text
sequencelengths
1
1
id
sequencelengths
1
1
dump
sequencelengths
1
1
url
sequencelengths
1
1
file_path
sequencelengths
1
1
language
sequencelengths
1
1
language_score
sequencelengths
1
1
token_count
sequencelengths
1
1
score
sequencelengths
1
1
int_score
sequencelengths
1
1
[ "好彩客网址大全hat is the 好彩客网址大全ransopoly® series?\n好彩客网址大全he public involvement tools in the 好彩客网址大全ransopoly series were developed to help the general public understand the relationship between transportation planning and land use planning. 好彩客网址大全he tools are unique in that they require users to make fiscally prudent choices within a long-range vision for transportation planning. 好彩客网址大全wo tools within the series are group activities and require diverse groups to build consensus. 好彩客网址大全hese are 好彩客网址大全ransopoly and 好彩客网址大全eighborhood 好彩客网址大全ransopoly. e-好彩客网址大全ransopoly is designed for an individual to use at a personal computer, although friends or family members could make choices together.\n好彩客网址大全好彩客网址大全oth the group versions of the tool take 1 to 2 hours to play. 好彩客网址大全ach table of participants has a map of the designated area (the game board), a hypothetical budget to improve access and reduce congestion, and other essential tools. 好彩客网址大全o the extent possible, existing land use and transportation features are marked on the map to facilitate decision-making.\n好彩客网址大全好彩客网址大全aypeople learn to trust their own judgment and preferences and become more confident of their ability to participate in official planning processes;\n1. 好彩客网址大全ery different populations come to agreement about what would serve the largest number of people, not just their sub-group; and\n好彩客网址大全2. 好彩客网址大全he opportunity to consider cost and benefit of various projects shapes the project choices.\n好彩客网址大全好彩客网址大全ransopoly is a tool that seems as straightforward as a board game. 好彩客网址大全ts purpose is to encourage public participation in regional transportation planning by clarifying risks, benefits and costs. 好彩客网址大全he appropriate geography for this version is a large city, a county or a multi-county region.好彩客网址大全ransopoly has been used successfully since 2001 to help groups articulate their transportation priorities within reasonable financial limits.\n好彩客网址大全etting to the 好彩客网址大全eart of the 好彩客网址大全ransopoly 好彩客网址大全udience\n好彩客网址大全ransopoly was designed in 2001 for a specific outreach process in northeast 好彩客网址大全llinois. 好彩客网址大全he documentation from the local meetings and the overall summary report, 好彩客网址大全hanging 好彩客网址大全irection: 好彩客网址大全ransportation 好彩客网址大全hoices for 2030, can be found here.\n好彩客网址大全好彩客网址大全articipants of the 2001-2002 好彩客网址大全ransopoly sessions were surveyed on preferences, travel behavior and demographics, with a sample size of 529 respondents. 好彩客网址大全verall, respondents wanted choice in travel options. 好彩客网址大全ven though most were drivers, respondents wanted improved transit over roads by an 8-to-1 margin.\n好彩客网址大全好彩客网址大全espondents agreed with the statement “好彩客网址大全he public should be involved in local and regional planning” more than any other, with “好彩客网址大全alkable neighborhoods are desirable” a close second.\n好彩客网址大全osting 好彩客网址大全ransopoly in 好彩客网址大全our 好彩客网址大全ommunity\n好彩客网址大全好彩客网址大全eighborhood 好彩客网址大全ransopoly is an experiential tool for building public consensus and facilitating inclusive, informed transportation planning for communities up to 150,000 residents. 好彩客网址大全acilitators use customized maps and realistic budgets to guide small group interaction in identifying and seeking practical solutions to local transportation problems. 好彩客网址大全his method is not only fun, it also empowers communities to articulate which projects have a high degree of consensus.\n好彩客网址大全aking 好彩客网址大全ransopoly 好彩客网址大全nline\n好彩客网址大全好彩客网址大全-好彩客网址大全ransopoly is a web based version of 好彩客网址大全ransopoly. 好彩客网址大全t allows individual members of the public to express judgments and preferences about transportation investment in a user-friendly format. 好彩客网址大全eople can play 好彩客网址大全-好彩客网址大全ransopoly for their own benefit. 好彩客网址大全e hope that 好彩客网址大全-好彩客网址大全ransopoly participants will become confident of their ability to participate in future official transportation planning processes once they understand a bit more about budgetary constraints and opportunities.\n好彩客网址大全好彩客网址大全hether or not participants go on to become involved in official planning processes, data from 好彩客网址大全-好彩客网址大全ransopoly will be provided periodically to transportation planning agencies as an indicator of public sentiment.\n好彩客网址大全our elected representatives need to know what your transportation priorities are." ]
[ "<urn:uuid:d4e1a8cd-8e58-4b7b-b0d7-ce6572410fff>" ]
[ "CC-MAIN-2020-10" ]
[ "http://kkemlnr.icu/projects/transopoly" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875141749.3/warc/CC-MAIN-20200217055517-20200217085517-00189.warc.gz" ]
[ "en" ]
[ 0.8554168939590454 ]
[ 1852 ]
[ 2.96875 ]
[ 3 ]
[ "TEDx Halifax West High School\nBy: Habiba Cooper Diallo\nAnafghat was a young girl from Tarbiyat, Niger who suffered an obstetric fistula, arguably the most devastating affliction known to humanity. It results from a prolonged, obstructed labour in which the baby is malpositioned in the uterus or the pelvis is to small to accommodate the passing of a baby. A tear eventually forms in the bladder or rectal wall of the distressed women as the baby struggles to come out. The child is usually stillborn while the mother develops urinary or fecal incontinence.\nThis post contains excerpts from my TEDx Talk for Halifax West High School:\nMedically, a fistula simply means a hole and there are different types of fistula, for example a tracheoesophageal fistula, but then there's also an obstetric fistula, the one I am talking about. Waste products leak from the woman's bladder or rectum; from the affected area. By waste products, I mean urine and feces. See the diagram below which illustrates the area of fistula.\nWaste products constantly leak from the woman's punctured organs. Due to this condition fistula patients are abandoned and ostracized by their families and communities.\nFollowing an agonizing and unsuccessful, four-day labour, Anafghat’s father took her to the Hopital National de Niamey in Niger’s capital where her fistula was cured. Her life was so affected by the experience that when she returned home, she made it a point of duty to help eradicate fistula and other women’s health-related issues.\nShe quickly returned to school and came first in her class, being dubbed “the college student” by her peers. She became an advocate in her community and an authority on female empowerment. She spoke on the local radio station, spreading awareness among her peers and relatives about the importance of educating young women and girls.\n“I want to be a doctor, and an important woman-” these are the words of Anafghat.\nI learned about Anafghat when I was 12—years old after reading an article in the Wall Street Journal that detailed the events of her experience with fistula.\nNot only did her story resonate with me on a humanitarian and empathic level, but it also resonated with me culturally.\nI have West African origins from Guinea and Liberia which means that I share certain elements of my humanity with Anafghat.\nHence, I realized that although fistula is currently an issue of the Global South, it is not mutually exclusive to the health issues of African-descended women living in Canada, America, Europe and other parts of the Global North.\nNor is it mutually exclusive to the health or social problems faced by the general population of young Canadian women in high schools or universities. Fistula is merely an indicator of a bigger problem, and that problem is the condition of women in today’s world. I am a high school student myself Young Canadian girls are affected by the blatant misogyny and rape culture that is prevalent in our countries. In schools, terms like, bitch, cunt, pussy, etc. are thrown around loosely by both young men and young women. What’s insidious about such language is that it becomes accepted; hence, subconsciously we learn to accept and validate the denigration of women. A statistics Canada report found that 1 in 4 Canadian women are sexually assaulted before the age of 16.\nAnother example of this is the acceptance of the sexist activities tolerated during frosh week on university campuses across Canada and the United States.\nA recent Globe and Mail article stated that, “no fewer than one in five women will be the victim of rape or attempted rape by graduation.”\nThis rape culture is indicative of the inequality experienced by women in the same way that fistula patients in Ethiopia or Niger experience inequality. The cases of: Lisa Marie Young, Maisy Odjick, Tanya nepinak, Carolyn Sinclair, Reteah Parsons Steubenville, and the list goes on, attest to the pervasiveness and rampancy of sexual assault, gender inequality, and violence experienced by North American women. Today in Canada we are faced with the tragic reality of murdered and vanished native women. The Native women’s association of Canada reports more than 580 cases of missing or murdered Native Canadian women.\nFistula has been recognized as a maternal health illness for about 3 and half millennia.\nIn 1550 BCE an inscription found at Thebes, Egypt alludes to a patient suffering from fistula. I will quote directly from The Hospital By the River,by Dr. Catherine Hamlin, which states the inscription as follows: ‘prescription for a woman whose urine is in an irksome place: if the urine keeps coming and she distinguishes it, she will be like this forever.’ Then 250 years later, Egyptian physicians looked for ways to treat this disease.\nThe Kahun Gynecological Papyrus, the world’s oldest medical text from Kahun, Egypt, which dates back to about 1800 BCE, makes a direct reference to obstetric fistula.\nToday there is LITTLE to NO AWARENESS OF FISTULA IN CANADA. Yet there was a time when it was a significant problem in North American obstetric care.\nLate 19th century physician Dr. Marion Sims, known to many as the “father of gynecology,” made his claim to fame by operating on the fistulas of several slave women, including Betsy and Anarcha. He bought them from their masters and forcibly performed obstetric fistula surgery without the use of anaesthesia despite its discovery the time.\nDr. Marion Sims\nAnarcha was made to undergo 30 excruciatingly painful operations before he cured her fistula. Simms’ exploitation of Black women’s bodies to perform medical experiments was what allowed for the development of the methodology currently used to perform obstetric fistula surgery. These operations were part and parcel of the scientific mindset of the day in which the current thinking was that Black bodies— male and female— were exploitable and disposable.\nThe world’s first known fistula hospital was founded by Dr. Sims in 1855 in New York. Around 1925 it was renamed the ‘Women’s Hospital’ as fistula no longer required significant medical attention.\nThe Women's Hospital, New York\nYet in parts of the Global South like, Uganda, Niger, India Ethiopia, Guinea, Liberia, Bangladesh Sierra Leone obstetric fistula care is lagging behind. The problem with this is that it means an estimated 2 to 3 million women are constantly robbed of their dignity, denied their humanity and shut out from the rest of the world.\nFistula is a women’s problem. It is a poor woman’s problem, but it is also a man’s problem, a child’s problem. We are all somehow tied into it, because we are all a product of pregnancy. Fistula is an indicator of how women are treated, especially poor women. Eradicated in North America by the early 20th century, it remains a problem for women and girls like Anafghat. Fistula is an indicator of poverty. It is an indicator of the inequality between men and women. It’s really something for us to consider if we want to claim and uphold morality as a people.\nFistula is so associated with filth, and when we think of filth when think of garbage we think nastiness, we think repulsion. So in that sense, fistula patients are perceived as disgusting and off-putting. No one wants to associate with them. Imagine developing fistula at 12 years of age, and living with it until 17 years of age— and here I’m citing a specific case— some women live with it until death; some women never receive treatment. Imagine that during those 5 crucial developmental years, you receive so much disdain and contempt from the world and from everyone around you. Every time you step outside, no one wants to associate with you; people turn their backs to you. What kind of life is that? That is no life at all. But this is the plight of the fistula patients; this is their life; a lived, mundane everyday experience.\nNow I’ll take you back to Anafghat. Anafghat’s paradigm shift made her see the world in a new way. She was now more determined than ever to pursue an education and effect change in her community. Had it been for this, along with improved medical facilities, today Anafghat would have been 23 years old and on her way to becoming a practicing physician to address the health needs of women and children within her community.\nFor the past 6 years I have been engaged in fistula advocacy. I am passionate about the empowerment of women through the improvement of their medical experiences. I couple this with the quest for social justice and equality for women. We’re all bound by the common thread of our humanity.\n2/21/2018 11:20:21 am\nHi Habiba -\n2/21/2018 11:21:43 am\nMy apologies - you include this information before the photo. Great article.\nHabiba Cooper Diallo\n3/5/2018 12:06:28 pm\nThanks- for your comments Elizabeth!\nLeave a Reply.\nHabiba Cooper Diallo\nI am a Canadian end fistula advocate and blogger, and the founder of the Women’s Health Organization International, WHOI. I have been doing fistula awareness-building in Canada for the past 12 years. My work on fistula has led me to Ghana, Senegal, Guinea, Ethiopia, and Sierra Leone. I have been featured in Forbes, the HuffPost, and UNFPA" ]
[ "<urn:uuid:6515a765-9b0e-45ef-860a-c1d6350b1ee3>" ]
[ "CC-MAIN-2023-14" ]
[ "https://www.habibadiallo.com/presentations/tedx-halifax-west-high-school" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943555.25/warc/CC-MAIN-20230320175948-20230320205948-00150.warc.gz" ]
[ "en" ]
[ 0.9582216143608093 ]
[ 2261 ]
[ 2.859375 ]
[ 3 ]
[ "Te Waikoropupu Springs\nSome of the clearest water anywhere in the world.\nLocated in Golden Bay on New Zealand’s South Island, the Te Waikoropupu Springs (“Pupu Springs”) are known for both the clarity of the water they hold and the volume of water discharged.\nThe horizontal visibility of the water in the area has been measured at an average of 63 meters, which is a world record for fresh water. This value, verified using specialist optical instruments, approaches the theoretical maximum for optically pure water.\nThe springs are notable for the volume of water discharged from the eight main vents, ranking among the largest in the world. It is estimated that 14,000 liters of water are produced per second, approximately enough to fill 40 bathtubs. In a 1974 television documentary, it was noted that this would be enough water to supply a city the size of Boston, Massachusetts.\nThe floor of the lake is covered with white sand. Waters expelled from some of the smaller vents carry the sand upward. These vents are known as the dancing sands, which for the few scuba divers who have secured permission to dive in the springs, is one of the highlights of underwater sightseeing.\nAt the entrance to the walkway to the springs, the Department of Conservation in New Zealand has placed a sign: “Te Waikoropupu Springs are a taonga (treasure) and waahi tapu (a sacred place) for Māori, both locally and nationally. The legends of Te Waikoropupu are told in the stories of Huriawa, its taniwha (guardian spirit). In Māori tradition the Springs are wairou, the purest form of water which is the wairua (spiritual) and the physical source of life. The Springs provide water for healing, and in the past were a place of ceremonial blessings at times of birth and death and the leaving and returning of travelers.”\nKnow Before You Go\nHead out of west out of Takaka and you will the sign. You can't miss it!\nFollow us on Twitter to get the latest on the world's hidden wonders.\nLike us on Facebook to get the latest on the world's hidden wonders.Follow us on Twitter Like us on Facebook" ]
[ "<urn:uuid:3f2ece58-a7c8-42d7-8ecf-e14aa22f8cce>" ]
[ "CC-MAIN-2023-14" ]
[ "https://assets.atlasobscura.com/places/pupu-springs" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950030.57/warc/CC-MAIN-20230401125552-20230401155552-00603.warc.gz" ]
[ "en" ]
[ 0.9521906971931458 ]
[ 482 ]
[ 2.71875 ]
[ 3 ]
[ "Nutrients to Support the Immune System\nIf you’ve read the blog post The Importance of Nutrition for the Immune System you’ll be aware that nutrients from food and supplements play an important role in the development and preservation of the immune system. Nutrient deficiencies decrease immune defences, and increase susceptibility to infection (1).\nAs with any health matter, it is important to adopt a holistic approach rather than just dealing with the immediate threat or symptoms. Underlying health conditions have been shown to increase the severity of the coronavirus. Now is a good time to support your overall health. Inflammation, gut health, cardiovascular health and insulin resistance may all need to be taken into consideration when devising a diet or supplement plan for any individual.\nHere are some nutrients that have been shown to support the immune system and improve health.\nVitamin A – an important antioxidant. Also involved in the regulation of the immune system (2).\nVitamin C – unlike most mammals humans do not make our own vitamin C so have to get it from food or supplements. Vitamin C is a potent antioxidant and a cofactor for various enzymes. Vitamin C deficiency results in impaired immunity and higher susceptibility to infections. Having an infection increases the body’s requirements for vitamin C. Supplementation with vitamin C has been shown to help prevent and treat respiratory and systemic infections (3).\nVitamin D – results from the Irish Longitudinal Study on Ageing (TILDA) show that Vitamin D plays a critical role in preventing respiratory infections, reducing antibiotic use, and boosting the immune system’s response to infections (4). Vitamin D is produced by the action of sunlight on bare skin. Getting outside is important where possible. Supplementing with Vitamin D3 and K2 (which aids the use of vitamin D in the body) may be helpful during the winter months and for those who aren’t able to get outside.\nA new study has found an association between low average levels of vitamin D and high numbers of COVID-19 cases and mortality rates across 20 European countries (5).\nVitamin E – supplementing has been shown to enhance the function of the immune system and reduce the risk of respiratory infections and asthma (6). It also supports other antioxidants such as selenium.\nZinc – plays a part in many enzyme systems in the body. Zinc also has anti-inflammatory and anti-oxidant properties. There are clear benefits to the immune system from zinc supplementation (7).\nSelenium – supplementation with selenium or multivitamins containing selenium have been shown to confer health benefits to those suffering from some bacterial or viral infections. Furthermore, selenium deficiency may lead to infections mutating into highly pathogenic strains (8).\nProbiotics – have numerous beneficial properties including stimulation of the immune system (9).\nN-acetylcysteine (NAC) – shown to reduce inflammatory compounds in lung tissue (10).\nL-lysine – has anti-viral and immune supportive properties (11, 12).\nAlways consult your doctor before making dietary changes or taking any supplements, especially if you are pregnant or taking other medications.\nFor more information about who may be particularly at risk of COVID-19 see blog post Why COVID-19 Affects Different People in Different Ways.\n1. Cell Mol Immunol. 13, 3–10 (2016). The cytokine storm of severe influenza and development of immunomodulatory therapy Liu Q et al.\n2. J Comp Physiol A Neuroethol Sens Neural Behav Physiol. 2020 Feb 7. Vitamin A: its many roles-from vision and synaptic plasticity to infant mortality. Dowling JE.\n3. 2017 Nov 3;9(11). pii: E1211. Vitamin C and Immune Function. Carr AC, Maggini S.\n4. Neuroscience news. April 7 2020. Could vitamin D help in fight against COVID-19?\n5. Aging Clinical and Experimental Research,2020, The role of vitamin D in the prevention of coronavirus disease 2019 infection and mortality. Ilie PC et al.\n6. IUBMB Life 2019 Apr;71(4):487-494. Regulatory role of vitamin E in the immune system and inflammation. Lewis et al.\n7. 2017 Nov 25;9(12). pii: E1286. Zinc as a Gatekeeper of Immune Function. Wessels et al.\n8. Adv Nutr. 2015 Jan 15;6(1):73-82. Dietary selenium in adjuvant therapy of viral and bacterial infections. Steinbrenner H et al.\n9. Crit Rev Food Sci Nutr. 2014;54(7):938-56. Immune system stimulation by probiotic microorganisms. Ashraf R. Shah NP.\n10. Ter Arkh. 2018 Apr 19;90(3):89-95. Effect of N-acetylcysteine on mucosal immunity of respiratory tract. Kalyuzhin OV.\n11. Cytotechnology (2001) Lysine: Is it worth more? Datta D, Bhinge A et al.\n12. Biochemistry & Physiology: s5, pp. 1–5. 2015. The Effect of Zinc and Lysine Supplementation on Infection Rate and CD4 Count In Elderly. Sugeng MW." ]
[ "<urn:uuid:1572319e-5049-40e9-89d1-da99ee079b10>" ]
[ "CC-MAIN-2023-14" ]
[ "http://www.foodforthoughtuk.com/nutrients-to-support-the-immune-system/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949598.87/warc/CC-MAIN-20230331082653-20230331112653-00785.warc.gz" ]
[ "en" ]
[ 0.8634289503097534 ]
[ 1121 ]
[ 3.4375 ]
[ 3 ]
[ "Trees are a sub-type of the more general node-edge graph data structure.\nTo be a tree, a graph must satisfy two requirements:\n- It is acyclic. It contains no cycles (or “loops”).\n- It is connected. For any given node in the graph, every node is reachable. All nodes are reachable through one path in the graph.\nThe tree data structure is quite common within computer science. Trees are used to model many different algorithmic data structures, such as ordinary binary trees, red-black trees, B-trees, AB-trees, 23-trees, Heap, and tries.\nit is common to refer to a Tree as a\nRooted Tree by:\nchoosing 1 cell to be called `Root` painting the `Root` at the top creating lower layer for each cell in the graph depending on their distance from the root -the bigger the distance, the lower the cells (example above)\ncommon symbol for trees:" ]
[ "<urn:uuid:99a99cf9-9788-4a94-8e6f-4fe4d7ba2c0b>" ]
[ "CC-MAIN-2020-05" ]
[ "https://www.programming-books.io/essential/algorithms/introduction-ce6ec0e230664513a2c603b83af3f37e" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251671078.88/warc/CC-MAIN-20200125071430-20200125100430-00401.warc.gz" ]
[ "en" ]
[ 0.9367979764938354 ]
[ 213 ]
[ 3.78125 ]
[ 4 ]
[ "- A Framework of Knowledge Mobilisation\n- Exploring the relationship between individual differences and communication technology usage\n- Investigating the Effective Use of Social Computing Applications: The Role of Individual Differences\n- MARGE: Layering Gaming Interactions in Mobile Content Sharing Environments\n- Lee, C.S. and Ma, L. (2012). News Sharing in Social Media: The Effect of Gratifications and Prior Experience. Computers in Human Behavior, 28(2), 331-339.\n- Lee, C. S. (2012). Exploring Emotional Expressions on YouTube through the Lens of Media System Dependency Theory. New Media and Society, .\n- Lee, C.S., Goh, D., Chua, A., & Ang, R.P. (2010). Indagator: Investigating Perceived Gratifications of an Application that Blends Mobile Content Sharing with Gameplay. Journal of the American Society for Information Science and Technology, 61, 1244-1257.\n- Lee, C. S. (2010). Managing perceived communication failures with affordances of ICTs. Computers in Human Behavior, 26(4), 572-580.\n- Lee, C.S., Goh, D.H., Chua, A. and Luyt, B. (2009). Choosing Communication Portfolios To Accomplish Task: The Effects of Individual Differences. Computers and Education, 53(4), 1167-1176." ]
[ "<urn:uuid:525d4309-8697-489a-b0cf-b8ce70f40934>" ]
[ "CC-MAIN-2013-20" ]
[ "http://research.ntu.edu.sg/expertise/academicprofile/pages/StaffProfile.aspx?ST_EMAILID=LEECS&CategoryDescription=BusinessandManagement" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00033-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.731952428817749 ]
[ 305 ]
[ 2.671875 ]
[ 3 ]
[ "Agents of Change: a Toolkit for schools and teachers\nThe Agents of Change Toolkit (ACT) project is funded by the Scottish Universities Insight Institute and will run activities from March – August 2020.\nWe will co-design a toolkit (including a serious game) that facilitates teachers and schools acting as agents of change for achievement of the UN Sustainable Development Goals (SDGs). All of the project outputs will be posted to this website and will be freely available for at least 5 years.\nThe core programme team\nNataša PantićUniversity of Edinburgh\nDianne CantaliUniversity of Dundee\nDaisy AbbottThe Glasgow School of Art\nBetsy KingLearning for Sustainability\nAlison HumphreysQuality Improvement Education Officer at City of Edinburgh Council\nRachel BinnieGlasgow City Council, Learning for Sustainability\nRosie McCollSouth East Improvement Collaborative\nInterested in collaborating with us?\nMore about ACT\nSchools and teachers are recognised as key players for accelerating progress towards UN Sustainable Development Goals (SDGs).\nResearch shows that teachers can and do act as agents of change, however, school leadership and teachers often feel unprepared for dealing with these challenges. The Agents of Change Toolkit (ACT) project (taking place March-August 2020) creates knowledge exchange opportunities for teachers, researchers, leadership, educational authorities, designers, and out-of-school educators via a series of seminars and workshops, and will co-design an engaging, practical toolkit for schools and teachers to identify the changes required to improve education around the SDGs.\nThe toolkit aims to help educators a) build the national SDGs indicators into their local targets; b) identify relevant knowledge and network with players within and beyond schools to consider solutions; and c) evaluate their impact. This approach recognises that achievement of SDGs is a matter of building inclusive communities as much as building knowledge. If we are to avoid treating SDGs as third world problems, raising students’ knowledge and awareness of big global challenges such as social justice and climate change need to be accompanied by modelling how issues of inequality and sustainability can be addressed in their immediate school environment.\nThe toolkit enables an accessible, structured and engaging way of thinking through the whole-school approaches that, although recognised as essential, are often challenging for schools because they require time-intense coordination between different actors." ]
[ "<urn:uuid:24ab2068-5f0c-49dd-847a-45da0c3e9397>" ]
[ "CC-MAIN-2023-14" ]
[ "https://teacher-act.net/about-act/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945183.40/warc/CC-MAIN-20230323194025-20230323224025-00774.warc.gz" ]
[ "en" ]
[ 0.945574164390564 ]
[ 485 ]
[ 2.609375 ]
[ 3 ]
[ "See also: Burlington Industries; Cannon Mills; Chatham Manufacturing Company; Coleman Manufacturing Company; Cone Mills Corporation; Cotton Mills; Gastonia Strike; Glencoe; Hanes Brands; Harriet-Henderson Cotton Mills Strike; Life in Textile Mill Villages; Textile Strike of 1934; Childhood in the Textile Mill Villages; The Evolution of Textile Mill Villages; Textile\nPart 4: Decline, Consolidation, and the Future of Textiles in the State\nDecline, mergers, and takeovers marked the North Carolina textile industry beginning in the 1980s, with Fieldcrest buying Cannon Mills, West Point-Pepperell buying J. P. Stevens, and Burlington spending millions to block takeover efforts. Often, the changes proved painful for employees, who lost jobs and sometimes benefits such as company pensions, and for communities built around textile operations. Between 1975 and 1985, more than 800 mills closed nationwide, and employment in North Carolina's textile mills fell from an all-time high of 293,600 in 1973 to 211,300 in 1986. Many former textile mills have been transformed into housing or retail shops or have met the wrecking ball.\nThe effects of numerous free trade agreements, notably NAFTA in 1994 and treaties with African and Caribbean nations in 2000, led to a vast increase in textile and apparel imports and, consequently, numerous plant closings in North Carolina. Approximately 100,000 jobs were lost in textiles in the state from 1997 to 2002, with an additional 70,000 lost in the apparel industry during that same period. In 2003 one of the biggest job losses in North Carolina history occurred when Kannapolis-based Pillowtex closed five plants, eliminating 4,000 jobs. Burlington Industries, mired in debt and struggling to emerge from Chapter 11 bankruptcy protection after years of being pounded by cheaper Asian imports, spent $3.5 million in 1998 for a stake in a small company using nanotechnology-the ability to manipulate individual atoms to create new materials-to produce fabrics that repel water, wine, and other liquids. In 2004 New York financier Wilbur Ross purchased Burlington Industries, which became, along with Cone Mills, part of the giant International Textile Group.\nBy 2006 the North Carolina textile industry had begun to focus on new technologies and specialized products outside the realm of apparel. Students at N.C. State's College of Textiles, for example, were working with high-tech fabrics that can withstand heat and force and textile products ranging from artificial hearts and optical fibers to under-coverings for roadways. Many large textile companies, facing continued high labor costs and trade deficits, began to establish a future built on marketing technology to other companies rather than on actual production.\nReturn to >> Textiles- Part 1: Introduction\nMildred Gwin Andrews, The Men and the Mills: A History of the Southern Textile Industry (1987).\nBrent D. Glass, The Textile Industry in North Carolina: A History (1992).\nJacquelyn Dowd Hall and others, Like a Family: The Making of a Southern Cotton Mill World (1987).\nHarriet L. Herring, Passing of the Mill Village: Revolution in a Southern Institution (1949).\nDemolition of Fieldcrest Cannon Mills, Kannapolis, NC, 2004. Image courtesy of Brad Spry. Available from https://www.flickr.com/photos/bradspry/124498560/ (accessed October 2, 2012).\n1 January 2006 | Glass, Brent D.; Kress, Kelly; Purcell, Gene; Wait, Douglas A." ]
[ "<urn:uuid:028dfdec-a11f-4516-9250-f0d14c696574>" ]
[ "CC-MAIN-2023-14" ]
[ "https://www.ncpedia.org/textiles-part-4-decline" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949573.84/warc/CC-MAIN-20230331051439-20230331081439-00580.warc.gz" ]
[ "en" ]
[ 0.909146785736084 ]
[ 752 ]
[ 3.234375 ]
[ 3 ]
[ "A prosthetic leg that can feel helped two men walk faster, more smoothly and with greater confidence. The artificial leg, outfitted with sensors that detect pressure and motion, also curbed phantom pain that came from the men’s missing legs, researchers report online September 9 in Nature Medicine.\nRestoring these missing signals may greatly improve the lives of people who rely on prosthetic limbs (SN: 1/28/11).\nNeuroengineer Stanisa Raspopovic of ETH Zurich and colleagues tested the device in two men, both of whom had a leg amputated above the knee. Their new prosthetic legs were outfitted with seven sensors that detect foot pressure on the ground and one sensor that decodes the angles of the knee joint. Electrodes implanted on the sciatic nerve, just above the amputation site, then stimulated the nerve with signals from the sensors on the prosthesis.\n“If you close your eyes, you will think that you have your own leg,” volunteer Savo Panic said in Serbian in a translated video released by the researchers.\nWhen those sensory signals were present, the two men walked faster and more confidently, even over difficult sandy terrain. What’s more, unpleasant feelings of pain from their missing leg lessened. After about a month of use, one of the men reported no pain at all, and the other man said his pain was sporadic.\nAs part of the study, the electrodes were removed after about three months. Longer trials with more people will let researchers fine-tune the device." ]
[ "<urn:uuid:541dfbcd-321b-4687-ad3a-9411c3d07ebe>" ]
[ "CC-MAIN-2023-14" ]
[ "https://www.sciencenews.org/article/new-prosthetic-leg-senses-touch-reduces-phantom-pain" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943589.10/warc/CC-MAIN-20230321002050-20230321032050-00562.warc.gz" ]
[ "en" ]
[ 0.9638570547103882 ]
[ 319 ]
[ 2.671875 ]
[ 3 ]
[ "By the IBM Visual and Spatial Technology Centre, Institute of Archaeology, Birmingham Archaeology, University of Birmingham, UK\nThe IBM Visual and Spatial Technology Centre (VISTA) specialize in large scale data capture, analysis and visualization for the Arts and Humanities at the University of Birmingham, UK. The VISTA Centre supports interdisciplinary academic research and application development for visualization, spatial analysis and imaging using state-ofthe- art technology.\nAvizo software is a fundamental tool that provides new opportunities for data comprehension and exploration through its visualization and quantification tools.\nAs a result of data capture, vast amounts of data are produced which contain detailed information for research such as the North Sea Palaeolandscapes project. Avizo software enables visualization and analysis of entire landscapes, something which was previously impossible.\nTerabytes of seismic data provided by PGS Ltd. of the North Sea have been visualized using Avizo software. These data contain detailed information of the lost territory of Doggerland, the land bridge and heartland of European hunter-gatherers connecting Great Britain to Europe. This landscape started to be inundated at the end of the last ice age (circa 18,000BC) and had largely disappeared by 5,000BC. Thanks to Avizo software's powerful 3D visualization tools the buried territory of Doggerland is one of the last true frontiers for modern explorers to visit.\nOnce re-constructed, researchers were able to combine archaeological and environmental data collected over the years from dredging and coring sections of the North Sea with the 3D virtual landscape revealed through visualization of the seismic data. The characterization of individual landscape features such as glacial tunnels, salt domes, rivers, estuaries and coastlines all combine to provide a re-creation of the landscape that was occupied for thousands of years.\nInspecting data at the Visual and Spatial technology Centre (VISTA).\nThe immersive environment, and in particular the geobody tools, allowed the researchers to realize the scope and scale of individual features within the datasets. The high resolution and group visualization provided researchers with the highest levels of quality control in their work that has never before been possible.\nThe results from this research enable archaeologists to predict the location and potential characterization of human occupation of this ancient buried landscape. Once identified and located this important international archaeological resource can be protected and preserved during the future development of the North Sea extractive industries and green energy production such as offshore wind farms.\nAbout VISTA, Univ. of Birmingham\nThe Visual and Spatial Technology Centre (VISTA), at the University of Birmingham (UK), supports academic research and application development for spatial analysis, visualization and imaging using state-of-the-art technology in one of the best equipped archaeological visualization laboratories in Europe.\nAmira and Avizo are high-performance 3D software for visualizing, analyzing, and understanding scientific and industrial data coming from all types of sources and modalities.\nImages and text are courtesy of University of Birmingham and PGS" ]
[ "<urn:uuid:8b65d987-60a2-451d-b08b-c48bfaf979d0>" ]
[ "CC-MAIN-2020-10" ]
[ "https://www.thermofisher.com/us/en/home/industrial/electron-microscopy/electron-microscopy-instruments-workflow-solutions/3d-visualization-analysis-software/3d-visualization-analysis-software-resource-center/3d-vis-software-customer-spotlights/birmingham-university-avizo-software.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146714.29/warc/CC-MAIN-20200227125512-20200227155512-00357.warc.gz" ]
[ "en" ]
[ 0.9002674221992493 ]
[ 616 ]
[ 2.6875 ]
[ 3 ]
[ "A 50x1cm steam plasma tube. We start the plasma using the electronics from a fluorescent light. Then it self sustains at 4 atmospheres, turning 1.7x10-12cc of regular water into 1.2 MW of heat.\nWe have a 2kW fan, to force air over this heat source, and through a thermoelectric generator. This costs from 500-1,000 dollars, and will produce 144kW or power. We want 8 for a house so the national grid will PAY US 445,760 UK pounds a year. Why bother working?\n1 H2O+TU->2H++O2++4e- the plasma breaks the steam down into positive ions and electrons.\n2 1H++e- ->n0 so we get our own strand of free neutron star. Endless free neutrons\n3 16O2++4e- ->8H++6e- -E damp down the H fission\n4 1H++r n0 ->Er3+L+g we do get gamma wave radiation\nWe need to enclose the plant in 1mm of FeO powder shutters, to block the emission of radiation.\nSo set up in an outhouse, or at the end of your street. We generate the free, carbon 0, non toxic power for 18 houses. We can go off grid – but keep to mains frequency and voltage, so all electronic goods will work.\nAfter the generator, we pass over the boiler in our heating system, then a radiator in the open air: After all, we will be dumping 900kW. A radiator in the sea or a large river may be simpler.\nSo we use a miniscule amount of regular water, and only produce massive clean, free and non toxic power.\nI was working on this at Sheffield University, when nuclear power got my PhD ended. I thought academics were meant to be immune from outside pressure. CO2 emissions fell by 4.5% 2 months ago, 6% last month" ]
[ "<urn:uuid:662bbd87-f7f9-4d13-91e6-109b99f9a816>" ]
[ "CC-MAIN-2017-30" ]
[ "http://jonsthings.blogspot.com/2017/05/safe-clean-free-heat-power.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424148.78/warc/CC-MAIN-20170722202635-20170722222635-00267.warc.gz" ]
[ "en" ]
[ 0.871773362159729 ]
[ 419 ]
[ 2.78125 ]
[ 3 ]
[ "Patent rights are created by federal law and give an inventor the right to exclude others from making, using, selling, offering for sale, or importing a patented invention without the inventor’s permission for a limited period of time. The making, using, selling, offering for sale, or importing of a patented invention without the inventor’s permission is said to directly infringe the patent, for which the patent owner may be able to recover a remedy. Patent law also provides for indirect infringement of a patent.\nIf you believe someone may have infringed upon your patent rights, please contact one of our patent attorneys to schedule an appointment to discuss protecting your valuable legal rights.\nOne way of becoming liable for indirect patent infringement is to induce another party to commit an act of patent infringement. In order to be liable for inducement to infringe a patent, one must actively solicit or assist another in the infringing of a patent. The United States Court of Appeals for the Federal Circuit, which hears appeals of patent cases, has held that to actively induce infringement, one must knowingly and intentionally induce the actual infringer. One basic requirement for liability for inducement to infringe is that there must be an actual case of direct infringement by another party; thus, one cannot be liable for attempting to induce the infringement of a patent when no infringement takes place. For example, offering to sell the parts necessary to build a patented invention and instructions on how to build it does not in itself amount to inducement to infringe; however, if someone accepts the offer to buy the parts and builds the invention, thus infringing the patent, the seller of the parts has induced the act of infringement.\nAnother form of indirect infringement is contributory infringement. The patent statute specifically defines contributory infringement as selling, offering to sell or importing an important part of a patented invention that has no substantial use except to build the patented invention. If the item being sold is a common item that has other uses, selling it is not contributory infringement even if the seller knows that the buyer intends to use the item to infringe a patent. As with inducement to infringe, liability for contributory infringement depends upon an actual act of direct infringement. The knowing and intentional element of inducement to infringe also applies to contributory infringement. Therefore, to be liable for contributory infringement, one must know that the item being sold, offered for sale, or imported has no real use except in the creation of an infringing product and that the person to whom the item is sold intends to use it in such a way that a patent will likely be infringed." ]
[ "<urn:uuid:bd466fe7-99eb-47a2-8f0d-9a31d667acdf>" ]
[ "CC-MAIN-2017-26" ]
[ "http://www.theipcenter.com/2005/08/beware-of-indirect-infringers/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320323.17/warc/CC-MAIN-20170624184733-20170624204733-00054.warc.gz" ]
[ "en" ]
[ 0.9235853552818298 ]
[ 528 ]
[ 2.625 ]
[ 3 ]
[ "CENTRAL BHUTAN ATTRACTIONs\nCentral Bhutan is an exciting destination for all visitors. It includes some of the most significant historical and religious sites in the country. The district of Trongsa has always been of great political importance to the leaders of Bhutan due to its commanding location in the center of the nation while Bumthang district has some of the most ancient and important temples and monasteries in Bhutan.\nSome of the important landmarks in central Bhutan are: Kurje Lhakhang built in 1652 at the site where the great Buddhist saint Guru Rimpoche meditated. Tamshing Lhakhang, the great religious treasure revealer Terton Pema Lingpa built dating back to 1501. Mebar Tsho: A sacred lake from which Terton Pema Lingpa discovered religious treasures hidden by Guru Rimpoche.\nThe Watchtower of Trongsa Museum: This ancient tower has been made into a museum dedicated to the Wangchuck dynasty and provides visitors with unparalleled insight into Bhutan’s political history, Chendebji Chorten: An interesting and visually striking religious building with eyes painted towards the four cardinal directions. Legend states that it was constructed to subdue the remains of an evil spirit that manifested as a gigantic serpant.\nIn addition to the traditional annual religious festivals (Tshechus) there are also many newer festivals showcasing the rich traditions of the region like the annual Nomad’s Festival and the Matsutake Mushroom BUMTHANG\nThis region that spans from 2,600-4,500m is the religious heartland of the nation and home to some of its oldest Buddhist temples and monasteries. Tales of Guru Padmasambhava and the tertons (“religious treasure-discoverers”) still linger in this sacred region.\nBumthang Dzongkhag consists of four main valleys Ura, Chumey, Tang and Choekhor. Choekhor is the largest of the four mountain valleys and is widely considered as ‘Bumthang Valley’. The valleys are broad and gentle carved by the ancient glaciers. The wide and scenic valleys draw a large number of tourists each year.\nThe name Bumthang has two probable origins; the first is that it is named after a Bumpa, a vessel for holy water which the valley resembles in shape. The second origin implies that it is the Valley of Beautiful Girls as Bum translates to ‘Girl’ and Thang means ‘flat piece of land’.\nThese fertile valleys are covered in fields of buckwheat, rice and potatoes. Apple orchards and dairy farms are also common sights here. This serene region is one of the most peaceful places in the kingdom.\nThis dzongkhag is one of the most richly endowed districts in terms of historical and spiritual legacy. Some of Bhutan’s oldest and most venerated temples are found in Bumthang, including Jambey Lhakhang. According to legend this ancient temple was built by the Tibetan king Songtsen Gampo in 659 A.D. as part of a chain of 108 simultaneously constructed temples in order to subdue an evil demoness that lay over the Himalayan region. It is the oldest lhakhang in Bhutan.\nThere are numerous other temples and shrines worth visiting in Bumthang and many of them are linked to Guru Rinpoche’s visit in 746 A.D.\n- JAMBAY LHAKHANG FESTIVAL\nJambay lhakhang is located in Bumthang and is situated on the way to the Kurjie Lhakhang. It’s a ten minutes drive to the temple from the Chamkhar town.\nJambay Lhakhang is one of the oldest temples in the kingdom. It was founded by, Songtsen Gampo, a Tibetan King in the 7th century AD. The king was destined to build 108 temples known as Thadhul- Yangdhul (temples on and across the border) in a day to subdue the demoness that was residing in the Himalayas. The temple is one of the two of the 108 built in Bhutan. A second is located in Paro, the Kichu lhakhang also built on the same day.\nLegend has it that Guru Rimpoche visited the site several times and deemed it exceptionally sacred. Chakhar Gyab, the king of the Iron Castle of Bumthang renovated the temple in the 8th century AD.\nThe first king of Bhutan, Gongsa Ugyen Wangchuck constructed the Dus Kyi Khorlo (Kala Chakra- Wheel of Time) inside the temple, to commemorate his victory over his rivals Phuntsho Dorji of Punakha and Alu Dorji of Thimphu after the battle of Changlimithang in 1885. Later, Ashi Wangmo, the younger sister of the second king of Bhutan, built the Chorten lhakhang.\nThe main relics include the future Buddha, Jowo Jampa (Maitreya) from whose name the present name of the temple is derived. The lhakhang also houses more than one hundred statues of the gods of Kalachakra built by the first king, in 1887.\nOne of the most spectacular festivals in the country, called Jambay lhakhang Drup is hosted here. The festival lasts for five days (check with your tour operator to confirm these dates). The highlight of the festival is the fire ritual that is held in the evening where crowds gather to witness the ritualistic naked dance.\nThis is a bustling little one-street town with an abundance of restaurants and handicrafts stores. Jakar sells a good amount of chugo, a hard, chewy dried cheese snack popular among Bhutanese. Internet cafes and the odd espresso bar have also started to make an appearance here.\nThe Jakar Dzong or the “Castle of the White Bird” dominates the Chamkhar valley and overlooks the town. Constructed in 1549, by the Tibetan Lam Nagi Wangchuk, the Dzong played an important role as the fortress of defense of the whole eastern Dzongkhags. It also became the seat of the first king of Bhutan.\nA special feature of the Dzong is the approximately fifty meter high Utse or the Central tower, which is distinct from most other Dzongs in Bhutan. The other unique feature of the Dzong is a sheltered passage, with two parallel walls, interconnected by fortified towers, which gave the population of the fortress access to water in the case of a siege. The protected water supply is still intact to this day." ]
[ "<urn:uuid:a763a81d-6e91-48f4-b77a-3033c31e2516>" ]
[ "CC-MAIN-2017-26" ]
[ "http://bhutanbrotherstour.com/index.php/2014-02-03-03-15-25/central-bhutan" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320264.42/warc/CC-MAIN-20170624152159-20170624172159-00493.warc.gz" ]
[ "en" ]
[ 0.9468441605567932 ]
[ 1434 ]
[ 2.546875 ]
[ 3 ]
[ "Yellow Skunk Cabbage\nOne of the more interesting plants found growing in the Pacific Northwest is the yellow skunk cabbage - also know as the western skunk cabbage or swamp lantern. These stinky water-loving plant blooms in the late spring and early summer in wet bogs or swamps and actually produces enough heat to melt snow away from it. Bears are known to eat the roots after their winter slumber to induce a laxative-like effect. While it is potentially toxic to humans, the native peoples of the Pacific Northwest used the large leaves (largest in the PNW) for lining the insides of baskets and for wrapping salmon before cooking them.\n- © 2012\n- Image Size\n- 2848x4288 / 8.1MB\nAlismatales, Angiosperms, Araceae, Dash Point, Federal Way, King County, Lysichiton, Lysichiton americanum, Lysichiton americanus, Monocots, Orontioideae, Plantae, Washington, aquatic, arum, background, beautiful, beauty, bloom, blooming, blooms, blossom, blossoms, botany, bud, color, countryside, field, flora, flower, flowers, fresh, green, medicinal, natural, nature, park, plant, plants, skunk cabbage, spring, summer, swamp lantern, sweet, western skunk cabbage, wild, wildflowers, yellow, yellow skunk cabbage\n- Contained in galleries\n- Araceae (Arum Family), Yellow Wildflowers" ]
[ "<urn:uuid:31fedfd6-e49e-4733-8bbf-14235fa7e1ea>" ]
[ "CC-MAIN-2020-05" ]
[ "https://leightonphotography.photoshelter.com/image?_bqG=38&_bqH=eJwrdPK39DQqMykNNvWyLCsqjIx3c_MtyLQwTvW0MjW1MjQwAGEg6RnvEuxsm5OZl1qsBmbHO_q52JYA2aHBrkHxni62oSB1KR7.wUFRhVXGzqFq8Y7OIbbFqYlFyRkANHAfAQ--&GI_ID=" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251801423.98/warc/CC-MAIN-20200129164403-20200129193403-00376.warc.gz" ]
[ "en" ]
[ 0.8404461741447449 ]
[ 316 ]
[ 3.015625 ]
[ 3 ]
[ "Nebulisation against respiratory diseases?\nMany studies have highlighted the effectiveness of colloidal silver against numerous viruses and bacteria. The way it is administered has a significant impact on its effectiveness.\nOnce again, Institut Katharos does not recommend nebulisation of colloidal silver, European legislation has prohibited ingestion since January 1st 2010. The following data is only for information purposes and does not constitute a medical recommendation.\nEffectiveness in a study on mice\nSome reports highlight nebulisation as a potentially effective administration method against respiratory infections such as colds, pneumonia, bronchitis and sinusitis*1.\nIn October 2001 the prestigious Health Sciences Institute pointed out that direct nebulisation of colloidal silver into the lungs is one of the fastest ways of effectively eliminating serious upper respiratory infections, including bronchitis and pneumonia*1.\nA clinical study by researchers at Washington University School of Medicine and University of Akron, Ohio, presented at the 105th International Conference of the American Thoracic Society, was carried out on mice. In this study the inhalation of silver nanoparticles seemed to provide significant protection against pneumonia*1.\nIn fact, it was noted that the mice deliberately infected with pneumonia bacteria easily survived the infection, if they inhaled silver nanoparticles once per day. The mice that had not inhaled silver nanoparticles all died as a consequence of the infection.\nDr. Marcial Vega recommends the use of a nebuliser with colloidal silver as follows:\n“Put two teaspoons in the container included, turn on the machine and breathe deeply and slowly for approximately 15 minutes or until all the liquid is gone. Repeat three times a day for colds, pneumonia, bronchitis and sinusitis.\nIf the illness makes you cough a lot, add 20-30 grains of sea salt to the liquid just before nebulising and shake.\nThis is a natural antibiotic that contains water and silver in a colloidal suspension. It is effective against bacteria, viruses and fungi.”\nIn the following video you will find steps for optimal nebulisation of colloidal silver:\n1) The American Journalist Steve Barwick on nebulisation: http://thesilveredge.com/nebulize-colloidal-silver.shtml#.VGqmAvmG8eQ" ]
[ "<urn:uuid:673069fb-0e77-4dda-a9cf-1f01f77798d0>" ]
[ "CC-MAIN-2020-10" ]
[ "https://www.en.institut-katharos.com/nebulisation" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144165.4/warc/CC-MAIN-20200219153707-20200219183707-00535.warc.gz" ]
[ "en" ]
[ 0.9276289939880371 ]
[ 478 ]
[ 2.84375 ]
[ 3 ]
[ "Forestry endangers Sweden's boreal woodland birds\nA new study from Birdlife Sweden has shown that many of Sweden's woodland bird species are seriously threatened by forestry.\nThe Birds of Sweden 2019 report focuses on woodland birds and emphazises that the inventory of Sweden's key woodland habitats must be resumed and extended, forest landscapes protected and that the forest industry needs to start using more sustainable logging methods.\nSiberian Tit is in trouble in Sweden, and may well disappear from vast swathes of the country if forestry methods do not become more sympathetic towards wildlife (Garth Peacock).\nSwedish Bird Monitoring and Birdlife Sweden have extensively surveyed the occurrence and frequency of forest birds around the nation. Montane forest populations were compared to those at lower altitudes, and the results showed that many of Sweden's woodland birds are in decline, especially in lowland areas – and, more specifically, many species need varied forest habitat with high conservation value in order to survive.\nAccording to the report, Siberian Tit, Siberian Jay, Eurasian Three-toed Woodpecker and Pine Grosbeak are four species which stand out from the rest. Nowadays, each occurs mainly in the mountain forest region, since this is where forest remains virgin, unblemished by human activity. Previously, these species also frequented the boreal forest region, but now most of Sweden's boreal forest has been clear-cut and turned into plantations, making survival difficult for these old-growth specialists.\nThe study said: \"The limited occurrence of these species below the mountain range area, especially of Siberian Tit and Pine Grosbeak, implies that these birds are remnants from a time when the forest landscape generally offered good habitats and living conditions. If that is the case, Siberian Tit and Pine Grosbeak will most probably die out from extensive parts of northern Sweden if large areas of natural forest are not restored.\"\nEurasian Three-toed Woodpecker is another old-growth specialist which suffers when plantation-based forestry is introduced (Terje Kolaas).\nInventories of key woodland habitats must be resumed in north-west Sweden and larger forest landscapes protected, according to the report. Between 2000 and 2018, 55,000 hectares of key woodland habitats were logged in the western parts of northern Sweden. Similar logging is taking place right across the country, which Swedish conservation NGO, Protect the Forest, has continuously reported on.\nIn a statement, Birdlife Sweden commented: \"The forest industry can no longer argue that all is peace and quiet just because plantations are allowed to grow in a larger proportion of Sweden's landscape compared to in the 1990s. Now the forest industry needs to start using sustainable forestry methods which support biodiversity.\"\nThe full report can be read online here." ]
[ "<urn:uuid:fb2affd6-283a-42a9-bdc0-a329e30f8a68>" ]
[ "CC-MAIN-2023-14" ]
[ "https://www.birdguides.com/news/forestry-endangers-swedens-boreal-woodland-birds" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945317.85/warc/CC-MAIN-20230325064253-20230325094253-00361.warc.gz" ]
[ "en" ]
[ 0.9501031041145325 ]
[ 567 ]
[ 3.203125 ]
[ 3 ]
[ "Norway’s marine and coastal waters are some of the most productive in the world, and support a rich and varied bird life. There are especially important seabird habitats in areas north of the Arctic Circle. Norway therefore has a major responsibility for seabird management.\nThe Environment Agency provides scientific advice and is coordinating the development of an integrated, ecosystem-based management regime for Norway's marine and coastal waters. Seabirds are an important component of marine ecosystems.The Agency is also responsible for management of seabird populations in Norway, including Svalbard. As Norway shares so many seabird populations with other countries, this involves a number of challenges.\nSeabirds have always been important resources in Norway, as they have been in many other countries. Historically, seabirds and their eggs were a vital part of the diet and an economic resource, whereas today they are seen mainly as an important component of properly functioning marine and coastal ecosystems and as an attractive feature of a dynamic coastal culture.\nNorway is responsible for an estimated six million breeding pairs of seabirds, or about 23 % of all seabirds that breed in the Northeast Atlantic. The mainland and islands north of the Arctic Circle are particularly important for seabirds. In addition, about 1.5 million seabirds breed in the Russian part of the Barents Sea, and spend part of the year in Norwegian waters. The Barents Sea supports some of the largest concentrations of seabirds in the world – an estimated 20 million seabirds in the summer months. Many of these populations are nationally or internationally important, making this a globally significant seabird area.\nIt is estimated that there are three million breeding pairs of seabirds in Svalbard, and about 2.4 million pairs in mainland Norway north of the Arctic Circle. Norway thus has a major international responsibility for seabird management.\nSeabirds are a vulnerable group, and are under pressure in a number of different ways. Threats include oil pollution, organic pollutants and other hazardous substances, food shortages resulting from overfishing, bycatches, disturbance of nesting sites, predators, alien species, climate change, and habitat degradation and fragmentation.\nPopulations of most seabirds are tending to decline because of a combination of human activities. Moreover, they are particularly vulnerable to climate change, which disturbs the balance of marine ecosystems and alters the availability of prey species on which seabirds feed.\nMany seabirds have specialised feeding habits and are at the top of food chains. This explains why they are sensitive to pollution, climate change and changes in food supplies. It also means they are useful indicators of the health of coastal ecosystems: it is possible to use seabird numbers as a basis for predicting changes in other key populations, for example the size of fish stocks.\nAn integrated, ecosystem-based management system is needed to safeguard seabird populations. This means that many different sectors must take their share of the responsibility for ensuring that viable populations of all the different species are maintained.\nThe Environment Agency needs reliable documentation of ecosystem dynamics and the state of ecosystems in order to play its part in their management and provide sound advice and information.\nThe Agency works to ensure that all those involved to play their part in closing existing gaps in knowledge. Other important tasks are to develop a common understanding of what integrated management of seabirds involves and to raise awareness of the importance of seabirds and their direct links with marine ecosystems.\nSeabirds include all the species that obtain most of their food from coastal and marine areas, either all year round or for large parts of the year.\nSeabirds do not belong to a particular systematic group, but they all show similarities in behaviour, ecological strategies and habitat use. They include divers, grebes, petrels and shearwaters, gannets, cormorants, geese and ducks, waders, gulls, terns and auks.\nIt is difficult to say precisely how many seabird species are found in Norwegian waters, because this depends on exactly how they are defined, but a reasonable answer is that there are 57 true seabirds, of which 28 are marine all year round. In addition, some species may use marine habitats at times and others are only present in Norwegian waters at certain times of year. If these are included, Norway can be said to have about 80 species of seabirds. Seabirds can be divided into groups of ecologically similar species:\nNorway is responsible for large seabird populations, and plays an important role in many regional and international bodies that are involved in seabird management.\nNorway plays an active part as a coastal state in international cooperation to monitor and improve the state of the environment in its regional seas. This includes working with the other North Sea states on protection of the North Sea area through the system of North Sea Conferences and Declarations.Norway is also a party to the OSPAR Convention for the Protection of the Marine Environment of the North-East Atlantic. The work of both these cooperation forums includes coordinating seabird monitoring activities.The Barents cooperation and Norway's environmental cooperation with Russia focus on further development and improvement of Russian environmental management and on cooperation in specific areas, including mapping and monitoring seabirds.Regional and international cooperation forums Norway has joined and that are involved in seabird management include:• the Joint Norwegian-Russian Commission on Environmental Protection, which has included separate working groups on the marine environment and seabirds since 1989.• The North Sea Conferences, the Nordic Council and the Nordic Council of Ministers all regularly discuss seabirds in a joint Nordic context. One product of their work is the Action plan for seabirds in Western-Nordic areas, which was published in 2010.• The OSPAR Convention. As a party to the convention, Norway has a special responsibility for species and habitats that are threatened in Norway. Threatened seabird species include Steller's eider and a subspecies of the lesser black-backed gull (Larus fuscus fuscus).• The Arctic Council. Seabirds are included in the mandates of two of its working groups, the Arctic Monitoring and Assessment Programme (AMAP) and Conservation of Arctic Flora and Fauna (CAFF). CAFF has established the Circumpolar Seabird Expert Group (CBird), which focuses on the management of seabirds in the Arctic. One of its objectives is to develop management plans for selected circumpolar species and groups such as guillemot and eider species and the ivory gull. Another CBird project looked at \"Birds of Arctic Conservation Concern\" – species that migrate out of the Arctic in winter .• The Bern Convention, the Bonn Convention and agreements adopted under it, the Ramsar Convention and others.***" ]
[ "<urn:uuid:db053dd8-275f-4d3d-8461-31ebda84a1bb>" ]
[ "CC-MAIN-2020-05" ]
[ "http://tema.miljodirektoratet.no/en/Areas-of-activity1/Species-and-ecosystems/Seabirds/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250624328.55/warc/CC-MAIN-20200124161014-20200124190014-00216.warc.gz" ]
[ "en" ]
[ 0.947454571723938 ]
[ 1408 ]
[ 4 ]
[ 4 ]
[ "1911 Encyclopædia Britannica/Allegiance\nALLEGIANCE (Mid. Eng. ligeaunce; med. Lat. ligeantia, &c.; the al- was probably added through confusion with another legal term, allegeance, an allegation; the Fr. allegeance comes from the English; the word is formed from “liege,” of which the derivation is given under that heading; the connexion with Lat. ligare, to bind, is erroneous), the duty which a subject or a citizen owes to the state or to the sovereign of the state to which he belongs. It is often used by English legal commentators in a larger sense, divided by them into natural and local, the latter applying to the deference which even a foreigner must pay to the institutions of the country in which he happens to live; but it is in its proper sense, in which it indicates national character and the subjection due to that character, that the word is important. In that sense it represents the feudal liege homage, which could be due only to one lord, while simple homage might be due to every lord under whom the person in question held land. The English doctrine, which was at one time adopted in the United States, asserted that allegiance was indelible: —Nemo potest exuere patriam. Accordingly, as the law stood before 1870, every person who by birth or naturalization satisfied the conditions described in the article Alien, though he should be removed in infancy to another country where his family resided, owed an allegiance to the British crown which he could never resign or lose, except by act of parliament or by the recognition of the independence or the cession of the portion of British territory in which he resided. By the Naturalization Act 1870, it was made possible for British subjects to renounce their nationality and allegiance, and the ways in which that nationality is lost are defined. So British subjects voluntarily naturalized in a foreign state are deemed aliens from the time of such naturalization, unless, in the case of persons naturalized before the passing of the act, they have declared their desire to remain British subjects within two years from the passing of the act. Persons who from having been born within British territory are British subjects, but who at birth became under the law of any foreign state subjects of such state, and also persons who though born abroad are British subjects by reason of parentage, may by declarations of alienage get rid of British nationality. Emigration to an uncivilized country leaves British nationality unaffected: indeed the right claimed by all states to follow with their authority their subjects so emigrating is one of the usual and recognized means of colonial expansion.\nThe doctrine that no man can cast off his native allegiance without the consent of his sovereign was early abandoned in the United States, and in 1868 congress declared that “the right of expatriation is a natural and inherent right of all people, indispensable to the enjoyment of the rights of life, liberty and the pursuit of happiness,” and one of “the fundamental principles of the republic” (United States Revised Statutes, sec. 1999). Every citizen of a foreign state in America owes a double allegiance, one to it and one to the United States. He may be guilty of treason against one or both. If the demands of these two sovereigns upon his duty of allegiance come into conflict, those of the United States have the paramount authority in American law.\nThe oath of allegiance is an oath of fidelity to the sovereign taken by all persons holding important public office and as a condition of naturalization. By ancient common law it might be required of all persons above the age of twelve, and it was repeatedly used as a test for the disaffected. In England it was first imposed by statute in the reign of Elizabeth (1558) and its form has more than once been altered since. Up to the time of the revolution the promise was, “to be true and faithful to the king and his heirs, and truth and faith to bear of life and limb and terrene honour, and not to know or hear of any ill or damage intended him without defending him therefrom.” This was thought to favour the doctrine of absolute non-resistance, and accordingly the convention parliament enacted the form that has been in use since that time — “I do sincerely promise and swear that I will be faithful and bear true allegiance to His Majesty . . .” (see Oath.)" ]
[ "<urn:uuid:1d67f559-185b-4cc9-9559-4d4f5360a5d1>" ]
[ "CC-MAIN-2017-26" ]
[ "https://en.wikisource.org/wiki/1911_Encyclop%C3%A6dia_Britannica/Allegiance" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321961.50/warc/CC-MAIN-20170627235941-20170628015941-00657.warc.gz" ]
[ "en" ]
[ 0.9729349613189697 ]
[ 921 ]
[ 3.65625 ]
[ 4 ]
[ "Silver Perchlorate Formula\nSilver perchlorate is an inorganic silver compound that is known for its explosiveness.\nFormula and structure: The chemical formula of silver perchlorate is AgClO4 and its molar mass is 207.319 g/mol. It is a salt composed of the silver cation (Ag+) and the perchlorate anion (ClO4-), in which the central chlorine atom is covalently bonded to three oxygen atoms through double bonds and one oxygen atom through a single bond, as shown below.\nPreparation: Silver perchlorate is commonly prepared by reacting a mixture of perchloric acid (HClO4) with silver nitrate (AgNO3) at high temperatures. It is also prepared through other routes such as the reaction between barium perchlorate and silver sulfate, or the reaction between perchloric acid and silver oxide.\nAgNO3 + HClO4 → AgClO4 + HNO3\nPhysical properties: Silver perchlorate is a white solid with a density of 2.81 g/mL and melting point of 486 °C. It commonly exists as a monohydrate (AgClO4.H2O) and is mildly deliquescent (absorbs moisture from air and turns into liquid).\nChemical properties: Silver perchlorate is highly soluble in water (unlike many other silver salts) as well as in several organic aromatic solvents. It is highly reactive and readily forms explosive mixtures. It reacts explosively with several chemicals including acetic acid, aniline, diethyl ether, diaminoethane, aromatic hydrocarbons, etc. It is self-reactive and its crystals can explode upon crushing. It is stable at room temperature in inert atmosphere, but when heated to high temperatures, it decomposes with the release of toxic fumes of chlorine.\nUses: Silver perchlorate is used in the manufacture of various explosives and as a catalyst in organic synthesis. Despite its explosive nature, AgClO4 is widely used in chemical synthesis as it is a useful source of the silver ion and a precursor for many silver compounds.\nHealth effects/safety hazards: Silver perchlorate is a hazardous and explosive chemical and must be handled with care. It can cause chemical burns when exposed to skin or eyes. Inhalation of the solid can cause respiratory irritation, while swallowing it can cause nausea, vomiting and chemical burns within the mouth and digestive tract.\nFormulas: Physics Formulas and Math Formulas\nGeneral Chemistry topics\nIonic and Net Ionic Equations" ]
[ "<urn:uuid:8f37aec4-ef13-4578-8551-d7d97c50d348>" ]
[ "CC-MAIN-2017-26" ]
[ "http://softschools.com/formulas/chemistry/silver_perchlorate_formula/327/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323604.1/warc/CC-MAIN-20170628101910-20170628121910-00359.warc.gz" ]
[ "en" ]
[ 0.9327182769775391 ]
[ 536 ]
[ 3.109375 ]
[ 3 ]
[ "Food systems are fundamental to our well-being. Our global food systems are changing as a result of population growth, rising incomes, dietary shifts, and climate change. These challenges place increasing pressure on finite natural resources. Reducing poverty and enhancing food and nutrition security, whilst sustaining livelihoods and the environment, is central to our group’s focus.\nTaking a systems perspective to these challenges is essential. As systems scientists, we draw on the expertise of our multidisciplinary team to better understand the workings of food systems, so that interventions in the system can be identified and prioritised.\nOur work focuses on:\nSolutions to Global Change: We identify planetary boundaries, and how climate and population growth may impact these boundaries and future food systems.\nNutrition and Health: We evaluate how agriculture contributes to nutritional and health outcomes now and in the future.\nSustainable Livestock Systems: We identify ways to sustainably harness pasture systems for crop and livestock production.\nFarming, Livelihoods and the Environment: We develop approaches to improve food systems, locally and globally.\nAgri-food System Innovation: We identify and design ways of strengthening innovation processes, practices and policies to improve the social, environmental and economic performance of agri-food systems.\nAchieving Impact: We develop and improve how we partner, evaluate and articulate our achievements.\nFollow the links for more information about each of our areas of interest and current projects and activities." ]
[ "<urn:uuid:a2dc5f2f-36e1-41bb-a889-bf84f5ca0c78>" ]
[ "CC-MAIN-2023-14" ]
[ "https://research.csiro.au/foodglobalsecurity/our-research-2/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949598.87/warc/CC-MAIN-20230331082653-20230331112653-00576.warc.gz" ]
[ "en" ]
[ 0.890505313873291 ]
[ 302 ]
[ 3.171875 ]
[ 3 ]
[ "VAISHNO DEVI TEMPLE\nVAISHNO DEVI TEMPLE INFORMATION & HISTORY\nThe Vaishno Devi temple is located in the trikuta hills,13kms away from Katra in the beautiful indian territory of Jammu and kashmir. Vaishno devi is a town where there is a Cave temple of Goddess Vaishno Devi. The Vaishno devi temple is also called as Mata Rani temple. Vaishnavi and Trikuta is the manifestation of the Hindu Goddess Durga. And There are three rocks in the holy caves of which are known as Pindies. These pindies manifest the three forms of the goddess as Maha Kali, Maha Saraswati and Maha Lakshmi.People belives that the goddess of the Vaishno devi calls the devotees here. She is also known as “Moonh Maangi Muradein Poori Karne Wali Mata” which means mother who fulfills all the wishes of their children.\nThe Arti of Mata Rani is one of the famous arti which is attended by Thousands of devotees. The arti performed twice a day before sunrise and after sunset by self purification by the priest present inside the temple.The holy cave of the Maa Vaishno devi temple has a great history behind it. According to the hindu religion in the treta yuga when the earth was overburden by the rule of demons. Goddess Gauri,Laxmi and Saraswati decided to combine their energy to vanish the Rule of demons on the earth.\nThe Combined energy of the three goddess formed a Goddess Vaishnavi. Vaishnavi devi was an eight armed goddess riding on the lion (tiger). After destroying the demons from the mother earth the goddess Vaishnavi was request to reside on earth. So she may keep all the evil away from mother earth. So she was hence given the name of Vaishnavi. The Katra village is the base trek for the Maa Vaishno devi temple which is located at Approx. 5200 ft which is 12 km.\nAlthough there are horses here for which you can pay and will drop you near the temple. You can also reach the temple by helicopter which starts from the hillfoots of Katra to Sanjichat which is about an 8 minutes journey. The helipad from the temples is just 2.5 kms away. This helicopter service is one of the major services and famous rides used by tourists visiting here. The views of the hills from the helicopter is a treat to watch. This is one of the Most visited Destinations during the Navratri as it takes 12-15 hours to take the darshan of Mata rani. Vaishno devi is one of the famous pilgrimage destination in India and one must visit the destination once in a lifetime.\nBest time to visit\nBest time to visit the temple is from March to July as the climate during this month is pleasant and nature friendly.\nAs in winters the temperature here is 0° so it is difficult for everyone to visit the temple until and unless one is 100 % physically fit. Many devotees from all over the world visit the temple every year." ]
[ "<urn:uuid:e4c50cbb-2bdb-40f3-bd8a-a239974bd373>" ]
[ "CC-MAIN-2023-14" ]
[ "https://bhatkantiholidays.com/places/top-25-best-places-to-visit-in-india/vaishno-devi-temple/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944996.49/warc/CC-MAIN-20230323034459-20230323064459-00370.warc.gz" ]
[ "en" ]
[ 0.9712348580360413 ]
[ 684 ]
[ 2.578125 ]
[ 3 ]
[ "Reading the emotions of others is essential for even the most basic social skills. Imagine someone without this ability; she might laugh at an angry coworker or try to comfort a delighted friend. But how do our brains pick up on what others are feeling? A face often fails to tell the whole story. We also use tone of voice, posture and even odor to solve the puzzle. (For more on the many ways we make use of sensory information, see Scientific American Mind’s special report on the senses in March/April 2012.) Here’s how our brain combines information from multiple senses to decode mood.\nAnimation by George Retseck, Ravenswood Media; Art Direction by Patricia Nemoto; Edited by Eric R. Olson\nTo learn more about how we sense the emotions of others, see the March 2012 Scientific American Mind.\nMore to Explore\nSensational Senses: Immerse Yourself\nEdges of Perception\nI Know How You Feel\nSmells Like Old Times\nMore Surprises About the Mind\nMaking Sense of the World, Several Senses at a Time\nMemory in the Brain [Interactive]\n10 Novels That Will Sharpen Your Mind [Interactive]" ]
[ "<urn:uuid:ad728a53-e0bd-4507-b040-3b2999ee9604>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.scientificamerican.com/article.cfm?id=social-cues-in-brain" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707186142/warc/CC-MAIN-20130516122626-00065-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.8796587586402893 ]
[ 246 ]
[ 3.859375 ]
[ 4 ]
[ "MITOSIS AND MEIOSISBy: Ana Paula Chacin\nTHE MITOSIS PROCESS In the process of Mitosis, the nucleus and its contents divide to make two new cells. This process has 4 important stages: Prophase Metaphase Anaphase Telophase There are 2 other stages called Interphase and Cytokinesis.\nORIGINAL CELL Genetic material / DNA Centrosomes Interphase: Interphase makes up most of the cell cycle.The cell makes proteins and starts copying DNA to prepare for division.This is the very first step of Mitosis.\nFIRST STAGE: PROPHASE ChromosomesDNA / CentrosomesGeneticmateria Genetic material / DNA is spreadl inside the nucleus.The nuclear membrane disappears. The genetic material / DNA condenses into chromosomes. Spindle fibers form. • Prophase: The first stage of mitosis. Copied chromatin comes together and forms duplicated chromosomes. The nuclear membrane disappears.\nSECOND STAGE: METAPHASE Spindle fibers ChromosomesThe cell changes Centrosomesinto an oval shape. The chromosomes • Metaphase: line up in the middle The stage in which the duplicated chromosomes of the cell. They are line up along the equatorial plate of the cell. connected by microtubules.\nTHIRD PHASE: ANAPHASE Centriole ChromosomesSpindlefibersChromosomes• Anaphase: The chromatids The chromosomes separate separate from eachother and and divide into opposite are pulled to opposite sides of sides of the cell. the cell.The cell gets longer.\nFOURTH PHASE: TELOPHASE Centrosomes New membrane Chromosomes The cells begin to separate. Spindle A nuclear membrane fibers disappear. forms around the chromosomes.Telophase: Spindle fibers disappear.A nuclear membrane forms around eachset of chromosomes.\nFIFTH PHASE: CYTOKINESIS Centrosomes Chromosomes Nuclear membraneCytokinesis: The cell’s cytoplasm divides,and two daughter cells are created.\nSOURCES: https://www.youtube.com/watch?v=75E_LL0axlQMLA Format: \\\"Animación Mitosis Etapas Incluye Introducción YConclusión DASH.\\\"YouTube.YouTube, n.d.Web. 22 Jan. 2015. Science book: Life science\nTHE MEIOSIS PROCESS Meiosis allows organisms to produce sex cells. It only happens in the formation of these cells. Unlike mitosis, meiosis involves 2 divisions of the cytoplasm and nucleus. These divisions are called meiosis I and meiosis II. They create 4 haploid cells. Each type of meiosis has 4 parts: Prophase I / Prophase II Metaphase I / Metaphase II Anaphase I / Anaphase II Telophase I / Telophase II\nORIGINAL CELL Chromosomes II Chromosomes I Nuclear Centrosomes membrane Interphase: This is the original cell before the process starts. It remains like this most of the time.\nMEIOSIS I: PROPHASE I Chromosomes 1 Chromosomes 2 Synapsis (swapping parts of the other chromosome) CentrosomesProphase I: Chromosomes come together andform pairs.The nuclear membrane breaks apart.The chromosomes swap parts.\nMEIOSIS I: METAPHASE I Chromosomes can have different orientation.Independent Independent Independent IndependentOrientation 1 Orientation 2 Orientation 3 Orientation 4Centrosomes Homologous chromosomes Spindle fibers Metaphase I: The chromosomes line up in the center og the cell.They are attached to spindle fibers.\nMEIOSIS I: ANAPHASE I Chromosomes Spindle fibers CentrosomesAnaphase I: The chromosomes areattached to spindle fibers and arepulled to opposite sides of the cell.\nMEIOSIS I: TELOPHASE INuclear DNAmembrane Centrosomes The cell starts to divide. Telophase I: A nuclear membrane forms around the pairs of chromosomes.The cell starts dividing.\nMEIOSIS I: CYTOKINESISNuclear membrane DNA Centrosome Cytokinesis: The cell divides and forms two daughter cells.\nMEIOSIS II: PROPHASE IIChromosomesCentrosome v Prophase II: The nuclear membrane surrounding the chromosomes breaks apart.\nMEIOSIS II: METAPHASE II Centrosome Spindle fibers Chromosomes Metaphase II: The chromosomes line up in the center of the cell.They are attached by spindle fibers.\nMEIOSIS II: ANAPHASE II Centrosome Spindle fibers ChromosomesAnaphase II: The chromosomes arepulled to opposite sides of the cell.\nMEIOSIS II: TELOPHASE II AND CYTOKINESISTelophase II: The chromosomes are Cytokinesis: The cytoplasmsurrounded by a nuclear membrane and the divides, creating 4 cells.cell begins to divide.\nSOURCES: https://www.youtube.com/watch?v=16enC385R0w MLA Format: \\\"Phases of Meiosis.\\\" YouTube.YouTube, n.d.Web. 22 Jan. 2015. Science book: Life science\nThanks for watching!" ]
[ "<urn:uuid:fc4f9180-576e-4494-b8c2-b360fb7dd3bb>" ]
[ "CC-MAIN-2023-14" ]
[ "https://www.fliphtml5.com/pvkk/mgcd" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00190.warc.gz" ]
[ "en" ]
[ 0.750407338142395 ]
[ 1163 ]
[ 3.703125 ]
[ 4 ]
[ "In light of recent discussions about art as knowledge production and the ways art should or could be taught, it seems fitting to look back to the early days of Modernism. In those days avant-garde art had not yet been taken for granted, having instead to be legitimized, interpreted and taught. One influential example of such a strategy of legitimization is Wassily Kandinsky’s Concerning the Spiritual in Art (1911). The book posits parity between art production, art theory and art teaching, the aim being to render art rational and scientific in order to establish it as an academic discipline. Over the course of his artistic career, Kandinsky made various attempts to give an institutional form to his ideas. ‘The Blue Rider’ – both the group and the almanac of the same name – can be seen as the first such attempt. Following his return to Russia from Munich at the outbreak of World War I, and especially throughout the post-Revolution years, Kandinsky engaged in extensive institutional activity teaching as a professor at Vkhutemas (Higher Art and Technical Studios, from 1918), as well as founding and directing InKhuK (Moscow Institute of Artistic Culture, 1920–1921) and GAKhN (State Academy for the Scientific Study of Art, 1921). During his time at the Bauhaus, from his appointment in 1922 until its closure in 1933, he pursued his analysis of art as a science and academic discipline, as reflected in Point and Line to Plane, a theoretical treatise published by the Bauhaus in 1926.\nThe rigour and determination with which Kandinsky pursued the academicization of art has often been overlooked due to misunderstandings caused by his choice of words. His use of ‘the spiritual’ is a prominent example, since it implies certain religious themes and attitudes not necessarily shared by Kandinsky. Rather than ‘the spiritual’, it would be better to speak here of ‘the affective’. Kandinsky’s book begins with a distinction between art as the representation of external reality and art as a means of conveying emotions and moods. Right at the beginning of the book, Kandinsky claims that the representation of external reality leaves us cold as viewers. He describes a typical exhibition of the time: ‘Animals in sunlight or shadow, drinking, standing in water, lying on the grass; near to, a Crucifixion by a painter who does not believe in Christ; flowers; human figures sitting, standing, walking; often they are naked; many naked women, seen foreshortened from behind; apples and silver dishes (…) The vulgar herd stroll through the rooms and pronounce the pictures “nice” or “splendid”. Those who could speak have said nothing, those who could hear have heard nothing. This condition of art is called “art for art’s sake”’.(1) This description shows clearly that what Kandinsky found irritating about naturalist painting was its formalism. When the motif is dictated from outside, all that matters is ‘how’ it is executed – the formal skill of the artist. Kandinsky opposes this formalist vision of art: only when one has defined ‘what’ art is can one inquire into the ‘how’.\nFor Kandinsky then, art is a medium for conveying affects. Rather than portraying external facts, art should visualize and transport inner states of mind. Consequently, he makes ‘inner necessity’ the criterion for evaluating art: a picture is successful if it adequately expresses specific emotions and moods. And if a picture does this, it is of no consequence whether it is a faithful rendering of external reality. A picture may be figurative or abstract – what matters is that it uses only those forms and colours needed for the visualization and efficient transmission of certain emotions. The greatest misconception with regard to the notion of ‘inner necessity’ is that it is often understood in expressionist terms, as an inner urge supposedly compelling the artist to paint this picture and not that one. The most important aspect of the argument is thus overlooked: for Kandinsky, the emotions and moods reside not in the person but in the picture. The ability of the picture to express and transmit certain moods to the viewer has nothing to do with whether the artist ‘actually’ experiences the mood in question. Which is why Kandinsky later spoke of inner necessity in more functional terms: it is purely a question of which means an artist considers necessary to infect viewers with a mood, to create an emotion in them. The artist is a specialist in the production and transmission of emotions, not their subject. Looking back, Kandinsky states that ‘brain work’ needs to ‘outweigh the intuitive part of creativity’ ending, perhaps, with ‘the total exclusion of “inspiration”,’ so that future art works are ‘created by calculation’ alone.(2)\nIn this light, it is clear why Kandinsky equated art and art theory: he wanted to develop a visual rhetoric that would be similar to discursive rhetoric. One should not forget that rhetoric long counted among the principal academic disciplines. Since the early Sophist schools in ancient Greece, there was an interest in how particular beliefs, views, emotions and moods can be transmitted to others. This question was (and remains) important above all to lawyers. And before deciding to make a name for himself as a painter, Kandinsky worked as a lawyer. So he knew only too well that the truth of a matter and the way this same truth is communicated are two different things. The communication obeys rules of its own, and it was the rules of art, understood as a visual rhetoric, that Kandinsky sought to reveal through his own art and his writing. This task is indeed both artistic and scientific. If an artistic portrayal of affects can be ‘calculated’, then it can also be taught and learned. All of Kandinsky’s paintings can thus be understood as teaching materials, as examples of how visual rhetoric works. This is also the significance of the remarks on the psychological effects of colours and forms that make up the greater part of his book. They can be read as prolegomena to the art-science of the future, framed as a study of the rules of visual rhetoric.\nLike Sophism before it, rhetoric has always been viewed with suspicion on account of its ability to serve evil ends. Which is why Kandinsky repeatedly underlined the artist’s ethical duty to make sure his rhetorical forces serve the good. As history was to show, this warning was not unfounded. During the Spanish Civil War of the 1930s, Alphonse Laurencic, a French artist and architect of Slovenian origin, used the ideas in Concerning the Spiritual in Art to decorate cells at a prison in Barcelona where Francoists captured by the Republicans were held. Each cell looked like an avant-garde art installation. With the compositions of colour and form in the cells, Laurencic aimed to cause the Francoist prisoners to experience disorientation, depression and deep sadness. To achieve this, he relied on Kandinsky’s theories of colour and form. And prisoners held in these cells really did report extreme negative moods and suffering due to their visual surroundings.(3) One can say, then, that Laurencic had a better grip on the meaning of Kandinsky’s treatise than many expressionist-minded artists and art theorists, as he used Kandinsky’s ideas not expressively but for a purpose – however dubious this purpose may appear in retrospect.\nTraditionally, rhetoric has an implacable enemy: the claim to truth. Ever since Plato, it has been asserted that truth has no need of additional rhetoric, being persuasive on the basis of its own immanent evidence. In his first major treatise, Kandinsky claims that the effect of the picture on the viewer does not depend on the artist’s ability to truthfully portray the external world. Later, Kandinsky was confronted with another, far more radical claim to truth: both the art of the Russian avant-garde (in particular the Suprematism of Kazimir Malevich) and geometric abstraction in the West (like that of Piet Mondrian) once more laid claim to pictorial truth. But this time it was not the truth of referentiality, but that of self-referentiality: now, the picture was to explicitly manifest both itself and its medium. Kandinsky’s response was not unlike the strategy he had already developed in Concerning the Spiritual in Art, writing Point and Line to Plane in 1926 as a critique of the new avant-garde dogmatism.\nInstead of accepting the geometrical constructions of the radical avant-garde as entities that are immediately evident, Kandinsky analyzed their geometrical lines and figures as vehicles that transport specific affects. The point in all of its variations (square, circle, etc.) is thus interpreted not as an elementary, self-contained form, but as an element removed from its usual context in writing where it marks a moment of interruption: silence in the middle of speech.(4) This meaning remains even when the point is placed on the ‘basic plane’ of the picture. Moreover, this independent position of the point, performing an interruption beyond what it is meant to interrupt, is interpreted by Kandinsky as a ‘useless, revolutionary state of affairs’,(5) not as a neutralization but as a radicalization of the usual function of the point. The straight line, on the other hand, is interpreted as the manifestation of a specific, constant force. He writes: ‘the entire field of straight lines is lyric, a fact which can be explained by the effect of a single force from the outside.’(6) Surprising as it may at first appear, this interpretation of strict geometry that negates its claim to self-evidence then permits Kandinsky to speak of jagged and curved lines as ‘dramatic’ because they give the impression of being influenced by a number of different forces. Thanks to this transition from the lyric to the dramatic, the supposedly self-evident geometrical construction is subsumed as a special case under the concept of composition. Once again here, the principle of inner necessity prevails: rather than contenting himself with geometrical forms alone, the artist must use all forms that allow him to express and convey specific constellations of forces and the corresponding affects.\nKandinsky is especially elegant and persuasive in his undermining of the avant-garde’s claim to address the specific media of the individual arts, in particular the medium of painting (a claim which, after World War II, was to extend far beyond these avant-garde beginnings, thanks especially to Clement Greenberg’s championing of the ‘flatness’ of the ‘modern picture’). But Kandinsky shows that one can only speak meaningfully about the medium of the canvas and the picture plane if this basic plane is understood as infinite, or at least of indeterminate size. The basic plane of any individual painting only ever has a single, finite configuration, however, a specific form with its own expressive force, being limited by two vertical and two horizontal lines that are ‘lyric’.(7) Moreover, the picture plane may have a shape that is square or one dominated more by horizontal and vertical lines. Each of these configurations of the picture plane has a specific mood-generating effect. Kandinsky thus interprets Malevich’s Black Square (1915) – a black square inside a white square – as a symbol of the ultimate silence: death.(8) This critique of the usual concept of the medium, or the mediality of the medium, is indeed a profound and radical one. The medium only becomes the message if the medium is infinite – which necessarily never occurs. As something finite, the medium is subject to its respective particular form.\nKandinsky practiced his critique of art’s claim to truth in the name of a visual rhetoric understood as a positive science. This visual rhetoric aimed to study the artistic means that transport specific affects – with the goal of accurately calculating the emotional impact of art. But like discursive rhetoric before it, whose failure led to its demise as an academic discipline, visual rhetoric was not destined to last. Nonetheless, Kandinsky has shown that every artistic form is affectively charged and thus also manipulative. There is no such thing as pure, autonomous, self-referential and totally transparent art. For Kandinsky, behind all art there reigns a dark force that manipulates the viewer’s emotions. The role of the artist consists in taking control of this force – which can only be achieved partially. But at least the artist is capable of exploring the workings of this force – and thus focusing attention on it as such. Kandinsky’s visual theory remains just as relevant as it was in his day – however, not as a positive science, but as a critical analysis of art’s claim to truth.\nTranslated by Nicholas Grindell\nBoris Groys is an art critic, media theorist and philosopher. He is currently Global Distinguished Professor of Russian and Slavic Studies at New York University, USA, and Senior Research Fellow at the Karlsruhe University of Arts and Design, Germany.\n1 Wassily Kandinsky, Concerning the Spiritual in Art (Dover Publications, 1977) p. 3\n2 Quoted from Max Bill’s introduction to the 1952 German edition, (Benteli Verlag, Bern) p. 10–11\n3 See Daniel Woolls, Abstract art used to drive prisoners mad, Associated Press/iol News, 28 March 2003, http://tinyurl.com/mbf2ykp, and Rob Haysom, Abstract Art: Pain and Discomfort, in Double Dialogues, No. 4, Winter 2003, http://tinyurl.com/mxvhxvr\n4 Kandinsky, Point and Line to Plane (Dover Publications, 1979) p. 25\n5 Ibid. p. 28\n6 Ibid. p. 67\n7 Ibid. p. 129\n8 Ibid. p. 130\nFirst published in Issue 11" ]
[ "<urn:uuid:695f4f85-bbf4-4dbe-b159-7c25c38c414d>" ]
[ "CC-MAIN-2020-05" ]
[ "https://frieze.com/article/kandinskys-bauhaus" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250613416.54/warc/CC-MAIN-20200123191130-20200123220130-00149.warc.gz" ]
[ "en" ]
[ 0.9627636671066284 ]
[ 2959 ]
[ 2.921875 ]
[ 3 ]
[ "Career Pathways Magnet\nFundamentals of Computing Course Syllabus (opens in new window)\nFundamentals of Computing is designed to introduce students to the field of computer science through an exploration of engaging and accessible topics. Through creativity and innovation, students will use critical thinking and problem solving skills to implement projects that are relevant to students’ lives. They will create a variety of computing artifacts while collaborating in teams. Students will gain a fundamental understanding of the history and operation of computers, programming, and web design. Students will also be introduced to computing careers and will examine societal and ethical issues of computing." ]
[ "<urn:uuid:5c0f76b0-cc5f-496d-8105-5aea5462405d>" ]
[ "CC-MAIN-2020-10" ]
[ "https://www.lexrich5.org/Page/19973" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145910.53/warc/CC-MAIN-20200224071540-20200224101540-00341.warc.gz" ]
[ "en" ]
[ 0.909054696559906 ]
[ 124 ]
[ 3.40625 ]
[ 3 ]
[ "When most people think of dinosaurs, they usually think of overgrown reptiles. However, ever since I took an upper-level geology class freshman year, I’ve known that most dinosaurs are actually more closely related to birds than reptiles. A recent study examined the skulls of modern day birds, birds’ intermediate ancestors, and dinosaurs and were able to show that birds have structural similarities in their skulls to baby dinosaurs. The authors conclude that birds evolved by slowing down development, and basically maintaining the juvenile characteristics of baby dinosaurs into adulthood. It’s pretty neat!" ]
[ "<urn:uuid:42a4f892-3ef4-43d4-aea8-b5cb04af92be>" ]
[ "CC-MAIN-2017-30" ]
[ "https://sarahpflanagan.wordpress.com/2012/05/29/evolution-of-birds/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423320.19/warc/CC-MAIN-20170720181829-20170720201829-00289.warc.gz" ]
[ "en" ]
[ 0.9651134610176086 ]
[ 115 ]
[ 3.234375 ]
[ 3 ]
[ "European banks and financial institutions are supporting damaging speculation in agricultural commodity markets and financing “land grabs” in the developing world, a report by the environmental group Friends of the Earth said on Thursday.\nFriends of the Earth accuses major banking groups, including Deutsche Bank, Barclays and HSBC, of engaging in practices which drive up food prices, remove smallholders from their land and degrade the environment.\nHowever, market participants robustly defend their role in ensuring that markets flow smoothly, and refuted the suggestion that it is speculation, rather than a complex mix of climatic and political factors, that drive prices.\nThe Friends of the Earth report focused on two linked issues – speculation in commodity markets, which drives prices higher and creates volatility; and the financing of large scale land acquisition.\nOn the former, there is a growing chorus of non-government organisations (NGOs) that insist that financial trading of agricultural commodity markets – i.e. that done by actors who buy and sell the futures products without intending to take delivery of the physical commodity that underpins it – adds to volatility in pricing.\nA report compiled for the G20 in June 2011 found that volatility in agricultural commodity markets had been greater since the turn of the Millennium, a period which also saw a rise in the number of financial participants in the commodity markets.\nPoorer households spend a greater proportional amount of their incomes on food, and fluctuations in prices can seriously impact their quality of life.\nFood price riots in the developing world were a feature of 2010, and many analysts believe that they sowed the seeds for the unrest in parts of North Africa that led to the Arab Spring.\nThat G20 report attributed that volatility to a number of factors – some climactic and some financial – but it did note that:\n“While analysts argue about whether financial speculation has been a major factor, most agree that increased participation by non-commercial actors such as index funds, swap dealers and money managers in financial markets probably acted to amplify short term price swings and could have contributed to the formation of price bubbles in some situations.”\nFutures are financial products that allow traders to set a price at a point in time for a commodity. They were designed to allow producers and buyers to reduce their risks – known as hedging – and have been part of the expansion of the globalised food market.\nSome traders defend their role by saying that they provide liquidity in the marketplace, and say that volatility is inevitable in a market where supply is driven by weather events – by their nature unpredictable and changeable. A spike in cereal prices in 2011, for example, was largely attributed to a drought in Russia, which led to wildfires and an export embargo.\nTraders' case is not helped by single incidences of hedge funds buying up large chunks of commodity markets. In July 2010, Anthony Ward, who runs the Armajaro hedge fund, bought 240,000 tonnes of cocoa, taking a massive and influential position in supply of the crop ahead of a period of political instability in Cote d'Ivoire, the world's largest producer.\nFriends of the Earth issued a militant press release that claimed: “Food speculation and the financing of land grabbing leads to a catastrophic instability in global food prices – forcing millions of people into poverty and hunger. European banks, insurers and funds that speculate with food and land are gambling with peoples’ lives whilst reaping huge profits. This industry needs strict regulation to protect the poorest in society.”\nThe banks named in the report are accused of marketing products that add to this volatility by giving investors with no direct link to the food industry access to commodity markets.\nHowever, when discussing the report, Daniel Pentzlin, sustainable finance campaigner for Friends of the Earth Europe, was slightly more conciliatory, accepting that there is little quantitative evidence to support the claim.\nPentzlin suggested that the bubble that developed around the Russian wheat shortage, which lead to high prices limiting supply to consumers, was exacerbated by speculation\n“It’s highly unlikely – although you can’t prove it – that without this speculative overshoot that it would have created a shortage of supply without these high prices,” he told the Huffington Post UK.\n\"You have a certain degree of volatility but actually it should be the role of these financial markets to deal with this volatility, to deal with it and also to create products to allow farmers to lock in their prices and for consumers to have reliable and sustainable prices. In effect, it doesn’t work,” he said.\n“I wouldn’t say that speculation itself is the sole or major creator of volatility. You have the volatility and instead of providing financial services that are leveling that out for buyers and producers, it’s exaggerating that volatility.”\nBarclays declined to discuss the report, and several other financial institutions implicated in the report did not respond to requests for comment.\nA Deutsche Bank spokesperson said that the bank was undertaking its own research into the link between speculation and food prices.\nPrivately, however, several institutions expressed disappointment at the resumption of a debate that, while they acknowledge is important, they believe is one that needs serious analysis and quantitative evidence.\nEach also repeated their defence – that while there may be a case to say that speculators do have an impact on the magnitude of price swings, the size of their positions in the market, relative to the massive scale of the trade buyers, means that that impact is marginal. Furthermore, they say, any effect is short-lived.\n“I think an important counter argument is that while it may be true that over a longer period, speculative overshooting might be corrected … these speculative bubbles really hurt people on the ground,” Pentzlin said.\n“If the prices for staple foods are excessively high over a couple of months, it means that people are starving.”\nPentzlin noted that the Commodity Futures Trading Commission (CTFC), the US regulator, has been working on defining what constitutes “excessive speculation” in a bid to make markets more responsive to their fundamental, underlying drivers. Similar focus is being proposed in Europe.\nThe NGO might be on safer ground with its second target – the financing of land acquisitions in developing countries.\nAs trends in food consumption change, in particular the growing appetite in emerging markets for meat products, the amount of arable land needed to supply the world’s needs is growing.\nWith much of the uncultivated land in the world falling in developing countries – Brazil, Ukraine and parts of Southern and Eastern Africa are increasingly popular destinations – there is a high risk that deals are not inclusive of local communities.\nIn December, a major piece of research by the International Land Coalition (ILC), a grouping of 40 organisations, estimated that more than 200 million hectares of land in developing countries had changed hands in large scale deals between 2000 and 2010.\nHandling such deals has been a difficult challenge for international agencies and development bodies, who understand the critical need for investment in areas that lack infrastructure. The World Bank and other institutions have been working on codes of conduct to support governments and businesses when signing over land.\n“While large land deals can create opportunities, they are more likely to cause problems for the poorest members of society, who often lose access to land and resources that are essential to their livelihoods,” the ILC report said. It also found that much of the land bought was cultivated for biofuels, rather than food.\nLand rights in many developing countries are not necessarily registered, leaving deals open to corruption and to the disenfranchisement of local smallholders. They are also, if badly handled, contributors to deforestation and environmental degradation.\nFriends of the Earth named a number of European institutions, including Deutsche Bank, HSBC, Generali, Unicredit, Credit Agricole and Allianz, which directly or indirectly finance land acquisitions, and calls on them to more actively take an interest in the practices of companies that they lend to." ]
[ "<urn:uuid:6dc9c2ed-649c-4253-af57-a4638f46b38f>" ]
[ "CC-MAIN-2017-30" ]
[ "http://www.huffingtonpost.co.uk/2012/01/11/friends-of-the-earth-accuses-banks-food-prices_n_1200298.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424148.78/warc/CC-MAIN-20170722202635-20170722222635-00241.warc.gz" ]
[ "en" ]
[ 0.965094804763794 ]
[ 1650 ]
[ 2.6875 ]
[ 3 ]
[ "Parts of the Sentence - Verbals - Gerunds\nA gerund always ends in ing and is used as a noun. Eating is fun.\nThe gerund can be a subject (Eating is fun.); a direct object (I like eating.); a predicate nominative (A fun time is eating.); an appositive (A fun time, eating, takes much time.); an indirect object (I give eating too much time.); or an object of a preposition (I give much time to eating.)\nGerunds can have with them direct objects, predicate nominatives, predicate adjectives or modifiers to form what is called a gerund phrase. Example: Eating solid foods is hard for babies. Eating is the gerund used as the subject of the verb is. It has its own direct object foods with the adjective solid, which together make up the gerund phrase eating solid foods serving as the subject of the sentence.\nGerunds can be compound. Example: Jeff likes hiking and camping.\nInstructions: Find the gerunds and gerund phrases in the following sentences and tell how they are used (subject, direct object, predicate nominative, appositive, indirect object, or object of the preposition).\n1. Directing traffic and helping school children is her job.\n2. Do you watch boxing or wrestling?\n3. For knitting and sewing you need good eyes.\n4. My needs, exercising and losing weight, must be realized soon.\n5. My mother gives helping and serving others all her time.\n--For answers scroll down.\n1. directing traffic/helping school children = subjects\n2. boxing/wrestling = direct objects\n3. knitting/sewing = objects of the preposition\n4. exercising/losing weight = appositives\n5. helping/serving others = indirect objects\nDAILY GRAMMAR - - - - by Mr. Johanson\nCopyright 2012 Word Place, Inc - - All Rights Reserved.\nFor your convenience, all of our lessons are available on our website in our\nlesson archive at http://www.dailygrammar.com/archive.html. Our lessons are\nDaily Grammar Lessons Search" ]
[ "<urn:uuid:4e8cfd2b-7c51-4428-b674-346e64729f88>" ]
[ "CC-MAIN-2013-20" ]
[ "http://dailygrammar.com/Lesson-213-Gerunds.htm" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704054863/warc/CC-MAIN-20130516113414-00086-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.910489022731781 ]
[ 463 ]
[ 3.359375 ]
[ 3 ]
[ "A successful business is one that will make a profit, and the only way you can make a profit is by charging more for the items you're selling than what you paid for them. The difference between your cost and your consumer's cost is called the \"mark-up price.\" Determining how high your mark-up can be is often difficult. If your mark-up is too high, your customers won't buy your products. But if your mark-up is too low, you won't make enough money to cover your costs.\nWrite down how much it cost you to purchase the product you are selling. Let's say the baseball you bought wholesale cost $2.50.\nWrite down the mark-up percentage you'd like to apply to the item you are selling. Let's assume you'd like to use a mark-up of 25% on the baseball.\nDivide your mark-up percentage by 100 to convert it to a decimal. In this example, 25 divided by 100 is 0.25.\nSubtract the result from Step 3 from 1. In the this example, 1 minus 0.25 is 0.75.\nDivide the original cost of your product by the result you obtained in Step 4. This result will be what you charge a customer to purchase the product. In the baseball example, you would divide $2.50 by 0.75, and the result would be 3.34. Your selling price would be $3.34.\nSubtract the the amount you paid for the product from the result in Step 5 to determine the mark-up price. In the baseball example, you would subtract $3.34 from $2.50. The mark-up price of the baseball is 84 cents." ]
[ "<urn:uuid:4d9b2c77-0c2e-4da7-99b9-27f2b6cfb747>" ]
[ "CC-MAIN-2017-26" ]
[ "http://www.ehow.com/how_8403693_calculate-markup-price.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320995.93/warc/CC-MAIN-20170627050500-20170627070500-00600.warc.gz" ]
[ "en" ]
[ 0.9651677012443542 ]
[ 359 ]
[ 3.171875 ]
[ 3 ]
[ "Interesting Facts About Asters- Discover Their Beauty Today\nWhile many people admire asters for their beautiful flower, most people don’t know that asters are more than\njust pretty flowers. Asters have a world-wide reputation and are common in many countries. Below are just a few\nof the many interesting and unusual facts about asters.\n- Asters are named after the Greek word for “star.” Asters have a star-shaped flower head similar to that of\na daisy. Like the stars in the sky, asters are found abundantly throughout the globe as they grow in a wide\nrange of climates from the tropics to cooler regions in the North.\n- The genus aster dates back over 4,000 years and has been used to decorate homes and gardens for centuries.\nAsters are part of the largest family of flowering plant-families, Asteraceae. A fair number of the\napproximately 600 species that are part of the aster genus are native to North America and can be easily\nspotted throughout the country for their lovely clusters of purple, blue, pink, white, or red petals.\n- This flower is not a single flower. While the aster looks like a single flower, it is actually a cluster of\nabout 300 small yellow disk flowers that are surrounded by colorful petals. This gives the illusion of a sole\nflower and creates a plush look.\n- Aster is the common name attributed to this flower throughout the universe. In many languages throughout\nthe world, including Swedish, Spanish, French, and Dutch, the aster is also pronounced as it is in English and\nGreek, “aster.” This flower needs no other name, as it is so well-known and loved.\n- The most common time to find asters is during the late summer and fall months, from late July to late\nOctober. Thus, as the leaves begin to fall and the sky begins to darken, asters enliven their environment with\ntheir lovely pastel colors.\n- Asters are not just used in gardens or as fresh cut flowers. In Denmark and Holland, asters are often the\nflower of choice to create an eye-catching windowsill decoration. They have a smaller flower than the daisy and\nare, therefore, the perfect size for many windowsills. They are also ideal for tabletop bouquets or\ncenterpieces, either on their own or as a complement to other festive flowers.\nWith such a rich history and with so many interesting facts about asters to discover, it’s no wonder that\npeople love growing asters and using them as decoration for their home, garden, and at special events. They are\nbeautiful, refreshing flowers known the world over and loved by people for centuries." ]
[ "<urn:uuid:24b610fb-2d42-401a-a558-3f53c7254517>" ]
[ "CC-MAIN-2017-26" ]
[ "http://www.wholesale-wedding-flowers.com/how-to-guides/facts-about-asters.php" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320057.96/warc/CC-MAIN-20170623114917-20170623134917-00603.warc.gz" ]
[ "en" ]
[ 0.9632653594017029 ]
[ 576 ]
[ 3.3125 ]
[ 3 ]
[ "COMMON NAMES: WHITE OAK, STAVE OAK, RIDGE WHITE OAK, FORKED-LEAF WHITE OAK\nDeciduous Sun Ht. 80 to over 100 Spread 50-60\nHABIT: Large, gorgeous tree with beautiful summer foliage and excellent red fall color. White oak has my favorite tree foliage. Leaves are deeply cut and rounded on the edges. Summer foliage color is deep green to slightly blue-green. Fall color will range from wine red to orange red.\nCULTURE: White oak is easy to grow in acid to neutral soils. Likes sandy soils best. It is fairly drought tolerant and requires little fertilizer.\nUSES: Shade tree.\nPROBLEMS: Unfortunately, this tree will not grow adequately in the black and white soils of north and central Texas. It must have deep, neutral-to-acid sandy loam.\nNOTES: White oak is without doubt one of our states most beautiful trees." ]
[ "<urn:uuid:00fe22f8-5e0b-4c73-84e2-11dcb7b700f8>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.dirtdoctor.com/White-Oak-Ridge_vq2667.htm" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703298047/warc/CC-MAIN-20130516112138-00009-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.8568220138549805 ]
[ 202 ]
[ 2.625 ]
[ 3 ]
[ "What role can biometrics play in aiding development? My guest this week, senior fellow Alan Gelb, explains why new biometric identification technologies may be the key to radically expanding the social, political, and commercial opportunities for people in the developing world. Biometrics, he says, make it possible to fulfil for people everywhere the right to a unique, personal identity.\nRelated ContentIdentification Conferences and Identity Gaps (Blog)\nAlan explains that there are three principal ways in which people can identify themselves. The first can be something that you have, like a driver’s license or credit card. The second is something you know, like a PIN or a password; and the third is something that you are, like a finger print or iris scan. Biometric technology relies on this third method in order to uniquely authenticate individuals—and the costs are plummeting.\nAlthough biometrics are often associated with law enforcement and security, especially in the post-9/11 world, two upcoming conferences, the Third Biometric Summit in Miami on March 3-6 and the Connect ID conference in Washington, D.C. later that month also will include discussions of a booming new market: providing individual identities to hundreds of millions of people in developing countries.\nBiometrics “most rapid growth is in developing countries,” Alan tells me. “Increasingly the applications are moving from security and law enforcement to a variety of development programs.”\nWhile having proof of identity is something many westerners may take for granted, Alan explains that the lack of identification is a major impediment for poor people in the developing world.\n“There are probably about 750 million children, people under the age of 16, who do not have birth certificates, who have never been officially registered,” he says. “Some of these will catch up later through national ID programs but others will not.”\nNot having identification prevents people from getting licenses of various types, opening bank accounts, registering property, and even from receiving services from the government. At a time when many people are concerned about governments hacking personal data, reading emails, and listening to phone calls, such unwilled obscurity might appeal to some people as an argument against the use of biometric identification.\nWhile Alan acknowledges that such privacy concerns are legitimate, he argues they are not sufficient reason to discourage the use of biometrics to the benefit the poorest.\n“It's very hard to argue that people at the bottom of the pyramid, and they almost always are at the bottom of the pyramid, should not have an ID on the grounds that ID may be abused,” he says. “Despite all the screams about ID, the ones who don't have it, who should be the most privileged by this argument, since they have the greatest privacy, are also the poorest. They have privacy only in the sense that nobody cares about them. They don't participate.”\nGiven the opportunity to receive identification, people line up. Alan argues that “there's a very strong lesson coming out of the comparative experience, which is that people will come forward, people are not afraid of technology, provided they think that it has something to offer them.”\nTune into the Wonkcast to hear more, including a discussion of the technical challenges in providing biometric identification at birth. And read Alan’s blog post in which he discusses some of the new trends likely to be hot topics at the upcoming biometric conferences in Miami and Washington.\nMy thanks to Kristina Wilson for recording and editing the Wonkcast and for a draft of this blog post.\nCGD blog posts reflect the views of the authors, drawing on prior research and experience in their areas of expertise. CGD is a nonpartisan, independent organization and does not take institutional positions." ]
[ "<urn:uuid:04ce76dc-c20a-40b6-a201-a2016dabce36>" ]
[ "CC-MAIN-2023-14" ]
[ "https://cgdev.org/blog/right-personal-identity-alan-gelb" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945282.33/warc/CC-MAIN-20230324113500-20230324143500-00385.warc.gz" ]
[ "en" ]
[ 0.9544358849525452 ]
[ 789 ]
[ 2.59375 ]
[ 3 ]
[ "It’s already an exciting time for Australia in the field of astronomy and space science. But we’ve just received an astronomical boost with the announcement of CSIRO’s role with the Breakthrough Prize Foundation’s (BPF) US$100 million dollar search for extraterrestrial intelligence, called Breakthrough Listen.\nCSIRO has signed a multi-million dollar agreement to use its 64 metre Parkes radio telescope in the quest to search for intelligent life elsewhere in the universe. Breakthrough Listen will be allocated a quarter of the science time available on the Parkes telescope from October 2016 for a period five years, on a full cost recovery basis.\nThe Parkes observations will be part of a larger set of initiatives to search for life in the universe. The ET hunters will also use time on the Green Bank telescope in West Virginia, operated by the US National Radio Astronomy Observatory, and a telescope at the University of California’s Lick Observatory.\nCSIRO has the only capability for radio astronomy in the southern hemisphere that can deliver the scientific goals for the new initiative. The Parkes Radio Telescope is essential for the scientific integrity of the Search for Extraterrestrial Intelligence (SETI). It is ideally situated for a search such as this. The most interesting and richest parts of our own galaxy, the Milky Way, pass directly overhead. If we are going to detect intelligent life elsewhere, it is most likely going to be found in that part of the galaxy towards the centre of the Milky Way.\nThe Parkes Radio Telescope is also one of the world’s premier big dishes and has outstanding ability to detect weak signals that a search like this requires. It has always been at the forefront of discovery, from receiving video footage of the first Moon walk on 20 July 1969 (which was dramatised in the movie The Dish), to tracking NASA’s Curiosity rover during its descent onto Mars in 2012, to now once again searching for intelligent life.\nIt has also played a leading role in the detection and study of pulsars, small dense stars that can spin hundreds of times a second, the recent discovery of enigmatic (but boringly named) fast radio bursts, or FRBs, and in the search for gravitational waves.\nParkes also played a leading role in previous SETI searches. In 1995 the California-based SETI Institute used the telescope for six months for its Project Phoenix search. The Parkes telescope provided the critical capability to search the southern sky that could not be accessed using telescopes in the northern hemisphere.\nThe latest initiative is being led by a number of the world’s most eminent astrophysicists and astronomers. Professor Matthew Bailes, ARC Laureate Fellow at the Centre for Astrophysics and Supercomputing at Swinburne University of Technology in Melbourne, will be the Australian lead of the SETI observing team using the Parkes telescope.\nThe program will nicely complement the existing scientific uses of the Parkes telescope. Although it will take up a quarter of Parkes time, it will benefit the research undertaken during the other three-quarters of the time the telescope is in operation. It will enable even greater scientific capability to be provided to a wide range of astronomy research through both the financial support and through the provision of new data processing and analysis systems and techniques. Incredible advances in computing technology make it possible for this new search to scan much greater swaths of the radio spectrum than has ever before been explored.\nRather than trying to guess where on the radio dial astronomers might receive a signal, they can now search an entire region of the radio spectrum in a single observation. The dramatic increase in data processing capability has also meant that astronomers can analyse telescope data in new ways, searching for many different types of artificial signals. CSIRO is thrilled to be part of this global initiative which takes advantage of the significant advances that have been made in computation and signal processing since the search for extraterrestrial life began. The probability of detecting intelligent life is small but it is much greater today than ever before.\nTo be the first to discover intelligent life would be a phenomenal achievement not only for the scientific community but for all humankind.\nLewis Ball is Director, Astronomy and Space Science at CSIRO.\nThis article was originally published on The Conversation. Read the original article." ]
[ "<urn:uuid:28afc231-bc59-4df8-bcec-6c7ae7eb075a>" ]
[ "CC-MAIN-2023-14" ]
[ "https://blog.csiro.au/the-hunt-for-et-will-boost-australian-astronomy/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00192.warc.gz" ]
[ "en" ]
[ 0.9259001612663269 ]
[ 891 ]
[ 3.015625 ]
[ 3 ]
[ "Children are little sponges when it comes to learning. I have a prepared curriculum that is FUN and yet exceeds the headstart requirements. I have also incorporated some extra teaching methods outside of the formal curriculum that will enable your child to transition smoothly and confidently into the kindergarten environment.\nI have a structured schedule from 9:30am to 11am daily for preschool activities and projects. We do have breaks from schoolwork throughout the year and a relaxed summer curriculum that keeps them from regressing over the summer months break.\nPLAY IS CRITICAL to child development. Play promotes progress for developmental milestones. A means through which children learn to socialize and express feelings. So outside of our structured class schedule they have time to have fun and enjoy being a kid! FUN, FUN, FUN\nNOTE: the progress outlined, depends on where your child is developmentally and how long they have been in care at this location\nProgram for 3 years old\nAt 3 years old they are introduced to and participate with the older children in our daily curriculum fun. This includes songs (including ASL, rhythm, fun, educational), letter recognition/sound association, counting, months of the year, days of the week,etc… YES, all of this daily !!!!! They use multiple sensory learning techniques, which is a foundation for building those strong brain synapses. We are constantly building and keeping those neuro-paths strong!!\nWriting is now introduced to your child using individual dry erase boards and my own technique that has them writing upper/lower case letters and numbers through 10, very quickly and comfortably.\nWe rote count daily visually viewing the numbers, varies by day 1 – 30. They count objects to 5, again multiple sensory which re-enforces what they have learned and shows a practical application. They also participate and begin to learn “Touch Point Math”. Touch point math helps them recognize the number, reinforce counting and is later utilized in addition.\nProgram for 3 ½ to 4 years old\nYour 3 ½ – 4 year old is/has transitioned to the early reading program. This program is one on one with the teacher and it moves fairly quickly. Your child (typically) will be able to read 3 letter word sentences within a few months. You will notice them sounding out words when you are out driving, perusing books in your house and noticing that there are words all around them. This is a very fun and exciting time for them!\nBy the age of 3 ½, the child is comfortable writing most of the letters and numbers 1 – 10. They will have the opportunity to practice writing their name almost daily. While they are learning to read they are also starting to learn to write. Again, a great blending and re-enforcement of what they are learning to read and this in turn makes sense of writing for them.\nNow your child is rote counting to 20 on their own easily and in some cases to 30. They recognize numbers from 1 – 10 and maybe higher. At this point they should be comfortable with most of the touch points in ”Touch Point Math” from 1 – 9.\nThey are now introduced to and learning about worksheets. It is not important for them to answer everything right or to complete them, just get comfortable with them and not be intimidated by them.\nProgram for 4 to 5 years old\nBy 4 – 5 years old your child is comfortable with reading small stories and built a great comprehension of what they have read.\nMy reading program incorporates many different areas. By the time your child starts kindergarten they will know the names and sounds of all of the letters in the alphabet. They have learned to read phonetically and will be comfortably reading (typically at a late kindergarten early 1st grade level).\nNote: If your child starts the program after they turn 4 or 5 years old they can still have a great foundation to work with and even be reading by the time they start kindergarten. The more time they have in the program the further they will get.\nAges 4 to 5 are comfortable with writing. Typically they can write words, notes, first and last names without help. Now it is fine tuning the writing skills to fit on kindergarten ruled paper. They are now writing with a pencil!!\nNow your child is comfortably counting/recognition to at least 30, but most can count and recognize numbers to 100 or more. They have learned to count by tens and this is when “Base Ten Math” is introduced. Base ten math is used by most school districts. Your child will be doing “Base Ten math” worksheets as well.\nNow the expectation is to work on correctly answering and working these sheets. These cover several subjects." ]
[ "<urn:uuid:f4cbfaff-25f7-48e7-b186-13f996adc469>" ]
[ "CC-MAIN-2023-14" ]
[ "http://www.aweeliltotsdaycare.com/for-parents/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945315.31/warc/CC-MAIN-20230325033306-20230325063306-00164.warc.gz" ]
[ "en" ]
[ 0.9630824327468872 ]
[ 1014 ]
[ 2.59375 ]
[ 3 ]
[ "A terrestrial planet, telluric planet, or rocky planet is a planet that is composed primarily of silicate rocks or metals. Within the Solar System, the terrestrial planets are the inner planets closest to the Sun, i.e. Mercury, Venus, Earth, and Mars. The terms \"terrestrial planet\" and \"telluric planet\" are derived from Latin words for Earth (Terra and Tellus), as these planets are, in terms of structure, Earth-like. These planets are located between the Sun and the asteroid belt.\nTerrestrial planets have a solid planetary surface, making them substantially different from the larger gaseous planets, which are composed mostly of some combination of hydrogen, helium, and water existing in various physical states.\nAll terrestrial planets in the Solar System have the same basic type of structure, such as a central metallic core, mostly iron, with a surrounding silicate mantle. The Moon is similar, but has a much smaller iron core. Io and Europa are also satellites that have internal structures similar to that of terrestrial planets. Terrestrial planets can have canyons, craters, mountains, volcanoes, and other surface structures, depending on the presence of water and tectonic activity. Terrestrial planets have secondary atmospheres, generated through volcanism or comet impacts, in contrast to the giant planets, whose atmospheres are primary, captured directly from the original solar nebula.\nSolar System's terrestrial planets\nDuring the formation of the Solar System, there were probably many more terrestrial planetesimals, but most merged with or were ejected by the four terrestrial planets.\nDwarf planets, such as Ceres, Pluto and Eris, and small Solar System bodies are similar to terrestrial planets in the fact that they do have a solid surface, but are, on average, composed of more icy materials (Ceres, Pluto and Eris have densities of 2.17, 1.87 and 2.52 g·cm−3, respectively, and Haumea's density is similar to Pallas's 2.8 g·cm−3). The Earth's Moon has a density of 3.4 g·cm−3 and Jupiter's satellites, Io, 3.528 and Europa, 3.013 g·cm−3; other satellites typically have densities less than 2 g·cm−3.\nThe uncompressed density of a terrestrial planet is the average density its materials would have at zero pressure. A greater uncompressed density indicates greater metal content. Uncompressed density differs from the true average density (also often called \"bulk\" density) because compression within planet cores increases their density; the average density depends on planet size, temperature distribution and material stiffness as well as composition.\n|Object||Density (g·cm−3)||Semi-major axis (AU)|\nThe uncompressed density of terrestrial planets trends towards lower values as the distance from the Sun increases. The rocky minor planet Vesta orbiting outside of Mars is less dense than Mars still at, 3.4 g·cm−3.\nCalculations to estimate uncompressed density inherently require a model of the planet's structure. Where there have been landers or multiple orbiting spacecraft, these models are constrained by seismological data and also moment of inertia data derived from the spacecraft orbits. Where such data is not available, uncertainties are inevitably higher. It is unknown whether extrasolar terrestrial planets in general will show to follow this trend.\nExtrasolar terrestrial planets\nMost of the planets discovered outside the Solar System are giant planets, because they are more easily detectable. But since 2005, hundreds of potentially terrestrial extrasolar planets have been found, with several being confirmed as terrestrial. Most of these are super-Earths, i.e. planets with masses between Earth's and Neptune's; super-Earths may be gas planets or terrestrial, depending on their mass and other parameters.\nWhen 51 Pegasi b, the first planet found around a star still undergoing fusion, was discovered, many astronomers assumed it to be a gigantic terrestrial, because it was assumed no gas giant could exist as close to its star (0.052 AU) as 51 Pegasi b did. It was later found to be a gas giant.\nIn 2005, the first planets orbiting a main-sequence star and which show signs of being terrestrial planets, were found: Gliese 876 d and OGLE-2005-BLG-390Lb. Gliese 876 d orbits the red dwarf Gliese 876, 15 light years from Earth, and has a mass seven to nine times that of Earth and an orbital period of just two Earth days. OGLE-2005-BLG-390Lb has about 5.5 times the mass of Earth, orbits a star about 21,000 light years away in the constellation Scorpius. From 2007 to 2010, three (possibly four) potential terrestrial planets were found orbiting within the Gliese 581 planetary system. The smallest, Gliese 581e, is only about 1.9 Earth masses, but orbits very close to the star. An ideal[vague] terrestrial planet would be two Earth masses,[why?] with a 25-day orbital period[why?] around a red dwarf[why?]. Two others, Gliese 581c and Gliese 581d, as well as a disputed planet, Gliese 581g, are more-massive super-Earths orbiting in or close to the habitable zone of the star, so they could potentially be habitable, with Earth-like temperatures.\nIn the same year, the Kepler Space Observatory Mission team released a list of 1235 extrasolar planet candidates, including six that are \"Earth-size\" or \"super-Earth-size\" (i.e. they have a radius less than 2 Earth radii) and in the habitable zone of their star. Since then, Kepler has discovered hundreds of planets ranging from Moon-sized to super-Earths, with many more candidates in this size range (see image).\nList of terrestrial exoplanets\nThe following exoplanets have a density of at least 5 g/cm3 and a mass below Neptune's and are thus very likely terrestrial:\nKepler-10b, Kepler-20b, Kepler-36b, Kepler-48d, Kepler 68c, Kepler-78b, Kepler-89b, Kepler-93b, Kepler-97b, Kepler-99b, Kepler-100b, Kepler-101c, Kepler-102b, Kepler-102d, Kepler-113b, Kepler-131b, Kepler-131c, Kepler-138c, Kepler-406b, Kepler-406c, Kepler-409b.\nThe Neptune-mass planet Kepler-10c also has a density >5 g/cm3 and is thus very likely terrestrial.\nIn 2013, astronomers reported, based on Kepler space mission data, that there could be as many as 40 billion Earth- and super-Earth-sized planets orbiting in the habitable zones of Sun-like stars and red dwarfs within the Milky Way. 11 billion of these estimated planets may be orbiting Sun-like stars. The nearest such planet may be 12 light-years away, according to the scientists. However, this does not give estimates for the number of extrasolar terrestrial planets, because there are planets as small as Earth that have been shown to be gas planets (see KOI-314c).\nSeveral possible classifications for terrestrial planets have been proposed:\n- Silicate planet\n- The standard type of terrestrial planet seen in the Solar System, made primarily of silicon-based rocky mantle with a metallic (iron) core.\n- Carbon planet (also called \"diamond planet\")\n- A theoretical class of planets, composed of a metal core surrounded by primarily carbon-based minerals. They may be considered a type of terrestrial planet if the metal content dominates. The Solar System contains no carbon planets, but does have carbonaceous asteroids.\n- Iron planet\n- A theoretical type of terrestrial planet that consists almost entirely of iron and therefore has a greater density and a smaller radius than other terrestrial planets of comparable mass. Mercury in the Solar System has a metallic core equal to 60–70% of its planetary mass. Iron planets are thought to form in the high-temperature regions close to a star, like Mercury, and if the protoplanetary disk is rich in iron.\n- Coreless planet\n- A theoretical type of terrestrial planet that consists of silicate rock but has no metallic core, i.e. the opposite of an iron planet. Although the Solar System contains no coreless planets, chondrite asteroids and meteorites are common in the Solar System. Coreless planets are thought to form farther from the star where volatile oxidizing material is more common.\n- Chthonian planet\n- Earth analog\n- List of potentially habitable exoplanets\n- Planetary habitability\n- Venus zone\n- List of gravitationally rounded objects of the Solar System\n- Dr. James Schombert (2004). \"Primary Atmospheres (Astronomy 121: Lecture 14 Terrestrial Planet Atmospheres)\". Department of Physics University of Oregon. Archived from the original on 13 July 2011. Retrieved 22 December 2009.\n- NASA: Moons of Jupiter\n- Space: The Earth's Moon density\n- \"Course materials on \"mass-radius relationships\" in planetary formation\" (PDF). caltech.edu. Archived (PDF) from the original on 22 December 2017. Retrieved 2 May 2018.\n- Carole Haswell, Transiting Exoplanets Archived 7 November 2015 at the Wayback Machine\n- Michael Perryman, The Exoplanet Handbook Archived 7 November 2015 at the Wayback Machine\n- Sara Seager, Exoplanets Archived 7 November 2015 at the Wayback Machine\n- \"Lightest exoplanet yet discovered\". ESO (ESO 15/09 – Science Release). 21 April 2009. Archived from the original on 5 July 2009. Retrieved 15 July 2009.\n- M. Mayor; X. Bonfils; T. Forveille; X. Delfosse; S. Udry; J.-L. Bertaux; H. Beust; F. Bouchy; C. Lovis; F. Pepe; C. Perrier; D. Queloz; N. C. Santos (2009). \"The HARPS search for southern extra-solar planets,XVIII. An Earth-mass planet in the GJ 581 planetary system\". Astronomy & Astrophysics. 507 (1): 487–494. arXiv:0906.2780. Bibcode:2009A&A...507..487M. doi:10.1051/0004-6361/200912172.\n- Kaufman, Rachel (30 August 2011). \"New Planet May Be Among Most Earthlike – Weather Permitting, Alien world could host liquid water if it has 50 percent cloud cover, study says\". National Geographic News. Archived from the original on 23 September 2011. Retrieved 5 September 2011.\n- Rincon, Paul (22 March 2012). \"Thousand-year wait for Titan rain\". Archived from the original on 25 December 2017 – via www.bbc.com.\n- Namely: KOI 326.01 [Rp=0.85], KOI 701.03 [Rp=1.73], KOI 268.01 [Rp=1.75], KOI 1026.01 [Rp=1.77], KOI 854.01 [Rp=1.91], KOI 70.03 [Rp=1.96] – Table 6). A more recent study found that one of these candidates (KOI 326.01) is in fact much larger and hotter than first reported. Grant, Andrew (8 March 2011). \"Exclusive: \"Most Earth-Like\" Exoplanet Gets Major Demotion—It Isn't Habitable\". 80beats. Discover Magazine. Archived from the original on 9 March 2011. Retrieved 9 March 2011. External link in\n- Borucki, William J; et al. (2011). \"Characteristics of planetary candidates observed by Kepler, II: Analysis of the first four months of data\". The Astrophysical Journal. 736 (1): 19. arXiv:1102.0541. Bibcode:2011ApJ...736...19B. doi:10.1088/0004-637X/736/1/19.\n- Overbye, Dennis (4 November 2013). \"Far-Off Planets Like the Earth Dot the Galaxy\". New York Times. Archived from the original on 5 November 2013. Retrieved 5 November 2013.\n- Petigura, Eric A.; Howard, Andrew W.; Marcy, Geoffrey W. (31 October 2013). \"Prevalence of Earth-size planets orbiting Sun-like stars\". Proceedings of the National Academy of Sciences of the United States of America. 110 (48): 19273–19278. arXiv:1311.6806. Bibcode:2013PNAS..11019273P. doi:10.1073/pnas.1319909110. PMC 3845182. PMID 24191033. Archived from the original on 9 November 2013. Retrieved 5 November 2013.\n- Staff (7 January 2013). \"17 Billion Earth-Size Alien Planets Inhabit Milky Way\". Space.com. Archived from the original on 6 October 2014. Retrieved 8 January 2013.\n- Khan, Amina (4 November 2013). \"Milky Way may host billions of Earth-size planets\". Los Angeles Times. Archived from the original on 6 November 2013. Retrieved 5 November 2013.\n- \"Newfound Planet is Earth-mass But Gassy\". harvard.edu. 3 January 2014. Archived from the original on 28 October 2017. Retrieved 2 May 2018.\n- Naeye, Bob (24 September 2007). \"Scientists Model a Cornucopia of Earth-sized Planets\". NASA, Goddard Space Flight Center. Archived from the original on 24 January 2012. Retrieved 23 October 2013." ]
[ "<urn:uuid:a6353746-5d03-4d68-a36b-0385eabbd7c1>" ]
[ "CC-MAIN-2020-05" ]
[ "https://en.wikipedia.org/wiki/Terrestrial_planet" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250606269.37/warc/CC-MAIN-20200122012204-20200122041204-00536.warc.gz" ]
[ "en" ]
[ 0.879414439201355 ]
[ 2934 ]
[ 4.125 ]
[ 4 ]
[ "John Clark, Professor\nLens cells offer a unique opportunity to study the chemical and molecular basis for the regulation of cell differentiation. Lens cells begin opaque and differentiate into transparent cells and the optical quality of the lens is the result of a highly synchronized, multistep process of cell proliferation , migration, and differentiation. The transparency and refractile properties of the lens are determined by expression of high concentrations of the alpha and beta/gamma crystallin families of proteins. The diversity of the individual crystallins contributes to the complex structural organization of the proteins in the homogeneous transparent cytoplasm. The structural and functional interactions between crystallin proteins that are responsible for the development and maintenance of lens cell transparency and refraction are the primary considerations of our research effort. Quantitative techniques of protein biochemistry, molecular biology, LASER light scattering spectroscopy, and light and electron microscopy are used in these studies. We are developing new methods for analysis of electron and light micrographs of cell and tissue structure using 2-D Fourier methods, fractal analysis and chaos theory.\nThe principles of lens cell differentiation apply to differentiation of other cells and tissues including red blood cells, skin cells, and muscle fibers." ]
[ "<urn:uuid:c5adc05a-cbb2-475c-af68-8bd0d90f6f63>" ]
[ "CC-MAIN-2013-20" ]
[ "http://depts.washington.edu/bpsd/faculty/jclark" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00040-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.8774407505989075 ]
[ 245 ]
[ 2.546875 ]
[ 3 ]
[ "We believe that it is important to allow the children to express their own ideas to extend their learning. Inspiring children through purposeful, engaged learning will encourage them to utilise resources and develop life skills.\nWithin our school and classrooms, we will provide the time and opportunities to discuss and take calculated risks to find solutions. By offering a choice of strategies, children will discover alternative methods to solve problems.\nAs a result of promoting thinking, we will see focused questioning, discussion, a variety of planning techniques and inspired children who will use available resources to develop their knowledge and enhance their learning." ]
[ "<urn:uuid:878c1651-7d69-4095-8c1d-925fe1a60182>" ]
[ "CC-MAIN-2017-26" ]
[ "http://www.foxhills-jun.hants.sch.uk/thinking/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319575.19/warc/CC-MAIN-20170622135404-20170622155404-00195.warc.gz" ]
[ "en" ]
[ 0.9480364322662354 ]
[ 119 ]
[ 3.3125 ]
[ 3 ]
[ "Last years, interest in airtightness increases among all construction fields and airtightness becomes a major issue in the reduction of energy consumption in buildings. Nevertheless, there is a lack of understanding of air displacements through weak spots in buildings (airpaths). Firstly we develop first the concept of Potential Improvement Graph (PIG chart). These graphs represent the “improvement curves” of a given airpath (airflow indicator against airpath parameter). As an airpath can have multiple significant parameters, PIG charts can be n-dimension graphs. Such curves could be used by the contractor to anticipate the impact of a corrective measure on the airflow. Secondly we define three types of airpaths: opening, junction and residual. We suggest that a discontinuity in the air barrier can always be defined as a function of these three types of airpaths. This paper concludes on opportunities given by this work. (1) It could be used as a basis for other projects on air leakage at airpath scale. Such projects would force the researcher, and help the reader, to understand issues of air displacements. (2) This work can also be used as a basis for the development of tools to help field actors to deal with airtightness. Such tools would encourage their users to think in terms of air displacement.\nComponent leakage: potential improvement graphs and classification of airpaths\nLanguages: English | Pages: 7 pp\n38th AIVC Conference \"Ventilating healthy low-energy buildings\", Nottingham, UK, 13-14 September 2017" ]
[ "<urn:uuid:45d15e37-6c69-4cb4-a7db-ee615527c40c>" ]
[ "CC-MAIN-2023-14" ]
[ "https://www.aivc.org/resource/component-leakage-potential-improvement-graphs-and-classification-airpaths?volume=37270" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944996.49/warc/CC-MAIN-20230323034459-20230323064459-00171.warc.gz" ]
[ "en" ]
[ 0.9418573379516602 ]
[ 328 ]
[ 2.640625 ]
[ 3 ]
[ "1.Pedagogical innovation and creativity\nA pedagogical module in 5 sequences and 10 languages proposes the activities related to the general objective for an annual progress. It can be adapted the school specific conditions (curriculum, level of students) and mainly related to STEM and ICT competences\nThe general organization: Schools and students’ presentations, organization of the storage of the images (materials and Google drive), coordination of the measures, annual progress is explained in the work process page\nInteractions among students are encouraged in forums\n2. Curricular integration\nAll the activities and their objectives can be integrated to any school curriculum (kindergarten, primary, middle and high school). They are mainly related and evaluated to the key competences in STEM and ICT.\nThe general objective allows a multidisciplinary approach (arts, history, foreign language). The productions are archived in the transdisciplinary activities page of the Eratosthenes Earth Experiment group.\n3. Partner school communication and interaction\nThe Students of the “Enter the data” task force communicate in real time, sharing their data measurements in the google sheet. Depending on the different time zones, the western partner can immediately draw the Geogebra figure.\nLive events were organized for live measurements or communication of results. The last one was the opportunity to have an on line quizz created by the students.\nIn the calendar of collaborative measures, important events are fixed and unavoidable astronomical dates. A strategy of communication between teachers for the coordination of the measures uses social networks.\n4. Collaboration between partner schools\nThe students are organized in International teams called task forces. Their role is to accomplish experimental or ICT elementary tasks that contribute to the achievement of general objective: calculate the circumference of the Earth.\nThe results are published in the daily pages and in the 12 monthly newsletters\n5. Use of technology\nThe common ICT tools are adapted to the different activities\nCreative tools for the presentations (Powerpoint, Windows Movie Maker, Kizoa )\nThe choice of Google drive for the measurements (google sheets for data and google slides for photographs) is justified in the work process\nA tutorial explains how to draw the Geogebra geometric figure from the data sheet, thereby promoting their autonomy\nThe registered students have access to the private publications of the Twinspace. For ease of use by students, the edition of the data sheet is unrestricted and teachers manage student access to their folder in google drive.\nThe teachers obtain the parents’ agreement for the publications of the photographs. They set the behaviour rules about privacy for publications in Padlets (Personal informations are limited to the private forums). They make sure that no document protected by copyrights is published.\n6. Results, impact, and documentation\nThe general objective (Demonstrate that the Earth is round and calculate its circumference) is totally achieved. Although simple, this goal is increasingly challenged by our students, misinformed on social networks by conspiracy theories promoted by the Flat Earth Society.\nThe newletters and the other special events are disseminated by our institutional partner “La Main à la Pâte”. The educational documents are shared with the Scientix community\nThe ancient archival work of Eratosthenes from Alexandria provided by the website eratosthenes.eu ensures the sustainability of the eTwinning project since 2005.\nIn addition to the STEM competence, the evaluation by the students demonstrates the transdiciplinary of the project and their progress in Multilingual / Digital / and Personal, social and learning to learn competences.\nNumber of measures per school\nMeasures and graphs :| Watch on Issuu | download pdf |" ]
[ "<urn:uuid:f46bbfed-8a94-49cb-9f94-b9d797d6fa16>" ]
[ "CC-MAIN-2023-14" ]
[ "https://twinspace.etwinning.net/80611/pages/page/809355" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949387.98/warc/CC-MAIN-20230330194843-20230330224843-00791.warc.gz" ]
[ "en" ]
[ 0.9188523888587952 ]
[ 770 ]
[ 3.15625 ]
[ 3 ]
[ "|More than 2,300 years ago, a noblewoman named Meret-it-es, from Middle Egypt, began her journey to the afterlife. Her body was prepared in the customary way for a person of her stature at the time, and placed in an elaborately decorated coffin that would assist her in this voyage. Various objects were placed alongside her coffin, to be used during and after her passage to the next life. The coffin itself—consisting of an inner anthropomorphic-shaped container for the body and an outer rectangular sarcophagus—was painted with representatives of deities meant to ensure her resurrection, along with intricate hieroglyphs and texts of ancient funerary spells.\nThe coffin set, along with the other fragile objects, are part of the funerary assemblage of Meret-it-es, acquired by the Nelson-Atkins Museum of Art in Kansas City, Missouri, and displayed in the new Egyptian galleries, part of the museum’s extensive expansion initiative. Despite having brand-new space, setting up a museum exhibit is an art form in itself—there’s lighting, traffic flow, viewpoint, and other logistics to consider. For the Meret-it-es collection, museum planners determined that the optimal position for displaying the coffin would be upright rather than flat (horizontal) due to the size of the room—in order to display the larger outer coffin, the inner piece would have to be exhibited upright. Also, the vertical placement added a desired drama to the installation.\nHowever, there were much more important factors to consider, particularly whether the vertical placement would add undue physical stress on the precious artifact, eventually causing irreparable damage. Although the coffin has survived for more than two millennium, it is made from wood, which expands and contracts as it ages, thereby weakening or damaging the object. Would the vertical display position hasten that problem? To answer this vital question, Kate Garland, senior conservator of objects at the museum, turned to digital technology.\nA Digital Solution\nGarland oversees the repair, authentication, and general maintenance of the museum’s 33,500-plus art objects, and ensures that they are placed in a suitable environment. Typically, digital technology is not used in these endeavors, though she did work with EpicScan (Portland, Oregon) two years prior to the coffin quandary to digitally scan an 18th century room and its ornate ceiling from a locale in Turin, Italy, to verify that the dimensions of that room matched a period room installed at the museum. The CG data from the scans also will be used to construct an exact replica of the ceiling for the room at the museum.\n“For us, using CG technology has been kind of an experimental thing. We normally don’t use it,” says Garland. “I was trying to think of a quick way of monitoring changes in a very graphic way so that the results would be clear to everyone.”\nIn the past, the museum would have used photography, or even considered photogrammetry, which is often used in the preservation world, for this endeavor. But for the issue at hand, scanning offered the most comprehensive and immediate solution, revealing even the tiniest movement in any of the components of the coffin as it was positioned upright, notes Garland. In addition, a scan of the entire surface would serve as a baseline archive should any damage occur to the object in the future; it also could be compared to a future scan to reveal any structural changes that may occur over time.\n“The coffin [set] is very fragile, and we were concerned about the paint layers on top of the wood; it was already flaking off, and we wanted to document and record it in case we lost any more paint,” says Garland. “Also, the coffin had been lying horizontally since it was in the tomb, and we were concerned about how much paint we would lose if we displayed it upright due to the movement of the wood or internal stresses, as the wood itself is made up of sections—it’s not just one long piece.”\nThe Scanning Process\nAs Garland explains, the anthropomorphic inner coffin is very large (larger than life-size), contains significant gilding, and is brightly painted from head to toe. “It is in relatively good shape,” she says. “It has all these wonderful pigments, some we hadn’t known existed in the Egyptian palette.”\nThe body portion of the coffin is covered with designs, prayers, and incantations to the gods of the dead, and hieroglyphs. Meanwhile, the head portion of the lid contains gilding of extremely pure gold, along with areas of solid paint (for the hair), a richly painted headdress, and dark eyes and brows. A beautiful piece of carved and painted art, this part of the lid would present issues during the scan process, since laser scans typically do not work well on reflective surfaces like this. Moreover, the delicate surface of the artifact could not be touched during the process, making the data acquisition even more difficult.\nInitially, the museum contacted Ryan Woodward of EpicScan, a service provider with whom Nelson-Atkins had contracted for the period room scan. He assessed the project requirements and obstacles, and realized that the scanner he was using—which is typically employed for digitizing extremely large objects, such as entire rooms or building facades—was not ideally suited for an object such as this. So he contacted Hexagon Metrology Services, the parent company of Leica Geosystems, which manufactures his EpicScan equipment. Not only did Woodward receive more appropriate hardware for the job, but also the services of Hexagon application engineer Rina Molari, who assisted him with this delicate documentation project.\n“The type of equipment Ryan was using was not sufficient for the accuracy and point density required for an object this size,” says Molari. “We have other equipment for applications when tighter tolerances are required, like in this instance.”\nAccording to Woodward, the technology used for this type of scan occurs in a very small window—4 by 4 feet or smaller. However, the coffin was much larger (over 7 feet in length) and would have required multiple scans that then would have to be stitched together, thus increasing the possibility of introducing errors as the scans were fit together.\nAs a solution, Woodward and Molari used a two-pronged approach: a high-precision Leica laser tracker with a mounted camera that uses photogrammetry to read orientation around the target, and a non-contact Leica T-Scan hand scanner. The laser tracker reads the position of the laser scanner; the camera on top of the tracker reads the orientation of the scanner in space. The scanner, meanwhile, captures all the point-cloud information.\n“We wanted very dense data spread out over a fairly large envelope,” says Woodward. “With the laser tracker and T-Scan combination, we could leverage the large measurement volume accuracy of a laser tracker and the point density of a scanner.”\nNevertheless, there were still a number of obstacles that had to be considered—specifically the coffin’s multi-colored, reflective surface that could add noise to the data and affect the scan’s accuracy. According to Hexagon Metrology, the T-Scan is an optical device that is nearly impervious to varying light conditions. As a result, it can handle a wide range of black and shiny surfaces without the need for a surface-coating spray, which was obviously out of the question here. (The face of the coffin contains a great deal of matted black coloring for the hair and shiny black paint for the eyebrows, both of which are in close proximity to the gold.)\nIn addition, Woodward had to take into account the limited space he had to perform the scan. The workable space around the coffin was close to 20 by 20 by 10 feet, which was within the 30-foot envelope placement of the T-Scan to the laser tracker. The team also used the Leica HDS 6000 as a supplemental measuring tool that would enable them to compare both sets of data and document the room where the coffin was housed.\nMolari and Woodward spent two and a half days digitizing the outer portion of the object—half of a day to set up and two days for scanning it in both a flat and upright position. The ultra-high-speed hand scanner gathers millions of points, with an accuracy of .00079 of an inch.\nThe exterior of the coffin had mostly smooth contours, with some areas around the face and lower portion containing sharp angles and surface complexity. “The act of scanning is similar to using a paintbrush, except you are painting light onto the surface and making sure you have overlaps and proper coverage,” explains Molari. “But scanning a delicate object without touching it is certainly a human challenge. You can’t lay your hands on the object, nor brush against it.”\nOnce the digitizing was complete, Molari and Woodward had two resulting point clouds: 32.5 million points for the object in the horizontal position, and 18.8 million points for it in the vertical placement. After processing the data, Woodward imported it into Geomagic’s Studio, where a model of each object was created so the surface of the coffin in each position could be compared graphically.\n“We created mesh data to generate an error map, which is color-coded, showing different gaps,” says Woodward. “The analysis showed that the main body of the coffin was very stable, and there was no movement in the body. In the upright position, we saw a shift in the foot, which was expected.” As he explains, that’s because the feet are semi-detached and have dowels (not original), holding the section in place due to previous damage.\nThe ornate coffin(right and up) was digitally scanned using a high precision Leica T-Scan laser tracker and a non-contact Leica T-Scan hand scanner(above).\nReviewing the Results\nIndeed, Garland was not surprised that the scans showed that there was movement at the foot region, indicated by gaps in the data. “We knew this [movement] was probable due to the way the wood had been assembled,” she says. “But there were no other surprises or problems.”\nIn fact, soon after the object was acquired by the museum, an ultrasound and X-ray were done to reveal the density of the wood and to show voids and insecure areas. CT scans were considered, but no local scanning units were large enough for the job. This initial imaging provided the team with a firm indication that there were areas of weakness or places where the wood might bend or move over time. According to Garland, it is the back section (with a number of defects) that is most concerning, not the much larger and top-heavy front.\nThese tests also showed that the coffin was made up of various pieces of wood that are pinned together with wooden pegs—which is typical construction for this type of object since wood was scarce in Egypt. Unfortunately, many of these shaped pieces of wood have separated, causing paint loss.\nThis issue was detected in the digital scan as well. As Garland points out, the construction has splits in the wood and gesso fills that are no longer flush with the surface, particularly in the shoulder and knee areas, indicating that significant movement of the wood had already occurred. “Voids are accompanied by patching, dowels (modern and original), and multiple pieces of wood, all of which represent potential areas of instability,” she explains. “However, none of these areas are part of the load-bearing structure. The load would primarily be born down the sides of the figure and concentrate on the feet, which appear to be structurally sound.”\nMore concerning was the split in the center of the main load-bearing wood that follows the wood grain: Splits and checking such as this significantly reduce the structural integrity of the wood. As the weight of the coffin is shifted during reorientation to a vertical position, a force bearing down on the tip of a split will be distributed over the split’s surface since the interior of the crack is not able to support any weight and resolution of the forces over the surface will cause the split to open. In addition, the top of the split is cut off at a saw cut (which occurred prior to the museum’s acquisitioning), making it easier for the forces to pull the split open, thus weakening the structure over time.\nThe early imaging, as well as the more recent digital scanning, delivered some good news: Despite its age, the coffin was in great shape.\n“The ultrasound showed that ideally [the 400-pound coffin] should be presented flat. But there was a strong sense within the museum that we wanted a very powerful effect [in the presentation],” says Garland. “We also had so many beautiful accoutrements and objects that we wanted to display within this small space, which was another reason why we wanted to show [the coffin] upright.”\nBefore the museum could make a final determination as to how the coffin would be displayed, some preliminary work had to be done on the coffin. As Garland explains, the flaking paint had to be consolidated since the results would have an effect on the orientation of the mount. If the paint could not be satisfactorily reattached without altering the appearance of the matte paint, then the inner coffin would not be displayed upright.\nOnce that had been accomplished and with the scan data backing up their decision, the group at the Nelson-Atkins Museum of Art hired a structural engineer to design a mount—no easy task, considering that the priceless object could not be physically altered in any way in order to attach it to the armature, nor could the mount be enduring despite the fact that the exhibit itself is permanent. “We have to be sure that anything we do can be undone,” Garland says. “We spent a long time evaluating how to do the mount that would hold the coffin in place. The scans were also useful for this purpose.”\nToday, the mount is holding the coffin upright, but it is tilted slightly backward about five degrees, thus easing the downward stress exerted on the wood of this fragile artifact since the force is distributed over the surface along the foot rather than being concentrated only at the front. Inclining the bottom section also reduces the stresses on the load-bearing crack in the bottom center since the forces are shifted toward the back.\nThis tilted position will also help preserve the paint on the wooden surfaces. “Egyptian paint is very fragile and delicate, and we didn’t want to lose any more of it due to movement in the wood [because of how it was positioned],” says Garland.\nDespite having the digital data to help allay their fears, Garland nevertheless was nervous when it came to lifting the coffin into its new display setting. “It was so nerve-racking lifting that piece up. We didn’t know if the coffin and the wood structure would be damaged, if it would collapse,” she says. “We were pretty sure it would be fine, but you just never know, and this stuff is irreplaceable.”\nThe placement went without a hitch, and today this beautiful object and the rest of the assemblage of Meret-it-es’ funerary objects are on public display in the new museum wing. And should the museum opt to do so, the digital data from the scan can be turned into a realistic, interactive 3D model that, unlike the actual artifact, can be handled without worry.\nMeanwhile, the long-term effects of re-orienting the coffin may not be known for a long time. Indeed, there was no structural shifting during the vertical placement, but it is difficult to predict with accuracy how the ancient wood will hold up over time, contends Garland. But with digital methods, the museum will be able to continually check on this millennia-old treasure to safeguard it well into the future.\nKaren Moltenbrey is the chief editor of Computer Graphics World." ]
[ "<urn:uuid:1113b66f-8aaa-4735-9b9d-9279dd6b5c50>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.cgw.com/Publications/CGW/2012/Volume-35-Issue-4-June-July-2012/Stress-Relief.aspx?LargeFonts=true" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702810651/warc/CC-MAIN-20130516111330-00009-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9689462184906006 ]
[ 3382 ]
[ 2.921875 ]
[ 3 ]
[ "“We are not yet dead for us to be preserved,” BAI Indigenous Women’s Network National Coordinator Kakay Tolentino remarks in Filipino. Indigenous peoples (IPs), as a still living and breathing community, do not wish to preserve their current traditions—instead, IPs would rather see their cultures and traditions flourish dynamically through progressive plans of action and policies.\nUnfortunately, the struggles and experiences of IPs remain unheard of. Barely any information about them is available or accessible to the public, and they even continuously face difficulties due to misconceptions about them and their culture.\nTolentino would describe the state’s effort to archive IP works as being exploitative, while citing examples of government “deception” in obtaining antique cultural objects and indigenous people being displayed in museums.\n“‘Yung una kasing pag-aarchive sa panig ng gobyerno, hindi siya nakatulong sa amin in the sense na, mas pumasok yung pagsasamantala,” they narrate.\n(The first attempt of the government to archive did not help us, it only helped foster exploitation.)\nThe National Commission on Indigenous People (NCIP)—a commission under the Department of Social Welfare and Development (DSWD) mandated to protect the interests of IPs—is ironically one of the major hurdles IPs are facing. Raising instances where the NCIP denied the identities of certain groups, such as the Igorots of Cordillera, Tolentino believes that progressive preservation of information—where information is not merely stored but is also shared—helps solidify IP identity to avoid the denial of IP identities, and even their existence.\nAnother issue raised against the NCIP is the agency’s lack of budget to create a database on IPs’ materials, says Philippine Task Force for Indigenous People’s Rights Policy Adviser Tyrone Beyer. “Lagi nilang sinasabi na kulang ‘yung budget nila. So they can’t [create a] database or [store] information hinggil sa indigenous peoples,” he laments.\n(They keep saying their budget is not enough to create a database or store information on indigenous peoples.)\nThese challenges have led other institutions to take the helm in archiving IPs and their culture, one of them being the National Commission for Culture and the Arts (NCCA). However, Beyer is concerned about how NCCA’s process of archiving prefers artisans over the ordinary IP’s culture.\n“‘Yung reality, mas marami pang [ginawang] efforts at programs ang NCCA…ang problema lang sa NCCA, naka-focus lang sila sa arts, artistic works, crafts…hindi ‘yung collective knowledge or product, ‘yung tinututukan nila, yung masters,” explains Beyer.\n(The reality is that the NCCA has made more efforts and programs than NCIP. However, the problem with NCCA is that they focus only on the arts, artistic works, and crafts, not on the collective knowledge or product. They are only focused on the masters.)\nThere is a concept in the field of archiving under which these struggles of the IP fall—“archival silences”. It is defined as the omission or distortion, intentional or not, of the documentation of anything that has enduring value, leading to gaps in depicting the past.\nMichel-Rolph Trouillot, a proponent of the concept, explained that these silences could happen during the historical processes, starting from the processes of source creation to fact assembly, fact retrieval, and introspective significance.\nWhen the government archives what is “exotic lang,” as Beyer laments, or “‘yung worth [something] lang kasi kakaiba,” they end up being concerned only with what is “representative of the old world, the ancient times or ancestors.” There might be existing information on IPs in our history, libraries, museum, and even the academe, but Beyer gripes that its provided knowledge ignores the everyday needs of IPs today.\n(What is worth something because it’s different.)\nWhen archivists establish systems or criteria of what to archive, they tend to stick to these archival standards. This is a concern for Iyra Buenrostro-Cabbab, an associate professor at the University of the Philippines Diliman’s School of Library and Information Studies, who suggests that this practice may be creating gaps between the IPs’ real culture and archived culture as well. “The IPs wish to preserve their culture, probably not using those standards…IPs might want to preserve their culture differently,” she expounds.\nShe also believes that these gaps, even outside the discourse on IPs, could have been caused by some lack of coordination between the record keeper, the archivist, and—most importantly—the creator of the record. However, in the bigger picture, the professor holds that a reason why there are still rifts between different topics is a lack of “collective recognition” of the discipline.\n“When people do not see the significance of archives, records, or even the work that we do, ang hirap…it’s critical [that they do because] when they know how records are, kasama na rin diyan yung pagkakaroon nila ng awareness of their own rights.”\n(It’s part of knowing this that they gain awareness of their own rights.)\nFor Buenrostro-Cabbab, addressing archival bias entails one’s acknowledgement of it. This process allows the archivist to balance between their own preference and reason. “Iniisip nila na it should not be biased, should be objective, should be neutral…but, from the moment you appraise, you already impose your bias as an archivist,” she admits.\nCommunity archiving, an emerging approach in the field, could also address the plight of IPs. In this sphere, local communities decide which portions of their identity they wish to preserve and how they want to be represented in the archives, thus entailing a bottom-to-top approach to archiving.\n“You have to make them realize as well that it’s their identity [that] will be preserved, and not our interpretation of them,” Buenrostro-Cabbab explains.\nThe successful incorporation of everyone’s history into the Filipino identity would call for the proactive participation of the public and private sectors, IP communities, and archivists in ensuring the preservation of local traditions, cultures, and practices that are slowly dying. As Buenrostro-Cabbab shares, “Mahalaga na may point of view ang archivists [to preserve the IPs’ cultures]. So, I think that the government should recognize that may mga iba’t ibang mga disciplines and professions para sa tamang preservation ng mga ito.”\n(It is important for archivists to have a point of view [to preserve the IPs’ cultures]. The government should recognize that there are different disciplines and professions that can adequately preserve these.)\nTolentino echoes this sentiment, saying IPs prefer to update existing notions about their identity and culture. “What we need is to update the existing data to correct wrong perceptions and ideas when it comes to IPs,” she posits in Filipino." ]
[ "<urn:uuid:95512e0c-1707-4847-bdfd-c739c554ccb6>" ]
[ "CC-MAIN-2023-14" ]
[ "https://thelasallian.com/2022/10/28/indigenous-communities-still-battle-with-archival-silences/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.76/warc/CC-MAIN-20230322114226-20230322144226-00385.warc.gz" ]
[ "en" ]
[ 0.942328155040741 ]
[ 1627 ]
[ 2.859375 ]
[ 3 ]
[ "Presentation on theme: \"Reducing Need and Demand for Health Care Gero 302 Jan 2011.\"— Presentation transcript:\nReducing Need and Demand for Health Care Gero 302 Jan 2011\nIntroduction Synopsis: 1. We have been consumed with the supply side of health care and not with the demand side. To reduce costs and improve health we need to promote self- efficacy, behavior modification, long term management of health and disease. Medical need is defined as the “medically modifiable morbidity or illness burden of defined populations” The costs of medical care are in part a function of the amount of illness in the population. Morbidity is related to the prevalence of dietary fat intake, seat-belt use, smoking, lack of exercise, and risk behaviors in the population.\nMedical Demand Medical demand is the request of patient or physician or family for medical services and is often independent of medical need. Demand reduction means that informed consumers are best served by selective, thoughtful requests for medical services and the autonomy of the individual and the need for access to appropriate information. This should impact response to similar medical problems and the take up of services. Currently there is a high rate of utilization of resource intensive services, without the balance of self-management, preventive care and curative services.\nConceptual Base 80% of our present illness burden is as a result of chronic illness between 55 and death (average 75) Lifetime illness burden is often compressed into shorter periods (last five years of life) Age adjusted health status is improving while life expectancy has remained constant. Self-Efficacy-a belief that by personal behavior you may be able to affect health and other futures. It is essential in order to change health risk behavior. Favored groups are: those with regular exercise, higher socio-economic groups, higher education groups. These have decreased disability when cf to less favored groups.\nLong Term vs Short Term outcomes Medicine focuses on short term outcome of particular episodic illness. E.G. Treatment of hypertension. LTG would be to increase exercise, reduce dietary fat, stop smoking, control serum cholesterol levels. This should improve duration and quality of life. Cumulative lifetime disability is a major endpoint and its reduction a major policy goal. Nature of Need-preventable illness makes up about 70% of the burden of illness. Smoking, diet and lack of exercise account for close to a million deaths in the US per year. Morbidity is associated with non-lethal conditions and is often preventable.\nNature of Demand Demand for medical services is often huge, costly, irrational, and indefensible. Geographic variations are large and linked to capacity rather than need. Hospital admissions correlate with available beds rather than the prevalence of illness. This is called “supply driven demand” Role of self-management-responsibility for health is by the individual. An educated consumer can lower service cost 7- 17%. Two variables: good consumer education and personal self-efficacy. Again-in the last year of life nearly 28% of medical costs are incurred for those over 65. The potential to reduce terminal demand equals 3% of lifetime medical costs. (30 Billion/yr in US)\nNature of Demand 70% of people do not wish to have aggressive/invasive technical treatments when they are dying. Only 9% executed their advanced directives. Often these documents are not delivered to caregivers or to medical records. The goals of health promotion therefore are: a. improve health habits, postpone and prevent major chronic illness, reduce risk factors and costs, raise personal self-efficacy, reduce low birth weight babies, have in place advanced directives, improve access to and utilization of early detection programs and screening that reduce medical need.\nThree Models 1. Long Term outcome improvement on two tracks-one directed at reduction of need and demand and one directed at best possible applications of scientific medicine. Health education using mail, cable and computer and personal medical care using proven disease management principles. 2. Complete Disease Management-Ensure the use of clinical guidelines or pathways. Include prevention, optimal self-care and optimal professional care in all packages. These must function in a complementary fashion. 3. Five Lines of Health Defense-a. programs that prevent or postpone illness and promote health\nThree Models 2. Second line of defense is self-management with adequate ancillary resources 3. The third line is triage which can further establish need and intervention and the urgency of the intervention. 4. Medical response to acute problems with guidelines to acceptable care and effective and efficient management of the problem. 5. Chronic Disease self-management-computer coordinated and guided by the best standards of care and integrated with all other levels." ]
[ "<urn:uuid:521c8779-ce8e-4593-8e57-12c7f6e7e5a4>" ]
[ "CC-MAIN-2017-26" ]
[ "http://slideplayer.com/slide/3875577/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323588.51/warc/CC-MAIN-20170628083538-20170628103538-00054.warc.gz" ]
[ "en" ]
[ 0.9466235041618347 ]
[ 949 ]
[ 2.53125 ]
[ 3 ]
[ "Iron and Steel Emissions\nIron is believed to be the sixth most abundant element in the universe, and the fourth most abundant on earth. The concentration of iron in the various layers in the structure of the Earth ranges from high (probably greater than 80%, perhaps even a nearly pure iron crystal) at the inner core, to only 5% in the outer crust. Iron is second in abundance to aluminium among the metals and fourth in abundance in the crust. Iron is the most abundant element by mass of our entire planet, making up 35% of the mass of the Earth as a whole.\nSteel is an alloy consisting mostly of iron, with a carbon content between 0.02% and 1.7 or 2.04% by weight (C:1000–10,8.67Fe), depending on grade. Carbon is the most cost-effective alloying material for iron, but various other alloying elements are used such as manganese and tungsten. iron and steel emissions\n• The iron and steel industry accounts for about 19% of final energy use and about a quarter of direct CO2 emissions from the industry sector. The CO2 relevance is high due to a large share of coal in the energy mix.\n• The iron and steel industry has achieved significant efficiency improvements in the past twenty-five years. Increased recycling and higher efficiency of energy and materials use have played an important role in this positive development.\n• Iron and steel has a complex industrial structure, but only a limited number of processes are applied worldwide. A large share of the differences in energy intensities and CO2 emissions on a plant and country level are explained by variations in the quality of the resources that are used and the cost of energy.\n• The efficiency of a plant in the iron and steel industry is closely linked to several elements including technology, plant size and quality of raw materials. This partly explains why the average efficiency of the iron and steel industries in China, India, Ukraine and the Russian Federation are lower than those in OECD countries. These four countries account for nearly half of global iron production and more than half of global CO2 emissions from iron and steel production. Outdated technologies such as open hearth furnaces are still in use in Ukraine and Russia. In India, new, but energy inefficient, technologies such as coal-based direct reduced iron production play an important role. These technologies can take advantage of the local low-quality resources and can be developed on a small scale, but they carry a heavy environmental burden. In China, low energy efficiency is mainly due to a high share of small-scale blast furnaces, limited or inefficient use of residual gases and low quality ore.\n• Waste energy recovery in the iron and steel industry tends to be more prevalent in countries with high energy prices, where the waste heat is used for power generation. This includes technology options such as coke dry quenching (CDQ) and top-pressure turbines. CDQ also improves the coke quality, compared to conventional wet quenching technology.\n• The identified primary energy savings potential is about 2.3 to 2.9 EJ per year through energy efficiency improvements, e.g. in blast furnace systems and use of best available technology. Other options, for which only qualitative data are available, and the complete recovery of used steel can raise the potential to about 5 EJ per year. The full range of CO2 emissions reductions is estimated to be 220 to 360 Mt CO2 per year. iron and steel emissions, iron and steel emissions.\n* One exajoule (EJ) equals 1018 joules or 23.9 Mtoe.\nMaterial is sourced from the International Energy Agency 2007, Tracking Industrial Energy Efficiency and CO2 Emissions." ]
[ "<urn:uuid:3617d761-9185-4a64-b827-7ef84efe6b4a>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.global-greenhouse-warming.com/iron-and-steel-emissions.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00021-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9308735728263855 ]
[ 760 ]
[ 3.625 ]
[ 4 ]
[ "Microorganisms including viruses, bacteria, fungi, and unicellular eukaryotes represent the major sources of biomass in oceans and estuaries, carrying out a myriad of important functions over a vast and dynamic range of scales. The enormous untapped biodiversity of marine microbes provides a rich source of novel models for basic research that will uncover fundamental molecular mechanisms, processes and compounds of scientific and commercial importance. In order to maintain the oceans as a sustainable resource, DMD faculty generate a deeper understanding of the roles and relative contributions of marine microbes to marine ecosystems.\nThe Marine Molecular Microbiology Program at DMB aims to pursue a basic understanding of the unique molecular mechanisms used by marine microbes that drive the global ocean ecosystem. In addition to an emphasis on expanding basic scientific knowledge, DMB faculty provide fundamental advances that can potentially lead to commercial applications and products for industrial/pharmaceutical production, bioenergy, bioremediation and biological sensing extremophiles, bioenergy and renewable resources, microbial genetics and biosensor development, bacterial signal transduction, biofilm development, symbiotic bacteria and their impact on ocean health, maring bioremediation and algal biotechnology." ]
[ "<urn:uuid:4fa095d1-c653-4f5c-934c-f50f1842413f>" ]
[ "CC-MAIN-2020-10" ]
[ "https://marinebiotechnology.umbc.edu/marine-microbial-and-extremophile-processes/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146809.98/warc/CC-MAIN-20200227191150-20200227221150-00213.warc.gz" ]
[ "en" ]
[ 0.8464921712875366 ]
[ 235 ]
[ 2.546875 ]
[ 3 ]
[ "\"An education isn't how much you have committed to memory, or even how much you know. It's being able to differentiate between what you know and what you don't\".... ...Anatole France\nCommentary of the Day - February 19, 2001: Science Education and The Dilemma of \"High-Stakes\" Testing:\nOne of the central features of the recent \"accountability\" movement in K-12 education has been the development of \"standards\" and \"assessment\" instruments. Although education is primarily a state responsibility and the actual standards that are put into place in the K-12 schools are state standards, national organizations have developed model standards for school mathematics and science education that frequently form the basis for state standards. Non-governmental organizations such as the National Council of Teachers of Mathematics and the American Association for the Advancement of Science together with quasi-governmental organizations such as the National Academy of Science have been active in efforts to make the public aware of the poor state of school math and science education. These groups also have developed model standards aimed at improving the education that K-12 students receive in these subjects.\n\"Science for All Americans\" and \"Benchmarks for Science Literacy\" are two examples of such standards for science education. These are detailed sets of standards that delineate what every school child should learn about science in elementary, middle and high school. The goal of these standards in noble -- to raise the level of scientific literacy in the United States to an acceptable level. Well-known science educator Audrey B. Champaign from the State University of New York - Albany, speaking at the 2001 Annual Meeting of the American Association for the Advancement of Science, has said that education policy is \"standards with teeth\". By this she meant that when accountability measures with both rewards and sanctions are added to standards \"de facto\" education policy has been established.\nThe aim of the education policy that has been proposed by the Bush Administration, and which has been supported widely by both Democratic and Republican legislators, is to use annual testing as the instrument to achieve accountability in the distribution of federal aid to K-12 education. Many states are carrying the idea one step further by requiring students to pass similar exams to receive a high school diploma -- so-called \"high-stakes\" testing.\nAs the Irascible Professor sees it, two problems are created by the combination of universal science education standards and corresponding high-stakes tests to measure student performance. First, a \"one size fits all\" set of standards that are aimed primarily at developing science literacy may not be appropriate for those students who might be interested in science or engineering careers. Ideally, we should be doing more to identify those students who exhibit an interest in science and to nurture that interest with activity- and inquiry-based learning.\nSecond, when high-stakes tests are employed, teachers tend to teach to these tests. For practical reasons the tests almost always end up being of the multiple choice variety. Teachers typically use a \"drill and practice\" approach to prepare their students for them. Unfortunately, drill and practice exercises are the best way to destroy any interest a student may have in a subject. These rote memorization exercises do little to help students understand the underlying scientific theories. Instead, they turn learning into punishment.\nThe dilemma, however, is that without some impetus for improvement science teaching in America's K-12 schools is unlikely to change. The Irascible Professor thinks that better teachers and more resources would go a long way towards achieving that impetus. Testing can play a role, but it should not be the sole focus.\nPrinter friendly version\n[ home | web rings | links | archives | about ]\nThe Irascible Professor invites your comments.\n©2001 Dr. Mark H. Shapiro - All rights reserved." ]
[ "<urn:uuid:b04309c8-07ac-43a0-9103-a169168c46ca>" ]
[ "CC-MAIN-2017-30" ]
[ "http://irascibleprofessor.com/comments-2-19-01.htm" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424884.51/warc/CC-MAIN-20170724142232-20170724162232-00123.warc.gz" ]
[ "en" ]
[ 0.9626330137252808 ]
[ 774 ]
[ 2.8125 ]
[ 3 ]
[ "21 November 2017\nFlood mapping for large areas (e.g. from catchments to a national level) is relatively new and challenging; associating mapped flood-prone areas with an annual chance of occurrence (in probabilities, say 1%) of a flood event involves many kinds of uncertainties and is even harder.\nFlood maps that suggest various hazard levels over a large area are often in short supply for applications in insurance, emergency, planning, etc. This creates a perplexing situation where some users resort to open and accessible flood maps, such as FEMA’s National Flood Hazard Layer dataset, for different applications and interpretations, while ignoring the lineage and caveats attached to the underlying dataset. No single flood map is a panacea!\nThere is a real need to create new, insightful information products that can be used to proactively investigate flood-prone areas across a whole range of scales – from sites to river basins to a national level. Elevation is the single most important variable in determining flood hazard levels, and we focus on this by developing three flood analysis tools. Each can be implemented at scale and is a significant undertaking. We hope these tools can provide more geographic context and shed light on some key hydrodynamic processes about flooding.\n1. Address-level Location Profile Report: The Importance of Elevation for Flood Mapping\nThe USGS has been developing and constantly updating the critical National Elevation Dataset (NED) over the past few decades, including the DEMs at ~60m, ~30m, ~10m, ~3m and ~1m resolutions (note that the resolution is approximate as the original NED is in geographic coordinates in units of decimal degrees). It appears that the two nationwide DEMs at ~30m and ~10m resolutions have been widely used for large-area flood mapping by various vendors. As elevation is the most critical input for flood mapping, it is useful to keep the following two major issues in mind:\nThe DEMs at a given resolution may be produced in earlier years with different production methods and lower quality levels. Figure 1 shows one aspect of these, the DEMs currency by year. Full information can be found at the USGS 3D Elevation Program (3DEP) websites about their current and historical release notes.\nThe vertical accuracy of NED. For example, the vertical accuracy of ~10m NED is 3.04m at 95% confidence level, based on a USGS assessment report published in 2014. It is reasonable to expect improved vertical accuracies for more recent versions of the NED.\nThe very recent, highly-commendable showcase (hosted by the Argo Group) on the comparison of U.S. flood models reported that for the same set of exposure locations, large dispersion of underlying elevation values was observed among four independent vendors. This suggests that the DEMs, albeit all sourced from the USGS, are somehow different. Indeed, underlying elevation values could be modified due to projections, spatial interpolations, data types, etc. It is common to observe an elevation difference up to a couple of metres even for the same site after some levels of post-processing. All these have serious implications for flood mapping and potential loss estimation. A rethink is warranted on how to reconcile the large elevation differences in the very first stage of flood modelling.\nFigure 1: The currency of the USGS National Elevation Dataset (August 2017 release). Source: USGS.\nIn Australia, the national elevation data has been provided by Geoscience Australia. About 75% of populated areas have been covered by LiDAR-derived DTMs, typically at 5m resolution.\nUsing the above publicly-available national elevation datasets, along with other data sources, we have developed cloud-based analytics platforms (PropertyLocation360.com and PropertyLocation.com.au) to rapidly make address-level location profile reports. In each report, elevation is examined at a granular level and from multiple perspectives, including 3D views, slopes and water flow directions. All of these are closely related to flood modelling. In addition, various visualisation methods being explored are useful for assessing the quality of underling elevation data, e.g. the identification of detailed ground features (e.g. levees and roads) and any artifacts or abnormal terrain patterns.\nFigure 2 shows an example of various elevation metrics, for a flood-prone address in Houston, TX. Many sample reports for the contiguous United States (CONUS) and Australia are available at the above websites.\nFigure 2: Flood-related elevation metrics included in a typical exposure location profile report. (Full report was prepared before the 2017 Hurricane Harvey hit the region.)\n2. Flood Simulation by Elevation\nFlood simulation by elevation is commonly referred to as the bathtub or bucket-fill approach. It is often under criticism for its simplification and inability to incorporate complex hydrodynamic processes. But for many applications involving large areas or in aggregate nature (e.g. exposure assessment), this easy-to-understand approach is always handy and exploratory. Whether it is for coastal inundation or inland flooding, low-lying or flat floodplains can be delineated efficiently (e.g. Figure 3).\nOur main contribution here is to create a cloud-based, automated approach for such simulations. Like the first tool, flood simulation by elevation can be generated and delivered within seconds for all locations in the contiguous U.S. and Australia, using the above two cloud platforms.\nFigure 3: Flood simulation by elevation for an address in Houston, TX. Related elevation metrics are shown in Figure 2.\n3. Flood Mapping by Inundation Depth\nWe have developed new geospatial processing routines for this, by capturing two key flood attributes – catchment sizes (two-dimensional) and inundation depths (vertical dimension). We develop large-area flood mapping with aggregate analysis in mind, therefore it is different from event-based classic flood models. Externals factors, such as mitigation measures (say levees, unless clearly reflected in underlying elevation data) and drainage capacities, are not considered.\nFigure 4 illustrates this approach: flood extent expands as inundation depth increases. It is adaptive as the mapped flood extent is up to the minimum catchment size chosen and the maximum inundation depth that is derived from historical records or statistical extrapolations. These properties determine the flood mapping across scales. The use of a small catchment size and a major inundation depth can delineate flood-prone areas that may be conservative for risk aversion. Potential riverine and coastal flooding is covered while flash flooding excluded. We apply this new approach for large-area flood mapping in the contiguous U.S. and Australia.\nFigure 4: An example of flood mapping by inundation depth.\n3.1 The Contiguous U.S.\nFigure 5 shows an example of modelled flood extent largely in line with the FEMA’s flood map, suggesting the new flood mapping may be used to fill some coverage gaps that are present in the current FEMA’s dataset. We can provide many separate validations for interested users in this regard. For large and flat floodplains, our current approach tends to be conservative, overestimating flood-prone areas under some large depth thresholds.\nFigures 6 and 7 show mapped flood-prone areas at the state level in the contiguous U.S. The respective results are particularly useful for evaluating exposure concentration at a broad level, which might impact a company’s bottom line when catastrophic events take place.\nFigure 5: Comparison of flood mapping result. Left: red polygons show FEMA’s National Flood Hazard Layer (1% Annual Exceedance Probability); Right: blue areas represent modelled flood-prone areas by inundation depth. Minimum catchment size for mapping ~7 sq km.\nFigure 6: Modelled major flood-prone areas in parts of South Carolina and North Carolina. Minimum catchment size for mapping ~50 sq km.\nFigure 7: Modelled major flood-prone areas in the contiguous U.S. Boundaries of 18 USGS HUC-2 regions (Hydrologic Unit Code, 2-digit) are superimposed. Minimum catchment size for mapping ~450 sq km.\nWe extend the same approach to the Australian continent, and the 30m-resolution DEM-H dataset from Geoscience Australia has been analysed. Figure 8 demonstrates that flood extent grows as inundation depth increases, for the area near the confluence of Brisbane and Bremer Rivers, one of the most flood-prone regions in Australia.\nFigure 9 shows modelled major flood-prone areas at the national level. The high-risk areas are actually in the two eastern coastal drainage divisions (i.e. broadly, east of the Great Dividing Range). To our knowledge, this is the first time that such flood mapping (with depth information) is done for the whole country. We will make a separate post demonstrating more results for Australia.\nFigure 8: Illustration of changing flood extent in response to various inundation depths. Minimum mapping unit for catchment size ~50 sq km.\nFigure 9: Modelled major flood-prone areas in Australia. Boundaries of 12 drainage divisions are superimposed. Minimum catchment size for mapping ~450 sq km.\n4. Return Periods?\nWhen talking about the frequency of flood events, we advocate the use of annual chance of occurrence (in probabilities, say 1%) or exactly Annual Exceedance Probability (AEP), in order to avoid the potential misinterpretation of Return Periods or Average Recurrence Intervals by non-professionals. One should note that all these are merely pragmatic measures to quantify flood risk in the ballpark. In theory, there are no such rigid numbers for the natural system that is nonstationary in nature. A case in point: the dangerous global warming and climate change has been altering the frequency and magnitude of floods in space and time.\nAs flood is a compound phenomenon, its frequency should be more closely tied to water levels than that of regional rainfall or precipitation. We treat the estimation of flood frequency as a separate task in addition to the mapping of flood-prone areas above. Historical water-level records from monitoring gauges may be used for such estimation. (Of course, flood water levels could also be affected by a wide range of dynamic factors, such as land cover changes over time, the construction of dams in upper streams and flood defence systems.) In short, to derive a reasonable range of flood frequency, a data-driven and statistical approach is not enough, and one also needs to consider contextual changes in the environment.\n5. Future Work\nThe three new tools introduced above are complementary to the flood data from local, state and federal government agencies. Any flood studies should sufficiently examine key aspects of the underlying elevation data; otherwise, results from subsequent flood modelling and loss estimation would be significantly compromised. We encourage developers and end-users to apply critical views and work together to achieve realistic yet innovative solutions.\nWe will continue R&D on large-area flood mapping, by focusing on the following directions:\nEnhancing the current methods and tools to digest DEMs at increasingly finer resolutions, e.g. from 30m to 10m to 1m.\nExpanding coverage to other countries, e.g. Japan, South Korea and China. As the tools and the cloud platforms are largely generic, it would be more efficient to carry out new studies.\nBesides the effort on content creation, we plan to explore new ways to share the datasets and analytics on the cloud through APIs [Update 06/2018: Initial release of related Web APIs]." ]
[ "<urn:uuid:d75bd3d0-24d9-4c79-abea-b1c995f72720>" ]
[ "CC-MAIN-2020-10" ]
[ "https://www.bigdataearth.com/australia/new-tools-for-investigating-flood-prone-areas/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145533.1/warc/CC-MAIN-20200221142006-20200221172006-00137.warc.gz" ]
[ "en" ]
[ 0.9176739454269409 ]
[ 2392 ]
[ 2.671875 ]
[ 3 ]
[ "Goldsboro, on U.S. Highway 84 in northwestern Coleman County, developed with the construction of the Pecos Valley and Northern Texas Railway in 1910–11. It was optimistically named for gold-colored stones in the neighboring hills. By 1940 the town had two businesses and 100 residents. The population was thirty from 1980 through 2000.\nAdapted from the official Handbook of Texas, a state encyclopedia developed by the Texas State Historical Association (TSHA). It is an authoritative source of trusted historical records.\nAt a Glance\nGoldsboro is part of or belongs to the following places.\nAdopt a Town\nThe Texas Almanac's Land Rush program lets you adopt the town, county, or lake of your choice and share your message with the world. 100% of the proceeds benefit education in Texas.\n- Adoption Status: ✅\n- This place is available for adoption!\n- Adopted by:\n- Your name goes here\n- Dedication Message:\n- Your message goes here\nGoldsboro is classified as a Town\nHas Post Office\nProud to call Texas home?\nPut your name on the town, county, or lake of your choice.\nSearch Places »\nGoldsboro by the Numbers\nThis is some placeholder text that we should either remove or replace with a brief summary about this particular metric. For example, \"We update population counts once per year...\"" ]
[ "<urn:uuid:5238d9bf-5f39-4e41-b72a-e84cfd349fe9>" ]
[ "CC-MAIN-2023-14" ]
[ "https://www.texasalmanac.com/places/goldsboro" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950030.57/warc/CC-MAIN-20230401125552-20230401155552-00599.warc.gz" ]
[ "en" ]
[ 0.8949214816093445 ]
[ 375 ]
[ 2.65625 ]
[ 3 ]
[ "There’s no such thing as privacy anymore… now, there is only secrecy\nSynap technology enables applications to achieve the highest levels of security; protecting user communications, user data, online transactions, and physical security.\nCreation of identical security keys without key exchange\nSensor based generation of random security keys\nEnables a full range of security levels\nHOW IT WORKS\nUsing sensor technology, it allows separate devices to independently construct large volumes of the same secure data internally, without ever having to exchange secure data between the devices.\n- Fully Secure Communications: Combining random private and independent key generation, Synap enables fully secure communications of voice and data.\n- Secure Portable Financial Transactions: Banking and financial transactions can be protected to the highest levels in mobile and fixed devices.\n- Application Defined Security Levels: Synap enables a full range of security strength as required by the application including perfectly secure.\n- Perfect Security: One cipher is known to be impossible to crack… Synap enables the use of that unique cipher.\nSecurity System, Method, and Apparatus" ]
[ "<urn:uuid:7ee74c73-429d-4b54-b23a-c4bd31d079f4>" ]
[ "CC-MAIN-2017-26" ]
[ "http://edigital.com/synap/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320489.26/warc/CC-MAIN-20170625101427-20170625121427-00208.warc.gz" ]
[ "en" ]
[ 0.8514422178268433 ]
[ 220 ]
[ 2.765625 ]
[ 3 ]
[ "The Polar Atmosphere\nStuff in the Polar Atmosphere\nThere are some special things that happen in the atmosphere near the Poles of the planet. Here are a few of them.\nParticles from the Sun follow Earth’s magnetic field and this brings them high in the atmosphere above the Poles. All the energy from these particles makes the sky light up like in the picture at the left. This is called the aurora.\nHigh in the sky above where clouds usually are found there are special clouds in the polar regions. They are called noctilucent clouds. They glow blue as the Sun is setting.\nThe ozone layer of the atmosphere, shields our planet from some harmful rays from the Sun. Some types of air pollution break the ozone apart. This lets more of the harmful rays get to Earth. There are now a number of holes in the ozone layer, including a very large hole over Antarctica.\nLess energy from the Sun gets to the poles. That’s why it is cold there. Antarctica is the coldest continent on Earth. It has some of the the harshest weather on the planet with high winds and low precipitation. Arctic weather can also be extreme.\nPatterns of the Polar Atmosphere\nNear both the north pole and the south pole there is an area of high pressure in the atmosphere. High pressure in the atmosphere means that the little particles, the air molecules, are a bit closer together. Exactly where this place of high pressure is found can change over time. Sometime it can be found right near a pole. Other times it can be found in a ring around a pole. As the high pressure area moves around, patterns in the weather change too. In the north polar region this changing location of high pressure is called the Northern Annular Mode. In the south polar region it is called the Southern Annular Mode." ]
[ "<urn:uuid:517eae31-f906-42f3-a9b3-79d7b71f3a31>" ]
[ "CC-MAIN-2023-14" ]
[ "https://www.windows2universe.org/earth/polar/polar_atmosphere.html&edu=elem" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950373.88/warc/CC-MAIN-20230402012805-20230402042805-00762.warc.gz" ]
[ "en" ]
[ 0.9334098100662231 ]
[ 383 ]
[ 3.59375 ]
[ 4 ]
[ "A Guide to Cloud Computing.\nCloud computing is the outsourcing of storage data and applications as well as information processing. Access to files and applications is possible regardless of the location of the server or system. Data can be retrieved anytime as long as there is an internet connection.\nInfrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS) are the three broad categories of cloud-hosted services. These services are user-oriented, meaning that they are managed by the provider according to the requirements of the user.\nThe market’s top cloud service providers are Amazon Web Services (also known as Microsoft Azure), Google Cloud Platform, Google Cloud Platform, and IBM. Learn more about Cloud Computing: The Next Trillion dollars.\nTypesof Cloud Computing\nThere are three ways to deploy cloud services. It is a classification that allows a business to determine the best service deployment according to its needs.\nThe public cloud is managed and owned by a third-party service provider. The cloud service provider also manages the infrastructure and software. The cloud provider provides storage and server services.\nPrivate clouds are cloud services that are only available to a single business or organization. The infrastructure and services are managed on a private network. They are typically located at the different data centers of the company. Third-party service providerscan also be responsible to host private cloud services for a particularorganization.\nHybrid clouds are both the public and private cloud. Hybrid clouds allow the exchange of data between public and private cloud. They are also bound by technology that allows such an exchange of applications or resources. Hybrid cloud is flexible, secure, and compliant.\nCloud Computing: Uses\nCloud computing is applicable to even the most basic of activities like emails, documents and streaming tv, music, etc.\nIt can be used in many ways that are valuable to organizations, whether they are small or large.\nCreatecloud native apps\nDevOps, API driven communications, containers, microservices architecture, andKubernates all are cloud native technologies that make it easy to scale, deploy, and build applications.\nTestand Build Applications\nCloudinfrastructure is scalable and can be scaled easily, making it a great tool for application development.\nData analysis can be made more efficient by combining data from different locations, teams, and servers. Machine learning and artificial intelligence are also effective in deploying statistical methods. These approaches can provide a more insightful account for better analysis.\nDeliverSoftware on Demand\nSoftware as a service (SaaS) is a cloud-based software service that offers updates and the latest versions of softwares.\nStreamaudio and Video\nCloud allows audio and videoconnection to be made available to the audience worldwide.\nStorebackup recover data\nCloud storage can ensure data protection because it is easy to transfer data to remote storage systems that are accessible from any server or on any other system.\nCloud models that are intelligent and effective can be used to increase transparency among customers and provide them with valuable insight from the data.\nBenefitsof Cloud Computing\nCloud computing has simplified many aspects of businesses, such as large servers, data storage devices and information loss. This required a lot of time and money. Cloud, with its many benefits, has allowed for a diversion from that time and cost into greaterproductivity.\nCloud Computing provides security for stored data. Cloud computing is accessible from any device, so data storage is not affected by server failures or disturbances.\nIncreases speed and agility\nThe business environment is rapidly changing and traditional IT approaches are not able to meet the demands. Cloud is more valuable to companies because of its speed and agility. It is also why cloud is being adopted on such a large scale.\nPortals and applications that can be personalized are made available to multiple users at the same time. This opens up a wide range of business opportunities.\nAllows for application resilience\nDue to the digital nature and business, businesses can’t afford infrastructure failures. It is essential to ensure the availability of applications. This is difficult because of the inability to maintain the resilience of on-premises applications. Cloud offers easy accessibility to infrastructureresources and thereby enhances the resilience of applications.\nCloud computing is cost-effective for any business. The cloud computing resources can be derived from any model of cloud computing. The cloud’s high scalability allows for better management.\nIt is much easier to update software to cloud services than to do it with a physical serversystem. These updates include security updates necessary to protect the stored data.\nAccessibility and control\nCloud allows for transparency and greater control over data accessibility. Its platform-neutralattribute allows accessibility on any device and business continuity.\nTypes of Cloud Service Models\nInfrastructure as a Service (IaaS).\nThis model addresses the infrastructure required for cloud hosting. For the launch of a platform, servers can be physical or virtual. IaaS is a cost-efficient option that is popular among small, medium and large scale businesses. The service providers pay according to their needs." ]
[ "<urn:uuid:01896248-7b00-406d-b48b-03a05e0a9ad5>" ]
[ "CC-MAIN-2023-14" ]
[ "http://justcoolfreebies.com/everything-you-need-to-know-about-cloud-computing-blog/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943698.79/warc/CC-MAIN-20230321131205-20230321161205-00776.warc.gz" ]
[ "en" ]
[ 0.925410807132721 ]
[ 1081 ]
[ 3.328125 ]
[ 3 ]
[ "Heretical sect which originated in Mesopotamia about 360 and survived in the East until the ninth century\nMessalians (Praying folk; participle Pa’el of t.6Y, Aramaic for “to pray”), an heretical sect which originated in Mesopotamia about 360 and survived in the East until the ninth century. They are also called Euchites from the Greek translation of their Oriental name (euchetai from euchomai, to pray); Adelphians from their first leader; Lampetians from Lampetius, their first priest (ordained about 458); Enthusiasts from their peculiar tenet of the indwelling of the Holy Ghost by Whom they thought themselves inspired or possessed (enthous). The non-Christian sect of the Euphemites were also called Messalians, and Epiphanius (Hoer., lxxx), our sole informant about these, considers them the forerunners of the Christian Messalians. The non-Christian Messalians are said to have admitted a plurality of gods, but to have worshipped only one, the Almighty (Pantokrator). They were forcibly suppressed by Christian magistrates and many of them put to death. Hence they became self-styled Martyriani. The Christian Messalians were a kind of Eastern Circumeellions or vagrant Quietists. Sacraments they held to be useless, though harmless, the only spiritual power being prayer, by which one drove out the evil spirit which baptism had not expelled, received the indwelling of the Holy Ghost, and arrived at union with God, becoming so perfect that the passions ceased to trouble. They disregarded discipline in the matter of fasting, wandered from place to place, and in summer were accustomed to sleep in the streets. To avoid persecution they would conform to ecclesiastical usages, profess orthodoxy, and deny any heretical doctrines ascribed to them. They engaged in no occupations, were solely occupied in prayer, as they said, or rather in sleep, as Theodoret sarcastically remarks. The intensity of their prayer brought them into immediate communication with the Godhead. When they had reached the passionless state (apatheia, “apathy”), they saw the Trinity, the three Divine Persons becoming one and dwelling within them. They likewise saw the evil spirits that go through the world for the ruin of souls, and trod them under foot. In fact every man had within him a demon, who could only be replaced by the Holy Ghost. Even Christ’s body was full of demons once. Flavian, the Bishop of Antioch, tried to suppress them in his city about 376. By feigning sympathy he made Adelphius disclose his real doctrines; and then he banished him and his followers. They then wandered to the southeast of Asia Minor. Amphilochius of Iconium caused them to be again condemned at the Synod of Side (388 or 390). Letoius, Bishop of Melitene, finding some monasteries tainted with this Quietism, burnt them and drove the wolves from the sheepfold, as Theodoret narrates. The “Asceticus”, “that filthy book of this heresy”, as it is called in the public acts of the Third General Council (431), was condemned at Ephesus, after it had already been condemned by a Council of Constantinople in 426 and by the local council at which Amphilochius of Side presided. Yet the sect continued to exist. At first it included only laymen. Lampetius, one of the leaders after the middle of the fifth century was a priest, having been ordained by Alypius of Caesarea. He was degraded from his priesthood on account of unpriestly conduct. He wrote a book called “The Testament”. Salmon refers to a fragment of an answer by Severus of Antioch to this work of Lampetius (Wolf, “Anecdota Grwca”, III, 182). In Armenia in the middle of the fifth century strict decrees were issued against them, and they were especially accused of immorality; so that their very name in Armenian became the equivalent for “filthy”. The Nestorians in Syria did their best to stamp out the evil by legislation; the Messalians ceased to exist under that name, but revived under that of the Bogomili. In the West they seem hardly to have been known; when the Marcianists, who held somewhat the same tenets as the Messalians, were mentioned to Gregory the Great, he professed never to have heard of the Marcian heresy.\nJ. P. ARENDZEN" ]
[ "<urn:uuid:59dde1b0-ac94-4733-9fa1-8f31134e68e0>" ]
[ "CC-MAIN-2023-14" ]
[ "https://www.catholic.com/encyclopedia/messalians" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949573.84/warc/CC-MAIN-20230331051439-20230331081439-00355.warc.gz" ]
[ "en" ]
[ 0.9805891513824463 ]
[ 977 ]
[ 2.921875 ]
[ 3 ]
[ "Haptic is a term which is probably becoming more and more popular because of the recent introduction into the mass market of smart devices (phones, watches etc.) with heptic characteristics.\nHaptic refers to:\na technology that uses touch to control and interact with computers. A user may apply a sense of touch through vibrations, motion or force.\nHaptic technology is used mainly in creating virtual objects, controlling virtual objects or in the improvement of the remote control of machines and devices.\nHaptic devices can measure reactive forces and bulk forces applied by a user.\nHaptic entered the English language towards the end of the 19th century but its usage has increased only in recent decades (Ngram) in technological contexts.\n- \"pertaining to the sense of touch,\" 1890, from Greek haptikos \"able to come into contact with,\" from haptein \"to fasten\". (Etymonline)\nIn what fields was the term originally used (medical, scientific or else)? that is, how come that this \"greek\" term was borrowed at the turn of the 19th century? Is the term now used also outside tech contexts?" ]
[ "<urn:uuid:e2bb710b-29fb-4546-a42a-b4486c3af771>" ]
[ "CC-MAIN-2023-14" ]
[ "https://english.stackexchange.com/questions/274532/what-was-the-original-usage-of-the-term-haptic" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945472.93/warc/CC-MAIN-20230326111045-20230326141045-00782.warc.gz" ]
[ "en" ]
[ 0.9524163603782654 ]
[ 254 ]
[ 3.734375 ]
[ 4 ]
[ "Ginseng is a traditional Chinese medicine used to treat various diseases in Asian countries for over two thousand years. It is credited with antioxidant, anti-inflammatory, anti-fatigue benefits.\nGinsenosides are active components extracted from ginseng, and scientists have found that ginsenosides show great anticancer benefits in inhibiting various cancer cells in vitro and in vivo. Additionally, scientists conducted clinical studies to explore the link between ginseng consumption and cancer risk, but the results are found inconsistent.\nA meta-analysis is a quantitative, formal, epidemiological study design used to systematically assess previous research studies to derive conclusions. Chinese researchers conducted a meta-analysis of nine studies to evaluate the association between ginseng consumption and cancer risk. The study was published in the Journal of Ginseng Research.\nThe nine studies were sourced from six databases including PubMed, involving 7,436 cases and 334,544 participants. Researchers found that a significant 16% lower risk of developing cancer in patients who consumed ginseng, with evidence of heterogeneity which may be caused by the incidence data for gastric cancer included in the study.\nIn addition, researchers examined the correlation of ginseng consumption and the relative risks for colorectal cancer, lung cancer, gastric cancer, and liver cancer respectively. The analysis results showed that the summary relative risks for ginseng intake versus no ginseng consumption were 0.77 for lung cancer, 0.83 for gastric cancer, 0.81 for liver cancer, and 0.77 for colorectal cancer.\nThe results of the meta-analysis concluded that ginseng consumption is inversely correlated with cancer risk and that the effects are no organ-specific.\nClinical studies make a significance in confirming the chemo-preventive effect of ginseng. However, Since the studies involved a few clinical participants, large-scale clinical trials should be conducted to further examine the effectiveness of ginseng and ginsenosides." ]
[ "<urn:uuid:2d112e9c-6530-4077-9031-64561467e7f7>" ]
[ "CC-MAIN-2023-14" ]
[ "https://redsenolhealth.com/ginseng-ginsenoside-consumption-can-reduce-cancer-risk/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950383.8/warc/CC-MAIN-20230402043600-20230402073600-00598.warc.gz" ]
[ "en" ]
[ 0.9447605013847351 ]
[ 406 ]
[ 3.359375 ]
[ 3 ]
[ "Today, the most popular way of developing mobile applications is to develop them as native mobile apps. Unfortunately, developing native apps can be costly, and native development can limit options by limiting development to fewer mobile platforms and devices. In this tip, we explore HTML5's possibilities as an all-purpose mobile development alternative and look at pros and cons. Native app developers create a separate app version for each mobile operating system and mobile device. The native app is installed directly onto a mobile device. The cost of developing native apps can be high, especially when many types of devices are in use. Because many corporations are adopting a bring your own device (BYOD) strategy, the cost of developing and maintaining native apps is increasing.\nMost corporations want to develop native apps when needed and also develop mobile apps that can run on many mobile devices and mobile operating systems without rebuilding the app for each device and operating system. These apps are referred to as \"write once, run anywhere\" (WORA) mobile apps. There are at least three technologies that give varying degrees of WORA mobile apps: mobile enterprise application platforms (MEAPs), HTML5 and hybrid mobile apps. We focus on HTML5-based WORA mobile apps in this article.\nHTML5 apps are essentially implemented as Web apps. The HTML5 app runs on a server external to the remote device, and the mobile device user accesses it through a mobile device browser. When the URL for the HTML-based app is entered into the mobile device browser, the interface to the mobile app is made available to the user in the mobile device browser.\nHTML5 basically enables determination of the characteristics of the mobile device. In real time, it can determine, via media queries, the rendering characteristics, such as the screen size, screen orientation and resolution of the mobile device to which data/information is being served. This information is required to ensure that the data/information sent to a mobile device is formatted to fit the mobile device screen in a way that it can be read by the user.\nThe determination of the characteristics of mobile devices is one of the primary features of HTML5 that makes it a suitable technology for WORA mobile apps. The other primary feature is that HTML5 mobile apps do not run on mobile devices, making them relatively independent of mobile devices and mobile device operating systems.\nHTML5 mobile development pros and cons\nMany native app developers have a low opinion of HTML5 as a technology to write mobile apps. They often claim that native mobile apps are the easiest to write and debug, that HTML5 does not have the same level of implementation in all of the popular browsers, and that HTML5 does not enable the performance of native apps. There is truth in all of these statements. But trying to decide which mobile platform to develop mobile apps on is a difficult problem. In addition, developing and maintaining native apps for numerous platforms is expensive and time-consuming. Add to that operating systems, such as Android, that are changing frequently, creating numerous versions, and the decision becomes even more difficult.\nThe responses that you get from native app developers and Web app developers using HTML5 are not always objective, so you will have to do a bit of research on your own to determine which is best for your corporation. What you will likely find is that HTML5 is not yet the complete solution for those who want WORA. Today, to get the most out of HTML5, you may write once, but you may have to do some customization for various mobile devices.\nHTML5 provides a solid platform on which to develop. It does not make all the differences between mobile browsers and devices magically disappear. However, HTML5 is being more fully implemented on today's popular browsers. Given the cost of implementing BYOD strategies involving numerous, different devices, HTML5 shows promise as a technology for implementing WORA mobile applications.\nHTML5 mobile development tips\nThe key is to carefully choose the mobile app development platform that satisfies your needs. Use native mobile app development for apps that need high performance, and depend on or heavily utilize on-device features. HTML5 should be considered when multi-platform mobile apps are deployed. HTML5 can be very good in the right situations, but not every situation.\nThe following are some of the areas where native app development gained an early advantage over HTML5. These areas are some that you should consider when trying to decide between native app development and HTML5-based mobile development. In several of these areas, HTML5 has caught up or is about to catch up over the next year or two:\n- Visual scale. This has been a big advantage of native apps, but HTML5 now has various ways to determine what the screen size is, what the resolution is, etc.\n- Touch interfaces. User interface components that are controlled by touch and swipe are supported by HTML5.\n- Camera/video access. HTML5 can handle photo capture from a webpage on some mobile devices, but not all.\n- Accelerometer access. HTML can handle this.\n- Bluetooth access. This is a work in progress for HTML5.\n- Sending notifications. This is a work in progress for HTML5.\n- HTML5 apps can now be sold through HTML5 or Chrome app stores. They can be distributed through Apple App Store and Android Play after being recreated as hybrid mobile apps.\nNative apps are very popular for many developers, primarily because HTML5 is still working to close the performance gap and provide better access to on-device features. But HTML5 will eventually be competitive with native app development within the next two to three years. For pretty much anything except fast-moving games with a lot of animation, HTML5 is often good enough. The benefits gained by native apps because of their performance lead will be marginal for many apps. The cost savings for corporations adopting BYOD will be significant when WORA technologies, such as HTML5, are used. If your corporation has a lot of experience developing Web apps for the PC, then embracing HTML5 should not be a large leap.\nThis was first published in January 2013" ]
[ "<urn:uuid:4d7a71ab-f521-426b-a37e-e7df157861f3>" ]
[ "CC-MAIN-2013-20" ]
[ "http://searchcloudapplications.techtarget.com/tip/Use-HTML5-to-make-developing-mobile-applications-less-costly-complex" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704054863/warc/CC-MAIN-20130516113414-00050-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9448333978652954 ]
[ 1235 ]
[ 2.828125 ]
[ 3 ]
[ "Publication: Research - peer-review › Journal article – Annual report year: 2012\nViral haemorrhagic septicaemia (VHS), caused by the novirhabdovirus VHSV, often leads to significant economic losses to European rainbow trout production. The virus isolates are divided into 4 distinct genotypes with additional subgroups including sublineage Ia, isolates of which are the main source of outbreaks in European rainbow trout farming. A significant portion of Danish rainbow trout farms have been considered endemically infected with VHSV since the first disease outbreak was observed in the 1950s. However, following a series of sanitary programs starting in 1965, VHSV has not been detected in Denmark since January 2009. Full-length G-genes of all Danish VHSV isolates that were submitted for diagnostic analyses in the period 2004−2009 were sequenced and analysed. All 58 Danish isolates from rainbow trout grouped with sublineage Ia isolates. Furthermore, VHSV isolates from infected Danish freshwater catchments appear to have evolved into a distinct clade within sublineage Ia, herein designated clade Ia-1, whereas trout isolates originating from other continental European countries cluster in another distinct clade, designated clade Ia-2. In addition, phylogenetic analyses indicate that VHSV Ia-1 strains have caused a few outbreaks in Germany and the UK. It is likely that viruses have been transmitted from infected site(s) out of the Danish environment, although a direct transmission pathway has not been identified. Furthermore, VHSV Ia-2 isolates seem to have been transmitted to Denmark at least once. Interestingly, one viral isolate possibly persisted in a Danish watershed for nearly 4 yr without detection whereas other subclades of VHSV isolates appear to have been eliminated, probably because of implemented eradication procedures.\n|Citations||Web of Science® Times Cited: 2|\n- Viral haemorrhagic septicaemia, Geographic subgroups, Molecular tracing, Genotype Ia-1, Genotype Ia-2, Epidemiology" ]
[ "<urn:uuid:2a467ca4-5def-40cf-8675-92dfcdb37882>" ]
[ "CC-MAIN-2013-20" ]
[ "http://orbit.dtu.dk/en/publications/european-freshwater-vhsv-genotype-ia-isolates-divide-into-two-distinct-subpopulations(90eaf535-dd54-4531-9e5b-39d7127b317d).html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705926946/warc/CC-MAIN-20130516120526-00096-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9370328783988953 ]
[ 440 ]
[ 2.609375 ]
[ 3 ]
[ "If Palm Tree Leaves Die, Can They Grow Back?\nPalm trees are unlike woody trees that have a repeatedly branching structure. Palms are monocots rather than dicots, meaning they have one seed leaf, and have pithy, fibrous trunks rather than wood. Single-trunked palms have leaves or fronds growing only from the terminal growth bud. Some palms develop side branches or clusters. The trunk forms as new leaves grow and old leaves die. Since new leaves come only at the top of the stem, a new leaf cannot grow in the same spot to replace old or damaged leaves that die.\nPalm Leaf Life Cycle\nStarting out as a leaf bud in the terminal bud, leaves slowly expand and get larger. Palm leaves are feathery, also called pinnate, or fan-shaped. Sometimes there are deep divisions in the fan to make a hand-shaped, or palmate, clump of leaflets. At first erect, fronds gradually lower to become horizontal to the stem, and finally they droop down to lie against the trunk. Oldest leaves become yellow or tan, finally drying out. Often dead leaves drop naturally, but some palm species retain them as thatch along the trunk.\nAge of Palm Leaves\nPalm trees grow slowly, producing one new frond as each old frond dies. The life span of a single leaf can vary, depending on climate, nourishment, species and age. Leaves of date palms (Phoenix dactylifera) can last five to eight years. A mature date palm can have more than 125 fronds in its crown that have taken 15 years to develop, from the developing leaves in the terminal bud to the most mature leaf. As leaves die, no more leaves are produced on the sides of the trunk. In trees that keep the dead leaves, the thatch covers the trunk or you can prune it away carefully. Date palm is hardy in U.S. Department of Agriculture plant hardiness zones 9 through 11.\nAlthough some species of palms will survive temperatures below freezing, most palms inhabit subtropical or tropical areas and need protection from freezes. Cold-damaged leaves can die. Sometimes fronds get misshapen because of a nutrient deficiency, such as frizzletop due to lack of manganese. Yellow, small new fronds have withered leaflets and brown streaking. The damaged leaves can be replaced only by new leaves emerging from the crown. If the condition is not corrected, the terminal bud can die. If the crown of an unbranching palm is removed by incorrect pruning, cold, fire or disease, the palm dies.\nPruning Palm Leaves\nFor best palm growth and health, the University of Nevada Cooperative Extension recommends minimal pruning, removing only dead or dying fronds. If you do prune green leaves, don't remove more leaves than the palm can grow in one year. As long as green remains in older palm fronds, they are producing food to nourish the tree. Extra food moves to the trunk and is important in growing new leaves. Some palms need a 2:1 ratio between juvenile and mature leaves.\n- Bougainvillea Growers International: Palm Trees 101\n- University of Arizona College of Agriculture: Palms\n- Floridata: Phoenix Dactylifera\n- HortTechnology: Palms on the Edge: Species and Strategies for Landscape Utilization\n- Royal Horticultural Society: Palms: Hardy\n- University of Florida IFAS Extension: Miami-Dade Counties: Manganese Deficiency of Palms -- \"Frizzletop\"\nCarolyn Csanyi began writing in 1973, specializing in topics related to plants, insects and southwestern ecology. Her work has appeared in the \"American Midland Naturalist\" and Greenwood Press. Csanyi holds a Doctor of Philosophy in biology from the University of Wisconsin at Madison." ]
[ "<urn:uuid:3ee5bbef-bc03-4103-919d-b27c9f47fa18>" ]
[ "CC-MAIN-2023-14" ]
[ "https://homeguides.sfgate.com/palm-tree-leaves-die-can-grow-back-99973.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945323.37/warc/CC-MAIN-20230325095252-20230325125252-00769.warc.gz" ]
[ "en" ]
[ 0.9317378997802734 ]
[ 816 ]
[ 3.65625 ]
[ 4 ]
[ "The term gnàth-fhacal or more commonly sean-fhacal is the Gaelic equivalent of the English word ‘proverb’. One such proverb was explained in a letter to a 19th century publication called Cuairteir nan Gleann. Written in beautiful stylised Glencoe Gaelic by a man writing under the pen name Gleann Comhann (Glencoe); I believe he was a certain MacInnes of Carnoch, Glencoe, but perhaps I may yet be informed more precisely as to the identity of the writer.\nThe letter’s contents are mainly an exploration of what is known in Gaelic as dinnseanachas (topography) and stories such as these, common throughout the Gàidhealtachd were a way of connecting with the landscape. Place names were remembered through events which happened there and often our lochs, mountains, rocks and rivers are given more than one name referring to different events which took place there hundreds of years apart. As an indigenous tribal people the Gàidheal of the Scottish Highlands are not unique in this way. In a society in which a deep knowledge of the landscape was needed stories such as these were a necessity for the survival of our people and our way of life.\nPrior to the use of firearms, hunting took place amongst ‘hunting parties’ over large areas of terrain for several days and would have involved the use of mìol-choin (hunting dogs) along with the bow and arrow.\nTo contextualize the story I have made a map with the place names (dinnseanachas), most of which are no longer extant marked in red:\nAs ever, English translations do no justice to the linguistic genius of Gaelic storytelling but here is my summarised translation of the letter “Gleann Comhann” submitted to the Cuairteir:\nThere’s was an old saying that was common around Glencoe and Ballachulish but not many knew what it actually meant or where it came from;\n“Bidh tuilleadh uime na bha mu’n chul-chàise.” Literally “There will be more made of this than the cul-chàise” (hunter’s portion – literally the most prized cut of venison which was taken from the animals back)\nWe all know that there are two types all over the world – the wealthy and the poor and the Highlands is no different!\nThere was an old custom before Nollaig (Christmas time) Faoidh Nollaig (the Christmas hunt) amongst clansmen and their cadet families so they could get plenty of venison for the Fèisd Nolliag (Christmas Feast). This tradition was kept particularly by the Glencoe people.\nIn the year 1543 on the morning of the 19th day of the first month of winter 18 men went hunting. They were a hardy bunch and no matter what the weather they’d take to the hill without weakness like the mist.\nThose who lived in Bràigh a’ Ghlinne (the brae of the glen) went up Gleann Leac na Muidhe over by Cadha na Cunneagaidh and those who lived in the Srath a’ Ghlinne (flat of the glen) went up by Gleann an Fhiodh over by Mam Uchdaidh and at the end of the day both groups settled on Cnocan na Comhairle – a beautiful wee hill on the South side of Mam Uchdaidh.\nCnocan na Comhairle was the place where hunting parties would customarily gather for a discussion about the location of herds of deer.\nHere they split into three small groups – six in each, and these were to meet on the afternoon of the third day of hunting at Ruidhe na Coinneamh – near to Taigh an Ruigh (Kingshouse) where Fionn held feasts for the heroes of the Fianntaichean (Fenians) in ancient times – this was the place of gathering for heroes.\nAfter reaching an agreement at Cnocan na Comhairle one group went over the shoulder of Corrabheinn out by the pass of Caol Chreireann over by Gleann Èite (Glen Etive) out by Lairig Dochairt and into the brae of Gleann Urchaidh (Glenorchy) .\nThe other two groups went down Gleann Creireann (Glen Creran) and split up at Eilirig (Elleric); one of these groups going down to the Ceann Loch Creireann (Kinlochcreran) and the other group going down the side of Gleann Uidhir (Glenure) out over Creag Eanacha and into Ceann Loch Èite (Kinlochetive).\nEach group were in this way happy at their hunting and as arranged they all met at Ruidhe na Coinneamh on the afternoon of the third day.\nThey all put their portions of venison to be shared out amongst each other according to custom so everyone would have an equal portion to take home to their families.\nEverything went agreeably until there was only one cul-chàis left and an argument started amongst them as to how this was to be shared.\nIn this way a conflict arose amongst them and the hardy warriors were filled with anger:\n“’S o gharbh bhriathran gu marbh bhuillean sgaiteach geur, gus fa-dheoidh nach robh mac mathar ann a b’ urrainn sgeul a thoirt mar thachair”\n“And from rough words came death blowing sharp cuts until eventually there was no mother’s son who was able to tell what had happened”\nNight came and their relatives were very worried going from village to village to find out what had happened to them. At about day break a search party went over by the Innean to the Ruidhe. As they approached the place with the day breaking brightly it seemed they could see bodies lying on the brae of the river next to the Ruidhe. They arrived closer and there they all were without life.\nThe shore of the stream and the loch for about 100 yards from where they were all lying was red with blood.\nIn those days the lochan was known as Lochan Ruidhe na Coinneamh (Little Loch at the place of meeting) but from that day on it has been known as Lochan na Fala (Lochan of Blood).\nEach body was handled and one was found with breath left in it. He was taken home – every effort being made to heal his wounds, but each effort failed and he eventually died. While there was life left in this man they tried to get him to explain the events that lead to the conflict but they never got any more out of him than has been told here.\nSo there we have it – this is where the saying “Bidh tuilleadh uime na bha mu’n chul-chàise.” Literally; “There will be more made of this than the cul-chàise” came from.\nIn 1894 the letter was republished in a publication called Mac Talla. I have provided a copy of the this here for those wishing to read the original Gaelic version of the tale." ]
[ "<urn:uuid:0a3d8ff0-73ac-4c59-a097-62a11b9e4c26>" ]
[ "CC-MAIN-2017-26" ]
[ "https://griogairblog.wordpress.com/2017/06/02/an-indigenous-gaelic-hunting-proverb-from-glencoe/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319575.19/warc/CC-MAIN-20170622135404-20170622155404-00160.warc.gz" ]
[ "en" ]
[ 0.9742043018341064 ]
[ 1594 ]
[ 2.984375 ]
[ 3 ]
[ "Pericarditis is a condition in which the sac-like covering around the heart (pericardium) becomes inflamed.\nThe cause of pericarditis is often unknown or unproven, but is often the result of an infection such as:\nIn addition, pericarditis may be seen with diseases such as:\nOther causes include:\nOften the cause of pericarditis is unknown. Pericarditis most often affects men ages 20 - 50.\nChest pain is almost always present. The pain:\nYou may have fever, chills, or sweating if the condition is caused by an infection.\nOther symptoms include:\nWhen listening to the heart with a stethoscope, the health care provider can hear a sound called a pericardial rub. The heart sounds may be muffled or distant. There may be other signs of fluid in the pericardium (pericardial effusion).\nIf the disorder is severe, there may be:\nThe following imaging tests may be done to check the heart and the tissue layer around it (pericardium):\nTo look for heart muscle damage, the health care provider may order a troponin I test. Other laboratory tests may include:\nThe cause of pericarditis must be identified, if possible.\nHigh doses of nonsteroidal anti-inflammatory drugs (NSAIDs) such as ibuprofen are often given. These medicines will decrease your pain and reduce the swelling or inflammation in the sac around your heart.\nA medicine called colchicine may be added, especially if pericarditis does not go away after 1 to 2 weeks or it comes back weeks or months later.\nIf the cause of pericarditis is an infection:\nOther medicines that may be used are:\nIf the buildup of fluid makes the heart function poorly, treatment may include:\nIf the pericarditis is chronic, recurrent, or causes scarring or tightening of the tissue around the heart, cutting or removing part of the pericardium may be needed. This surgery is called a pericardiectomy.\nPericarditis can range from mild cases that get better on their own to life-threatening cases. The condition can be complicated by fluid buildup around the heart and poor heart function.\nThe outcome is good if the disorder is treated right away. Most people recover in 2 weeks to 3 months. However, pericarditis may come back. This is called recurrent, or chronic if symptoms or episodes continue.\nScarring and thickening of the sac-like covering and the heart muscle may occur in severe cases. This is called constrictive pericarditis, and it can cause long-term problems similar to those of heart failure.\nCall your health care provider if you have symptoms of pericarditis. This disorder is usually not life threatening, but it can be if not treated.\nMany cases are not preventable.\nLeWinter MM, Tischler MD. Pericardial diseases. In: Bonow RO, Mann DL, Zipes DP, Libby P, eds. Braunwald's Heart Disease: A Textbook of Cardiovascular Medicine. 9th ed. Philadelphia, Pa: Saunders Elsevier; 2011:chap 75.\nUpdated by: Michael A. Chen, MD, PhD, Assistant Professor of Medicine, Division of Cardiology, Harborview Medical Center, University of Washington Medical School, Seattle, Washington. Also reviewed by David Zieve, MD, MHA, Medical Director, A.D.A.M. Health Solutions, Ebix, Inc.\nThe information provided herein should not be used during any medical emergency or for the diagnosis or treatment of any medical condition. A licensed physician should be consulted for diagnosis and treatment of any and all medical conditions. Call 911 for all medical emergencies. Links to other sites are provided for information only -- they do not constitute endorsements of those other sites. Copyright 1997-2013, A.D.A.M., Inc. Duplication for commercial use must be authorized in writing by ADAM Health Solutions." ]
[ "<urn:uuid:46a6a627-2fd8-43ec-94ff-7f57c60c71bd>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.nlm.nih.gov/medlineplus/ency/article/000182.htm" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708766848/warc/CC-MAIN-20130516125246-00017-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9016270041465759 ]
[ 846 ]
[ 3.484375 ]
[ 3 ]
[ "With the spring season rapidly approaching, I want to take the time to remind everyone the value of stabilizing your nitrogen fertilizer. Now, I predict the weather as well as the next guy. I heard several experts last February predict that 2016 would be just like the drought of 2012. Well, those people have to be feeling pretty foolish this winter due to our irrigated like conditions this past season. The point I’m trying to make is that like the weather, we can’t predict the potential nitrogen losses that we are going to experience this year. So in my mind, it would be wise to try to protect a crop input as valuable as nitrogen.\nThinking about the nitrogen cycle, our goal of using stabilizers is to keep our nitrogen inputs in a stable form for as long as possible. As a point of reference, the nitrogen cycle generally follows this pattern: urea is converted to ammonium (NH4+) which then will be converted to nitrate (NO3-). The last two forms can both be taken up by the plant with the difference being ammonium is held by the soil and nitrate is prone to being lost from the plant root zone. I’ll go through some of the major nitrogen fertilizers to discuss how we can protect them. When we inject anhydrous ammonia, it reacts with soil moisture to become ammonium which is stable in the soil. When soil temperatures are above 50°F, soil bacteria will convert ammonium into nitrate over time. With abundant rainfall, nitrate will leach out of well-drained soil. If the soil is poorly drained, the nitrate will denitrify into the atmosphere for as long as the soil is saturated. As many of you know, adding a product like N-serve inhibits the nitrification process, working to keep nitrogen in the ammonium form. Nitrapyrin, the active ingredient in N-serve, targets the Nitrosomonas soil bacteria that convert ammonium and renders them inactive for a period of time. The ammonium will bind with the soil colloid, protecting it from leaching and denitrification when we experience large rain events like the 4 to 7 inch event we received last June. Urea containing fertilizers add one more step to the process where nitrogen losses can occur. Urea combines with water to convert to ammonia (NH3) with the help of the urease enzyme that exists in the soil and on crop residue. If the ammonia isn’t worked into the ground by tillage or rain, it can volatilize into the atmosphere as a gas. As long as the urea is worked into the ground in 2 to 3 days after application, significant volatilization shouldn’t occur. Products like Agrotain or Factor X2 contain NBPT which prevents the urease enzyme from binding to the urea. This gives us 2-3 weeks to work in the urea or wait for adequate rainfall (0.25 in.). Volatilization is mostly likely to occur in these situations: high crop residue, high temperatures, high pH, low organic matter, and wet ground that dries out. UAN solutions have half the volatilization potential as urea because UAN is only half urea with the other half split between ammonium and nitrate. Urea containing fertilizers are subject to leaching and denitrification once they are converted to the nitrate form in the soil and can be protected with a nitrapyrin containing product like Instinct II.\nTo wrap things up, I can’t say that nitrogen stabilizers will deliver outstanding return on investments every year. As I pointed out earlier though, rainfall and time we have for tillage will vary every year so it would seem to be a wise decision to invest in nitrogen stabilizers as an insurance plan for whatever Mother Nature will throw at us this year. Contact an agronomist at WS Ag Center to discuss how nitrogen stabilizers can be integrated into your farming operation.\n– Mark Kendall" ]
[ "<urn:uuid:4301397a-2fee-4b13-a693-4c9ac7cbee5e>" ]
[ "CC-MAIN-2023-14" ]
[ "https://agcons.com/darlington-news/627/dont-forget-nitrogen-stabilizers-spring" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943637.3/warc/CC-MAIN-20230321064400-20230321094400-00377.warc.gz" ]
[ "en" ]
[ 0.9524632096290588 ]
[ 827 ]
[ 3.046875 ]
[ 3 ]
[ "Section 4.2: Routing Protocols\nThere are two types of dynamic routing protocols: Interior Gateway Protocols (IGP) and External Gateway Protocols (EGP). IGPs are used to exchange routing information within an autonomous system (AS), which is a collection of routing domains under the same administrative control the same routing domain. An EGP, on the other hand, is used to exchange routing information between different ASs.\nIGPs can be broken into two classes: distance-vector and link-state, and can also be broken into two categories: classful routing protocols and classless routing protocols.\n4.2.1: Distance-Vector Routing\nDistance-vector routing is consists of two parts: distance and vector. Distance is the measure of how far it is to reach the destination and vector is the direction the packet must travel to reach that destination. The latter is determined by the next hop of the path. Distance-vector routing protocols will learn routes from its neighbors. This is called routing by rumor. Examples of distance-vector routing protocols are: Routing Information Protocol (RIP), Interior Gateway Routing Protocol (IGRP), and Enhanced Interior Gateway Routing Protocol (EIGRP).\n220.127.116.11: Route Poisoning\nRoute poisoning is a feature that distance vector protocols use to reduce the chance of routing loops. Route poisoning begins when a router notices that a connected route is no longer valid. The router then advertises that route out all its interfaces and with a very large metric so that other routers consider the metric infinite and the route invalid. However, route poisoning does not solve the counting-to-infinity problem.\n18.104.22.168: Split Horizon\nAs mentioned earlier, route poisoning does not solve the counting-to-infinity problem. Counting-to-infinity can occur when one router has a valid metric that points to an address that is reachable through an intermediate router while the intermediate router has an infinite-distance route to the same address (see Figure 4.1). If routing table updates are sent by both routers at the same in time, the intermediate router will advertise that the route to the destination address is an infinite-distance route while the other router will advertise that the route has a valid metric. Because the two routers use the same update interval between updates, this process repeats itself with the next routing update, with the difference that the valid metric will be incremented by 1 each time until an infinite metric is reached, hence this phenomenon is called counting to infinity.\nFigure 4.1: Count To Infinity\nSplit horizon solves the counting-to-infinity problem by preventing a router from sending routing updates out the same interface on which it learnt the route. Thus, in Figure 4.1, the router would have learnt the route to the destination address across the link from the intermediate router. With split horizon, that router cannot then send advertisements about the route to the destination address out across the same link. Therefore the intermediate router will not receive the valid metric from the route to the destination address from the other router ad the count to infinity problem will not occur, solving the count-to-infinity problem on a single link.\n22.214.171.124: Split Horizon with Poison Reverse\nSplit horizon with poison reverse, or simply poison reverse combines the two features. When a route fails the router uses route poisoning, i.e., the router advertises an infinite-metric route about that subnet out all interfaces, including interfaces previously prevented by split horizon. This ensures that all routers know for sure that the route has failed, while split horizon prevents counting to infinity.\n126.96.36.199: Hold-Down Timer\nSplit horizon solves the counting-to-infinity problem over a single link but the counting to infinity problem can also occur in networks with multiple or redundant paths because there are more than one path to a router. In such networks, the hold-down timer feature prevents the counting-to-infinity problem.\nWith the Hold-down timer feature, a router ignores any information about an alternative route to a destination address for a time equal to the hold-down timer once it has learnt that a route to the destination address has failed.\n188.8.131.52: Triggered Updates\nDistance vector protocols typically send updates based on a regular update interval. However, most looping problems occur when a route fails. Therefore, some distance vector protocols send triggered updates as soon as a route fails. This causes the information about the route whose status has changed to be forwarded more quickly and also starts the hold-down timers more quickly on the neighboring routers.\n4.2.2: Link-State Routing\nLink-state routing differs from distance-vector routing in that each router knows the exact topology of the network. This reduces the number of bad routing decisions that can be made because every router in the process has an identical view of the network. Each router in the network will report on its state, the directly connected links, and the state of each link. The router will then propagate this information to all routers in the network. Each router that receives this information will take a snapshot of the information. This ensures all routers in the process have the same view of the network, allowing each router to make its own routing decisions based upon the same information.\nIn addition, link-state routing protocols generate routing updates only when there is a change in the network topology. When a link, i.e., a point on a route, changes state, a link-state advertisement (LSA) concerning that link is created by the device that detected the change and propagated to all neighboring devices using a multicast address. Each routing device takes a copy of the LSA, updates its topological database and forwards the LSA to all neighboring devices. An LSA is generated for each link on a router. Each LSA will include an identifier for the link, the state of the link, and a metric for the link. With the use of LSAs, link-state protocols reduces routing bandwidth usage.\nExamples of link-state routing protocols are: Open Shortest Path First (OSPF) and Integrated Intermediate System to Intermediate System (IS-IS). Another protocol, Enhanced Interior Gateway Routing Protocol (EIGRP) is considered a hybrid protocol because it contains traits of both distance-vector and link-state routing protocols. Most link-state routing protocols require a hierarchical design, especially to support proper address summarization. The hierarchical approach, such as creating multiple logical areas for OSPF, reduces the need to flood an LSA to all devices in the routing domain. The use of areas restricts the flooding to the logical boundary of the area rather than to all devices in the OSPF domain. In other words, a change in one area should only cause routing table recalculation in that area, not in the entire domain.\nOSPF is discussed in more detail in Section 5 and EIGRP is discussed in more detail in Section 6. IS-IS is not covered in the CCNA 640-822 exam and is thus not discussed in this Study Guide.\n4.2.3: Classful Routing\nClassful routing is used in routing packets based upon the class of IP address. IP addresses are divided into five classes: Class A, Class B, Class C, Class D, and Class E. Class A, Class B and Class C are used to private and public network addressing; Class D is used for multicast broadcasting; and Class E is reserved by the Internet Assigned Numbers Authority (IANA) for future use. IP Address classes were discussed in detail in Section 3.1.3.\nClassful routing is a consequence of the fact that routing masks are not advertised in the periodic, routine, routing advertisements generated by distance vector routing protocols. In a classful environment, the receiving device must know the routing mask associated with any advertised subnets or those subnets cannot be advertised to it. There are two ways this information can be gained:\n- Share the same routing mask as the advertising device\n- If the routing mask does not match, this device must summarize the received route a classful boundary and send the default routing mask in its own advertisements.\nClassful routing protocols, such as Routing Information Protocol version 1 (RIPv1) and Interior Gateway Routing Protocol (IGRP), exchange routes to subnetworks within the same network if network administrator configured all of the subntworks in the major network have the same routing mask. When routes are exchanged with foreign networks, subnetwork information from this network cannot be included because the routing mask of the other network is not known. As a result, the subnetwork information from this network must be summarized to a classful boundary using a default routing mask prior to inclusion in the routing update. The creation of a classful summary route at major network boundaries is handled automatically by classful routing protocols. However, summarization at other points within the major network address is not allowed by classful routing protocols.\n4.2.4: Classless Routing\nOne of the most serious limitations in a classful network environment is that the routing mask is not exchanged during the routing update process. This requires the same routing mask be used on all subnetworks. The classless approach advertises the routing mask for each route and therefore a more precise lookup can be performed in the routing table. Classless routing, which is also known as Classless Interdomain Routing (CIDR), is thus not dependent on IP address classes but, instead, allows a variable-length subnet mask (VLSM), which extends IP addressing beyond the limitations of using fixed-length subnet masks (FLSM),to be sent in the routing update with the route. This allows you to conserve IP addresses, extending the use of IP addresses. Classless routing protocols also addressed the need to summarize to a classful network with a default routing mask at major network boundaries. In the classless environment, the summarization process is manually controlled and can be invoked at any point within the network. VLSM was discussed in Section 3.1.5.\nThe routing protocols that support classless routing protocols are: Routing Information Protocol version 2 (RIPv2) ; Enhanced Interior Gateway Routing Protocol (EIGRP); Open Shortest Path First (OSPF) ; and Integrated Intermediate System to Intermediate System (IS-IS)." ]
[ "<urn:uuid:e916e4cf-cd9b-408e-9083-79b4edc9486d>" ]
[ "CC-MAIN-2023-14" ]
[ "http://www.vce-download.net/study-guide/ccna-4.2-routing-protocols.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950110.72/warc/CC-MAIN-20230401160259-20230401190259-00162.warc.gz" ]
[ "en" ]
[ 0.9171469211578369 ]
[ 2145 ]
[ 3.6875 ]
[ 4 ]
[ "When Does Daylight Savings Time End in 2012?\nDaylight Savings Time Ends at 2 a.m. on Nov. 4.\nIf you've enjoyed the extra daylight hours this fall, you'll need to start readjusting to early darkness.\nDaylight Savings Time officially ends at 2 a.m. on Sunday, Nov. 4.\nRemember, you’ll “fall back” and set your clocks back one hour when you go to sleep the night before. Many electronic devices automatically adjust when Daylight Savings Time begins or ends.\nFew people know the actual history behind Daylight Savings Time.\nThere is some debate, but the concept of Daylight Savings Time seems to have been first mentioned by Benjamin Franklin in an essay titled, “An Economical Project for Diminishing the Cost of Light” in 1784.\nThen, in 1883, time zones were created to standardize railroad schedules, with an international standard time adopted by the International Prime Meridian Conference in 1884.\nIn 1918, Congress placed the United States on Daylight Savings Time to conserve resources for the war efforts. The law was repealed due to unpopularity in 1919.\nIn 1942, Congress reinstated it due to World War II. The clock was advanced one-hour, year-round until 1945.\nFrom 1946-1966, there was no formal law regarding DST. Confusion in the transportation and broadcasting industries ensued and in 1966, Congress passed the Uniform Time Act, dictating that DST would begin on the last Sunday in April and run through the last Sunday of October. However, local authorities were permitted to pass ordinances to become exempt.\nIn 1986, the law was amended to lengthen DST, starting it in the first Sunday of April.\nThroughout the early to mid 1970s, the laws changed again due to the Arab Oil Embargo.\nPresident Ronald Reagan reinstated the first Sunday in April to the last Sunday in October time frame in 1986.\nIn 2005, the Energy Policy Act contained language to extend DST yet again, beginning in 2007, and since then DST has run from the second Sunday in March through the first Sunday in November.\nStates and territories still reserve the right to choose not to follow DST, and until 2006, half of the State of Indiana honored DTS, while the other half did not.\nHawaii, Guam, Puerto Rico, the Virgin Islands and American Samoa do not observe Daylight Savings Time. Arizona (aside from the Navajo Indian Reservation) is the only continental U.S. state that currently does not change its clocks two times a year.\nWhen you change your clocks in the fall and spring, it’s also a good time to change smoke detector batteries and check to make sure the devices are in working order.\nDaylight Savings Time begins again on March 10, 2013." ]
[ "<urn:uuid:f64e40fb-0a40-4274-921e-7776379af1e5>" ]
[ "CC-MAIN-2013-20" ]
[ "http://bethesda-chevychase.patch.com/articles/don-t-forget-to-fall-back-next-weekend" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702448584/warc/CC-MAIN-20130516110728-00023-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9410552382469177 ]
[ 580 ]
[ 2.953125 ]
[ 3 ]
[ "Hans Edler worked with other scientists on the V 2 bomb. No one scientist / engineer can be blamed for its creation.\nThe forerunner of the V 2, the V 1, was also known as the doodlebug. These were powered by diesel and only landed when they ran out of fuel. It sounded like a bus or lorry running down the hill out of control. You worried when it went quiet; that was when it would fall to the ground and discharge its bomb. The V2 was more accurate with its targets and was much quieter.\nRead an account here: http://www.bbc.co.uk/history/ww2peopleswar/stories/77/a4409877.shtml\nSome interesting statistics:\nAbout 2,700 people were killed in Britain by the V2.\nAt least 20,000 people died constructing the V2.\nThe Manhattan (development of the nuclear bomb) project cost the US $2 billion (27 billion today).\nThe cost of V 1 and V2 was $20 billion.\nTechnical details of the V2 :At launch the A-4 propelled itself for up to 65 seconds on its own power\nThe fuel and oxidizer pumps were steam turbines, and the steam was produced by concentrated hydrogen peroxide with potassium permanganate catalyst. Both the alcohol and oxygen tanks were an aluminium-magnesium alloy.\nThe combustion burner reached a temperature of 2500–2700 °C (4500 – 4900 °F). The fuel was pumped into the main burner chamber through 1,224 nozzles, which assured the correct mixture of alcohol and oxygen at all times.\nThe V-2 was guided by four external rudders on the tail fins.\nThe V2 was the first rocket to be designed that could go into space. However, it never went up, only horizontally to attack London.\nWhat Hans told Renate:\nYou know also that I was involved in war work even before you left Germany so there was no way that I could leave with you or your mother. If I’d tried to, it may have meant the two of you would have not been able to get away. Neither could I refuse to work on the very weapons that were causing havoc in England. I did go a little more slowly sometimes …. I hope I did not prolong the agony.\n(Letter 25 July 1946)\nPoints to ponder\nGermany was prevented from developing weapons after World War I.\nShould some weapons be illegal?\nDoes every country have a right to defend itself?" ]
[ "<urn:uuid:214b1ded-243b-45c8-a204-008c9f1ac3ad>" ]
[ "CC-MAIN-2020-05" ]
[ "http://www.thehouseonschellbergstreet.com/2018/11/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250615407.46/warc/CC-MAIN-20200124040939-20200124065939-00467.warc.gz" ]
[ "en" ]
[ 0.9860195517539978 ]
[ 528 ]
[ 2.96875 ]
[ 3 ]
[ "Digital television has allowed consumers to view broadcasts in ways not possible with analogue signals. Images broadcast by digital means arrive to the television with less distortion and with less delay. Even with all of its technological advantages, some drawbacks do exist for the technology as older Americans struggle to convert to a new way of watching TV.\nHigh Definition Television\nHigh definition television is a technological breakthrough made by possible by digital image broadcasting. The major advantage provided by the digital signal in HDTV is the clarity and sharpness of the image that appears on the television screen.\nFully Operational or Broken\nDigital television is an all or nothing scenario. Either the signal comes through in crystal-clear quality or the image is not present. Gone are the grainy days of analogue television where viewers could twist an antennae around until a partial snowy image appeared on the screen. According to the Public Broadcasting Station's website, the \"all or nothing\" aspect of digital TV is known as the Cliff Effect because one minute you're on dry land with a clear picture and the next you're off the cliff with a blank screen. All consumers can do to solve the problem is check the digital connections and call the cable company.\nDigital television allows stations to broadcast in more than one programming stream. The result is an increased variety of shows and other broadcasts for the consumer to choose from. You may notice a lot of television stations premiering second and third versions of parent stations such as ESPN, ESPN2 and ESPN News. This is all possible with digital broadcasting since essentially one channel can broadcast as several from the same location or combine several locations into one broadcast." ]
[ "<urn:uuid:46785fc2-1e95-4071-8ffe-3391a31d42a5>" ]
[ "CC-MAIN-2017-30" ]
[ "http://www.ehow.co.uk/list_6581489_advantages-disadvantages-digital-television.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424586.47/warc/CC-MAIN-20170723182550-20170723202550-00327.warc.gz" ]
[ "en" ]
[ 0.9635535478591919 ]
[ 325 ]
[ 2.703125 ]
[ 3 ]
[ "Growing older in Ireland does not necessarily mean greater social exclusion or lower levels of well-being and satisfaction with life according to two recently published studies, reports Paul McGill, CARDI.\nThe studies published by the European Foundation for the Improvement of Living and Working Conditions indicate that low incomes, deprivation and unemployment are potent factors in determining how well people feel and how socially connected they believe they are. Both studies are based on the Second European Quality of Life Survey, which was carried out in 2007. However, the significantly changed economic environment since then may affect the relative position in the countries studied to the extent that it has affected them to varying degrees.\nUnemployed feel most socially excluded\nThe first report, Living conditions, social exclusion and mental well-being\n(2010)presents an index of perceived social exclusion. It shows that retired people in Ireland feel only slightly more excluded (with a score of 2.3) than employed people (2.1) or home-makers (2.2). Unemployed people in Ireland stand out from the rest with a score of 3.2.\nRetired people in Ireland (2.3) feel fractionally more excluded than the average of 2.2 in the 27 EU member states but less excluded than in the UK, including Northern Ireland, where the index stands at 2.6. The highest rate is in Bulgaria (3.1) while retired people in Sweden feel the least socially excluded (1.3).\nA measure of well-being, using WHO-5 scores, puts retired people in Ireland fourth out of 31 countries (the EU27 plus the three candidate countries and Norway). Its score of 67 is well ahead of the average of 59.9 and even further above the UK figure of 56.6.\nPeople in work score highest for well-being\nWithin Ireland, people in work have the highest scores for well-being (69.2) followed by retired people (67), home-makers (63.8) and people who are unemployed (58.2).\nUnemployed people are, therefore, most likely to feel excluded and to have a lower sense of well-being. Related to this is a table showing the index of perceived social exclusion according to one of four levels of deprivation. In Ireland the least deprived group scores 2.1 while the most deprived one is far more likely to feel socially excluded with a score of 3.2.\nThis score of 3.2 is the third worst of the 31 countries included in the survey and well above the average of 2.85 applying to all people in the most deprived category.\nOlder people express relatively high satisfaction with life\nPeople aged 65+ in Ireland have a life satisfaction score of 7.6 compared with an average EU27 figure of 7.1 for that age group. Ireland on this index is slightly worse than the UK, where the 65+ age group has a life satisfaction score of 7.8.\nHowever, older people in Ireland score better than the other two age groups covered by the survey. Their life satisfaction score of 7.6 is higher than for 18-34 year olds (7.2) or the middle group aged 35-64 (7.1)." ]
[ "<urn:uuid:896359df-6d4d-439c-b685-53f813fc0040>" ]
[ "CC-MAIN-2017-30" ]
[ "http://www.cardi.ie/publications/agebyitselfnotamajorpredictorofexclusioninireland" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426133.16/warc/CC-MAIN-20170726102230-20170726122230-00295.warc.gz" ]
[ "en" ]
[ 0.957014799118042 ]
[ 651 ]
[ 2.59375 ]
[ 3 ]
[ "February 23, 2013\nEvery day millions of us pull out our laptops, smart phones and tablets and access trillions of tiny bits of electronic information that are stored in data centers around the country. Retrieving those random tidbits of data takes energy.\nDave Andersen, a professor in the computer science department at Carnegie Mellon University, offers an example of how online giants such as Facebook must look for random bits of data – “needles in a virtual haystack” – and pull them together on a Facebook page.\nAndersen sits at his office computer and runs his finger down the screen as his Facebook profile appears.\n“There are probably 30 pictures just on this little page: little tiny snippets of random information,” Andersen points out.\nIt turns out this random access from large sets of data is one of the most difficult things to do efficiently on a modern computer.\nFor the past few years, Andersen and some of his graduate students have been working to make retrieval of these snippets of information more efficient. To do that, they’ve created a way to slow down servers – the bulked up computers used at data centers – and speed up disks where data are stored. That way servers no longer have to waste energy waiting on slow disks.\nAndersen figures their system is two or three times more energy-efficient at grabbing small bits of data than a conventional server.\nAndersen, who is an avid rock climber and runner, says he’s always had a spot in his heart for doing research related to energy efficiency and computing. But he says a viable application for that kind of work didn’t present itself until the advent of data centers.\n“Suddenly with data centers, we have so much computation packed into a single place but also that is usually owned and operated by a single entity who is footing the bill for the power and has an incentive to do something about it,” Andersen says.\nData centers are ripe for energy savings\nComputer systems in data centers process and store a litany of electronic information: emails, online bills, texts, movies. These facilities – some as large as football fields and some as small as closets – are popping up everywhere. There are 20 to 30 thousand large centers in the United States alone. There are also several million smaller facilities.\nCollectively, data centers use close to two percent of all the electricity we consume. EPA estimates that’s enough electricity to produce 60 metric tons of greenhouse gases. That is equal to the carbon dioxide emissions that a dozen or so coal-fired power plants produce a year.\nCritics say a lot of that energy is wasted not only in inefficient computing software and hardware like Dave Andersen is addressing, but in the way the centers are operated and protected. Data center owners who pay millions of dollars a year in energy bills are starting to pay attention to saving energy.\nA data center tour\nHighmark is one of the biggest health insurance companies in the country. Company officials say they thought about saving energy and reducing their carbon footprint when they built their high security data center near Harrisburg, Pennsylvania in 2005. The LEED-certified center processes a million and a half transactions a day.\nTammy Petrasic, the facilities management director, and MG Berhe, the center’s head of information technology, both worked on the building’s design.\nThe exterior of the building is nondescript. Dozens of cameras watch the comings and goings throughout the facility.\nBerhe and Petrasic pass through several rooms and a corridor to the data center floor. Berhe uses his security badge and fingerprint to gain access. The door opens and the loud roar of servers and air conditioning filters into the outer room.\nInside, rows and rows of metal cabinets hold 400 servers on a raised floor about the size of an NBA basketball court. There are also data storage machines here.\nThe servers kick out a lot of heat. A 2007 EPA report to Congress estimated that half of the energy used in data centers is used to cool servers and data storage equipment.\nThe Highmark center was designed to circulate the hot air away from the servers.\n“Because we circulate the air, that allows an advantage, so we don’t have to use the air conditioning system,” says Berhe. “We have to use it less with the circulation.”\nJust a decade ago, server rooms were kept cooler. Now this room's temperature is maintained at 77 degrees. The servers are cooled with a mechanical air conditioner and a passive air exchange system that allows outdoor air in cooler seasons to chill the water in the AC.\nThe newer generation of servers used at this center is less temperature sensitive and more energy efficient. In fact, some individual servers here have been adapted to work like multiple servers.\n“We’re operating more efficiently than 80 percent of the data centers across the country,” says Petrasic.\nBut Highmark’s electric bill is still around $800 thousand a year because the center has backup power supplies, redundant Internet connections and cooling equipment, and high-security systems. The company says the medical information they process round-the-clock is just too important to give up these safeguards.\n“At this data center we’re going to continue to do what we can to save energy but you get to the point where you know there’s a point of no return where you have to maintain operations first,” Petrasic says.\nA growing sector\nSome energy experts see these layers of redundant equipment and power sources as overkill. But Pierre Delforge, who focuses on high-tech energy consumption for the Natural Resources Defense Council, is encouraged by energy advances in the data center industry. Nevertheless, he says there are many more savings to be had in big centers. He also says smaller facilities – spaces with fewer than 100 servers – need to do more to save energy.\n“Collectively they are responsible for approximately half of all data center energy use in the US,\" says Delforge.\nDelforge says small centers can collectively save about $2 billion a year in energy bills by running fewer servers at full capacity and better managing air flow. Energy savings are important because his 2012 study for NRDC finds the data center sector is growing.\nThe report estimates the sector is growing between five to ten percent. It says, if left unchecked it could more than double by the end of the decade and become one of the largest users of electricity in the United States.\nThe federal government is beginning to consolidate some of its thousands of data centers and has started to work with the industry to measure and reduce energy use. Highmark, for example, reports to EPA once a month about electricity consumption. The hope is all these efforts will lower US data center bills and reduce the industry’s carbon footprint." ]
[ "<urn:uuid:9d1f719b-3144-4c8d-8431-1804057996e5>" ]
[ "CC-MAIN-2017-30" ]
[ "http://archive.alleghenyfront.org/story/data-centers-and-energy-use-1.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425117.42/warc/CC-MAIN-20170725082441-20170725102441-00691.warc.gz" ]
[ "en" ]
[ 0.950827956199646 ]
[ 1408 ]
[ 3.1875 ]
[ 3 ]
[ "Thoughts on Turing’s Imitation Game\nAlan Turing introduced the concept of the imitation game in 1950 in Time magazine, while he was working in the Computer Science department at The University of Manchester (1948 to 1954). In doing so, he raised a seemingly timeless question: are there or will there ever be machines which can successfully imitate humans? And what does this idea of imitation actually mean? Rather than give any definitive answer in his 1950 article, Turing explores his question by responding to a series of “objections” from a range of perspectives such as theological and mathematical. He even gives the example of a “heads in the sand objection”, suggesting that we are all to some extent fearful of the idea of machine thought. The “Argument from Consciousness” quotes Professor Geoffrey Jefferson, who became the UK’s first professor of neurosurgery at The University of Manchester in 1939. Jefferson argues that a machine would have to be able to feel emotions before it could be said to be thinking. Rather than seeking to answer his own imitation game question in a literal way based on the technology available in 1950, Turing’s article is a philosophical and theoretical exercise, and he suggests that we should not simply ask what is possible at any particular point in time, but whether it is possible to imagine computers at any point in the future which might be able to convince in the imitation game:\nwe are not asking whether all digital computers would do well in the game nor whether the computers at present available would do well, but whether there are imaginable computers which would do well.\nTuring describes his theoretical imitation game as a form of Q&A between an interrogator communicating with a human and a digital computer in separate rooms, with a printer available to print out their answers; spoken voices would be a giveaway! The interrogator asks questions which the human and computer must answer, with the computer’s “aim” to convince the interrogator that it is the human being and therefore win the game.\nTuring finishes his article by introducing the idea of the “child machine”, comparing how a machine might be able to learn to the way that a child learns through experience, according to certain rules. He introduces the possibility that a machine may, in future, have the ability to learn and therefore change or develop the rules of its behaviour, in the way that human beings do. And of course, we now understand that “machine learning” is possible, whether or not it successfully imitates the learning of living organisms; we use machine learning daily now through web searches, speech recognition and perhaps soon in self-driving cars. (Continue reading this post on The Imitation Game)\nCurator Clare Gannaway posts on her blog, The Imitation Game, ahead of the exhibition she is curating due to open at the gallery in Spring 2016." ]
[ "<urn:uuid:3de476ec-c015-4970-b575-201bab9004d7>" ]
[ "CC-MAIN-2017-30" ]
[ "http://manchesterartgallery.org/blog/thoughts-on-turings-imitation-game/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549429548.55/warc/CC-MAIN-20170727222533-20170728002533-00328.warc.gz" ]
[ "en" ]
[ 0.9606390595436096 ]
[ 590 ]
[ 3.515625 ]
[ 4 ]
[ "The Dynamic Planet, part two\nBy G.T. Larson\nIf you take a stick and very slowly bend it until it breaks, you will have a very simple example of what happened on March 11 off the northeast coast of Japan.\nThe Pacific Plate, which the Hawaiian Islands reside upon, is slowly moving toward the western arm of the North American Plate at approximately three and three quarter inches per year. The Pacific Plate is pushing under, or subducting under the North American Plate, that creates the Japan Trench off the east coast of Japan. This subduction zone is the reason that the islands of Japan exist. The many volcanoes that originally created the landmass of Japan and continue to affect their daily lives and the frequent earthquakes that disrupt the modern Japan of today are, for the most part, all a result of the subducting of the Pacific Plate with the North American Plate.\nThis movement is not smooth and gradual. Resistance between the two plates can cause pressure to build up until there is a violent readjustment. In the March 11earthquake, tremendous energy had built up and was released in what is called a thrust fault – a 300-mile-long fault plane, or section, of the North American Plate thrust up 100-130 feet from its former position. This upward jolt of hundreds of square miles of seafloor also moved hundreds of cubic miles of ocean water – which radiated a wave train of tremendous seismic energy out in all directions, causing the tsunami.\nThe epicenter, or point of origin, of the March 11 earthquake was about 80 miles off the northeast coast of Japan. Traveling at 500 miles per hour, the first waves slammed the Sendai coast within minutes and tsunami warnings were issued for the Pacific basin. As the tsunami train moved out into the Pacific, the Tsunami Warning Center on Oahu began to closely monitor a series of buoys and observation stations for data on the possible size of the approaching event.\nIn our third part we will look at the local effects of the earthquake generated tsunami on Hawaii and in particular, Molokai.\nWe live on a dynamic planet. It is ever changing and reconfiguring. May we take a lesson from nature and learn to adjust and change as needed, but stand firm for principle and righteousness when called for. Aloha Ke Akua.\nDon't have a Molokai Dispatch ID?\nSign up is easy. Sign up now\nYou must login to post a comment." ]
[ "<urn:uuid:666ec95f-6af7-429d-adf7-6d7379d427eb>" ]
[ "CC-MAIN-2023-14" ]
[ "https://themolokaidispatch.com/naturally-speaking-2/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944996.49/warc/CC-MAIN-20230323034459-20230323064459-00782.warc.gz" ]
[ "en" ]
[ 0.9518517255783081 ]
[ 516 ]
[ 3.65625 ]
[ 4 ]
[ "About Sunset Painting: A sunset painting is a kind of artwork depicting sunset's scene with oil paint material on canvas. Sunset, also called sundown in some American English dialects, is the instant when the trailing edge of the sun's disk disappears below the horizon in the west. It should not be confused with dusk, which is the point at which darkness falls, some time after the beginning of twilight when the sun itself sets.The sunset painting is often more brightly colored than the sunrise, with the shades of red and orange being more vibrant. The atmosphere responds in a number of ways to exposure to the sun during daylight hours. In particular, there tends to be more dust in the lower atmosphere at the end of the day than at the beginning. During the day, the sun heats the surface of the Earth, lowering the relative humidity and increasing wind speed and turbulence, which serves to lift dust into the air. However, differences between sunrise and sundown may in some cases depend more on the particular geographical features of the location from which they are viewed. For example, on a west-facing coastline, sundown occurs over water while sunrise occurs over land.Various sunset paintings are listed here, please contact us to browse more." ]
[ "<urn:uuid:e7ba459f-2159-419f-8fa8-fd6637ffb37e>" ]
[ "CC-MAIN-2013-48" ]
[ "http://www.paintinghere.com/oil-painting/sunset_oil_paintings.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163837349/warc/CC-MAIN-20131204133037-00036-ip-10-33-133-15.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9488890171051025 ]
[ 246 ]
[ 2.875 ]
[ 3 ]
[ "In this article, Vikram Vaswani discusses the ways in which SQL plays an important role in the computer market today, and what may be in store for this database language in the future. This excerpt comes from chapter 26 of MySQL: The Complete Reference, by Vikram Vaswani (McGraw-Hill/Osborne, ISBN 0-07-222477-0, 2004).\nSQL and SQL-based relational databases are one of the most important foundation technologies of the computer market today. From its first commercial implementation about two decades ago, SQL has grown to become the standard database language. In its first decade, the backing of IBM, the blessing of standards bodies, and the enthusiastic support of DBMS vendors made SQL a dominant standard for enterprise-class data management. In its second decade, the dominance of SQL extended to personal computer and workgroup environments and to new, database-driven market segments, such as data warehousing. In the early part of its third decade, SQL stands as the standard database technology for Internet-based computing. The market evidence clearly shows the importance of SQL:\nThe world’s second-largest software company, Oracle, has been built on the success of SQL-based relational data management, through both its flagship database servers and tools and its SQL-based enterprise applications.\nIBM, the world’s largest computer company, offers its SQL-based DB2 product line as a common foundation across all of its product lines and for use on competitor’s systems as well, and has expanded its commitment to SQL with the acquisition of Informix’s SQL DBMS.\nMicrosoft, the world’s largest software company, uses SQL Server as a critical part of its strategy to penetrate the enterprise computing market with server editions of its Windows operating systems, and a key part of its .NET architecture for delivering Internet web services.\nEvery significant database company offers either a SQL-based relational database product or SQL-based access to its nonrelational products.\nAll of the major packaged enterprise applications (Enterprise Resource Planning (ERP), Supply Chain Management (SCM), Human Resource Management (HRM), Sales Force Automation (SFA), Customer Relationship Management (CRM), and so on) are built on SQL-based databases.\nSQL is emerging as a standard for specialized databases in applications ranging from data warehousing to mobile laptop databases to embedded applications in telecomm and data communications networks.\nSQL-based access to databases is an integral feature of Windows, available on the vast majority of personal computer systems, and it is a built-in capability of popular PC software products such as spreadsheets and report writers.\nSQL-based access to databases is a standard part of Internet application servers, required by the J2EE specification.\nThis chapter describes some of the most important current trends and developments in the database market, and projects the major forces acting on SQL and database management over the next several years.\nRemember: this is chapter 26 of MySQL: The Complete Reference, by Vikram Vaswani (McGraw-Hill/Osborne, ISBN 0-07-222477-0, 2004). Vikram is the founder of Melonfire, and has had numerous articles featured on Dev Shed. Buy this book now." ]
[ "<urn:uuid:cec34eb2-14da-4dd6-8ac3-8a2111a8d6a5>" ]
[ "CC-MAIN-2014-10" ]
[ "http://www.devshed.com/c/a/MySQL/The-Future-of-SQL/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011176878/warc/CC-MAIN-20140305091936-00091-ip-10-183-142-35.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9193091988563538 ]
[ 672 ]
[ 2.8125 ]
[ 3 ]
[ "Solar Panels for Your Home or Business!\nThe world we live in is changing drastically. Chances are that you might have heard of the terms “carbon footprint” and “global warming”. Carbon footprint refers to the greenhouse gas emissions that a person or organization produces. Since greenhouse gases are responsible for damaging the ozone layer, they contribute to global warming. As citizens of planet earth, we all have a responsibility to reduce our carbon footprint. Some of the ways through which people can reduce their carbon footprint include ditching fossil fuels for green sources and traveling less.\nGirl holding a plant before planting it on the ground\nHowever, there is a lot more that you can do. To help point you in the right direction, we have prepared the ultimate post just for you. So, what are you waiting for? Let’s dive right in.\nTo have a better understanding of what global warming is and how to stop global warming, you need to know its causes. After all, its root causes can help you figure out solutions for global warming. Here are some of the main causes of global warming that you need to know about.\nNow that you have a clear understanding of what causes global warming, you should consider the following global warming solutions as they can help make a huge difference.\nOne of the best ways to stop global warming is by using energy-efficient appliances. These appliances are designed to help lower your carbon footprint. Since households contribute heavily to the release of harmful greenhouse gases, there is a need to ditch your outdated home appliances that use up a lot of energy. Fortunately, technology has come a long way and you can opt for innovative appliances to reduce your energy usage.\nBy switching to energy-efficient appliances, you can protect the environment and save money at the same time. They use less energy and prevent the possibility of solar radiation. Also, it is worth mentioning that the appliances save water. We all need water to survive. This is why we have to conserve as much water as we can for the next generation. By opting for energy-efficient appliances like air purifiers, freezers, refrigerators, washers, and dryers, you can play your part.\nNow, it might be a long time since you last purchased new appliances. For instance, you might be using old incandescent light bulbs which consume a lot of energy. Therefore, it makes sense to use energy-efficient CFLs or LEDs to slash your electricity bills and save the planet. You have to use such appliances to decrease your carbon footprint. You should also keep in mind that the latest devices will enhance your quality of life and allow you to get more done. In fact, you would not need to stress about maintenance or replacement.\nElectric cars are a lot better for the environment. You will be glad to know that electric vehicles emit fewer air pollutants and greenhouse gases in comparison to their diesel or petrol-powered counterparts. When you drive an electric car, you get to contribute to improving the air quality. As there is no tailpipe, no carbon dioxide would be produced while you drive. Therefore, air pollution would decrease significantly.\nBy driving cars, cities would become a whole lot cleaner, and pedestrians would get to breathe fresher air. Studies show that just one electric car has the potential to save 1.5 million grams of carbon dioxide. To put things into perspective, that is the equivalent of four round trips from Barcelona to London by flight. This is why many countries across the globe are introducing laws that encourage people to ditch their traditional cars for electric ones. Besides, electric vehicles produce less noise pollution which means that they can help create a more peaceful environment.\nAlthough the production of electric vehicles releases more greenhouse emissions than conventional vehicles due to the use of lithium-ion batteries, these vehicles reduce Co2 emissions considerably once on the road. Therefore, they have a lot more to offer. Since batteries can even be reused and recycled, there is no excuse to drive an electric car. When we consider the carbon emissions of electric vehicles, they produce up to 30% lower emissions than traditional vehicles. On top of this, the use of low carbon efficiency can help further reduce emissions.\nWhen it comes to lowering your carbon footprint, there are many habits that you can change to make the world a better place. Protect the world by adopting the following habits.\nKeeping your home warm is an energy-intensive process and can cost you a ton of money. What you need to do is insulate places such as walls and the loft to ensure that the property retains heat when it is cold and remains cool when it is hot. As less energy would be used, you would not only get to reduce your carbon footprint, but you will also have to pay less for your energy needs.\nOur planet has limited water. It takes resources to deliver it to your home. This is why you have to find ways to use less water. Besides, heating water also uses energy. Hence, you have no option but to restrict your water usage. It will help decrease your carbon footprint. Consider taking shorter showers, boiling water only when needed, and brushing your teeth with the taps turned off.\nThe type of food you eat has a huge impact on the environment. You need to understand that meat and dairy products require more resources and produce a great deal of methane. Also, you should stick to local produce as food shipped from other parts of the world would require more resources. Besides, it can be exciting to go to the local farmer’s market once a week.\nA great habit that will reduce your carbon footprint is turning off the lights when there is no need for lighting. You should not power empty space as it would only waste energy. Keep an eye on the appliances and lights and turn them off when you don’t use them. It might be best to install energy-saving LED bulbs and automatic, movement-sensing lights to deal with the issue.\nGet some workouts done and use less energy by cycling or walking to places. If your workplace is nearby, you should simply walk or cycle.\nThere are many things that you own that can be reused. Also, you should only buy something when you truly need it. If you have things lying around that you no longer use, it is best that you recycle or donate them.\nSolar panels use sunlight to generate energy. For those of you that don’t know, solar energy is renewable energy. As long as there is sunlight, you can rely on solar panels to convert it into electricity. By installing residential solar panels, you can lower your carbon footprint and even contribute to the power grid. They provide a clean source of energy and can be installed just about everywhere. Solar panels are necessary for ditching fossil fuels. Besides, they don’t require water to operate which means that installing them can help conserve the local water supplies. In addition to this, solar panels don’t pollute the environment, unlike fossil fuels. After all, solar technology has a long way.\nBeautiful solar panel installation\nLowering your carbon footprint is very much a possibility. From using energy-efficient appliances to getting solar panels installed, each of the above practices can help protect our environment. If you are worried about global warming and want to make sure that your future generation is able to thrive, it is crucial that you play your part. Although the road towards a fossil-free future might seem close to impossible, every bit of effort counts. You must not feel discouraged as we can still save our planet.\nSolgen Power is a solar energy equipment company that sells and installs solar for homeowners. Solgen Power has been recognized by INC. 5000 as one of the fastest growing companies in the nation. Solgen Power has grown nationwide and continues to provide excellent customer service to homeowners." ]
[ "<urn:uuid:ee917ff2-ea33-41eb-a2a6-274821b48859>" ]
[ "CC-MAIN-2023-14" ]
[ "https://solgenpower.com/2022/10/05/how-to-reduce-your-carbon-footprint/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00396.warc.gz" ]
[ "en" ]
[ 0.9517711400985718 ]
[ 1589 ]
[ 2.609375 ]
[ 3 ]
[ "Safety & the Ceramics Arts\nAll practitioners, manufacturers and purchasers of ceramics and pottery share a common concern for the safe use of ceramic materials. Safety is not only defined by laws and regulations but by common sense and good studio practices. We hope the information provided here, as well as links to external resources, will help with your understanding of regulations and risks associated with ceramic activity.\n- Product Hazards\n- Types - health, environmental, physical\n- Health Hazards - classes and defintions, root of entry into the body\n- Toxicity - materials evaluation, chronic vs acute (IARC, NTP) 4 classes of hazards by IARC; monographs\n- Understanding Risk - presence factored against exposure, dosage\n- Laws and Regulations\n- CPSIA 2008/Certificates of Compliance\n- Prop 65\n- Lead and Cadmium Leach guidelines\n- Product Labels\n- Hazard Communication Plan\n- Certificates of Compliance\n- Best Practices\n- Maintaining a Safe Studio\n- Ceramic Safety in the Classroom\n- Mayco Technical Support\nTypes of Hazards\nProduct Hazards can be generally defined accordingly:\n- Physical - chemical properties such as combustibility, explosiveness, flammability, oxidizing, and/or unstable or reactive.\n- Environmental - immediate or direct on environment on ecosystem; latent/indirect effect on environment and human life.\n- Health - immediate (acute) or latent (chronic) impact on the human body\nreturn to top\nThe classification of health hazards provided below is derived from OSHA's hazardous communications law (29 CFR Ch. XVII, Section 1910.1200, pp. 474-475):\n- Carcinogen: A chemical that has been evaluated by the International Agency for Research on Cancer (IARC) or National Toxicology Program (NTP) and found to be a carcinogen or potential carcinogen;\n- Corrosive: A chemical that causes visible destruction of, or irreversible alterations in, living tissue by chemical action at the site of contact;\n- Highly toxic: A chemical that is lethal at minor dosages via oral ingestion, skin contact or inhalation;\n- Irritant: A chemical, which is not corrosive, but which causes a reversible inflammatory effect on living tissue by chemical action at the site of contact;\n- Sensitizer: A chemical that causes a substantial proportion of exposed people or animals to develop an allergic reaction in normal tissue after repeated exposure to the chemical;\n- Toxic: A chemical that is lethal in larger dosages than those listed for highly toxic chemicals;\n- Target organ effects: A chemical that causes harmful effects to specific body organs.\nThe two most common human health hazards you'll see listed for a ceramic material (on the label or SDS) are \"carcinogen\" and \"irritant.\" There are a few Mayco non fired products (Translucent Oil-Based Stains, Twinkles Oil-Based Stains, and Touch ‘N Glo Wax Metallic Stains) that contain solvents, which could be \"toxic\" if ingested.\nIrritants normally carry an acute warning whereas carcinogens normally bear chronic warnings. The definitions of acute and chronic toxicity are:\n- Acute Toxicity – an adverse reaction will occur within hours or days. An acute reaction might result in symptoms such as a skin rash, irritation to your eyes, or immediate sickness.\n- Chronic Toxicity – an adverse reaction that will occur over time (months or years). A substance that causes cancer is chronically toxic.\nRoutes of entry refers to the method a ceramic material might take into a human body. The four most prevalent: inhalation, absorption through skin, absorption through the eyes, ingestion via the mouth.\nLaws & Regulations\nThere are many laws and regulations that affect ceramic materials, ceramic ware and ceramic activity. One way to try to make sense of them all is to group them according to topic and place of use. We provide some perspectives below:\n- Raw Materials\n- Product Communications\n- Product Labels: the law LHAMA; the enforcing agency - CPSC\n- Product Testing Verification (Certificates of Compliance): the law CPSIA; the enforcing agency - CPSC\n- Food Safe Surfaces: the law Leach Test; the enforcing agency FDA\n- Retail Studios\n- LHAMA, CPSIA, FDA - Leach Standards, Depts. of Health - student safety(schools)\n- Manufacturer - OSHA - MSDS, Workplace Safety\nVarious government agencies define and address hazards, with law or policy, according to their purview. The EPA, CPSC, OSHA, Dept. of Agriculture (FDA), DOT are some of the agencies providing regulations that impact ceramic materials and their use. In the section below, Laws & Regulations, we review the major agencies and laws relating to ceramics.\nGeneral Certificates of Compliance\nreturn to top\nKey resources used to create the information used in this article:" ]
[ "<urn:uuid:3733fb6d-5e2e-4e68-852d-78f952097e63>" ]
[ "CC-MAIN-2013-20" ]
[ "http://maycocolors.com/index.php?option=com_content&view=article&id=16&Itemid=116" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00006-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.894091010093689 ]
[ 1044 ]
[ 3.046875 ]
[ 3 ]
[ "Description: This course will present the fundamentals of biostatistics and epidemiology with the aim of training students how to comprehend critique and communicate findings from the biomedical literature. In the first part of this course, students will learn how to assess the importance of chance in the interpretation of experimental data. Major topics covered include probability theory, normal sampling, chi-squared and t-tests, analysis of variance, linear regression and survival analysis, as well as how to perform elementary calculations using the statistical package STATA. In the second part this course, students will learn how to identify and prevent bias in observational studies. Students will learn about causal inference, types of bias (confounding, selection and information bias), and key study designs (randomized trials, cohort and case-control studies).\nProfessors: Michael Williams" ]
[ "<urn:uuid:9967046f-56c9-4c82-a2a4-a69a0a5bd502>" ]
[ "CC-MAIN-2017-26" ]
[ "http://worldmentoringacademy.com/www/index.php?ctg=lesson_info&lessons_ID=228" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321458.47/warc/CC-MAIN-20170627152510-20170627172510-00269.warc.gz" ]
[ "en" ]
[ 0.8858986496925354 ]
[ 165 ]
[ 2.59375 ]
[ 3 ]
[ "MADISON – At restaurants and cafeterias, consumers have grown accustomed to seeing a line of waste containers for recycling glass, plastic and paper items. Important as those bins are for reducing the burden on landfills, they overlook a major source of waste: the food left on diners” plates.\nFood accounts for about one-third of the trash Americans throw away, and most of it ends up in landfills. While food is generally more biodegradable than some of the other items in the trash can, it”s not environmentally harmless. Decomposing food produces methane, a greenhouse gas that is 22 times more effective at trapping heat than carbon dioxide.\nIn an effort to reduce those impacts, the University of Wisconsin-Madison has launched a project to collect and compost food waste from campus eateries. Organized by We Conserve, a university-wide program that promotes environmental stewardship practices, the project aims to compost more than 400 tons of food waste annually when fully implemented.\n“UW has been composting for years with other organic materials, but we”ve found that great synergy can exist by adding food. It can really improve the quality of the compost product,” says Faramarz Vakili, program director for We Conserve.\nComposting reduces the environmental impact of food waste by speeding up decomposition, reducing the period of time that food can release methane. A well-maintained compost window shrinks food components to about half their original size, reducing the stress on already crowded landfills. It also produces economical organic material that can be added to soil and reduces the need for fertilizer treatments on lawns and gardens.\nTo collect food waste, We Conserve worked with the Wisconsin Union”s food services unit, which helped set up food-waste reservoirs at two locations. One is in the kitchens at Memorial Union, where food is prepared for all Union delis across campus. Twice a week, employees collect spoiled and unsold food that would normally wind up in garbage cans. The second reservoir, located at Grainger Hall”s Capital Cafe, serves as a collection point for post-consumer food. Food from both sites is taken to the West Madison Agricultural Research Station, a facility on Mineral Point Road run by the College of Agricultural and Life Sciences, for composting.\nThe project has presented some challenges, particularly in educating consumers about how to sort food for composting. “Not all foods belong in a compost heap, especially meat and dairy products. So it”s important that discarded food wastes are separated to keep out things that don”t decompose well,” says West Madison superintendent Thomas Wright, who oversees composting at the research facility. To help guide consumers, We Conserve constructed a food-collection station at the cafe that uses signs and pictures to designate the proper containers for different kinds of food. Vakili says the station has helped boost the number of people participating in the project, and he”s confident that diners will catch on and embrace food sorting in time.\n“We want to put the idea of environmental stewardship on people”s radars,” says Vakili. “When a person is engaged in doing a good thing for the environment, then subconsciously they are interested in doing more. One thing leads to another.”\nMeanwhile, the university hopes its successful composting experiment leads to an even bigger impact. Plans are to expand the project into residence hall dining facilities by the end of the year. Provisions have already been made to provide the dining halls with collection bins and equip the staff with biodegradable plates. If students embrace the idea, it could make a significant dent in reducing food waste on campus.\n“Effective composting takes time and effort, and while we would love everyone on campus to create their own, that”s just not possible,” says Wright. “So this program is making it easy for them. All they have to do is give us their food, and we will do the work.”" ]
[ "<urn:uuid:2e2165e9-4eb2-4579-bfdb-01c062feb53d>" ]
[ "CC-MAIN-2020-10" ]
[ "https://news.cals.wisc.edu/2009/05/26/composting-project-takes-a-bite-out-of-food-waste/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146176.73/warc/CC-MAIN-20200225233214-20200226023214-00103.warc.gz" ]
[ "en" ]
[ 0.9513853192329407 ]
[ 844 ]
[ 3.203125 ]
[ 3 ]
[ "This unit examines the social and cultural frameworks that inform long term, generative engagement and partnerships with Indigenous Australians in management of resources on their land and sea estates. Exploration of the social and cultural construction of knowledge and knowledge-making processes provides a foundation for analysing socio-political, socio-economic and policy drivers of Indigenous engagement and partnerships in the field of land and sea management. The practical application of the principles developed through the examination of case studies will allow students to relate their learning to their own professional contexts.\nSemester 2, 2017\nPRESCRIBED TEXT - PEOPLE ON COUNTRY, VITAL LANDSCAPES, INDIGENOUS FUTURES\nNO TEXTBOOK REQUIRED\nOver the past four decades Aboriginal people living in remote and regional Australia have been..." ]
[ "<urn:uuid:d4e96ef3-6bc4-473b-ad5e-89d695ef7974>" ]
[ "CC-MAIN-2017-26" ]
[ "https://bookshop.cdu.edu.au/collections/ati505-partnerships-and-engagement-in-indigenous-land-and-sea-management" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323970.81/warc/CC-MAIN-20170629121355-20170629141355-00540.warc.gz" ]
[ "en" ]
[ 0.8851260542869568 ]
[ 159 ]
[ 3.09375 ]
[ 3 ]
[ "Our editors will review what you’ve submitted and determine whether to revise the article.Join Britannica's Publishing Partner Program and our community of experts to gain a global audience for your work!\nCrystal defect, imperfection in the regular geometrical arrangement of the atoms in a crystalline solid. These imperfections result from deformation of the solid, rapid cooling from high temperature, or high-energy radiation (X-rays or neutrons) striking the solid. Located at single points, along lines, or on whole surfaces in the solid, these defects influence its mechanical, electrical, and optical behaviour.\nPoint defects include the Frenkel type, the Schottky type, and the impurity type. The Frenkel defect involves a single ion, which is displaced from its normal lattice point and shifts to a nearby interstice, or space, between atoms in the lattice. In the Schottky defect, two ions of opposite sign leave the lattice. Impurity defects are foreign atoms that replace some of the atoms making up the solid or that squeeze into the interstices; they are important in the electrical behaviour of semiconductors, which are materials used in computer chips and other electronic devices.\nLine defects, or dislocations, are lines along which whole rows of atoms in a solid are arranged anomalously. The resulting irregularity in spacing is most severe along a line called the line of dislocation. Line defects can weaken or strengthen solids.\nSurface defects may arise at the boundary between two grains, or small crystals, within a larger crystal. The rows of atoms in two different grains may run in slightly different directions, leading to a mismatch across the grain boundary. The actual external surface of a crystal is also a surface defect because the atoms on the surface adjust their positions to accommodate for the absence of neighbouring atoms outside the surface.\nLearn More in these related Britannica articles:\ncrystal: Crystal defectsA crystal is never perfect; a variety of imperfections can mar the ordering. A defect is a small imperfection affecting a few atoms. The simplest type of defect is a missing atom and is called a vacancy. Since all atoms occupy space, extra…\nvacancySuch an imperfection (crystal defect) in the regular spacing of atoms changes the electrical and optical properties of the crystal. Colour centres are vacancies that give colour to many solids. Vacancies can be created by mechanical deformation of the crystal, rapid cooling from high temperature, or the impact…" ]
[ "<urn:uuid:864b85d7-3ab6-4751-b600-70c937da5d4a>" ]
[ "CC-MAIN-2020-10" ]
[ "https://www.britannica.com/science/crystal-defect" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146004.9/warc/CC-MAIN-20200225014941-20200225044941-00023.warc.gz" ]
[ "en" ]
[ 0.9190126061439514 ]
[ 509 ]
[ 4.21875 ]
[ 4 ]
[ "The independent resource on global security\n- Armament and disarmament\n- Conflict, peace and security\n- Peace and development\n- SIPRI Yearbook\n- News and Events\nNon-communicable diseases (NCDs), including diabetes, increasingly contribute to morbidity and mortality in conflict settings, and the burden of those diseases has become prominent especially in middle-income settings. The outbreak of conflict pushes people with diabetes, who need life-long control and treatment, into a life with even more unexpectedness and instability.\nOne of many challenges that people with diabetes living in conflict-affected areas face is the limited availability of and access to insulin and other anti-diabetic drugs. There are many factors that play critical role in the process of insulin delivery to people with diabetes. There should be enough supply and adequate storage, including cold chain facilities, for quality and safety; this requires a stable supply of electricity. Another factor is the equitable distribution where well functioning transport infrastructure is available. In conflict settings, however, these are often impaired.\nInsulin crisis due to conflict has been documented in Iraq. Prevalence of diabetes in Iraq was estimated to be 10.2 per cent in 2010. This estimate exceeded total prevalence in the Middle East and North Africa region (9.3%) and is (nearly) equivalent to that of the USA (10.3%). The epidemiological transition has been experienced in this country, so there is an increased need for controlling and treating diabetes. However, Iraqi healthcare system was devastated due to continuous conflicts, political and economic isolation and public health funding cutbacks of 90% by Saddam Hussein in 2002 in comparison with spending in the previous decade. Twelve per cent of hospitals were destroyed in 2003, and Iraq experienced significant pharmaceutical shortages; more over, due to safety reasons, there have been issues in transporting insulin when it is available. Besides insulin shortages and lack of transport, low quality diagnostic tools, weakened service delivery after the sanctions, limited access to self-monitoring tests and prevention and treatment of complication were of concern in Iraq, according to a report by Iraq’s Ministry of Health.\nPeople have different coping strategies to deal with insulin shortage. They may reduce insulin dosage, use insulin that passed the expiration date or use insulin that is imported without quality control. Some stop using insulin or change to other kinds of drugs to control blood glucose level. Those who rely on the market outside of the primary healthcare centers to get insulin are burdened with higher prices,which decreases access to the drug. Uncontrolled diabetes can lead to severe complications such as diseases related to cardiovascular system, liver, nerve and eyes, which can eventually lead to mortality.\nOne may ask a question: does conflict increase the incidence of diabetes? Stressful life events and environmental factors have been proposed as one of determinants of type 1 diabetes along with genetic predisposition to the disease, and this implies possible link between conflict-related stress and the onset of type 1 diabetes. To explain this, it has been proposed that impaired immune functions caused by psychological and environmental triggers may stimulate beta-cell related immune response, resulting in more diabetes-prone condition. For example, there is a study in Israel reporting that there was increased incidence of type 1 diabetes in Israeli children and adolescents due to war-related psychological trauma, though cautious interpretation is needed because scientific consensus has yet to be made on the causality.\nWhen it comes to type 2 diabetes, the hypothesis of ‘fetal programming’ may give a hint. According to this idea, nutritionally stressful situations that occurre during early stages of life – fetal and infant – design the structure and function of the body to cope with the situation. Thus, the long-term change in the body made in these critical periods determines disease pattern in adulthood. For example, a child who experienced maternal undernutrition may be more likely to develop chronic diseases such as type 2 diabetes and cardiovascular diseases if the metabolic system of the child failed to adapt to affluence in adulthood. This may have implications for conflict-affected populations with limited access to nutritious food as well as for those in rapidly developing countries. However there are a lot to learn more about the link, and long-term follow-up studies are needed.\nAs the importance of addressing diabetes and other chronic NCDs is increasingly recognized worldwide, not only in high-income settings but also in low- and middle-income settings, it will become more important to respond to the need for controlling chronic conditions in conflict settings. There is a lot of room for improvement to best support conflict-affected people with diabetes or pre-diabetic conditions, in terms of financing, health staff training, infrastructure, education and research. Diabetes and NCDs should be taken into consideration when assessing and intervening in conflict settings.\nABOUT THE AUTHOR(S)" ]
[ "<urn:uuid:a4bcd6e7-6616-4298-8120-d257aa5749d0>" ]
[ "CC-MAIN-2023-14" ]
[ "https://www.sipri.org/commentary/blog/2012/world-diabetes-day-diabetes-conflict-areas" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945289.9/warc/CC-MAIN-20230324211121-20230325001121-00783.warc.gz" ]
[ "en" ]
[ 0.9514500498771667 ]
[ 998 ]
[ 2.578125 ]
[ 3 ]
[ "At the end of April, or when spring starts to thaw, a great migration north begins. Thousands upon thousands of songbirds make the trek, but you won’t see most of them. They fly in the dark to avoid as many predators as possible, and in doing so evade the humans trying to study them as well.\nSo, even as 4,000 of the world’s 10,000 bird species fly over our heads every night, scientists are still scrambling to answer basic questions. When do birds decide to migrate? How dangerous is it? And how do anthropogenic factors like light pollution and climate change impact birds as they travel?\nRead at: Popular Science" ]
[ "<urn:uuid:524c7dd7-40ab-47c4-b957-e15ae321b01e>" ]
[ "CC-MAIN-2020-05" ]
[ "http://dyanisabin.com/2018/07/17/migrating-birds-space-telescope/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594101.10/warc/CC-MAIN-20200119010920-20200119034920-00486.warc.gz" ]
[ "en" ]
[ 0.9492918252944946 ]
[ 139 ]
[ 3.578125 ]
[ 4 ]
[ "Send the link below via email or IMCopy\nPresent to your audienceStart remote presentation\n- Invited audience members will follow you as you navigate and present\n- People invited to a presentation do not need a Prezi account\n- This link expires 10 minutes after you close the presentation\n- A maximum of 30 users can follow your presentation\n- Learn more about this feature in our knowledge base article\nDo you really want to delete this prezi?\nNeither you, nor the coeditors you shared it with will be able to recover it again.\nMake your likes visible on Facebook?\nYou can change this under Settings & Account at any time.\nCopy of Vocabulary: Set 1\nTranscript of Copy of Vocabulary: Set 1\nconsists of the words or phrases a writer uses to represent persons, objects, actions, feelings and ideas descriptively by appealing to the senses\noccurs when the elements of a statement contradict each other\nis a comparison of two unlike things not using like or as.\nis a form of paradox that combines a pair of opposite terms into a single, unusual expression.\nis a kind of metaphor that gives inanimate objects or abstract ideas human characteristics.\n5b. Anthropomorphism- a type of personification applied to animals. Specifically, giving animals human characteristics.\nis a comparison of two different things or ideas through the use of the words like or as.\nis a deliberate, extravagant, and often outrageous exaggeration.\n9. Motif -\nis a term that describes a pattern or strand of imagery or symbolism.\nthe use of any object, person, place, or action that has a meaning in itself while standing for something larger than itself.\n1. Figures of Speech or Figurative Language-\nwords or phrases that describe one thing in terms of something else." ]
[ "<urn:uuid:9c2bb4ef-f906-4047-8306-a6befda35e14>" ]
[ "CC-MAIN-2017-30" ]
[ "https://prezi.com/xlfp5j8y8fpa/copy-of-vocabulary-set-1/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424884.51/warc/CC-MAIN-20170724142232-20170724162232-00144.warc.gz" ]
[ "en" ]
[ 0.841049075126648 ]
[ 374 ]
[ 3.109375 ]
[ 3 ]
[ "What We Can Do\nThe Puget Sound Writing Project offers many services which can benefit teachers, schools, and students. Our programs range from our Summer Institutes for teachers (offering Continuing Education credits) to in-school in-service workshops (from single session offerings to year-long projects to improve writing across the curriculum).\nProfessional Development is our business, and we have a long and proven track record in helping teachers learn more about the writing process and providing opportunities to exchange lesson plans and classroom experiences.\nPoetry and Teaching\nPoetry in the classroom helps students learn to distinguish detail, appreciate juxtaposition and read closely. It develops critical thinking experiences that are essential to writing details and supporting ideas on tests like the WASL. This workshop aims to increase teachers' pleasure in the reading and writing of poetry, support teachers as writers, provide participants with practical approaches to and strategies for including poetry in the curriculum, and support writing instruction that helps students achieve the Washington State EALRs.\nTeachers as Writers\nIn this workshop, we address the findings of research that shows that teachers who write themselves experience more success in encouraging their students to learn to write successfully. We write, examine strategies for teaching writing successfully, and practice implementing what we learn in our classrooms.\nReading Strategies for Challenged Readers\nIn this workshop we read and write, examine strategies for teaching reading successfully, develop reading assignments, and practice implementing what we learn in our classrooms, focusing on one at-risk student in each teacher's classroom. We want all students to enjoy reading, and to understand that authors' writing comes from a perspective and has a purpose.\nTeaching with Writing Process\nIn this workshop, participants gain experience in and awareness of writing process through personal writing and participation in writing groups and classroom-appropriate writing excercises, explore the incorporation of writing process both to teach writing and in writing across the curriculum in their own classrooms, and gain assurance that \"it's OK to let students write.\"\nWriting to Learn\nIn this workshop, teachers will experiment with strategies that use the writing process to help students learn and display their learning using different modes of writing to communicate with a variety of audiences. Participants have opportunities to work on their own lessons, try these strategies in their classrooms and discuss results and further uses of writing to learn. (This workshop can focus on any subject area-History, Math, Art, reading or it can be general.) You decide." ]
[ "<urn:uuid:d23dc7e9-fcdb-44e9-8ad0-be6a961a3e78>" ]
[ "CC-MAIN-2013-20" ]
[ "http://depts.washington.edu/pswpuw/profdev.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703532372/warc/CC-MAIN-20130516112532-00056-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9517671465873718 ]
[ 493 ]
[ 2.65625 ]
[ 3 ]
[ "What Does It Mean To Be German Recent Answers To This Question Have Ranged From The General Germans Are Always The Other To The Analytic They Are A Multiple Identity With A Constant Wish For Redefinition The Catalogue For Confronting Identities In German Art An Exhibition To Run At The David And Alfred Smart Museum Of Art From October, To January, Turns To Art Works, Artists, And Their Audiences To Explore How Germans Of The Past Two Centuries Have Confronted Issues Of Identity, Both Individual And Collective Focusing On The Smart Museum S Rich Holdings Of German Art And A Significant Selection Of Important Loans, It Examines The Complex Interweaving Of Subjective Identities From The Period Of Caspar David Friedrich To That Of Anselm Kiefer Thematic Essays Come Together With A Select Number Of Object Entries To Place Individual Works Of Art Within A Larger Historical Context, And The Whole Is Lavishly Illustrated With One Hundred Images From The Exhibition Itself\nIs a well-known author, some of his books are a fascination for readers like in the Confronting Identities in German Art book, this is one of the most wanted Reinhold Heller author readers around the world.\n- 180 pages\n- Confronting Identities in German Art\n- Reinhold Heller\n- 17 July 2018 Reinhold Heller" ]
[ "<urn:uuid:ef43f352-e37d-438f-998f-5799aae931c4>" ]
[ "CC-MAIN-2020-05" ]
[ "http://webcambestmilf.info/confronting-identities-in-german-art-myths-reactions-reflections/a945b6gdrx6757092a945b6.YTk0NWI2YmQxYTQzMTM" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251689924.62/warc/CC-MAIN-20200126135207-20200126165207-00359.warc.gz" ]
[ "en" ]
[ 0.804076611995697 ]
[ 270 ]
[ 2.859375 ]
[ 3 ]
[ "Prevalence of Overweight and Obesity in the Middle-age Popula-tion: A Priority for the Health System\nBackground: The aim of this study was to determine the prevalence of overweight and obesity and their associated factors in the middle-aged population of Shahroud, North of Iran.\nMethods: In a population-based cross-sectional study with random cluster sampling, 300 clusters of Shahroud (north of Iran) were randomly selected from the 40-64 yr old population of the city, during 2009 and 2010. Upon enrollment, participants were weighed on digital scales and their heights were measured under standard conditions. Overweight and obesity were defined as a body mass index (BMI) of 25-29.9 kg/m2 and a BMI ≥30 kg/m2, respectively.\nResults: Of the 6311 selected people, 5190 people (82.2%) participated in the study. Their mean age was 50.9±6.2 yr, and 2977 of them were women (57.4%). Age and gender standardized mean BMI in the study population were 28.1 kg/m2 (95% CI: 27.9-28.2). Age and gender-standardized prevalence of BMI≥25 was 74.4% (95% CI: 73.0-75.8); 43.4% (95% CI 44.8-42.0) were overweight and 31.0% (95% CI 32.5-29.6) were obese. Overweight, Obesity and a BMI ≥25 prevalence's were significantly higher in women (P<0.001). In the multiple logistic regression models, female gender and higher economic status were significantly correlated with BMI≥25. In addition, people over the age of 54 yr were more likely to have BMI≥25 than those in the 40-44 yr age range (P<0.001).\nConclusion: The prevalence of overweight and obesity in the present study, especially in women, was higher than that reported from previous studies in Iran. Considering prevention, programs for overweight and obesity-related are suggested as a priority for the health system in this population.\nMathers C, Stevens C, Mascarenhas M (2009). Global Health Risks: Mortality and burden of disease attributable to selected major risks. WHO. http://www.who.int/healthinfo/global_burden_disease/GlobalHealthRisks_report_full.pdf\nGiray Simsek H, Gunay T, Ucku R (2010). [Effects of social inequalities on coronary heart disease risk factors: a population-based, cross-sectional study in Izmir]. Anadolu Kardiyol Derg, 10(3):193-201.\nWHO (2008). The global burden of disease: 2004 update. http://www.who.int/healthinfo/global_burden_disease/2004_report_update/en/\nTsai AG, Williamson DF, Glick HA (2011). Direct medical cost of overweight and obesity in the USA: a quantitative systematic review. Obes Rev, 12(1):50-61.\nWHO (2012). Global Health Observatory (GHO) data. http://www.who.int/gho/ncd/risk_factors/obesity_text/en/index.html\nGarcia-Delgado M, Navarrete I, Garcia-Palma MJ, Colmenero M (2012). Postoperative respiratory failure after cardiac surgery: use of noninvasive ventilation. J Cardiothorac Vasc Anesth, 26(3):443-7.\nEsteghamati A, Khalilzadeh O, Mohammad K, et al (2010). Secular trends of obesity in Iran between 1999 and 2007: National Surveys of Risk Factors of Non-communicable Diseases. Metab Syndr Relat Disord, 8(3):209-13.\nFotouhi A, Hashemi H, Shariati M, et al (2013). Cohort Profile: Shahroud Eye Cohort Study. Int J Epidemiol, 42(5):1300-8.\nEsteghamati A, Meysamie A, Khalilzadeh O, et al (2009). Third national Surveillance of Risk Factors of Non-Communicable Diseases (SuRFNCD-2007) in Iran: methods and results on prevalence of diabetes, hypertension, obesity, central obesity, and dyslipidemia. BMC Public Health, 9:167.\nAyatollahi SM, Mostajabi F (2007). Prevalence of obesity among schoolchildren in Iran. Obes Rev, 8(4):289-91.\nHajian-Tilaki KO, Heidari B (2007). Prevalence of obesity, central obesity and the associated factors in urban population aged 20-70 yr, in the north of Iran: a population-based study and regression approach. Obes Rev, 8(1):3-10.\nRashidy-Pour A, Malek M, Eskandarian R, Ghorbani R (2009). Obesity in the Iranian population. Obes Rev, 10(1):2-6.\nZhang X, Sun Z, Zheng L, et al (2008). Prevalence and associated factors of overweight and obesity in older rural Chinese. Intern Med J, 38(7):580-6.\ndo Carmo I, Dos Santos O, Camolas J, et al (2008). Overweight and obesity in Portugal: national prevalence in 2003-2005. Obes Rev, 9(1):11-9.\nGallus S, Colombo P, Scarpino V, et al (2006). Overweight and obesity in Italian adults 2004, and an overview of trends since 1983. Eur J Clin Nutr, 60(10):1174-9.\nShayo GA, Mugusi FM (2011). Prevalence of obesity and associated risk factors among adults in Kinondoni municipal district, Dar es Salaam Tanzania. BMC Public Health, 11:365.\nCarter AO, Hambleton IR, Broome HL, et al (2006). Prevalence and risk factors associated with obesity in the elderly in Barbados. J Aging Health, 18(2):240-58.\nFouad M, Rastam S, Ward K, Maziak W (2006). Prevalence of obesity and its associated factors in Aleppo, Syria. Prev Control, 2(2):85-94.\nAl-Baghli NA, Al-Ghamdi AJ, Al-Turki KA, et al (2008). Overweight and obesity in the eastern province of Saudi Arabia. Saudi Med J, 29(9):1319-25.\nDennis B, Aziz K, She L, et al (2006). High rates of obesity and cardiovascular disease risk factors in lower middle class community in Pakistan: the Metroville Health Study. J Pak Med Assoc, 56(6):267-72.\nOlatunbosun ST, Kaufman JS, Bella AF (2011). Prevalence of obesity and overweight in urban adult Nigerians. Obes Rev, 12(4):233-41.\nHwang LC, Bai CH, Chen CJ (2006). Prevalence of obesity and metabolic syndrome in Taiwan. J Formos Med Assoc, 105(8):626-35.\nKoochek A, Johansson SE, Kocturk TO, et al (2008). Physical activity and body mass index in elderly Iranians in Sweden: a population-based study. Eur J Clin Nutr, 62(11):1326-32.\nBuchowski MS, Cohen SS, Matthews CE, et al (2010). Physical activity and obesity gap between black and white women in the southeastern U.S. Am J Prev Med, 39(2):140-7.\nMonteiro CA, Moura EC, Conde WL, Popkin BM (2004). Socioeconomic status and obesity in adult populations of developing countries: a review. Bull World Health Organ, 82(12):940-6.\nEl Rhazi K, Nejjari C, Zidouh A, et al (2011). Prevalence of obesity and associated sociodemographic and lifestyle factors in Morocco. Public Health Nutr, 14(1):160-7.\nMendis S, Banerjee A (2010). Cardiovascular disease: equity and social determinants. Eds. In: Blas E, Kurup AS. Equity, social determinants and public health programmes. Geneva: World Health Organization. pp.31-48\nLjungvall A, Gerdtham UG (2010). More equal but heavier: a longitudinal analysis of income-related obesity inequalities in an adult Swedish cohort. Soc Sci Med, 70(2):221-31.\nVallejo-Torres L, Morris S (2010). The contribution of smoking and obesity to income-related inequalities in health in England. Soc Sci Med, 71(6):1189-98." ]
[ "<urn:uuid:5162ff8f-9a40-422b-999b-e96a4f66c7b2>" ]
[ "CC-MAIN-2020-05" ]
[ "http://ijph.tums.ac.ir/index.php/ijph/article/view/10087" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00277.warc.gz" ]
[ "en" ]
[ 0.80650794506073 ]
[ 1909 ]
[ 2.53125 ]
[ 3 ]
[ "Against all Odds: Astronomers Baffled by Discovery of Rare Quasar Quartet\nMay 14, 2015\n|Background information||Questions & Answers||Image download|\nHitting the jackpot is one thing, but if you hit the jackpot four times in a row you might wonder if the odds were somehow stacked in your favor. A group of astronomers led by Joseph Hennawi of the Max Planck Institute for Astronomy have found themselves in exactly this situation. They discovered the first known quasar quartet: four quasars, each one a rare object in its own right, in close physical proximity to each other.\nQuasars constitute a brief phase of galaxy evolution, powered by the infall of matter onto a supermassive black hole at the center of a galaxy. During this phase, they are the most luminous objects in the Universe, shining hundreds of times brighter than their host galaxies, which themselves contain hundreds of billions of stars. But these hyper-luminous episodes last only a tiny fraction of a galaxy’s lifetime, which is why astronomers need to be very lucky to catch any given galaxy in the act. As a result, quasars are exceedingly rare on the sky, and are typically separated by hundreds of millions of light years from one another. The researchers estimate that the odds of discovering a quadruple quasar by chance is one in ten million. How on Earth did they get so lucky?\nClues come from peculiar properties of the quartet’s environment. The four quasars are surrounded by a rare giant nebula of cool dense hydrogen gas - which the astronomers dubbed the \"Jackpot nebula\", given their surprise at discovering it around the already unprecedented quadruple quasar. The nebula emits light because it is irradiated by the intense glare of the quasars. In addition, both the quartet and the surrounding nebula reside in a rare corner of the universe with a surprisingly large amount of matter. “There are several hundred times more galaxies in this region than you would expect to see at these distances” explains J. Xavier Prochaska, professor at the University of California Santa Cruz and the principal investigator of the Keck observations.\nGiven the exceptionally large number of galaxies, this system resembles the massive agglomerations of galaxies, known as galaxy clusters, that astronomers observe in the present-day universe. But because the light from this cosmic metropolis has been travelling for 10 billion years before reaching Earth, the images show the region as it was 10 billion years ago, less than 4 billion years after the big bang. It is thus an example of a progenitor or ancestor of a present-day galaxy cluster, or proto-cluster for short.\nPiecing all of these anomalies together, the researchers tried to understand what appears to be their incredible stroke of luck. Hennawi explains “if you discover something which, according to current scientific wisdom, should be extremely improbable, you can come to one of two conclusions: either you just got very lucky, or you need to modify your theory.”\nThe researchers speculate that some physical process might make quasar activity much more likely in specific environments. One possibility is that quasar episodes are triggered when galaxies collide or merge, because these violent interactions efficiently funnel gas onto the central black hole. Such encounters are much more likely to occur in a dense proto-cluster filled with galaxies, just as one is more likely to encounter traffic when driving through a big city.\n\"The giant emission nebula is an important piece of the puzzle,\" says Fabrizio Arrigoni-Battaia, a PhD student at the Max Planck Institute for Astronomy who was involved in the discovery, “since it signifies a tremendous amount of dense cool gas.” Supermassive black holes can only shine as quasars if there is gas for them to swallow, and an environment that is gas rich could provide favorable conditions for fueling quasars.\nOn the other hand, given the current understanding of how massive structures in the universe form, the presence of the giant nebula in the proto-cluster is totally unexpected. According to Sebastiano Cantalupo of ETH Zurich, a co-author of the study: \"Our current models of cosmic structure formation based on supercomputer simulations predict that massive objects in the early universe should be filled with rarefied gas that is about ten million degrees, whereas this giant nebula requires gas thousands of times denser and colder.\"\n\"Extremely rare events have the power to overturn long-standing theories,\" says Hennawi. As such, the discovery of the first quadruple quasar may force cosmologists to rethink their models of quasar evolution and the formation of the most massive structures in the universe.\nThe results described here will be published as Hennawi et al., \"Quasar Quartet Embedded in Giant Nebulae Reveals Rare Massive Structure in Distant Universe\" in the May 15, 2015 edition of the journal Science.\nMore information, including a copy of the paper, can be found online at the Science press package at http://www.eurekalert.org/jrnls/sci. You will need your EurekAlert user ID and password to access this information.\nThe members of the group are Joseph F. Hennawi (Max Planck Institute for Astronomy), J. Xavier Prochaska (University of California at Santa Cruz), Sebastiano Cantalupo (University of California at Santa Cruz; ETH Zurich) and Fabrizio Arrigoni-Battaia (Max Planck Institute for Astronomy).\nThe data presented herein were obtained at the W.M. Keck Observatory, which is operated as a scientific partnership among the California Institute of Technology, the University of California and the National Aeronautics and Space Administration. The Observatory was made possible by the generous financial support of the W.M. Keck Foundation.\nThe authors wish to recognize and acknowledge the very significant cultural role and reverence that the summit of Maunakea has always had within the indigenous Hawaiian community. We are most fortunate to have the opportunity to conduct observations from this mountain.\nWhat is new / unusual / interesting about the discovery?\nFirst, the extremely low probability of a discovery like this occurring by chance. Even close pairs of quasars are very rare: Out of the nearly 500,000 quasars that astronomers have cataloged to date, only about a hundred such binary quasars are known. It came as a big surprise in 2007, when a team of American and Swiss astronomers announced the discovery of the first triple quasar. But now the newly discovered quadruple quasar by Hennawi and collaborators (cf. “How was the quadruple quasar discovered?”, below) dramatically ups the ante, since the probability of finding such an object by chance is estimated to be one in ten million.\nSuch extremely low odds forced the scientists to consider that they are perhaps not dealing with an incredibly unlikely chance discovery, but rather that some physical process makes quasars much more likely to occur in specific environments, making the odds more favorable. This is where the unusual combination of properties for this region of space comes into play. The quasar quartet is embedded in an exceptionally bright and large emission nebula, and at the same time, resides in a massive proto-cluster of galaxies (as mentioned in the main text, our images show this region at a time when the universe was less than a third its current age).\nThis combination could be the key to explaining why the unusual quadruple quasar was discovered – it may be that quasar episodes are more likely to be triggered in such an unusual environment, which is rich in both gas and galaxies, as the researchers speculate. But the combination also poses new questions: Given our current understanding of the formation of such massive structures, giant emission nebulae and proto-clusters are not expected to occupy the same regions of space.\nWhat are quasars, and why are they so rare?\nQuasars constitute a brief phase of galaxy evolution, powered by the infall of matter onto a supermassive black hole at the center of a galaxy. During this phase, they are the most luminous objects in the Universe, shining hundreds of times brighter than their host galaxies, which themselves contain up to hundreds of billions of stars. Astronomers believe that every galaxy has a supermassive black hole embedded in its center, with typical masses between a few million and a few billion times the mass of our Sun. As matter swirls around these supermassive black holes, it travels at velocities near the speed of light, and is heated to temperatures of a million degrees, emitting copious amounts of light before being inevitably swallowed by the black hole.\nThe peak of quasar activity in galaxies occurred when the Universe was about one fifth of its current age, whereas today all massive galaxies are observed to have supermassive black holes at their centers that are dormant, which is to say that there is no significant inflow of matter onto them. However, in order to reach their present masses, these black holes must have swallowed enormous amounts of matter in the past, and current models link this growth to the galaxies' quasar episodes. The physical processes that determine when and why supermassive black holes shine as quasars are poorly understood, but it probably has to do with the supply of fuel: in order to ignite a quasar, a large amount of gas must find its way deep into the core of a galaxy, sufficiently close to experience the gravitational pull of the black hole.\nWhile all supermassive black holes in massive galaxies underwent a quasar phase at some point in their evolution, this phase lasts only around ten million years, a thousand times shorter than the much longer ages of galaxies (about ten billion years and counting). Thus when we observe a quasar, we are catching a galaxy during a very brief period in its life, which explains why quasars are so rare on the sky, and hence typically separated by hundreds of millions of light years from one another.\nHow was the quadruple quasar discovered?\nHennawi and his colleagues were searching for quasars surrounded by so-called Lyman-α (pronounced “Lyman-alpha”) nebulae. If a quasar is surrounded by a large reservoir of cool hydrogen gas, the intense radiation emitted by the quasar can act like a ‘cosmic flashlight’, illuminating gas in its neighborhood and thereby revealing its structure. Under the quasar flashlight’s intense glare, the hydrogen gas emits light via the same mechanism at work in an ordinary fluorescent lamp, namely because it is being constantly bombarded with energy. In the case of ordinary lamps this energy is provided by an electrical current, whereas in Lyman-α nebulae the fluorescence is powered by energy from the quasar radiation (cf. MPIA Science Release 1/2014).\nIn their search for new Lyman-α nebulae, the researchers visually examined the spectra of 29 quasars to look for signatures of diffuse extended emission characteristic of fluorescing gas. One of their candidates, with the catalogue number SDSSJ0841+3921, appeared promising, and was then subjected to detailed observations using the LRIS imaging spectrometer at the 10m Keck Telescope on the summit of Maunakea in Hawaii. The object was observed with Keck/LRIS for 3 hours in late 2012, using a custom-built narrow-band filter that was tuned to capture only the light emitted by cool hydrogen gas (i.e. using a Lyman-α filter customized for the objects particular redshift).\nThese observations revealed one of the largest and brightest Lyman-α nebulae known to astronomy. The object is so distant that its light has taken nearly 10.5 billion years to reach us (cosmological redshift z = 2.041). The nebula has an extent of one million light-years across (310 kpc, corresponding to an angular size of 37 arcseconds). In the process of examining these images, the astronomers realized that there was not just one quasar, but four of them embedded in the nebula in one large physical structure. Examination of the four quasar spectra confirmed that these were indeed four distinct quasars (rather than multiple images of a single quasar; a phenomenon that can occur through gravitational lensing, when light is bent by the gravity of a massive object in the foreground). After their surprising find, the astronomers began referring to the giant Lyman-α nebula as the \"Jackpot nebula\".\nWhat is a proto-cluster?\nThe largest gravitationally bound structures in the present-day universe are not individual galaxies, but rather huge agglomerations of up to a thousand galaxies, known as galaxy clusters, which extend several millions of light years across. In our current picture of structure formation, a cluster of galaxies continuously grows over cosmic time as more matter and galaxies collapse onto it due to its attractive gravitational force. Proto-cluster is the name given to the ancient progenitors of present-day clusters. Astronomers can directly observe such proto-clusters if they look sufficiently far into the distance - after all, in astronomy, the further you look into space, the further you look into the past.\nFor example, the light from the proto-cluster discovered around the quadruple quasar took 10.5 billion years to reach Earth (cosmological redshift z =2.041), and thus provides a view of what clusters of galaxies looked like just 4 billion years after the big bang. The proto-cluster has a size of several hundred thousand-light years, and within this region there are hundreds of times more galaxies than expected at a typical location in the distant universe." ]
[ "<urn:uuid:ee37cd0b-e748-4d1f-a43e-fc1f9ffbabb8>" ]
[ "CC-MAIN-2020-05" ]
[ "http://www.mpia.de/news/science/2015-06-quadruple_quasar" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251779833.86/warc/CC-MAIN-20200128153713-20200128183713-00407.warc.gz" ]
[ "en" ]
[ 0.9400331974029541 ]
[ 2847 ]
[ 3.640625 ]
[ 4 ]
[ "Depression is not something that affects only adults. Increasingly more and more children and teenagers are becoming victims of depression.\nAlthough people often say that childhood is the happiest time of one's life, this hackneyed statement is not necessarily true. Yes, we didn't have many responsibilities when we were children, but we didn't have much freedom either. We may not have had job or financial worries, but how many of us stayed up nights worrying about our grades? How many of us had nightmares that we had failed in our exams? How many of us were teased at school? How many of us worried about peer acceptance or did things we didn't really want to because of peer pressure? Yes, childhood is great, as is every other stage in life, but it is certainly not worry-free! We all had our share of fights with friends, our share of sadness and shed tears more often than we can remember. No one, no matter how old, how rich or how successful, is immune to sadness. Everybody hurts. And for this reason, everyone is susceptible to depression.\nNot many people are aware that something like childhood depression even exists, since everyone assumes that children have nothing to worry about. This is a pity, considering that there is so much a parent can do to ensure a happier childhood for their child.\nIn addition, depression in children is different from depression in adults, which is why it often goes unnoticed. And then when a seemingly normal teenager takes his life, his parents are devastated and wonder if they could have done anything to prevent the suicide.\nAlthough suicides are not very common, children increasingly suffer from mild depression. So although they are not depressed enough to take their lives, they are certainly not happy.\nA number of reasons can cause depression. There could be a trigger, such as loss of a parent or sibling, there could be a history of depression in the family, or it could manifest from other events. Since depression has numerous, unidentifiable causes, it is more important to concentrate on identifying depression and getting it treated.\nSome symptoms include:\nDifficulty in sleeping\nAnger, temper tantrums, rage\nLoss of interest in activities usually enjoyed\nMany of these symptoms are common in many children. What you need to look out for is if any of these symptoms are a recent occurrence. In fact, any unexplained change in your child's behavior is something you need to look into. Your child's depression may last for a short while and go away with time, but it would be best if you could work your child through this period and give him your support.\nThe first thing you should do is to have a talk with your child. Make sure you are a friend to your child, so if he has a problem he can come and confide in you. Don't be a parent your child is scared of - be a parent your child finds comfort in.\nAfter having a talk with your child, if you feel the problem runs deeper, take him to the school psychologist for guidance. Your child may speak more freely with the school psychologist than with you. Let your child know that the conversations he has with the psychologist are completely confidential. The psychologist in turn will guide you on how to best deal with your child, without revealing the conversations." ]
[ "<urn:uuid:f3a33ab2-68d4-4011-b04d-2dc348fe174e>" ]
[ "CC-MAIN-2020-05" ]
[ "https://www.indiaparenting.com/raising-children/125_336/depression-in-children.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250593295.11/warc/CC-MAIN-20200118164132-20200118192132-00189.warc.gz" ]
[ "en" ]
[ 0.9844270944595337 ]
[ 669 ]
[ 2.8125 ]
[ 3 ]
[ "For workers who have to dig trenches or work inside of them on the job, a collapse is one of their biggest concerns. It can happen in a split-second, and workers can be seriously hurt or killed as they’re covered with rock, dirt and debris.\nHow can you keep this from happening? Below are a few tips that can help:\n- Never put any heavy machinery near the trench.\n- Never keep the parts and materials needed for the job right on the edge, even if it seems convenient. They should always get stored at least two feet back, and crews should move them entirely out of the worksite when it gets too cluttered and cramped.\n- A worker who is not actively working on a trench should never stand on the edge of it, putting other workers at risk.\n- After every single storm, even if it only rains a little, the trench needs to be inspected to make sure it is safe before entering.\n- Did you know that the second-most leading reason for fatalities is oxygen deprivation? Make sure that every deep trench has air tests carried out on a regular basis. A “deep” trench is anything that goes deeper than four feet.\n- When moving dirt and other materials out of the trench, keep all piles a minimum of two feet from the edge.\n- Be wary of outside forces. For instance, if heavy machinery is being used somewhere else on the site, the vibrations can lead to a trench collapse.\nHave you been injured when a trench caved in on a job? Make sure that you know all of your rights to compensation after the fact in order to protect your family and your future as you recover." ]
[ "<urn:uuid:9b1dd010-02a3-47a5-a0a4-7f72a6c36885>" ]
[ "CC-MAIN-2020-05" ]
[ "https://www.workcompmodesto.com/blog/2018/12/critical-tips-to-prevent-a-trench-collapse/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251737572.61/warc/CC-MAIN-20200127235617-20200128025617-00196.warc.gz" ]
[ "en" ]
[ 0.9622333645820618 ]
[ 344 ]
[ 2.6875 ]
[ 3 ]
[ "A cooling water tank is a container used to store water for cooling purposes, typically in industrial or commercial applications. The water in the tank is used to cool equipment, machinery, or processes that generate heat, such as engines, generators, turbines, or chemical reactors. The water is circulated through the cooling system, absorbing heat from the equipment and returning to the tank, where it is cooled. The cooling water tank may be equipped with a cooling system, such as a refrigeration unit, a cooling tower, or a heat exchanger, to maintain the temperature of the water within a specific range.\nTypes of Cooling Water Tanks\nThere are several different types of cooling water tanks, including:\n- Open cooling towers: Open cooling towers are large, vertical structures that use evaporation and airflow to cool the water. They are commonly used in large industrial cooling systems, such as those in power plants or chemical plants.\n- Closed-loop cooling systems: Closed-loop cooling systems are self-contained cooling systems that use a heat exchanger to transfer heat from the water to a cooling fluid, such as a refrigerant. These systems are typically used in smaller cooling applications, such as air conditioning systems.\n- Cooling ponds: Cooling ponds are large, man-made, or natural bodies of water that are used to cool water from industrial processes. The water from the industrial processes is pumped into the pond, where it is cooled by the surrounding air and water.\n- Evaporative condensers: Evaporative condensers are similar to open cooling towers, but use a fan to blow air over a coil containing the hot water, causing the water to evaporate and cool.\n- Cooling jackets: Cooling jackets are metal jackets that are fitted around pipes or other equipment to cool the water or other coolant as it flows through the system. They are often used in small cooling applications, such as laboratory equipment or process machinery.\nWorking on Cooling Towers\nA cooling tower is a large structure that is used to cool hot water from industrial processes by removing heat through evaporation. The basic working principle of a cooling tower is as follows:\n- Hot water from the industrial process is pumped into the top of the cooling tower.\n- The hot water is then distributed over a heat-transfer surface, such as a series of plastic fill packs, where it comes into contact with air that is being forced upward through the tower by a fan.\n- As the hot water comes into contact with the air, some of the water evaporates, taking heat with it. The cooled water then falls to the bottom of the tower, where it is collected and returned to the industrial process.\n- The air that has been in contact with the hot water rises and exits the top of the tower, carrying the evaporated water with it as water vapor.\n- The water vapor is then dispersed into the atmosphere, removing heat from the system and cooling the remaining water.\nThe cooling tower is designed to maximize the exposure of the hot water to the air and increase the surface area of the water-air interface to maximize the amount of heat removed from the system. The efficiency of the cooling tower is influenced by several factors, including the temperature of the incoming water, the air temperature and humidity, and the rate of airflow through the tower." ]
[ "<urn:uuid:4ddcd5d1-7525-4482-8cd5-5293f5d46010>" ]
[ "CC-MAIN-2023-14" ]
[ "https://fieryfurnacesforum.com/types-and-working-of-cooling-tower/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945333.53/warc/CC-MAIN-20230325130029-20230325160029-00379.warc.gz" ]
[ "en" ]
[ 0.954569399356842 ]
[ 680 ]
[ 3.359375 ]
[ 3 ]
[ "Mary Putnam Jacobi was an esteemed medical practitioner and teacher, a harsh critic of the exclusion of women from the professions, and a social reformer dedicated to the expansion of educational opportunities for women. She was also a well-respected scientist, supporting her arguments for the rights of women with the scientific proofs of her time.\nMary Corinna Putnam was born in 1842, in London, England to American parents, George Palmer Putnam and Victorine Haven Putnam. Her parents returned to America in 1848. Mary spent her childhood and adolescence in New York, and was first educated at home by her mother, later at a private school in Yonkers, and then at a public school in Manhattan. At age 17 Mary published an essay in Atlantic Monthly (April 1860). Throughout her life she penned both political essays and fiction, but is best known for her career in medicine, and over 120 scientific articles and 9 books.\nMary Putnam studied at the New York College of Pharmacy in 1861, and received her M.D. from the Female (later Woman's) Medical College of Pennsylvania in 1864. She convinced the faculty to allow her to sit her examinations early, and in protest over the special allowances made for her, Dean Edwin Fussell resigned after her graduation. Ann Preston, who had argued for Putnam's early examination, took over his post as America's first woman dean of a medical school.\nPutnam got her first chance to practice medicine from a fellow graduate, Marie Zakrzewska, who founded the New England Hospital for Women and Children in Boston in 1862. In 1866 Putnam moved to Paris to further her medical training, and supported co-education for men and women, arguing that women's medical schools could not provide the same training and clinical practice as at established universities affiliated with large hospitals.\nSoon she returned to New York and organized the Association for the Advancement of the Medical Education of Women (later the Women's Medical Association of New York City) in 1872, serving as its president from 1874 to 1903. During the same period, she lectured at the Women's Medical College of the New York Infirmary for Women and Children. As lecturer on materia medica from 1871, and professor of materia medica and therapeutics from 1873 to 1889, she helped raise educational standards.\nPutnam married Dr. Abraham Jacobi in 1873. Later called the \"father of American pediatrics,\" he was instrumental in negotiating her admittance to the medical societies of New York. The Jacobis had three children, though their first daughter died at birth and their only son died at age seven.\nIn 1876, Dr. Mary Jacobi's essay, \"The Question of Rest for Women during Menstruation,\" won the Boylston Prize at Harvard University. In this influential paper she refuted the supposed physical limitations of women, in response to Dr. Edward H. Clarke's publication Sex in Education; or, A Fair Chance for the Girls (1873), which questioned the expanded role of women in society and the professions. Dr. Jacobi provided tables, statistics, and sphygmographic tracings of pulse rate, force, and variations to illustrate the stability of a woman's health, strength, and agility throughout her monthly cycle. Both her paper and her example offered irrefutable proof of the accuracy of her position.\nAs an attending and consulting physician, Mary Jacobi opened a children's ward at the New York Infirmary in 1886. She became a member of the New York Pathological Society and the New York Academy of Medicine, memberships that were vital to securing jobs and colleagues' respect. Dr. Jacobi's admission to the Academy of Medicine, earned by a majority of one vote, made her the society's first female member.\nBefore her death at age 63, Jacobi wrote a detailed account of her illness, \"Description of the Early Symptoms of the Meningeal Tumor Compressing the Cerebellum. From Which the Writer Died. Written by Herself.\" Many prominent physicians, including William Osler and Emily Blackwell, honored her at her funeral." ]
[ "<urn:uuid:fd68df6c-6509-4f61-9b93-c25e581b5ff0>" ]
[ "CC-MAIN-2023-14" ]
[ "https://cfmedicine.nlm.nih.gov/physicians/biography_163.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945183.40/warc/CC-MAIN-20230323194025-20230323224025-00379.warc.gz" ]
[ "en" ]
[ 0.9750620722770691 ]
[ 847 ]
[ 3.015625 ]
[ 3 ]
[ "Jennie Grossinger Day!\nJune 16, 1968\nJennie Grossinger, who helped make the Catskills resort Grossinger's into the most famous retreat of its kind, was born in Austria on June 16, 1892. At age eight, she immigrated with her family to New York, where she struggled to learn English and succeed in school. At thirteen, she left school to work in a garment factory, providing her family with much-needed income. In 1914, her father bought a piece of land in the Catskills, intending to leave factory work and return to farming. It soon became clear that the rocky soil would never support a prosperous farm, and Jennie suggested that the family take in boarders. The first year, the family charged $9 a week and cleared a net profit of $81. From that modest beginning, Grossinger's was born.\nAlthough the initial farmhouse lacked heat, electricity, and indoor plumbing, its other amenities helped to make it a success. Jennie Grossinger's mother, Malka, was a good kosher cook, and Jennie's warm personality was credited with making guests feel at home. In addition, Jennie's husband Harry (a cousin with the same last name), who had stayed in New York, was able to send guests their way. By 1919, the family had made enough money to sell the original farmhouse and buy a nearby hotel. Grossinger's thrived in the 1920s, becoming an opulent resort with tennis courts, a children's camp, crystal chandeliers, and an auditorium that featured world-class entertainers. It was in this decade that Grossinger's became a destination of choice for upwardly mobile East Coast Jews.\nAlthough the decade of the Great Depression brought hard times, Grossinger's managed to stay open. One innovative development was the establishment of a training camp for boxers. The boxers provided much-needed income, while Grossinger's provided a Jewish atmosphere and facilities. In the years after the Second World War, Grossinger's fame spread from Jews to non-Jews. While maintaining its kosher kitchen, the resort began to attract a non-Jewish clientele. Part of this was due to the successful national distribution and marketing of \"Grossinger's Rye,\" accompanied by Jennie Grossinger's image and signature. By 1970, non-Jews were estimated to make up one third of the 150,000 annual guests. In the post-war years, such prominent figures as Eleanor Roosevelt, Robert Kennedy, and Nelson Rockefeller visited the resort.\nIn addition to providing what the New York Times called \"the tone of the place\" at Grossinger's, Jennie Grossinger was active in a variety of philanthropic endeavors. She endowed a clinic and a convalescent home in Israel. In 1955, she was recognized by the Jewish War Veterans for \"devoted service to the Jewish community and to the promotion of interfaith understanding.\" The same year, she was honored by the South Hudson, NJ, Women's Division of the American Jewish Congress \"for her humanitarianism and her contributions to the happiness and welfare of others.\" In 1968, Governor Nelson Rockefeller designated June 16, Grossinger's birthday, as Jennie Grossinger Day in New York State. It was the first time such an honor had ever been bestowed on a living woman.\nAlthough she turned over the administration of Grossinger's to her children in 1964, Jennie Grossinger remained the soul of the resort. According to her obituary, she fostered \"an atmosphere that combined urgent family solicitude for guests with an elegance that gave to many an opulent feeling they never enjoyed at home.\" She continued to live in a cottage on the resort property until her death on November 20, 1972. In 1985, Grossinger's was sold to a group of investors, passing permanently out of the family hands. The resort has been closed ever since, as it has passed from one investor to another, none of which has succeeded with renovation plans. Only the Grossinger's golf course remains open to the public.\nTo learn more about Jennie Grossinger, visit Jewish Women: A Comprehensive Historical Encyclopedia.\nSee also: Advertising and Consumer Culture in the United States; \"Some #jwapedia favorites,\" Jewesses with Attitude.\nSources: Jewish Women in America: An Historical Encyclopedia, pp. 556-558; New York Times, March 16, 1955, May 19, 1955, November 21, 1972, October 19, 1985; www.brown.edu/Research/Catskills_Institute/hotelnews/grossinger4.html; www.brown.edu/Research/Catskills_Institute/hotelnews/grossinger2.html; Joel Pomerantz, Jennie and the Story of Grossinger's (New York, 1970); Antler, Joyce, You Never Call! You Never Write!: A History of the Jewish Mother (New York, 2007), pp. 116–121; Gale’s Encyclopedia of Biography." ]
[ "<urn:uuid:8c566036-00ac-4763-95bd-4373010d2f55>" ]
[ "CC-MAIN-2013-48" ]
[ "http://jwa.org/thisweek/jun/16/1968/jennie-grossinger" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052593/warc/CC-MAIN-20131204131732-00079-ip-10-33-133-15.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9677214622497559 ]
[ 1030 ]
[ 3.015625 ]
[ 3 ]
[ "Colostrum – Nature’s Perfect Food\nCOLOSTRUM – NATURE’S PERFECT FOOD\nColostrum is nature’s first food, the pre-milk fluid a breast- feeding mother provides her newborn, to assist the baby’s healthy development.\nIt contains a number of immune components, including antibodies, growth factors, proteins, vitamins and minerals.\nIt has been discovered that because colostrum is non-species specific, humans may benefit from taking bovine colostrum long after birth – throughout childhood, adulthood and into their senior years.\nBut why should we take colostrum?\nStudies have highlighted the benefit of bovine colostrum to help support a healthy digestive system. Optimising absorption of vitamins and minerals from food and offering natural resistance against various pathogens that enter through the gut.\nSupport for a healthy immune system is one of colostrum’s biggest benefits. Ensuring the body is primed to resist a wide variety of bugs, ills and chills that we are often exposed to. Among the immune components in colostrum are antibodies called Immunoglobulins, Lactoferrin, Proline-rich Polypeptides (PRP’s), Cytokines and growth factors as well as proteins, vitamins and minerals.\nColostrum can help lower LDL cholesterol and reduce the risk of cardiovascular disease. Research has also shown that heart disease can involve immune sensitisation to cardiac antigens, i.e. the immune system may play a part in heart disease. The PRP’s found in colostrum may have a role in reversing heart disease.\nLactoferrin is a protein found in colostrum. A number of in-vitro and animal studies have found that lactoferrin from both human and cow supports healthy osteoblasts and normal bone formation. It is also thought that lactoferrin may maintain healthy oestrogenic activity which has a protective effect on bone mass especially in women.\nColostrum supports gut health, healthy immunity and influences the health of our stem cells – all things that will contribute to healthy ageing and longevity.\nHEALING & REPAIR\nColostrum can support your body’s healing and repair processes: mucosal cell lining, heart tissue, blood vessels. It is great for sports people of all levels. Often during intense exercise muscles suffer micro tears as part of the muscle building process. More serious tears or strains can occur to the muscles, tendonsand ligaments with overuse or incorrect training. Colostrum supports the natural, healthy repair of tissues.\nColostrum is nature’s perfect food, packed with nourishment – immune tonics, growth factors and a unique balance of vitamins and minerals.\nAlpha Lipid Lifeline is a blended food powdered drink with high quality Colostrum powder and lactosbacillus acidophilus and bifidobacterium.\nTaken daily it is one of the best things you can do to improve and support you and your family’s health.\nClick HERE to view the full range of Colostrum products." ]
[ "<urn:uuid:22e40dba-a2ab-4858-ae28-81b927d6f53a>" ]
[ "CC-MAIN-2020-10" ]
[ "https://healthwithnature.com.au/uncategorised/colostrum-natures-perfect-food/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146562.94/warc/CC-MAIN-20200226211749-20200227001749-00128.warc.gz" ]
[ "en" ]
[ 0.9224641919136047 ]
[ 659 ]
[ 2.515625 ]
[ 3 ]
[ "While a Bollywood movie titled “Mohenjo Daro” is on its way of being released in cinemas worldwide on the 12th of this August, the first ever novelist penning the fictitious story of ancient culture and civilization of Indus\npasses away. However, readers may not confuse him with the story writer of this film yet he was the first to write on this theme.\nSindhi drama writer and novelist Ali Muhammad alias Ali Baba passed away on Monday in Karachi. The 76-year-old was suffering from multiple diseases and died due to the brain hemorrhage.\nAli Baba was born in Kotri in 1940 and his father, Muhammad Yousuf Baloch, was a clerk in Pakistan Railways. After completing his secondary education, Ali Baba also joined the railways’ department as a clerk and later worked as an assistant manager at a textile mill.\nHe started writing short stories in 1965 and gained popularity after his dramas were telecast on radio and television.\nThe deceased political and Sindhi scholar Pir Hisamuddin Rashdi called him the ‘narrator of Sindh’s history’ in one of his books. Ali Baba traveled the entire province and depicted the essence of Sindhi culture in his dramas. His short story, titled Dharti Dhikana [Expelled from the soil], which narrates the plight of the mass migration [of Muslims and Hindus] after the partition of the Subcontinent in 1947, is one of most the popular works in Sindhi literature, along with his novel, Mohenjo Daro.\nHis story Kajla Tajla Manhu [the colored men] takes the reader to the ancient times when the city of Moen Jo Daro was flourishing along with its civilization.\nOne of his most famous dramas, titled Dungi Manjh Darya [Sailing boat in the river], got international fame and in 1981 won the award for the third best drama during the annual drama festival in Munich, Germany.\nHis writing style, selection of themes and plots was unique among his contemporary writers. His stories and dramas were mainly based on the economic and social conditions of Sindh and Sindhi people in which he focused the conditions of illiteracy and poverty of Sindhi folks. His writings were often considered as anti-status quo or against the ruling class, that’s why he was ignored by governments and died in the conditions of the social insanity, poverty, and ignorance. He remained close to veteran Sindhi scholar and politician, the godfather of Sindhi nationalism G.M Sayed and a strong supporter of Sindhi freedom movement till his last breaths and refused the efforts of aid by the Pakistani politicians.\nThe funeral prayers of the deceased writer were held in Yousuf Baloch village near Kotri Railway Station and he was laid to rest in his family graveyard. Sindhi writers, civil society activists, nationalists attended his funeral.\nMourning the loss\nSindhi nationalists, civil society activists, writers, journalists have mourned his death, criticizing the apathy and insanity of the state system of the country which deprived him of his true social status.\nJSMM chairman Shafi Muhammad Burfat passed condolences to his family and termed him “a man of impeccable character, whose loss has left a big void on the literary landscape of Sindh.”\nTaj Joyo, a present day scholar, writer and researcher, supervisor of Sindhiana Encyclopedia termed him as a “spiritual representative of Sindhi identity” and ranks him third in the line of Amar Jaleel and Naseem Kharl. “His demise is the big loss for Sindhi literature and history and is surely irreplaceable,” he added.\nThe Sindhi Adabi Sangat [Sindhi Literary Fraternity], an association of Sindhi writers, novelists, poets, and dramatists, has also announced three days of mourning. “Sindh has been deprived of a peerless playwright,” said the association’s secretary Dr. Mushtaq Phul, adding that “He promoted Sindhi literature all through his lives,” Phul informed that all the offices of Sindhi Adabi Sangat will mourn his death by organizing condolence references for the deceased writer for three days." ]
[ "<urn:uuid:6caf9e1e-93e9-463f-85b6-56e2a3c103c0>" ]
[ "CC-MAIN-2017-30" ]
[ "http://industribune.net/blog/news/2224" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424931.1/warc/CC-MAIN-20170724222306-20170725002306-00248.warc.gz" ]
[ "en" ]
[ 0.9821385741233826 ]
[ 892 ]
[ 2.671875 ]
[ 3 ]
[ "Without simply repeating the lecture notes explain why Versailles Palace and Gardens were built, and the role they played during the rule of King Louis XIV\nThe Palace and Gardens of Versailles was an ordinary hunting lodge until Louis XIV decided to transform it into a sprawling, extravagant location. The radical improvement of Versailles continued throughout the life of The Sun King. It was originally intended to be his private hideaway, but its purpose evolved while it was being built. Ironically, it was first intended as a place for recreation, to host ladies in waiting and an escape from government. It includes a theatre, concert hall and pleasure grounds. It eventually became home to the royal court before gradually becoming the official residence of French royal family, court and government. The King insisted that nobles be present at court so he could make sure they stayed out of treacherous activity and remained faithful to his undisputed power. He wanted to keep watch over noblemen and control all facets of noble life.\nThe ethereal splendor Versailles served to affirm his divine kingship. The fact that he was responsible for creating a place so vast and unique was to show his mystic that could not be attained by any other. It signifies the widespread respect and high regard people had for him and establishes his power. The opulence of Versailles impressed the viewer and led people to admire his lavish material possessions. He wanted to show off the wealth, power and creative genius of France and make it known as the best country in Europe. The purpose of Versailles was to show the elevated, advanced status of France in relation to other nations.\nLouis XIV also planned the garden to be a secure place for him. By being away from Paris, he was removed from any danger or civil uprising that was going on in the city. The fact that nobles had to be present at Versailles thwarted any opportunity to establish other powers that could pose a problem for the king. Thus, he had confined the nobles and was protected from another Frond." ]
[ "<urn:uuid:476a9a17-daed-4133-b59f-1f0861e2480d>" ]
[ "CC-MAIN-2017-26" ]
[ "https://dreamersingardens.wordpress.com/2015/03/25/blog-post-5/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320489.26/warc/CC-MAIN-20170625101427-20170625121427-00606.warc.gz" ]
[ "en" ]
[ 0.9883717894554138 ]
[ 406 ]
[ 3.6875 ]
[ 4 ]
[ "Varikózus lézeres művelet történik hogyan erekben\nThis disease causes. But, they can be uncomfortable and can lead to more serious problems. Varicose veins are not considered a serious medical condition. Most varicose veins of the legs are never treated. Varicose veins are dilated tortuous veins on or near the surface of the legs. Superficial venous insufficiency is a medical condition that if left untreated can lead to further health problems.\nThe mainstay of treatment for those. And, because they may. Varicose veins are recognized as the blue, enlarged veins seen near the skin surface. Varicose veins can be a cosmetic concern or can cause aching pain and discomfort.\nWhat are varicose veins? These superficial veins work with deeper veins in aiding blood flow. Trust the expert doctors at University Surgical Vascular to treat varicose. Egészségügyi üdülőhely szanatórium varicose veins.\nVaricose veins are not considered a serious medical condition." ]
[ "<urn:uuid:d523b360-330e-41de-80ac-7c39d0460fc7>" ]
[ "CC-MAIN-2020-05" ]
[ "http://arymivevo.cf/fe2c690071.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251672537.90/warc/CC-MAIN-20200125131641-20200125160641-00291.warc.gz" ]
[ "en" ]
[ 0.8908969163894653 ]
[ 237 ]
[ 2.9375 ]
[ 3 ]
[ "One of the things that couples and family members may struggle with in therapy is the inability to understand that...\nFor instance, lets look at the color of the statement above (\"different is not wrong\"). One person may have grown up learning that the color above is aqua and another learned to call it turquoise. Is either person wrong? No, just different. Sure, we could potentially go on and on about the accuracy of the color, but in a healthy disagreement we are looking for understanding and acceptance (validation), not necessarily agreement, correct?\nSo when you're having a disagreement, apply this rule (\"Different is not wrong\") to your thinking before you seek negotiation. Look for how the other person reached that understanding. How did he/she reach that perspective. How did they arrive at that meaning. Respect that his/her experiences were not wrong, they were just different! Validate. Look for how you can work toward meeting both persons needs for understanding and acceptance, without expecting perspectives to match. Then look for give and take from both sides. If you expect agreement on your perspectives, you could be seeing green before the discussion is over.\nDr. John Gottman talks about how all couples have perpetual issues, but movement on those issues is what prevents gridlock. So sometimes the words can be turquoise and another they are aqua, or teal, or blue, or...expect conflict and offer movement.\nMary Bowles, MA, LMFT, RRT, MIAAN" ]
[ "<urn:uuid:dc4bd987-e949-4115-9e0d-28d1554e964c>" ]
[ "CC-MAIN-2020-05" ]
[ "https://www.mindwiseinstitute.com/blog/different-is-not-wrong" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250597230.18/warc/CC-MAIN-20200120023523-20200120051523-00477.warc.gz" ]
[ "en" ]
[ 0.964091956615448 ]
[ 307 ]
[ 2.53125 ]
[ 3 ]
[ "Moderator: Team Cub\n6 posts • Page 1 of 1\nM.J. Garreau Ledger. Great Depression. Worst years of the Depression (1933-1934)\nReading my Grandfather’s ledger brought back memories. I once asked my Grandfather who he was going to vote for in a pending election. Grandpa said that he would never vote for a Republican. I asked why and Grandpa said that the Army came out and shot pigs in 1934. Thinking back Grandpa may have been placing the blame for the Depression on the previous President, Republican Hebert Hoover.\nGrandpa was a tenant farmer on small acreages, usually 20 to 30 acres, until he purchased an 80 acre farm in Guthrie County, Iowa. Impact of low prices for crops and livestock brought on by the Great Depression must have had a severe economic impact on his family. In addition to the Depression greatly reduced product prices there was a sever drought in Iowa during the Dust Bowl time frame; 1930 to 1940. Drought reduced crop or forage production. What I think happened is that it was no longer cost effective to feed out livestock for sale or slaughter. The selling price didn’t cover the expenses.\n1933/34 Hog and Corn Program. Ledger:\nGrandpa and one other individual counted hogs on neighboring farms.\n25 Jan 1934 A.D. Sylvester had 71 hogs.\n25 Jan 1934 Glenn Day had 161 hogs.\n2 Feb 1934 Chas. Brown had 59 hogs.\n2 Feb 1934 Chas. Murphy had 113 hogs.\n3 Feb 1934 Albert Bell had 174 hogs.\n5 Feb 1934. M.J. Garreau had 26 hogs on place including 22 fall pigs. Counters were Chas. Murphy and Chas. Brown.\nComparison of early/pre- Depression and middle Depression prices:\n19 Jan 1929 sold 4 sows and 1 barrow for $142.98\n6 Jul 1929 sold 1 sow for $26.75\n21 Jan 1930 sold 2 sows and 12 spring pigs to Pankeys for $278.45\n23 Apr 1930 sold cow for $65.00\nSold to stock buyers for packing plants: 1933, appears to be a herd reduction.\n21 Jan 1933. Sold 22 hogs 188 ½ lbs. $101.55\n17 Feb 1933. Sold 20 hogs, 208 lbs. $115.51\n17 Feb 1933. Sold 3 cows and 14 head of young stock (11 heifers and 3 steers) for $180-.\n21 Mar 1933. Sold 3 sows $53.35.\n1 Sep 1933. Sold 1 sow $10.50.\n10 Jan 1934. Sold 1 hog $8.52.\n6 Jul 1934. Sold 9 hogs. 2600 lbs. 8 hogs at 4 cents a lb and 1 at 3.5 cent per lb. $120.43.\nFrom my earliest memories grandparents sold cream and eggs. The money paid for most of the daily living expenses.\nMarch 1928 Cream sold for average price of 47 cents a pound of butter fat.\nJune 1932, Cream sold for an average price of 14 cents a pound of butter fat.\nNo cream account for 1933. 1934 only a statement: 1236 lbs. butterfat. Eggs 500 dozen\nMarch 1928 eggs sold for an average price of 23 cents a dozen.\nMay 1930 eggs sold for an average price of 16 cents a dozen.\nJune 1930 sold 5 dozen eggs for 16 cents a dozen.\nCattle: Guessing herd reduction.\n2 Jan 1934. Butchered 1 calf\n3 Jan 1934. Sold 3 calves. $15-\n26 Jan 1934. Sold 2 steers. $42.50\n6 Mar 1934. Sold 2 hind quarters. $8.00\n10 Mar 1934. Sold 2 hides. $1.64\n5 Mar 1934. Butchered 1 calf.\n15 Mar 1934. Butchered 1 calf.\n15 Mar 1934. Sold 1 hide. $ .90.\n15 Mar 1934. Sold 1 hind quarter. $3.68\nCattle activity start again in Dec 1937.\nI have an excuse. CRS.\nMost interesting! Really hit bottom didn't it? Thanks for taking the time to share.\nGuiena, 1951 Farmall Cub; Jumping Willy, 1949 Farmall Cub.\nthey were bringing a high of $0.78 a lb Wednesday.\nIN GOD WE TRUST\nAll others pay cash\nPower corrupts; absolute power corrupts absolutely byJohn Emerich Edward Dalberg\nThanks for these posts, Eugene.\n\"The probability of life originating from accident is comparable to the probability of the unabridged dictionary resulting from an explosion in a printing shop.\" Edwin Conklin, biologist\nThe depression hit everyone hard. My greatgrandfather never recovered from the depression, we were able to keep the farm but only after selling of pieces at a time. Six generations later it is still in the family by less than half of the 250 acres we once had.\nThanks for sharing.\n22 sickle bar mower x2\n23A tandem disc harrow\n144 cultivator (#53 & #97 spring tooth)\n154 leveling and grader blade\n189 moldboard plow 2-way\n193 moldboard plow x2\nspring tooth harrows\nDavid Bradley planter (modded for Cub)\n6 posts • Page 1 of 1\nWho is online\nUsers browsing this forum: No registered users and 1 guest" ]
[ "<urn:uuid:bb4ae6ac-2302-49fa-a294-0bec88671897>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.farmallcub.com/phpBB2/viewtopic.php?t=68336" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00010-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9126355051994324 ]
[ 1144 ]
[ 2.6875 ]
[ 3 ]
[ "Light in darkness – this is the imagery that constantly recurs in Romeo and Juliet. \"O, she doth teach the torches to burn bright,\" Romeo says when he first sees Juliet. \"It seems she hangs upon the cheek of night / Like a rich jewel in an Ethiope's ear\" (1.5.1). Variations on this imagery are repeated again and again – images of Juliet as a sun rising in the darkness, of Juliet's eyes shining in the sky, images of Romeo's body cut out in little stars, of Romeo and Juliet's love as a bright furious lightning flash. At times, the image of a flash of light disappearing into the dusk seems to symbolize both the brilliant strength of Romeo and Juliet's love, as well as its transience. The imagery of light and darkness also picks up the play's emphasis on the contrasts between love and hate, passion and death." ]
[ "<urn:uuid:04ebd017-50ef-4d79-938a-d526d472909b>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.shmoop.com/romeo-and-juliet/light-darkness-symbol.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00039-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9528127312660217 ]
[ 184 ]
[ 3.4375 ]
[ 3 ]
[ "More than 500,000 children will close their eyes tonight as wards of the state in foster care. They are waiting for the security, stability and love of permanent families.\nFoster care was created as a short-term safety net for children in crisis, however, on average children will languish in care for more than two years. More than half the children leaving foster care will return home to their birth parents, and about 18 percent will leave foster care to adoptive families. For some, however, reunification with their parents or adoption is not an option.\nFor these children, a supported legal guardianship with a relative or another caring adult can be a way out of foster care to a safe, permanent family. Guardianship gives legal rights to a child’s caregiver so that he or she can take responsibility for a child’s safekeeping and make decisions about education and health needs. When it is necessary to remove a child from his or her family because of abuse or neglect, research shows foster placements with relatives are good for children. They are less likely to change schools and more likely to be placed with their other siblings.\nThere is growing evidence that subsidized guardianship programs help strengthen families and keep children safe and out of foster care. Results from federal demonstration waivers and statefunded subsidized guardianship programs show that providing relatives with financial support and services makes it possible for more children to leave foster care to the permanent care of family.\nGuardianship programs are not only good for children and families, they help relieve an overburdened child welfare system. When a child leaves foster care to live with a relative as a guardian, the case is closed. Fewer cases will free up more caseworkers and will also help relieve a clogged judicial system.\nUnfortunately, although federal child welfare funds can be used to pay monthly stipends to children whose relatives become foster parents or to support children with special needs adopted from foster care, no equivalent federal support exists for children to exit foster care through guardianship when reunification or adoption isn’t possible.\nTo address this shortcoming in federal policy, many states have developed their own subsidized guardianship programs to support children living with guardians. These programs vary in assistance levels and eligibility requirements.\nThe federal government should be a partner to the states in helping children leave foster care for safe, permanent families through guardianship. Although federal waivers have been granted in some states to allow federal child welfare funds to support guardianships, these are temporary waivers and the authority to grant new waivers has lapsed.\nIf federal support for guardianship existed, an estimated 15,000 children in long-term foster care placements with relatives could leave the system for good. This support would ensure that children entering foster care in the future do not spend one day longer than necessary in the system when a safe, loving relative is ready to care for them.\nMomentous change can come in tiny packages. Nanotechnologies have been hailed by many as the next industrial revolution, likely to affect everything from clothing and medical treatments to engineering. Although focused on the very small, nanotechnology—the ability to measure, manipulate and manufacture objects that are 1/100th to 1/100,000th the circumference of a human hair—offers immense promise. Whether used in cancer therapies, pollution-eating compounds or stain-resistant apparel, these atomic marvels are radically and rapidly changing the way we live. The National Science Foundation predicts that the global marketplace for goods and services using nanotechnologies will grow to $1 trillion by 2015 and employ 2 million workers.\n\"The Food and Drug Administration on Wednesday ordered farmers to limit the use of a type of antibiotics they give livestock because it could make people more resistant to a key antibiotic that can save lives, encouraging news for public health advocates who say such animal antibiotics are overused.\" More info\n\"For decades, factory farms have used antibiotics even in healthy animals to promote faster growth and prevent diseases that could sicken livestock held in confined quarters. But a firestorm has erupted over a federal proposal recommending antibiotics only when animals are actually sick.\" More info\nSharon Ladin, director of the Pew Health Group’s Antibiotics and Innovation Project, issued the following statement regarding the Generating Antibiotics Incentives Now (GAIN) Act (H.R. 2182)... More info\n\"On April 15, scientists reported that the meat bought at supermarkets is often contaminated with Staphylococcus aureas bacteria that are resistant to antibiotics used to fight human disease.\" More info" ]
[ "<urn:uuid:5168b093-302d-4169-972d-dc96b1281d42>" ]
[ "CC-MAIN-2013-20" ]
[ "http://www.pewhealth.org/reports-analysis/reports/strengthening-families-through-guardianship-85899368313" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00003-ip-10-60-113-184.ec2.internal.warc.gz" ]
[ "en" ]
[ 0.9507962465286255 ]
[ 930 ]
[ 2.765625 ]
[ 3 ]
[ "Before the Fulton Recovery System, There Was the Man Pick-Up Kit\nThe U.S. Army Air Forces used the contraption to snatch up downed pilots\nFor almost as long as combat aircraft have been around, engineers have looked for ways to quickly rescue downed pilots from dangerous situations. Thanks to movies like Thunderball and video games like Metal Gear Solid V, the Fulton Recovery System has become one of the best known, if extreme methods.\nBut before the Fulton system came onto the scene, the U.S. Army Air Forces developed a different arrangement for airplanes to snatch people right off the ground. In the early 1940s, the Air Technical Service Command at Wright Field in Ohio cooked up a so-called “man pick-up kit.”\nThe Army even published a manual on how to use it that came along with a particularly colorful introduction and appropriate illustrations.\nAn Arabian sailor named Sinbad started the idea. His mythological fortunes had placed him in a predicament. He was in a valley with a floor of diamonds but with walls so sheer he could not hope to climb them.\nHe noted, however, that Diamond Hunters on the cliffs above threw down pieces of meat which the eagles carried aloft to their nests. Then the hunters frightened the eagles away and collected the small diamonds which had adhered to the meat. Seeing this, the crafty Sinbad, after collecting a bagful of diamonds, tied a choice cut on his back, and a hungry eagle lugged him home.\nThe A.A.F. man pick-up kit takes the place of that meat. When you find yourself in a situation from which escape can only be negotiated from the air, this kit makes it possible for the old eagle, or a reasonable facsimile thereof, to pick you up whole, hale and hearty and whisk you to greener fields.\nIndependent researcher Michael Ravnitzky discovered the document and sent it to the now defunct website The Memory Hole. The more practical elements of the handbook outlined a system that the Army also used to grab unpowered cargo gliders after they had landed during combat.\nHaving survived a crash with the kit — or having received one from a plane circling overhead — a pilot on the ground could build a goal post-shaped contraption from sections of piping. The pilot would then don a special harness and attach a rope between the rig and the two upright sections.\nNext, a recovery plane would zoom in and snatch the line and attached pilot right off the ground. Once safely away, the crew just had to reel the dangling airman up into the plane.\nAt The Memory Hole, Ravnitzky offered more details from his own research.\nThis rescue device used a “trapeze” system invented in the 1930s to allow airplanes to snatch gliders off the ground, which itself was based on a system invented by a Pennsylvania dentist in the 1920s as a way to pick up parcels from the ground with an airplane. The dentist went on to start a company called All-American Aviation which won contracts to service mail stations along dangerous mountain routes using this method.\nThe first “volunteers” to test the device were sheep, picked up in July 1943. After a number of sheep trials were successfully completed, the first manned pickup occurred on September 5, 1943, when Lt. Alexis Doster was retrieved near Wright Field near Dayton, Ohio.\nAccording to Harry C. Conway, an engineer on the project and the third man to be picked up from the ground, the system was used in China and Burma toward the end of World War II, and later in Korea. (An air-droppable version of the system was also used by the British to extract operatives from occupied Europe during World War II.)\nHowever, a [Central Intelligence Agency] history says that the first operational use of the system came in February 1944, when a C-47 snagged a glider in a remote location in Burma and returned it to India.\nBy the 1950s, the CIA had gotten their first Fultons and quickly came to favor it over the older man pick-up kit, both seen in the video below. However, Conway continued to promote his system.\nWhile the CIA and Air Force commandos preferred the Fulton, the flying branch continued to use the older snatch method to retrieve film canisters dropped from early spy satellites — and grab spy drones after they had completed their missions.\nThe Air Force retired its Fulton gear in 1996. Today, the Pentagon relies on helicopters and special tilt-rotor aircraft – which fly like normal planes, but can take off and land like choppers – to get people out of harm’s way." ]
[ "<urn:uuid:36c1301c-000e-447d-a901-f494038c8322>" ]
[ "CC-MAIN-2017-30" ]
[ "http://warisboring.com/before-the-fulton-recovery-system-there-was-the-man-pick-up-kit/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424961.59/warc/CC-MAIN-20170725042318-20170725062318-00076.warc.gz" ]
[ "en" ]
[ 0.9707669019699097 ]
[ 963 ]
[ 3.046875 ]
[ 3 ]
[ "The Caucasus has acted a vital conduit between the Iranian plateau-Eastern Anatolia axis and Eastern Europe. The photo survey below illustrates the legacy of Iran’s ancient Zoroastrian religion and the Cult of Mithras in the Caucasus.\n[Click to Enlarge] The main fire altar at the Atash-kade (Zoroastrian Fire-Temple) of Baku in the Republic of Azerbaijan (known as Arran and the Khanates until 1918) (Picture Source: Panoramio). This site is now registered with UNESCO as a world heritage site.\n[Click to Enlarge] The Temple of Garni in Armenia. An example of Classical Armenian architecture bearing a Hellenic inspiration, this Temple was first ordered to be built in dedication to Mithras by Tiridates I in approximately 66 CE. The god Mithras in time became merged with the Sol Invictus (Unconquered Sun) of the Roman Empire (Picture Source: Skyscraper City).\n[Click to Enlarge] Remains of an “Atash-kade” (Zoroastrian fire-temple) undergoing repairs in Georgia. The cultural ties between Iran and the Caucasus stretch back for thousands of years (Picture courtesy of Dr. David Khoupenia with caption from Kaveh Farrokh’’s lectures at the University of British Columbia’s Continuing Studies Division – also presented at Stanford University’s WAIS 2006 Critical World Problems Conference Presentations on July 30-31, 2006). For more on the topic of Zoroastrian fire temples in Georgia see Payvand News of Iran: The Northernmost Zoroastrian Fire Temple in the World (in the Republic of Georgia).\n[Click to Enlarge] Another view of the UNESCO registered Atash-kade (Zoroastrian Fire-Temple) of Baku (Picture Source: TravelPro).\nA close-up view of the ruins of the citadel of Armazi in Georgia. It is possible that the term “Armazi” is derived from Iranic “Mazda” or “Ahura-Mazda”, the primary spiritual deity of the Zoroastrian faith (Picture Source: Iranboom).\n[Click to Enlarge] Pictures of a Medieval Armenian Church at Goshavank sent to Kavehfarrokh.com by Professor George Nercessian (see article: “Professors Curatolia and Scaria: Dome Architecture and Europe“). This was built on the remains of cyclopean walls, where a Zoroastrian fire temple (Armenian Atrushan =Iranian Atar-Roshan) originally stood. There are many similar sites in Armenia where Churches were built on top of Zoroastrian fire temples (Pictures courtesy of Professor George Narcessian). For more on the topic of Armenian-Zoroastrian fire temples consult CAIS: The Armenian Fire Temple of Ani." ]
[ "<urn:uuid:9953a21a-2068-41ae-aa1f-c694737ae298>" ]
[ "CC-MAIN-2017-30" ]
[ "http://kavehfarrokh.com/arthurian-legends-and-iran-europe-links/zoroastrian-and-mithraic-sites-of-the-caucasus/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424148.78/warc/CC-MAIN-20170722202635-20170722222635-00266.warc.gz" ]
[ "en" ]
[ 0.8856314420700073 ]
[ 614 ]
[ 2.75 ]
[ 3 ]
[ "Americans agree that eyesight has a huge impact on day-to-day living and is one of the senses they fear losing most. Unfortunately, people often do not pay attention to their eye health unless they notice a problem. Many common eye diseases that can lead to vision loss and blindness, such as diabetic eye disease, glaucoma, or age-related macular degeneration, often have no early warning signs or symptoms.\nHaving regular eye exams to make sure the eyes are healthy and seeing their best is important for everyone. However, the risk of vision loss and blindness is higher for some people based on race, ethnicity, and other demographic and socioeconomic factors.You might be at higher risk for eye disease if you have a family history of eye disease; havediabetes; are African American, Hispanic/Latino, American Indian, or Alaska Native; or are older than 50. Some diseases affect certain populations disproportionately.\n- Glaucoma, which affects your side or peripheral vision first, is three times more common in African Americans than in Whites. It is a leading cause of blindness in African Americans.\n- Diabetic retinopathy, a leading cause of blindness caused by uncontrolled diabetes, occurs more often in Hispanics/Latinos than in Whites.\n- American Indians and Alaska Natives are 35 percent more likely to have diabetes than the average adult in the United States , putting them at increased risk of diabetic eye disease.\n- Older adults are at higher risk of developing age-related eye diseases and conditions such as age-related macular degeneration (AMD), glaucoma, or cataract. AMD is a leading cause of blindness in Whites.\n“If you are at higher risk of eye disease, having a comprehensive dilated eye exam is the best thing you can do to protect your vision,” says Paul A. Sieving, M.D., Ph.D., director of the National Eye Institute, part of the National Institutes of Health.\n“A comprehensive dilated eye exam is a painless procedure where your eye care professional puts drops in the eyes to dilate, or widen, the pupil so he or she can get a good look at the back of the eye to check for signs of eye disease. With early detection, treatment can slow or stop vision loss and reduce the risk of blindness.”\nIn addition to having regular eye exams, eating a healthy diet, not smoking, and wearing protective eye-wear are just a few other things you can do to protect your sight. For more information on eye exams, common eye diseases and conditions, and finding financial assistance for eye care, visit http://www.nei.nih.gov/healthyeyes. Remember, when you take good care of your eyes, you take good care of yourself." ]
[ "<urn:uuid:ece4f948-707f-4830-8d24-9f265c90f1c4>" ]
[ "CC-MAIN-2017-26" ]
[ "http://altura.org/health-articles/vision-care-tips/" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321309.25/warc/CC-MAIN-20170627101436-20170627121436-00050.warc.gz" ]
[ "en" ]
[ 0.9529258012771606 ]
[ 572 ]
[ 3.375 ]
[ 3 ]
[ "According to the Center for Disease Control, heart disease is the leading cause of death for women in the United States. Each year it causes 1 in every 4 female deaths. Celebrate national heart health month today by checking out this list of questions to ask a cardiologist and schedule an appointment today. This list of questions can prevent disaster before it strikes and help save lives.\nWhat are some symptoms of heart disease?\nAccording to the Center for Disease Control, about 5.8 percent of white women, 7.6 percent of black and 5.6 percent of Hispanic women have coronary heart disease. Many of them ignored a list of potential symptoms that include:\n• Pain in your back, neck or jaw\n• Tightness in the chest\n• Shortness of breath, nausea, dizziness\nHow can I prevent an early onset of symptoms?\nAccording to the Center for Disease Control, 64 percent of women who suffer a heart attack or coronary artery disease exhibit no symptoms before catastrophe strikes. Prevent an early onset of symptoms by:\n• Eating a diet rich in Omega-3's. This means foods like salmon, chia seeds and eggs\n• Eating a plant based diet\n• Exercising three times a week for 30 minutes to an hour\n• Avoiding unnecessary stress for extended periods of time\n• Develop a regular sleep schedule\nWhat kind of tests are necessary for a diagnosis?\nThere are multiple tests a doctor can prescribe when working to improve heart health. The trick is knowing which ones you need and translating the results.\n• Electrocardiogram: An ECG records signals and beats in your heart that lets the doctor identify irregularities.\n• Holder Monitoring: A Holder monitor is something you wear for 24 to 72 hours. Just like an ECG, it identifies irregularities, but on a level that could not be detected by an ECG.\n• Cardiac computerized tomography: A CT scan is like an X-ray, but instead of taking pictures of your bone, it takes a pictures of your heart.\nThe heart is the strongest muscle in the body and knowing how to care for it can prevent long-term diseases and uncomfortable symptoms. By asking a variety of questions when visiting a cardiologist your life can be saved." ]
[ "<urn:uuid:935c6dbc-b823-4b62-a4cd-6afd670c697a>" ]
[ "CC-MAIN-2017-26" ]
[ "http://www.womensforum.com/advocate-for-heart-health-by-asking-these-questions.html" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320476.39/warc/CC-MAIN-20170625083108-20170625103108-00320.warc.gz" ]
[ "en" ]
[ 0.9061366319656372 ]
[ 457 ]
[ 2.875 ]
[ 3 ]
[ "IS-2 Heavy TankThe IS (Iosif Stalin) heavy tank in Russian sources is usually referred to as \"Tank of the Victory\". Development of the IS (Iosef Stalin) series of tanks, started in late 1942, began in earnest in 1943 as a response to the performance of the German Panther and Tiger tanks at the batttle of Kursk. The IS tanks were updated versions of the earlier KV with better mechanical reliability and more powerful weapons. The IS-2 [Iosef Stalin 2] was the first production version, weighing over 40 tons. The IS-2 heavy tank was equipped with external fuel tanks and a 122mm gun.\nDuring 1944 further development efforts led to improvement in the the armor which later led to the IS-3. In contrast to previous designs, the main concern was to provide maximum protection against anti-tank projectiles. The IS-3's armor was made from rolled steel plates welded together and mounted at sharp angles, producing the signature pointed glacis. Another innovation was the semicircular aerodynamic cast turret. IS-3 had an improved fire control system allowing the tank's commander to traverse the turret thereby directing the gun faster.\nThe IS-2M tank was developed in 1951-1962, as a result of the IS-2 upgrade program. The modified IS-2m (m: modifikatsirovanniy) introduced a new, simpler and better angled bow casting.\nThe IS-2 and IS-3 were the primary Soviet heavy tanks in the immediate post-war years, but were evntually replaced by more modern models. IS-3 tanks remained in service with the Red Army until late 1960s. Some surviving for decades thereafter in the inventories of other countries, such as North Korea and China. They also served with Cuban and some Arab armies.\nLength (with gun) 10.74m Width 3.44m Height 2.93m Weight 46,250 kg Engine V-2 IS 12cyl. diesel-engine/520hp Speed 37km/h Range 150km Crew 4 Armor 20mm - 160mm Armament 122mm M1943 D-25T L/43 gun 1 x 12,7mm M1938 DShK 1 x 7,62mm DT/DTM Ammo 28 x 122mm shells 2331 x DT rounds 300 x DShK rounds\nSources and Resources" ]
[ "<urn:uuid:93906d67-7329-4f3f-b4d7-809e2249e7e2>" ]
[ "CC-MAIN-2017-26" ]
[ "https://fas.org/man/dod-101/sys/land/row/is-2.htm" ]
[ "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319575.19/warc/CC-MAIN-20170622135404-20170622155404-00578.warc.gz" ]
[ "en" ]
[ 0.9558409452438354 ]
[ 489 ]
[ 2.65625 ]
[ 3 ]