength data, especially with those from WISE, 2MASS, GALEX and Euclid we will get a complete view of the SEDs and will be able to investigate relationships between the dust content, the star formation rate (SFR), the stellar mass, the environment and more.\nFor dusty galaxies, that dominate the extragalactic source population at high frequencies, lower frequency measurements provide information on the relationship, if any, between star-formation and nuclear radio activity and on the radio emission (synchrotron and free-free) powered by star formation.\n3.4 High redshift dusty galaxies\nSub-mm surveys [see, e.g., 62, for a recent review] have clearly demonstrated the importance of the FIR/sub-mm data in reconstructing a complete picture of the history of galaxy formation and evolution. The high-redshift sources detected in these surveys are expected to be the progenitors of the present-day massive elliptical galaxies [65, 64, 63]. These galaxies can reach extreme IR luminosities [; 69, 67, 68, 66], that can be further boosted by strong gravitational lensing [74, 72, 73, 70, 71] to the point that some were detected by Planck, in spite of the shallowness of its surveys [77, 75, 78, 79, 76].\nUsing the model, that accurately fits a broad variety of infrared to millimeter-wave data on extragalactic sources333See figures in http://staff.ustc.edu.cn/zcai/ (multi-frequency and multi-epoch luminosity functions of galaxies and AGNs, redshift distributions, number counts, total and per redshift bins) we find that the deeper COrE surveys, compared to Planck, will detect unlensed IR galaxies up to redshifts (for telescope sizes m) and many more strongly lensed (amplification ) galaxies. In the “extragalactic zone” () we expect, at 600 GHz, unlensed galaxies at for the 1.5 m option. For the 2 m option this number jumps to .\nThe counts of strongly lensed galaxies were computed using again the model, but adopting a maximum amplification to take into account the sources size [at variance with 24, who assumed point sources]. As shown by Fig. 2 of the adopted is consistent with the counts and the redshift distribution of strongly lensed galaxies detected by the South Pole Telescope [SPT; 28, 81].\nEven the 1 m option will detect thousands of strongly lensed galaxies at (about 740 at 390 GHz and over 2,000 at 600 GHz). For the 1.5 m option these numbers increase to and , respectively; for the 2 m option they are and , respectively.\nFor all the options considered the COrE counts will cover the gap between the bright (sub-)mm counts measured by Planck and those measured by the deep SPT and Herschel surveys (orange and green points, respectively, in Figs. 6 and 7). The transition from the bright counts, dominated by nearby galaxies, which have a Euclidean slope, to the fainter ones made much steeper by the combined effect of strong cosmological evolution and of the positive K-correction [83, 82] provides a strong test for galaxy evolution models. Many of them predict a smoother transition than suggested by present data, but only the much better statistics that will be provided by COrE will make it possible to reach firm conclusions.\nThe large samples of strongly gravitationally lensed galaxies that will be provided by COrE will be of extraordinary astrophysical value in many fields [see 84, for a review] thanks to the magnification of the source flux that makes observable galaxies intrinsically too faint, and to the corresponding increase of the apparent size that makes possible to measure the internal structure of high- sources to levels otherwise unattainable with the current instrumentation [e.g., 85]. Follow-up observation will allow us to determine the total (visible and dark) mass of the lensing galaxy, to investigate its density profile, to measure cosmological parameters [86, 88, 87, 89] and especially the Hubble constant using time delays [e.g., 90].\nThe selection of strongly lensed galaxies will be extremely easy at about 300–400 GHz. As illustrated by Fig. 9, essentially all high- galaxies detected at these frequencies will be strongly lensed. The other detected sources will be easily recognizable low- late-type galaxies, plus a small group of radio sources, also easily identifiable in low frequency radio catalogs. At 600 GHz the fraction of strongly lensed galaxies among objects is still very close to 100% for the 1 m option and only slightly decreases (to 92%) for 1.5 m option. For the 2 m option the strongly lensed fraction among 600 GHz detections with is 44%; but in this case we expect strongly lensed galaxies in the “extragalactic zone” already at 390 GHz, where they are of objects at . This means that COrE will allow us to find very easily thousands of strongly lensed galaxies with a close to 100% efficiency [see also 72].\nWhile other facilities will also be generating large reliable gravitational lens catalogues on a comparable timescale [e.g. Euclid H lenses , Gaia lensed quasars [e.g. 92]], the critical advantages of COrE will be in extending the sources and lenses to much higher redshifts. This will make it possible to probe the evolution of dark matter halo substructure and the Initial Mass Function (IMF) to much higher redshifts [key tests of semi-analytic models of galaxy evolution, e.g. 94, 93]. This large, high-redshift lens catalogue will also be ideal to probe cosmological parameters using rare double lenses [see, e.g., for the use of dynamical constraints to remove model degeneracies, e.g. ]. The background source population will mostly be ultra-luminous star-forming systems that in themselves have always posed the strongest challenges to semi-analytic galaxy evolution models. Only in large lens samples can the rarest high-magnification events be found, and the angular magnification afforded by gravitational lensing in these systems will make them the ideal laboratories for determining the physical processes that dominate star formation and feedback in the early Universe.\n4 Extracting information on extragalactic sources below the detection limit\n4.1 Proto-clusters of dusty galaxies\nAs mentioned in Sect. 2, thanks to the very low instrumental noise, the fluctuation field measured by COrE is signal dominated. This implies that it contains a lot of useful information. In regions with low dust content, several intensity peaks not associated to individual sources just below the detection limit were found to correspond to clumps of dusty galaxies likely to evolve into rich galaxy clusters [79, 76, 97]. This was predicted by on the basis of the argument summarized and slightly updated below.\nSub-mm surveys proved to be most efficient in detecting high- massive galaxies, interpreted as progenitors of present day giant ellipticals, caught during their star-formation phase. There is evidence of strong clustering of these sources [99, 101, 100, 16, 14, 15], consistent with them being tracers of strongly overdense regions. Sub-mm surveys are therefore optimally suited to look for proto-clusters at earlier redshifts than can be reached by optical/near-IR, X-ray, SZ surveys.\nThe analysis in Sect. 2 has demonstrated that, in high Galactic latitude regions, intensity peaks below the point source detection limits at sub-mm wavelengths are dominated by fluctuations in the distribution of faint sources making up the CIB. Such fluctuation field is highly skewed. One example, computed using the PSM at the Planck resolution, is displayed in Fig. 10. The clustering contribution overcomes Poisson fluctuations on scales larger than several arcmin (see Fig. 3). This means that sub-mm maps filtered with resolutions of several arcmin are a powerful tool to detect candidate proto-clusters of dusty galaxies.\nIn other words, the relatively large beams used by CMB experiments collect photons from regions with Mpc physical sizes at –3 (at these redshifts the physical scale is Mpc/arcmin) thus summing the contributions from tens of star-forming galaxies in over-dense regions. As first pointed out by the galaxy clumps may then become detectable, even if individual galaxies are well below the detection limit. Unbiased searches of high- protoclusters thus become possible, overcoming the need of targeting possible signposts of high density peaks (high- radiogalaxies or powerful QSOs), as done so far.\nIt must be stressed, however, that over-densities are not necessarily proto-clusters. Some may be random alignments, projected on the plane of the sky, of large scale structures either unrelated or connected by a cosmic filament almost aligned with the line of sight. Quantitative predictions were worked out by . Briefly, within the standard gravitational clustering scenario, we expect that the distribution of intensity peaks due to source over-densities has a very large variance, resulting from three contributions, discussed below [see 102]. The mean number of objects inside a volume centered on a source is:\nwhere is the mean source number density. The variance around is:\nbeing the amplitude of the three-point angular correlation function.\nFor a survey with a Gaussian angular response function [eq. (2.8)] and we have\nwhere is the angular diameter distance and\nwher is the bias factor, is the effective halo mass, is the spatial correlation function of dark matter halos. The mean luminosity of the “clump” around the central source with luminosity is\nwhere is the response function of the instrument\nFWHM being the Full Width at Half Maximum of the instrument.\nThe first contribution to the variance refers to the luminosity of the most luminous source, acting as a beacon signalling the presence of the proto-cluster; the second refers to the sum of luminosities of the surrounding sources, that sample in a different way the luminosity function; the third refers to the overdensity of neighbouring sources.\nAll–sky surveys, such as the one planned by COrE, are optimally suited to pick up the rare cases in which all contributions conspire to yield an exceptionally high luminosity of the clump. Particularly favourable situations may occur when the main source is strongly lensed or the clump is within a filament almost aligned with the line of sight, so that the contribution of neighbouring sources (seen in projection) to the observed signal can be very large.\nUnder the assumption that the statistics of the matter density distribution can be described by a log-normal function , the probability distribution function of is:\nThe clump luminosity function obeys the normalization condition:\nA search for such clumps has been carried out by by investigating the nature of Planck ERCSC sources that lie within an area of observed as part of the Herschel Multitiered Extragalactic Survey (HerMES). Four sources were found to be associated with overdensities of Herschel sources with sub-mm colours suggesting redshifts –2. The estimated surface density of these candidate high- clumps was found to be consistent with the predictions by , although with large uncertainties.\nHowever new calculations taking into account the more recent determinations of the redshift-dependent sub-millimeter luminosity functions (Negrello et al., in preparation) yield lower clump surface densities than estimated by , and fall short of accounting for the result. A very similar conclusion was reached by using a completely independent approach, coupling hydro-dynamical zoom-in simulations with the recently developed radiative transfer code GRASIL3D. The origin of the discrepancy is unclear. On one side it may suggest that models and simulations underestimate the IR luminosities of the clumps. Alternatively, the overdensities discovered by might be not individual proto-clusters but positive fluctuations in the number of proto-clusters within the Planck beam. In both cases the study of these overdensities provides important clues on the early evolution of large scale structure.\n4.2 Power spectrum of the Cosmic Infrared Background (CIB)\nThe better angular resolution, at high frequencies, of all COrE options, compared to Planck, will allow us to measure, in a uniform way, the CIB power spectrum over an unprecedented range of frequencies and of angular scales (from arcmin to tens of degrees), thus breaking the degeneracy between the Poisson contribution and that of non-linear effects (one-halo term), that complicates the interpretation of Planck measurements, without resorting to external (Herschel) data. Although there is good agreement between the latest determinations of the power spectra by Planck and Herschel [15, 16], at 545 GHz the Herschel data tend to be slightly but systematically higher, although compatible within the error bars.\nAccurate determinations of the CIB power spectrum at different frequencies provide on one side constraints on the evolution of the cosmic star formation density and, on the other side, on halo masses associated to sources of the CIB. Except on the smallest angular scales, the CIB power spectrum is determined by galaxy clustering. The currently standard approach to describe it starts from the consideration that galaxies are hosted by dark matter halos. The power spectrum of the galaxy distribution is parameterized as the sum of the one-halo term that dominates on small scales and depends on the distribution of galaxies within the same halo, and the two-halo term that dominates on large scales and is related to correlations among different halos.\nThe halo occupation distribution, which is a statistical description of how dark matter halos are populated with galaxies, is modelled using a central-satellite formalism [see, e.g., 104]. The two-halo term is essentially proportional to the square of the effective bias factor times the linear theory power spectrum of dark matter halos. Since the bias factor is a steep function of the halo mass and redshift, the two-halo term is a sensitive probe of the effective halo mass of CIB sources (i.e. of galaxies that contribute most to the cosmic star formation) and of its evolution with redshift.\nThe large number of COrE channels will make it possible to investigate in detail the decorrelation of power spectra measured in different frequency bands. A decorrelation is expected because the redshift distribution of sources of the CIB shifts to higher and higher redshifts with decreasing frequency [69, 106, 24, 105], and was observed [15, 16]. Accurate measurements of the CIB cross spectra for different frequency channels sets strong constraints on the frequency dependence of redshift distributions, hence on the evolution of the cosmic SFR.\n5 Polarization of extragalactic sources\n5.1 Radio sources\nBased on our calculations, we expect 90% completeness limits in polarized flux density that are substantially lower than the corresponding limits in total intensity, shown in Fig. 4, and not far from the noise levels. This is because, in the COrE frequency range, the sky is much less complex in polarization than in temperature: the free-free, the spinning dust, the SZ and the CIB emissions are either unpolarized or very weakly polarized; the CMB is also weakly polarized and, moreover, has a different polarization pattern (dominated by the E-mode) than foreground emissions, which have comparable E- and B-mode polarization. The source confusion level is also low since, roughly, the rms polarization fluctuations, , are related to the fluctuations in total intensity, , by , where is the mean polarization degree . found, for flat-spectrum radio sources that dominate the counts at high radio frequencies, at 18 GHz.\nLittle is known on the polarization degree of dusty galaxies, but it is likely to be low because the complex structure of galactic magnetic fields with reversals along the line of sight and the disordered alignment of dust grains reduce the global polarized flux when integrated over the whole galaxy. The measurements at m of M82 by gave a global net polarization degree of only 0.4%.\nThe estimated COrE 90% completeness limits in polarization for the 1 m option decrease from mJy to mJy as the frequency increases from 60 to 200 GHz and increase at higher frequencies up to mJy at 350 GHz. For the 1.5 m option the noise levels in polarization vary from mJy at 60 GHz to mJy at 200 GHz, to mJy at 350 GHz.\nAdopting the slope of 1.3 for the integral counts of radio sources in terms of polarized flux density () found by at 18 GHz [see also 110], we find that COrE will detect up to a factor of 40 (1 m option) or of 160 (1.5 m option) more polarized radio sources than can be detected by Planck. In other words, COrE will provide blindly selected samples of thousands of polarized radio sources. We caution that these estimates are only tentative because of the complex spectral behaviour of the polarized flux density that make extrapolations in frequency quite uncertain. On the other hand, this uncertainty adds interest to COrE measurements.\n5.2 Dusty galaxies\nIf the net polarization degree of M82 is typical of star forming galaxies, we expect the detection in polarization of dusty galaxies for the 1 m option and of for the 1.5 m option, corresponding to several tens or a few hundred galaxies, respectively, in the “extragalactic zone” (). This will provide valuable constraints on the global properties of magnetic fields in star forming galaxies and on their relationships with SFRs.\n6 Discussion and conclusions\nCOrE will perform substantially better than Planck also in the case of a telescope of a similar or somewhat smaller (1 m) size. There are two main reasons for this. COrE will be confusion limited up to the highest frequencies, in contrast to Planck. For example, at 545 GHz (m) the Planck beam has a , while the diffraction limit is . The better resolution implies substantially deeper point source detection limits because the survey depth is mostly limited by fluctuations of sky signals. Realistic simulations give, at 545 GHz, a 90% completeness level of 96 mJy for the COrE 1.5 m option and of 141 mJy for the 1 m option. For comparison the corresponding flux density limit for the PCCS is of 570 mJy.\nAt low frequencies, where Planck resolution is also at the diffraction limit, the better performance by COrE is due to its lower instrumental noise. Source detection algorithms efficiently filter out diffuse emissions (CMB and Galaxy), whose power spectra sink down rapidly at the relevant resolutions, but suffer instrumental noise, which has a flat, roughly white noise, power spectrum. Our PSM-based simulations give, at 100 GHz, 90% completeness limits of 85 and 180 mJy for the 1.5 m and 1 m options, respectively, to be compared with the limit of 300 mJy for the PCCS.\nAt higher frequencies, the Planck ERCSC has already provided large samples of dusty galaxies mostly at distances Mpc, thus offering the first opportunity to accurately determine the local luminosity function unaffected by cosmological evolution and to investigate their properties. The PCCS reaches distances about a factor 1.55 larger, increasing the explored volume by about a factor of 3.7. COrE will reach still further, allowing us to explore a volume a factor of about 17 (1.5 m option) or of about 8 (1 m option) larger than the PCCS. Spectroscopic or photometric redshifts will be available for essentially all these galaxies thanks to the large area surveys from the ground and to the Euclid slitless spectroscopy. This will make analyses of the properties of galaxies (luminosity functions, dust mass functions, star formation rate functions, dust temperature distributions, etc.) possible across the Hubble sequence.\nBut the main improvement of COrE compared to Planck observations in total intensity will be in early galaxy evolution. The sub-mm surveys by COrE will cover the gap between the essentially Euclidean portion measured by Planck and the steep one measured by the deep SPT and Herschel surveys. The transition between the two portions provides a strong test for galaxy evolution models. Many of them predict it to be smoother than suggested by present data, but only the much better COrE statistics will make possible to reach firm conclusions.\nPlanck has already found high-redshift galaxies with extreme intrinsic IR luminosities, further boosted by strong gravitational lensing. Hyperluminous IR galaxies are very interesting in themselves since have always posed one of the strongest challenges to semi-analytic galaxy evolution models. Based on our simulations we expect that COrE will detect, at 600 GHz, from about (1 m option) to about (1.5 m option) strongly lensed galaxies, i.e. from a few to several thousands such objects in the high Galactic latitude sky. Such large samples are of extraordinary astrophysical value in many fields because the magnification makes galaxies that are intrinsically too faint become observable, while the corresponding increase of the apparent size makes it possible to measure the internal structure to levels otherwise unattainable. Optical spectroscopy of galaxies acting as lenses can be exploited to measure the mass distribution of their dark matter halos as a function of redshift. This will allow a direct test on the evolution of large-scale structure. Samples of thousands of strongly lensed galaxies are essential for many other astrophysical and cosmological applications, e.g. to measure cosmological parameters. Essentially all high- dusty galaxies will be strongly lensed. The other sources detected at high frequencies will be easily recognizable low- late-type galaxies, plus a small group of radio sources, also easily identifiable in low frequency radio catalogs. The selection of strongly lensed galaxies will then be extremely easy.\nAt sub-mm wavelengths fluctuations on scales of several arcmin are dominated by clustering of high-z massive galaxies, interpreted as progenitors of present day giant ellipticals. Sub-mm surveys are therefore optimally suited to look for proto-clusters at earlier redshifts than can be reached by optical/near-IR, X-ray, SZ surveys. Herschel observations of intensity peaks with red sub-mm colours, suggestive of high redshifts, in Planck high frequency maps have indeed shown that several of them represent the joint emission from multiple starbursts at high , as expected for a young galaxy cluster.\nAgain, COrE can do much better than Planck. Its high sensitivity sub-mm maps, filtered at several arcmin resolution corresponding to proto-clusters scales at –3, will be a powerful tool to carry out unbiased searches of the long-sought galaxy proto-clusters whose intergalactic gas has not yet reached the virial temperature (i.e. is not detectable in X-rays or via the SZ effect) and whose member galaxies are dust obscured, i.e. optically faint. Only very large area surveys, such as COrE, can provide enough statistics on these rare objects. Higher sensitivity and higher angular resolution follow-up (sub-)mm measurements will assess the nature of candidate proto-clusters. This would help to solve a central problem in cosmology: how did the large scale structure of galaxies form?\nCOrE will also measure, in a uniform way, the CIB power spectrum over an unprecedented range of frequencies and of angular scales (from to tens of degrees), thus breaking the degeneracy between the Poisson contribution and that of non-linear effects (one-halo term), that complicated the interpretation of Planck measurements, without resorting to external (e.g. Herschel or SPT) data.\nMoreover, COrE will extend the counts of radio sources compared to Planck, most notably at high frequencies, where very little is known. Above 217 GHz, the counts will be determined for the first time over a substantial flux density range with good statistics. This will enable the first investigation of the (sub)-mm spectral energy distribution (SED) and of the evolutionary properties of radio sources at (sub-)mm wavelengths. The vast majority of these sources are expected to be blazars, and the accurate determination of their spectra will allow us to understand how physical processes occurring along relativistic jets shape the SED. We will also get numerous samples of ‘extreme’ radio sources allowing us to investigate the rich phenomenology of radio sources at (sub-)mm wavelengths.\nA spectacular advance will be made possible by the high COrE sensitivity in the blind detection of extragalactic sources in polarization. We estimate that COrE will detect up to a factor of 40 (1 m option) or of 160 (1.5 m option) more polarized radio sources than can be detected by Planck. We also expect, for the first time, blind samples of several tens (1 m option) to a few hundred (1.5 m option) of star forming galaxies detected in polarization in the “extragalactic zone”. These samples will open a new window for studies of the global properties of magnetic fields in star forming galaxies and of their relationships with SFRs.\nSome of the results in this paper have been derived using the HEALPix package. Work supported in part by ASI/INAF agreement n. 2014-024-R.0. This research has made use of the NASA/IPAC Extragalactic Database (NED) which is operated by the Jet Propulsion Laboratory, California Institute of Technology, under contract with the National Aeronautics and Space Administration and of data products from the Wide-field Infrared Survey Explorer, which is a joint project of the University of California, Los Angeles, and the Jet Propulsion Laboratory/California Institute of Technology, funded by the National Aeronautics and Space Administration. MB acknowledges the financial assistance of the South African National Research Foundation (NRF) and of the Polish National Science Centre under contract #UMO-2012/07/D/ST9/02785.\n- Planck Collaboration XVI, P. A. R. Ade, N. Aghanim, et al., Planck 2013 results. XVI. Cosmological parameters, A&A 571 (2014) A16.\n- J. Delabrouille, M. Betoule, J.-B. Melin, et al., The pre-launch Planck Sky Model: a model of sky emission at submillimetre to centimetre wavelengths, A&A 553 (2013) A96.\n- D. Herranz and P. Vielva, Cosmic microwave background images, IEEE Signal Processing Magazine 27 (2010) 67.\n- J. A. Högbom, Aperture Synthesis with a Non-Regular Distribution of Interferometer Baselines, A&AS 15 (1974) 417.\n- P. B. Stetson, Astronomical Data Analysis Software and Systems I 25 (1992) 297.\n- E. Bertin and S. Arnouts, SExtractor: Software for source extraction, A&AS 117 (1996) 393.\n- S. M. Leach, J.-F. Cardoso, C. Baccigalupi, et al., Component separation methods for the PLANCK mission, A&A 491 (2008) 597.\n- M. Tegmark, CMB mapping experiments: A designer’s guide, Phys. Rev. D 56 (1997) 4514.\n- Planck Collaboration XXVIII, P. A. R. Ade, N. Aghanim, et al., Planck 2013 results. XXVIII. The Planck Catalogue of Compact Sources, A&A 571 (2014) A28.\n- A. Mennella, M. Bersanelli, R. C. Butler, et al., Planck early results. III. First assessment of the Low Frequency Instrument in-flight performance, A&A 536 (2011) A3.\n- Planck HFI Core Team, P. A. R. Ade, N. Aghanim, et al., Planck early results. VI. The High Frequency Instrument data processing, A&A 536 (2011) A6.\n- Planck Collaboration XII, P. A. R. Ade, N. Aghanim, et al., Planck 2013 results. XII. Diffuse component separation, A&A 571 (2014) A12.\n- J. González-Nuevo, L. Toffolatti and F. Argüeso, Predictions of the Angular Power Spectrum of Clustered Extragalactic Point Sources at Cosmic Microwave Background Frequencies from Flat and All-Sky Two-dimensional Simulations, ApJ 621 (2005) 1.\n- Planck Collaboration XVIII, P. A. R. Ade, N. Aghanim, et al., Planck early results. XVIII. The power spectrum of cosmic infrared background anisotropies, A&A 536 (2011) A18.\n- Planck Collaboration XXX, P. A. R. Ade, N. Aghanim, et al., Planck 2013 results. XXX. Cosmic infrared background measurements and implications for star formation, A&A 571 (2014) A30.\n- M. P. Viero, L. Wang, M. Zemcov, et al., HerMES: Cosmic Infrared Background Anisotropies and the Clustering of Dusty Star-forming Galaxies, ApJ 772 (2013) 77.\n- K. M. Górski, E. Hivon, A. J. Banday, et al., HEALPix: A Framework for High-Resolution Discretization and Fast Analysis of Data Distributed on the Sphere, ApJ 622 (2005) 759.\n- J. González-Nuevo, F. Argüeso, M. López-Caniego, M., et al., The Mexican hat wavelet family: application to point-source detection in cosmic microwave background maps, MNRAS 369 (2006) 1603.\n- M. López-Caniego, D. Herranz, J. González-Nuevo, et al., Comparison of filters for the detection of point sources in Planck simulations, MNRAS 370 (2006) 2047.\n- M. López-Caniego, J. González-Nuevo, D. Herranz, et al., Nonblind Catalog of Extragalactic Point Sources from the Wilkinson Microwave Anisotropy Probe (WMAP) First 3 Year Survey Data, ApJS 170 (2007) 108.\n- M. Massardi, M. López-Caniego, J. González-Nuevo, et al., Blind and non-blind source detection in WMAP 5-yr maps, MNRAS 392 (2009) 733.\n- G. De Zotti, R. Ricci, D. Mesa, et al., Predictions for high-frequency radio surveys of extragalactic sources, A&A 431 (2005) 893.\n- M. Tucci, L. Toffolatti, G. De Zotti and E. Martínez-González, E., High-frequency predictions for number counts and spectral properties of extragalactic radio sources. New evidence of a break at mm wavelengths in spectra of bright blazar sources, A&A 533 (2011) A57.\n- Z.-Y. Cai, A. Lapi, J.-Q. Xia, et al., A Hybrid Model for the Evolution of Galaxies and Active Galactic Nuclei in the Infrared, ApJ 768 (2013) 21.\n- Planck Collaboration XXI, P. A. R. Ade, N. Aghanim, et al., Planck 2013 results. XXI. Power spectrum and high-order statistics of the Planck all-sky Compton parameter map, A&A 571 (2014) A21.\n- E. J. Murphy, J. J. Condon, E. Schinnerer, et al., Calibrating Extinction-free Star Formation Rate Diagnostics with 33 GHz Free-free Emission in NGC 69, ApJ 737 (2011) 67.\n- Planck Collaboration XIII, P. A. R. Ade, N. Aghanim, et al., Planck early results. XIII. Statistical properties of extragalactic radio sources in the Planck Early Release Compact Source Catalogue, A&A 536 (2011) A13.\n- L. M. Mocanu, T. M. Crawford, J. D. Vieira, et al., Extragalactic Millimeter-wave Point-source Catalog, Number Counts and Statistics from of the SPT-SZ Survey, ApJ 779 (2013) 61.\n- Planck Collaboration Int. VII, P. A. R. Ade, N. Aghanim, et al., Planck intermediate results. VII. Statistical properties of infrared and radio extragalactic sources from the Planck Early Release Compact Source Catalogue at frequencies between 100 and 857 GHz, A&A 550 (2013) A133.\n- M. López-Caniego, J. González-Nuevo, M. Massardi, et al., Mining the Herschel-Astrophysical Terahertz Large Area Survey: submillimetre-selected blazars in equatorial fields, MNRAS 430 (2013) 1566.\n- M. Negrello, M. Clemens, J. Gonzalez-Nuevo, et al., The local luminosity function of star-forming galaxies derived from the Planck Early Release Compact Source Catalogue, MNRAS 429 (2013) 1309.\n- D. L. Clements, E. Rigby, S. Maddox, S., et al., Herschel-ATLAS: Extragalactic number counts from 250 to 500 microns, A&A 518 (2010) L8.\n- Planck Collaboration VII, P. A. R. Ade, N. Aghanim, et al., Planck early results. VII. The Early Release Compact Source Catalogue, A&A 536 (2011) A7.\n- Planck Collaboration XIV, P. A. R. Ade, N. Aghanim, et al., Planck early results. XIV. ERCSC validation and extreme radio sources, A&A 536 (2011) A14.\n- X. Chen, J.-P. Rachen, M. López-Caniego, M., et al., Long-term variability of extragalactic radio sources in the Planck Early Release Compact Source Catalogue, A&A 553 (2013) A107.\n- Planck Collaboration XV, J. Aatrokoski, P. A. R. Ade, et al., Planck early results. XV. Spectral energy distributions and radio continuum spectra of northern extragalactic radio sources, A&A 536 (2011) A15.\n- S. G. Jorstad, A. P. Marscher, V. M. Larionov, et al., Flaring Behavior of the Quasar 3C 454.3 Across the Electromagnetic Spectrum, ApJ 715 (2010) 362.\n- G. Ghisellini, A. Celotti, F. Tavecchio, F. Haardt and T. Sbarrato, Radio-loud active galactic nuclei at high redshifts and the cosmic microwave background, MNRAS 438 (2014) 2694.\n- G. Miley and C. De Breuck, Distant radio galaxies and their environments, A&A Rev. 15 (2008) 67.\n- P. Giommi, G. Polenta, A. Lähteenmäki, et al., Simultaneous Planck, Swift, and Fermi observations of X-ray and gamma-ray selected blazars, A&A 541 (2012) A160.\n- D. Dallacasa, C. Stanghellini, M. Centonza and R. Fanti, High frequency peakers. I. The bright sample, A&A 363 (2000) 887.\n- G. De Zotti, M. Massardi, M. Negrello an J. Wall, Radio and millimeter continuum surveys and their astrophysical implications, A&A Rev. 18 (2010) 1.\n- G. De Zotti, G. L. Granato, L. Silva, D. Maino and L. Danese, An evolutionary model for GHz peaked spectrum sources. Predictions for high frequency surveys, A&A 354 (2000) 467.\n- S. Tinti, D. Dallacasa, G. De Zotti, A. Celotti and C. Stanghellini, High Frequency Peakers: Young radio sources or flaring blazars?, A&A 432 (2005) 31.\n- S. Tinti and G. De Zotti, Constraints on evolutionary properties of GHz Peaked Spectrum galaxies, A&A 445 (2006) 889.\n- A. Bonaldi, L. Bonavera, M. Massardi and G. De Zotti, The Planck-ATCA Co-eval Observations project: the spectrally selected sample, MNRAS 428 (2013) 1845.\n- P. J. Hancock, E. M. Sadler, E. K. Mahony and R. Ricci, Observations and properties of candidate high-frequency GPS radio sources in the AT20G survey, MNRAS 408 (2010) 1187.\n- M. S. Clemens, M. Negrello, G. De Zotti, et al., Dust and star formation properties of a complete sample of local galaxies drawn from the Planck Early Release Compact Source Catalogue, MNRAS 433 (2013) 695.\n- C. P. Ahn, R. Alexandroff, C. Allende Prieto, et al., The Tenth Data Release of the Sloan Digital Sky Survey: First Spectroscopic Data from the SDSS-III Apache Point Observatory Galactic Evolution Experiment, ApJS 211 (2014) 17.\n- J. P. Huchra, L. M. Macri, K. L. Masters, et al., The 2MASS Redshift Survey—Description and Data Release, ApJS 199 (2012) 26.\n- W. Saunders, W. J. Sutherland, S. J. Maddox, et al., The PSCz catalogue, MNRAS 317 (2000) 55.\n- D. H. Jones, M. A. Read, W. Saunders, et al., The 6dF Galaxy Survey: final redshift release (DR3) and southern large-scale structures, MNRAS 399 (2009) 683.\n- M. Colless, B. A. Peterson, C. Jackson, et al., The 2dF Galaxy Redshift Survey: Final Data Release (2003) [arXiv:astro-ph/0306581]\n- G. Lavaux and M. J. Hudson, The 2M galaxy redshift catalogue, MNRAS 416 (2011) 2840.\n- M. Bilicki, T. H. Jarrett, J. A. Peacock, M. E. Cluver and L. Steward, Two Micron All Sky Survey Photometric Redshift Catalog: A Comprehensive Three-dimensional Census of the Whole Sky, ApJS 210 (2014) 9.\n- M. Brescia, S. Cavuoti, G. Longo and V. De Stefano, A catalogue of photometric redshifts for the SDSS-DR9 galaxies, A&A 568 (2014) A126.\n- L. Wang, M. Rowan-Robinson, P. Norberg, S. Heinis, J. Han, J., The Revised IRAS-FSC Redshift Catalogue (RIFSCz), MNRAS 442 (2014) 2739.\n- E. L. Wright, P. R. M. Eisenhardt, A. Mainzer, et al., The Wide-field Infrared Survey Explorer (WISE): Mission Description and Initial On-orbit Performance, AJ 140 (2010) 1868.\n- M. Bilicki, J. A. Peacock, T. H. Jarrett, M. E. Cluver and L. Steward, Mapping the Cosmic Web with the largest all-sky surveys (2014) [arXiv:1408.0799].\n- R. Laureijs, J. Amiaux, S. Arduini, et al., Euclid Definition Study Report, (2011) [arXiv:1110.3193].\n- R. S. de Jong, O. Bellido-Tirado, C. Chiappini, et al., 4MOST: 4-metre multi-object spectroscopic telescope, SPIE Conf. Ser. 8446 (2012), 84460T.\n- C. M. Casey, D. Narayanan and A. Cooray, Dusty star-forming galaxies at high redshift, Phys. Rep. 541 (2014) 45.\n- G. L. Granato, G. De Zotti, L. Silva, A. Bressan and L. Danese, A Physical Model for the Coevolution of QSOs and Their Spheroidal Hosts, ApJ 600 (2004) 580.\n- G. L. Granato, L. Silva, P. Monaco, P. Panuzzo, P. Salucci, G. De Zotti and L. Danese, Joint formation of QSOs and spheroids: QSOs as clocks of star formation in spheroids, MNRAS 324 (2001) 757.\n- S. J. Lilly, S. A. Eales, W. K. P. Gear, et al., The Canada-United Kingdom Deep Submillimeter Survey. II. First Identifications, Redshifts, and Implications for Galaxy Evolution, ApJ 518 (1999) 641.\n- A. J. Barger, L. L. Cowie, C. C. Chen, et al., Is There a Maximum Star Formation Rate in High-redshift Galaxies?, ApJ 784 (2014) 9.\n- M. Béthermin, H. Dole, G. Lagache, D. Le Borgne and A. Penin, Modeling the evolution of infrared galaxies: a parametric backward evolution model, A&A 529 (2011) A4.\n- C. Gruppioni, F. Pozzi, G. Rodighiero, et al., The Herschel PEP/HerMES luminosity function - I. Probing the evolution of PACS selected Galaxies to , MNRAS 432 (2013) 23.\n- A. Lapi, J. González-Nuevo, L. Fan, et al., Herschel-ATLAS Galaxy Counts and High-redshift Luminosity Functions: The Formation of Massive Early-type Galaxies, ApJ 742 (2011) 24.\n- R. S. Bussmann, I. Pérez-Fournon, S. Amber, S., et al., Gravitational Lens Models Based on Submillimeter Array Imaging of Herschel-selected Strongly Lensed Sub-millimeter Galaxies at , ApJ 779 (2013) 25.\n- Messias, H., Dye, S., Nagar, N., et al., Herschel-ATLAS and ALMA. HATLAS J142935.3-002836, a lensed major merger at redshift 1.027, A&A 568 (2014) A92.\n- M. Negrello, R. Hopwood, G. De Zotti, et al., The Detection of a Population of Submillimeter-Bright, Strongly Lensed Galaxies, Science 330 (2010) 800.\n- M. Negrello, R. Hopwood, S. Dye, et al., Herschel-ATLAS: deep HST/WFC3 imaging of strongly lensed submillimetre galaxies, MNRAS 440 (2014) 1999.\n- M. Negrello, F. Perrotta, J. González-Nuevo, et al., Astrophysical and cosmological information from large-scale submillimetre surveys of extragalactic sources, MNRAS 377 (2007) 1557.\n- F. Combes, M. Rex, T. D. Rawle, T. D., et al., A bright lensed submillimeter galaxy in the field of Abell 773. HLSJ, A&A 538 (2012) L4.\n- H. Dole, e al., Herschel Unveils Enigmatic Planck Extreme high-Â Source Candidates: Overview, ESA Symp. “The Universe Explored by Herschel” (2013)\n- H. Fu, E. Jullo, A. Cooray, et al., A Comprehensive View of a Strongly Lensed Planck-Associated Submillimeter Galaxy, ApJ 753 (2012) 134.\n- D. Herranz, J. González-Nuevo, D. L. Clements, et al., Herschel-ATLAS: Planck sources in the phase 1 fields, A&A 549 (2013) A31.\n- L. Montier, Planck and Herschel, in 47th ESLAB Symp. “The Universe as seen by Planck”, (2013)\n- M. Bonato, M. Negrello, Z.-Y. Cai, et al., Exploring the early dust-obscured phase of galaxy formation with blind mid-/far-infrared spectroscopic surveys, MNRAS 438 (2014) 2547.\n- A. Weiß, C. De Breuck, D. P. Marrone, et al., ALMA Redshifts of Millimeter-selected Galaxies from the SPT Survey: The Redshift Distribution of Dusty Star-forming Galaxies, ApJ 767 (2013) 88.\n- A. W. Blain and M. S. Longair, Submillimetre Cosmology, MNRAS 264 (1993) 509.\n- A. Franceschini, L. Toffolatti, P. Mazzei, L. Danese and G. De Zotti, Galaxy counts and contributions to the background radiation from 1 micron to 1000 microns, A&AS 89 (1991) 285.\n- T. Treu, Strong Lensing by Galaxies, ARA&A 48 (2010) 87.\n- R. P. Deane, I. Heywood, S. Rawlings and P. J. Marshall, The preferentially magnified active nucleus in IRAS F10214+4724 - II. Spatially resolved cold molecular gas, MNRAS 434 (2013) 23.\n- S. Cao, Y. Pan, M. Biesiada, W. Godlowski and Z.-H. Zhu, Constraints on cosmological models from strong gravitational lensing systems, JCAP 3 (2012) 16.\n- S. Eales, Practical cosmology with lenses, MNRAS 446 (2015) 3224.\n- A. Lapi, M. Negrello, J. González-Nuevo, et al., Effective Models for Statistical Studies of Galaxy-scale Gravitational Lensing, ApJ 755 (2012) 46.\n- M. Lubini, M. Sereno, J. Coles, P. Jetzer and P. Saha, Cosmological parameter determination in free-form strong gravitational lens modelling, MNRAS 437 (2014) 2461.\n- A. Barnacka, M. Geller, I. P. Dell’Antonio and W. Benbow, Strongly Lensed Jets, Time Delays, and the Value of H0 (2014) [arXiv:1408.5898]\n- S. Serjeant, Up to 100,000 Reliable Strong Gravitational Lenses in Future Dark Energy Experiments, ApJ 793 (2014) L10\n- J. F. Claeskens, A. Smette, L. Vandenbuckle and J. Surdej, Identification and redshift determination of quasi-stellar objects with medium-band photometry: application to Gaia, MNRAS 367 (2006) 879.\n- A. A. Dutton, A. V. Macciò, J. T. Mendel and L. Simard, Universal IMF versus dark halo response in early-type galaxies: breaking the degeneracy with the Fundamental Plane, MNRAS 432 (2013) 2496.\n- S. Vegetti, D. J. Lagattuta, J. P. McKean, M. W. Auger, C. D. Fassnacht and L. V. E. Koopmans, Gravitational detection of a low-mass dark satellite galaxy at cosmological distance, Nature 481 (2012) 341.\n- T. E. Collett and M. W. Auger, Cosmological constraints from the double source plane lens SDSSJ, MNRAS 443 (2014) 969.\n- P. Schneider, Can one determine cosmological parameters from multi-plane strong lens systems?, A&A 568 (2014) L2.\n- D. L. Clements, F. G. Braglia, A. K. Hyde, et al., Herschel Multitiered Extragalactic Survey: clusters of dusty galaxies uncovered by Herschel and Planck, MNRAS 439 (2014) 1193.\n- M. Negrello, J. González-Nuevo, M. Magliocchetti, et al., Effect of clustering on extragalactic source counts with low-resolution instruments, MNRAS 358 (2005) 869.\n- S. J. Maddox, L. Dunne, E. Rigby, et al., Herschel-ATLAS: The angular correlation function of submillimetre galaxies at high and low redshift, A&A 518 (2010) L11.\n- M. Magliocchetti, A. Lapi, M. Negrello, G. De Zotti and L. Danese, Cosmic dichotomy in the hosts of rapidly star-forming systems at low and high redshifts, MNRAS 437 (2014) 2263.\n- M. Magliocchetti, P. Santini, G. Rodighiero, et al., The PEP survey: clustering of infrared-selected galaxies and structure formation at in GOODS-South, MNRAS 416 (2011) 1105.\n- P. J. E. Peebles, The large-scale structure of the universe, Princeton University Press (1980).\n- G. L. Granato, C. Ragone-Figueroa, R. Dominguez-Tenreiro, et al., The early phases of galaxy clusters formation in IR: coupling hydrodynamical simulations with GRASIL3D, (2014) [arXiv:1412.6105]\n- Z. Zheng, A. A. Berlind, D. H. Weinberg, et al., Theoretical Models of the Halo Occupation Distribution: Separating Central and Satellite Galaxies, ApJ 633 (2005) 791.\n- M. Béthermin, L. Wang, O. Doré, et al., The redshift evolution of the distribution of star formation among dark matter halos as seen in the infrared, A&A 557 (2013) A66.\n- J.-Q. Xia, M. Negrello, A. Lapi, et al., Clustering of submillimetre galaxies in a self-regulated baryon collapse model, MNRAS 422 (2012) 1324.\n- G. De Zotti, C. Gruppioni, P. Ciliegi, C. Burigana and L. Danese, Polarization fluctuations due to extragalactic sources, New Astr. 4 (1999) 481.\n- M. Massardi, S. G. Burke-Spolaor, T. Murphy, et al., A polarization survey of bright extragalactic AT20G sources, MNRAS 436 (2013) 2915.\n- J. S. Greaves and W. S. Holland, Submillimetre polarization of M82 and the Galactic Center: Implications for CMB polarimetry, in Astrophysical Polarized Backgrounds, AIP Conf. Proc. 609 (2002) 267.\n- M. Tucci and L. Toffolatti, The Impact of Polarized Extragalactic Radio Sources on the Detection of CMB Anisotropies in Polarization, Advances in Astronomy (2012) 624987." ]
[ "<urn:uuid:eb7d1327-c1e1-46ff-80b2-7cc74ae0132e>" ]
[ "CC-MAIN-2020-05" ]
[ "https://www.groundai.com/project/extragalactic-sources-in-cosmic-microwave-background-maps/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251799918.97/warc/CC-MAIN-20200129133601-20200129163601-00466.warc.gz" ]
[ "en" ]
[ 0.8553650975227356 ]
[ 17795 ]
[ 2.515625 ]
[ 3 ]
[ "Etching by George Sala outlining 'the probable results of the industry of all nations in the year 1851' produced by 'Vates Secundus for the Committee of the Society for keeping things in their places'. On the left hand side is an image of a clown with a telescope and to the right is the grim reaper, both are leaning against posts listing the countries exhibiting. The 'Great Exhibition of the Works of the Industry of all Nations' was conceived by Prince Albert (1819-1861). The Crystal Palace, designed by Joseph Paxton (1801-1865), was purpose-built for the occasion.\n© Science Museum / Science & Society Picture Library" ]
[ "<urn:uuid:94c36826-687d-47b0-b37b-64880485a896>" ]
[ "CC-MAIN-2020-10" ]
[ "https://www.ssplprints.com/image/108632/sala-george-augustus-great-exhibition-wot-is-to-be-1850" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146647.82/warc/CC-MAIN-20200227033058-20200227063058-00058.warc.gz" ]
[ "en" ]
[ 0.9270244240760803 ]
[ 139 ]
[ 2.515625 ]
[ 3 ]
[ "Grass Versus Grain: Question 10\nBy: John Maday\nDrovers recently received an inquiry from a college student conducting research for a public-health class project. She sent a list of questions regarding the relative merits of finishing cattle on grass versus grain-based rations. Her questions, while somewhat biased, reflect common misperceptions of grain feeing and the kinds of question consumers are asking. For that reason, we have adapted the questions and answers into this article, to serve as possible “talking points” for our readers as you encounter similar questions from the public.\nWe’ll be posting the 13 questions, along with our answers, over the next couple weeks. Here is question 10:\nWhy do you think other countries do not primarily feed cattle corn?\nIn countries where grain finishing is not practiced, there can be several reasons including local traditions, consumer preferences, and in many cases, lack of infrastructure for transporting grain or cattle significant distances. Some countries that have traditionally produced grass-finished beef, Brazil in particular, are increasingly building a feedlot sector and moving toward more grain finishing to improve efficiency and meet demand among their export customers.\nIn some beef-producing countries, incorporating some grain finishing along with other modern production technologies could improve efficiency. According to a report from Oklahoma State University, two recent analyses of global livestock systems indicate that North American beef production systems and those in other developed countries have carbon footprints per unit of beef production 10 to 50 times lower as compared to many nations in Africa and Asia. These improvements, according to the report, are “driven by higher-quality (more digestible) feeds, lower impacts of climate stress (heat) on animals, improved animal genetics, advancements in reproductive performance, and the reduced time required for an animal to reach its slaughter weight.” Grain finishing is just one factor in the difference, but it can, in some cases, help improve overall production efficiency.\nSee question 9 from this series here." ]
[ "<urn:uuid:05b97a5d-980c-40df-ba95-87ae0e1ab778>" ]
[ "CC-MAIN-2023-14" ]
[ "https://www.bovinevetonline.com/news/industry/grass-versus-grain-question-10" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948932.75/warc/CC-MAIN-20230329023546-20230329053546-00163.warc.gz" ]
[ "en" ]
[ 0.9453077912330627 ]
[ 407 ]
[ 2.859375 ]
[ 3 ]
[ "Treatment Options for Cognitive Problems in Multiple Sclerosis\nA majority of people with multiple sclerosis (MS) will experience some cognitive changes over the course of the disease. Even though the severity of these changes can vary from mild to quite severe, the majority of these changes are in the mild-to-moderate range.\nAfter you've had a comprehensive cognitive evaluation, you'll work with your doctor as well as the clinician who evaluated you to decide on a treatment plan that works for you.\nThe treatment of cognitive symptoms falls into three categories:\nSymptomatic treatments: Even though a variety of medications have been evaluated, none of them have been shown to be effective in large-scale clinical trials in MS.\nDisease-modifying therapies: All of these therapies — the interferons (Avonex, Betaseron, Extavia, Rebif), Copaxone (glatiramer acetate), Gilenya (fingolimod), Tysabri (natalizumab), and Novantrone (mitoxantrone) — reduce the number and severity of attacks and reduce the number of central nervous system lesions as shown on MRI scans.\nBecause there's fairly extensive evidence to show that cognitive problems are correlated with the total amount of lesion area in the brain (referred to as lesion load), and with the extent of tissue loss (referred to as atrophy) in the brain caused by damage to the neurons, it's reasonable to assume that starting a disease-modifying therapy early in the disease would be a good strategy for reducing the risk and progression of cognitive symptoms.\nSo, if you don't already have reason enough to start treatment with one of the disease-modifying therapies, this could be the powerful incentive you need.\nCognitive remediation: This type of treatment, which is also called cognitive rehabilitation, is a practical, solution-oriented approach to managing cognitive changes. Offered by neuropsychologists, OTs, and S/LPs, cognitive rehabilitation consists of the following interventions:\nRestorative interventions: These interventions are like physical therapy for the brain. The clinician uses your test results to identify areas of deficit and then gives you exercises that may help strengthen the impaired functions.\nThe best examples of this kind of intervention are computerized exercises to improve attention and memory. Even though the research has shown that people's performance on certain types of tasks improves with these exercises, the improvements don't carry over very well to everyday life. After all, how many people live their lives in front of a computer screen with no distractions?\nCompensatory interventions: These seem, by all accounts, to be the most useful. They consist of finding workarounds, or strategies to compensate for whatever cognitive abilities have been compromised.\nIn the same way that people use calendars to help themselves remember dates and computers to make it easier and faster to process information, the cognitive rehabilitation specialist can help you can identify tools and strategies that take advantage of your cognitive strengths to compensate for whatever problems you're having.\nAlthough there are an unlimited variety of workaround possibilities, the most common ones involve substituting organization for memory — for example, lists, filing systems, work and family calendars, and \"tickler\" mechanisms, such as alarms on your watch or computer to remind you to take a medication or go to an appointment. The remediation specialist can also recommend strategies to improve attention, reading comprehension, executive functions, and others.\nOther factors like depression, anxiety, and stress also can affect cognition, so be sure to talk with your doctor if you're concerned that any of these problems may be interfering with your thinking or memory." ]
[ "<urn:uuid:7dfde9ef-fb88-41fa-87e4-17107a1cb3ca>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.dummies.com/how-to/content/treatment-options-for-cognitive-problems-in-multip.navId-811935.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00017-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.944952130317688 ]
[ 747 ]
[ 2.59375 ]
[ 3 ]
[ "N. John Habraken began developing methods for what is now called “meta-design” in the 1960s. Responding to the post-war need for housing in Western Europe, Habraken and his Eindhoven research group (the SAR) developed a method for designing housing that, as opposed to cookie-cutter mass-housing approaches, provided variability in floor plans and flexibility over time. His method distinguished the “support” or shared infrastructure parts of a design from the “infill” parts that could be changed freely. This distinction allowed designers to work independently on different “levels” of a design, and to evaluate the capacity of a design at one level to support or contain a variety of lower-level designs. A designer at one level provides a context for lower-level designers to make decisions, which ultimately determine the freedom that “end users” have to operate—in the case of housing, the freedom of inhabitants to arrange the furniture.\nHabraken showed that organizing a design process this way produces designs that can more easily be changed over the building life-cycle—a relevant property for designs that must last decades or even centuries. (Stewart Brand’s popular book How Buildings Learn celebrates this principle). But Habraken went beyond theory:\nTo implement his ideas Habraken developed technical notation—a system of grids and charts—for documenting designs and design rules and procedures for systematically developing and testing designs formulated in this notation. He showed how, using his methods, designers could systematically explore a design space. This enables a designer to develop supports (meta-designs) that allow more infill variability and flexibility. He began with buildings, but soon expanded his scope to urban design.\nHabraken’s design methods, first described as the “SAR method” in the 1960s later became known as “Open Building” because unlike most kit-of-parts modular coordination systems, the method does not restrict designers to a single closed system of components from a single manufacturer.\nHabraken’s technical design method was predicated on observations of the built environment: the existence of dependency hierarchies. He recognized several hierarchies or orders in the built environment: Structure, Territory, and Supply. The order of structure or gravity deals with how the world is assembled (e.g., the foundation supports walls above, which support the floors). The order of territory deals with spatial containment (e.g., the city block contains the lot, which contains the building, which contains the apartment). The order of supply deals with the directional networks of pipes and wires that provide water, gas, and electricity. These three physical hierarchies are properties of the real world that in turn imply hierarchies of control in design. Therefore a method that acknowledges these hierarchies can be more efficient and produce better designs.\nHabraken’s notation was adopted in the Dutch building code, and his design methods were employed in many developing countries for building housing. But Habraken’s ideas never made it in mainstream architecture. Perhaps his systematic methods and ways of talking about the built environment were too technical for the culture of professional architecture. And although he developed methods for designing built environments, Habraken was always interested in whether his observations might apply to design fields beyond architecture (such as VLSI) and he was always interested in cross-disciplinary campus conversations on design.\nHabraken’s work on meta-design is relevant to collaborative design and participatory design, but it never gained a foothold in either of these fields. His method for collaboration in design was based on a hierarchical partitioning of concerns. During the 1980s, as the emerging field of computer-supported collaborative work (CSCW) gained momentum, this hierarchic way of working together by separating concerns did not fit mainstream CSCW. And although Habraken’s original motivation was to empower end users in the design of their housing, his systematic view also did not fit the prevailing tenets of participatory design." ]
[ "<urn:uuid:65b5cbc5-5cc9-4ea8-8cea-b742ebb5dfc0>" ]
[ "CC-MAIN-2020-10" ]
[ "http://mdgross.net/2011/05/28/n-john-habraken-and-meta-design/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145500.90/warc/CC-MAIN-20200221080411-20200221110411-00249.warc.gz" ]
[ "en" ]
[ 0.96736741065979 ]
[ 838 ]
[ 2.96875 ]
[ 3 ]
[ "24 Mar KRIPA RESEARCH\n- Scientific and Industrial Research Organization (SIRO) enabling us to offer 35(1) (iii).\n- Research carried out in various dimensions of Chemical Dependency and HIV AIDs.\n- Publications in National and International Journals.\n- Kripa Educational Material- IEC material, Books, Monographs.\nWhat is Research?\nResearch is a systematic process of observing, assessing, collecting data or information, in order to answer questions, to explore, analyse, examine, or better understand phenomena and various associations among them, to establish facts and to enable new learning based on critical inquiry, which is disseminated and integrated into practice." ]
[ "<urn:uuid:d2088da4-373d-43eb-9dcd-fca71d198e10>" ]
[ "CC-MAIN-2020-05" ]
[ "https://kripafoundation.org/kripa-research/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251728207.68/warc/CC-MAIN-20200127205148-20200127235148-00199.warc.gz" ]
[ "en" ]
[ 0.8749346137046814 ]
[ 139 ]
[ 2.625 ]
[ 3 ]
[ "Body's anti-HIV 'training manual' offers vaccine hopes\nThe body's own \"training manual\" for attacking HIV has been recorded by US scientists and it is hoped it can be used to design vaccines.\nHIV mutates in order to survive the onslaught of a patient's immune system.\nHowever, some patients develop highly effective antibodies that can neutralise huge swathes of HIV mutants.\nA North Carolina team analysed the arms race between body and virus, published in the journal Nature, and has shown how these antibodies are made.\nWhen someone is infected with HIV, their body produces antibodies to attack it. But the virus mutates and evades the offensive, so the body produces new antibodies that the virus then evades and the war goes on.\nHowever, after about four years of this struggle some patients hit on to a winner by targeting something the virus finds harder to change - an Achilles heel.\n\"Even though the virus mutates and there are literally millions of quasi-species of virus because of all these mutations, but there are parts the virus can't change otherwise the virus cannot infect - these are the vulnerable sites,\" Prof Barton Haynes, of Duke University, in North Carolina, told the BBC.\nAt this stage of the infection it is far too late to make a difference for the patient as the virus is hiding in untouchable reservoirs.\nHowever, some researchers believe that vaccines that encourage the body to produce these \"broadly neutralising antibodies\" may give people immunity to the virus.\nThe research team's study is based on a patient in Africa who had a rapid diagnosis, about four weeks after being infected with the virus.\nThey were eventually able to produce an antibody named CH103 that could neutralise 55% of HIV samples.\nIt was not produced in one easy step. Rather it was the product of the war of the immune system and HIV trying to out-evolve each other.\nHowever, through regular genetic analyses of both the immune system and virus, researchers could piece together each of the steps that culminated in the production of CH103.\nIt is like a training manual for the immune system.\nProf Haynes said: \"What we were able to do was map out the arms race of both virus and antibody, and in doing so we have now a map.\n\"This is the first time we've been able to see the actual road map.\"\nHe said the challenge now was to see if re-creating those steps could lead to a viable vaccine.\nHowever, he said it would almost certainly need to be a vaccine combining multiple \"Achilles heels\" - in the same way that HIV therapies are a combination of drug treatments.\nProf Jane Anderson, consultant at Homerton hospital in London and chair of the British HIV Association, said: \"The study gives important insights into the ways in which the human immune system responds to HIV infection and increases our understanding about the relationships between the virus and the human host.\n\"This is another welcome step on the path to develop vaccines against HIV.\"\nDr Sarah Joseph, who tests HIV vaccines at the Medical Research Council clinical trials unit, said: \"This paper is really interesting. Some people do make antibodies that neutralise a lot of HIV virus, bit it is not of use to them as they produce it way too late.\"\nShe said harnessing these antibodies \"could be a big deal\" and there was \"even talk about mass-producing antibodies and infusing people with them\"." ]
[ "<urn:uuid:cde18678-cc30-4c5c-a69d-39b61b1560d1>" ]
[ "CC-MAIN-2017-26" ]
[ "http://www.bbc.com/news/health-22002455" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320873.54/warc/CC-MAIN-20170626235612-20170627015612-00328.warc.gz" ]
[ "en" ]
[ 0.964514970779419 ]
[ 711 ]
[ 2.828125 ]
[ 3 ]
[ "AEM target detection in geological noise\nAndy Green and Don Hunter\nASEG Extended Abstracts\n2004(1) 1 - 4\nTarget selection and ranking is a critical aspect of mineral exploration that is complicated when the host geology either masks or mimics the responses from targets of interest. The approach described here uses statistical signal processing techniques, specifically matched filtering, to help recognise targets in the presence of such confusing effects. The essence of this approach is to assume that the data are composed of noise, generated by the background geology, and signals generated by targets of exploration interest. It is this recognition of the geology as a noise source, which allows traditional signal processing strategies to be applied to the problem. The critical step, absolutely necessary to success, involves pre-whitening the data so that those characteristics of the target that are as different as possible from this ``geological noise' are emphasised. Matched filtering is a well-established technique in fields other than mineral exploration. Work here has shown that, in many instances, it can also be applied successfully to AEM data. It provides a useful way of highlighting targets for further investigation by simplifying the interpretation process and filtering out many complex anomalies that are not feasible targets. This paper presents some of the necessary theory and the results of a number of case studies where the technique has been applied.\nFull text doi:10.1071/ASEG2004ab055\n© ASEG 2004" ]
[ "<urn:uuid:c1f91115-7c43-4101-bba9-0918457e496e>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.publish.csiro.au/paper/ASEG2004ab055.htm" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00001-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9161055684089661 ]
[ 295 ]
[ 2.59375 ]
[ 3 ]
[ "The Yellowstone (USA) and the Aira (Japan) supervolcanoes are connected. The unity of people can change the future!\nTwo years ago the world saw a game-changing popular science report \"On the Problems and Consequences of Global Climate Change on Earth. Effective Ways to Solve These Problems“, where apart from a large bulk of useful and necessary information for mankind you can find the following lines:\n«The conducted research identified an extremely alarming fact. Judging by the graphs of neutrino emission and the intensity of the septon field of the Earth, there is a close parallelism between the processes taking place in the most ancient calderas - Aira caldera (Kagoshima Prefecture, Kyushu region, Japan) and Yellowstone Caldera (Wyoming, USA), despite the fact that they are separated by the Pacific plate.\nIt has been observed that the processes taking place in their interior, are interconnected in some way and are often interdependent. It was determined that even after the activation of adaptive mechanisms in Aira caldera, neutrino emission and the septon field intensity recorded both in the area of Aira caldera (Japan) and the Yellowstone Caldera (USA), remained practically identical. The graph shows the curve that indicates their steady growth, despite the artificial restraint on the seismic activity in Aira caldera with adaptive mechanisms. All these and many other facts point at the accumulation of energy in the Earth's interior, which, when released, may trigger a devastating worldwide catastrophe. According to the calculations made by our experts, this will happen in the coming decades. In case of a simultaneous eruption of the two supervolcanoes (Aira Caldera and the Yellowstone Caldera) located in different parts of the world, there is a threat of a total annihilation of mankind…»\nThe connection between Aira caldera and the Yellowstone caldera is evident, when we trace the activity of these supervolcanoes from the moment of the report publication to the present day. The Japanese scientists continue to monitor the seismic activity in Aira caldera almost all the time during the last 2 years.\nRelying on news reports and online publications, there is a further point to be made. Starting from February 2015 Sakurajima volcano at Aira caldera shows strong activity. 10 or more explosions take place there every day. As a rule, Sakurajima sets off explosions of strombolian type 1-2 times a day, which can be sometimes of considerable dimensions and push volcanic ash to the height of several kilometers. Since 1955 the volcano activity has been observed, but it varies in intensity and rhythms from weeks to a few months. However, in 2015 the volcano activity significantly increased. On August 15, 2015 the volcano had the 4th out of 5 possible volcano alert levels.\nJapanese geophysicists together with colleagues from the USA studied the deformation of the land surface near Aira caldera, where the volcano is located, combining the measured data from GPS-satellites with the geophysical data and computer 3D-models. According to the results, the chamber is filling with magma at a very rapid pace now, what makes the reservoir expanse and the soil swell. It is filled with about 14 million cubic meters annually. This huge volume does not manage to crop out as a result of regular and small eruptions of Sakurajima. Thus, even according to the orthodox science the expanding magma chamber beneath Aira caldera and Sakurajima volcano indicates a high probability of its awakening in the next 30 years.\nFigure1. Best fit model of deformation vectors and source location (The article «Thermomechanical controls on magma supply and volcanic deformation: application to Aira caldera, Japan\" in the journal Nature. The link to the source).\nBlack arrows indicate GPS measurements (1996-2007) with 95% confidence limits, while red arrows indicate the best-fit model surface displacements, for vertical (a) and horizontal(b) components. The blue circle shows the surface projection of the best-fit source from this study, with the cross indicating its center. For comparison, the green triangle represents the center of the location of the strain source according to the analytical model for the same period. The GPS station names are indicated. The inverted black triangle indicates the location of a GEONET GPS continuous operation station and the dotted line represents the pressure loop in the post-caldera Wakamiko. The map was created in GMT 4 editor.\nThen there are examples of the underground activity processes in Yellowstone National Park and its adjacent areas.\nOver the past two years, about ten cases of formation of cracks, faults and ground faults have been recorded in the United States.It is assumed that the hot springs blurred the lower layers of soil, and provoked the formation of cracks. The processes related to the erosion of the upper layers of eroded land and abundant gas emissions have made it only worse.\nIn 2016, emissions of carbon monoxide had been recorded in a row along the fault lines of San Andreas within 16 weeks. The peak days were 11th and 27th of February, 2016. On March 1, 2016 scientists managed to find huge amounts of carbon monoxide, remaining under the solid rock. This fact can be related with other anomalies - mass deaths of birds and fish in the United States during the same period. On March 11, 2016 there was a crash in the lake of the Yellowstone caldera, which was heard by its visitors.\nOn April 13, 2016 the formation of the volcanic hole was discovered, which appeared in the Shoshone River in the east of the Yellowstone supervolcano. As far back as the 25th of March, 2016 volcanologists found evidence of the geothermal activity. Then the formation of a large crack on the surface of the river bottom was recorded. A new emerging geyser started to go off from the crack. There is another confirmation, which lies in the rising temperature of the earth's surface and the surface water in the territory of the park. Also it includes the water temperature of Boiling River starting from September 2012.\nFigure 2. The blue line indicates the change in water temperature of the Boiling River since 01/09/2012 till 01/11/2016 according to the US Geological Survey (USGS). Orange dots denote the average water temperature, which was averaged in 12 years. On the left there is a Celsius scale temperature, on the right– a Fahrenheit scale temperature. The link to the source.\nAlso in 2016 there was a record of 58.9 degrees Celsius temperature in the Boiling River for the past 14 years. Earlier there was a theme-based article on the website ALLATRA SCIENCE: The Yellowstone supervolcano is wakening up. What can each of us undertake?\nHere is the list of the earthquakes in the USA. (The source link)\nFigure 3. The area of statistical data sample.\nIn 2015, the USA saw 61,965 earthquakes all together with its total energy of 1,00786E + 15J., where 8753 earthquakes had the magnitude> 2 with its total energy of 9,18E + 14J.\nFigure 4: The total energy of earthquakes with magnitude> 2 for the period 2001-2015.\nFigure 5: The number of earthquakes with magnitude> 2 for the period 2001-2015.\nThe graphs help us to trace an unusual regular pattern of the decline of energy and increase in earthquakes since 2010. The tendency continues in 2016. It is noteworthy that in March 2014 the Yellowstone supervolcano was on the verge of eruption, and only by God's providence, which is beyond our comprehension, the disaster did not happen.\nSummarizing these facts, it becomes clear that they prove the synchronization of the processes occurring in the bowels of the calderas. You can get more information about the graphs of scientific observations of seismic, septon and neutrino activity synchronization of these supervolcanoes by reading the ALLATRA SCIENCE climate report.\nThe report also shows the seriousness of the situation and its possible consequences [note that the numbers and dates are as of November 2014]:\n«For example, observations of a typical behavior of neutrinos and the septon field made during the research in the field of volcanology and seismology, make it possible to draw the following conclusions already now. The probability that the Japanese archipelago and the life on it may be destroyed in the next 10 years as a result of major eruptions and earthquakes equals 70%. At the same time, the probability that this will happen within the next 18 years is 99%. Taking into account the influence of cosmic factors as well as the increased seismic and volcanic activity in this region, a global catastrophe could happen at any moment. This raises a particular concern for the people living on these areas, and it gives a clear understanding of the fact that it is necessary to consolidate efforts of the international community already now in order to contribute to the saving of the lives of more than 127 million people and move them to the continent, to safer regions, in advance».\nCONCLUSION: Considering the danger of the impending global cataclysm, people must change their attitude towards the society and themselves here and now. In this regard, it is extremely important to change globally and quickly the values of the society from a consumer format to a spiritual, moral and creative one where kindness, humanity, conscience, mutual friendship, the dominance of the spiritual and moral principles would come first in relations between people, regardless of their nationality, religion, social status and other conventional, artificial divisions of the world community. If all people strive to make a convenient life for each other, then in this life they will save themselves and their future...\nStrange things happen in this world. When one of the TV stars makes unusual statements, or, for example, buys a new house, for many people such news is of paramount importance and worthy for attention. And when leading scientists report on a global, imminent danger for all living beings, and what is more important - on the real ways to solve these problems, people act as if they did not hear anything.\nAll people of good will are able to take an active part in changing the current situation, that is to change the global society ideology from a consumer way of thinking to a spiritual and creative one, to approve mutual priorities in the society, friendship, spiritual and moral relations between people.This words should not be only words but they should be turned into deeds. People need to get rid of all limits and conventions. They need to consolidate here and now. The nature does not look at grades and ranks when she brings down her millennial fury, and only the manifestation of a true commonwealth between people, based on human kindness, can give the humanity a chance to survive...\nUNITY OF ALL PEOPLE IS THE KEY FOR MANKIND’S SURVIVAL!" ]
[ "<urn:uuid:9c4930d4-1c46-43a8-8fb8-ed2a59a9bfaa>" ]
[ "CC-MAIN-2020-05" ]
[ "https://geocenter.info/en/article/supervolcano-yellowstone-aira-svjazany" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250607407.48/warc/CC-MAIN-20200122191620-20200122220620-00166.warc.gz" ]
[ "en" ]
[ 0.9384638667106628 ]
[ 2251 ]
[ 2.71875 ]
[ 3 ]
[ "Primary Generalized Seizures\nGeneralized seizures affect both cerebral hemispheres (sides of the brain) from the beginning of the seizure. It is also possible that a partial seizure can generalize (or spread to other parts of the brain) and turn into a generalized seizure.\nGeneralized seizures produce loss of consciousness, either briefly or for a longer period of time, and are sub-categorized into several major types: generalized tonic clonic; tonic; myoclonic; absence; and atonic.\nThere are also many epilepsy syndromes which each affect the person in a different way." ]
[ "<urn:uuid:33a5de04-edd0-4d6b-9938-77efc0e87a44>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.epilepsyfoundation.org/aboutepilepsy/seizures/genconvulsive/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00042-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9357645511627197 ]
[ 127 ]
[ 3.125 ]
[ 3 ]
[ "Despite the recognition of the importance, and a slew of programmes and projects focusing on watershed development, the scenario today is typified with a sense of lost focus and minimal effectiveness.\nOne of the major concerns that is gaining widespread acceptance, at least in the research community (and discussed at length in the TEEB report on wetlands) is that much of water resource development that have been undertaken to increase access to water have not given adequate consideration to harmful trade-offs with other services provided by wetlands, and many such conversions of wetlands have favoured provisioning services (notably food production) at the expense of losing or reducing delivery of regulating and supporting services. Given the often high values, and the diversity of ecosystem services provided by intact wetlands, and that a large proportion of these values are from services such as regulation of water flows, moderation of extreme events and water purification, the widespread and major losses of all types of inland and coastal wetlands have led to a situation where the ecosystem services of wetlands are poorly delivered to people.\nPermitting the remaining wetlands to be converted or letting them degrade means further loss of their value to people. Such costs of inaction (or actions to convert wetlands) can be very high. Global research provides much needed evidence of this scenario which citizens of Chennai can well relate to: the loss of one hectare of wetland is estimated to correspond to an average increase in storm damage from specific storms of $33,000. The costs of just one summer flooding event in the UK, in 2007, are estimated at £3.2 billion ($ 5.2 billion), with damage and costs occurring largely in areas of former river floodplain converted through urban, industrial and infrastructure developments.\nWhen wetlands have been allowed to be lost or degraded, there is a second category of the cost of such inaction: the cost of restoration. Overall, whilst costs of restoration can be high, and require long term management investment, the resulting economic benefits to people can outweigh such costs. However, in general even with active restoration interventions, once wetlands have been disturbed, they either recover slowly (over decades or centuries) or move towards alternate states that differ from their original (pre-disturbance) state. Removing the stressors or pressures on the ecological character of existing wetlands is the best practice for preventing further loss and degradation. When this is not feasible or when degradation has already occurred, wetland restoration must be considered as a potential response option. Some wetland restoration efforts have failed due to, among other things, narrow objectives which focus on one benefit or a partial package of benefits. These failures, once accepted could form the bedrock for a more multi-purpose, scientific restoration of wetlands that are case specific. The commitments and obligations under the Ramsar Convention clearly mandate wise use and the avoidance of wetland loss and degradation as the first and highest priority. The Convention has also provided national governments and others with a framework on how to avoid, mitigate and compensate for wetland loss and degradation, which includes identification of the opportunities for wetland restoration.\nThe recently enacted National Wetland Rules are based on the principles outlined by the Ramsar Convention, and the State Wetland Authority of Tamil Nadu (constituted in 2016) cannot afford inaction.\n— The writer is Managing Trustee, Care Earth" ]
[ "<urn:uuid:b3274ddb-bf43-4ccd-903e-583d4d58ab64>" ]
[ "CC-MAIN-2017-26" ]
[ "http://www.dtnext.in/News/Opinion/2017/04/18091759/1031601/Cost-of-inaction-on-water-development-immeasurable.vpf?TId=112142" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321553.70/warc/CC-MAIN-20170627203405-20170627223405-00709.warc.gz" ]
[ "en" ]
[ 0.9582961797714233 ]
[ 663 ]
[ 3.34375 ]
[ 3 ]
[ "A dysfunctional family either fails to perform the tasks that fulfill the purpose of the family or only manages to perform them using harmful or counter-productive methods. It’s a system that doesn’t work very well or one that hurts the people in it. Counter-productive actions are repeated again and again until they become an intrinsic part of the system. In a dysfunctional family the ends are always valued above the means.\nThe Purpose of Family\nFamilies exist so that their members share with and nourish each other physically, mentally, emotionally, and spiritually. In other words, families exist so that human beings can develop and thrive.\nHowever, when the basics of life such as making a living or caring for children become immersed in addictions, lies, violence, or emotional abuse, the family system becomes dysfunctional.\nDysfunction is Generated by Misguided Attempts to Solve Problems\nAll dysfunctional behavior patterns grow out of actions and attitudes that were supposed to solve a problem. How does this work? Suppose Dad hates his job. He may feel he has no other way to support the family. He may fear financial catastrophe might result if he quit to look for a new job. He might start to drink as a way to cope with the stress.\nSince Dad’s drinking allows him to (just barely) tolerate working at a job he hates, this behaviour becomes accepted as part of the family system. However, Dad’s “solution” to the job problem may start to backfire– his drinking may start to have severe and unpleasant consequences for Dad and for the other family members. But since the family members think the drinking helps hold things together, they tolerate, deny, minimize or otherwise discount the severity of the problem.\nOver time, Dad’s supposed solution to the job problem becomes a problem in and of itself. In other words, not only does Dad have a problem with his job, Dad and the rest of the family now have to cope with a new problem, Dad’s drinking. Dad and the family members all develop various strategies for dealing with the drinking. Below of some of the coping strategies commonly enacted by dysfunctional families:\nNon-communication and Secrecy are Signs of Family Dysfunction\nBecause dysfunctional families believe they are dependent upon their patterns to survive, it becomes the unwritten rule not to talk about feelings or any activities or actions thought of as shameful. To talk about feelings or disclose a secret only brings up pain, which the family feels is unsolvable and unbearable.\nFamily members learn explicitly or unconsciously that they should never be vulnerable, never open up to ‘outsiders’, and do their best to stuff any feelings that are deemed unacceptable.\nChronic Anger and Fear are Signs of Family Dysfunction\nAs a result of the lack of communication and the existence of shameful secrets, family members live with a constant level of anger and fear. Anger and fear become a part of the fabric of everyday life to an extent that family members’ no longer even notice it. However, they pay the physical price associated with constant anger and fear in terms of their health, their relationships outside the family, and their self-esteem.\nUnhealthy Competition is a Sign of Family Dysfunction\nThe dysfunctional family operates within a model of scarcity — that there is a severely limited amount of love, time, money, food, clothing, safety, etc. The members of the family learn that all of these things must be earned through competition. Rather than developing means of working together, family members pit themselves against each other. Competitiveness exacerbates all of the problems listed here.\nUnequal Power Structures are Signs of Family Dysfunction\nMost dysfunctional families consolidate power in the hands of one or two members. Those members get to make decisions that rightfully should be made by others. Rather than every member of the family being empowered to make decisions appropriate to their developmental stage, one or two members make all the decisions for everyone, indefinitely.\nFor example, it is an appropriate use of parental power to assemble portions of food on a three-year- old’s plate, and to cut up large pieces of food into bite-size pieces. But there is no need to portion or cut up food for a ten-year-old. Controlling behavior like this can have severe consequences for both the controller and the controllee, but in the moment, unequal division of power seems like the best way to maintain the fragile balance of the dysfunctional family.\nInappropriate Dependence is a Sign of Family Dysfunction\nBecause most of the family members were not allowed their own power for fear they might rock the fragile boat, they developed inappropriate dependence. Dependence props up and helps perpetuate unequal power structures.\nFor example, the ten-year-old who was not permitted to portion and cut up his own food may develop into a young man who is uncertain, afraid, and de-skilled. People raised in dysfunctional families are often being terrified to let go of destructive patterns. However baffling it may be to people outside the family, they cling to destructive patterns like their lives depend on it.\nRigid Roles Within the Family are Signs of Family Dysfunction\nIn addition to these characteristics, members of dysfunctional family systems resort to taking on roles within the family that allow them to tolerate both the root problem (e.g. Dad’s drinking) and the other symptoms of dysfunctions (e.g. non-communication, anger and fear etc.). These roles help the family members maintain the appearance of equilibrium but allow the core reasons for the dysfunction to remain unchallenged.\nConsider the Family as a Whole\nHanging on to destructive behaviour patterns is designed to keep the ailing family system functioning as smoothly as it can under the circumstances. The destructive behaviour patterns become second nature, part of basic survival mechanisms which are carried over into subsequent situations.\nThe dysfunctional patterns that occur are many and varied. What is key in understanding dysfunctional families is that the dynamics only make sense if you consider the overall family dynamics. In a family everything affects everything else. No behavior pattern develops in isolation, they impact and are impacted by other patterns in the family.\nThe fact that families function as a systemic whole is good news for individuals who want to change destructive patterns. Because the behavior patterns of the individuals, a change in one individual’s behavior brings about shifts and changes in the behaviors of other family members.\nIt takes time to change ingrained patterns, but with steady persistence, change will occur. To take a stand against destructive patterns in your family, be sure to examine your methods as well as your goals. Since dysfunction occurs when people behave as though ‘the ends justify the means’, as you grow and change, put equal emphasis on both means and ends. By embracing both process and product, we can leave dysfunction behind in favour of creativity, love, flexibility, and happiness." ]
[ "<urn:uuid:03099178-8ff3-4774-9004-7f670bcdb8ee>" ]
[ "CC-MAIN-2023-14" ]
[ "https://iowalum.com/what-is-a-dysfunctional-family/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948609.41/warc/CC-MAIN-20230327060940-20230327090940-00385.warc.gz" ]
[ "en" ]
[ 0.9662051200866699 ]
[ 1414 ]
[ 3.03125 ]
[ 3 ]