text
sequencelengths 1
1
| id
sequencelengths 1
1
| dump
sequencelengths 1
1
| url
sequencelengths 1
1
| file_path
sequencelengths 1
1
| language
sequencelengths 1
1
| language_score
sequencelengths 1
1
| token_count
sequencelengths 1
1
| score
sequencelengths 1
1
| int_score
sequencelengths 1
1
|
---|---|---|---|---|---|---|---|---|---|
[
"Having high cholesterol can increase your risk for heart disease and stroke. While medications can help lower your low-density lipoprotein, or \"bad\" cholesterol, you can also make changes in your diet and exercise habits to lower your LDL levels. Eating foods high in saturated fat, trans fat or dietary cholesterol can increase your LDL, but certain other foods, drinks, spices and herbs can help improve your blood cholesterol levels.\nFoods to Eat\nFoods rich in soluble fiber, such as pears, legumes, oats, barley, eggplant and okra, are beneficial because soluble fiber helps trap cholesterol and remove it from the body. Soy foods contain soluble fiber and substances called isoflavones that help lower cholesterol. Avocados may be a good food choice for people with high cholesterol because they contain soluble fiber as well as a plant chemical called beta-sitosterol and monounsaturated fat, both of which help lower bad cholesterol. Nuts provide both monounsaturated fat and plant sterols, another compound that helps remove cholesterol from your body.\nBeverages to Drink\nDrinking just 2 cups of green tea per day for 42 days may lower your LDL levels by about 8 percent, according to a study published in the \"Journal of Nutritional Biochemistry\" in March 2005. Drinking five servings per day of black tea for three weeks may also help you lower your cholesterol by up to 11.1 percent , according to a study published in the \"Journal of Nutrition\" in October 2003. Tomato juice is rich in lycopene, which may lower LDL. If you make your own juice, include broccoli and cabbage along with other fruits and vegetables, as juices containing these vegetables may help lower your LDL, according to a study published in the \"Japanese Journal of Clinical Pathology\" in November 2003.\nAdd Flavor With Spices\nSpices do more than add flavor to your food -- many also have health benefits. Those that may be beneficial for lowering your LDL levels include garlic, curcumin, ginger, cinnamon and coriander. In some cases, these spices also reduce the oxidation of LDL, making it less likely you'll experience clogged arteries, and increase beneficial high-density lipoprotein levels, which help remove LDL cholesterol from your body, according to a study published in \"Current Cardiology Reviews\" in November 2010.\nPotential Herbal Remedies\nBlond psyllium can help lower your LDL by up to 10 percent if you take 10 to 12 grams per day for at least seven weeks, according to MedlinePlus. Aloe may also help, potentially decreasing your LDL by up to 18 percent in 12 weeks with a daily dose of 10 to 20 milliliters, notes MedlinePlus. People who can't tolerate the cholesterol-lowering statin medications can sometimes achieve significant LDL reductions with red yeast rice along with making lifestyle changes, according to a study published in \"Annals of Internal Medicine\" in June 2009."
] | [
"<urn:uuid:020c1684-ee75-40eb-99a5-4188684d4685>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.livestrong.com/article/244214-foods-drinks-spices-and-herbs-to-lower-bad-cholesterol/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319992.22/warc/CC-MAIN-20170623031127-20170623051127-00556.warc.gz"
] | [
"en"
] | [
0.9403126239776611
] | [
603
] | [
2.8125
] | [
3
] |
[
"Nobody with an understanding of marine life would describe Seattle’s downtown shoreline as a thriving ecosystem. More than a hundred years of city development have left its tidelands covered in fill, flanked with concrete and overshadowed by industrial piers.\nYet salmon habitat seems to be improving there, scientists say, thanks to new features installed during replacement of the downtown seawall.\nThe enhanced seawall, which has been called the largest eco-engineering project of its kind, may be boosting the fitness and chances of survival for young salmon as they migrate through a treacherous section of waterfront on their way to the ocean.\nInstead of encountering a barren slab of concrete, salmon can now swim across a “bench” in front of the seawall. The bench forms a narrow strip of intertidal habitat, effectively providing a shallow-water pathway for juvenile salmon. Glass blocks in the sidewalk above the seawall allow light to penetrate to the water below, and a rough surface on the wall itself has horizontal shelves to encourage the growth of algae and invertebrates.\nNew scientific findings about marine organisms growing on or near the seawall plus behavioral changes in young salmon swimming through the area suggest a real payoff from these enhancements, which added about 2 percent to the cost of the $410-million seawall.\n“I am very satisfied with the result,” said Jeff Cordell, a researcher with the University of Washington’s School of Aquatic and Fishery Sciences who has been involved with the project from the start. “What we are encouraged about is that fish seem to be using habitat where they didn’t before.”\nSome people say these new findings could lead to discussions, strategies and possibly regulations to reduce the ongoing damage in other locations where shoreline armoring remains a necessity. The Washington Legislature has commissioned an investigation to determine if future shoreline construction should be required to enhance, not just protect, habitat — thus going beyond the current “no-net-loss” standard to create “net ecological gain.”\nMore than a vertical wall\nFor close to a century, the seawall along Seattle’s sprawling waterfront has protected waterfront buildings and other structures from the pounding waves of Elliott Bay. For all practical purposes, the seawall did its job well. But after the 2001 Nisqually earthquake, engineers examined the integrity of the structure. They found, among other problems, that wood-boring invertebrates had weakened wooden components of the seawall, raising concerns that the wall could collapse in the next big earthquake.\nCoastal geologists estimate that wood, rock or concrete structures have displaced natural habitat along 29 percent of the Sound’s 2,500 miles of shoreline.\nUntil it came time to replace the seawall, few people gave much thought to the tiny migrating salmon working their way among the pilings, searching for food and doing their best to avoid predators along Seattle’s waterfront.\nThroughout Puget Sound, marine biologists have long described the environmental damage caused by seawalls, bulkheads and other shoreline armoring. Coastal geologists estimate that wood, rock or concrete structures have displaced natural habitat along 29 percent of the Sound’s 2,500 miles of shoreline.\nIn designing the new Seattle seawall, a variety of experts, including Cordell, began asking questions: Could something be built to offer fish better protection from predators and perhaps a little more food to eat while still holding back the land? In other words, could a functioning structure provide improved habitat with less hazard?\nUnder natural conditions, juvenile salmon tend to stay in shallow waters along the shoreline to avoid larger predators as they search for food. One of the major problems caused by shoreline armoring is that shallow water disappears when the tide comes in. In fact, where tidelands have been filled in — such as in older downtown and industrial areas — the water may never leave the wall.\nIn building the new 3,100-foot section of Seattle seawall from the Colman Dock ferry terminal north to the Seattle Aquarium, construction crews created a platform, or bench, in the front of the wall. The top of the bench was intentionally placed at an intertidal elevation — meaning the bench is covered with water at high tide and exposed at low tide, forming a shallow-water habitat during a portion of each day.\nThe bench was built by stacking mesh bags of quarry rocks, nicknamed rock mattresses, between the new wall and a sheet-pile barrier. The sheet pile, a series of interlocking steel plates, was installed initially to keep water out of the construction site. It was later cut down to form the front of the bench.\nTo facilitate construction, the new seawall was located 10 to 15 feet farther back from the water than the old one. The sidewalk along the waterfront was then built in cantilever fashion over the wall and above the new intertidal bench. To counteract the effects of the sidewalk shadow, glass blocks were installed in the walkway to transmit light to the bench and water below.\nThe new seawall also features a series of horizontal shelves attached at various locations, along with lots of crevices, to encourage the growth of seaweeds, invertebrates and other marine organisms.\n“The goals,” said Cordell, “were to create an intertidal migratory corridor for juvenile salmon and to increase the nearshore ecosystem.”\nNew highway for salmon\nThe Seattle seawall lies on the migratory pathway used by juvenile Chinook, chum, pink and coho salmon making their way to the Pacific Ocean from the Duwamish River and its more-productive upstream reaches bearing the name Green River. Young salmon from more distant rivers to the south, such as the Puyallup and Nisqually, may also find themselves in the clutter of piers and pilings along the urban waterfront.\nBefore the seawall reconstruction, researchers in snorkeling gear watched for salmon during their migration from March through August. They found much higher densities of young salmon between the piers than in the shadows under the piers.\nScientists have long observed that salmon are hesitant to go under docks, floats and other overwater structures during daytime hours, often stopping at the sharp lines of shadow.\n“They don’t like shade lines,” Cordell explained, noting that juvenile salmon tend to stay in the sunlight because their success in finding food is dependent on their ability to see. To avoid the shade of the Seattle piers, some fish even travel through more treacherous deep water, going out and around the piers.\nThe new seawall with its cantilevered sidewalk embedded with glass blocks altered the nearshore area in some critical ways. Light passing through the glass blocks increased visibility under the piers, where previously light levels were very low. At the same time, moving the seawall farther back and under the sidewalk resulted in a loss of light at the water’s edge that was only partially compensated with the glass blocks.\nAfter construction, researchers observed a notable increase in feeding behaviors under the piers, where the fish had never been known to feed before, according to Cordell. Between the piers, the fish continued to forage much as before, resulting in a more consistent feeding pattern as the fish swam from pier to pier during their migration along the shoreline.\nSonar reveals nighttime behavior\nIn a separate study, UW graduate student Kerry Accola observed the behavior of young salmon at night as well as during the day by using high-frequency sonar equipment mounted on the bottom of a kayak. Video captured with a hydro-acoustic camera shows individual shadowy fish up to 26 feet in front of the kayak. Sometimes hundreds of fish could be seen at one time, swimming together in synchrony.\nAccola, a research fellow at Washington Sea Grant, learned that juvenile salmon were even more plentiful at night than during the day, which could mean that the fish like to travel at a time when they cannot feed as well.\nShe also confirmed what the daytime snorkel team had discovered: Where glass blocks were imbedded in the sidewalk, the young salmon seemed more willing to swim under the piers. In fact, along the enhanced section of seawall, the sonar camera showed little difference in the numbers of salmon under the piers versus between the piers.\nAs Accola paddled along the old seawall north of the Seattle Aquarium — a section of wall that has not yet been rebuilt — she noticed that the fish still seemed reluctant to go under the piers. The sonar, which could spot the young salmon even in murky water, often showed them grouping up at the edge of a pier but rarely hanging out underneath.\n“When they came to bad habitat, they seemed to school together,” she said, speculating that the fish would then move forward as a group. Meanwhile, along the new seawall, the young salmon seemed to swim with less hesitation through the corridor containing more-inviting habitat.\nDespite the seawall improvements, Accola found that some salmon were still swimming out and around the piers in both the new and old sections of seawall before returning closer to shore.\nThe sonar images did not allow her to distinguish whether the fish were darting about — an indication of feeding behavior — but Accola found their traveling patterns to be more consistent, more natural, along the rebuilt seawall when compared to the old section of seawall to the north.\nSalmon offered a better menu\nThe shelves and textured walls installed on the upper portion of the new seawall has encouraged vegetative growth, which in turn supports tiny invertebrates, such as copepods, eaten by juvenile salmon.\nResearchers found nine species of seaweed growing on the new intertidal bench at between-pier study sites during a survey in 2018, according to a report by Anchor QEA consultants. Two species of seaweed were found in darker under-pier locations. Sea lettuce was the most common species.\nIn the same study sites, researchers found 11 invertebrate species growing on the wall, including four species of barnacles, as well as sea squirts, mussels, limpets, snails and chiton.\nPatches of bull kelp, which provide fish habitat, declined from 2010 to 2018 along the Seattle waterfront — including locations along both the new and old sections of seawall, according to surveys conducted by boat and from shore. Though unfortunate, those findings are fairly consistent with kelp surveys elsewhere in Puget Sound. Causes of widespread kelp decline are not fully understood, but they may be related to higher temperatures and other factors that impede spawning and growth of kelp.\nBoth before and after seawall construction, researchers found the density of free-swimming invertebrates, such as copepods, to be higher in open areas between the piers than under the piers. But after construction of the habitat bench, the variety of prey species available to feed the young salmon had increased all along the seawall and especially between the piers.\nNotably, during the peak of the juvenile pink and chum salmon migration in April, two kinds of copepods favored by these salmon were found in much higher ratios along the seawall after construction versus before.\nResearchers speculate that the increased number of juvenile salmon observed under the piers may, in part, be attributed to an improved food web. Perhaps increased light levels under the piers increased biological productivity or, alternatively, perhaps the extra light increased visibility enough for the fish to find their prey.\nFurther studies are planned to determine exactly what the young fish are eating and whether the increased invertebrate populations are meeting their nutritional needs.\n“The new Elliott Bay seawall represents a novel experiment in re-engineering ecological functions into a profoundly altered shoreline…,” states the latest study by UW fisheries biologists. “Through continued monitoring of nearshore community response to eco-engineering, we can better understand both the opportunities for and limitations to success in urban shoreline restoration.”\nSeawall inspires new thinking\nThe new Seattle seawall has been touted as proof that salmon habitat can be improved, even in the most degraded urban environment. For many, the project offers new prospects for improving salmon habitat on just about any shoreline in Puget Sound.\nSo far, the big push by cities and counties has been to get people to remove old bulkheads on shorelines where the wave energy is low and hard armoring is not really needed. So-called “soft shore” protections — including logs and rocks anchored to the beach in a natural configuration — can help reduce shoreline erosion without upsetting the ecosystem.\nFor publicly owned shorelines, local governments have been using state and federal grants along with their own resources to replace bulkheads with soft-shore structures throughout Puget Sound. For private property owners, so-called “Shore Friendly” programs offer encouragement and sometimes financial and technical support to remove old bulkheads.\nThe primary message of Shore Friendly is that most shoreline properties in Puget Sound do not need the protection of bulkheads. The program acknowledges that armoring may be necessary where homes were built right up to the shoreline years ago before modern regulations outlawed such construction.\nUnder the Shoreline Management Act, rules call on property owners to consider the least harmful alternatives, yet many local governments have been allowing the replacement of bulkheads without questioning the environmental consequences, according to Tim Trohimovich of Futurewise, an environmental group that has studied the role of government in protecting shorelines.\nA key provision of the Washington Administrative Code states, “The replacement structure should be designed, located, sized, and constructed to assure no net loss of ecological functions.”\nThe no-net-loss standard allows for environmental mitigation elsewhere along the shore to make up for ecological damage caused by construction.\nTrohimovich says many local governments could do a better job of exercising their authorities to ensure “no net loss” — either by strengthening local regulations or by enforcing current rules. The Seattle seawall project provides an example of finding ways to improve habitat even at difficult sites, he said.\nMeanwhile, the governor’s Southern Resident Killer Whale Task Force has concluded that the no-net-loss standard may not be strong enough to bring about significant environmental restoration. The task force, charged with finding ways to keep Puget Sound’s orcas from going extinct, says the state needs to adopt a policy of “net ecological gain” to improve salmon habitat and save the whales.\nLegislation that would have required a builder or developer to improve ecological functions as part of any construction project never made it out of committee this year. Instead, the Legislature approved a $256,000 study to consider the burdens and implications of a net-ecological-gain requirement.\nThe bottom line is that habitat improvements are coming too slowly to help salmon and killer whales, said Mindy Roberts, a member of the orca task force and director of Puget Sound programs at Washington Environmental Council.\n“That Seattle seawall project was what we had in mind behind the idea of net ecological gain,” Roberts said. “The goal is not to restore a site to pristine condition but to leave it in better shape for future generations.”\nOpponents of the bill that would have required net ecological gain argue that this very concept runs counter to individual property rights, as prescribed by state law and the U.S. Constitution. To require mitigation, they argue, government must show a clear connection, or nexus, to the environmental damage caused by the development. Builders should not have to pay for environmental damage caused by past practices that were legal at the time, they say.\nIn funding the new study, the Legislature called for an assessment of the legal issues surrounding net ecological gain, a description of how to measure such gain, and an analysis of how the new standard might apply to the Shoreline Management Act, the Growth Management Act and other environmental laws.\nThe Washington Academy of Sciences was assigned the task of determining what kinds of environmental protections may be missing from current state law and where the no-net-loss standard may be falling short. A consultant is being hired to review legal and policy matters.\nA report to the Legislature is due by Dec. 1."
] | [
"<urn:uuid:65dd9f26-4487-411b-bf9e-9403efbed566>"
] | [
"CC-MAIN-2023-14"
] | [
"https://eopugetsound.org/magazine/IS/seawall"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950422.77/warc/CC-MAIN-20230402074255-20230402104255-00750.warc.gz"
] | [
"en"
] | [
0.9576292634010315
] | [
3376
] | [
3.046875
] | [
3
] |
[
"Mosquito collections from Angel Park and Daingerfield Island in Alexandria recently tested positive for the West Nile virus, marking the first reported activity of the virus in the City for the 2011 season. The Alexandria Health Department is working with the Alexandria Department of Recreation, Parks and Cultural Activities and the National Park Service to reduce mosquito breeding in these areas.\nDue to the increased risk of West Nile virus transmission, public health officials are advising City residents to eliminate standing water and to protect themselves from mosquito bites. Recent hot weather causes mosquitoes to develop into adults more rapidly, which can result in a marked increase in the mosquito population. Officials are concerned that other areas in the City may soon have mosquitoes with the virus and are advising all residents to eliminate standing water.\nNo human cases of West Nile virus disease have been reported in the City of Alexandria this year. Two human cases were reported last year.\nFor tips on preventing mosquitos from breeding, visit alexandriava.gov/MosquitoControl. For more information about WNV, please visit the following websites:\n- Virginia Department of Health: West Nile Virus Infection\n- Centers for Disease Control and Prevention: West Nile Virus: Fight the Bite!\nFor additional questions or concerns regarding mosquitoes or mosquito-borne illness, contact Dr. Linda O’Connor, Medical Entomologist, Alexandria Health Department, at 703.746.4917."
] | [
"<urn:uuid:02c55274-a18c-4f6b-bbdd-9ac6dba16988>"
] | [
"CC-MAIN-2017-26"
] | [
"https://www.alexandriava.gov/news_display.aspx?id=50048"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320174.58/warc/CC-MAIN-20170623202724-20170623222724-00384.warc.gz"
] | [
"en"
] | [
0.9301171898841858
] | [
286
] | [
3.140625
] | [
3
] |
[
"Over two million of the overall number of POWs held in Russia during World War I (2.4 million) were soldiers of the Austro-Hungarian army.\nUp to 200 000 of those spent years not in European Russia or Siberia which has become the synonym of captivity in Russia but were sent to Russian Turkistan, i.e. the General Gouvernement Turkestan which comprised the territory of now independent states Uzbekistan, Kyrgyzstan, Tajikistan, Turkmenistan and the Southern part of Kazakhstan.\nFor a concise overview of WWI captiivity in Russia see:\nInternational Encyclopedia of the First World War\nPrisoners of War (Russian Empire)\nby Reinhard Nachtigal and Lena Radauer"
] | [
"<urn:uuid:6bc0503b-4866-47b8-9319-ac1e3d8a4fc1>"
] | [
"CC-MAIN-2020-05"
] | [
"http://www.spurensuche-turkestan.org/kriegsgefangene-im-1-weltkrieg/?lang=en"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00227.warc.gz"
] | [
"en"
] | [
0.8963308334350586
] | [
154
] | [
3.1875
] | [
3
] |
[
"He felt that in this crisis his laws of life were useless. Whatever he had learned of himself was here of no avail. He was an unknown quantity. He saw that he would again be obliged to experiment as he had in early youth. He must accumulate information of himself, and meanwhile he resolved to remain close upon his guard lest those qualities of which he knew nothing should everlastingly disgrace him.\nThis passage from Chapter I illustrates Henry’s initial fear about whether he has the courage to face battle, and establishes that his predicament is less a matter of war than of knowing himself and judging his worth. Until this moment, Henry has been a youth of comfortable assumptions. He believes, for instance, that war exists for the purpose of creating heroes, and that men, when transformed into soldiers, are guaranteed a kind of honor that grants them prestige in society and history. The purpose of The Red Badge of Courage is not to trace such a transformation from common man to brave soldier. On the contrary, it is to chart Henry’s psychological growth as he “accumulates information of himself” and “experiments” with different types of behaviors—some courageous, some cowardly. The Red Badge of Courage challenges the protagonist’s (as well as the reader’s) most bedrock assumptions: the courage that Henry finally musters crucially depends on his having rewritten “his laws of life” and come to a new understanding of the world and his relatively modest place in it.\nThat Henry plans to “remain on his close guard lest those qualities of which he knew nothing should everlastingly disgrace him” testifies to his naïve and immature outlook. At this point in the novel, Henry has very little internal sense of right and wrong; instead, his morality is strictly a function of what other people see and how they judge him. This insecurity leads Henry to be excessively vain, hypersensitive, and, at times, almost unbearably selfish. However, just as he has graduated beyond the beliefs and behaviors of his “early youth,” he will grow beyond these lowly, adolescent, self-centered qualities.\nHe suddenly lost concern for himself, and forgot to look at a menacing fate. He became not a man but a member. He felt that something of which he was a part—a regiment, an army, a cause, or a country—was in a crisis. He was welded into a common personality which was dominated by a single desire. For some moments he could not flee, no more than a little finger can commit a revolution from a hand.\nThis passage occurs in Chapter V as Henry engages in battle for the first time. He feels a brief but important respite from his nagging obsession with individual recognition. This powerful desire for personal glory and accompanying conviction that his life is more valuable than that of most other soldiers lead to some of Henry’s worst behavior, including his abandonment of the tattered soldier. Against these moments of hyperinflated egotism come flashes of realization that he is but one man among many. However, Henry’s convictions do not really change at these times: he does not particularly care whether he fights for “a regiment, an army, a cause, or a country.” Yet he does let slip the selfish preservation instinct that often blinds him to larger struggle. This momentary lapse of ego allows Henry to behave with honor. This later proves the surest and most responsible way of winning the glorious accolades that he so desperately desires.\nHis self-pride was now entirely restored. In the shade of its flourishing growth he stood with braced and self-confident legs, and since nothing could now be discovered he did not shrink from an encounter with the eyes of judges, and allowed no thoughts of his own to keep him from an attitude of manfulness. He had performed his mistakes in the dark, so he was still a man.\nNowhere in The Red Badge of Courage is the unflattering and empty nature of Henry’s brand of “manfulness” more apparent than in this passage from Chapter XV, when Henry prepares for battle a second time. He has recently returned to camp wounded, and basked in the admiration of the men who believe the tale of heroism that he makes up. Even more outrageous, he has condemned the men who stayed to fight in the battle he could not face and prided himself that he managed his retreat with dignity and discretion. He believes that since no one knows of his cowardice, it does not count; in his mind, his behavior has done nothing to compromise his manhood. These lines mark a crucial moment in understanding the depths of Henry’s self-delusion. As opposed to the passage described above, which illustrates how Henry abandoned an obsession with his own welfare and contributes to a greater good, here Henry proves exactly how self-interested he can be. He would encounter a moral conundrum—guilt, for example, for his egregious behavior—only if another discovered and exposed his spinelessness. With his mistakes secured in the dark, Henry feels neither regret nor shame, and allows the esteem of others to reinforce his sense of having acted in the right.\nThe men dropped here and there like bundles. The captain of the youth’s company had been killed in an early part of the action. His body lay stretched out in the position of a tired man resting, but upon his face there was an astonished and sorrowful look, as if he thought some friend had done him an ill turn. The babbling man was grazed by a shot that made the blood stream widely down his face. He clapped both hands to his head. “Oh!” he said, and ran. Another grunted suddenly as if a club had struck him in the stomach. He sat down and gazed ruefully. In his eyes there was mute, indefinite reproach. Farther up the line a man, standing behind a tree, had had his knee joint splintered by a ball. Immediately he had dropped his rifle and gripped the tree with both arms. And there he remained, clinging desperately and crying for assistance that he might withdraw his hold upon the tree.\nThe Red Badge of Courage is filled with graphic and arresting depictions of battle, such as this passage from Chapter V when the 304th Regiment holds off the Confederate charge. This description is noteworthy for its powerful evocation of the chaotic violence of war; the language is precise, sharp, and convincing. It is not difficult to imagine such awful sights as men dropping “like bundles” or a soldier grunting “as if he had been struck by a club in the stomach.” In general, the death of a walk-on character might disturb readers in an abstract way, but it does not always have a lasting impact. It is a testament to Crane’s writing, then, that he manages to wring such pathos from the death of a nameless captain. Even though the reader is not familiar with this man, the misery expressed by his “sorrowful look, as if he thought some friend had done him an ill turn” leaves an indelible impression.\nThe image of the soldier with the shattered knee, clinging desperately to a tree and calling for help, invokes the theme of the universe’s fundamental disregard for human suffering. Time and again, Henry encounters a natural world that is deaf to the agonies of human beings, a realization that makes the striving for public glory seem petty and foolish.\nHe saw his vivid error, and he was afraid that it would stand before him all his life. He took no share in the chatter of his comrades, nor did he look at them or know them, save when he felt sudden suspicion that they were seeing his thoughts and scrutinizing each detail of the scene with the tattered soldier. Yet gradually he mustered force to put the sin at a distance. And at last his eyes seemed to open to some new ways. He found that he could look back upon the brass and bombast of his earlier gospels and see them truly. He was gleeful when he discovered that he now despised them. With the conviction came a store of assurance. He felt a quiet manhood, nonassertive but of sturdy and strong blood. He knew that he would no more quail before his guides wherever they should point. He had been to touch the great death, and found that, after all, it was but the great death. He was a man.\nThe novel ends with a declaration of Henry’s development into a man of honor and courage—qualities that Henry now sees quite differently from when he was an inexperienced soldier. He now acknowledges that they do not require him to return home “on his shield.” He no longer feels the need for “a red badge of courage” to mark his prowess in battle. Ultimately, Henry’s courage is linked to his ability to reflect on his life honestly. No longer willing to let the mistakes he has made reside in the dark, remote places of his consciousness, he considers them and their impact on his character. By coming to terms with his wrongs, Henry, like Wilson before him, realizes the importance of integrity. Aware of life’s relative evanescence, Henry no longer clings to bombastic notions of greatness. In touching “the great death”—that is, coming to terms with his own mortality—Henry commences a new, more mature, and truly more honorable phase of his life.\nTake a Study Break!"
] | [
"<urn:uuid:a784befc-ecdd-441c-86da-a004a5dca270>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.sparknotes.com/lit/redbadge/quotes.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323808.56/warc/CC-MAIN-20170629000723-20170629020723-00557.warc.gz"
] | [
"en"
] | [
0.9871639013290405
] | [
1976
] | [
3.53125
] | [
4
] |
[
"Following up on my previous post drawing attention to wasteful conservation programs, I am getting asked whether cutting conservation programs can actually help consumers.\nAs discussed in a previous exchange on this site, here are some of the components of conservation costs Ontario taxpayers and ratepayers are covering:\nWhat do we get for this expenditure of over half a billion dollars per year (other than “green jobs” in government agencies and greasy contractors)?\nLook at where some of this money goes.\nThe OPA has a coupon program that gives discounts on compact fluorescent light bulbs, a program identical to one offered by the old Ontario Hydro more than 20 years ago. Would the customer participating in the program have bought the bulb without the program? How much of the consumption change in electricity going on is due to drastic price increases and official promises of more exciting increases in future? Does the new bulb replace a less efficient bulb? Does the customer leave the new, more efficient light on longer than the old bulb? The OPA claims to know the answers for all these questions and has vast, vast amounts of documentation to paper over the inherent uncertainty of measuring the effectiveness of paying people to not use electricity.\nRespect ratepayers, cut the conservation con."
] | [
"<urn:uuid:8ded976d-0699-4b2c-b741-038560a5069d>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.tomadamsenergy.com/2013/12/17/cut-conservation-con-save-half-a-billion-dollars-per-year/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323908.87/warc/CC-MAIN-20170629103036-20170629123036-00234.warc.gz"
] | [
"en"
] | [
0.9299504160881042
] | [
248
] | [
2.65625
] | [
3
] |
[
"The paraglider consists of a wing, which is connected to the pilot by a harness via lines, risers and carabineers.\nThe wing of the paraglider has close to ellipse shape, when seen from above and has left and right semi wing (the directions are always chosen in relation to the flight direction). The wing consists of cells, divided by walls.\nThe front of the wing is called the leading edge and this is where the cell openings are located. This is where the airflow enters and inflates the wing with air. The back part of the wing is called trailing edge. The outtermost area of each semiwing is called an ear, which ends with a wing tip. The distance between wing tips is called wing span.\nThe inflated wing has an arc shape, when seen from both the front and behind. There is a difference between the projected wing span of an inflated wing and the wing span of a spread on the ground wing. There is also a difference between the projected surface and the surface of a wing. The projected surface area is the one which carries the load, no matter how big the surface of laying on the ground wing.\nEach semi wing consists of set of profiles, formed by the shape of cell walls. The profile has upper and bottom surface. The distance between the front and back part of each profile is called a chord. The mail characteristics of a profile are chord length, maximal profile thickness and its position.\nThe paraglider suspension:\n- distributes the weight of the pilot along the wing surface;\n- gives a shape to the wing;\n- sets the balanced angles of attack at different wing sections (central section, ears) by changing the line length construction;\n- in flight angle of attack control.\nThe suspension consists of lines, risers and carabineers.\nThe lines are attached to the numerous attachment points at the connection of cell walls with the bottom surface of the wing.\nAs lines make drag, the paraglider constructors strive to reduce their overall length - for example the use of diagonals between cells improves the load distribution and reduces the amount of attachment points.\nLaternally (if seen from behind), the lines are divided to left and right, according to which semi wing they are connected to. The wing tip is connected to a stabilo line, which has different color and is pulled to clear canopy and lines cravats.\nLongitudinally (if seen from the side), the lines are in parallel divided to A, B, C and D lines. The A lines are the closest to the leading edge and the D lines are the furthest. The closest to the trailing edge are the brake lines (control lines).\nThe lines that lead directly from the wing surface, are grouped together and united into a thicker line, thus making up the A,B,C,D lines. Finally the lines are connected to the corresponding A, B, C and D risers, through triangular metal elements called maillons. The risers are stitched together in an ear, where the carabineer connects them to the pilot's harness.\nThere is a short riser with a pulley connected to the last riser. The brake line goes through it and connects to the brake handle(control handle). This way, the control remains within the reach of the pilot's arms if he releases it by accident.\nSome modern and sportive paragliders have rigid elements in their construction and may not have C or D lines and risers.\nThe risers are made in such a way, that the pulling of a pulley system on the A riser, pulls consecutively A, B, C and D risers downward and thus reduces the angle of attack. This is called a speed system. Some paragliders have trimmers, which pull or release the last risers and also have an effect of controlling the angle of attack.\nThe paraglider harness envelops the pilots body and transfers his weight to the wing through the carabineers, risers and lines. The harness should:\n- hold the pilot body in all positions (even upside down);\n- allow the pilot to control the wing by shifting his weight sideways;\n- allow mounting and easy use of a speed system;\n- have active safety devices (rescue parachute) and passive safety devices (protectors);\n- allow comfortable position to the pilot lasting for hours;\n- allow enough freedom of movement (fast running on take off and landing, easy entering and exiting).\nUsually, the harness has a rigid seat plate where the pilot sits. Bellow the seat plate the main riser webbing is run. Stitched into this webbing is the loop that holds the carabineers, which attach the pilot to the wing. There are additional loops running from the harness to the carabineers, which give the pilot shoulder and back support. The pilot is secured in the harness by locking a chest belt (strap) between the carabineers and leg belts (straps).\nThe leg strap locking is very important because there are still lethal cases of pilots who slipped down from the harness. Most of modern harnesses have their chest strap attached to the leg strap with an additional strap which prevents the falling of the pilot if he forgets to lock the leg straps. Some producers also use combined chest-leg straps.\nThe beginner's harnesses are sitting type, while the experienced pilots try to reduce their body drag and use laying type of harness with a streamlined bag for their legs.\nTo avoid leg tingleness by the bench edge after hours long flying, some harnesses can be equipped with a stirrup, which carries part of legs' weight. It also allows for better body position control and easy entering and exiting of the harness on take off and landing. Usually a sling connects the stirrup with the speed system, which makes it easy to find and work with pilot's legs. It’s important not to use the speed system as a stirrup.\nExcept some special harnesses (lightweight for hiking, acrobatics and others), the harnesses are equipped with a back protector, which protects the pelvis and the back spine against serious injuries.\nThe back protector consists of a molded piece of plastic foam, which must conform to an industry standard thickness. It is placed in a tight cover within the harness, ensuring it is always in the correct position to protect the pilot. It will absorb and distribute the energy from an impact. The same principle is used for the additional airbag systems. These harnesses allow the bottom portion to be filled with air when in flight, but a one-way valve at their entrance traps the air creating a cushion in the even? of an impact.\nThe paragliding harness producers decide where to place the rescue parachute compartment - under the seat, at the back or in a separate container attached to the chest or side straps (front container, side container). The rescue parachute handle should be at a convenient place, where it's easy to reach, pull and throw the rescue parachute. The rescue parachute compartment and the whole rescue system should not be too tight for difficult pull out or too lose for sporadically dropping and opening. The rescue parachute belt is connected to the harness behind the pilot shoulders via additional risers. Thus, during the parachute descent, the pilot body leans ergonomically slightly forward and ready for better absorbing of the impact.\nStrength of paragliding materials?\nTo fight fear, the beginner pilot has to trust the wing that they are strapping themselves to.\nThe paraglider sail is made of synthetic fabric (Skytex, Galvanor) which is reinforced against tearing. The producers choose different fabric thickness (g/m2) and properties for different parts of the wing (upper surface, bottom surface, ribs, leading edge). The fabrics are mechanically woven, colored and impregnated with thorough quality control.\nThe fabric impregnation with special coating protects it against UV rays and reduces its porosity (air tightness). The fabric reduces its quality with time, usage, exposure to sun, mechanical friction (take offs, landings). At the end of a wings lifespan (about 500 hours or flights), most of the fabric porosity is worn out, which causes rapid ageing of fabric threads.\nThe fabric condition is monitored by counting airtime and by porosity and bettsometer checks.\nDepending on the suspension construction, the producers use lines with different thicknesses. The most common materials are Kevlar, Dyneema, Aramid and Polyester. 0.8 mm thick line holds 80 kg, 2.2 mm - 220 kg.\nThe paraglider lines outlast the fabric lifespan, except if damaged. This is not valid for the unsheathed \"competition\" lines, which are more exposed to external influences (UV, H2O, etc.) and have to be replaced every 150-200 hours.\nThroughout normal usage, due to external influences, the lines change their length and have to be checked for deviations periodically. Often the moisture causes 2-5 cm shrinkage of sheathing of lightly loaded C and D lines, which changes the profile curvature and angle of attack. Such deviations are slightly perceivable at beginner's gliders, but can cause dramatic changes in flight modes and behavior of high performance models with thin and sensitive profiles.\nThe lines are connected to the risers via triangular steel mayons. They have thread and screw which allows them to open to replace lines.\n3 mm Stainless Oval Maillon holds longitudinally 800 kg and 160 kg laternally.\nThe risers are made of polyester strap, which holds over 1100 kg\nThe pilot weight is carried mainly by left and right ? and B risers.\nIt is measured that a 25 m2 wing, loaded with 75 kg pilot, has 16 kg force on each A riser and 10 kg force on each B riser.\nThe paraglider and harness tests require them to stand up to 10 G (10? the pilot weight), without destruction of construction or its elements (tearing of lines, stitches, fabric, risers, breaking of carabineers, etc.).\nTaking good care of your paraglider prolongs its lifespan and gives you safety and comfort in the air.\nThe main reasons for ageing and weakening of paraglider materials are environmental and mechanical influences.\nThe environmental influences are due to sunlight (UV), atmospheric moisture and temperature changes.\nThe mechanical influences affect the materials strength and structure and are due to:\n- normal and extreme flight loadings;\n- into the ground friction at take off, landing, folding and unfolding;\n- deformations and frictions at folding and transporting;\n- catching and hooking of branches, bushes thorns, roots, stones, rocks and others, which together with stepping on the sail and the lines can cause tears and damage.\nDespite our casual care of things in everyday life, in aviation good care is more then a must:\n- do not expose to sunlight unnecessary the wing, lines, risers and harness are all susceptible to UV damage. This is because they are made of petrol based synthetic materials, which quickly age by exposure to UV rays. The thin paragliding fabric is especially vulnerable!\n- avoid ?oisture: If your paraglider gets wet make sure you dry it completely before storing. The moisture helps the dust and small particles to penetrate deep into the materials, which accelerates their abrasion. The moisture causes deformation of materials and often shrinkage of lines. Moisture also can causes fungus and mould to grow. If you dip the paraglider in salty water, then wash it with plenty of fresh water, because the salt acts abrasively and chemically on the fabric and lines. The paragliders are usually not washed out of dirt, but if needed then use soft cloth or sponge without soaps and chemicals;\n- avoid extreme temperatures , because they influence the fabric coating and shorten the paraglider lifespan. The heat generated by car left in strong sun can deform the plastics inside the wing. Low temperatures combined with moisture can damage lines and fabric (breaking of micro fibers when water turns into ice) and reduce their strength;\n- avoid unnecessary friction into the ground or other surfaces. Even the dry grass works like a sandpaper!\n- clean the paraglider periodically from dust, sand and objects in the cells. Most wings have special velcro openings at the wing tips, but check the other cells too;\n- remove insects and especially grasshoppers when folding the wing after a flight. They don't like eating synthetics, but they love their freedom and make holes on their way to it;\nGenerally be gentle with the paraglider:\n- be careful not to step on the sail or the lines, because you can damage them, especially if there are stones or solid objects bellow;\n- check carefully if pulling of the wing for take off won't catch the sail or the lines into stones, roots, bushes, etc, which may tear or damage the wing. If wind moves your wing on the take off, then check again for possible catching. Be ready to stop pulling the paraglider if you feel it’s caught somewhere. The best is to inflate the canopy several times before taking off, in order to sort out the wing and the lines, to check the terrain and the conditions, to smoothen the take off.\n- do not let the wing fall on its leading edge after landing (there are cases of broken ribs and cells due to the pneumatic shock);\n- fold the wing cell by cell by keeping the rigid elements parallel to each other without bending them too much when rolling the canopy. Regularly change the central cell which you use as a base to fold the rest cells in order to avoid ageing of fabric due to frequent bending (when we want to tear a piece of paper at certain place we bend it several times there). Do not fold the paraglider too tight. When packing the paraglider, use the principle of material diversification - for example leave the risers with their metal elements in a protective bag against friction into the fabric during transport. Use the velcro strap outside the inner glider bag. The rolling of folded cell by cell wing starts from the trailing edge toward the leading edge. Don't be inpatient and don't push hard the fabric to kick the air faster toward the leading edge openings;\n- acrobatic flying causes high overloading of the paraglider and the resultant deformations do not restore completely;\n- store the paraglider at dry and dark place at moderate temperature;\n- paragliding producers recommend periodic checks of condition of the paraglider in specialized test centers(http://test.skynomad.com/bg/).\nThe most common damage to a paraglider is:\n- torn fabric\n- big >10 cm\n- small < 10 cm\n- damaged line sheathing;\n- broken line;\n- unpicked or broken stitches.\nSmall rips up to 10 cm can be repaired with a special rip stop adhesive sticker, which usually comes with every new glider. A strip of repair tape slightly bigger than the tear is cut with rounded corners. This helps prevent ungluing by dust and pollution. The area around the tear is cleaned with moist soft cloth and let to dry. The broken parts are matched together and the sticking patch is glued on them. It's good to have a solid base bellow to allow good pressurizing of the sticker to the fabric with a solid object (a finger nail). If the ripped part is 2-10 cm big, then sticking on both sides is recommended.\nBigger rips are taped and stitched. Occasionally a tear is so big it requires the replacement of the whole cell, which can be done by the manufacturer or specialized repairmen centers. Tears close to stitching at cell's borders also require specialized repairmen.\nThe most dangerous type of rip is located at the top surface near the leading edge, where most of the aerodynamical force is created and where the highest wing loadings are.\nThe line sheathing rips are not dangerous, unless the line core is damaged too. It is possible to join temporarily the broken sheathing ends by gluing them with a sticker. Still, these lines should be replaced sooner as they're vulnerable to further damage and environmental influences. The damaged line is replaced with an identical supplied by the producer or made by a specialist according to the producer specifications and after a symmetry check with the other semi wing.\nTying up a broken line is not allowed because knots can reduce the strength by up to 40% and because the shortening of lines changes the profile and compromises the safety.\nPartly torn or worn out risers or speed system elements have to be replaced completely.\nDeformed or non-operational elements like mayons, carabineers or pulleys have to be replaced."
] | [
"<urn:uuid:3f527f1e-402a-4277-8b9d-4d441e780dc4>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.skynomad.com/articles/paraglider_construction.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319575.19/warc/CC-MAIN-20170622135404-20170622155404-00546.warc.gz"
] | [
"en"
] | [
0.9399412274360657
] | [
3528
] | [
3.734375
] | [
4
] |
[
"The theme of land-use changes is important in all the key areas. Insight into political, social and cultural driving forces is necessary to enable sustainable land use at an overarching level.\nLand use is imperative to the development of sustainable cities; for example, through higher densities and mixed-use development and through the influence of green structures in urban areas on the population's health and welfare.\nLand-use changes represent the most important driving force for changes in biodiversity and ecosystem services, both globally and nationally. Land use is also an issue in environment and sustainability analysis; for example, in ecological footprint analysis.\nHow does the current land use in Norway and in developing countries support sustainability? How to change politics and institutional frameworks to support sustainable land use?\nSustainable urban and regional development:\nHow to plan urban land use including infrastructural systems with least impact on nature and food and fuel security and in support of sustainable development for societies in Norway and in developing countries.\nBiodiversity and ecosystem services:\nHow does land use affect biodiversity (through management, fragmentation, degradation, restoration, conservation and land abandonment) and ecosystem services (food and fuel security, soils, water, and climate regulation).\nEnvironmental and sustainability analyses:\nLand use mapping with GIS tools should be used together with spatial modelling of population dynamics (biodiversity and human populations) and ecosystem service distributions and accessibility.\nThu, 14 Jan 2016 13:23:31 +0100"
] | [
"<urn:uuid:3f0f95e1-5d96-4ee6-aeae-96ea3f49b46c>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.ntnu.edu/sustainability/land-use"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320209.66/warc/CC-MAIN-20170624013626-20170624033626-00187.warc.gz"
] | [
"en"
] | [
0.8893222808837891
] | [
296
] | [
3.5
] | [
4
] |
[
"In its simplest context, Central Banks are responsible for overseeing the monetary system for a nation (or group of nations); however, central banks have a range of responsibilities, from overseeing monetary policy to implementing specific goals such as currency stability, low inflation and full employment.\nCentral banks also generally issue currency, function as the bank of the government, regulate the credit system, oversee commercial banks, manage exchange reserves and act as a lender of last resort.\nThere are eight major central banks today:\n- US Federal Reserve Bank (US)\n- European Central Bank (EUR)\n- Bank of England (GBP)\n- Bank of Japan (JPY)\n- Swiss National Bank (CHF)\n- Bank of Canada (CAD)\n- Reserve Bank of Australia (AUD)\n- Reserve Bank of New Zealand (NZD)\nCentral Banks and Interest Rates\nThe balancing act of stable employment and prices is a tricky one, and the main mechanism a central bank has to regulate these levels is interest rates. Interest rates are a primary influencer of investment flows.\nThe reason for either raising or lowering the interest rate and why it has an influence is easy to see when you really think about it. Consider for a moment an economic environment where banks are concerned about the economy and are hesitant to loan money out of fear of not being paid back.\nIf interest rates are high, the safer option would be to keep the money and only loan to those whom they feel would pay back the loan at a high interest rate. An environment of this kind would make it difficult for small businesses that don’t have credit history to borrow money. Plus a higher cost to borrow may dissuade businesses from borrowing. The same would be true for individuals looking to buy houses.\nIf the same economic scenario were presented but interest rates were low, banks may feel that taking the risk in loaning to less-than-impeccable businesses is worth it, particularly since they could also borrow money from the central bank at extremely low rates. This would also lower the interest rates for buying a home.\nBusinesses borrowing money to grow their bottom line and individuals buying homes are two vital keys to a growing economy, and central banks typically try to encourage it. However, there are times when it gets a little out of control and too much risk is being taken, which can lead to painful economic downturns.\nCentral banks attempt to balance the needs of businesses and individuals by managing interest rates.\nHow interest rates influence traders\nTraders are influenced by the rates at central banks as well. When buying one currency against another in a forex transaction, you are essentially taking ownership of that currency using the counter currency as the funds of your transaction. For instance, of you are buying the NZD/JPY (New Zealand Dollar/Japanese Yen), you are borrowing JPY to buy NZD. If you borrow, you pay the borrowing cost (interest rate) to get those funds, but on the flipside, you are earning interest on that which you bought. If the JPY has an interest rate of 0.10% and the NZD has interest rate of 2.50%, you are earning more interest than you are paying for the transaction.\nSome investors take a long-term approach of borrowing low interest rate currencies and buying those with high interest rates, a strategy called the “carry trade.” While the carry trade can be profitable, when only considering the interest earned it is typically negligible. The values of the currencies against one another plays a much bigger role in the day-to-day profitability of the position, and can far outweigh any interest earned.\nThis is a term referring to a central bank that is either talking about or actually raising interest rates.\nThis is a term referring to a central bank that is either talking about or actually cutting interest rates.\nThis is a method of cutting interest rates where a central bank will cash in some of its holdings and buy bonds; most of the time these bonds are long term. By entering into the long-term bond market, they are increasing demand for those bonds therefore driving down the interest earned on them. The goal of such a measure is to keep interest rates low to encourage more borrowing.\nWant more? Check out the additional educational material we offer to help you achieve your goals."
] | [
"<urn:uuid:74220739-9623-45af-91bf-d46728f6c690>"
] | [
"CC-MAIN-2017-26"
] | [
"https://www.forex.com/jp/forex-lab/themes/country-currency-and-economic-news/central-banks"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319902.52/warc/CC-MAIN-20170622201826-20170622221826-00464.warc.gz"
] | [
"en"
] | [
0.9669536352157593
] | [
883
] | [
3.609375
] | [
4
] |
[
"Agriculture in the Classroom Grants\nThe purpose of this grant is to strengthen state programs by funding innovative ideas and outreach strategies to increase agricultural literacy among K-12 teachers and their students. Ag in the Classroom can enhance Farm to School activities by providing curriculum to connect students to the food in the cafeteria.\nFunding for Farmers\nAgriculture and Food Research Initiative (AFRI)\nThe Agriculture and Food Research Initiative (AFRI) encompasses several different program areas which cover a broad array of issues and topics important to U.S. agriculture. The Requests for Applications will provide detailed information on the year’s Program Area Priorities. Although AFRI projects must fit specific program areas, grant awards have been used to develop market and pricing strategies for small and medium scale farms which may help foster relationships between institutional buyers and farmers.\nBeginning Farmer and Rancher Development Program (BFRDP)\nThe 2008 Farm Bill appropriated $75 million for fiscal years 2009 to 2012 to fund a Beginning Farmer and Rancher Development Program (BFRDP) that supports the nation’s beginning farmers and ranchers. The purpose of BFRDP is to develop and offer education, outreach. This program can be used to train new farmers on how to work with school markets. Several projects have been funded that promote collaboration and sustainability, which may include teaching farmers about institutional buyers and how to include school markets as part of the farmers’ long-term plan.\nFarm Loan Programs\nFarm Service Agency (FSA) provides several different loan programs, guaranteed and direct, that range from farm ownership to operating loans. FSA has specific loans for youth, beginning farmers and ranchers, socially disadvantaged farmers, and emergency loans. Many of the loans can be used to improve or construct facilities and purchase equipment.\nFarm Storage Facility Loan (FSFL) Program\nThe Farm Service Agency Farm Storage Facility Loan (FSFL) Program provides low-interest financing for producers to build or upgrade farm storage and handling facilities. Producers could construct a cold-storage or packaging facility that may help meet the needs of local school districts.\nFarmers Market Promotion Program (FMPP)\nThe Farmers Market Promotion Program (FMPP) is an annual, competitive grant program designed to assist eligible entities in promoting the domestic consumption of agricultural commodities by expanding direct producer-to-consumer marketing opportunities. FMPP has supported farmers’ markets on school campuses and provided educational programs on growing, purchasing, and preparing local foods in after-school programs.\nRisk Management Education and Community Outreach Partnerships Program\nThe Education and Community Outreach Partnership Program provides aid to farmers in developing risk management strategies to improve their farm viability. This program may help farmers learn how to include institutional buyers as a risk management strategy and create management education opportunities on direct market strategies for producers of specialty crops.\nSmall Socially-Disadvantaged Producer Grant (SSDPG)\nFormerly known as the Small, Minority Producer Grant Program, the primary objective of the Small Socially-Disadvantaged Producer Grant (SSDPG) is to provide technical assistance to small, socially-disadvantaged agricultural producers through eligible cooperatives and associations of cooperatives. Grants are awarded on a competitive basis. These grants could help producer cooperatives develop infrastructure to process and distribute local produce to schools.\nSpecialty Crop Block Grant (SCBG)\nThe Specialty Crops Competitiveness Act of 2004 authorized USDA to provide grants to states to enhance the competitiveness of specialty crops. These crops include fruits, vegetables, tree nuts, dried fruits, horticulture, and nursery crops (including floriculture). Numerous producers have received Specialty Crop Block Grant (SCBG) funding to assist with their Farm to School efforts, including Good Agriculture Practices/Good Handling Practices (GAP/GHP) cost sharing and food distribution improvements.\nSustainable Agriculture Research and Education (SARE) Program\nThe Sustainable Agriculture Research and Education (SARE) Program offers several funding opportunities for producers. SARE's mission is to advance innovations that improve profitability, stewardship and quality of life by investing in groundbreaking research and education of American agriculture. For example, SARE grants have been used for funding Farm to School research and education projects, increasing the amount of local produce in schools, expanding direct marketing opportunities for farmers, and developing processing and storage infrastructure to aid Farm to School activities.\nSmall Business Innovation Research (SBIR)\nThe National Institute of Food and Agriculture (NIFA) awards these grants to qualified small businesses to support high quality, advanced concepts research related to important scientific problems and opportunities in agriculture that could lead to significant public benefit if successful.\nSpecialty Crops Research Initiative (SCRI)\nThe Specialty Crop Research Initiative (SCRI), which is administered by USDA’s National Institute of Food and Agriculture (NIFA) was established to solve critical industry issues through research and extension activities. Projects must address one of five focus areas: 1) Research in plant breeding, genetics, and genomics to improve crop characteristics; 2) Efforts to identify and address threats from pests and diseases, including threats to specialty crop pollinators; 3) Efforts to improve production efficiency, productivity, and profitability over the long term; 4) New innovations and technology, including improved mechanization and technologies that delay or inhibit ripening; and 5) Methods to prevent, detect, monitor, control, and respond to potential food safety hazards in the production and processing of specialty crops.\nOrganic Agriculture Research and Extension Initiative (OREI)\nThe Organic Agriculture Research and Extension Initiative (OREI) seeks to solve critical organic agriculture issues, priorities, or problems through the integration of research and extension activities. OREI is particularly interested in projects that emphasize research and outreach that assist farmers and ranchers with whole farm planning.\nFunding for Community\nBusiness and Industry (B&I) Guaranteed Loan Program\nThe purpose of the Business and Industry (B&I) Guaranteed Loan Program is to improve, develop, or finance business, industry, and employment, as well as improve the economic and environmental climate in rural communities. A borrower may be a cooperative organization, corporation, partnership, or other legal entity organized and operated on a profit or nonprofit basis, an Indian tribe, a public body, or an individual. A borrower must be engaged in or proposing to engage in a business that will provide employment and improve the economic or environmental climate. These loans could support Farm to School efforts by financing new facilities and equipment necessary to process local products.\nCommunity Food Projects Competitive Grants Program\nCommunity Food Projects are designed to increase food security in communities by bringing the whole food system together to assess strengths, establish linkages, and create systems that improve the self-reliance of community members over their food needs. The Competitive Grants Program offers an opportunity for communities to collaborate and integrate Farm to School activities into their daily lives.\nFederal-State Marketing Improvement Program (FSMIP)\nThe Federal-State Marketing Improvement Program (FSMIP) is a competitive matching grant program open to state government agencies and agricultural experiment stations to support marketing research and technical assistance projects, and has historically provided a significant share of USDA funding for Farm to School efforts. For example, FSMIP grants have helped develop local, value-added products that meet the nutritional and cost requirements of the National School Lunch Program and increase local protein options available in institutions.\nRural Business Enterprise Grants (RBEG)\nThe Rural Business Enterprise Grants (RBEG) supports the development of physical infrastructure and facilities, including food processing, marketing and distribution business ventures for locally-grown agricultural products. There is no required maximum level of grant funding; however, smaller projects are given higher priority. One example of a RBEG grant includes the development of a “Mobile Harvest Unit”. Funds were used to print brochures, develop a website, conduct a producer survey and feasibility study, develop safety standards and obtain permits.\nRural Business Opportunity Grants (RBOG)\nRural Development’s Rural Business Opportunity Grants (RBOG) support training and technical assistance for business development, which includes support for food processing, marketing, distribution and business development of locally-grown agricultural products. Eligible activities include research, feasibility studies, business planning, marketing, training and technical assistance.\nTeam Nutrition Grants\nThe purpose of the Team Nutrition Grant is for state agencies to expand and enhance their training programs that incorporate and implement the Dietary Guidelines for Americans and USDA Foods in meals served in the Child Nutrition Programs. States must apply Team Nutrition’s three behavior-focused strategies, which are: 1) provide training and technical assistance to school nutrition food service professionals to enable them to prepare and serve nutritious meals that appeal to students; 2) provide fun and interactive nutrition education for children, teachers, parents and others caregivers; and 3) build school and community support for creating healthy school environments that are conducive to healthy eating and physical activity.\nValue-Added Producer Grants (VAPG)\nAgricultural product that has undergone a change in physical state or was produced, marketed, or segregated (e.g., identity-preserved, eco-labeling, etc.) in a manner that enhances its value or expands the customer base of the product is considered a value-added product. The Value-Added Producer Grants (VAPG) may be used to fund one of the following two activities: 1) develop business plans and feasibility studies (including marketing plans or other planning activities) needed to establish viable marketing opportunities for value-added products; or 2) acquire working capital to operate a value-added business venture or alliance. For example, one grantee developed a value-added milk product to offer to local school districts and another used funds to process no-till wheat into flour and marketed the product to schools."
] | [
"<urn:uuid:c3985951-9b63-4194-8e78-c50752656455>"
] | [
"CC-MAIN-2023-06"
] | [
"https://www.fns.usda.gov/f2s/other-usda-grant-opportunities"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499845.10/warc/CC-MAIN-20230131055533-20230131085533-00589.warc.gz"
] | [
"en"
] | [
0.9349451661109924
] | [
2005
] | [
3.046875
] | [
3
] |
[
"What brainwave is best for focus?\nGamma. Your brain produces the speediest of brain waves, the gamma waves, when you’re actively involved in processing information and learning. You’re concentrating and solving problems, and these brainwaves, which tend to measure upward of 35 Hz, are the proof.\nWhat Hz is best for focus and concentration?\nSome consider 18.5 Hz in particular to be an optimal frequency for focus and concentration. Beta 3 (~ 23 Hz – 40 Hz): This fast beta activity, especially in its higher range has been associated with hyper-arousal/hyper-vigilance, anxiety, stress, paranoia, excessive energy and ‘burnout’.\nWhat is brainwave meditation?\nMeditation research explores how the brain works when we refrain from concentration, rumination and intentional thinking. Electrical brain waves suggest that mental activity during meditation is wakeful and relaxed.\nHow do you induce alpha brain waves?\nYour alpha brainwaves are most commonly associated with focus and being in a meditative state….Here are five ways to increase your alpha brainwaves:\n- Avoid alcohol.\n- Avoid caffeine.\n- Train your brain.\n- Consider avoiding garlic and onions.\nWhat frequency is best for your brain?\n6 Hz beat enhances all area of the brain within 10 minutes. 8 Hz and 25 Hz beats have no clearly responses while 40 Hz beat enhances the responses in frontal lobe. These brain responses can be used for brain modulation application to induce the brain activity in further studies.\nWhat happens to your brain waves when you meditate?\nDuring meditation, the brain shows theta waves predominantly. These waves are associated with a relaxed state of mind as compared to alpha waves, which are associated with an aroused state of mind.\nWhat frequency is meditation?\nThe sound vibrations of Earth’s electromagnetic field, deep space, and people in deep meditative states all resonate at a frequency of approximately 7.8 Hz. We normally function at Beta state, approximately 12-16 Hz.\nIs it better to meditate with or without binaural beats?\nBe aware that some are better than others and that binaural beats meditations are not a one-size-fits-all remedy. For example, lower ranges are best for relaxation and pain reduction, while higher frequency beats in the beta and gamma range are useful for memory improvement. We recommend Binaural Beats Meditation."
] | [
"<urn:uuid:5ea7f73d-7edc-41f2-b997-efaa8428e250>"
] | [
"CC-MAIN-2023-06"
] | [
"https://thisisbeep.com/what-brainwave-is-best-for-focus/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500044.16/warc/CC-MAIN-20230203055519-20230203085519-00226.warc.gz"
] | [
"en"
] | [
0.9066663384437561
] | [
504
] | [
2.734375
] | [
3
] |
[
"The COVID-19 pandemic has shown how vulnerabilities in health systems can have profound implications for health, economic progress, trust in governments, and social cohesion.\nContaining and mitigating the spread and infection rate of the virus continue to be essential. But so is strengthening the capacity of health systems to respond swiftly and effectively. This includes administering COVID-19 vaccines. After lightening speed development and testing, vaccine campaigns are rolling out in many countries. But questions about production, delivery and equitable access remain, not least for low and middle-income countries.\nThis page features the latest OECD work on the impact of COVID-19 on a range of social issues, along with OECD recommendations and policy advice on how to build back better for everyone.\nAll OECD COVID-19 Policy Briefs are available at http://www.oecd.org/coronavirus/en/#policy-responses.\nFollow us on Twitter via @OECD_Social"
] | [
"<urn:uuid:45bd874e-e678-47e8-8b62-ee5802499378>"
] | [
"CC-MAIN-2023-06"
] | [
"https://search.oecd.org/social/covid-19.htm"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499646.23/warc/CC-MAIN-20230128153513-20230128183513-00329.warc.gz"
] | [
"en"
] | [
0.8864054679870605
] | [
211
] | [
2.625
] | [
3
] |
[
"Most cities evolved based on centuries of complex economic and cultural forces. But what would it look like if that process were reversed? That's the concept behind Generating Utopia, a program that turns a user's location-based data into a sprawling, Rio de Janeiro-style cityscape.\nGerman interaction designer Stefan Wagner wrote the script, which he describes as a way to show what cities would look like if they were based on the behavior of their residents. In other words, he's reverse engineering the urban planning process. Here's how it works: After pulling your check-in data from Foursquare's API, the custom-built Processing script applies those data points to an OpenStreetMap model of the city where you live. It extrudes the flat surface based on the number and frequency of check-ins, creating an animation of a city that mimics your actual movements through the city.\nAs Wagner points out, check-in data is inherently self-selected based on the true layout of your city. So what we're seeing here is really a topographic map of the way you already move about an urban cityscape, rather than a coherent alternative map. \"From this, one can see in what different ways persons are using their city,\" says Wagner. \"Respectively what they want their social environment to think they do.\" Right now, the script is just a one-off project of Wagner's, but let's hope he makes it public. You'd be surprised how dramatic all those boring repeat check-ins at the same three restaurants near you house will look as a rugged cityscape. [CreativeAppications]"
] | [
"<urn:uuid:1db89490-fc94-4db2-9d94-7e3819385e2b>"
] | [
"CC-MAIN-2017-26"
] | [
"http://gizmodo.com/what-would-a-city-based-on-your-foursquare-data-look-li-1307212739"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128322870.59/warc/CC-MAIN-20170628050821-20170628070821-00433.warc.gz"
] | [
"en"
] | [
0.9647805094718933
] | [
332
] | [
2.75
] | [
3
] |
[
"The main problem with making a WhatsApp hyperlink HTML is that WhatsApp does not allow links to be embedded in messages.\n<a href=\"whatsapp://send?text=Hello%20World!\">Send WhatsApp Message</a>\nThis code line creates a hyperlink that, when clicked, will open a new WhatsApp message with the text “Hello World!” already entered.\nHyperlinks for Whatsapp\nAn hyperlink is a reference to a location on the World Wide Web. When you click on the hyperlink, you are taken to the website or page that the hyperlink points to. Hyperlinks are used in HTML documents to link text and images together.\nTo create a hyperlink in HTML, use the “<a>” tag. The “<a>” tag has three attributes: href, target, and title. The href attribute specifies the URL of the web page that you want to link to. The target attribute specifies which web browser should open the link when someone clicks on it. The title attribute provides a brief description of what the link leads to.\nTo create an image hyperlink, use the <img /> tag. The <img /> tag has four attributes: src, alt, width, and height. The src attribute specifies where you want to find an image file on your computer. The alt attribute provides a brief description of what the image is called. The width and height attributes specify how large (in pixels) the image should be when it is displayed in a web browser window."
] | [
"<urn:uuid:37345638-b0bd-4802-987e-303753fa745a>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.sourcetrail.com/html/how-to-make-a-whatsapp-hyperlink/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945292.83/warc/CC-MAIN-20230325002113-20230325032113-00162.warc.gz"
] | [
"en"
] | [
0.7470429539680481
] | [
316
] | [
3.125
] | [
3
] |
[
"Part 1 – define key terms.\nProcesses of plate tectonics: subduction, seafloor spreading\nPlate Boundaries: convergent, divergent, transform\nPart 2 – complete interactive learning and game.\nPart 3 – Continental Drift Summary\nRead or interact with these brief summaries of Continental Drift Theory and how it pertains to dinosaurs.\nPart 4 – construct a video (in partners) explaining tectonic processes\nThe video should use props of your choosing and be published to Flipgrid."
] | [
"<urn:uuid:4da97ab9-2c32-4250-ac5f-001b6a6f3808>"
] | [
"CC-MAIN-2023-06"
] | [
"https://kylemcintosh.ca/paleontology-15-plate-tectonics/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499890.39/warc/CC-MAIN-20230131190543-20230131220543-00088.warc.gz"
] | [
"en"
] | [
0.7380279302597046
] | [
106
] | [
3.09375
] | [
3
] |
[
"Today fin whales were constantly travelling. Did you know that baleen whales (Balaenopteridae) are among the fastest cetaceans?? Their hydrodynamic body shape allows them to travel up to 25 miles per hour (~50 km/h)! Travelling thousands of miles between their breeding and feeding grounds becomes easier with these speeds.\nWe have great news today! Analyzing our humpback whale photos of this season, we've found that one of the whales sighted last month, has been sighted here also last year! Probably it was travelling north, as it was seen again in July and September 2016 in Iceland, where food for them should be available in summer.\nWith our daily work we are discovering step by step a little bit more about our gentle giants.\nPhotos from today:\n|Balaenoptera physalus | Fin whale|\n|Caretta caretta | Loggerhead turtle|\nPhoto of our re-sighted humpback:\n|Megaptera novaeangliae | Humpback whale|\nPhoto taken on one of our April tours"
] | [
"<urn:uuid:efc24e1f-0012-4cb2-9915-30d6f6cbb644>"
] | [
"CC-MAIN-2017-26"
] | [
"http://azoreswhales.blogspot.com/2017/05/another-fine-day.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320669.83/warc/CC-MAIN-20170626032235-20170626052235-00328.warc.gz"
] | [
"en"
] | [
0.9496636390686035
] | [
224
] | [
3.1875
] | [
3
] |
[
"This tree is a Wollemi Pine. The Wollemi Pine is a very old and rare plant, and its history can be found at the Wollemi Pine website. This specimen is privately owned and is kept in a conservatory in the West of Scotland. In the warmth of the conservatory it is growing very fast, and the new growth at the end of each branch can be seen clearly. The new light green section at the end of each branch shows in stark contrast to the darker green of the older branch section. The tree is about 4 feet tall.\nThis photo show the branch in close-up so that the new light green and older dark green growth can be seen clearly.\nIn very new growth the leaves are curled up, but the straighten out as they mature, so that the whole structure ends up flat.\nOver winter the apical meristem produced a clear covering which seemed to protect it from above. This also appeared on the end of each branch.\nWhen the branches began to grow in spring the clear covering was broken through and the remains of it can still be seen at the junction between the old and new growth."
] | [
"<urn:uuid:aa065a2f-3658-4680-a016-08df22086441>"
] | [
"CC-MAIN-2017-26"
] | [
"http://theitinerantbotanist.blogspot.com/2014/05/the-wollemi-pine.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320539.37/warc/CC-MAIN-20170625152316-20170625172316-00387.warc.gz"
] | [
"en"
] | [
0.9696804881095886
] | [
235
] | [
2.6875
] | [
3
] |
[
"The Henry Clay Frick Business Records contains material reflecting the business and financial activities of Henry Clay Frick (1849–1919) with particular relevance to Pittsburgh and the western Pennsylvania region. These materials highlight Frick’s ascent into prominence during a period of American industrial growth in the late nineteenth and early twentieth century. The resources range from Frick’s first businesses, including his first coal firm, H.C. Frick & Company, to correspondence between Frick and Andrew Carnegie, which also includes Frick’s negotiations that facilitated the mega merger that formed United States Steel Corporation in 1899. The material also addresses aspects of business specific to the late ninetieth century coke industry, including bituminous coal mining, beehive ovens, and railroad transportation.\nThe Henry Clay Frick Business Records contain 29 series that date from 1881 to 1987; the majority of the materials date from 1881 to 1914, when Frick was most active in the coal and steel industry in Pittsburgh. The majority of the material is categorized into four types of records: administrative material, financial records, legal material, and ephemeral items. The administrative material are generally made up of correspondence, letterpress copybooks, memoranda, invoices, company charters, meeting minutes, by-laws, deeds, contracts, certificates, pamphlets, proposals, specifications, labor costs, property assessments, building construction records, architectural drawings, blue prints, newspaper clipping scrapbooks, atlases, and plat maps. The financial records consist of receipts, reports, statements, stock accounts, taxes, bills, lease matters, rent and building costs, cashbooks, sales journals, accounts payable receipts, mortgages, estate/property values, as well as profit and loss statements. There is a small amount of legal material which has records of court cases, case notes, court rulings, and attorney services. The ephemera items include keys, stone samples, printing plates, and post cards. Further description is available at the series and subseries level."
] | [
"<urn:uuid:d8c50f8f-f57e-475d-8e72-3394065443ef>"
] | [
"CC-MAIN-2017-26"
] | [
"http://digital.library.pitt.edu/cgi-bin/f/findaid/findaid-idx?type=simple;c=ascead;view=reslist;subview=standard;didno=US-PPiU-ais200206;focusrgn=scopecontent;cc=ascead;byte=25534240"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323721.80/warc/CC-MAIN-20170628171342-20170628191342-00422.warc.gz"
] | [
"en"
] | [
0.9223533272743225
] | [
415
] | [
2.640625
] | [
3
] |
[
"Epidemiology and Public Health\nThe group uses epidemiological methods to study the aetiology, vigilance and efficacy of interventions, among fields of interest. It focuses on three main areas. In epidemiology and prevention of infections associated with healthcare, it analyses aspects related to the evolution, characteristics, associated risk factors, hosts, and the impact of these infections.\nOne of the group’s other research pillars is looking into new preventive vaccines. It is investigating pre-pandemic and pandemic flu vaccines and their ability to provoke an immune response, as well as seasonal flu vaccines. They are also researching the efficacy of the human papillomavirus or shingles vaccine and its ability to provoke an immune response, in immunosuppressed patients, among others.\nFinally, the group also contributes to epidemiology knowledge and prevention of infectious diseases such as chicken pox, tuberculosis and whooping cough."
] | [
"<urn:uuid:e929b2a8-75a0-4d94-b617-19e3052ac5c0>"
] | [
"CC-MAIN-2020-05"
] | [
"https://www.vallhebron.com/en/research-groups/epidemiology-and-public-health"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250591763.20/warc/CC-MAIN-20200118023429-20200118051429-00391.warc.gz"
] | [
"en"
] | [
0.9311143159866333
] | [
185
] | [
2.765625
] | [
3
] |
[
"With so many technical terms to contend with in telecommunications we wanted to put together a glossary to help out. A lot of people we deal with are experts but we think there might be a couple of terms even they don’t know in there. Let us know if you think we missed any!\nThe amount of attenuation from the conversion of optical power to heat in fibre optical cable.\nCharacteristic of the attenuation of an optical fibre per unit length, measured in dB/km.\nThe reduction in optical power as it passes along a fibre, usually expressed in decibels (dB).\nA device that reduces the signal power in a fibre optic link by inducing loss.\nThe scattering of light in a fibre back toward the source, used to make OTDR measurements.\nThe range of signal frequencies or bit rate that a fibre optic component, link or network will operate within.\nThe loss in fibre caused by stress on the fibre being bent around a prohibitive radius.\nBit-Error Rate (BER)\nThe amount of data bits transmitted and then received in error.\nA protective coating applied to the fibre.\nThe spreading of a pulse in an optical waveguide over time. This is caused by the wavelength’s dependence on the velocities of light.\nThe coating over the core of the fibre that “traps” light into the core.\nAn optical device that splits or combines light from more than one fibre.\nA technique for measuring the loss of bare fibre. First, the optical power transmitted through the fibre is measured. Then cutting back to the source, measuring the initial coupled power.\nThe wavelength beyond which singlemode fibre only supports one mode of propagation.\nOptical power referenced to 1 milliwatt.\nA unit of measurement of optical power which indicates relative power on a log scale, sometimes called dBr.\nA photodiode that converts optical signals to electrical signals.\nThe temporal spreading of a pulse in an optical waveguide. Can brought on through modal or chromatic effects.\nErbium-doped fibre amplifier, an all optical amplifier for 1550 nm SM transmission systems.\nEdge-Emitting Diode (E-LED)\nA LED that emits from the edge of the semiconductor chip, producing higher power and narrower spectral width.\nThe quality of the end surface of fibre prepared for splicing or termination.\nThe amount of light lost in a coupler, beyond the inherent loss in splitting to multiple output fibres.\nAn all optical amplifier that increases signal output power without electronic conversion.\nAn instrument that couples visible light into the fibre to allow visual checking of continuity and tracing for correct connections.\nA device that clamps onto a fibre and couples light from the fibre by bending. It identifies the fibre and detects the high-speed traffic of an operating link.\nLight transmission through flexible transmissive fibres for communications or lighting.\nFibre Optic Link\nA combination of transmitter, receiver and fibre optic cable connecting them so they are capable of transmitting data. May be analogue or digital.\nAn instrument that splices fibres by fusing or welding them, usually by electrical arc.\nGraded Index (GI)\nA type of multimode fibre which uses a graded profile of refractive index in the core material to correct for dispersion.\nIndex of Refraction\nA measure of the speed of light within a material.\nIndex Matching Fluid\nA liquid used to match the materials at the ends of two fibres which reduces loss and back reflection.\nThe refractive index of a fibre as a function of cross section.\nThe loss caused by inserting a component such as a splice in an optical fibre.\nThe protective outer coating of the cable.\nA short single fibre cable with connectors on both ends used for interconnecting other cables or testing.\nLaser Diode or Injection Laser Diode\nA semiconductor device that emits high powered, coherent light when stimulated by an electrical current. Used in transmitters for singlemode fibre links.\nA jumper cable attached to a source and calibrated for output power used as a reference cable for loss testing. This cable is made from fibre and connectors of a matching type to the cables to be tested.\nA term used to describe light in the 1300 and 1550 nm ranges.\nThe greatest amount of loss that a link can tolerate.\nA semi-permanent connection between two fibres made with an alignment device and index matching fluid or adhesive.\nThe temporal spreading of a pulse in an optical waveguide caused by modal effects.\nMode Field Diameter\nA measure of the core size in singlemode fibre.\nA device that removes optical power in higher order modes in fibre.\nA device that mixes optical power in fibre to achieve equal power distribution in all modes.\nA device that removes light in the cladding of an optical fibre.\nA single electromagnetic field pattern that travels through fibre.\nA fibre with a core diameter much larger than the wavelength of light transmitted. It allows many modes of light to propagate. Commonly used with LED sources for lower speed, short distance links.\nNumerical Aperture (NA)\nA measure of the light acceptance angle of the fibre.\nA device that amplifies light without converting it to an electrical signal.\nAn optical waveguide comprised of a light carrying core and cladding which traps light in the core.\nThe amount of optical power lost as light when transmitted through fibre, splices or couplers.\nOptical Loss Test Set (OLTS)\nA measurement instrument for optical loss that includes both a meter and source.\nThe amount of radiant energy per unit of time. It’s expressed in linear units of Watts or on a logarithmic scale. It can be declared in dBm (where 0 dB = 1 mW) or dB (where 0 dB = 1 µW).\nOptical Return Loss\nThe Light reflected from the cleaved or polished end of a fibre. Caused by the difference of refractive ratio of air and glass, usually 4% of the incident light. Expressed in dB relative to incident power.\nA device that routes an optical signal from one or more input ports to one or more output ports.\nOptical Time Domain Reflectometer (OTDR)\nAn instrument that uses backscattered light to find faults in optical fibre and therefore infer loss.\nA semiconductor that converts light to an electrical signal, used in fibre optic receivers.\nA short length of fibre attached to a fibre optic component such as a laser or coupler.\nPlastic Optical Fibre (POF)\nAn optical fibre made of plastic.\nPlastic-clad Silica (PCS) fibre\nA fibre made with a glass core and plastic cladding.\nThe difference between the transmitted optical power and the receiver sensitivity. Measured in dB and dBm, respectively.\nPower Meter, Fibre Optic\nAn instrument that measures optical power emanating from the end of a fibre cable.\nThe large diameter glass rod which fibre is drawn from.\nA fibre optic jumper cable attached to a power meter used as a reference cable for loss testing. This cable must be made of fibre and connectors of a matching type to the cables to be tested.\nA device which uses a photodiode and signal conditioning circuitry to convert light to an electrical signal in fibre optic links.\nA property of optical materials that relates to the velocity of light in the material.\nA device that receives a fibre optic signal and repeats it for retransmission, used in very long fibre optic links.\nThe change of direction of light after striking small particles that causes loss in optical fibres.\nA commonly used term for light in the 665, 790, and 850 nm ranges.\nA fibre with a small core, only a few times the size of the wavelength of light transmitted. It only allows one mode of light to propagate. Most commonly used with laser sources for high speed, long distance links.\nA laser diode or LED used to inject an optical signal into fibre.\nA device that provides a connection between two fibres, usually designed to be permanent.\nThe distribution of power between the output fibres of a coupler.\nStep Index Fibre\nA multimode fibre where the core is the same index of refraction.\nSurface Emitter LED\nAn LED that emits light perpendicular to the semiconductor within it.\nA comms device that allows conversation over unused fibres.\nA short single fibre jumper cable with connectors on both ends used for testing. This cable must be made of fibre and connectors of a matching type to the cables being tested.\nAn LED or laser diode used to inject an optical signal into a fibre for testing the loss of the fibre or other components.\nTotal Internal Reflection\nThe confinement of light in the core of a fibre by the reflection off the core-cladding boundary.\nA device which includes an LED or laser source and signal conditioning electronics that are used to inject a signal into fibre.\nVertical Cavity Surface Emitting Laser\nVCSEL is a type of laser that emits light vertically from the chip instead of from the edge.\nVisual Fault Locator\nA device that couples visible light into the fibre to allow for visual tracing and the testing of continuity. If bright enough they can be used to find breaks in fibre through the cable jacket.\nA measure of the colour of light, usually expressed in nanometres (nm) or micrometre (μm).\nWavelength Division Multiplexing (WDM)\nA technique where signals of different wavelengths of light are sent into the fibre all at once.\nThe difference between the power budget and the loss budget, measured in dB."
] | [
"<urn:uuid:3bc4ebf1-133d-4cd3-805e-c36dfccfbf46>"
] | [
"CC-MAIN-2023-06"
] | [
"https://www.grahamsmithuk.com/83-fibre-optic-terms-you-need-to-know/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499826.71/warc/CC-MAIN-20230130165437-20230130195437-00128.warc.gz"
] | [
"en"
] | [
0.8672064542770386
] | [
2310
] | [
3.671875
] | [
4
] |
[
"Tallest in the world for 41 years and saved by King Kong…\nLocation: 350 5th Ave between 33rd and 34th Streets\nArchitect: William F. Lamb of Shreve, Lamb & Harmon\nThe first in the world to rise over 100 stories, and constructed in mere 14 months, the Empire State Building stood as the tallest in the world for 41 years.\nStunning in both its height and Art Deco simplicity, the building rises in a series of setbacks ending with a bold tower, which was originally intended as a mooring dock for dirigibles.\nBilled as the Eighth Wonder of the World at its opening, the Empire State Building broke records as the tallest in the world, the first to have more than 100 stories, and the one to be constructed in a record time of one year and forty-five days.\nIn 1955 The American Society of Civil Engineers selected the Empire State Building as one of the seven greatest engineering achievements in the world.\nCompleted in 1931, during the Great Depression, it stood largely vacant and became known as the “Empty” building. In a story more unbelievable than a Hollywood movie, it was saved by… a Hollywood movie! After King Kong climbed its spire in the 1933 production, the Empire State observation deck became a major tourist attraction. The income collected from tourists’ visits allowed the owners to pay taxes on the building until the 1950s when the economy turned and the Empire State could function at its intended capacity.\nThese days the Empire State houses 1,000 businesses with about 21,000 people and has its own zip code. The Empire State Building has 2 observation decks, one – on the 86th floor and another on 102nd.\nThe building was officially opened on May 1, 1931, in dramatic fashion, when United States President Herbert Hoover turned on its lights with the push of a button from Washington, D.C.\nIronically, the first use of tower lights atop the Empire State Building in the following year was for the purpose of signaling the victory of Franklin D. Roosevelt over Hoover in the presidential election of 1932.\nIt’s kind of funny now, but in 1961 the Empire State Building was sold to an investment group for $65,000,000. The price was supposedly the highest ever paid for a single building at the time. The reason it’s funny is that there are apartments in New York City today which sell for more than twice as much.\nIn 1964, floodlights were added to illuminate the top of the building at night, with colors chosen to match important events in the life of the city. The colors are chosen to mark major holidays, sporting events, famous personalities, etc. According to its policies, the ESB does not grant lightings for personal requests such as birthdays, anniversaries, commercial or religious events, and political campaigns.\nSince 1978 the Empire State Building has hosted a vertical race to the 86th-floor called the Empire State Run-Up. Participants run the vertical distance of 1,050 feet or 1,576 steps. Some of the recorded times are under 10 minutes!\nThe Empire State owes its survival to the movie King-Kong. The ESB official site lists over a hundred movies featuring the building. Here are some of them:\nThe Amazing Spider-Man\nAn Affair to Remember\nFrench Connection I\nNorth By Northwest\nSleepless in Seattle\nKramer vs. Kramer\nOn the Waterfront\nHeight 1,250′ (381 metres), 1,454′ (449 metres) to tip\nFloors 102 (or 103)\nThe Empire State Building also offers VIPs, celebrities, and dignitaries exclusive access to its 103rd floor.\nStyle Art Deco\n85 stories of commercial and office space\n6,500 windows and 73 elevators\n21,000 people work in the building\n1,860 steps from street level to the top\n70 miles (113 km) of pipes\nLightning hits about 100 times a year\nOn a clear day, visitors can see 80 miles into New York, New Jersey, Connecticut, Pennsylvania, and Massachusetts.\nThe building grew astonishing four-and-a-half stories a week."
] | [
"<urn:uuid:f2f1694e-3a2a-4dfd-841b-a2e4384f556c>"
] | [
"CC-MAIN-2020-05"
] | [
"https://portablenycblog.com/2019/11/23/the-empire-state-building-the-eighth-wonder-of-the-world-saved-by-a-hollywood-movie/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250591763.20/warc/CC-MAIN-20200118023429-20200118051429-00385.warc.gz"
] | [
"en"
] | [
0.9416739344596863
] | [
863
] | [
2.65625
] | [
3
] |
[
"Americans are bombarded daily with messages about our diet, health, and exercise. We receive a constant stream of chatter from the media idolizing a lean and fit body, recommendations to eschew all processed food, or to try the latest and greatest diet. Food is often portrayed as “good” or “bad” and, more often than not, we feel we need to make excuses for why we are eating “bad” food. It usually sounds like “Oh, I ate ‘good’ all day yesterday” or “Tomorrow, I will start my clean eating.” We are told that, by eating the so-called perfect diet, we will be healthier, sleep better, have more energy, be less grumpy, and so on. Who wouldn’t want these things?\nThere is nothing wrong with improving your nutrition for better health, disease protection, or to reach a healthy body weight; however, a line is drawn when nutrition becomes an obsession. In our culture of more, faster, and better, nutrition information can quickly go from guiding principles to a strict diet with no room for error. Nutrition information is meant to guide you, not scare or leave you feeling guilty. It is nutrition over time—not necessarily one meal—that makes or breaks a healthy diet. While there are general guidelines for a healthy diet, an individual’s exercise, health status, and genetic risk for certain diseases may tweak those general guidelines somewhat.\nFor example: someone with high cholesterol may choose to focus on eating a higher amount of soluble fiber based on studies showing that soluble fiber may decrease cholesterol, while a marathon runner may choose to eat a diet higher in sodium before and after a long training run to replace sodium lost through sweat. Using the general guidelines and adapting them for you specifically is a good start to achieving a balanced diet. Eating a healthy diet is important, and I am not proposing you stop doing so; however, if your diet is causing you to avoid social situations, restrict entire food groups, or filling you with guilt and shame after eating certain foods, you may be missing out on a balanced diet.\nObsession with the Quality of Food\nOver the past decade, there has been an increased focus on the quality of the food people eat. Organic food, less processed foods, and local foods are more widely available. This allows people who have personal reasons for choosing those foods the option to do so.\nUnfortunately, this desire to be healthy can sometimes grow into an obsession with the quality of the food eaten. Orthorexia, the obsession with quality of food, is not an official eating disorder, but a term described in 1997 by Steven Bratman, M.D., author of the book Health Food Junkies. People struggling with orthorexia have the best intentions when they begin eating a healthy diet, but the quality of the food and/or the ingredients in the food become increasingly important and, ultimately, an obsession.\nThis obsession with the quality of food starts dictating what can and cannot be eaten and eating intuitively (eating based on hunger and fullness) is disregarded. This restrictive eating pattern helps the person feel in control and, to a certain degree, reduces anxiety—that is, until restraint is broken and a “bad” or “unsafe” food is eaten. Then, backlash begins. There is guilt and perhaps shame associated with the broken diet and rules, causing the individual to try even harder the next time with even more determination and thus the cycle continues, with each cycle becoming increasingly restrictive.\nDr. Bratman noted “most must resort to an iron self-discipline bolstered by a hefty sense of superiority over those who eat junk food. Over time, what they eat, how much and the consequences of dietary indiscretion come to occupy a greater and great proportion of the orthorexic’s day.”\nWhen someone in my private practice expresses concern about their behavior around food, I often ask them how much time they spend thinking about food each day. Answers vary, but one statement is always consistent: the patient realizes his or her thoughts of food are obsessive and leave little time else to enjoy other aspects of life. Consider this example: an individual may initially want to start eating healthy and reduce the amount of pesticides and processed foods eaten. He starts off in a healthy manner, buying organic or local foods when possible and cooking at home more often. Soon, he is only buying organic foods (even if the budget doesn’t allow for the extra expense) and only cooking at home, refusing to dine out or eat at others’ houses because he cannot be assured the food is organic. The individual may even bring his own food to family holiday gathering because of concern about the quality of the food. Also, the person thinks about food for a large part of the day, thoughts such as where he will get organic food, how to pay for it, when he will get to eat again, and how to avoid foods that are non-organic without offending anyone. Soon, even the amount of food this person eats suffers; he has so greatly limited his diet that the options allowed are simply unbalanced.\nPeople can become as equally obsessed with the quantity of the food they are eating as the quality. Most people are familiar with anorexia and bulimia, the first being marked by self-starvation and extreme weight loss and the latter by a pattern of binge eating followed by a purging method such as vomiting, laxative abuse, or over-exercising. In general, the ultimate goal with anorexia and bulimia is weight loss and thus a restrictive diet is adopted, one usually eliminating or drastically reducing a particular item (such as carbohydrates, fat, or “white food”). When the primary goal of weight loss causes the person to avoid social situations, to constantly think about food, or to restrict choices so much she cannot eat anywhere but home, there’s a problem.\nSome may start a diet because of a desire to lose a few pounds and may begin by cutting out carbohydrates. Within a few days or weeks, there are inevitable cravings for the food that has been deemed “bad” or off limits. What happens when someone tells you not to eat something? It’s all you inevitably think about and then crave. If someone says I can’t eat bread, trust me—I am going to be dreaming about bread. This restriction generally leads to eventually eating this “bad” food or sometimes even commencing on a binge of “bad” food. Immediately following this consumption of “bad” food is a feeling of loss of control, shame and guilt, and (sometimes) weight gain. In the end, these feelings and weight gain cause a desire to lose even more weight and regain a sense of control, so ultimately the individual ends up starting her diet again with even more restraint and control. This cycle continues over and over with the dieter continually restricting the amount and type of food eaten all while losing weight.\nI frequently see individuals in my private practice who may not suffer from the diagnostic form of anorexia or bulimia but who toe the line with disordered eating. For example: an individual may start a diet because he is training for a big race and has heard that losing five or ten pounds can shave minutes off his race time. In all good intentions, he sticks to his diet for weeks, maybe longer, and does lose weight; however, performance also starts to suffer from lack of food, usually carbohydrates, and his mental health begins to suffer as well. This patient will come to see me because he can’t quite understand what is going on and why he spends such a large part of the day thinking about food. He doesn’t want to eat with friends who aren’t following a strict diet like he is and every time someone compliments him on his weight loss, the dieter vows to try even harder and stick to the diet no matter what. A lot of the time, this person is at the lowest healthy body weight for that height so, to most other people, he seems to be doing all right. Unfortunately, the stress of following this diet has caused the individual to suffer both mentally and physically, and he knows no way out of this vicious circle. If he quits following the diet, the inevitable will happen; he’ll gain weight and, thus, have “failed.”\nFor a moment, picture yourself enjoying food without judging it as “good” or “bad.” See yourself eating this food without feelings of guilt or worry, using hunger and fullness cues to guide you as to when you start and stop eating. This is what intuitive eating feels like. Does that describe how you eat?\nA balanced diet with food choices based on how food makes you feel and eating based on hunger and fullness, without classifying foods as “good” and “bad,” can lead to a healthy body weight as well as improve your overall relationship with food. This style of eating was coined “intuitive eating” by Evelyn Tribole, M.S., R.D., and Elyse Reich, M.S., R.D., F.A.D.A., C.E.D.R.D, as a way to jump off the dieting bandwagon, whether it is an unhealthy obsession with quality or quantity of food. Their book, Intuitive Eating: a Revolutionary Program that Works, outlines the principles for intuitive eating and I highly recommend it to those who want to change their relationship with food. If you are concerned about your own eating and have questions about whether or not it has become an obsession, a registered dietitian can help you decide and guide you in dietary changes as needed."
] | [
"<urn:uuid:e1d18c59-5c39-4b69-b619-237ec517c40f>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.austinfitmagazine.com/what-happens-when-food-rules-your-world/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943625.81/warc/CC-MAIN-20230321033306-20230321063306-00344.warc.gz"
] | [
"en"
] | [
0.9668593406677246
] | [
2028
] | [
2.640625
] | [
3
] |
[
"The Poetry Prose and Drama Book One: The Old English & Medieval Periods Set includes poems from the Anglo-Saxon Invasion to the Tudor Accession (449-1485). This Set includes Poetry, Prose, & Drama: The Old English & Medieval Periods, the Student Guide, and the Teacher Guide. The anthology contains introductory readings that provide background information and historical context for the works as well as short introductions for each poem. The student book contains notes and instructions to the student, definitions of basic features, and an explanation of how to mark a book as well as pre-reading questions, reading notes, words to be defined, comprehension questions, Socratic discussion questions, and essay prompts. The Teacher Guide features notes and instructions to the teacher, and contains the answers to the questions found in the Student Guide as well as the Tests and Test Key."
] | [
"<urn:uuid:bc527f19-f473-4893-8ea0-6e53b9963a89>"
] | [
"CC-MAIN-2020-05"
] | [
"https://www.memoriapress.com/curriculum/literature-and-poetry/eighth/poetry-prose-drama-set/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250589560.16/warc/CC-MAIN-20200117123339-20200117151339-00221.warc.gz"
] | [
"en"
] | [
0.9223777055740356
] | [
178
] | [
3.125
] | [
3
] |
[
"Soil Science Society of America - Here is a bank of many lessons and hands-on activities all about soils and topics related to soils. These materials include lessons and activities are posted directly by SSSA as well as external links to materials that we have reviewed and recommend. You can search for materials by grade level and/or subject and/or type of lesson. Have a look and give it a try!\nWe have developed a Teacher's Guide for use in the classroom based on the Soil! Get the inside Scoop! book for kids. Information includes objectives, glossary, test questions/worksheets, and Powerpoints - complete with teaching notes! Go to the Teachers Guide for Scoop!\nPurdue Soil Health provides hands-on soil health educational activities for high school teachers, a photo and video library, and general information about Purdue soil health research and educational workshops. Goals:\nNRCS Soil Health Kit Guides and Videos help teachers and educators implement their soils curriculum. Each guide includes an introduction to the soil property, discussion of the inherent and management factors influencing it, and explanation of the property's relationship to soil function. The educator's guides also include detailed information on a method to measure the soil property and interpretations of the test results. Helpful to educators, the guides double as lesson plans with thought-provoking questions so students can start to apply what they have learned. Videos cover the concepts and soil properties from overview to testing.\nUC Davis Sustainable Agriculture Research & Education Program -\nATTRA is a program developed and managed by the National Center for Appropriate Technology (NCAT). The majority of funding for ATTRA is through a cooperative agreement with the U.S. Department of Agriculture’s Rural Business-Cooperative Service. We are committed to providing high-value information and technical assistance to farmers, ranchers, Extension agents, educators, and others involved in sustainable agriculture in the United States.\nSoil Health Institute - The goal of this section is to provide convenient access to useful information and educational tools for all interested in soil health. We invite you to recommend additional resources, update information in this section by contacting us at the bottom of this page, and refer to this always-changing section whenever you need information on soil health. If you are an agronomist, agricultural economist, soil scientist, environmental researcher, or policy analyst, you also may wish to visit the Research Landscape Tool, which is the scientific research library on soil health. We also invite you to bookmark Soil Health 360, which is a quick-link to current publications, videos, and information on soil health."
] | [
"<urn:uuid:df4185ec-d454-4403-bac9-eb097db8e217>"
] | [
"CC-MAIN-2023-06"
] | [
"http://www.douglasccd.com/soil-health-resources.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499857.57/warc/CC-MAIN-20230131091122-20230131121122-00744.warc.gz"
] | [
"en"
] | [
0.9357615113258362
] | [
540
] | [
3.53125
] | [
4
] |
[
"Encourage teamwork with the telling of the lessons from geese (printed on the accompanying card):\nGeese flying in a V-formation have always been a welcome sign of spring as well as a sign that heralds the coming of winter. Not only is this a marvelous sight, but there are some remarkable lessons that we can learn from the flight of the geese, because all that they do has significance--\n- As each goose flaps its wings, it creates an uplift for others behind it. There is 71 percent more flying range in V-formation than in flying alone.\nLesson: People who share a common direction and sense of purpose can get there more quickly.\n- Whenever a goose flies out of formation, it feels drag and tries to get back into position.\nLesson: It's harder to do something alone than together.\n- When the lead goose gets tired, it rotates back into formation and another goose flies at the head.\nLesson: Shared leadership and interdependence give us each a chance to lead as well as an opportunity to rest.\n- The geese flying in the rear of the formation honk to encourage those up front to keep up their speed.\nLesson: Encouragement is motivating. We need to make sure our \"honking\" is encouraging--and not discouraging.\n- When a goose gets sick or wounded and falls, two geese fall out and stay with it until it revives or dies. Then they catch up or join another flock.\nLesson: We may all need help from time to time. We should stand by our colleagues in difficult times.\nAntiqued gold tone, 1\" X 5/8\"."
] | [
"<urn:uuid:adbdc329-11db-4a56-a845-3fcb79eaab35>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.masterteacher.com/Awards-and-Gifts/Teacher-Lapel-Pins/Lapel-Pin-Geese-Lessons"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319688.9/warc/CC-MAIN-20170622181155-20170622201155-00174.warc.gz"
] | [
"en"
] | [
0.9480479955673218
] | [
349
] | [
3.09375
] | [
3
] |
[
"1 Kings 8:22-61\nAnd Solomon stood before the altar of the LORD in the presence of all the congregation of Israel…\nThe undivided kingdom of Israel reached the zenith of its course in the reign of Solomon. Like Julius Caesar, David was the military hero and champion of his nation. He extended its territory from Egypt to the Euphrates, and centralised its government on the conquered heights of Jerusalem. But Solomon, the Augustus of Hebrew history, was an organiser and administrator. Jehovah, instead of teaching his hands to war, gave him rather \"a wise and an understanding heart,\" and \"both riches and honour,\" so that he was the greatest king of his day (1 Kings 3., 12:13, 4:24). These gifts and opportunities naturally made him also the Pericles of his race. His reign was distinguished for its magnificent architecture. This dedicated temple of Solomon is a pregnant type.\n1. It Is a type of Jesus Christ. The architectural magnificence of Solomon's temple but feebly prefigures the perfection of Christ's wonderful person. Solomon's temple was to Israel a symbol of permanence, but Jesus, looking at its second successor, declared that not one stone should be left upon another; and there, thinking of his own mastery even over death itself, declared, \"Destroy this temple, and in three days I will raise it up. But he spake of the temple of his body\" (John 2:19, 20). The temple was the dwelling-place of God; Jesus Christ is God incarnate. The temple was the meeting-place for God and man; Jesus is the divine-human Mediator, and whatsoever we ask in his name we receive (John 16:23). The temple was the place for intercession and atonement; Jesus ever liveth to make intercession for us, and he is the sacrificial Lamb whose blood cleanseth us from all sin. The temple contained the ark of the covenant; Jesus has fulfilled all law, and in love he binds all filial souls to the divine Father.\n2. Solomon's temple is a type of heaven. It is Jehovah's permanent dwelling-place (1 Kings 8:30, 32, etc.).\n3. Solomon's temple is a type of every Christian. For the Christian is the temple of God, and the Spirit of God dwells in him, demanding a pure home (1 Corinthians 3:16, 17). Thus the glory of Solomon was the temple which bears his name; the glory of that temple was its typifying of Christ, of His Church and His heaven; and the glory of Christ, of the Church, even of heaven, is a human life fully consecrated to God in Christ.\n(S. J. Macpherson, D. D.)\nParallel VersesKJV: And Solomon stood before the altar of the LORD in the presence of all the congregation of Israel, and spread forth his hands toward heaven:"
] | [
"<urn:uuid:a319c2f5-f0f8-48a1-8585-92b8a68c5ef4>"
] | [
"CC-MAIN-2020-05"
] | [
"https://www.biblehub.com/sermons/auth/macpherson/the_temple_dedicated.htm"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594705.17/warc/CC-MAIN-20200119180644-20200119204644-00548.warc.gz"
] | [
"en"
] | [
0.9644246697425842
] | [
609
] | [
2.578125
] | [
3
] |
[
"1. Research historical details about Oliver Cromwell and the English Civil War.\n2. Explain why people have different opinions of Oliver Cromwell.\n3. Understand the mark scheme.\n4. Decide upon your own presentation style.\nPowerpoint Lesson Plan:\n- Aimed at Students studying across UK Year 7,8 & 9 or equivalent\n- Premium resource\n- Use as you wish in the classroom or home environment\n- Structured powerpoint lesson assessment.\n- Oliver Cromwell Year 8 Assessment Powerpoint.\n- Also download Assessment Worksheet & Mark Scheme.\n- Use with further English Civil war resources."
] | [
"<urn:uuid:4292a543-450c-4a29-ac9c-a7271de791a6>"
] | [
"CC-MAIN-2017-26"
] | [
"https://schoolhistory.co.uk/early-modern/english-civil-wars/oliver-cromwell-assessment/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128329372.0/warc/CC-MAIN-20170629154125-20170629174125-00053.warc.gz"
] | [
"en"
] | [
0.7193614840507507
] | [
129
] | [
3.953125
] | [
4
] |
[
"New Saudi crown prince Mohammed…\nChina’s One Belt, One Road…\nIn order to survive into the future, big oil companies are forced to constantly search for large discoveries, driven by the necessity to replace the steady decline in production at existing fields. After so many decades of producing oil from easy to access fields, the only large discoveries left are found in remote or difficult to access formations.\nUnfortunately part and parcel of developing these hard to reach deposits of oil is an increase in the risks involved, and it may come as a bit of a surprise to know, but despite the disaster at the Deepwater Horizon platform in 2010, BP is leading the push to develop the technology capable of operating in such environments.\nFuel Fix explained that some of these new oil formations “are so deep under the sea floor, and under such high pressure and temperature, that conventional equipment would melt or be crushed by the conditions.”\nBP, regardless of its mistakes leading up to the 2010 spill at the Macondo field, is one the few companies in the world with the expertise and financial resources to discover and develop oil at such depths.\nRelated article: No Need for More Iranian Oil, U.S. Says\nBP holds rights to some of the largest reserves in the Gulf of Mexico in a new geological formation known as the Lower Tertiary, which is a layer of rock much older and deeper than the Miocene formations that supply most of the regions current oil production.\nIt was initially thought that the Lower Tertiary holds no oil and gas, but now that large discoveries have been made; Exxon, Chevron, and Shell are just some of the companies that have begun to explore the formation, and WoodMackenzie has said that within 15 years it could become the dominant source of oil in the Gulf of Mexico.\nOne of BP’s fields in the Gulf of Mexico is the Tiber field, which exists about 35,000 feet below the seabed (roughly 6.6 miles into the earth’s crust), making it around twice as deep as the il-fated Macondo well. The Tiber is also huge, holding an estimated 20 times as much oil as Macondo.\nBP controls stakes in various such prospects around the world, but before they can begin producing they must first be accessed; a task that is currently beyond the capability of oil companies. First new equipment must be developed, and then regulators must be convinced that the drilling can be completed safely.\nRelated article: Higher U.S. Oil Drilling Has An Unexpected Effect\nBP has already had to pay $42.5 billion for its part in the Deepwater Horizon spill, and that figure continues to climb. Another disaster would likely prove the end of the company, but success here could restore their reputation and position in the industry.\nBob Dudley, the CEO of BP, admitted that the company had to think “very carefully before re-committing the company to the deep water following the 2010 accident.”\nBy. James Burgess of Oilprice.com\nJames Burgess studied Business Management at the University of Nottingham. He has worked in property development, chartered surveying, marketing, law, and accounts. He has also…"
] | [
"<urn:uuid:19609cd9-b0a8-4d57-bf61-40cafb149271>"
] | [
"CC-MAIN-2017-26"
] | [
"http://oilprice.com/Latest-Energy-News/World-News/BP-Pushing-the-Limits-of-Technology-to-Develop-Ultra-Deep-Fields.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128322320.8/warc/CC-MAIN-20170628032529-20170628052529-00170.warc.gz"
] | [
"en"
] | [
0.9723589420318604
] | [
661
] | [
3.109375
] | [
3
] |
[
"Britain's first female prime minister was facing sharp criticism from both her cabinet and the public in response to her domestic policies. Savage government spending cuts, a declining manufacturing industry and high unemployment all pointed to an early exit for the leader.\n“It began to look as if the lady who said she was ‘Not for Turning’ would have to do a U-turn, halt her deflationary economic policies, and pump money back into the economy,” says Victor Bailey, a former distinguished professor of modern British history at the University of Kansas and former director of the Joyce & Elizabeth Hall Center for the Humanities. “The Falklands War saved her political skin. She could show all her indomitable will in a single cause with moral clarity: saving the Falkland Islanders and their sheep from the rampaging Argentinians.”\nThatcher’s decision to go to war to recover the islands was at odds with several members of Parliament and close advisers, as well as U.S. President Ronald Reagan, who repeatedly urged peace talks.\n\"When you are at war you cannot allow the difficulties to dominate your thinking: you have to set out with an iron will to overcome them,\" Thatcher writes in Downing Street Years, her 1993 memoir. ''And anyway what was the alternative? That a common or garden dictator should rule over the queen's subjects and prevail by fraud and violence? Not while I was prime minister.\"\nThe Falklands War Ends in 74 Days\nUnder Thatcher’s leadership, on April 5, 1982, the British government sent a naval task force 8,000 miles into the South Atlantic to take on the Argentine forces in advance of an amphibious assault on the islands. The British fleet ultimately included 38 warships, 77 auxiliary vessel and 11,000 soldiers, sailors and marines.\n“We must recover the Falkland islands for Britain and for the people who live there who are of British stock,” Thatcher said in an April 5, 1982 interview with ITN.\nThe conflict lasted 74 days and ended with the Argentine surrender on June 14, 1982. In the end, 649 Argentine military personnel, 255 British troops and three Falkland Islanders were killed in the conflict that returned the islands to British control.\nAccording to Bailey, Thatcher “did what [Winston] Churchill had a bad habit of not doing, which was she gave overall command to her military leaders and did not interfere with their strategic decisions.”\nMargaret Thatcher's 'Iron Lady' Moniker Sticks\nHer quick response to the South Atlantic conflict and swift victory led to a surge in her popularity and subsequent reelection in 1983. She would go on to serve until 1990, making her Britain’s longest-serving prime minister of the 20th century.\n“She was decisive, determined, effective,” says historian Chris Collins of the Margaret Thatcher Foundation. “There was never the slightest note of doubt in her public responses, and she was pretty clear privately too. We would get the islands back. I don't think any other British leader at that time would have handled things quite as clearly.”\nAbove all, Collins adds, the events of the war vindicated her. “If the war had been lost, or there had been some messy or ambiguous outcome, it would have destroyed her,” he says. “But a swift decisive victory was essential, really, from her point of view.”\nThe triumph also proved Thatcher’s “Iron Lady” moniker was deserved.\n“Before the Falklands it was a bit of a joke, that phrase,” he says. “Afterwards it meant something quite real. She was seen as enormously tough and resourceful, someone you would not take on if you were wise.”\nAnd, Bailey notes, Thatcher was the first woman to lead the country into battle since Elizabeth I.\n“I’m sure she liked this fact,” he says. “It was rare in the modern day for politicians to have an international conflict to handle—the last one for England had been Suez in 1956. It gave Thatcher an international stage to perform upon. … In a way, it elevated her from being a national politician to being an international stateswoman. As the first female prime minister of Britain, her success probably helped to make the idea of a female leader more acceptable.”\nThe public, Bailey says, felt Thatcher had “restored the ‘Great’ in Great Britain; she had elevated the confidence of the nation. We could still sail halfway round the world and succeed militarily.”\nBut it wasn’t just the public who recognized the change in Thatcher’s leadership, according to Collins.\n“She genuinely gained enormously in confidence and stature,\" he says, \"and it stayed with her.\""
] | [
"<urn:uuid:0584c504-0c8a-4829-bcc4-bc0aa3f88c0d>"
] | [
"CC-MAIN-2020-05"
] | [
"https://www.history.com/news/margaret-thatcher-falklands-war"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594209.12/warc/CC-MAIN-20200119035851-20200119063851-00380.warc.gz"
] | [
"en"
] | [
0.9797062277793884
] | [
1002
] | [
3.046875
] | [
3
] |
[
"Liquid, Slow Release, Organic, NPK, Macro/Micro....Understanding fertiliser might seem a little intimidating when these terms are thrown around. And with so many options on the market now, being discerning is even more of a challenge. But don't let that stop you - Fertilising is an important part of any serious Plant Parent's plant care routine. We created our Indoor Plant Food because we realised so many people had been overlooking the importance of it. A good fertilising regime will keep your plants looking happy and healthy.\nAs a somewhat confusing side note, fertiliser is not food. Its much easier for us to think of it like food as the term denotes a requirement for life. But plants create their own food through photosynthesis. Fertiliser is more of a supplement, providing plants with the nutrients they would receive themselves in their natural environments by sending out roots and drawing them up from the soil.\nOur indoor plants cannot do this. It's up to us to provide those nutrients, in the form of fertilisers. They would still survive if all you gave them was the right amount of light and water, but they would start to struggle - their growth would slow, they may start to lose some of their colour and dull out, or become vulnerable to pests and diseases.\nThe most important things to look at when choosing a fertiliser are the N:P:K ratios. This stands for Nitrogen(N), Phosphorus(P) and Potassium(K). They are the essential three macro nutrients for plants. The higher those numbers are, the greater percentage of that nutrient is in the fertiliser. Examples might be 10:10:10, or 12:2:12, or 30:0:10. These are all different ratios of N:P:K designed for different purposes and plants.\nSo what do they do?\nNitrogen - foliage baby! This nutrient is primarily responsible for leaf growth as its a major component of chlorophyll (the compound used by plants to photosynthesize). Plants absorb more nitrogen than any other nutrient.\nPhosphorus - root, flowers and fruits! You'll notice fertilisers for flowering and fruiting plants (think citrus feeds) will have a higher number for phosphorus in it.\nPotassium - Staying strong and powering on. Potassium helps strengthen the plant's ability to fend off pests and diseases, as well as protecting it against cold or dry weather and build up reserves for dormancy. It keeps the plant's functions performing as they should.\nA good fertiliser will also contain micronutrients (sometimes referred to as Trace Elements), making it a complete fertiliser. These micros are the support team to the Big Three mentioned above. They all have a role and will aid plant development.\nSlow Release vs Liquid vs Organic\nSo many options! There are a number of different ways to fertilise your plants, and understanding how they work will help you decide what's best for your situation.\nSlow release fertilisers can last up to 6 months, and slowly release nutrients into the soil over a period of time. They are heavily influenced by their environment (temperature and water), and while widely used outdoors they can be harder to manage on potted plants as you risk over-fertilising.\nChemical fertilisers are made from minerals and have precise ratios and quantities of macro and micro nutrients, so you can have more control on exactly what you're feeding your plant and control when they receive it. They're also the fastest acting fertilisers. They are often more concentrated than organic fertilisers and are diluted by adding to water.\nOrganic fertilisers are the most mild of fertilisers. They will have some decaying organism which can mean a bit of a smell, and will have a lower N:P:K ratio. Because they're organic, you need to make sure they are providing everything your plant needs in terms of macro and micro nutrients, and supplement if its missing anything.\nFoliar sprays are a great 'fast fix' for plants especially if they're suffering from a nutrient deficiency as plants take in nutrients quicker through the leaves than the roots. You can get these as ready to go or simply dilute your liquid fertilisers to half or even quarter strength and spray using a mister. They should not be used as an alternative to other fertilisers though as plants would not be able to get enough nitrogen, potassium and phosphorus purely through foliar feeding.\nPlant Runner Quick Tips\n- Feed (fertilise) in when the plants are actively growing. Generally, this means Spring is the best time but depending on your plant and your home you might find they are growing all year round or stay dormant longer. Plants that are fast growers will need more feed than slow growers like cacti.\n- Look for the N:P:K. No N:P:K = steer clear. Understand what it means and what's best for your plants.\n- Don't forget the micros! They're still important, your plant just needs less of them.\n- Always read the directions to prevent fertiliser burn."
] | [
"<urn:uuid:ee9b1e91-2b37-4d2e-b40f-d254b1909161>"
] | [
"CC-MAIN-2023-06"
] | [
"https://theplantrunner.com/blogs/the-plant-runner-blog/fertiliser-a-guide"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499911.86/warc/CC-MAIN-20230201045500-20230201075500-00444.warc.gz"
] | [
"en"
] | [
0.9565441012382507
] | [
1056
] | [
3.34375
] | [
3
] |
[
"One of the most commonly asked questions is: When is the best time to begin orthodontic treatment? The answer to this question is as individual as the patient we are treating. The American Association of Orthodontists recommends that your child be seen by the age of 7. The reason for this recommendation is that by age 7, there are key developmental changes that should occur in your dental and facial structures.\nThese changes include, but are not limited to:\n- The eruption of your upper and lower permanent first molars, which will establish the position of your bite and the width of your jaws.\n- The eruption of your upper and lower permanent incisor teeth (front teeth), which will determine the arch length and width. The front teeth will also establish crowding, habits, deep bites, open bites and some facial asymmetries.\nThese are some of the facial and structural issues that we can address, and many times correct early on, to eliminate potentially more difficult orthodontic treatment later. The most important thing to remember is that most children will not need early treatment, but by bringing your child to Dr. Fotovat and Dr. Sands early, we can have their growth and development monitored by a professional and give you the peace of mind that you deserve.\nSome of the problems that can be alleviated by early (Phase I) orthodontic treatment include:\n- Promoting proper jaw growth\n- Coordinating the upper and lower jaw width and position\n- Reducing the risk of trauma to protruding upper front incisor teeth\n- Correcting harmful oral habits (thumb sucking, tongue thrusting, etc.)\n- Improving the patient’s self esteem\n- Improving speech impediments\n- Correcting facial asymmetries\n- Reducing the risk of impacted teeth\n- Preserving or gaining space for un-erupted teeth when primary teeth are lost early.\n- Reducing or simplifying treatment time for later comprehensive orthodontic treatment\nIf your child needs early treatment (Phase I), the process is usually a short time-span ranging from 6 months to 18 months. After Phase I treatment is complete, a rest period, where Dr. Fotovat and Dr. Sands will remove the appliances and monitor the growth and development of the patient, will begin. Once the remainder of permanent teeth have erupted, the corrective Phase II portion of the orthodontic treatment can begin. This comprehensive orthodontic phase will address the alignment of all the permanent teeth."
] | [
"<urn:uuid:5ca4a14c-4594-4c2d-a40b-e65e86235599>"
] | [
"CC-MAIN-2023-14"
] | [
"https://burbankorthodontist.info/burbank_general_dentist.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944996.49/warc/CC-MAIN-20230323034459-20230323064459-00336.warc.gz"
] | [
"en"
] | [
0.933131992816925
] | [
521
] | [
2.796875
] | [
3
] |
[
"|During the Fourth of July weekend, I had the pleasure of attending the Enduring Communities conference in Denver organized by the Japanese American National Museum. There I met Mary Reed, a Minnesota woman who is helping her daughter Michelle (right) and Michelle's friend Carly (left) in folding cranes for a Japanese American Internment Memorial.\nHere's some information from their flyer:\nOur names are Michelle Reed and Carly Gutzmann and we are fourteen years old.\nThere is a quote by Yehuda Bauer that is inscribed at the National Holocaust Memorial in Washington, D.C. that reads:\nThou shalt not be a victim.\nThou shalt not be perpetrator.\nAbove all, thou shalt not be a bystander.\nWe have never been victims and we have certainly never been perpetrators. Now is our chance to no longer be bystanders.\nIn 2006/2007, we worked together on a project for National History Day. We chose to make a documentary about the art school at Topaz Relocation Center. After eight months of researching Japanese American internment camps, we came to love the quiet strength and serenity of these people. We were sad to discover that most of our classmates and many adults had no idea about the internment camps in America during World War II!\nWe've chosen to make a memorial to the Japanese Americans who were interned during World War II. This project will take many months to complete, but our hope is that it will create an awareness of how we must create peace and tolerance in our world. This will only happen if, as individuals, we take the time to understand people who are different from us.\nOur goal is to have one origami paper crane for each of the 120,313 Japanese Americans who were interned during World War II.\nYou can help us by making one or more paper cranes. Please make three-inch or smaller cranes. Also, send us your internment stories. You can mail them to us at:\nc/o Silicon Graphics, Inc\n2750 Blue Water Road\nEagan, MN 55121\nWe would like to thank Silicon Graphics for graciously allowing us to use their resources to receive the parcels and letters containing the paper cranes.\nFor additional information about the Peace Memorial, e-mail:\nLabels: internment, origami"
] | [
"<urn:uuid:0ca22d84-707a-4d06-a032-4b5d05525e82>"
] | [
"CC-MAIN-2023-06"
] | [
"https://www.naomihirahara.com/1001cranes/blog/2008/07/fold-cranes-for-japanese-american.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500392.45/warc/CC-MAIN-20230207071302-20230207101302-00850.warc.gz"
] | [
"en"
] | [
0.9476772546768188
] | [
507
] | [
2.53125
] | [
3
] |
[
"Money is much more than a medium of exchange for goods and services.\nMoney reflects our personal values and the hard work we put into earning it. How we treat money, save it and spend it, is a reflection of our internal beliefs — our money mindset.\nWhen it comes to money, we all have strongly held beliefs, whether or not we realize it. Many of these beliefs grew out of childhood and come from lessons we learned from our families or picked up through life experiences.\nBecause understanding our internal beliefs helps us make smarter financial decisions and avoid the behaviors that damage financial health.\nAnswer the questions below to discover more about your money beliefs and unlock key insights about your mindset and the behaviors holding you back from achieving your financial goals.\nAsk yourself these questions to learn more about your money mindset. pic.twitter.com/8VqGLHyLBZ\nAsk yourself these questions to learn more about your money mindset. pic.twitter.com/1HuYWcUWU5\nAsk yourself these questions to learn more about your money mindset. pic.twitter.com/MpwijFjs0A\nAsk yourself these questions to learn more about your money mindset. pic.twitter.com/6tNB7c4Hmp\n\"Beliefs about money are complicated. It's a symbol of self-respect, love, freedom, control, power, self-worth, and much more.\"\nWhat does the word \"money\" bring to mind? Are the associations positive or negative?\nBeliefs about money are complicated. It's a symbol of one's self: respect, love, freedom, control, power, worth, and much more (depending on the person).\nHaving a healthy relationship with money and using it to create success require you to understand the beliefs and internal scripts driving your behavior. Trying to build strong financial habits without the right mindset is like driving down the highway with your emergency brake on.\nAs a financial professional, I think about wealth in terms of the opportunities it offers and as a tool for good. But, I've realized that everyone who walks in my office doesn't view money the same way. For some people, money is uncomfortable and something they'd rather not think about. Others tie wealth to their definitions of success and self-worth.\nI don't think one mindset is better than the other.\nWhat's important is understanding your own beliefs and identifying how they drive your decisions and your behavior. If you can recognize the negative aspects of your money mindset, you can manage your emotions and fears better—and you can recognize and start to change bad habits.\nIdentifying and changing negative behaviors associated with your mindset are key to making the best financial decisions.\nIf you're looking to understand how to shift your money mindset and improve it, I'm here to help. One of the best services I can provide is that of a financial coach and accountability partner.\nI'd be happy to chat with you and shed more light on your money mindset. Give my office a call at 910-632-3754 or shoot me an email at [email protected].\nRenan Guillou, CFF™ & Richard Ehrlich, CFF™ Secure Wealth Planning Group\nP.S. Want to learn more about money mindfulness and get some extra exercises? Continue the conversation over email by signing up (my subscribers get my best insights)."
] | [
"<urn:uuid:76c6825b-b431-4354-b60a-2c5a617de26a>"
] | [
"CC-MAIN-2020-05"
] | [
"https://financeinsights.net/W2GtabWIgzzms8aagCaOV8"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250595787.7/warc/CC-MAIN-20200119234426-20200120022426-00445.warc.gz"
] | [
"en"
] | [
0.9217336773872375
] | [
703
] | [
2.515625
] | [
3
] |
[
"Hydrogen is pointed to as an important part of the solution for tomorrow’s energy challenges, especially for ships. Green hydrogen produced from renewable electricity can help reduce emissions from ships, both from coastal and deep sea ships.\nThe most well-known forms of storage for hydrogen for fuel are compressed and liquid hydrogen. In this pilot, we explore the use and production of a third form of storage for hydrogen to be used as fuel on ships: liquid organic hydrogen carrier (LOHC).\nLOHC for ships – hydrogen oil – consists of an organic oil that is enriched with hydrogen (LOHC+). This is done in a facility onshore. This hydrogen oil behaves similarly to diesel with respect to storage, transport and handling, and has about the same level of risk when it comes to fire and toxicity as regular diesel. LOHC+ can also be bunkered in the same way as diesel for ships.\nOnboard the ship the hydrogen is released from the enriched hydrogen oil (LOHC+), the hydrogen is then used in a fuel cell or internal combustion engine, whilst the depleted hydrogen oil (LOHC-) is stored in another tank on board. At the next bunkering of LOHC+, the LOHC- is loaded off the ship. This depleted hydrogen oil (LOHC-) will then again be enriched with hydrogen in the production facility to be used again.\nHydrogen oil – LOHC – has two great advantages compared to compressed and liquid hydrogen:\n- The hydrogen is stored in oil, LOHC, and there is substantially less free hydrogen on board the ship, which reduces the risk.\n- The hydrogen oil can be transported in conventional tanks, about the same way as for diesel today, and therefore has substantially lower transport costs than compressed and liquid hydrogen.\nAll the different alternative energy carriers for ships have advantages and disadvantages. It is necessary to explore how each of them can best be used in an energy system: from renewable energy, transported to ships, through the ship’s energy system, and all the way to the ship’s propeller.\nLOHC has the potential to become an important energy carrier for the ships of the future.\nPilot project goals\nThe pilot will present a concept and business case for the production of hydrogen that will be able to deliver hydrogen oil (LOHC) to ships in Norwegian waters. The concept will be able to form a basis for an engineering project. This will further be able to be used for applications for financing and government grants for the realization of a facility for hydrogen oil (LOHC).\nThe final implementation of the pilot is an industry solution for hydrogen production, distribution, and bunkering, that is tested and scaled in Norway and that can be sold abroad. The overarching goals are therefore both to reduce CO2 emissions and to develop the Norwegian industry.\nThe pilot project was started in January 2021.\nThe pilot is described in a PowerPoint that can be downloaded here: LOHC-beskrivelse"
] | [
"<urn:uuid:3ac0da23-df07-4c7a-9416-85199f1d7e37>"
] | [
"CC-MAIN-2023-06"
] | [
"https://greenshippingprogramme.com/pilot/infrastructure-for-liquid-organic-hydrogen-carrier-lohc/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500255.78/warc/CC-MAIN-20230205130241-20230205160241-00284.warc.gz"
] | [
"en"
] | [
0.9532883763313293
] | [
624
] | [
3.375
] | [
3
] |
[
"Meteoroid impacts regularly liberate puffs of water vapor from the moon, suggesting that minuscule amounts of water may lurk just under the entire lunar surface, a new study finds.\nWhen the Apollo missions brought lunar rocks to Earth, scientists found evidence that the moon was devoid of water. However, in the past decade, data from a bevy of spacecraft — including NASA's Cassini, Deep Impact and Lunar Prospector missions, and India's Chandrayaan-1 probe — revealed trace amounts of water on the surface of the moon. Even more intriguingly, they found water across the moon's surface, not only at the poles, as was previously expected.\nBut scientists still have many questions about the source and extent of lunar water. To learn more, researchers analyzed data from NASA's Lunar Atmosphere and Dust Environment Explorer (LADEE), which orbited the moon from October 2013 to April 2014.\nRelated: Watch Two Meteorites Hit the Moon!\nThe scientists behind the newly published research found that the moon released numerous puffs of water vapor from near its surface into its exosphere, the very tenuous layer of molecules comprising the closest thing that the moon has to an atmosphere. These outbursts coincided with 29 known meteoroid streams that passed near Earth during that eight-month span of time, including the Leonids, Geminids and Quadrantids.\n\"Most of the geological processes we deal with in planetary science are very slow — we almost never get to see something respond dynamically over the scale of hours like we did here,\" lead author Mehdi Benna, a planetary scientist at NASA Goddard Space Flight Center in Greenbelt, Maryland, told Space.com.\nThe researchers suggested that meteoroid impacts kicked up these puffs of water from the moon, and said that four of these puffs were apparently caused by previously undetected meteoroid streams.\n\"One would think we know all of the meteoroid streams that are out there, but apparently we don't,\" Benna said.\nBy analyzing the amount of water released by meteoroid streams of different sizes, the scientists estimated that the uppermost 3.15 inches (8 centimeters) of lunar soil is dehydrated — any less, and smaller meteoroids would have excavated more water. Below this desiccated layer, the researchers suggest, water comprises up to about 0.05% of the weight of the rock up to at least 10 feet (3 meters) deep.\n\"With our measurements, we could see exactly the water extracted from the moon in a very dynamic way by micrometeroid impacts, and by analyzing the data, see how much water was stored in the lunar reservoir and where it was going,\" Benna said.\nThe researchers estimated that meteoroid impacts cause the moon to lose as much as 220 tons (200 metric tons) of water annually. To sustain this amount of loss over time, they suggested that this water either was present when the moon formed, about 4.5 billion years ago, or was delivered by cosmic impacts from water-laden rocks soon after the moon was born.\nThe lunar samples from the Apollo missions may have appeared devoid of water because the water on those rocks was likely not incorporated into the rocks themselves, but only weakly coated them. As such, any water on the rocks was likely fragile and difficult to hold onto during the return trips, Benna said.\nFuture research can examine how deep water actually extends on the moon, Benna said. He and his colleagues detailed their findings online today (April 15) in the journal Nature Geoscience.\n- Water on Mars May Have Been Triggered by Meteorite Impacts\n- Watch a Meteor Smack the Blood Moon in This Lunar Eclipse Video!\n- What Moon Craters Can Tell Us About Earth, and Our Solar System"
] | [
"<urn:uuid:31c1d0fb-439b-4817-a41b-f8218f0f8b50>"
] | [
"CC-MAIN-2020-05"
] | [
"https://www.space.com/meteor-moon-impacts-stir-up-water.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251694071.63/warc/CC-MAIN-20200126230255-20200127020255-00073.warc.gz"
] | [
"en"
] | [
0.9676176309585571
] | [
777
] | [
4.25
] | [
4
] |
[
"A cancer diagnosis is a shock to the patient, family, and friends. The patient and loved ones are reeling from the news. Once the initial shock passes, friends and family will ask themselves how they can help. The medical aspects of the diagnosis are best left to the experts. But there are many ways a person can show solidarity with cancer patients.\nOffer Emotional Support\nOffering appropriate emotional support is vital to the patient and caregivers. Following are guidelines on how to help.\nRespect what is happening. Everyone’s illness is different and what works for one person will not work for others. Ask before taking any action. Many friends and acquaintances’ first reactions may include making meals or offering baked goods. However, the cancer patient may have special dietary restrictions or are experiencing an aversion to certain foods. Asking before acting displays concern about what is best for the patient.\nListen to what the cancer patient says about what is happening. This is not the time to tell horror stories about other cancer patients. Controlling your body language is also important. People can tell when words and body language do not match. Practice active listening by minimizing distractions and providing appropriate feedback to the patient.\nSupport the caregivers too. The cancer patient may feel additional stress worrying about their loved ones and caregivers. Caregivers may have to provide support for weeks or months. Encourage the caregiver to take care of themselves also. Offering to sit with the patient or take them to appointments or treatments can be extremely helpful. If the caregiver accompanies the patient to every treatment, perhaps packing a lunch for them would be useful. Sometimes helping the caregiver can be the best thing you can do to ease the stress of the cancer patient.\nTasks and Gift Giving\nHelping with chores or other projects can help. What tasks can be done efficiently may depend upon whether the person trying to help is close or far away.\nLiving close by means helpers can complete tasks like sitting with the patient, babysitting children, taking care of pets, and providing meals. A friend can drive the patient to appointments or treatments. Completing yard work or laundry can help. When a friend is nearby, being observant about what assistance is most needed and reacting quickly can be invaluable.\nEven if a friend lives far away, they can be helpful. Financial issues may be of great concern to the patient and caregivers. A far-away helper can research or contact financial assistance agencies and gather information. Is the friend or loved one an active Facebook user? Creating a Facebook page that keeps everyone up to date on what’s happening may be helpful. Perhaps a cancer support group or patient advocacy center is needed. Researching these resources saves time and stress for the patient and family.\nWhether a person is near or far, creative and thoughtful gift-giving is a possibility. Streaming or music memberships may be helpful. Taking the time to compose a personal playlist may be welcome. If the cancer patient is an exerciser and feels well enough, sending a personal trainer or yoga instructor to the home may return normalcy to the patient’s routine. Meal delivery services or grocery store coupons with home delivery are usually welcome. Some people crave distraction so books, magazines, games, playing cards, or puzzles may appeal to the patient. Is it holiday time? Cleaning and decorating the home may be just the thing. Some people undergoing chemotherapy enjoy comforting items like soft blankets, satin pillowcases, candles, or aromatherapy. If sleep is an issue, weighted blankets, eye masks and sound machines can help. If they are struggling with hair loss, headwraps or chemo hats might be appreciated. Many helpful gifts are available to the person who thinks through what might be beneficial.\nWhat Not to do\nDo not share horror stories about cancer patients you have known or heard about. The cancer patient is frightened enough without hearing about terrible things that have happened to others. Do not buy candy, sweets, or other gifts the cancer patient may not be able to tolerate. Perfumes or scented products like flowers may make the patient ill. Do not offer platitudes or minimize the seriousness of the diagnosis. Do not judge cancer and declare it a good or bad cancer. Do not ask for details the patient may not want to share. The physical impact of cancer and treatments are not anyone else’s concern unless the patient initiates the conversation. Do not suggest alternative treatments. You are not a doctor and the patient and loved ones need to rely on medical professionals they trust.\nA cancer diagnosis is devastating for everyone. Support and care can make an enormous positive impact on the cancer patient and the patient’s family. As the above information shows, even though financial and other resources may be limited, a concerned friend can help. All these positive actions can help ease the trauma of any cancer diagnosis."
] | [
"<urn:uuid:6e7af18b-a707-4c08-9fcf-a4b6284a935d>"
] | [
"CC-MAIN-2023-06"
] | [
"https://compulearntech.com/showing-solidarity-with-cancer-survivors/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499468.22/warc/CC-MAIN-20230127231443-20230128021443-00723.warc.gz"
] | [
"en"
] | [
0.930029034614563
] | [
989
] | [
3.265625
] | [
3
] |
[
"Social psychology studies the behavior and attitude of individuals in the presence of others.\nAs the name implies, it is a field of study between sociology (study of groups) and psychology (study of individuals) as it focuses on individuals within a group.\nUse by progressives\nWriting at thefederalist.com, Stella Morabito describes how for roughly 100 years those on the left have been using social psychology to advance whatever the agenda of the day happens to be. She mentions Same-sex marriage, Transhumanism, and the riots in Ferguson and Baltimore, as examples of current events influenced by the early pioneers of modern propaganda. Two people she specifically mentions are Walter Lippmann and Edward Bernays. Glenn Beck made similar charges and highlighted the same names (Lippmann, Bernays) on his TV show.\nExamples of topics studied in social psychology include the study of social facilitation (how the mere presence of others affects us), nonverbal communication, social cognition - the interface between cognitive psychology and social psychology, which includes the study of interpersonal perception and the study of attitudes - and the study of interpersonal relationships.\n- WorkingPsychology.com: Definitons\n- How To Escape The Age Of Mass Delusion. The Federalist (June 8, 2015).\n- 'Glenn Beck': Progressives' Fight for American Hearts and Minds. Fox News (May 27, 2010)."
] | [
"<urn:uuid:051be781-4198-47f6-96fe-9b02a944c9d0>"
] | [
"CC-MAIN-2023-06"
] | [
"https://www.conservapedia.com/Social_psychology"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500368.7/warc/CC-MAIN-20230207004322-20230207034322-00614.warc.gz"
] | [
"en"
] | [
0.8951383829116821
] | [
298
] | [
3.28125
] | [
3
] |
[
"Kingfisher (Alcedo atthis).\nRivers, ponds and lakes throughout lowland areas of Britain. They usually prefer slow-flowing water rather than very fast-flowing streams.\nThe kingfisher is one of our most beautiful birds and is easily recognized, although all you are likely to see is a flash of blue darting like an arrow, up or down a river. They are a dazzling blue/green above and orange underneath. They have a short tail and a large head with a large, strong, pointed beak. The call of a kingfisher is like a loud, shrill whistle.\nKingfishers mainly eat fish, insects and worms. They are great at catching fish, often sitting on a branch over a river – or even hovering – watching for the movement of small fish such as minnows, sticklebacks, stone loach and small trout. When they see a fish they dive straight into the water to catch it.\nKingfisher pairs start to make their nests in April. They dig out a tunnel – up to a metre long – in a steep riverbank and then make the end of the tunnel into a rounded nest chamber. Females lay up to 7 eggs and both parents help to keep them warm until they hatch, and then both feed the chicks.\nKingfishers need clean water with a plentiful supply of fish. Threats to kingfishers include polluted water and loss of suitable, undisturbed river banks for nest building. Cold winters may also lead to a drop in numbers because kingfishers struggle to find enough to eat if the water freezes.\nKingfisher numbers are thought to be scarce but stable in the North York Moors National Park. The National Park Authority has been working with landowners, farmers and fishing clubs to improve river habitats on the Esk and the Upper Derwent. For example, in some areas where cattle drink from the river, they accelerate riverbank erosion. The National Park Authority has helped to provide money to have proper drinking places built for cattle, in order to protect the river banks."
] | [
"<urn:uuid:cfcc69a2-a229-4ce9-968d-b5166f53d99d>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.northyorkmoors.org.uk/discover/rivers/wildlife-on-the-river/kingfisher"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320338.89/warc/CC-MAIN-20170624203022-20170624223022-00279.warc.gz"
] | [
"en"
] | [
0.9533546566963196
] | [
424
] | [
3.8125
] | [
4
] |
[
"In an earlier post, I summarised the literature on the efficacy of training for managing unconscious bias. In sum, the research into unconscious bias training highlights two important considerations (i) unconscious bias training is necessary, but in itself not sufficient, for eliminating workplace bias, and (ii) some unconscious bias training programs are more effective than others. Specifically, training is most effective for managing unconscious bias when it incorporates bias awareness, or ‘a-ha’ activities that ‘show’ rather than ‘tell’ participants how their subconscious preferences and beliefs drive their responses, and when it transfers evidence-based bias reduction and mitigation strategies. The social psychological literature provides us with a number of proven techniques for dismantling social categorisations and overriding bias that can be incorporated into bias training. This has not often been the case, however, with a large proportion of interventions focused on attitude change, assuming that behavioural change will follow. In this post, I present six-evidence based techniques for managing unconscious bias that can be used to strengthen bias training programs and improve outcomes.\nAutomatic and Controlled Processing\nIn social interactions, human beings process information via two routes. One route is automatic, largely driven by emotional factors, and activates well-established stereotypes. Our automatic social processing happens so quickly that it is below our level of consciousness, well below 100ms and as quickly as 30ms. Automatic social processing can influence our immediate judgments and behaviours without us even knowing it. In social settings, stereotypes and associated prejudices and discriminatory responses occur fast and outside of conscious awareness.\nHowever, the good news is that we can override our reflexive responses with controlled and deliberate thought or reflection. When we are motivated to be fair and unprejudiced because of either a strong internalised belief that it is morally correct to treat others fairly or because of strong social norms and legal restrictions against expressed prejudice and discrimination, we can engage controlled mental processes to override biased reflexive responses.\nBrain imaging research shows that although activation of the part of our brain responsible for detecting fear and preparing for emergency events (the amygdala) is greater for racial out-groups compared with racial in-groups when images are presented to individuals who had previously expressed pro-diversity and equality beliefs for only 30ms (below the level of conscious awareness), when the faces are shown for 525ms, there is no difference in amygdala activation when viewing images of racial out-groups compared with in-group images. Rather, at 525ms, racial out-group images activate greater activity in the prefrontal cortex, which is associated with cognitive and behavioural regulation, indicating the motivated individual is able to override initial and automatic reflexes by slowing down and engaging controlled processing.\nOverview of the SPACE2 Model of Mindful Inclusion\nThe SPACE2 Model of Mindful Inclusion is a collection of six evidence-based strategies that activate controlled processing and enable individuals to detect and override their automatic reflexes:\n- Slowing Down — being mindful and considered in your responses to others\n- Perspective Taking — actively imagining the thoughts and feelings of others\n- Asking Yourself — active self-questioning to challenge your assumptions\n- Cultural Intelligence— interpreting a person’s behaviour through their cultural lens rather than your own\n- Exemplars — identifying counter-stereotypical individuals\n- Expand — the formation of diverse friendships\nWhile prompting individuals to remember the six techniques, the SPACE2 acronym reinforces a key message—to manage bias, individuals must create space between their automatic reflexes and their responses.\n(i) Slowing Down\nBecause controlled processing is deliberate and much slower than automatic processing, there remains a possibility for reflexive and immediate biased responses, even in individuals who endorse egalitarian values, particularly when under time pressure. Studies show greater discrimination in selecting applicants from resumes when the assessors report feeling rushed. Individuals who are seeking to manage their biases must slow down their responses and refrain from making key talent decisions when rushed.\nAlso, as controlled processing requires more mental resources, when an individual is mentally taxed or fatigued, it is less likely that their implicit biases will be effectively overridden. That is, when we have limited cognitive resources available for social perception (for example, because we are distracted by another mentally-taxing task, or under emotional or physiological stress), we tend to rely more on stereotypes to make judgments and guide our behaviours. Don’t make key decisions when busy, anxious or in a negative mood.\nUnconscious bias is also more likely to manifest as discriminatory behavior when it can be justified or rationalised on non-discriminatory grounds. When assessing the suitability of male and female candidates for different roles, for example, assessors are more likely to redefine the criteria that constitutes “merit” for the role to fit the profile of the candidate of the preferred gender. Act with a conscious intent to be fair and be particularly vigilant in situations where your biases are likely to be most influential.\nConscious attempts at suppressing bias are more effective at inhibiting some prejudiced and discriminatory responses but not others. Conscious intention can help to overcome our verbal responses, but our non-verbal behaviour and judgments are much more difficult to control. Subtle discriminative responses—for example, feelings of discomfort, exclusion, and avoidance—may leak out during our exchanges with outgroup member. Mindfully monitor your micro-biases, including, eye contact, smiling, mobile use, body language, interruptions, when interacting with people who are different to you.\nNeurocognitive studies have demonstrated that we all possess an ability to mimic automatically the emotions, thoughts, and actions of others. From an evolutionary perspective, this ability to synchronise our intentions and behaviours with others enhances our social functioning that, in turn, increases our chances of survival. Research shows, however, that although we automatically simulate the mental and motor activity of ingroup members, this process is much less responsive to outgroup members. Fortunately, with conscious effort, we can make up for this deficit in intergroup sensitivity. Perspective-taking refers to the ‘active contemplation of other’s psychological experiences’—that is, thinking and imagining the feelings and viewpoints of others. It is now well-established that perspective-taking has positive implications for intergroup relations including increased empathy, reduction of unconscious prejudiced attitudes and discriminatory behaviours, and decreased activation of negative stereotypes. Perspective-taking works by enhancing ‘self-other overlap’—the merging of one’s cognitive representations of their self-concept with representations of outgroup members. In this way, social category boundaries become blurred and they become me. Outgroup members are now perceived to be more like the self, and are more likely to be afforded the positive favoritism usually reserved for ingroup members. This effect can generalise to other outgroup members because the individual is perceived as a prototype for the wider group.\n(ii) Ask Yourself\nPrompts or questions that encourage us to examine our assumptions when assessing others or making decisions that will impact their careers helps to bring our biases into conscious awareness. Howard Ross suggests that individuals engaged in high-stakes decision-making about others should always stop to ask themselves:\n- Does this person remind you of yourself?\n- Does this person remind you of anyone else? Is this positive or negative?\n- Are there things about this person that particularly influence your impression? Are they really relevant to the job?\n- What assessments have you already made? Are these grounded in solid information or your assumptions?\nAlso, pay attention to objective information. Focus on skills and actively challenge any assessments you have made by seeking evidence that backs up or contradicts that assessment.\n(iv) Cultural intelligence\nPsychologists label the tendency to attribute a person’s behaviour to innate character flaws or personality traits rather than to contextual influences the fundamental attribution error. When explaining a person’s behaviour, we typically give more weight to dispositional influences than external causes—John is late because he is unreliable, rather than John is late because of bad traffic. Although our behaviours are often influenced by factors external to the self, we are quick to judge a person’s actions as reflective of their character rather than situational causes. This is because people are the most salient object to us during an exchange, whereas contextual influences are less obvious.\nWhen we work across cultures, the risk of making the fundamental attribution error is high. When working with culturally diverse others, we routinely attribute their behaviours to innate dispositions rather than to their cultural conditioning. We can counter the risk of making the fundamental attribution error when working across cultures by actively seeking culturally appropriate explanations for behaviour. While perspective-taking for empathy focuses on the emotions of the other person without reference to cultural differences, making culturally appropriate attributions focuses on understanding the other person’s perspective through their cultural frame of reference. Imagining the world from the perspectives of others helps you transcend the automaticity of your own cultural framework and to interpret their intentions and behaviours more accurately, reducing misunderstandings, misattributions, and conflict. Differences are less likely to be labeled as deviant, stereotyping and bias is reduced, communication is enhanced, and suspicion and distrust are minimised.\nPrompts can help individuals to improve their cultural perspective-taking by encouraging them to reflect on how culture might be affecting their counterpart’s values and beliefs, for example,\n‘Before you decide how to respond in this interaction, write down a few sentences describing your counterpart’s interests and concerns as a person living within their culture. Now consider how your counterpart’s behaviours and decisions in this situation may be guided by his or her cultural values and beliefs’.\nPrompts are useful when planning for intercultural interactions. They can also be used to encourage monitoring in real-time exchanges with others.\nMultiple studies have shown that the accessibility of automatic and unconscious stereotypes is reduced by engaging in counter-stereotypical imagery. In one example, being instructed to imagine a strong women led to less accessibility of an automatic ‘weak-women’ stereotyped association as measured in the implicit association test. Within a training environment, counter-stereotypical imaging can be introduced as a unconscious bias intervention. Outside of the classroom, using communication channels to celebrate and acknowledge the successes of individuals from underrepresented or stereotyped groups can help to dismantle implicit bias by weakening the association between the group and the stereotyped behaviour.\nStudies indicate that the formation of intergroup friendships can help to dismantle social categorisations and decrease bias. Activities that encourage diverse individuals to share information about their unique backgrounds, experiences, and skills promotes individuation of outgroup members such that they come to be considered as individuals rather than as a member of a broader social category. Under this approach, the focus moves from “one of them” to “you and me”.\nThere is another mechanism by which relational-based activities decrease the tendency for bias. Studies have shown that social categories can become more inclusive by inducing a positive mood state. There are a couple of reasons why this occurs. Firstly, we are attracted to people that we associate with feeling good. Secondly, a positive mood enhances our cognitive flexibility and leads to broader and more inclusive categorisations."
] | [
"<urn:uuid:df3be277-18b1-4a3a-a1d3-5b7165f8fa4c>"
] | [
"CC-MAIN-2023-14"
] | [
"https://cultureplusconsulting.com/2018/10/17/six-proven-strategies-for-managing-unconscious-bias/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943747.51/warc/CC-MAIN-20230321225117-20230322015117-00544.warc.gz"
] | [
"en"
] | [
0.9322001934051514
] | [
2308
] | [
2.859375
] | [
3
] |
[
"Phishing is a method of gathering sensitive information by deception. Often, this happens as a cyber-attack via email, but as a social engineering technique, it can happen over a variety of platforms or mediums.\nEmail phishing is the act of sending emails from what appear to be trusted sources to trick users into providing usernames and passwords, and often bank and credit card details.\nHow phishing works\nThe recipient of the email sees a message from a trusted source, perhaps one they regularly do business with or subscribe to, with a simple request to upgrade their details due to some form of maintenance or system updates.\nBy spoofing the business’s brand, email and creating a cloned copy of their website, the user will often see little difference to the real thing, and with that, details are entered, and the damage done.\nThere are also a great number of spoof emails that appear to be sent from businesses, banks, and promotions you’ve never had anything to do with. This should be an obvious sign that something isn’t right.\nAnother popular method is an email announcing a competition win and your entitlement to a superb prize or free gift. If it looks too good to be true—it probably is.\nTypes of phishing\n- Spear phishing\nIn contrast to casting out a wide net to obtain as many details from a vast range of resources, spear phishing is a direct aim at a single specific individual.\n- Whale phishing\nWhale phishing—or whaling—is also an attempt aimed at one specific individual, but in this instance, the biggest fish. Their targets are the CEOs, board members, or high-value operatives whose information is considered the most valuable.\n- Social media phishing\nPrivate messaging over social media offers hackers similar opportunities as traditional email. Many attacks use more intensive probing, with hackers posing as a person you may or may not know, building a relationship before reaching out for the information they want.\n- SMS and mobile messaging phishing\nSMS phishing—or smishing—works just like email-based attacks, with fake links designed to lure you into providing your sensitive data.\nHow to spot a phishing attack\n- Check the email address\nThe sender looks authentic, as a name you might recognize, but the email address will often come from a domain with nothing to do with the organization it’s supposedly sent by.\n- Check the recipient field\nIf the email is sent to users you don’t recognize, or to a batch of recipients, then it’s likely fraudulent.\n- Check the URLs of the hyperlinks\nHovering over links will allow you to see where they are taking you. If the URL looks anything other than authentic—delete, delete, delete.\nSome phishing emails will include an executable file that launches on opening and installs malware on your computer. Don’t open them. Delete the email instead.\nIs the content of the message out of the ordinary, and does it feature poor spelling and grammar? An authentic sender would never deliver a message that isn’t 100% professional and accurate.\nWhat's the origin of the term \"phishing\"?\nThe term ‘phishing’ was introduced in the mid-1990s while hackers were tricking AOL users into surrendering their login information.\nThe whimsical spelling of ‘fishing’ describes just what the hackers were doing; throwing out bait to thousands of users, hoping for a few bites to provide the information they needed."
] | [
"<urn:uuid:704bf7cf-94b1-4628-9fd9-a68f45018b35>"
] | [
"CC-MAIN-2023-14"
] | [
"https://woodpecker.co/glossary/phishing/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945381.91/warc/CC-MAIN-20230326013652-20230326043652-00734.warc.gz"
] | [
"en"
] | [
0.9496045112609863
] | [
743
] | [
3.53125
] | [
4
] |
[
"I realized this morning that I want my students to feel “stretched” during my classes. I came to this conclusion after checking the etymology of the word “intense”, and finding that it derives from the Latin word for “stretch”. I’ve always hoped to have “intensity” in my classes, where the students are deeply involved and even filled with fervor for the work at hand, and now I know a little more about what that actually implies. In order to help them be truly intense in their English work, I must encourage – perhaps force – my students to stretch themselves to the farthest limits. “Extreme” is another word that would apply here. My students, if they want to be really fine readers and writers, must be attentive during class to an extreme degree. They must use extreme effort in concentrating on their assignments. They must feel the emotions in a poem or story in an extreme way. This is being a truly intense student – a student who goes “the extra mile” to reach the farthest and most extreme achievements possible. It’s possible for all my students to develop this kind of intensity, but only if I encourage it, push them toward it, and absolutely insist upon it. I guess that means I have to be as intense – as stretched – as I want them to be."
] | [
"<urn:uuid:0325ea10-2a59-435e-b393-526fdc0f338f>"
] | [
"CC-MAIN-2023-06"
] | [
"http://www.hesalsich2.com/2007/04/i-realized-this-morning-that-i-want-my.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499804.60/warc/CC-MAIN-20230130070411-20230130100411-00750.warc.gz"
] | [
"en"
] | [
0.9773148894309998
] | [
284
] | [
2.640625
] | [
3
] |
[
"posted by lindsey .\nhow do i find the specific heat of a metal??\nYou can look them up in a chart. Try going to engineeringtoolbox website. They have a very useful chart of the specific heat of metals\nHeat a known mass of a metal to a known temperature (say, for example, 10.00 g at 78.5 deg C)\nAdd the metal to a known mass of water at a known temperature (say 75.00 g at 25.0 deg C) in a calorimeter.\nLet the metal and the water come to an equilibrium temperature, Tf. (The metal cools from 78.5 to Tf; the water warms from 25.0 to Tf.)\nThe heat lost by the metal equals the heat gained by the water (assuming the calorimeter absorbs none of the heat).\nthe specific heat can be given as the calories per gram of material per degree change. The heat loss of the metal is -\nHeat Lost = specific heat x 10.00 g x (78.5 - Tf)\nThe specific heat of water is known to be 1.00 cal/g deg.\nHeat Gained = 1.00 x 75.00 g x (Tf - 25.0)\nSince the Heat Lost = the Heat Gained, and the final temperature, Tf, can be measured, the only unknown is the specific heat of the metal.\nAssume Tf = 28.00 deg\nspecific heat x 10.00 x 50.5 = 1.00 x 75.00 x 3.00\nspecific heat = 0.445 cal/g deg"
] | [
"<urn:uuid:85dac081-ebfd-4be3-aedd-7f482335873c>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.jiskha.com/display.cgi?id=1366166935"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320841.35/warc/CC-MAIN-20170626170406-20170626190406-00596.warc.gz"
] | [
"en"
] | [
0.8861672282218933
] | [
339
] | [
3.203125
] | [
3
] |
[
"I was very excited to see this year’s Disney Nature film, “Bears.” The movie follows a first time brown bear (Ursus arctos; note in North America the brown bear subspecies is the grizzly bear Ursus arctos horribilus) mother and her two cubs from their den exit to next year’s entrance. Bear cubs are born in dens and spend the first few months nursing while their mother hibernates. The first bear fact the movie presented was that 50% of cubs of the year do not survive, and in this way the movie prepared the audience that one of the two cubs may die during the movie.\nWhile I really did enjoy this movie, I had a quibble with the narrative. The filmmakers showed multiple scenes where large males advanced on the female and her cubs. They narrated these scenes as the males wanting to eat the cubs as a source of food. While eating young in resource scarce environments has been reported, biologists hypothesize that male aggression on un-weaned young is more related to mating and reproductive fitness.\nInfanticide, the killing of young by adults of the same species, has been reported in numerous mammals including bears, leopards, gorillas, and dolphins just to name a few. Both adult females and males have been reported to commit infanticide, although the prevalence by one sex may vary with species. For example, this paper reports the risk of female infanticide in mongooses, a cooperative breeding species. Infanticide by males has been widely reported; for brown bears, 80% of infanticidal attacks are by males. Attacks may be sex biased with adult males killing male offspring.\nThere are several hypotheses about infanticide; however, the prevailing hypothesis is that it is a reproductive strategy for males. If a female loses the young that she is caring for, then she will go into oestrus sooner than if her young survive and she cares for them until they disperse as juveniles (for bears this usually occurs when they are 2). If the female losses her young early enough, she may be capable of mating in the current breeding season. This may provide the male an opportunity to mate with the female. In this way the male perpetrating infanticide, can increase his reproductive fitness. Infanticide decreases female fitness, so females have evolved multiple behaviors to avoid infanticide; two were shown in “Bears” including avoiding feeding places with dominant males and defending offspring including directly fighting with attacking males.\nOverall, I thought “Bears” was a fun and engaging movie that showcased the beautiful Alaskan wilderness. I just wanted to point out that the attacks on the cubs were more than a big bear in need of a snack."
] | [
"<urn:uuid:d1bed8ae-db4f-47a0-b0ea-c265a78938e0>"
] | [
"CC-MAIN-2017-26"
] | [
"https://wildlifesnpits.wordpress.com/2014/04/25/infanticide-in-mammals/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320438.53/warc/CC-MAIN-20170625050430-20170625070430-00681.warc.gz"
] | [
"en"
] | [
0.9727947115898132
] | [
574
] | [
3.046875
] | [
3
] |
[
"This vignette is a high-level overview of\ntargets and its educational materials. The goal is to summarize the major features of\ntargets and direct users to the appropriate resources. It explains how to get started, and then it briefly describes each chapter of the user manual.\ntargets R package is a Make-like pipeline toolkit for Statistics and data science in R.\ntargets accelerates analysis with easy-to-configure parallel computing, enhances reproducibility, and reduces the burdens of repeated computation and manual data micromanagement. A fully up-to-date\ntargets pipeline is tangible evidence that the output aligns with the code and data, which substantiates trust in the results.\nThe top of the reference website links to a number of materials to help new users start learning\ntargets. It lists online talks, tutorials, books, and workshops in the order that a new user should consume them. The rest of the main page outlines a more comprehensive list of resources.\nThe user manual starts with a walkthrough chapter, a short tutorial to quickly started with\ntargets using a simple example project. That project also has a repository with the source code and an RStudio Cloud workspace that lets you try out the workflow in a web browser. Sign up for a free RStudio Cloud account, click on the link, and try out functions\ntar_read() in the R console.\nThe debugging chapter describes two alternative built-in systems for troubleshooting errors. The first system uses workspaces, which let you load a target’s dependencies into you R session. This way is usually preferred, especially with large pipelines on computing clusters, but it still may require some manual work. The second system launches an interactive debugger while the pipeline is actually running, which may not be feasible in some situations, but can often help you reach the problem more quickly.\ntargets expects users to adopt a function-oriented style of programming. User-defined R functions are essential to express the complexities of data generation, analysis, and reporting. The user manual has a whole chapter dedicated to user-defined functions for data science, and it explains why they are important and how to use them in\nThe best practices chapter contains general recommendations about\ntargets pipelines in the real world, including how to define good targets, what to do if your workflow is itself an R package, and how to diagnose performance issues.\ntargets has special ways to include data files and literate programming reports in a pipeline. This functionality is optional in the general case, but it is necessary if you want a target to rerun in response to a change in a data file, or if you want an R Markdown report to re-render when an upstream target changes. The files chapter walks through this functionality, from input data to parameterized R Markdown.\nSometimes, a pipeline contains more targets than a user can comfortably type by hand. For projects with hundreds of targets, branching can make the _targets.R file more concise and easier to read and maintain. Dynamic branching is a way to create new targets while the pipeline is running, and it is best suited to iterating over a larger number of very similar tasks. The dynamic branching chapter outlines this functionality, including how to create branching patterns, different ways to iterate over data, and recommendations for batching large numbers of small tasks into a comfortably small number of dynamic branches.\nStatic branching is the act of defining a group of targets in bulk before the pipeline starts. Whereas dynamic branching uses last-minute dependency data to define the branches, static branching uses metaprogramming to modify the code of the pipeline up front. Whereas dynamic branching excels at creating a large number of very similar targets, static branching is most useful for smaller number of heterogeneous targets. Some users find it more convenient because they can use\ntar_visnetwork() to check the correctness of static branching before launching the pipeline. Read more about it in the static branching chapter.\ntargets is capable of distributing the computation in a pipeline across multiple cores of a laptop or multiple nodes of a computing cluster. Not only does it interface with these technologies using packages\nfuture: it automatically deploys ready targets to parallel workers while making sure the other targets wait for their upstream dependencies to finish. Read more about high-performance computing in the HPC chapter.\nUsers with Amazon Web Services accounts can store their targets on one or more S3 buckets, and retrieval with\ntar_load() is seamless. The cloud computing chapter is a step-by-step guide that walks through how to get started with Amazon Web Services and connect a\ntargets pipeline to S3.\ndrake package is an older and more established R-focused pipeline toolkit, and it is the predecessor of\ndrake chapter of the\ntargets manual helps\ndrake users understand the role of\ntargets, the future direction of\ndrake, how to transition to\ntargets, and the advantages of"
] | [
"<urn:uuid:2cab7728-3bab-44d9-902a-fc39a3ca7c24>"
] | [
"CC-MAIN-2023-14"
] | [
"https://cran.microsoft.com/snapshot/2021-03-04/web/packages/targets/vignettes/overview.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943704.21/warc/CC-MAIN-20230321162614-20230321192614-00140.warc.gz"
] | [
"en"
] | [
0.8814190030097961
] | [
1092
] | [
2.890625
] | [
3
] |
[
"Performing a life cycle assessment is very important for the determination of the environmental impact of both existing and future projects that affect society. However, in order to have reliable results it is imperative to have accurate data to base the calculations on. In particular for projects related to biogas production, which are characterised by many uncertain variables (e.g. large variations of feedstock both in quality and quantity, transportation, availability and storage conditions of feedstock, weather conditions, distribution of end product), it is important to get specific and updated data for each individual case. By performing methane potential tests with the AMTPS II it is simple to get direct and important information of how much and fast energy can be recovered from the raw biomass material, which are key figures that will have a large influence on the results of a life cycle assessment.\nEXAMPLE 1: Compare different process configurations\nA life cycle assessment can be used to determine which type of process configuration is the most sustainable option for a project. In these cases it is very important to have accurate data based on how the different process configurations are performing. By using the AMPTS II to evaluate this, by simulating the biomass degradation under certain process configurations, it is possible to generate this important data with minimal effort (Patterson et al., 2013).\nAnimated representation of the biofuel life cycle (eXtension, 2015).\nEXAMPLE 2: Determine the energy potential related to the input conditions\nIn order to find the best possible feedstock for an industrial process, it is important to relate their methane producing potential with the conditions they are obtained from. Parameters such as transportation, storage possibilities, growth yield, harvest time and pre-treatment processes are examples of factors that need to be related to the methane potential in order to find the most sustainable option.\nEXAMPLE 3: Use online database to get highly specific data\nThe use of AMPTS II includes access to an online database with previously performed tests from users around the world. By using this data it will be possible to get a better understanding of the biogas or biomethane production that can be expected from the different biomass sources, depending on parameters such as material type, season variation and geographic locations. This will provide the study with much more realistic data compared to estimated values or results from individual tests in one lab.\nDownload this article as pdf ››\nAnd here below you have the product!\nAMPTS II - methane potential analysis tool\nThe AMPTS II is an efficient analytical instrument for conducting real-time BMP, anaerobic biodegradability and SMA assays, having sampling, analysis, recording and report generation fully integrated and automated. An evolution in methane potential analysis.\nThe AMPTS II is a well engineered analytical device developed for on-line measurements of ultra low biomethane and biogas flows produced from the anaerobic digestion of any biological degradable substrate at laboratory scale."
] | [
"<urn:uuid:ac895438-d2a2-477e-a4da-1036f2f8a727>"
] | [
"CC-MAIN-2020-05"
] | [
"https://www.bioprocesscontrol.com/academy/anaerobic-digestion/life-cycle-assessments/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250590107.3/warc/CC-MAIN-20200117180950-20200117204950-00060.warc.gz"
] | [
"en"
] | [
0.9197396636009216
] | [
606
] | [
2.953125
] | [
3
] |
[
"Sleep influences the quality of our life. Unfortunately, our busy lifestyle often interferes with natural sleep patterns and a lot of us are used to living without getting enough sleep. That is totally wrong! Lack of sleep can cause bad mood, higher levels of irritability, drowsiness, issues with concentration and with the digestive system. Regular poor sleep increases the risk of serious health problems, such as diabetes, obesity and heart disease. Therefore, sleep deficiency shortens our life expectancy.\nWell, now it is the time to think whether you get enough sleep or you need to change your bedtime habits for getting a good night’s rest. Remember, you can change your life for the better, just try! Here you’ll find 8+ ideas to sleep better at night.\nHow to Improve Sleep Habits?\nIf you understand that you don’t get enough sleep, it isn’t a bad thing. It means that you understand you have a problem. It also means being ready to change sleep habits.\nHowever, the first thing you need to do is define exactly what “enough” is. Generally, grownups in good health need 7-9 hours of night sleep.\nThen you should follow some well-known steps that can improve your ability to fall asleep and stay asleep:\n- Take time for sleep;\n- Keep your sleep/wake cycle;\n- Practice a calming bedtime ritual;\n- Perform light physical exercise or restorative yoga at least two hours before you go to bed;\n- Avoid over-excitement.\nDoctor Recommendations for Getting Restful Sleep\nMost of the physicians consider lack of sleep as a great problem for the current generation and continue to hold that we’ve got to act now! They investigate this problem and offer science-backed ways to get better sleep.\nMake Your Lifestyle Healthier\nSleep experts have proven a marked negative impact of alcohol and nicotine on sleep. Nicotine is known as a stimulant that can disturb sleep and increase the risk of developing sleeping conditions like sleep apnea. In turn, alcohol initially leads to drowsiness, but finally can also disturb sleep. Remember, at first, smoking and drinking can make you feel sleepy, but after all, they cause fragmented sleep and leave you feeling fatigue the following day.\nIt is clearly preferable to stop drinking and smoking entirely. However, if you can’t cut alcohol and cigarettes out of your life completely, try not to use them at least four hours before bedtime.\nHave a Nap in the Daytime\nWhen you are really tired and feel that you need some rest in the afternoon, you can allow yourself to have a little nap. Keep in mind the key word is “little”! Your daytime sleep must not last more than 45 minutes.\nDesign the Ideal Bedroom for Sleeping\nThe room where you are going to sleep directly affects your sleep quality. So, when you want to get a good night’s rest, make your bedroom environment comfortable.\nTips to Improve Sleep Quality for Maximizing Your Sleep Environment:\n- Hang blackout curtains to block outside lighting;\n- Dim or switch off the lights in the room;\n- Color the walls in relaxing blue or green shade;\n- Choose a comfortable mattress, suitable pillows and sheet;\n- Minimize noises in the house and outside;\n- Find out the perfect bedroom temperature for sleeping;\n- Surround yourself with a scent you love.\nControl Your Diet\nAvoid large, spicy and sugar meal at least four hours before going to bed. A light snack two hours before bedtime is accessible if you really feel hungry.\nLimit the Intake of Water and Fluids before Bed\nBedtime is the only time you shouldn’t drink water and other fluids. Drinking water before going to bed can be an inconvenient problem because it disturbs your sleep. You should wake up once or more to empty the bladder. It would be better to avoid drinking fluids at least two hours before bedtime.\nUse Melatonin to Regulate Your Sleep\nMelatonin is also called the “sleep hormone” because high levels of this hormone can help you fall asleep faster. Melatonin is a hormone, which lets your body and brain know that it is bedtime and you may relax falling asleep much easier. People all over the world who have sleep disorders use melatonin supplements. By the way, it is supplied without a prescription in most countries.\nAvoid Caffeine before Bedtime\nMaybe you think that it goes without saying that people mustn’t drink coffee for getting better sleep. But pay attention, we mean not only coffee, we mean all drinks that contain caffeine. You should understand that tea, soda and chocolate can also include caffeine and it would be better to check the caffeine content of the drinks before ingesting them in the evening.\nRemove All Your Gadgets from Your Bed\nReserve your bed for sleep! Surely, you may send some funny good night meme to your friend and then put away your laptop or smartphone. You shouldn’t work in your bed because only then you stop associating your bed with stress.\nSpeak with Your Doctor\nIf you’re still having poor sleep, you should visit your doctor or consult a sleep professional. It is a medical issue and, in some cases, sleep deficiency may require medical treatment.\nKeep in mind a solid night’s sleep is particularly important for your health and well-being. It has a lot of benefits for you, including protecting your mental and physical health, personal safety and quality of life. Don’t you ever forget that!"
] | [
"<urn:uuid:d1afa85f-ff40-4c16-807e-ed629a8e02ce>"
] | [
"CC-MAIN-2020-05"
] | [
"https://daisylinden.com/ideas-to-improve-your-sleep/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251789055.93/warc/CC-MAIN-20200129071944-20200129101944-00026.warc.gz"
] | [
"en"
] | [
0.9303467869758606
] | [
1159
] | [
2.796875
] | [
3
] |
[
"Protein: the basics\nProtein is one of our 3 macronutrients. It offers 4 calories per gram and we should be getting at least 10% of our calories from protein. To help with muscle repair and rebuilding, athletes need more like 15% of calories coming from protein, and some strength and muscle building disciplines, like bodybuilders, require up to 20% of calories coming from protein.\nWe've grown to believe that the more protein the better, and marketing has led us to believe that eating animals is the best way to increase protein intake. People associate high intakes of protein with health, and protein powders, protein supplements and other protein isolates are consumed by athletes and non-athletes. We have become protein obsessed and although a 0.8 gram per kg of body weight ratio is recommended by experts (which means a 70 kilogram person should eat 60 grams of protein per day), it's super common to hear of non-athletes consuming upwards of 100-120 grams of protein per day. And although protein is considered to be a satiating macro (meaning that it makes you feel full), studies have shown that they do not lead to subsequent decreases in total caloric intake, like fiber does (more on fiber and its satiating effect in the Carbohydrates section). Protein excess simply leads to protein getting broken down and either transformed and used as carbs, or stored as energy for later use. Being a non-efficient source of energy, experts recognize that there is no logical reason to recommend excessive protein intake, since this does not improve health outcomes or athletic performance.\nHow they're built\nProtein is made of amino acids, all joined together in a specific order. They're found throughout the body, in hair, muscles, bones. They make the enzymes that power most chemical processes keeping us alive and can also be used as fuel when needed. Of the 20 amino acids that make up protein, 9 are essential, meaning that our bodies can't synthesize them and must be obtained in our food. The others are non-essential, meaning that our bodies can make them from scratch, or modify existing ones to make new ones.\nThe essential amino acids include histidine, isoleucine, leucine, lysine, methionine, phenylalanine, threonine, tryptophan, and valine. If you're eating a calorie sufficient diet coming from a variety of plants, then you're getting enough protein. The issue lots of people will raise is the fact that meat contains \"complete protein\", meaning that it contains all of the 20 amino acids, including the 9 essential ones. Since most plant sources don't contain all 20 amino acids, and some lack certain essential amino acids, some plant protein is said to be incomplete. Keep in mind that the human body will do exactly what other animals do, meaning that it will take bits and pieces of the different sources of plant protein, and make a complete one. In fact, all of the plants have different amounts and ratios of amino acids, meaning that all we have to do is eat a small variety of plants and the body will combine amino acids to fill in the gaps. Think of the silverback gorilla, one of the strongest animal specimens, who feeds on leaves and shoots all day.\nAnimal versus plant protein\nResearch clearly shows that the source of our protein is much more important than the amount, and protein comes pre-packaged with different compounds depending on the source. Animal sources of protein come pre-packed with inflammatory compounds, like saturated fats, heme-iron, cholesterol, sodium and zero fiber. Plant sources of protein come with fiber, antioxidants, anti-inflammatory compounds, phytonutrients, zero cholesterol and almost no saturated fat. In terms of calorie density, animal protein has an average of 1000-2000 calories per pound of food, versus plant sources of protein which have a calorie density closer to 200-600 calories per pound of food. Lots of baggage comes with animal protein, and on top of the excess calories, cholesterol, saturated fats, carcinogens and lack of fiber, we must also include the devastating environmental impacts and cruel mistreatment of animals.\nHere's a quick comparison of different sources of protein:\nA 4-ounce broiled sirloin steak is a great source of protein—about 33 grams worth. But it also delivers about 5 grams of saturated fat.\nA 4-ounce ham steak with 22 grams of protein has only 1.6 grams of saturated fat, but it’s loaded with 1,500 milligrams worth of sodium.\nA cup of cooked lentils provides about 18 grams of protein and 15 grams of fiber, and it has virtually no saturated fat or sodium, and is filled with prebiotics, vitamins and minerals like iron.\nFor athletes, the evidence clearly shows that plant protein is as effective as animal protein in terms of muscle and strength building potential. Even though the science is out, non-athletes still tend to consider protein supplements like whey protein a health food. Corporations, to minimize waste and increase profit, needed to find a way to reuse the milk proteins, casein and whey, which are by-products of cheese making. Cue protein powders that were marketed to athletes as the magical protein solution. Little do they know that these 2 milk proteins are linked to increased risk of hormone dependent cancers, like breast and prostate cancer. Other animal sources of protein have been found to increase systemic inflammation and oxidative stress, which in the long term, will increase risk of many inflammatory, allergic and chronic medical conditions, including cancer. In fact, the World Health Organization has issued a statement that meat and particularly processed meat, is linked to increased risk of cancer. Processed meat is classified as a class 1 carcinogen, meaning that the level of proof linking both is as strong as the association between smoking and lung cancer.\nSo whenever possible, consume plant sources of protein to avoid the inflammatory compounds in animal products, and to consume the anti-inflammatory ones in plant sources. It will help you avoid chronic disease, and have improved health outcomes. If you're an athlete, have no fear, because if you're eating enough calories of a variety of plant foods, you're getting sufficient and higher quality protein.\nOften a source of confusion and a result of misinformation, soy protein has gotten a bad reputation over the years. But when we look at the actual science, we get a much different picture. Soy refers to products made from soybeans, a member of the legume family. Many foods are made from soy, including whole-soy products like edamame (mature soy beans), soy milk (emulsified soy beans), tofu (soy milk curds), and tempeh (fermented soybeans). Soy is also present in more processed soy products like soybean oil, soy flours, textured vegetable protein (or TVP, used in meat alternatives) and dairy substitutes like yogurts and cheeses.\nThe confusion stems from the fact that soy contains phytoestrogens, and the fear that these compounds could stimulate growth in hormone dependent tissues, like breasts and prostate tissues, and could eventually lead to an increased risk in cancer in these tissues. Science has debunked that a long time ago, but like autism and vaccines, the fear continues.\nIn its unaltered state, soy is a highly nutritious food, containing plant protein, fiber, B vitamins, iron, zinc and antioxidants. It contains no cholesterol, is low in unwanted saturated fats, and high in desirable polyunsaturated fats. People eating whole or minimally processed soy have better general health, including lower cholesterol, better fertility, less heart disease, less obesity, less osteoporosis, and better management of menopausal symptoms.\nAs for the cancer risk, this is a classic case of \"bro-science\" where the truth gets distorted into a scientifically plausible, but inaccurate theory. Let me explain. Soy doesn't contain estrogen, but rather a beneficial class of phytoestrogens called isoflavones. These compounds act as SERMs (selective estrogen receptor modulators), meaning that they bind to receptors in breast tissue where they have antagonistic effects on tissue growth. In other words, they block estrogen from binding to breast tissue and increasE hormone dependent cancers. SERMs are particular in terms that they mimic estrogen where they have beneficial effects and block estrogen in appropriate tissues. This minor detail has major significance in terms of cancer risk, where soy has protective effects instead of negative ones.\nThere's no need to worry about soy. It doesn't increase the risk of cancer, and populations with the highest consumption rates of soy products have the lowest rates of hormone dependent cancers. They don't hinder muscle building in the athlete or cause feminization, and are as good as animal proteins in terms of building lean muscle mass, likely better because of all the additional health benefits and nutrition attached to it. Try eating soy in its most natural forms, like edamame beans, tofu, tempeh or soy milk, and try to minimize more processed forms.\nProtein is super important. It contributes to the growth and repair of all tissues and organs. Although we associate protein with muscles, it also plays an important role in immune function, enzyme synthesis and overall health, but somewhere along the way, the message of more is better got accepted as the norm. Sufficient amounts of protein are necessary, but in amounts much smaller than we're led to believe. While the recommendation for the average Joe is 0.8 grams of protein per kilogram of body weight, we still see non-athletes eating upwards of 100-120 grams of protein per day, believing that this is a healthy practice. The marketing of protein supplements and whey powders were initially directed at athletes, but now are pitched as health supplements for all.\nSo lay off the excessive protein intake, and consume mostly plant sources of protein, since they come packed with beneficial nutrients and are devoid of the bad stuff that comes with animal protein. To ensure our body gets all the amino acids it needs to build complete protein from all 20 amino acids, including the 9 essential ones we must get through diet, try eating a variety of plant sources of protein, like soy products, legumes, nuts and seeds, and the right amount of grams of protein, carbs and fat will magically happen without much effort."
] | [
"<urn:uuid:0962fa72-031c-418c-a19c-b68066079689>"
] | [
"CC-MAIN-2023-06"
] | [
"https://www.plantbaseddrjules.com/protein"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499857.57/warc/CC-MAIN-20230131091122-20230131121122-00729.warc.gz"
] | [
"en"
] | [
0.956888735294342
] | [
2137
] | [
3.125
] | [
3
] |
[
"I’m studying for my Psychology class and don’t understand how to answer this. Can you help me study?\n- make an outline of the chapter.\n- Be sure that your outline includes key concepts, terms, and people from the “Unit Objectives” document in the unit box at Moodle.\n- Make sure you include the important information that is contained in each section of the chapter.\n- Your outline should have the most important points from the chapter in it, but you don’t need to include every point the chapter makes. A general rule of thumb is that every 1 to 3 paragraphs can usually be summarized in a phrase or two on your outline, more or less.\n- Make sure your spelling, grammar, and punctuation are correct.\n- Your outline must be your own work, of course. You can copy the headings and sub-headings within the chapter of your textbook, but the rest of the phrases and sentences should be in your own words. Don’t copy those from your book or the internet — write them in your own words.\n- Submit your outline on a word document before the Due Date.\nUnit Eleven Objectives\nSave your time - order a paper!\nGet your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlinesOrder Paper Now\nhierarchy of needs\n*** The concepts, terms, and people listed above need to be included within the outline\nI wasn’t able to post pictures of the whole chapter, I will do so after the bid on the assignment is accepted"
] | [
"<urn:uuid:41b58cf4-33e9-4c51-8f41-4c8c19e9c8e0>"
] | [
"CC-MAIN-2023-06"
] | [
"https://nursinghomeworkanswers.com/psychology-4007-chapter-outline/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499804.60/warc/CC-MAIN-20230130070411-20230130100411-00756.warc.gz"
] | [
"en"
] | [
0.8969208002090454
] | [
422
] | [
2.6875
] | [
3
] |
[
"Occasionally, children fail to develop one or more speech sounds (phonemes) when they have developed otherwise normal speech and language skills. Articulation disorders in children call attention to a child’s speech and detract from effective communication. Some children are teased or penalized for these simple articulation errors.\nThe most common articulation errors are the “s”, “l” and “r” sounds although other speech sounds may be involved. This type of articulation problem should not be mistaken for apraxia of speech.\nBeaumont's articulation disorders program is designed to treat children with these isolated speech problems. Individual therapy sessions with extensive home practice drills help children understand and address their specific problem. Family involvement and practice at home is an important aspect of this program.\nArticulation Disorders FAQ\nWhat is articulation?\nArticulation involves accuracy of placement of the lips, tongue, jaw and airflow for speech sound production. Articulation is the way sounds are formed.\nWhat are articulation disorders?\nIncorrect production of speech sounds due to difficulty with discrimination, placement, timing, direction and speed of the lips, tongue, jaw and airflow.\nDid You Know?\n- A 2-year-old child should be approximately 65% intelligible to the general listener.\n- A 3-year-old child should be approximately 80% intelligible to the general listener.\n- A 4-year-old child should be very intelligible in connected speech. Often described as talking like a “little adult.”\nApproximately 50 percent of preschoolers with articulation disorders also have language disorders.\nArticulation disorders are the most common type of communication disorder."
] | [
"<urn:uuid:aea84062-12fd-40ef-97e9-d1267ba46b32>"
] | [
"CC-MAIN-2020-05"
] | [
"https://www.beaumont.org/conditions/articulation-disorders-in-children?related=condition"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250599789.45/warc/CC-MAIN-20200120195035-20200120224035-00511.warc.gz"
] | [
"en"
] | [
0.9391542673110962
] | [
357
] | [
3.828125
] | [
4
] |
[
"Demonstratives in Trial\nAs we know, people have their own unique learning styles. Generally speaking there are auditory, visual and tactile learners. This simply means that people generally learn best by either listening, seeing, or touching and experiencing. However, although we all have a more dominant learning style, we still use these three learning mechanisms to gather and process information. To this end, the more we as trial lawyers can use multiple mechanisms of communication, the more persuasive we can be. Thus, when we present evidence we should attempt to incorporate more than just one medium of communication into our presentations. Moreover, trials are long and tedious affairs. Jurors today have shorter attention spans than ever before. Given this fact, we need to do everything we can to make our presentation dynamic and interesting. Thus, we need to get away from relying solely on the spoken word.\nOne of the best ways to do this is to incorporate visual aids into our presentations. When we think about what visual aids to use we should first determine how many different issues we will present at trial. For instance, within our cross examination of the defendant we may have several different issues alone. Let’s say that one of the issues is proving liability and the other issue is proving a lack of credibility. As a guideline, we could create one visual aid for each of those two issues. In this way we can create a new and interesting visual aid for each issue in our case. This does a couple things for us at once. First and foremost, the visual aid creates a new form of stimulus which helps keep and maintain the interest of the jurors. Secondly, this gives another method of persuasion as a visual aid is different and typically more persuasive than the spoken word, and third the visual aid signals and creates a new chapter heading. If we introduce a new visual aid with each issue, which I call a chapter, the jurors can easily determine when we move from one chapter to the next chapter. This method of presentation is easier to digest and follow for our jurors.\nVisual aids can be presented in a variety of forms. Anytime you can put a demonstrative in your hands or the witness’s hands as you question the witness you create greater interest in what you or the witness is saying. If you can offer the demonstrative to the jurors to hold in their hands and pass around amongst themselves this is also highly effective and much more memorable than simply telling the jurors about a particular item of evidence. Let the jurors hear, see, and feel evidence whenever you can. Another highly effective way of presenting evidence is through poster board images. Writing on a poster board or easel while you conduct direct or cross examination is highly effective. You can write the witness’s answers down as the witness testifies. This way the jurors hear and see the testimony, adding greater interest and persuasion. Alternatively, you can create a list and cross items off of this list according to your witness’s testimony during examination.\nIf you are describing a situation, such as an accident, what better idea than to put up large images of the accident before the jurors on poster boards? When the jurors can see the images you are describing they obtain a much better understanding of the scene you describe. Perhaps you want your expert life care planner to tell the jurors about what will be required for your client going forward, following an accident. Have your life care planner bring as many devices as he or she can carry into the courtroom. Pass these items around for the jurors to feel, see, and touch. Suddenly the evidence becomes much more powerful for the jurors. If the devices are too big to bring into court then present blown up photographs of these items to your jurors. Blow the photographs up and place them on poster board.\nAny time you are using a visual aid on poster board make sure that your visual aid is large enough to be seen by jurors who may have poor eyesight. You want any pictures, diagrams, or writings on poster board to be large for two reasons. The first is that you want jurors to be able to easily see and depict what is on the board. The second reason you want your pictures big is that you want these images to make an impact on the jurors. The larger the picture, the larger the impression upon the jurors. Whenever you put a picture up in front of the jurors make sure to crop out any images within the same picture which are not relevant. As always, less is more in trial. You always want to cut down any information from your presentation which won’t directly help the trier of fact reach a verdict in your client’s favor. You want your jurors to immediately know what they are looking at when they see a photograph. Jurors shouldn’t have to spend time looking over the photo in order to see what you are directing their attention to. To this end, you should have a professional who is proficient in graphic design create these poster boards for you. You want the pictures to be clear, organized, well framed, and titled correctly. If you are directing the jurors to look at a certain area of a photograph but you need your jurors to see the entirety of the photo to establish context, then have your designer draw computer generated diagrams to focus the juror’s attention onto one specific area. Have your designer highlight written words on a diagram which you want the jurors to read specifically. Your presentation should be as professional as possible.\nAs a general proposition, anytime you are going to present a demonstrative which reinforces what you are going to tell the jury be sure to tell the jury about the evidence first, before showing the jurors the demonstrative. If you show the jurors the demonstrative at the same time as you simultaneously tell your jurors about the subject matter then your jurors will not fully engage in what you are saying. They will look to the diagram first to try to determine what it is you are talking about without completely listening to you. This is why it is always best to first tell the jurors about whatever evidence or argument you may have before presenting it. Then, after your oral presentation you bring out the demonstrative and show the jurors the very thing you were just talking about. In this way the jurors are fully engaged in both your oral and visual presentation.\nWhen you put your visual aids up around the courtroom try to leave the demonstratives there in front of the jurors for as long as possible. When you rest with a given witness leave your poster board up in the courtroom. Force defense counsel to remove your demonstrative from the juries’ purview. When the defense leaves a visual aid up after they rest don’t remove the visual aid yourself. Personally removing the demonstrative demonstrates weakness or fear to the jurors. Instead, tell the judge, outside the presence of the jurors to have his staff remove the visual aid. Also, throughout the trial process and leading up to trial more importantly take a good look at all of the defense exhibits and demonstratives. Given current technology it is easy to modify images or present them in ways which are not accurate depictions. If you notice this sort of thing, then you need to put an objection before the court in your motion in limine. Again, you do any and all objections possible in limine so that the jurors do not see you attempting to hide evidence from their purview. This is how the jurors see your actions when you make objections in trial, as weakness and or deceit.\nWhen it comes to your opponent’s demonstratives, try to use these against the defense whenever you can. David Ball calls this “the boomerang” technique. What you do here is essentially use any demonstrative which the defense puts up before the jurors against the defense. So, for example, if defense counsel writes a list of items on an easel or poster board then you as plaintiff’s counsel could cross off each item from the same list while cross examining the witness whom the defense just directed. This is a highly persuasive technique. By the same token, be careful what you say or present to the jurors. Think about the variety of ways the defense could make you eat your own words. Smart defense counsel will do this every chance they get.\nDavid Ball has another brilliant idea which is to bring the victim’s, plaintiff’s, family into the courtroom whenever you can. Of course, take into consideration the appearance of these individuals. In this way the jurors see that the case is about more than just the plaintiff. They see that the plaintiff has a family which relies on him or her. Bring the children into the court room during the voire dire process under the pretext of determining if any of the jurors know the plaintiff’s children or family members. Really what you are doing is bringing in these kids for purposes of demonstrating that the plaintiff has children who depend on him or her. This makes the consequences of the trial much more real and tragic to the jurors.\nThe information in this short article comes primarily from the teachings of David Ball. David Ball is an exceptionally talented jury and trial consultant. In my opinion the man is brilliant. For a more thorough understanding of this subject matter I refer you to any of his books, which are amazing. Additionally, he tours across the country with Don Keenan. The two of these guys put on amazing seminars. If you get the opportunity to attend a seminar of theirs I suggest you do so."
] | [
"<urn:uuid:df854955-7381-4b81-b2a8-cb9f932e1fd0>"
] | [
"CC-MAIN-2023-14"
] | [
"https://ericroylawfirm.com/personal_injury_arti/demonstratives-in-trial/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943471.24/warc/CC-MAIN-20230320083513-20230320113513-00167.warc.gz"
] | [
"en"
] | [
0.953199565410614
] | [
1912
] | [
2.75
] | [
3
] |
[
"This booklet sets out guidance for assessing the effectiveness of an ecosystem-based approach to climate change adaptation.\nStudies & Presentations\nGiven a poverty line, a person who is non-poor (poor) currently may not be treated as non-poor (poor) in a vulnerable situation.\nThe Pacific Possible: Climate change and Disaster Resilience report highlights the costs of making Pacific coastlines more resilient to climate change, which vary between one and thirteen percent of GDP across all Pacific Island countries, with higher costs in atoll island states such as Kiribati\nA new report from The World Bank Group, CLASP, and Carbon Trust, A Greener Path to Competitiveness offers recommendations an\nThe Decision Tree Framework described in this book provides resource-limited project planners and program managers with a cost-effective and effort-efficient, scientifically defensible, repeatable, and clear method for demonstrating the robustness of a project to climate change."
] | [
"<urn:uuid:168011ff-07c2-409e-802c-1ca4e234d1d0>"
] | [
"CC-MAIN-2020-05"
] | [
"http://povertyenvironment.net/studies-tools?page=1"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251783000.84/warc/CC-MAIN-20200128184745-20200128214745-00226.warc.gz"
] | [
"en"
] | [
0.9063090085983276
] | [
191
] | [
2.625
] | [
3
] |
[
"Micro expressions occur when someone wants to hide a felt emotion – so it will always depend on the person (whether they care about hiding the emotion or not) and the situation (whether it would be bad for the person to be caught expressing that emotion, such as a child trying not to smile at a funeral) as to whether someone will leak an expression.\nMicro expressions were first discovered by Haggard and Isaacs over 40 years ago. They published a report on these expressions in 1966, which they called “micromomentary” expressions. The article they wrote was entitled Micro-momentary facial expressions as indicators of ego mechanisms in psychotherapy. Many subsequent studies have been conducted based on the research by Haggard and Isaacs, but the discovery of micro expressions should be attributed to them.\nEmotions are immediate, automatic, and unconscious reactions – and are perhaps the closest thing humans have to a universal language. Truly felt emotions and expressions occur involuntarily, without thought or intention, where false expressions have to be displayed intentionally. The face is a dual system, showing both intentional and involuntary emotions – and sometimes a blended expression of genuine and fake displays. Put simply, the face displays what the person wants to show, and what the person wants to conceal.\nExpressions are likely to be false when they are asymmetrical, the duration of expression is either too long or too short, or the timing of the expression in relation to the speech is not synchronized. The face can also be a valuable source of information for detecting deceit, because the face can lie and tell the truth – and often does both at the same time (Ekman, 2009).\nThe Seven Universal Expressions\nCharles Darwin was one of the first people known for researching emotion, believing emotions to be biological and universal. Paul Ekman and Wallace V. Friesen studied universal emotions in Papua New Guinea, verifying that even cultures which have no contact with the outside world share these seven universal emotions: happiness, surprise, contempt, sadness, fear, disgust and anger. Therefore, the seven universal expressions are expressed by everyone, regardless of race, culture, age or gender. Studies done by David Matsumoto demonstrated that sighted and blind individuals produce the same facial muscle movements in response to emotional stimuli – even when they are blind from birth. This indicates that emotions are innate; we are born with the knowledge of how to express these emotions through facial expressions.\nCultural differences in non-verbal communication do start appearing when it comes to gestures, in particular, hand and facial emblems. Even areas within cities can have their own gesturing language and meaning.\nAn expert in body language, micro expressions and emotional surveillance he has worked on analyzing police interview footage to assess credibility, written and consulted for a national publication and assisted with thesis and university studies."
] | [
"<urn:uuid:e05a3afd-8a90-42cc-b217-ffaf6539f209>"
] | [
"CC-MAIN-2020-05"
] | [
"https://group.formaementis.net/why-study-micro-expressions-and-the-face/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250615407.46/warc/CC-MAIN-20200124040939-20200124065939-00427.warc.gz"
] | [
"en"
] | [
0.9496963620185852
] | [
573
] | [
3.90625
] | [
4
] |
[
"- Year Published: 1908\n- Language: English\n- Country of Origin: United States of America\n- Source: Ozaki, Y.T. (1908). Japanese Fairy Tales. New York: A.L.Burt Company.\n- Flesch–Kincaid Level: 7.7\n- Word Count: 3,118\nOzaki, Y. (1908). The Stones of Five Colors and the Empress Jokwa. Japanese Fairy Tales (Lit2Go Edition). Retrieved June 29, 2017, from\nOzaki, Yei Theodora. \"The Stones of Five Colors and the Empress Jokwa.\" Japanese Fairy Tales. Lit2Go Edition. 1908. Web. <>. June 29, 2017.\nYei Theodora Ozaki, \"The Stones of Five Colors and the Empress Jokwa,\" Japanese Fairy Tales, Lit2Go Edition, (1908), accessed June 29, 2017,.\nLong, long ago there lived a great Chinese Empress who succeeded her brother the Emperor Fuki. It was the age of giants, and the Empress Jokwa, for that was her name, was twenty-five feet high, nearly as tall as her brother. She was a wonderful woman, and an able ruler. There is an interesting story of how she mended a part of the broken heavens and one of the terrestrial pillars which upheld the sky, both of which were damaged during a rebellion raised by one of King Fuki’s subjects.\nThe rebel’s name was Kokai. He was twenty-six feet high. His body was entirely covered with hair, and his face was as black as iron. He was a wizard and a very terrible character indeed. When the Emperor Fuki died, Kokai was bitten with the ambition to be Emperor of China, but his plan failed, and Jokwa, the dead Emperor’s sister, mounted the throne. Kokai was so angry at being thwarted in his desire that he raised a revolt. His first act was to employ the Water Devil, who caused a great flood to rush over the country. This swamped the poor people out of their homes, and when the Empress Jokwa saw the plight of her subjects, and knew it was Kokai’s fault, she declared war against him.\nNow Jokwa, the Empress, had two young warriors called Hako and Eiko, and the former she made General of the front forces. Hako was delighted that the Empress’s choice should fall on him, and he prepared himself for battle. He took up the longest lance he could find and mounted a red horse, and was just about to set out when he heard some one galloping hard behind him and shouting:\n“Hako! Stop! The general of the front forces must be I!”\nHe looked back and saw Eiko his comrade, riding on a white horse, in the act of unsheathing a large sword to draw upon him. Hako’s anger was kindled, and as he turned to face his rival he cried:\n“Insolent wretch! I have been appointed by the Empress to lead the front forces to battle. Do you dare to stop me?”\n“Yes,” answered Eiko. “I ought to lead the army. It is you who should follow me.”\nAt this bold reply Hako’s anger burst from a spark into a flame.\n“Dare you answer me thus? Take that,” and he lunged at him with his lance.\nBut Eiko moved quickly aside, and at the same time, raising his sword, he wounded the head of the General’s horse. Obliged to dismount, Hako was about to rush at his antagonist, when Eiko, as quick as lightning, tore from his breast the badge of commandership and galloped away. The action was so quick that Hako stood dazed, not knowing what to do.\nThe Empress had been a spectator of the scene, and she could not but admire the quickness of the ambitious Eiko, and in order to pacify the rivals she determined to appoint them both to the Generalship of the front army.\nSo Hako was made commander of the left wing of the front army, and Eiko of the right. One hundred thousand soldiers followed them and marched to put down the rebel Kokai.\nWithin a short time the two Generals reached the castle where Kokai had fortified himself. When aware of their approach, the wizard said:\n“I will blow these two poor children away with one breath.” (He little thought how hard he would find the fight.)\nWith these words Kokai seized an iron rod and mounted a black horse, and rushed forth like an angry tiger to meet his two foes.\nAs the two young warriors saw him tearing down upon them, they said to each other: “We must not let him escape alive,” and they attacked him from the right and from the left with sword and with lance. But the all-powerful Kokai was not to be easily beaten—he whirled his iron rod round like a great water-wheel, and for a long time they fought thus, neither side gaining nor losing. At last, to avoid the wizard’s iron rod, Hako turned his horse too quickly; the animal’s hoofs struck against a large stone, and in a fright the horse reared as straight on end as a screen, throwing his master to the ground.\nThereupon Kokai drew his three-edged sword and was about to kill the prostrate Hako, but before the wizard could work his wicked will the brave Eiko had wheeled his horse in front of Kokai and dared him to try his strength with him, and not to kill a fallen man. But Kokai was tired, and he did not feel inclined to face this fresh and dauntless young soldier, so suddenly wheeling his horse round, he fled from the fray.\nHako, who had been only slightly stunned, had by this time got upon his feet, and he and his comrade rushed after the retreating enemy, the one on foot and the other on horseback.\nKokai, seeing that he was pursued, turned upon his nearest assailant, who was, of course, the mounted Eiko, and drawing forth an arrow from the quiver at his back, fitted it to his bow and drew upon Eiko.\nAs quick as lightning the wary Eiko avoided the shaft, which only touched his helmet strings, and glancing off, fell harmless against Hako’s coat of armor.\nThe wizard saw that both his enemies remained unscathed. He also knew that there was no time to pull a second arrow before they would be upon him, so to save himself he resorted to magic. He stretched forth his wand, and immediately a great flood arose, and Jokwa’s army and her brave young Generals were swept away like a falling of autumn leaves on a stream.\nHako and Eiko found themselves struggling neck deep in water, and looking round they saw the ferocious Kokai making towards them through the water with his iron rod on high. They thought every moment that they would be cut down, but they bravely struck out to swim as far as they could from Kokai’s reach. All of a sudden they found themselves in front of what seemed to be an island rising straight out of the water. They looked up, and there stood an old man with hair as white as snow, smiling at them. They cried to him to help them. The old man nodded his head and came down to the edge of the water. As soon as his feet touched the flood it divided, and a good road appeared, to the amazement of the drowning men, who now found themselves safe.\nKokai had by this time reached the island which had risen as if by a miracle out of the water, and seeing his enemies thus saved he was furious. He rushed through the water upon the old man, and it seemed as if he would surely be killed. But the old man appeared not in the least dismayed, and calmly awaited the wizard’s onslaught.\nAs Kokai drew near, the old man laughed aloud merrily, and turning into a large and beautiful white crane, flapped his wings and flew upwards into the heavens.\nWhen Hako and Eiko saw this, they knew that their deliverer was no mere human being—was perhaps a god in disguise—and they hoped later on to find out who the venerable old man was.\nIn the meantime they had retreated, and it being now the close of day, for the sun was setting, both Kokai and the young warriors gave up the idea of fighting more that day.\nThat night Hako and Eiko decided that it was useless to fight against the wizard Kokai, for he had supernatural powers, while they were only human. So they presented themselves before the Empress Jokwa. After a long consultation, the Empress decided to ask the Fire King, Shikuyu, to help her against the rebel wizard and to lead her army against him.\nNow Shikuyu, the Fire King, lived at the South Pole. It was the only safe place for him to be in, for he burnt up everything around him anywhere else, but it was impossible to burn up ice and snow. To look at he was a giant, and stood thirty feet high. His face was just like marble, and his hair and beard long and as white as snow. His strength was stupendous, and he was master of all fire just as Kokai was of water.\n“Surely,” thought the Empress, “Shikuyu can conquer Kokai.” So she sent Eiko to the South Pole to beg Shikuyu to take the war against Kokai into his own hands and conquer him once for all.\nThe Fire King, on hearing the Empress’s request, smiled and said:\n“That is an easy matter, to be sure! It was none other than I who came to your rescue when you and your companion were drowning in the flood raised by Kokai!”\nEiko was surprised at learning this. He thanked the Fire King for coming to the rescue in their dire need, and then besought him to return with him and lead the war and defeat the wicked Kokai.\nShikuyu did as he was asked, and returned with Eiko to the Empress. She welcomed the Fire King cordially, and at once told him why she had sent for him—to ask him to be the Generalissimo of her army. His reply was very reassuring:\n“Do not have any anxiety. I will certainly kill Kokai.”\nShikuyu then placed himself at the head of thirty thousand soldiers, and with Hako and Eiko showing him the way, marched to the enemy’s castle. The Fire King knew the secret of Kokai’s power, and he now told all the soldiers to gather a certain kind of shrub. This they burned in large quantities, and each soldier was then ordered to fill a bag full of the ashes thus obtained.\nKokai, on the other hand, in his own conceit, thought that Shikuyu was of inferior power to himself, and he murmured angrily:\n“Even though you are the Fire King, I can soon extinguish you.”\nThen he repeated an incantation, and the water-floods rose and welled as high as mountains. Shikuyu, not in the least frightened, ordered his soldiers to scatter the ashes which he had caused them to make. Every man did as he was bid, and such was the power of the plant that they had burned, that as soon as the ashes mingled with the water a stiff mud was formed, and they were all safe from drowning.\nNow Kokai the wizard was dismayed when he saw that the Fire King was superior in wisdom to himself, and his anger was so great that he rushed headlong towards the enemy.\nEiko rode to meet him, and the two fought together for some time. They were well matched in a hand-to-hand combat. Hako, who was carefully watching the fray, saw that Eiko began to tire, and fearing that his companion would be killed, he took his place.\nBut Kokai had tired as well, and feeling himself unable to hold out against Hako, he said artfully:\n“You are too magnanimous, thus to fight for your friend and run the risk of being killed. I will not hurt such a good man.”\nAnd he pretended to retreat, turning away the head of his horse. His intention was to throw Hako off his guard and then to wheel round and take him by surprise.\nBut Shikuyu understood the wily wizard, and he spoke at once:\n“You are a coward! You cannot deceive me!”\nSaying this, the Fire King made a sign to the unwary Hako to attack him. Kokai now turned upon Shikuyu furiously, but he was tired and unable to fight well, and he soon received a wound in his shoulder. He now broke from the fray and tried to escape in earnest.\nWhile the fight between their leaders had been going on the two armies had stood waiting for the issue. Shikuyu now turned and bade Jokwa’s soldiers charge the enemy’s forces. This they did, and routed them with great slaughter, and the wizard barely escaped with his life.\nIt was in vain that Kokai called upon the Water Devil to help him, for Shikuyu knew the counter-charm. The wizard found that the battle was against him. Mad with pain, for his wound began to trouble him, and frenzied with disappointment and fear, he dashed his head against the rocks of Mount Shu and died on the spot.\nThere was an end of the wicked Kokai, but not of trouble in the Empress Jokwa’s Kingdom, as you shall see. The force with which the wizard fell against the rocks was so great that the mountain burst, and fire rushed out from the earth, and one of the pillars upholding the Heavens was broken so that one corner of the sky dropped till it touched the earth.\nShikuyu, the Fire King, took up the body of the wizard and carried it to the Empress Jokwa, who rejoiced greatly that her enemy was vanquished, and her generals victorious. She showered all manner of gifts and honors upon Shikuyu.\nBut all this time fire was bursting from the mountain broken by the fall of Kokai. Whole villages were destroyed, rice-fields burnt up, river beds filled with the burning lava, and the homeless people were in great distress. So the Empress left the capital as soon as she had rewarded the victor Shikuyu, and journeyed with all speed to the scene of disaster. She found that both Heaven and earth had sustained damage, and the place was so dark that she had to light her lamp to find out the extent of the havoc that had been wrought.\nHaving ascertained this, she set to work at repairs. To this end she ordered her subjects to collect stones of five colors—blue, yellow, red, white and black. When she had obtained these, she boiled them with a kind of porcelain in a large caldron, and the mixture became a beautiful paste, and with this she knew that she could mend the sky. Now all was ready.\nSummoning the clouds that were sailing ever so high above her head, she mounted them, and rode heavenwards, carrying in her hands the vase containing the paste made from the stones of five colors. She soon reached the corner of the sky that was broken, and applied the paste and mended it. Having done this, she turned her attention to the broken pillar, and with the legs of a very large tortoise she mended it. When this was finished she mounted the clouds and descended to the earth, hoping to find that all was now right, but to her dismay she found that it was still quite dark. Neither the sun shone by day nor the moon by night.\nGreatly perplexed, she at last called a meeting of all the wise men of the Kingdom, and asked their advice as to what she should do in this dilemma.\nTwo of the wisest said:\n“The roads of Heaven have been damaged by the late accident, and the Sun and Moon have been obliged to stay at home. Neither the Sun could make his daily journey nor the Moon her nightly one because of the bad roads. The Sun and Moon do not yet know that your Majesty has mended all that was damaged, so we will go and inform them that since you have repaired them the roads are safe.”\nThe Empress approved of what the wise men suggested, and ordered them to set out on their mission. But this was not easy, for the Palace of the Sun and Moon was many, many hundreds of thousands of miles distant into the East. If they traveled on foot they might never reach the place, they would die of old age on the road. But Jokwa had recourse to magic. She gave her two ambassadors wonderful chariots which could whirl through the air by magic power a thousand miles per minute. They set out in good spirits, riding above the clouds, and after many days they reached the country where the Sun and the Moon were living happily together.\nThe two ambassadors were granted an interview with their Majesties of Light and asked them why they had for so many days secluded themselves from the Universe? Did they not know that by doing so they plunged the world and all its people into uttermost darkness both day and night?\nReplied the Sun and the Moon:\n“Surely you know that Mount Shu has suddenly burst forth with fire, and the roads of Heaven have been greatly damaged! I, the Sun, found it impossible to make my daily journey along such rough roads—and certainly the Moon could not issue forth at night! so we both retired into private life for a time.”\nThen the two wise men bowed themselves to the ground and said:\n“Our Empress Jokwa has already repaired the roads with the wonderful stones of five colors, so we beg to assure your Majesties that the roads are just as they were before the eruption took place.”\nBut the Sun and the Moon still hesitated, saying that they had heard that one of the pillars of Heaven had been broken as well, and they feared that, even if the roads had been remade, it would still be dangerous for them to sally forth on their usual journeys.\n“You need have no anxiety about the broken pillar,” said the two ambassadors. “Our Empress restored it with the legs of a great tortoise, and it is as firm as ever it was.”\nThen the Sun and Moon appeared satisfied, and they both set out to try the roads. They found that what the Empress’s deputies had told them was correct.\nAfter the examination of the heavenly roads, the Sun and Moon again gave light to the earth. All the people rejoiced greatly, and peace and prosperity were secured in China for a long time under the reign of the wise Empress Jokwa."
] | [
"<urn:uuid:cad9bf1f-e5e0-42bd-90ef-eda85a3278d8>"
] | [
"CC-MAIN-2017-26"
] | [
"http://etc.usf.edu/lit2go/72/japanese-fairy-tales/4851/the-stones-of-five-colors-and-the-empress-jokwa/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323864.76/warc/CC-MAIN-20170629033356-20170629053356-00099.warc.gz"
] | [
"en"
] | [
0.9899502396583557
] | [
4071
] | [
2.765625
] | [
3
] |
[
"|36 STARS IN AN EXTRAORDINARY MEDALLION CONFIGURATION THAT FEATURES A GIGANTIC CENTER STAR, SURROUNDED BY A SINGLE WREATH, FLANKED BY PARENTHESES; ONE-OF-A-KIND AMONG KNOWN EXAMPLES, EX-RICHARD PIERCE COLLECTION, CIVIL WAR ERA, NEVADA STATEHOOD, 1864-67\n|Frame Size (H x L):||22.25\" x 16.25\"|\n|Flag Size (H x L):||14\" x 8\"|\n|36 STARS IN AN EXTRAORDINARY MEDALLION CONFIGURATION THAT FEATURES A GIGANTIC CENTER STAR, SURROUNDED BY A SINGLE WREATH, FLANKED BY PARENTHESES; ONE-OF-A-KIND AMONG KNOWN EXAMPLES, EX-RICHARD PIERCE COLLECTION, CIVIL WAR ERA, NEVADA STATEHOOD, 1864-67:\nIn the world of antique American flags there are nearly countless designs. Because there was no official star configuration until 1912, their placement before that time was left to the whims of the maker. Most structured their stars in lineal rows or columns. A smaller number of flag-makers chose medallion designs that employ two or three consecutive wreaths, usually surrounding a large center star and with a flanking star in each corner, outside the circular field. Substantially further down the rarity scale is the \"Great Star\" pattern, in which the smaller stars are arranged in the profile of one large star. This pattern is highly coveted and visually powerful, but there are rarer configurations still. Among these are circles within squares, pentagons, ovals, diamonds, starbursts, shields, and snowflakes. Then there are combinations of the above in various sorts, and flags where the stars form letters or numbers. There are flags where the stars are randomly placed with no pattern at all, and patterns that are entirely their own.\nThis particular flag, printed on glazed cotton, is an interesting deviation from the norm, combining a rare variant of a medallion design with additional graphics. In the very center is a single star, the scale of which, relative to the remaining 35 arranged about it, is proportionally enormous. The disparity of the relative proportions is equal to or greater than any other variety I can think of. There are a couple of other styles that come close, but these are rare and highly desired.\nInstead of two or three wreaths encircling the center star, there is only one. Such a circumstance is almost never encountered on either printed or sewn antique American flags with greater than 13 stars, and the higher the star count gets the less likely it will occur. On either side of this are crescents of stars, arranged like parentheses, which is even more rare. This occurs in at least one style of political campaign parade flag from 1884 (actually two varieties made for opposing candidates), and it can be seen on extremely unusual on sewn flags; more specifically, ones that are especially memorable standouts in the flag world, that serious collectors seldom forget, such as the one recorded by Boleslaw and Marie D’Ostrange-Mastai on page 115 of \"The Stars and the Stripes: The American Flag as Art and History From the Birth of the Republic to the Present\" (Knopf, New York, 1973), which was the first major reference on the subject of flag collecting.\nA flanking star in each corner of the blue canton completes the 36 star device on the flag in question here, which was also formerly part of a major collection. This exact flag is pictured on page in “The Stars & Stripes: Fabric of American Spirit” by J. Richard Pierce (J. Richard Pierce, LLC, 2005), p. 34, and it is made further important because it presently survives as one-of-a-kind among known examples.*\nLincoln pushed Nevada through to statehood on October 31st, 1864, during the Civil War, and just 8 days before the November election. The territory’s wealth in silver was attractive to a nation struggling with the debts of war and the president's support of statehood increased support for the Republican ticket. While the 36th star wouldn't officially be added until July 4th of the following year, flag makers cared little for official star counts. Some would have begun adding the 36th star several months before the addition of Nevada actually occurred and almost all would have added it after Nevada was in. Commercially produced flags with inscribed dates are known as early as July of 1864, four months before Nevada's addition. Adding stars before they were official was common practice during the late 19th century and reflects both the nation's desire for Westward Expansion and the hope of flag makers to bring new star counts to market before their competitors. The 36 star flag was officially replaced by the 37 star flag in 1867, following the addition of Nebraska.\nMounting: The gilded American molding dates to the period between 1840 and 1870. The flag has been placed in its correct vertical position, with its canton in the upper left. It was then hand-stitched to a background of 100% cotton twill, black in color, which was washed to remove excess dye. An acid-free agent was added to the wash to further set the dye and the fabric was heat-treated for the same purpose. Spacers keep the textile away from the glazing, which is U.V. protective glass.\nCondition: Condition: There is minor overall fading and there is minor foxing and soiling along the fly end. Many of my clients prefer early flags to show their age and history of use.\n* Important Note: Parade flags were typically printed on one side only, then the color bled through to the other side to result in a two-sided flag. These flags were printed on a bolt of fabric and were typically done in both what we might think of as forwards-facing and backwards-facing. Because they were block-printed, this allowed for the block to be moved only slightly after printing one blue canton, to print another next to it, allowing for economy of movement while at the same time decreasing the chance of dripping pigment on the fabric. There were no flag ethics at this time and there was no backwards or forwards in terms of the way we think of flags today. Plus, once the flag got on a staff, it didn't matter which side was darker. I try to frame the stronger side. When that happens to be the reverse, I orient the flag in its modern, correct vertical position if possible, with the canton in the upper left. In the Pierce book, the photograph of the flag is a mirror image, flipped horizontally, so that it would fit more easily with other flags on the page.\n|Collector Level:||Advanced Collectors and the Person with Everything|\n|Flag Type:||Parade flag|\n|Earliest Date of Origin:||1864|\n|Latest Date of Origin:||1867|\n|War Association:||1861-1865 Civil War|\n|Price:||Please call (717) 676-0545 or (717) 502-1281|"
] | [
"<urn:uuid:4473d800-ce12-4c0a-82e2-9ef93af88e09>"
] | [
"CC-MAIN-2017-26"
] | [
"http://jeffbridgman.com/inventory/index.php?page=out&id=2454"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320257.16/warc/CC-MAIN-20170624101204-20170624121204-00629.warc.gz"
] | [
"en"
] | [
0.9500162601470947
] | [
1538
] | [
2.59375
] | [
3
] |
[
"Agriculture is a process by which people adjust their ecosystems to meet various physiological needs. It simply means that agriculture involves all the skills and activities designed for the cultivation of land and more generally speaking all work done on the natural environment (not just land) to cultivate and produce resources useful to humans. Ever since the 19th century , many agricultural groups have the varied technical know-how of agriculture in various fields of biological , technical, cultural ,economic and social.\nAreas of study in agriculture\nCrop and livestock production :\nIn general, in this study area agriculture can be divided into two production areas:\n- Plant production with a focus on agriculture and other types of production horticulture (including fruit and ornamental plants ) and wine as well as bio-energy from renewable resources .\n- Animal production with different orientations depending on the animal species such as pig production , cattle production , poultry production , sheep production , fish farming , etc.\nDepending on the location, the production areas are basically chosen for either of the above i.e., on poor soil conditions the cattle competition is better and becomes a stronger competitive edge, while crop production is more economical on better soils.\nExtensive and intensive agriculture:\nIn this study area there are two categories found.\n- Extensive agriculture is characterized by a relatively high utilization factor of production land and a relatively weak use of other factors of production per unit of product produced.\n- Intensive agriculture is its opposite. Accordingly, between extensive and intensive livestock distinguished.\nTypical forms of Extensive Agriculture are remote pasture , shifting cultivation and collection Culture - extensive agriculture and nomadism (also seasonal) are historically most closely connected. Typical examples that mark the transition to Intensive use, are irrigation , drainage , deforestation , terraced fields , and targeted fertilization. Extensive and intensive agriculture are also - less precise - for the definition of ecological agriculture and conventional uses.\nHistory of agriculture\nThe Fertile Crescent of Western Asia, Egypt, and India were locations of the major intended seeding and reaping of plants that had been formerly suitable in nature. In 7000 BC, the nascent agriculture reached Egypt . In 6000 BC, laborer agriculture was ingrained on the panels of the Nile . This is due to poor development of the techniques still developing. In 5000 BC, the Sumerians had developed the main agricultural techniques, including demanding land cultivation on a large scale, monoculture methods, irrigation , and the custom of expert effort, principally along the watercourse now acknowledged as the Shatt al-Arab , the Persian Gulf delta to the convergence of the rivers Tigris and Euphrates.\nAgriculture in the world:\nFrom the beginning of agriculture in the period Neolithic, when the economy of human societies evolved from gathering, hunting and fishing to farming and ranching. The first plants that were cultivated were wheat and barley . Its origin is lost in the early stages of history and its development was conceived in various cultures, as those that emerged in the so-called Fertile Crescent (area of the Middle East from Mesopotamia to Ancient Egypt ), pre-Columbian cultures of Central America, culture developed by the Chinese east of Asia and so on. The reasons for the development of agriculture could be due to climatic changes towards warmer temperatures. It could also be due to the shortage of hunting or gathering food or the desertification of large areas.\nAgriculture in middle ages:\nThroughout the Middle ages, Europe has given birth to various important technological innovations in agriculture that provided some boost for the work of the peasants. The main innovations in medieval agriculture were due to greater dynamism of feudal mode of production, which meant for servants a greater incentive in improving production for slaves. The Games of Alfonso X of Castile define farmers within the stratified society like that till the ground and phased in it those things that men have to live and stay. This active peasantry was the core labor force in medieval society. The introduction of the heavy plow use (with wheels and moldboard ) permitted deeper cultivation of soils of northern Europe (joined along the XI century in the regions north of the Alps , while the fragile soils Mediterranean area were linked to the Roman plow ). The mills hydraulic (later thewind brought from Persia ) significantly increased labor productivity, as well as the gradual improvement of agricultural implements , as new types of harrows , sickles and scythes .\nTypes of agriculture:\nThe types of agriculture can be divided according to many different criteria classification:\nSubsistence farming : In this type of farming, minimum amount of food is cultivated that is required to meet the needs of the farmer and his family. The little surplus whatever left is contributed to the market and sold. The technical level is primitive.\nIndustrial Agriculture : Large quantities are cultivated , using expensive means of production and market for surplus. Typical industrialized countries, the developing countries and internationalized sector of the poorest countries integrate this type of farming. The technical level is a comparatively a little better and incorporates more or less a little bit of technology. Also defined as market agriculture .\nIntensive agriculture: This type of agriculture basically looks at a bigger produce in a comparatively small space. It leads to increased wear and tear of the site and the soils efficiency and functionality deteriorates over time.\nExtensive agriculture: In extensive agriculture , the cultivation is on a larger land and therefore causes less pressure on the site and their ecological relationships. However, its commercial benefits are minor.\nTraditional Agriculture: This form of agriculture essentially uses one particular area of land for the purpose of cultivation using the traditional practices with a key proposition of self sustainability without using up the lands utility value.\nIndustrial Agriculture: Cultivated mostly on rigorous structures. It is dedicated for cultivating in large amounts in less time. A lot of space and economic wear and tear occur in this type of agriculture. A great achiever of huge commercial benefits.\nOrganic Agriculture: Create various production systems that respect the ecological character of the sites and geo-biological of the soil, trying to keeping the seasons in mind and the natural distribution of plant species and also promotes soil fertility.\nNatural Agriculture: Products are collected without human intervention.The cultivation is produced and consumed.\nResearcher in agriculture\nThe pioneer names in agriculture are Graeme Barker,Barbara Bender,Babel W.,Marc Bloch, etc.\nAgriculture and environment:\nAgriculture has a major impact on the environment . In recent years, some aspects of intensive agriculture on an industrial scale have raised increasing concerns and has become all the more controversial. The disastrous effect on the environment of intensive agriculture has caused several previously fertile areas are to go completely beyond repair. Once such shocking example from the past is the Middle East fertile lands where once the most fertile farmland in the world and has now become nothing but a mere desert.\nResearch and developments of agriculture\n- During the Old Regime, the Southern and Eastern Europe tasted feudal economic system, especially in agriculture. The talks about a re-feudalization is evident from the 17th century crisis , which reaffirmed the predominant position of the lords against the peasants .The peasants ,who remained the overwhelming majority of the population, had no chance to start the accumulation of capital necessary for agricultural transformation. However, in northwestern Europe, especially in Holland and England, social and political changes ( bourgeois revolution ) were accompanied by an agricultural revolution prior to the industrial revolution of the 18th century , intensified cultivation and consequently increased the yields. Thanks to technical improvements in production and the introduction of new crops.\n- The integration of World Economy after the age of discovery allowed an exchange of cultures on a global level : products of Old World , such as wheat and grapes from the temperate zones , and sugar cane, cotton and coffee from the warm zones, were introduced successfully in America, while products of the New World such as corn , potato , tomato , pepper and snuff diversified European agriculture and the rest of the continents.\n- The ideology of Economic liberalism advocated the liberation of the land market and the imposition of private property on them, with different manifestations depending on the country. The formation of national markets unified, involved the unification of weights and measures, and price liberalization versus protectionism previous mercantilist , a task that despotism had from assumptions physiocrats in the mid-eighteenth century. The use of chemical fertilizers (phosphates, nitrates, etc..) the mechanization and scientific studies of soil science and agricultural engineering agriculture transformed the late nineteenth century, in a similar activity to industry in terms of its connection to the science and technology .However, dependence on the weather and pest outbreaks periodically produced regular agricultural crises.\n- The division of the world into developed and underdeveloped agriculture was in one of its aspects: the first characterized by agriculture and a market specialized in high yields , while in the second there was a zoning between a subsistence family farms with traditional technology. Under the pressure of population growth, agriculture and plantation monocultures for the international market, the natural resources of land have been under great pressure and have been depleting due to deforestation.\n- The green revolution of agriculture in the second half of the twentieth century meant a qualitative leap in the modernization of agriculture worldwide. Based on advanced technological improvements such as high-yield seeds, which in the late twentieth century experienced a new boost with the biotechnology in the case of genetically modified organisms . Simultaneously, the widespread evolution towards a market agriculture was increasing the reliance on pesticides. Intensive fertilization with serious environmental problems such as pollution of soil and aquifers and a drastic reduction of biodiversity has been answered with the implementation of sustainable agriculture.\n- In particular, the political economy has developed some of their own tools and concepts, such as the law of decreasing productivity of factors of production just by thinking about what was happening in agriculture . When it comes to economic science, in fact, this was by far the most productive sector important for both the value of the agricultural product compared to GDP and in number of employees.\n- The topics dealt with by political economy applied to agriculture are numerous and relate to the choices of the farmer under uncertainty (caused by the presence of environmental hazards generic, parasites , diseases , weather ). The contingencies of the agricultural enterprise which may require the use of forms of insurance are the characteristics of demand for agricultural products (which for poorly differentiated products is quite rigid than the price and the income ), the choices of product and production process, relations with industry processing of agricultural products and the policies ofdistribution of the products.\n- The agricultural policy analyzes and studies the support measures to the agricultural sector, and its application and / or the price of agricultural commodities and agri-food products, and to develop intervention strategies.\n- It also belongs to the study of the political community that, by reducing the quantity produced, as in the case of milk quotas , or by supporting the production of certain goods with economic contributions dished out to the producers seek to rule the agricultural sector with the aim of defending the income farmers, limit competition and foreign, in particular, many countries of the third world that can produce the same goods at very low prices, protect the environment, prevent the abandonment of land especially in mountain areas.\n- Other topics addressed by highly general economic policy measures concern the effects of agricultural policy and the choices of companies on income, employment, balance of payments and productivity.\nList of agricultural universities and colleges that offers courses in Agriculture\n- Berkshire College of Agriculture\n- Bicton College\n- Capel Manor College\n- Clinterty Agricultural College\n- College of Agriculture, Food and Rural Enterprise, Northern Ireland (CAFRE)\n- Cranfield University\n- Harper Adams University\n- Hartpury College (an associate faculty of the University of the West of England)\n- Kingston Maurward College\n- Lackham College (part of Wiltshire College)\n- Moulton College\n- Oaklands College\n- Reaseheath College\n- Rodbaston College (part of South Staffordshire College)\n- Royal Agricultural University\n- Scotlands Rural University College (SRUC)\n- Scottish Agricultural College (SAC)\n- Shuttleworth College (part of Bedford College)\n- Sparsholt College Hampshire\n- University of Reading\n- Writtle College"
] | [
"<urn:uuid:6f67f66c-c501-4b4d-aed9-13d76717aa94>"
] | [
"CC-MAIN-2017-26"
] | [
"http://library.knimbus.com/library/subject/Agriculture"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320841.35/warc/CC-MAIN-20170626170406-20170626190406-00579.warc.gz"
] | [
"en"
] | [
0.9395198822021484
] | [
2513
] | [
3.4375
] | [
3
] |
[
"In trading, supply and demand are everything. Prices are constantly moving up and down as buyers and sellers jostle for position. As a result, correctly identifying areas of supply and demand is critical for any trader looking to make a profit. Fortunately, there is a tool that can help traders quickly and easily identify areas of supply and demand. It’s called the Supply and Demand Indicator (S&D Indicator).\nBy using this indicator, you will be able to see areas where there is a lot of buying or selling pressure. This can help you make better trading decisions.\nWhat is the Supply and Demand Indicator?\nThe Supply and Demand Indicator is a technical tool that can be used by traders to help identify potential trading opportunities in the market. The indicator measures the relationship between the supply and demand of security and can be used to identify areas where the market is either overbought or oversold. The indicator is calculated by taking the difference between the number of advancing and declining stocks and then dividing it by the total number of stocks traded. A reading above 100 indicates an overbought market, while a reading below -100 indicates an oversold market.\nThis can be a useful tool for traders as it can help them identify potential trading opportunities in the market. However, it is important to note that the indicator should not be used in isolation, but rather as part of a broader technical analysis strategy.\nHow Does the Supply and Demand Indicator Work?\nIn order to better understand how the stock market works, it is important to have a grasp on the basic laws of supply and demand. The same principles that apply to everyday commodities also apply to stocks and other securities. When there is more demand for a product than there is available supply, the price of the product goes up. The opposite happens when there is more supply than demand.\nThe amount of available stock for a company is determined by its shareholders. When a company first goes public, its shares are bought up by investors who believe in the long-term potential of the business. As the company grows and becomes more profitable, more and more people want to own shares of that company. This increases the demand for the stock, which drives up its price.\nThe interpretation of the indicator is fairly simple. If the indicator is positive, it means that there is more buying pressure than selling pressure, and vice versa. A reading of 0 indicates that there is equal buying and selling pressure.\nThe indicator uses four patterns – rally base rally, drop base drop, rally base drop, and drop base drop – to create the supply and demand zones. The supply and demand zone indicator is a reliable indicator of equilibrium in the market. Traders can use the supply and demand zone indicator to make profitable trades.\nThe Four Patterns of Demand and Supply Zone Indicator\nThere are four distinct patterns that the Demand and Supply Zone Indicator can display. These patterns are the following:\nRally Base Rally\nRally Base Rally is a supply and demand indicator that uses price and volume action to identify potential reversals in the market. The indicator consists of two parts: the rally baseline and the rally base signal line. The rally baseline is created by taking the average of the high and low prices for a specified period of time. The rally base signal line is created by taking the average of the volume for a specified period of time.\nWhen the market is in an uptrend, the rally baseline will be above the rally base signal line. This indicates that there is more buying than selling pressure in the market and that prices are likely to continue to move higher. Conversely, when the market is in a downtrend, the rally baseline will be below the rally base signal line.\nDrop Base Drop\nA Drop Base Drop (DBD) is a pattern that can be found in the supply and demand indicator. This pattern can be used to help identify potential turning points in the market. The DBD consists of three consecutive price drops, followed by a base formation. This base can be either a consolidation period or a reversal candlestick pattern. The DBD is a bearish pattern and should be treated as such.\nRally Base Drop\nIn technical analysis, the base drop pattern is a bearish signal that occurs when demand starts to fall and there is a consequent decrease in price. This pattern is created by a series of lower highs and lower lows. To confirm the base drop pattern, the volume should also be decreasing as the price falls. When this pattern occurs in an uptrend, it is often a sign that the trend is about to reverse.\nDrop Base Rally\nThe Drop Base Rally pattern is a popular supply and demand indicator used by many traders. This pattern is created when the price of a security drops sharply and then rallies back to the original level. The Drop Base Rally pattern is considered to be a bullish signal, as it indicates that there is strong buying pressure at the lower prices.\nWhy Should You Use the Supply and Demand Zones Indicator?\nThe Supply and Demand Zones Indicator is a powerful tool that can help you make better trading decisions. Here are three reasons why you should use this indicator:\n1. It can help you find high-probability trade setups\nThe Supply and Demand Zones Indicator can help you identify potential trade setups by showing you areas of supply and demand. These areas are where buyers and sellers are most likely to enter the market, so finding trades in these zones can give you a better chance of success.\n2. It can help you manage your risk\nBy knowing where potential trade entries are, you can better manage your risk by placing your stop loss orders outside of these zones. This way, if the market does not move in your favor, you will still be able to exit your position with a smaller loss.\n3. It can help you manage your position size\nThe Supply and Demand Zones Indicator will also show you the number of shares that are traded in each zone. This means you can use the numbers to help decide on a position size that’s appropriate for your trading account.\nWhat are the Drawbacks of Using the Supply and Demand Indicator in Trading?\nThe supply and demand indicator is a popular tool among traders, but there are some drawbacks to using it. First, the indicator only works well in markets that are in equilibrium. That means that if there is an imbalance in supply and demand, the indicator will not be accurate. Second, the indicator can only be used to predict short-term changes in price. It is not effective for predicting long-term trends. Finally, the indicator is subject to interpretation. What one trader might see as a buy signal, another might see as a sell signal. This can lead to confusion and conflict among traders who are using the same indicator.\nHow to Choose the Best Supply and Demand Indicator?\nWhen it comes to trading, one of the most important things to know is how to identify key supply and demand areas in the market. This will allow you to make better-informed trading decisions and improve your overall results.\nSo, what is the best way to choose a supply and demand indicator? Here are a few tips:\n- Look for an indicator that is easy to interpret. You don’t want something that is too complicated or difficult to understand.\n- Make sure the indicator gives clear and concise signals. You don’t want something that generates a lot of false signals or is hard to read.\n- Choose an indicator that is suitable for your trading style. If you are a day trader, you will need a different indicator than someone who trades weekly charts.\n- Choose a supply and demand indicator that is easy to use with your trading platform. If you are using a broker with proprietary software, you can find some indicators that work well with their platforms.\n- Look for an indicator that is accurate over the long term.\nWhat are the Best Supply and Demand Indicators\nTraders apply technical indicators to have a better understanding of the psychology of the market and the supply and demand for assets. These signs work together to form the core of technical analysis.\nMoving Average Convergence Divergence (MACD)\nThe MACD is a trend-following momentum indicator that shows the relationship between two moving averages of prices. The indicator was developed by Gerald Appel in the late 1970s and has since become one of the most popular technical indicators used by traders.\nThe indicator is created by subtracting the 26-day exponential moving average (EMA) from the 12-day EMA. The resulting line is then plotted on a separate graph, which is used to help identify trend changes. MACD signals can be used to identify both bullish and bearish market conditions. A bullish signal occurs when the MACD line crosses above the signal line, while a bearish signal occurs when the MACD line crosses below the signal line. MACD divergences are also useful in identifying potential trend reversals. A bullish divergence occurs when the MACD line forms higher lows while prices are forming lower lows. This indicates that momentum is starting to shift back in favor of the bulls.\nRelative Strength Index\nThe Relative Strength Index (RSI) is a technical indicator used in the analysis of financial markets. It is used to measure the strength of a stock or market relative to other stocks or markets. The RSI is calculated using a simple mathematical formula that takes into account the closing prices of a stock or market over a given period of time. The resulting number is then plotted on a scale from 0 to 100.\nGenerally, if the RSI is above 70, it is considered to be overbought, and if it is below 30, it is considered to be oversold. However, these levels can vary depending on the specific stock or market being analyzed. The RSI can be used as a standalone indicator or in conjunction with other technical indicators to provide further confirmation of trading signals.\nThe stochastic oscillator is a momentum indicator that is widely used in the field of technical analysis. It is created by taking the difference between the closing price and the low price over a given period of time. The resulting number is then plotted on a scale from 0 to 100. A reading above 80 indicates that the security is overbought, and a reading below 20 indicates that it is oversold.\nThe stochastic oscillator can be used to signal when security is ripe for buying or selling. For example, if the indicator readings are consistently above 80, it may be time to sell. On the other hand, if readings are consistently below 20, it may be time to buy. The key to using this indicator is to look for instances where readings move from one extreme to another. These signals can be used as confirmation when making trading decisions.\nAroon Indicator is an important technical analysis tool that can be used to identify trend direction and strength. The Aroon indicator is composed of two lines, the Aroon Up line and the Aroon Down line. These lines help to identify trends by measuring the number of periods since price highs and lows. The Aroon Up line is plotted using a formula that measures the number of periods since the most recent price high, while the Aroon Down line is plotted using a formula that measures the number of periods since the most recent price low. If the Aroon Up line is above the Aroon Down line, it indicates that prices are in an uptrend. If the Aroon Down line is above the Aroon Up line, it indicates that prices are in a downtrend.\nAverage Directional Index\nThe Average Directional Index is a technical indicator that measures the strength of a trend. The ADX is calculated using a moving average of price range expansion over a given period of time. The resulting number is plotted on a scale from 0 to 100, with readings below 20 indicating a weak trend, and readings above 50 indicating a strong trend.\nThe ADX can be used to identify both rising and falling trends, as well as to gauge the strength of those trends. In general, the ADX is most useful when combined with other technical indicators, such as support and resistance levels or Fibonacci retracement levels. While the ADX is a helpful tool for identifying trends, it should not be used alone; instead, it should be used in conjunction with other technical indicators to provide a more complete picture of market conditions.\nThe Best Tools for Trading\ncTrader Supply & Demand Zones\nWhen trading the financial markets, it is important to be able to identify key areas of support and resistance. These areas are where the market is most likely to reverse direction and can provide traders with an excellent opportunity to enter or exit a trade. The cTrader platform provides users with a number of tools that can be used to help identify these key areas, one of which is the Supply & Demand Zones indicator.\nThe Supply & Demand Zones indicator highlights areas on the chart where there has been a significant amount of buying or selling activity. These zones are typically where the market will reverse direction, making them an excellent place for traders to enter or exit a trade. The indicator can be used in any time frame and will automatically adjust itself based on the current price action.\nThe TradingView Supply and Demand Indicator is a powerful tool that can help you find profitable trading opportunities. By identifying areas of high supply and demand, you can enter and exit trades with confidence, knowing that there is strong buying or selling pressure behind the move. This indicator is easy to use and can be a valuable addition to your technical analysis arsenal.\nThe Patternalpha supply and demand indicator is a technical tool that can be used to identify potential areas of support and resistance in the market. The indicator is based on the concept of price action, which states that prices move in cycles. The Patternalpha supply and demand indicator uses this concept to identify potential areas where prices may reverse.\nThe Trendspider supply and demand indicator is a powerful tool that can help traders find profitable trading opportunities. The indicator works by identifying areas of high supply and low demand, which can lead to prices moving in the opposite direction. This makes it an ideal tool for finding reversals and breakouts. The Trendspider indicator is available for both MetaTrader 4 and NinjaTrader 7.\nFrequently Asked Questions\nIs supply and demand a good strategy for trading?\nSupply and demand is one of the most basic economic concepts and it can also be a powerful tool for traders. By understanding how supply and demand affect prices, traders can make better decisions about when to buy and sell.\nHowever, there are also some risks associated with trading on supply and demand. If a trader doesn’t have a good understanding of the underlying factors that drive prices, they could end up making bad trades. Overall, supply and demand can be useful strategies for traders if used correctly. However, like any other trading strategy, it’s important to understand the risks involved before using it.\nHow do you analyze demand and supply?\nIn trading, demand and supply analysis is the process of trying to predict future changes in price by studying the interaction between traders and recent price action. By understanding how traders buy and sell at different prices, it’s possible to get a sense for where the market might be headed next.\nOne way to analyze demand and supply is through order flow. This looks at the volume of trades being made at different prices to try and gauge whether buyers or sellers are in control. If there’s more buying than selling, then prices are likely to go up as demand outweighs supply. Conversely, if there’s more selling than buying, then prices are likely to fall as supply exceeds demand. Another way to analyze demand and supply is through support and resistance levels. This looks at past levels where price has bounced off of. If there’s a surge in demand, then prices will break through resistance levels and keep going up. On the flip side, if there’s a sudden drop in demand, then prices will break down through support levels and keep heading lower.\nWhich indicator is best for supply and demand?\nWhen it comes to trading, there are a lot of different indicators that can be used in order to make informed decisions. However, when it comes to supply and demand to trade, not all indicators are created equal. So, which one is the best?\nWell, that really depends on what you’re looking for. If you’re just starting out, then the moving average convergence divergence (MACD) might be a good option. This indicator measures the difference between two exponential moving averages and is often used to identify trend reversals. Another popular option is the relative strength index (RSI). This indicator measures the speed and change of price movements and can be used to identify overbought or oversold conditions. Ultimately, it’s up to you to decide which indicator works best for your trading style and goals.\nWhich indicator has the highest accuracy?\nThe answer may surprise you – it’s not necessarily the most popular indicators that have the highest accuracy. In fact, many of the best traders keep their methods and indicators secret, because they know that if everyone is using the same tools, they will all be competing on a level playing field.\nSo which indicator has the highest accuracy? It depends on who you ask – but there are a few that consistently come up as favorites. The Relative Strength Index (RSI) is a popular choice, as it can be used to measure both overbought and oversold conditions in the market. Another favorite is the Moving Average Convergence Divergence (MACD), which is a trend-following indicator that can help you spot market reversals. Whichever indicator you choose, remember that no tool is 100% accurate all the time.\nHow do you identify a strong supply and demand zone?\nThere are a few ways to identify a strong supply and demand zone. One is to look for a area where the price has been bouncing off of support and resistance levels. Another way to identify a strong supply and demand zone is to look at the order book. If there is a large volume of orders near the current price, it is likely that there is a strong supply or demand zone nearby. Finally, you can also use technical indicators to help identify potential areas of support and resistance."
] | [
"<urn:uuid:ed223bee-fbb9-4e29-8686-0ac9da7d12d7>"
] | [
"CC-MAIN-2023-06"
] | [
"https://theministerofcapitalism.com/blog/best-supply-and-demand-indicator/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500028.12/warc/CC-MAIN-20230202133541-20230202163541-00654.warc.gz"
] | [
"en"
] | [
0.9377313852310181
] | [
3793
] | [
2.703125
] | [
3
] |
[
"Anonymous Web Surfing\nNowadays, everyone wants privacy on the web, because no matter where you go, someone could be watching you. Someone like your employer, someone trying to hack your system, companies gathering all your info to sell to yet other companies, or even the government may be on your tail while you peacefully surf the web.\nThis kind of tracking can have painful results. Visiting a Web site about cancer may get you denied health benefits. Going to a Web site with pornographic banners may get you fired. Going to a political Web site may make you subject to surveillance by those-in-power. Thus, anonymity on the web means being able to use all of its services with no concern about someone snooping on your data.\nNowadays, everyone wants privacy on the web, because no matter where you go, someone could be watching you. Someone like your employer, someone trying to hack your system, companies gathering all your info to sell to yet other companies, or even the government, may be on your track while you peacefully surf the web. Thus, anonymity on the web means being able to use all of its services with no concern about someone snooping on your data.\nYour computer being connected to the Internet has an IP (Internet Protocol) address. IP addresses may be dynamic or static. A dynamic IP may (ans usually) changes every time you connect to the Internet but a static IP is always the same. Most home users have dynamic IPs and most SOHO or business users have static IPs.\nMany people believe dial-up connections have dynamic IPs and Cable or DSL (ADSL, SDSL etc) connections have static IPs. Although this may happen in many occassions, it is not always true. There are dialup ISPs, specially for university students and businesses, that do have static IPs. There are also ISPs which offer Cable and DSL connections with dynamic IP, usually for home users. One of the goals of getting anonymous is to make sure your IP address, either static or dynamic, isn't revealed to other users of the Internet, or to server administrators of the servers you roam around when using Internet services.\nThis text tries to give you some hints on how to maintain your anonimity on the web. Some of the hints may sound banal, but think of, if you really abide them in every situation.\nDo not use your primary email address (the one your ISP gave you) anywhere except to family members, close friends or trusted people. Instead create for yourself a web-based email account such as yahoo, hotmail, dynamitemail, mail.com, etc. and use this e-mail address to signing up for services, when in the need to give your mail to download something, or to publish on your homepage.\nWhen signing up for services on the web, don't give your real information like address, phone number and such unless you really need to do so. This is the kind of information that information gathering companies like to get, so that they can sell out and fill your mailbox with spam.\nUse an anonymous proxy to surf the web. This makes sure your ip doesn't get stored on the webserver logs. (Webservers log every GET request made, together with date, hour, and IP. This is where the proxy comes in. They get the ip from the proxy, not yours)\nUse a bouncer to connect to IRC networks, in case you don't trust the administrators, or the other users. A bouncer is a program that sits on a permanently connected machine that allows you to connect there, and from there to the irc server, just like a proxy works for webservers.\nUse anonymous remailers to send out your e-mails.\nCryptography can also help you by making sure the material you send out the web, like by email, etc, is cyphered, not allowing anyone that doesn't have your key to read it (in key-based cryptography). Programs like PGP (pretty good privacy) are toolkits with all you need to cypher and uncypher your stuff.\nProxies are caches that relay data. When you configure your web browser to use a proxy, it never connects to the URL. Instead it always connects to the proxy server, and asks it to get the URL for you. It works similarly with other type of services such as IRC, ICQ etc. There'll won't be direct connection between you and the server, so your real IP address won't be revealed to the server. When you view a website on the server, the server won't see your IP. Some of web proxies do not support forwarding of the cookies whose support is required by some of the websites (for ex. Hotmail).\nHere are some anonymous proxies that you can use to surf anonymously (notice that some of these may be a paid for service):\n- Tor - EFF's tool, cross-platform, requires minor configuration\n- Anonymizer - http://www.anonymizer.com/\n- The Cloak - http://www.the-cloak.com/\n- Kaxy - http://www.kaxy.com/ (commercial)\n- Proxify - http://www.proxify.com/ (free, web-based)\n- VTunnel - http://www.vtunnel.com/ (free, web-based)\n- Anonymouse - http://anonymouse.org/ (free, web-based)\n- JAP - (free, software installation)\n- Cotse - http://www.cotse.net/ (commercial)\nYou'll highly probably find many websites that provide the lists of unauthorised open proxies and remailers (search Google for \"proxy list\"). Such lists are being compiled usually with the help of port scanners or exploit scanners, scanning for computers with wingate or other proxies' backdoors. Using these proxies is illegal, and is being considered as unauthorized access of computer. If you get such list to your hands, check if the info is legal or compiled by script kiddie, and act accordingly. Another concern with using open proxies, is that they could be set up as a honeypot to track users and collect passwords, this is also suspected about some Tor-exit nodes and some commercial services, so make sure you use a reputable proxy or be extra careful.\nIf you decide to use anonymous proxies, you need to enter the proxy into your web browser's preferences in order to use it. See if your IP address is indeed different by visiting a website that displays your address (search Google for \"what is my IP address\"). If you are using the Mozilla or Firefox browser, I'd recommend the Switchproxy extension. It even has an option to automatically rotate between anonymous proxies from a file or URL: http://jgillick.nettripper.com/switchproxy/\nThere are also Cascaded proxies where a proxy server connects to the Internet through another proxy server. Using this technique intelligently you can achieve a higher level of anonimity and/or privacy.\nMost of the browsers offer the possiblity to turn off the cookies, but some of sites like Hotmail.com require them to be turned on. In case you decided to allow cookies, at least never forget to log off from the websites when you're finishing visiting them.\nAn idea is to block third-party cookies, they are, with a few exceptions for shopping sites, almost exclusively used for tracking purposes. Also, it might make sense to block search engine cookies, because these are used to track search queries together. Also most browsers let's you erase all cookies on exit.\nWhen using an FTP client program to download files, assure yourself, that it's giving a bogus password, like [email protected], not your real one. If your browser lets you, turn off the feature that sends your e-mail address as a password for anonymous FTP sessions.\nEverything being sent from the web server to your browser is usually in plain text format. That means, all transferred information can be easily sniffed on the route. Some of the web servers support SSL (Secure Socket Layer). To view and use these websites you'll need SSL support in your browser as well. You recognize, that the connection is encrypted, if URL starts with https:// instead of usual http://. Never use web server without SSL for sending or receiving sensitive private or business information (credit card numbers, passwords etc.)\nWhat is SSL?\nSSL stands for Secure Socket Layer. The \"Secure\" implies an encryption, while Socket Layer denotes an addition to the Window Socket system, Winsock. For those that don't know, a Socket is an attachment to a port on a system. You can have many sockets on one port, providing they are non-blocking (allowing control to pass through to another socket aware application which wishes to connect to that port).\nA Secure Socket Layer means that any sockets under it, are both secure and safe. The idea behind SSL was to provide an encrypted, and thus, secure route for traffic along a socket based system, such as TCP/IP (the internet protocol). Doing this allows security in credit card transactions on the Internet, encrypted and protected communiqu� along a data line, and overall peace of mind.\nThe SSL uses an encryption standard developed by RSA. RSA are a world respected American organisation that specializes in encryption and data security. Initially, they developed a cipher length of only 40 bits, for use with the Secure Socket Layer, this was considered weak and therefore a longer much more complicated encryption cipher was created, 128 bits. The reasoning behind it was simple: it needs to be secure.\nThe RSA site puts the advantage of a longer encryption length pretty clearly: because 40-bit encryption is considered to be relatively weak. 128-bits is about 309 septillion times ( 309,485,000,000,000,000,000,000,000 ) larger than 40-bits. This would mean it would take that many times longer to crack or break 128-bit encryption than it would 40-bit.\nIf you want more information on the technicalities or RSA's SSL encryption engine, visit their site: http://www.rsasecurity.com/standards/ssl.\nBut what does all this encryption and security have to do with you?\nWell, that's a simple question. No matter how hard you try, at times your privacy will need to be knowingly invaded so you can make use of the product offered for doing so. If you think about food, for example, one cannot eat without swallowing. When we wish to make a transaction or view a site on the internet, where we have to give enough information away so that it happens, we also want to be assured no one else along the line gathers that data. An encrypted session would mean our data is not at the hands of any privacy perpetrators unless they knew how to decode it ? and the only ones in the know, are those you specifically wish. SSL uses public key encryption as explained in the PGP section.\nTo put this at a head: if you use an encrypted connection or session, you can be relatively assured that there are no prying eyes along the way.\nAnd how do I implement SSL with SSL Tunnelling?\nWe know that a Secure Socket Layer is safe, but what we don?t know is what a Tunnel is. In the most simplistic form, a tunnel is a proxy. Like proxy voting in general elections, a tunnel will relay your data back and forth for you. You may be aware though, that there are already ?proxies? out there, and yes, that is true. Tunnelling is done via proxies, but it is not considered to be the same as a standard proxy relaying simply because it isn?t.\nTunnelling is very special kind of proxy relay, in that it can, and does relay data without interfering. It does this transparently and without grievance or any care for what is passing its way.\nNow, if we add this ability to \"tunnel\" data, any data, in a pipe, to the Secure Sockets Layer, we have a closed connection that is independent of the software carrying it; and something that is also encrypted. For those of you wanting to know a little more about the technicalities, the SSL layer is also classless in the sense it does not interferer with the data passed back and forth -- after all, it is encrypted and impossible to tamper with. That attribute means an SSL capable proxy is able to transfer data out of its \"proxied\" connection to the destination required.\nSo to sum up, we have both a secure connection that does the job and relays things in the right direction; and we have direct tunnel that doesn't care what we pass through it. Two very useful, and almost blind entities. All we need now is a secure proxy that we can use as the tunnel.\nSecure proxies are alike standard proxies. We can either use an HTTP base SSL equipped proxy -- one specifically designed for security HTTP traffic, but because of the ignorant nature of SSL communication, it can be bent to any needs -- or we can use a proper SSL service designed for our connection -- like you would use a secure NNTP (news) program with a secure proxy on port 563 instead of taking our long way -- which would probably work as well.\nA secure HTTP proxy operates on port 443. Host proxies are not public, that means they operate for, and allow only traffic from their subnet or the ISP that operates them -- but, there are many badly configured HTTP proxies and some public ones out there. The use of a program called HTTrack (available on Neworder) will aid you in scanning and searching for proxies on your network or anywhere on the Internet if your ISP does not provide you with one.\nNeworder also features a number of sites dedicated to listing public proxies in the Anonymity section. While it's often hard to find a suitable fast proxy, it?s worth the effort when you get one.\nSo how can I secure my connections with SSL Tunnelling?\nThat's a big question, and beyond the scope out this tuition as it must come to and end. I can however, point you in the right direction of two resources that will aid you in tunnelling both IRC, and most other connections via a HTTP proxy.\nThe second stop, for both Windows and Unix is stunnel. Stunnel is a GNU kit developed for SSL tunnelling any connection. It is available for compile and download as binary here: Stunnel homepage - http://mike.daewoo.com.pl/computer/stunnel\nanonymity on irc\nA BNC, or a Bouncer - is used in conjunction with IRC as a way of hiding your host when people /whois you. On most IRC networks, your host isnt masked when you whois, meaning the entire IP appears, like 126.96.36.199, which can be resolved. On other networks, your host might be masked, like IRCnetwork-0.1 but it can still give valuable information, like nationality if your host is not a IP, but a DNS resolved host, like my.host.cn would be masked to IRCnetwork-host.cn but this would still tell the person who whoised you, that you are from China.\nTo keep information such as this hidden from the other users on an IRC network, many people use a Bouncer, which is actually just a Proxy. Let us first draw a schematic of how a normal connection would look, with and without a BNC installed.\nWithout a BNC:\nyour.host.cn <<-->> irc.box.sk\nWith a BNC:\nyour.host.cn <<-->> my.shell.com <<-->> irc.box.sk\nYou will notice the difference between the two. When you have a BNC installed, a shell functions as a link between you and the IRC server (irc.box.sk as an example). You install a BNC on a shell, and set a port for it to listen for connections on. You then login to the shell with your IRC client, BitchX/Xchat/mIRC, and then it will login to the IRC server you specify - irc.box.sk in this case. In affect, this changes your host, in that it is my.shell.com that makes all the requests to irc.box.sk, and irc.box.sk doesn't know of your.host.cn, it has never even made contact with it.\nIn that way, depending on what host your shell has, you can login to IRC with a host like i.rule.com, these vhosts are then actually just an alias for your own machine, your.host.cn, and it is all completely transparent to the IRC server.\nMany servers have sock bots that check for socket connections. These aren't BNC connections, and BNC cannot be tested using a simple bot, unless your shell has a socket port open (normally 1080) it will let you in with no problem at all, the shell is not acting as a proxy like you would expect, but more as a simple IRC proxy, or an IRC router. In one way, the BNC just changes the packet and sends it on, like:\nto: my.shell.com -> to: irc.box.sk -> to: my.shell.com from: your.host.cn <- from: my.shell.com <- from: irc.box.sk\nThe BNC simply swaps the host of your packet, saying it comes from my.shell.com. But also be aware, that your own machine is perfectly aware that it has a connection established with my.shell.com, and that YOU know that you are connected to irc.box.sk. Some BNCs are used in IRC networks, to simulate one host. If you had a global IRC network, all linked together, you could have a local server called: cn.myircnetwork.com which Chinese users would log into. It would then Bounce them to the actual network server, in effect making all users from china have the same host - cn.myircnetwork.com, masking their hosts. Of course, you could change the host too - so it didn't reveal the nationality, but it is a nice gesture of some networks, that they mask all hosts from everyone, but it makes life hard for IRCops on the network - but its a small price to pay for privacy.\nNote: Even if you do use IRC bouncer, within DCC transfers or chat, your IP will be revealed, because DCC requires direct IP to IP connection. Usual mistake of IRC user is to have DCC auto-reply turned on. For an attacker is then easy to DCC chat you or offer you a file, and when IRC clients are connected, he can find out your IP address in the list of his TCP/IP connections (netstat).\nHow do I get IRC bouncer?\nyou configure and start the software - in case it's bouncer at Unix machine, you start it on your shell account (let's say shell.somewhere.com)\nyou open IRC and connect to the bouncer at shell.somewhere.com on the port you told it to start on.\nall depending on the setup, you may have to tell it your password and tell it where to connect, and you're now on irc as shell.somewhere.com instead of your regular hostname\nAlso see: Encrypting your mail\nUsually the safest way to ensure that your e-mail won't be read by unauthorised persons is to encrypt them. To be compatible with the rest of the world I'd suggest to use free PGP software.\nPGP (Pretty Good Privacy) is a piece of software, used to ensure that a message/file has not been changed, has not been read, and comes from the person you think it comes from. Download location: http://www.pgpi.org/\nHow does pgp work?\nThe whole idea behind PGP is that of Public and Private keys. To explain the algorithm PGP uses in order to encrypt the message would take too much time, and is beyond the scope of this, we will however look at how it ensures the integrity of the document. A user has a password, this password has to be chosen correctly, so don't choose passwords like \"pop\" or \"iloveyou\", this will make an attack more likely to succeed. The password is used to create a private key, and a public key - the algorithm ensures that you can not use the public key to make the private key. The public key is sent to a server, or to the people you send e-mails/files, and you keep the private key secret.\nWe will use a few terms and people in this introduction, they are: Pk - Public Key, Sk - Secret Key (private key). Adam will send an e-mail to Eve, and Rita will be a person in between, who we are trying to hide the content of the mail from. Rita will intercept the email (PGP doesn't ensure that Rita cant get her hands on the package, she can - its not a secure line like other technologies) and try to read it/modify it. Adam has a Sk1 and a Pk1, and Eve has a Sk2 and a Pk2. Both Adam, Eve, and Rita have Pk1 and Pk2, but Sk1 and Sk2 are presumed to be totally secret. First, here is a schematic of how it all looks:\nAdam <==========================> Eve Sk1 ^ Sk2\nSo Adam wants to send a packet to Eve, without Rite reading it, or editing it. There are three things that we need to make sure:\n- That Rita cant read the text without permission\n- That Rita can't edit it in any way, without Eve and Adam knowing\n- That Even knows that Adam sent it\nFirst thing is making sure Rita cant read the text. Adam does this by encrypting the message with Eves Pk2 which he has found on the server. You can only Encrypt with the Pk, not decrypt, so Rita wont be able to read the data unless Eve has revealed her Sk2.\nThe second thing to make sure, is that Rite cant edit the message. Adam creates a hash from the message he has created. The hash can be encrypted using Pk2, or sent as it is. When Eve gets the message, she decrypts it, and creates a hash herself, then checks if the hashes are the same - if they are, the message is the same, if its different, something has changed in the message. The Hash is very secure, and it is in theory impossible to make a change, and get the hash to remain the same.\nThe third, and probably one of the most important things to ensure, is that Rita hasn't grabbed the mail, made a new one, and sent it in Adams name. We can ensure this by using Public key and Private key too. The Sk can be used both to encrypt and to decrypt, but Pk can only encrypt. When Adam normally sends a message M to Eve, he creates the encrypted message C by doing: C=Pk2(M). This means, Adam uses Pk2 (Eves Pk) on message M to create message C. Image this: Adam can encrypt the message with his Sk1, because it is impossible to derive Sk1 from the message, this is secure and without any danger, as long as no one knows the password used to make Sk1 with. If the message M is encrypted with Sk1, he gets a message called X, Eve can decrypt the message using Pk1 which is public. If the message decrypts to something that makes sence, then it must be from Adam, because Sk1 is considered as secret, and only Adam knows it.\nThe entire process looks like this, when sending message C: Adam signs his digital signature on C, and hashes C: X=Sk1(C). Then Adam encrypts the message for Eve: M=Pk2(X). The message is sent, and looks all in all like this: M=Pk2(Sk1(C)). Rita can intercept M, but not decrypt, edit, or resend it. Eve receives M, and decrypts it: X=Sk2(M). Then she checks the digital signature: C=Pk1(X) and checks the Hash on the way.\nThis way, the PGP Public/Private key system ensures integrity and security of the document e-mail, but PGP is not the only algorithm that uses the Public/Private key theory, Blowfish, and RSA are among the many other technologies that use it, PGP is just the most popular for e-mail encryption, but many don't trust it because of rumors of backdoors by the NSA (I don't know if its true though). PGP comes in a commercial, and a freeware version for Windows, and is available for Linux as well. What ever encryption you use, it will be better than none.\nRemailers are programs accessible on the Internet that route email and USENET postings anonymously (i.e., the recipient cannot determine who sent the email or posted the article). This way the sender can't be traced back by routing headers included in the e-mail. There are different classes of remailers, which allow anonymous exchange of email and anonymous posting to USENET and often many other useful features.\nChain is a menu-driven remailer-chaining script:\nRaph Levien's remailer availability page offers comprehensive information about the subject\nThe Cypherpunks Remailers are being developed to provide a secure means of providing anonymity on the nets. Here you can find out about the available remailers, those which have been standard in existance for a long time as well as the new experimental remailers and anonymous servers.\nHow can I keep my privacy at ICQ?\nSend and receive messages via ICQ server, not directly. Every direct connection enables attacker to learn your IP. Encrypt your messages by dedicated software, encryption addons.\nHow to encrypt ICQ messages?\nThere are addons which enhance your ICQ with possibility to encrypt outcoming messages. The user on the other side needs to have the addon as well in order to decrypt your message.\nTop Secret Messenger (TSM) - trial version has only weak 8-bit encryption\nChat Buddy - a freeware Windows application for encrypting chat sessions\nhow encryption works in ICQ protocol v5\nAs we all work hard to become more savvy about protecting our personal information and keeping as anonymous as possible on the web, advertising companies are working just as hard to come up with new ways of getting our personal information. One of the ways they accomplish this is through spyware.\nSpyware are applications that are bundled along with many programs that you download for free. Their function is to gather personal information about you and relay it back to advertising firms. The information is then used either to offer you products or sold to other advertisers, so they can promote THEIR products. They claim this is all they do with this information, but the problem is nobody really knows for sure.\nSpyware fits the classic definition of a trojan, as it is something that you did not bargain for+when you agreed to download the product. Not only is spyware an invasion of your privacy, but (especially if you have a few different kinds on your machine) it can also chew up bandwidth, making your internet connection slower.\nSometimes, these spies really are harmless, merely connecting back to the home server to deliver+you more advertising. Some, like Gator for instance, send out detailed information about your surfing habits, operating system, income, age demographic et cetera.\nAvoiding spyware is getting harder and harder, as more software distributors are choosing it as a method of profiting from freeware and shareware distributions. Be leery of programs with cute+little icons like Gator. Also, watch those Napster wannabes like AudioGalaxy, Limewire, and Kazaa. I've yet to find one that didn't include spyware. Before you download, check to see if the program is known to contain spyware.\nFor a list of most known spyware, the best I've found is here:\nGetting rid of spyware\nIn most cases, you can remove the spyware from your system and still use the application you downloaded. In the case of Gator and Comet Cursor, the the whole program is spyware an it must be completely removed to stop the spying.\nThere are several ways to get rid of spyware on your system. You can use a firewall to monitor outgoing connections. The programmers that put these things together, however, are getting sneakier and sneakier about getting them to circumvent firewalls. Comet Cursor, for instance uses an HTTP post command to connect without the intervention of a firewall. You can also install a registry monitor such as Regmon to monitor your registry for unwanted registry registry changes, but this is not foolproof either.\nProbably the best method of removal is to download a spyware removal program and run it like it was a virus scanner. The best examples of these programs are:\nIf you want to find spyware yourself, here are some good place to look. The following registry keys may contain spyware that runs at startup: HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run, HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run. Spyware plugins can sometimes be found in C:\\WINDOWS\\Downloaded Program Files.\nHere are some links, if you wish to learn more about spyware:\nBurnt Cookies - allows automatic detection and optional deletion of Cookies deposited by Banner Ad web-sites\nSurfsecret - automatically kills files like your Internet cache files, cookies, history, temporary files, recent documents, and the contents of the Recycle Bin.\nNote: One sidenote on cleaning tracks. When you delete some files on your machine, these aren't actually deleted. Only the reference to their location in the hard drive is deleted, which makes the OS think that that location on the HD is free and ready to take things. Thus, there are ways to recover data even after you delete them.\nThere are however, several ways to _wipe_ this information. Programs that fill hard disk locations with zeros, then with 1s, on several passes are your best bet to make sure no document goes to the wrong hands. One of such programs is PGP. PHPi now comes with a utility that does this work, and you can even select the number of passes to wipe files. For *nix, there is also the \"wipe\" program. Use these when you feel you have data that needs secure cleaning.\nAnother idea is to start your browser in a sandbox, such as Sandboxie but there are many others. Cookies, ActiveX controls, MRU-s, spywares, and everything else this way gets written to the sandbox only, and upon cleaning the sandbox they are removed. This will also impact bookmarks and other stuff you want to save, so you'll want to make an exception for these and let them write-through the sandbox.\nAny suggestions and tips are welcome. This article is meant as a live 'work' in progress where anyone can contribute and improve or update the facts included in. Please send the comments, corrections and further information requests to [email protected].\nWritten and compiled by:\n- cube - cube +at+ boxnetwork.net\n- Caboom - caboom +at+ boxnetwork.net\n- Zwanderer - zwanderer +at+ boxnetwork.net\n- kript0n - fred +at+ boxnetwork.net\n- Drew - bbd87 +at+ optonline.net (Spyware section)\n- QX-Mat - matt +at+ guysjs.org (SSL tunelling section)"
] | [
"<urn:uuid:9163f1c8-40c4-4c76-891d-2d2685a9eb59>"
] | [
"CC-MAIN-2017-26"
] | [
"http://infoanarchy.org/Anonymous_Web_Surfing"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321961.50/warc/CC-MAIN-20170627235941-20170628015941-00637.warc.gz"
] | [
"en"
] | [
0.9413437247276306
] | [
6737
] | [
2.828125
] | [
3
] |
[
"Monday, March 31, 2008\nZe'ev Jabotinsky was a Jewish and Zionist author, orator, soldier, leader, and founder of the Jewish Self Defense Organization in Odessa. He was born and raised in Odessa and wrote in some of his works, that despite attending Hebrew school, he felt rather detached from the religious aspects of Judaism. His writings were printed in Ukrainian/Russian papers before he even graduated high school and was sent to Switzerland and Italy to be work as a reporter for a Russian paper. He attended the University of Rome, while in the area, and later became a lawyer upon his return to Russia.\nAfter the Kishinev pogrom of 1903, he joined the Zionist movement. Jabotinsky quickly established the Jewish Self Defense Organization and learned modern Hebrew. He changed his Russian name of Vladimir to Ze'ev, meaning wolf, in Hebrew. He became the leader of right-wing Zionists after Theodore Herzl's death in 1904 and was the Russian delegate to the Sixth Zionist Congress. At a conference in Helsinki, Finland, he called upon European Jewry to help with the liberation struggle of ethnic minorities in Russia. Jabotinsky criticized Russian Jewish leaders for participating in the centennial celebration of Nikolai Gogol, because Gogol was a reputed anti-Semite.\nJabotinksy ended up in Palestine and helped establish defense training for Jewish men, however was thrown in jail for being Socialist and enveloping Bolshevik views. Both of which, were untrue. Upon returning from the 16th Zionist Congress, Jabotinsky was exiled from Palestine under British rule. In the 1930s, Jabotinsky was concerned with the Polish Jewish population, whom he believed 'were living on the edge of the volcano'. He predicted \"bloody super-pogroms\" would strike European Jews. He pleaded with Polish/Hungarian/Romanian governments to allow a 10 year plan for the evacuation of their Jewish populations to Palestine. They all agreed, however some Jews of these countries viewed this as playing into the hands of the anti-Semites. He also understood that there would be Arab opposition to the emigration of Jews, and drafted a constitution for a Jewish state that held Arabs in an equal light in all aspects of public life. He died of a heart attack in New York in 1940, while visiting a Jewish self-defense camp.\nThere are more streets, parks, and squares named for him in Israel than for any other Jewish or Israeli person in history. I find it incredibly interesting that stemming all the way from Odessa, a middle-class Jewish kid was able to help pave the way for the modern formation of Israel.\nAs we were discussing Taras Shevchenko, I was fascinated to learn he created over 1,000 pieces of poetry, paintings or sketches within three years! He was born a serf, became educated by his landowner Engelhart, was a painter’s apprentice, was forced to be a soldier and then purged to Siberia. In his short life, he had a huge impact on the way Modern Ukrainian language was viewed/used and his work is looked at. His literary heritage is regarded to be the foundation of modern Ukrainian literature and, to a large extent, the modern Ukrainian language. Shevchenko also wrote in Russian and left many masterpieces as a painter and an illustrator.\nSerfdom was abolished in Russia in 1861 by Tsar Nicholas II due to fear that peasants/serfs would revolt. He wanted to free them from the top instead of them rising up against the regime. Shevchenko died in 1861, and so I think it is interesting to question what type of other influences he may have had on Ukrainian culture if he had lived?\nVissarion Grigorievich Belinsky; the champion of the left literary critic called upon Russian literature “to serve the causes of justice for the disadvantaged and of progress toward a more open and democratic society”. Belisnky’s view on Gogol’s work such as the Overcoat, was that it was serving a just cause, that the underdog should rise up against the Russian Empire. Gogol however, viewed himself as a conservative and became devoutly religious. He saw his work as merely fiction and believed that the serf should stay the serf. It is interesting how two Ukrainian men could have such different impacts during their times.\nFor more information and literary work by Gogol:\nMost interesting to me were Mazepa's relations with Peter I of Russia. That a Cossack Hetman was even recognized by the Tsar, much less seen as a military and civil threat, indicates the magnitude of Mazepa's s sphere of influence. Mazepa and Peter I had initially formed an alliance, but it had become a burden on the entire Cossack population due to the Tsar's constant interference in their affairs and his exploitation of their labor. Soon, Peter I sought to abolish the Cossacks' status as \"free agents\" and to obliterate the Cossack order that bound the members together, assuming that Mazepa could not overpower him. Mazepa, however, began his own secret plotting with King Stanislaus of Poland and Charles XII of Sweden, forming an alliance that supported the independence of the Cossacks and their right to national self-determination. Moreover, Charles XII refused to make peace with Moscow until Ukraine and the Cossack lands were freed of Peter I's rule.\nUnfortunately for Mazepa, the Russo-Swedish war, carried out on Ukrainian territories, resulted in a defeat for Charles XII, and Peter I was free to take his revenge on the Cossack dissenters. Russian forces captured Baturyn, Mazepa's capital, and massacred its 6,000 inhabitants. Peter I then began to persecute Mazepa's followers so that Mazepa, along with 3,000 of his loyal men, were forced to flee to Turkish-held territories. Mazepa's dream of an independent Cossack nation was extinguished.\nStill, it amazes me that a little Cossack Hetman with some 10,000 men behind him managed to both battle and form alliances with some of Europe's greatest powers, and to be recognized by these powers as either a political equal or a serious military threat. This certainly speaks to Mazepa's skill as an orator, a politician, a military leader, and a statesman. And to think that he did all this not in the midst of a militant society, but as the head of a people who built Baroque churches, supported translations of the New Testament, and attended the Kyivan Mohyla Academy for higher learning!\nIf you'd like to learn more about Mazepa, here is a useful link:\nSunday, March 30, 2008\nAlong with Taras Shevchenko, there is another heralded Ukrainian writer, poet, and political hero of nearly ‘prophet’ status- especially so in western Ukraine; His name is Ivan Franko, and spent most of his life writing and working in the city of Lviv.\nBorn in eastern Galicia in1856 (former large territory of western Ukraine), his hometown of Nahuevychi is located in the modern-day Lviv oblast. Perhaps so, because of some of his German ancestry. Ivan’s family, thankfully placed him on the educational route in life, attending village and then monastic school, eventually attending the Lviv University where he studied Ukrainian language, literature, and philosophy. It is worth mentioning that he knew Taras Shevchenko’s poem “Kobzar” by heart in its entirety.\nHowever, attending the University, he became heavily involved in socialism and socialist writing. He was arrested because of this and sent to prison for 8 months- in which he continued to write about socialism, including political satires. He studied the works of Karl Marx and began to organize workers’ unions in Lviv. He was kept under close government watch, even after his release. Franko’s passion only grew, while he continued to write and influence local political and social groups- for which he was arrested yet again. The University disenrolled him for the civil disobedience, but ironically, the University was re-named after Franko years after his death.\nHe moved back to Nahuevychi where much of his writing was done. Here, he translated many German writings, including those of Goethe. In addition to this, it seems that he wrote for countess journals and newspapers- much of it being political commentary. Interestingly, he even wrote about the life and works of Taras Shevchenko- whom he would later join in Ukraine’s highest literary echelon.\nHe married Olha Khorunzhynska in 1886, in the month of his 30th birthday. Yet again, his writings and collaboration with other political commentators in western and central Ukraine led to his third arrest and imprisonment. This pushed him to form the Ruthenian-Ukrainian Radical party with Mykailo Drahomanov, his writing compatriot from Franko’s days at Lviv University. Later, starting in 1891, he attended several universities, including Chernivtsi University in western Ukraine, and Vienna University in Austria. He was offered a job at Lviv University some time later, but was never able to work because of strong objection from the government leaders.\nHe continued to write, through which he continued with criticism of the Ukrainian Social Democracy and popular Marxist politics. He was quoted as saying that “Marxism was ‘a religion founded on dogmas of hatred and class struggle.’ His relationship with Drahomanov became strained through differing ideas, and the Radicl party he helped found eventually split in 1899. With the help of other Lviv political natives, he founded the more successful Ukrainian National Democratic Party the next year.\nFranko was indeed famous, and perhaps even notorious while alive; especially amongst Ukraine’s educated and university-aged youth. He was celebrated for 25 years of influential writings in 1898, by the entire Ukrainian community of Galicia, and once again for his 40 years in 1913. He is considered by modern Ukrainian writers and language historians to have literally changed & permanently solidified the structure/style of Ukrainian language and writing (along with Taras Shevchenko and Lesia Ukrainka) into the form most speak and write today. Despite enjoying relative popularity during his life, Franko struggled to make a living for himself and his wife through his chosen path of work. The poverty in which Franko lived inspired Lviv students and political activists to purchase a house for him in the city’s center.\nWriting until his death, he passed away with nearly nothing, with only admirers (no family) to attend his funeral in 1916.\nHowever, simply knowing a timeline of the man’s life does not offer one the true understanding or motivation of Franko. Because of the vast number of his works, one can see that he did not live an easy life; He wrote in part to earn what money he could. It is quite remarkable that he chose to dedicate his life to spreading his philosophies on nearly every facet of Ukrainian life at the turn of the 20th century. He continually called for the lower class peasants, and Ukrainians as a whole people, to struggle against the existing order of life- of subservience and complacency with the national identity at the time. It is extensive and exhausting to attempt to read into his true thoughts on life at the time, but I believe that some insight may be gained by reading what Franko wrote on Politics, and his own Ukrainian nationality:\n“…I never belonged to the faithful of that religion, and had the courage, amidst put downs and disregard, to bravely carry my flag of old-fashioned people-based socialism, which is based on ethic and humanistic cultivation of masses, a flag standing for general availability of education, science, critical thinking, human and national freedom. The flag does not stand for party dogma and despotism of its leaders; it does not represent the bureaucracy or parliamentary corruption, which would supposedly lead to the ‘bright’ future.\"\n-spoken quote from Franko\n\"My Ukrainian patriotism – it is not a sentiment, not a national pride, it – a heavy yoke, placed by fate on my shoulders. I can tremble; I can quietly curse the fate, but I cannot throw down this bondage, cannot go look for another homeland, because then I would be loathed by my own conscience.”\n-exerpt from Ivan Franko letter\n(quotations from http://www.ukrainians.ca/index.php?option=com_content&task=view&id=14&Itemid=9 )\nYou can sense the frustration, in that he desires individual thought and judgment upon his own character- but still feels obligated to support the ‘Ukrainian’ cause. This slight bitterness could be a result of his poverty, or socioeconomic status- or, perhaps he formulated his ideas because of the government/leadership of the people at the time, and how they simply \"put up\" or dealt with their situation instead of taking a stand. Through this struggle, I believe, is why he fights so strongly to definitively change the political and moral fiber of the nations people.\nDespite this, I find it incredible that during his life, Franko used his gifts not only to convey his serious messages about nationality and politics, but to craft poetry, prose, dramas, and also translations, on top of ethnography, folklore, history, esthetics, sociology, political economy and philosophy.\nWilson, Andrew; The Ukrainians- Unexpected Nation pg 232.\nWhile an earlier poster noted what happened after Chernobyl, I thought learning exactly what happened that day would be interesting and informative. I wrote this because of my deep interest in this disaster. If you have any questions or comments about this, please contact me and I will do my best to answer them. If you have any questions about some of the details of the day, please let me know. I used personal knowledge and wikipedia.org for most of my research. I tried to take what I learned and turn it into a more lemans version of what was on Wikipedia.\nThursday, March 27, 2008\nVolodymyr Ivasyuk was the \"Elvis\" of the Ukraine. Before age 10 he could play the violin, piano and began writing his own music by age 15. Also as a child he showed interest in poetry and art.\nVylkove has an interesting history because of its location. It was under Turkish rule for the first 66 years, then under Russian rule for 44 years, than divided by Turkey and Romania for the next 22 years. It switched between Russia (40 years) and Romania (21 years), and was under USSR rule before 1991, when it became an independent town of Ukraine.\nVylkove has two churches and one chapel, all named after St. Nicholas. One church is Lipovanian. Lipovans came to the area after they broke from the Russian orthodox church following reforms by Patriarch Nikon in 1654. Lipovans in Vylkove speak an archaic form of Russian and maintain their old religious practices.\nThe administrative center of the Ukrainian Danube Biosphere Reserve is located in Vylkove. This reserve supports over 950 plant species and nearly 260 bird species. It was declared a biosphere reserve in 1998, and in 1999 UNESCO included it in the network of biosphere reserves.\nThe Cossacks began as free soldiers, protecting the steppe area from Turkish and Tartar raids. Although it does not seem clear to me, it appears their founding was even supported or allowed by the Polish-Lithuanian powers to assist in protecting the area. As the Cossacks grew in numbers and power, the Polish-Lithuanian Commonwealth first tried to regulate them, and then later gave the them limited autonomy while still under Polish-Lithuanian control. By the late 1500s, the Cossacks began making their own external treaties but still assisted the Polish Army in certain battles: 1618, Moscow and 1621, Khotyn.\nOf particular note is the Cossack-Polish Ward, 1648 to 1657. In some regards, this war is hailed as a great event--a Cossack uprising gathering a large portion of the Ukrainian populace and yielding a Cossack state. However, this state was never able to gain complete autonomy, the result of the war seeming to remove them from Polish rule, only to place them under Russian rule. Also, the local people fared very poorly, with all armies being very cruel and murdering many people (women, children, clergymen, Jews, etc.) of the opposing side.\nThis Cossack state mentioned above existed from 1648 until 1782. Although initially the general populous had more freedom under this state, soon class hierarchies again controlled available freedoms. The state was abolished by Catherine II in 1764--the governing bodies replaced by Russian organizations and serfdom for the peasants. Only few of the ruling Cossacks were given Russian nobility status. During the 1800s, army regiments were sometimes formed from previous Cossack groups, and periodic Cossack protests were engaged, resulting in the social class remaining somewhat distinct.\nAs a last note, an anti-socialist Ukrainian government formed in 1918, called the Hetman government, certainly with ties to the historical Cossacks. However, it was too closely tied with Czarist Russia, and after the Bolshevik revolution, the Hetman government eventually surrendered powers to the socialist Ukrainian National Republic in December 1918.\nThis is just a very brief historical outline of the Cossacks, but I think it adds some interesting perspective to some of our class discussion regarding Schevchencko, Cossacks and Ukrainian Nationalism.\nWednesday, March 26, 2008\nThe Seven Wonders of Ukraine are historical and cultural monuments located in Ukraine. To determine which landmarks would be considered, the Seven Wonders of Ukraine contest was held in July, 2007. Voting consisted of experts in Ukraine voting for their seven best sites, along with internet users who were allowed to vote for their seven favorite sites on the official website. A list of 1,000 possible candidates was composed and was later narrowed down to 21 by an expert council consisting of historians, culturologists and tourist specialists. Official voting opened on July 7th and was closed on August 21, 2007. During this time approximately 77,000 internet users voted on the campaign.\n1st: Sofiyivsky Park in Uman, Cherkasy Oblast\n2nd:Kiev Pechersk Lavra (Monastery of the Caves) in Kiev\n3rd:Kamianets-Podilskyi Historical Complex in Kamianets-Podilskyi, Khmelnytskyi Oblast\n4th:Khortytsia in Zaporizhia, Zaporizhia Oblast\n5th:Chersonesos in Sevastopol\n6th:Saint Sophia Cathedral in Kiev\n7th: Khotyn Fortress in Khotyn, Chernivtsi Oblast\nI had never noticed that there have been multiple 'Seven Wonders of the World'. A few that I found are the Seven Wonders of the Medieval World, Seven Wonders of the Modern World, Seven Wonders of the Natural World and Seven Wonders of the Industrial World. I find that it is only appropriate that Ukraine adds their beautiful Seven Wonders to the list!\nThe 7 Medieval wonders: Stonehenge, Colosseum, Catacombs of Kom el Shaqafa, Great Wall of China, Porcelain Tower of Nanjing, Hagia Sophia, Leaning Tower of Pisa.\nThe 7 Natural Wonders: Grand Canyon, Great Barrier Reef, Harbor of Rio de Janeiro, Mt. Everest, Aurorae, Paricutin Volcano, Victoria Falls\nFor more information on The Seven Wonders of the World : http://en.wikipedia.org/wiki/Seven_Wonders_of_the_World\nFor more info specifically on Ukrainian Seven Wonders (great links available):\nThe Carpathians are a great destination for vacationers looking to ski, mountain bike, horseback ride, river rafters or hike. The Carpathians would be a very fun place to backpack because there are few areas were camping is prohibited and hikers are not restricted to the trail. As we can see in the pictures, this is a very beautiful region that would be exciting to explore! If you decide to go be careful, with no maintained trail system it is easy to get lost!\nFor those of you interested in skiing the Carpathians I recommend you check out Dan's post!\nFor more information on the Carpathians check out:\nTuesday, March 25, 2008\nSand stone is the main material that makes up the foundation of the older section of Odessa. Sand stone is relatively easy to dig through, and therefore it was used for building within the city. As a result of excavating large amounts of sandstone, large and elaborate tunnels were formed beneath the city that are known as the Odessa Catacombs. Because there are no hills or forests surrounding Odessa, many Ukrainian partisans hid in the catacombs and plotted against the Nazis who occupied the city during World War II.\nThe stories of these brave fighters are heavily disputed. According to \"Official Soviet History\", there were many different groups of Ukrainians who used the catacombs as a home base, but they all worked towards the same goal of killing the Nazis. Overall, there were a reported 6,000 Ukrainians and other Soviets operating in the tunnels and they participated in the killing of 6,000 Nazis as well as the derailment of 30 trains carrying Nazi officials and troops. The fighters were so organized and valiant that the Nazis were forced to keep 16,000 troops in Odessa and surrounding villages to keep order. While this story is \"generally accepted\", recently recovered documents indicate that the many partisan groups within the catacombs did not work together and at times spent just as much time fighting each other as they did fighting Nazis. This has also raised questions about the true effectiveness of this partisan warfare and whether or not they were as successful as Soviet History denotes.\nRegardless of these questions, the Odessa Catacombs remain a very interesting feature and tourist attraction. There is now a Catacomb Museum in the nearby village of Nerubaiskoye where there is an entrance to the catacombs and tourists can walk around within a small area. Above the main entrance to the catacombs there is an inscription that reads:\n\"It was here in the catacombs of the Nerubaiskoye village that the partisans commanded by the Hero of the Soviet Union V.A. Molodtsov-Badayev had its underground base. They successfully operated behind enemy lines.\"\nWhile these catacombs make for a very nice tourist spot, it is reported that every year at least one person gets lost in the catacombs and many have never been found by rescue parties. Below is rough map of the Odessa Catacombs:\nOdessa Mama is a Yiddish song that is of Ukrainian origin. Before the Holocaust, it was popular in numerous countries, including the United States. Many notable performers have recorded their own version of this song. As we learned in class, the song is about the people's love for the city of Odessa; it is an ode to everything in Odessa, including the sidewalks, electric lights and hotels, as well as other modern amenities.\nThe term \"Odessa Mama\" is used by the people who live there to refer to their city, but ironically the term has criminal roots. There are so many strangers to cheat, con and rob along with so much contraband to steal. This is why over the years, \"Odessa Mama\" has bred such a criminal. Many port cities world-wide are notorious for having such a large class of criminals; however, there are very few places, including Odessa, that have been celebrated for this fact.\nA fun fact that I found was that there is actually a Music Entertainment company called Odessa Mama Music Entertainment. Unfortunately, on the \"Odessa Mama\" section of their website, it does not give any relation that they have to the original song. Another fun fact is about the image below, which is a monument called the \"Odessa Mama Monument.\" According to http://www.2odessa.com/, this mother is atop three whales and has several babies lovingly cuddled to her bosom. Closer inspection of the babies show they are famous Odessa mayors.\nIf you are interested in watching another video of the singing of Odessa Mama, sung by Limpopo, the link is as follows: http://www.youtube.com/watch?v=er6ELPeUPkU\nBelow is the English translation of the song! I found this at http://yiddishlyrics.blogspot.com/2007/05/odessa-mama_3272.html Please enjoy, and respond if you have any comments or questions!\nWhoever has not been\nIn the beautiful city of Odessa\nHas not seen the world\nAnd knows nothing of progress\nWho cares for Vienna of Paris,\nThey're puddles, jokes, no comparison\nOnly in Odessa is\nA Paradise, I say.\nThere in a restaurant\nThey serve you beer\nAnd with it a bite\nOf fresh skrumbli\nBashmala and balik\nAnd with them a shashlik\nWith a good glass of wine -What could be better?\nOh, Mother Odessa,\nYou're forever dear to me.\nOh, Mother Odessa,\nHow I long for thee!\nOh, Mother Odessa,\nWho can forget you?\nOh, Mother Odessa,\nI see you no more.\nOh, Mother Odessa,\nI long for you and vow:\nYour avenues, promenades\nAre light, beautiful.\nThe cafes, the boulevards,\nOne can never forget.\nThe carriages, the gypsies,\nThe tumult, ta-ra-ram,\nThe hotels, the young ladies\nStill are on my mind.\nOh, Mother Odessa,\nYou're forever dear to me.\nOh, Mother Odessa,\nHow I long for thee!\nOh, Mother Odessa,\nWho can forget you?\nOh, Mother Odessa,\nI long for you and vow:\nAy, ay, ay, ay, ay,\nOne cannot forget.\nAy, ay, ay, ay, ay,\nHow I should like to see you again!\nHop tidl dam ti stidl didl dam ti.....\nOh, Odess-Odessa Mother,\nYou are the most beautiful panorama;\nEveryone treasured you dearly.\nThe cabarets, restaurants,\nYou will still remember today\nWho knows what has become of you?\nOdessa, Odessa, I long for you!\nMonday, March 24, 2008\nThe Hutsuls distinguish themselves from the other ethnic groups living in the Carpathian Mountains by their distinctive dress, which is full of color and ornaments. Most Hutsuls wear linen shirts with multi-colored embroidery and even glass beads. These shirts are accompanied by sheepskin vests, known as kozhushynas, which are ornamented with leather, string, embroidery, and mirrors. Over their shirts they wear either a narrow or thin colorful belts, which are sometimes decorated with brass. In warm weather men wear broad rimmed hats which are decorated with strings and plumes. Women either wear a headband or a square scarf which is wrapped around their head or neck.\nThe Hutsuls are most well-know for their woodcarving, which is no surprise since their society is centered largely on logging. In the Carpathian there are several options for high quality wood such as oak, willow, ash, elm, beech, and plane, so the Hutsuls have a huge selection to choose from. They are known for often inlaying their carvings with objects of great contrast such as wood, brass, silver, bone, pearl, and glass beads. This rich and lively style is meant to represent traditional Hutsul culture.\nThe Bukovel Ski Resort is a $125 million development in western Ukraine that is already open to the public, but still expanding rapidly. In the next 3-4 years, an additional $1 billion is scheduled to be invested to outfit this resort with world class everything, from hotels, to ski lifts, to the best snow-making capabilities. It will also extensively expand its trails, a trail map can be found on the bottom of this blog.\nThe resort is located in the city of Ivano-Frankivsk located in the green region of the map.\nThis is a great region in Ukraine, not only beautiful from the mountainscapes but also close to Yaremche, which is called the tourist capital of western Ukraine, and also near Vorokhta a predominant winter sports city in the region. So the infrastucture surronding Bukovel is first class, and accessibility will not be an obstacle like with Dragobrat, currently the nations most popular ski resort. Dragobrat is only accessible by military grade truck lugging you up the mountain, but once you get there it is the best and tallest skiing in Ukraine so far.\nWhat Bukovel will offer will attract all kinds of tourism to the area from Europe, Russia, and all over the world. Moscow is relatively close to this area, far closer than say the Italian or German alps, and with the most billionaires per-capita, one could easily foresee this being the next big hot spot in eastern Europe.\nBukovel will also be one of the biggest resorts in the world, having more lodging capacity that its western counterparts in Canada and the USA. With 600,000 visitors projected for this year alone, it looks to be well on its way to competing with these giants.\nThis indicates to me that Ukraine is finally taking big initiative to develop and attract international interest to this great country. First class luxury skiing is a unique and highly demanded means of entertainment that is perfect nestled in the regions Carpathian Mountains.\nAs music major, I am always fascinated to hear and learn about instruments around the world. And while reading about Hutsul’s Folk Art and Music, I had a strong urge to look deeper into finding out specific instruments from the Carpathian region in Southwestern Ukraine: particularly among the Hutsuls.\nTsymbaly is a Ukrainian version of a hammered dulcimer (cimbalom), a chordophone made up of a trapezoidal box with metal strings. Groups of three to five stings are tuned in unison, which are stretched between two bridges on the soundboard and is played by striking two wooden beaters against the strings. The origin of tsymbaly can be traced back to the Middle East where it was known as the Persian santur, which was brought into Ukraine during the Crusades. However, the first recorded evidence of the tsymbaly only dates to 17th century. Since then, it spread in popularity among people in the Carpathians in Southwestern Ukraine (specifically among Hutsuls and Bukovynians).\nTsmbaly have rich musical range of sounds and attain melodic, harmonic, and rhythmic functions as well. It is often used in folk ensembles called Troyista muzyka but also popular as a solo instrument.\nAnother interesting fact I have found was that as Ukrainians immigrated to Canada during WWI-WWII, tsymbaly became extremely popular in Western Canada where annual contests are still held in the beginning of August.\nThis is a video of a Hutsul Tsymbaly performance. The camera is rather shaky in the beginning but I hope you enjoy seeing and hearing an instrument from the other side of the world! (He is playing an Ukrainian melody from Hutsúlshchina (southwestern Ukraine).)\nSunday, March 23, 2008\nDuring our discussion last Monday, Svitlana briefly touched on the post-WWII border shifts and the population transfer that took place between Poland and Ukraine. As Svitlana noted, this was a very painful process for those families dislocated, and the policy has since been condemned as ethnic cleansing. Here's a link to reviews of a book I've read that deals with this matter: http://www.boydell.co.uk/www.urpress.com/80462383.HTM. It deals more with the Polish lands, and also with the expulsion of ethnic Germans from Poland after WWII, but it certainly also discusses the plight of Ukrainians in Poland and Poles in Ukraine.\nOn the other hand, it seems that many Hutsul traditions are alive and well in smaller villages -- my YouTubing turned up a fun video series of a recent Hutsul wedding. Enjoy the music and the costumes:\nAlso, a quick word on the music: in addition to its unique collection of traditional instruments and frequent use of the tritone (augmented fourth or diminished fifth), traditional music of the Carpathians (both in Ukraine and Poland) is characterized by a very distinct singing style. Most notably, men and women sing in the same register, which leads many to observe that the babas singing seem to be really belting out their notes. You can here this a few minutes into the video above.\nSaturday, March 22, 2008\nOn Monday, we heard the term \"postcard people\" used to talk about the Hutsul people who live in the Carpathian Mountain region. It's no coincidence that people like the Hutsuls have retained their traditional art and culture while other ethnic groups in the USSR did not. \"Postcard people\" refers to indigenous communities who were considered to be icons of folk culture in Soviet propaganda. Because of their special status they were not subject to many of usual Soviet reforms. The origins of this policy lies in the influence of Marxist theory in Soviet ethnography and also the form that the process of colonization took in the USSR.\nMarxist theory explains cultural diversity among human societies by arguing that societies evolve through the stages of civilization based on technological development or mode of production, especially the division of labor. (The stages are in order: tribalism, primitive communism, feudalism, capitalism, and communism.) Because evolutionary change was fueled by changes in technology, material culture (physical things distinct to a particular culture) was of utmost importance. Soviet era ethnographers focused on the physical attributes of cultures like the Hutsuls (for example, their dress, music, and arts & crafts). The purpose of was to preserve their culture (for example in museums). Also, because it was believed that technological advancement, esp. industrialization, was the key to advancing a society or pushing it to evolve, the Soviet government imposed reforms on the majority that it wanted to evolve but not so with postcard people who were supposed to remain distinct (even considered primitive).\nBy preserving select \"postcard people\" Stalin was able to distinguish his imposed reforms from other forms of colonization such as that European countries imposed elsewhere. (European colonization usually aimed at \"civilizing\" populations, for example converting them to Christianity, teaching English, and imposing dress codes, not necessarily modernizing their technology.)\nThe USSR sought a monumental task: to bring thousands of ethnic groups and hundreds of nations across Eurasia under one administrative umbrella. This required a monumental standardization project. Local officials needed to follow the same guidelines in Siberia as in Balkans. To aid them, the Bureau of Ethnography provided documentation of local cultures and \"scientific\" evidence to support the Soviet argument that colonization was not an inherent bad but rather it was just that Europe had used it to exploit people. In this context, postcard people like the Hutsuls provided Stalin with propaganda for highlighting the diversity of the USSR and, in particular, how well the Soviet government had managed to maintain diversity in the collectivity.Moreover, Hutsul diversity was protected by the particular history of the group itself. According to the Ukrainian Encyclopedia, the Hutsuls are the descendants of the original inhabitants of Kyivan Rus who fled into the mountains during the Mongolian invasion. Such distant history is difficult to argue. But, in more recent history (15th and 16th c) it is certain that the Hutsuls were a peasant group who were subject to domination by the Polish and Austrian nobility in previous centuries. They rebelled against European colonizers and maintained their unique culture. Thus, for the Soviets, they embodied the rural proletariat ideal in the face of bourgeois Europe.\nIf you are interested in learning more about Soviet ethnography and/or ethnic policy and affirmative action in the USSR, there is a great book by Francine Hirsch called \"Empire of Nations\". Also \"Peoples of the RSFSR\" is an encyclopedia with all the ethnic groups in the territory covered by the USSR.\nWednesday, March 19, 2008\nThis woodwind instrument is not only used for funerals or for calling family members across the mountain. It is a multi-purpose, incredible instrument that was used for occasions of every type. There was the funeral trembita, also known as the pochorona, but there was also the large trembita. This is played on happy occasions, including festivals and weddings. The vivcars’ka trembita is used by shepherds to signal their location in the mountains and protect their herd from bears and wolves, while the koljadnyc’ka trembita is used to signal the Christmas carolers location in the mountains. This instrument is clearly necessary in a time and society where telephones are not on demand.\nThe trembita is usually some tree meters long, 2.3 to 5 cm wide at the mouthpiece and 6 cm wide at the bell. Longer and shorter trembitas do exist.The tube is made from a straight piece of pine or spruce, oddly they prefer to make it with a piece that has been struck by lightning! What they do is split the piece into two and carve out the core. Once this is complete, the sections are joined together and wrapped in lime bark.\nUnfortunately, I couldn't find a video online to attach the sound that the trembita makes, but I hope you enjoy this picture that I found at www.infoukes.com. Let me know if you have comments or questions!\nTuesday, March 18, 2008\nAfter learning about the Ukrainian pop star Ruslana and her transition to the world of politics, I decided to take a deeper look at the music industry. I was surprised to learn that MTV has launched MTV Ukraine in the past year! The channel kicked off on Friday the 24th of August 2007 with “Tantsi” music video by the famous Ukrainian band Vopli Vidoplyasova\nMTV Ukraine features a broad mix of music videos by famous national musicians like Svyatoslav Vakarchuk and international musicians like Shakira. Along with a big variety of music videos and themed music shows, MTV Ukraine also broadcasts some trademark MTV US productions such as Pimp My Ride and .\nAccording to Viacom, MTV’s parent company, MTV Ukraine is set to take Ukraine’s music scene to the next level by providing Ukrainian youth with the best local and international music videos and programming that will reflect their tastes and interests as well as supporting the nations vibrant music industry.\nPeter Charchalis, Vice President, Horizon Capital (one of the founders of MTV Ukraine) commented “MTV is not just music videos, it's a lifestyle and we're confident that young adult Ukrainians will make it part of their lives. MTV has influenced entire generations and we're excited about delivering a Ukrainian language version of one of the world's strongest music and entertainment brands.”\nIren Osenniaya, who works in the Ukrainian media, says \"the failure of our market is in its primitiveness and its unwillingness to learn from the West. Also, many of our artists don't want to develop their professional skills at all. Ukrainians have never been a people that like to stand out from the crowd, and that’s resulted in a music scene in which many projects resemble one another. But, industry insiders say, as soon as we realize that change is needed, progress will come by itself.”\nI found this comment to be highly relevant given our previous discussions of the struggle to develop a sense of Ukrainian identity. While Ukrainian MTV gives these local singers a platform in which to express a unique Ukrainian message, it also brings the influences of Western culture.\nMonday, March 17, 2008\nBeside Maydan, perhaps no other architectural structure is as well known in Ukraine and abroad as St. Sophia's Cathedral in Kiev. Most would agree that the name and model for the Cathedral come from the more well known Hagia Sophia in modern day Istanbul. The building of the Cathedral began in ca 1037 and was completed two decades after the initial foundations were laid. After being built the Cathedral became the burial spot for Kievan rulers, most famous being Vladimir the Wise, the founder of St. Sophia Cathedral. The Cathedral was pillaged several times by various people/ groups, most infamous being Andrei Bogolyubsky and the Mongolian Tatars.\nInterstingly enough, the ownership of the Cathedral has been disputed in the past. St. Sophia's ownership has passed from many hands including the Ukrainian Greek Catholic Church and then the Ukrainian Orthodox Church. After the Bolshevik Revolution and Ukraine's incorporation as the Ukrainian SSR, the communists had ever desire to destroy the Cathedral and replace it with a proposed park. Needless to say this did not happen although the Cathedral did fall into a state of disrepair over the years of negligance. To this day the cathedral is a hotbed of controversy as both the Greek Catholic and Orthodox Churches in Ukraine hold claims to it. A recent controversy about the denial to burial of a leader in the Ukrainian Orthodox Church sparked minor protests. As a result of its rich architercture and history, St. Sophia's cathedral has been named as one the wonders of Ukraine.\nThe population loss in Kyiv alone was staggering. At the beginning of World War II, Kyiv was a booming city of 900,000 people, but by the close of World War II in 1945, Kiev was a city largely destroyed with only 186,000 people. The largest battle in Kiev was the Battle of Kyiv, a massive Soviet loss to the Nazi Germans in September 1941, with over 665,000 Soviet forces and 5 armies surrendering, a surrender that remains the largest surrender in the Soviet’s history.\nWhat is remarkable, however, is how quickly Kyiv was rebuilt after World War II, being almost completely rebuilt by the mid-1950’s, again serving as one of the most important cities in the Soviet Union. Much of this can be credited to the Supreme Soviet’s decision to implement a five-year plan of restoration of industry in Ukraine. Followed was a revival of cultural life within the republic. Finally, Ukraine again served as the second largest economy in the USSR, the largest being the RSFSR.\nFeatured below is a photo of Kyiv burning during World War II:\nInitially the Soviet authorities did not alert residents of Pripyat (the town near Chernobyl) that radioactive isotopes had been spread throughout the region and that their health was in grave danger. Finally, several days later, residents were evacuated, and at a later time, the City of Slavutych was built to accommodate the former residents of Chernobyl. Even today, the residents are heavily dependent on the power plant, and a regular train operates between the town and the 30 kilometer “Zone of Alienation.”\nCatastrophic economic impact was felt throughout the region. A few essential facts and figures about economic repercussions include the following:\n1. Both the Belarusian and Ukrainian governments estimate that losses over the 30 years following the accident will total approximately $383 billion;\n2. 784,230 hectares of farmland along with 694,200 hectares of forest have been rendered unusable; and\n3. 82 agricultural enterprises, 22 factories and 22 raw material deposits were removed from service.\nA report from the Institute of Sociology indicated the prevalence of five trends: self-victimization, social exclusion, expectations of future support, inadaptability to new environment, as well as lack of initiative. Furthermore, while UNICEF has continually promoted universal salt iodization to reduce iodine deficiency, a disorder which can eventually lead to a depressed Intelligence Quotient and acceleration of latent Thyroid cancer, voluntary usage of iodized salt remains around 15 to 30%.\nAlmost 22 years later, nuclear technology provided during the Soviet Union remains in many of the former Soviet republics, thus providing for another Chernobyl-like disaster to occur. Furthermore, action by the international community to remedy the ramifications of the disaster has been very limited, to the point that many who reside within Belarus and Ukraine today continue to feel the effects of the disaster.\nFeatured below is a picture of the Chernobyl Power Plant in current form.\nMaidan Nezalezhnosti (Independence Square) is the main square in Kyiv, the capital city of Ukraine. The square was named after Ukraine received its independence in 1991.\nThe two biggest political protests that have occurred in Ukraine since 1991 have been centrally located in Maidan. In December 2000, the \"Ukraine without Kuchma\" campaign began rallying in Independence Square. Protesters set up tents on Khreshchatyk Street, the street that runs through Maidan. Oleksandr Omelchenko, the mayor of Kyiv at the time, ordered a major construction project to begin soon after in an attempt to dissolve the protest. This sort of practice is commonly used by local authorities in Ukraine in an attempt to non-violently end protests. In March 2001, the protest took a violent turn when riots began between the police and protesters. Dozens were injured in what some call the most violent riots in Ukraine's history. Soon after the protest ended.\nFrom 2004 to 2005, a series of protests occurred in Maidan that came to be known as the Orange Revolution. Thousands of Ukrainians gathered in the streets near to Maidan to protest the corrupt political system and electoral fraud that prevailed in the 2004 presidential election. The protests, all of which were non-violent, led to an additional round of elections and the opposing candidate, Viktor Yushchenko, won. Unlike the \"Ukraine without Kuchma\" campaign, the Orange Revolution ended just as peacefully as it began.\nPolitical protests continue to occur in Maidan, but none have reached the level that the \"Ukraine without Kuchma\" and Orange Revolution did. Maidan is a popular meeting place for Ukrainians and attracts thousands of visitors with its beautiful buildings and scenic landscape, but the true importance of this area lies within the political protests that have occurred here that have shaped Ukraine's political future."
] | [
"<urn:uuid:971f96dc-e196-4542-8858-171dd6911ab6>"
] | [
"CC-MAIN-2017-26"
] | [
"http://umichukrainian.blogspot.com/2008/03/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320395.62/warc/CC-MAIN-20170625032210-20170625052210-00404.warc.gz"
] | [
"en"
] | [
0.9724411964416504
] | [
9795
] | [
2.546875
] | [
3
] |
[
"Forseti (pronounced “for-SET-ee;” Old Norse Forseti, “Chairman”) is an obscure pre-Christian Norse god. He is mentioned only twice in Old Norse literature. The first mention comes from the 15th stanza of the Grímnismál, one of the poems in the Poetic Edda. There, it’s said that Forseti’s dwelling-place, Glitnir, is a resplendent hall made of gold and silver, and that he settles disputes. He thus seems to be the divine equivalent of and model for the human “lawspeaker” (lögsögumaðr), the ceremonial head of the þing, the Scandinavian legal assembly. The lawspeaker often acted as a judge who decided the outcome of disputes in accordance with the law.\nThat’s the extent of reliable, relatively unambiguous information concerning Forseti that we have from any primary source. The sole other mention of him in Old Norse literature comes from the Prose Edda of Snorri Sturluson. There, Snorri claims that Forseti is the son of Baldur and Baldur’s wife, Nanna. But Snorri can’t be taken at face value, because he often prefers tidiness over accuracy. His remarks on Forseti’s parentage very well may be his own invention – or they could indeed refer to an authentic pre-Christian tradition. Unfortunately, we simply don’t know.\nOther possible references to Forseti from other kinds of sources are also ambiguous and problematic.\nAccording to Alcuin’s eighth-century Life of St. Willibrord, Willibrord once visited an island between Denmark and Frisia. There was a holy spring on the island from which people obtained water, and they did so in silence due to the holiness of the place. The Life records that the island was named Fositesland after the god who was worshipped there. This Fosite could be Forseti, but this is far from certain, and if it were the case, it would raise additional problems with the meaning and etymology of Forseti’s name.\nIn one medieval account of the origin of Frisian law, twelve lawmakers were set adrift at sea as a punishment by Charles the Great. They prayed to the Christian god for assistance, and their prayers were answered when a thirteenth man carrying a golden axe mysteriously appeared among them. He used his axe to row the ship to land, and when they reached land, he threw the axe on the ground, and a spring gushed forth from the spot where it landed. This thirteenth man taught them the laws they needed to know, then vanished.\nWhile the element of the holy (or at least mysterious) spring in both texts could point to a common tradition linking Forseti and holy springs, and the golden axe of the second text could be connected to Forseti’s golden hall, these correspondences are highly tenuous and demonstrate nothing conclusively. It’s possible that the thirteenth man was the god Forseti, but it’s more likely that he was Christ, since he came in answer to Christian prayers, and was the thirteenth man among twelve followers, like Jesus and his apostles.\nUnfortunately, then, the one passing reference to Forseti in the Grímnismál provides the only trustworthy information we have about Forseti as he was understood in heathen times.\nLooking for more great information on Norse mythology and religion? While this site provides the ultimate online introduction to the topic, my book The Viking Spirit provides the ultimate introduction to Norse mythology and religion period. I’ve also written a popular list of The 10 Best Norse Mythology Books, which you’ll probably find helpful in your pursuit.\n The Poetic Edda. Grímnismál, stanza 15.\n Snorri Sturluson. The Prose Edda. Gylfaginning, chapter 31.\n Ellis-Davidson, Hilda Roderick. 1964. Gods and Myths of Northern Europe. p. 171.\n Simek, Rudolf. 1993. Dictionary of Northern Mythology. Translated by Angela Hall. p. 88-89.\n Ellis-Davidson, Hilda Roderick. 1964. Gods and Myths of Northern Europe. p. 171-172."
] | [
"<urn:uuid:04137f23-99e1-4355-a00e-5be1f1987c76>"
] | [
"CC-MAIN-2020-05"
] | [
"https://norse-mythology.org/forseti/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250606975.49/warc/CC-MAIN-20200122101729-20200122130729-00238.warc.gz"
] | [
"en"
] | [
0.9489665031433105
] | [
940
] | [
3.21875
] | [
3
] |
[
"Is there a historical connection between faith communities and health?\nYes. Over the past decades, medical researchers have reported a statistically significant association between health and religion.\nPeople who pray, meditate and go to church are not only more resistant to disease but live longer and recover from operations more quickly.\nEven though it may not be intentional, there are healthy effects provided from being a religious person.\nThe root word of healing and healer is ‘hael,’ which means to facilitate movement towards wholeness or to make whole on all levels—physical, mental, emotional, social and spiritual.\nHealing might be defined as being in right relationship with self, a higher power and others. A Christian assumption is that all healing comes from God and that healing is always possible, while cure, which implies the elimination of disease and its symptoms, is not always possible.\nThe Canadian health care system is complicated making it difficult to know about all services that are available. When we are ill, it can be difficult to advocate for ourselves. Family may not know how to help.\nA Parish Nurse can help people navigate the health care system, while advocating for and supporting them in a wholistic way, including the spiritual and religious aspects of their lives that contribute to health and healing.\nTogether, we are creating a future where community care and our traditional health care system work in harmony to ensure that every member of our respective human family receives quality care, defined as ‘effective, safe, coordinated and patient-centered.’\nWhat is a Parish Nurse?\nA parish nurse is a registered nurse with current registration in the province in which she practices. Nursing is a regulated profession, and current registration ensures that the public is receiving safe and competent care. The registered nurse who works as a parish nurse works with individuals and groups within the congregation. She carries out the initial contact with the parishioner or, client. The parish nurse is specifically educated utilizing a thoroughly researched curriculum developed by experts from the church Health Centre in Memphis, TN. This 26-module program prepares nurses for evidence-based, faith community nursing practice.\nThe nurses learn to comprehensively assess and define wholistic health needs, teach and promote health, support and direct clients to the most appropriate care providers.\nWhile assisting the client to achieve an optimum level of functioning, the parish nurse, with her mature faith, is in a unique position to promote the underlying spiritual understanding of the connection between health and faith.\nWho is InterChurch Health Ministries (ICHM) Canada?\nThe concept of ICHM Canada was launched in Durham Region in 1994 and is now incorporated as a non-profit, charitable organization in the Province of Ontario. You can read more about our history here. The initial pilot project of five congregations (1995-96) has grown to over 60 partnerships in Ontario representing 16 different denominations. ICHM Canada is also affiliated with ICHM Saskatchewan. ICHM Canada is a partner with the International Parish Nurse Resource Centre in Memphis, TN. It is from this Centre that we receive our parish nurse education program curriculum.\nICHM Canada is a member of the Canadian Association for Parish Nursing Ministry (CAPNM) and partners with Emmanuel College,University of Toronto for the delivery of our education program. A governing Board oversees the ministry, currently supported by a core staff team of three. ICHM Canada is funded by a combination of partnership fees, grants, individual gifts and fundraising events. Read more about how you can support us here.\nWhy Partnership vs Membership?\nThe ICHM Canada model is built on the concept of mutual ministry through partnership. Together we are stronger than we are individually and can mutually benefit from each others’ strengths.\n- Partnership with ICHM Canada ensures that your parish nurse, health committee and clergy do not work in isolation as they develop a ministry of health and healing in the church\n- ICHM Canada’s inter-church partnership structure, including diverse Christian denominations, encourages ecumenical relationships whose common vision is the church as a healing place\n- Through partnership fees, congregations and agencies participate and share in the innovative ministry of ICHM Canada as it delivers its parish nursing ministry education program, provides support services and continues its developmental work\n- ICHM Canada has been developing resources for our partners’ use since 1995\nWhat Matters to ICHM Canada & Guides Our Action?\nOur VALUES as listed here.\n- Healing ministries following Christ’s example\n- Wholistic health for all, encompassing the physical, psychosocial and spiritual\n- Continued learning through education and support\n- Congregationally driven, theologically based & mission focused health & healing ministries\n- The inclusion of a parish nurse within a congregation’s ministry\n- Collaborative partnerships to promote healthy communities"
] | [
"<urn:uuid:68c961a6-31b1-4e8b-a1f4-3872470cf520>"
] | [
"CC-MAIN-2020-05"
] | [
"http://www.ichm.ca/frequently-asked-questions/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250593937.27/warc/CC-MAIN-20200118193018-20200118221018-00047.warc.gz"
] | [
"en"
] | [
0.9570710062980652
] | [
988
] | [
2.734375
] | [
3
] |
[
"A new study found that young women who vape may find it more difficult to conceive due to vaping affecting their eggs.\nAlthough vaping has been considered a healthier alternative to smoking and has gained popularity on social media, it has recently been found to cause a wide range of problems. Studies have shown that vaping can damage DNA, trigger lung damage similar to that caused by emphysema, and explode in people's faces.\nNow, adding to the list of problems associated with vaping, scientists say that it may harm fertility and pregnancy outcomes in young women. The study, published in the Journal of Endocrine Society, used a mouse model to establish whether exposure to e-cigarettes impairs fertility and health of offspring.\nAfter being exposed to e-cigarette vapour, female mice showed a decrease in embryo implantation and a delay in the onset of pregnancy with their first litter. Female offspring exposed to e-cigarettes in utero failed to gain as much weight as the control mice at 8.5 months.\nMice were exposed to e-cigarette vapour for several months and researchers found that the fertility of the females drastically declined during that period. These effects could be even more severe in humans due to a combination of environmental, health and genetic factors, according to the researchers.\nLifelong, second-generation effects\nIn the past, it has been found that smoking tobacco can harm pregnant women, conception and foetuses. A 2019 study found that the flavour in e-cigarettes harmed testicular function in male rats.\nKathleen Caron, Ph.D., the corresponding author on the study, said, \"We found that e-cigarette usage prior to conception significantly delayed implantation of a fertilized embryo into the uterus, thus delaying and reducing fertility (in mice).\"\nShe continued to say, \"We also discovered that e-cigarette usage throughout pregnancy changed the long-term health and metabolism of female offspring – imparting lifelong, second-generation effects on the growing foetus.\"\nCaron added that these findings were important for changing the views on e-cigarettes – to no longer being considered a safer alternative to traditional cigarettes.\nThis article originally appeared at the News24.com website"
] | [
"<urn:uuid:03cea63a-e3a9-40ea-bd86-a71c17197fbf>"
] | [
"CC-MAIN-2020-05"
] | [
"https://www.againstsmoking.co.za/single-post/2019/10/09/As-more-research-about-vaping-becomes-available-another-shocking-new-finding-%E2%80%93-it-could-harm-young-women%E2%80%99s-fertility"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598726.39/warc/CC-MAIN-20200120110422-20200120134422-00202.warc.gz"
] | [
"en"
] | [
0.9485856294631958
] | [
446
] | [
3.046875
] | [
3
] |
[
"Signs Of A Heroin Overdose\nHeroin overdoses are disturbingly common. Due to an intense euphoria and drowsiness that slows breathing and heart rate, using too much heroin can result in death. Treating heroin addiction, and stopping use, can prevent overdose and promote long-term recovery.\nBecause heroin is bought and sold illegally, there is no way of knowing or controlling the quality and strength of the narcotic. Heroin is often mixed with other powerful substances, like fentanyl or carfentanil, which increases its deadly effects. All it takes is one bad batch, or too large an amount, to die from a heroin overdose.\nHeroin addiction can be treated with a combination of medication and behavioral therapy, which is likely the most effective measure for preventing overdose. But, in the case of an overdose, be prepared to know the signs and reach out for help.\nSigns Of A Heroin Overdose\nIn the event of an overdose, 9-1-1 should be contacted immediately. Although witnessing someone overdosing can be scary, it’s important to know when to call for help. If left untreated, a heroin overdose can be fatal.\nSigns of a heroin overdose include:\n- disorientation or delirium (confusion, restlessness or hallucinations)\n- extreme sleepiness\n- floppy arms and legs\n- lips and fingernails turn a bluish color\n- pinpoint pupils (very small pupils)\n- shallow or slow breathing\n- snoring or gurgling sounds (this may indicate a person’s airway is blocked)\n- unresponsiveness/won’t wake up\n- weak pulse\nFind Treatment For Heroin Abuse Today.\nWe are here to help you through every aspect of recovery. Let us call you to learn more about our treatment options.\nOverdoses usually don’t happen quickly, and it can take several hours for someone to die as a result. Do not assume the person is sleeping, especially if they aren’t responsive and you can’t wake them. A person doesn’t have to show all of these signs to be having an overdose. If there is any suspicion, grab a phone and call for help as soon as possible.\nUnderstanding A Heroin Overdose\nThe sad truth is heroin overdose deaths are on the rise. Since 2010, the number of deaths related to heroin use increased by more than five times. Data from 2016 shows nearly 15,500 people died from a heroin overdose that year alone. The recent surge in fatalities suggests more and more people will die as a result of using heroin.\nMany of the people who die from a heroin overdose are already addicted. However, it is possible to overdose when trying heroin for the first time. Combining heroin with other substances, like alcohol, prescription drugs or cocaine, increases the risk of overdose. Spotting the signs of an overdose, knowing what to do in an emergency and understanding addiction are all important aspects of prevention.\nWhat To Do During A Heroin Overdose\nBesides calling 9-1-1, there are a few simple steps you can take to improve a person’s chances of survival. This is what you can do if someone is overdosing:\n- assure them everything will be okay and stay with them\n- call their name or try to get a response if they’re unconscious\n- if you don’t get a response, carefully turn them on their side (this can prevent them from choking if they vomit and helps facilitate breathing)\n- call an ambulance, keep an eye on them and give first aid or CPR if instructed to do so\nCalling for emergency help is the single most important thing you can do if someone is overdosing on heroin. While it is possible to recover from a heroin overdose, it can result in pneumonia, other lung complications or death. If administered in time, there is a medication that can help counter a heroin overdose.\nWhat Is Naloxone?\nFirst responders may carry a medication called Naloxone, or brand name Narcan. Naloxone is an opioid reversal medication that can reverse the effects of a heroin overdose. Naloxone comes as a nasal spray, injectable or auto-injectable, and is sprayed into one nostril or injected under the skin or into a muscle. It can very quickly return breathing to normal, which has likely slowed to dangerous rates during an overdose.\nNaloxone can prevent overdose fatalities and keep a person alive until they receive further medical attention. While this medication can be life-saving, it’s also crucial to understand what led to an overdose in the first place. Although anyone can overdose on heroin, there are some risk factors that endanger certain individuals.\nRisk Factors For Heroin Overdose\nWhile overdosing on heroin is possible via any route of administration, injecting heroin increases the risk. Combining stimulants, like cocaine, with heroin and injecting it (“speedball”) is very dangerous and often deadly.\nOther risk factors for heroin overdose include:\n- injecting heroin\n- mixing heroin with other substances like alcohol or prescription drugs\n- prolonged use of heroin or opioids (five to 10 years)\n- other physical or mental health problems\n- the person has been drug-free for a time but relapsed\n- using heroin or other drugs while alone\nA history of misusing prescription opioids is the strongest risk-factor for heroin abuse and addiction, which increases the risk of overdose. If a person has recently become dependent on opioids or has abused them within the past year, they are likely to succumb to addiction. Simply being addicted to heroin is a risk-factor for overdose, so it’s important to know the signs of addiction.\nSigns Of Heroin Addiction\nHeroin changes the brain in ways that make it hard to stop use. Developing a heroin dependence, which means the person suffers uncomfortable symptoms of withdrawal when they stop use, is a sign of addiction. The person may neglect their favorite activities in favor of seeking out and using heroin, allow relationships to deteriorate and experience problems at work or school.\nHere are some other warning signs of heroin addiction:\n- changes in appetite\n- changes in attitude or personality\n- changes in physical appearance (more messy, disheveled)\n- covering arms (wearing long sleeves)\n- finding burnt spoons/bottle caps, syringes, and bags with powder residue\n- missing spoons, shoelaces or belts\n- secretive behavior (isolation)\nWhen a person makes using or finding heroin their top priority and continues to use it despite harmful consequences, they’re likely suffering from addiction. Although addiction can be devastating and may lead to overdose, it is a treatable disease.\nTreatment For Heroin Addiction\nInpatient rehab programs are an excellent option for treating heroin addiction because they provide around-the-clock care and supervision and ensure the person is safe, comfortable and drug-free during addiction treatment. Many programs begin with a medically supervised detox program, which allows staff to monitor symptoms, provide medication to alleviate withdrawal and help prepare the person for further addiction treatment.\nHeroin addiction is usually treated with a combination of medications and behavioral therapy. Currently, there are three government-approved medications used to treat heroin addiction: methadone, buprenorphine (Suboxone, Subutex) and naltrexone. These medications are effective for reducing drug cravings, lessening dependence and decreasing the risk of overdose.\nMedications are typically used alongside behavioral therapy. Behavioral therapy is the most common form of addiction treatment and works to change thinking and attitudes towards drugs. While a person can recover from a heroin overdose, addiction treatment can help guide them into a long-lasting and fulfilling drug-free life in recovery.Article Sources\nCenters for Disease Control and Prevention - https://www.cdc.gov/drugoverdose/data/heroin.html\nNational Council on Alcoholism and Drug Dependence - https://www.ncadd.org/get-help/get-immediate-help/drug-overdose-emergency?highlight=WyJoZXJvaW4iLCJvdmVyZG9zZSJd\nU.S. National Library of Medicine: MedlinePlus - https://medlineplus.gov/ency/article/002861.htm\nNew York State: Combat Addiction - https://www.combataddiction.ny.gov/warning-signs"
] | [
"<urn:uuid:6229310e-27e4-4fc9-af33-6e7ebe39aa3b>"
] | [
"CC-MAIN-2020-05"
] | [
"https://www.addictioncampuses.com/heroin/overdose/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250592636.25/warc/CC-MAIN-20200118135205-20200118163205-00181.warc.gz"
] | [
"en"
] | [
0.9083442687988281
] | [
1766
] | [
2.59375
] | [
3
] |
[
"About this courseSkip About this course\nThe world is full of uncertainty: accidents, storms, unruly financial markets, noisy communications. The world is also full of data. Probabilistic modeling and the related field of statistical inference are the keys to analyzing data and making scientifically sound predictions.\nProbabilistic models use the language of mathematics. But instead of relying on the traditional \"theorem-proof\" format, we develop the material in an intuitive -- but still rigorous and mathematically-precise -- manner. Furthermore, while the applications are multiple and evident, we emphasize the basic concepts and methodologies that are universally applicable.\nThe course covers all of the basic probability concepts, including:\n- multiple discrete or continuous random variables, expectations, and conditional distributions\n- laws of large numbers\n- the main tools of Bayesian inference methods\n- an introduction to random processes (Poisson processes and Markov chains)\nThe contents of this courseare heavily based upon the corresponding MIT class -- Introduction to Probability -- a course that has been offered and continuously refined over more than 50 years. It is a challenging class but will enable you to apply the tools of probability theory to real-world applications or to your research.\nThis course is part of theMITx MicroMasters Program in Statistics and Data Science. Master the skills needed to be an informed and effective practitioner of data science. You will complete this course and three others from MITx, at a similar pace and level of rigor as an on-campus course at MIT, and then take a virtually-proctored exam to earn your MicroMasters, an academic credential that will demonstrate your proficiency in data science or accelerate your path towards an MIT PhD or a Master's at other universities. To learn more about this program, please visit https://micromasters.mit.edu/ds/.\nWhat you'll learnSkip What you'll learn\n- The basic structure and elements of probabilistic models\n- Random variables, their distributions, means, and variances\n- Probabilistic calculations\n- Inference methods\n- Laws of large numbers and their applications\n- Random processes\nUnit 1: Probability models and axioms\n- Probability models and axioms\n- Mathematical background: Sets; sequences, limits, and series; (un)countable sets.\nUnit 2: Conditioning and independence\n- Conditioning and Bayes' rule\nUnit 3: Counting\nUnit 4: Discrete random variables\n- Probability mass functions and expectations\n- Variance; Conditioning on an event; Multiple random variables\n- Conditioning on a random variable; Independence of random variables\nUnit 5: Continuous random variables\n- Probability density functions\n- Conditioning on an event; Multiple random variables\n- Conditioning on a random variable; Independence; Bayes' rule\nUnit 6: Further topics on random variables\n- Derived distributions\n- Sums of independent random variables; Covariance and correlation\n- Conditional expectation and variance revisited; Sum of a random number of independent random variables\nUnit 7: Bayesian inference\n- Introduction to Bayesian inference\n- Linear models with normal noise\n- Least mean squares (LMS) estimation\n- Linear least mean squares (LLMS) estimation\nUnit 8: Limit theorems and classical statistics\n- Inequalities, convergence, and the Weak Law of Large Numbers\n- The Central Limit Theorem (CLT)\n- An introduction to classical statistics\nUnit 9: Bernoulli and Poisson processes\n- The Bernoulli process\n- The Poisson process\n- More on the Poisson process\nUnit 10 (Optional): Markov chains\n- Finite-state Markov chains\n- Steady-state behavior of Markov chains\n- Absorption probabilities and expected time to absorption\nMeet your instructors\nPursue a Verified Certificate to highlight the knowledge and skills you gain $300.00\nOfficial and Verified\nReceive an instructor-signed certificate with the institution's logo to verify your achievement and increase your job prospects\nAdd the certificate to your CV or resume, or post it directly on LinkedIn\nGive yourself an additional incentive to complete the course\nSupport our Mission\nEdX, a non-profit, relies on verified certificates to help fund free education for everyone globally\n“This is by far the best probability & statistics course available--online or in the classroom.”\n\"You won’t find another intro to probability with greater depth and breadth.\"\n\"This is a great course for those serious about forming a solid foundation in probability.\"\n\"[This course] has created a love for probabilistic models, that, I guess, truly govern everything around us.\"\n\"This should be in top 10 MOOCs of all time.\"\nFrequently asked questions\nHow is this class related to 6.041x?\nThe material covered, and the resources (videos, etc.) are largely the same, but homeworks and exams contain revised and new problems.\nWhat textbook do I need for the course?\nNone - there is no required textbook. The class follows closely the text I ntroduction to Probability, 2nd edition, by Bertsekas and Tsitsiklis, Athena Scientific, 2008. (See the publisher's website or Amazon.com for more information.) However, while this textbook is recommended as supplemental reading, the materials provided by this course are self-contained.\nWhat is the format of the class?\nThe course material is organized along units, each unit containing between one and three lecture sequences. (For those who purchase the textbook, each unit corresponds to a chapter.) Each lecture sequence consists of short video clips,interwovenwith short problems to test your understanding. Each unit also contains a wealth of supplementary material, including videos that go through the solutions to various problems.\nHow much do I need to work for this class?\nThis is an ambitious class in that it covers a lot of material in substantial depth. In addition, MIT considers that the best way to master the subject is by actually solving on your own a fair number of problems. MIT students who take the corresponding residential class typically report an average of 11-12 hours spent each week, including lectures, recitations, readings, homework, and exams.\nWho can take this course?\nUnfortunately, learners from one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. EdX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live."
] | [
"<urn:uuid:efc2c722-2eee-4213-a230-c28194b413e2>"
] | [
"CC-MAIN-2020-05"
] | [
"http://www.edx.org/course/probability-the-science-of-uncertainty-and-data?utm_medium=affiliate_partner&utm_source=mitopenlearning-mit-open-learning"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251671078.88/warc/CC-MAIN-20200125071430-20200125100430-00386.warc.gz"
] | [
"en"
] | [
0.8932804465293884
] | [
1421
] | [
3.546875
] | [
4
] |
[
"On New Year’s Night, 1966, a teenaged Sophia Bracy and her sister Debra returned to their rural Elmore County home following a cherished annual tradition in the black community: the reading of the Emancipation Proclamation. It was after midnight, and soon everyone in the house was asleep.\nThe peaceful setting was shattered when a series of homemade firebombs crashed through the windows, causing the small cinderblock Bracy home to explode into flames. All 11 family members escaped, but they lost everything.\n“Our local paper reported that there was no foul play involved, even though my father found one of the unexploded firebombs in the bed of his truck,” Harris recalled. “We were already a poor farming family. Now we were destitute.”\nUpon her graduation from Wetumpka High School in 1968, Bracy had the opportunity to attend college on a scholarship. Since the family had no income, she was also able to get Pell Grants, loans and a partial scholarship from the NAACPLegal Defense and Educational Fund. But the scholarship stipulated she must attend a majority-white school.\nShe felt drawn to Auburn because of something from her past.\n“As a teenager, I had visited Auburn as the guest of Jerry Roden, a white man who was an English instructor at Auburn,” she said. “Jerry, a progressive leader in the Alabama Council on Human Relations, tutored me and Debra. Jerry saw that I had a knack for writing and he encouraged me in the same way that I now try to encourage children from vulnerable backgrounds.”\nAt Auburn, Bracy sifted through majors before eventually settling on family and child development.\nJust before graduation, Bracy was invited to a meeting in Selma where African-American child care activists gathered to express concerns over a new Alabama law that required a complicated—and often arbitrary—licensing process for child care facilities.\nFrom the Selma meeting, Harris was able to work with child care advocates such as Marian Wright Edelman, founder and president of the Children’s Defense Fund. She learned the principles of community control, the importance of training teachers and advocates, and how to provide technical assistance to meet the demands of the law. With a pervasive belief that it’s not enough to just tell people things—you need to work with them in their own communities—Bracy joined with those Selma activists in 1972 to form the organization now known as FOCAL, the Federation of Child Care Centers of Alabama.\nFOCAL’s mission broadened from providing day care for low-income families, to establishing child care standards and providing teacher development.\nFor her success overcoming a systemic deprivation of community-based child care centers in poor communities, Harris was awarded a MacArthur Foundation “genius” grant in 1991.\n“I made a commitment to not give over to evil and ignorance, and instead to educate ourselves and push back against a deeply ingrained belief, from slavery, that we aren’t equal. I was determined to help others see that we don’t have to stay in that place. I try to live that every day.”"
] | [
"<urn:uuid:093ce266-c89f-4e3b-acf3-e7396ab40205>"
] | [
"CC-MAIN-2020-05"
] | [
"http://www.alumni.auburn.edu/determined-an-activist-for-the-innocent/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250607596.34/warc/CC-MAIN-20200122221541-20200123010541-00015.warc.gz"
] | [
"en"
] | [
0.975885808467865
] | [
663
] | [
2.609375
] | [
3
] |
[
"In the U.S. alone, it’s estimated that 10-15% of couples are infertile. Of those couples, 50-60% will likely have a male contributing factor. It can be frustrating for couples dealing with fertility issues. However, there are solutions that may be effective if it’s been determined male infertility is likely a contributing factor.\nTHE MALE REPRODUCTIVE SYSTEM\nA common cause of male infertility is a problem with one of the male reproductive system structures, which collectively play a role in important urological and reproductive processes. Below is a description of each of these structures.\nScrotum and Testicles\nThe scrotum is the sac of skin that contains the testes, the two organs that produce sperm. They are located outside of the body to help maintain an ideal temperature for sperm production. Housed within the scrotum, testicles are oval glands produce the male sex hormone testosterone. They also produce sperm cells.\nThe penis is the male sex organ that transports urine and deposits seminal fluid into the vagina during intercourse. Tissues within the penis help this structure become erect and transport semen.\nEpididymis and Vas Deferens\nThe epididymis is a long, coiled tube located next to and behind the testes. Its function is to allow sperm to mature fully and send them to the vas deferens. Sperm typically stays within this tube for 2-12 days. The vas deferens is a long tube that extends from the epididymis to the pelvis in the area behind the bladder. It’s a duct that transports sperm from testicles to the tube that exits the body via the penis (urethra).\nOther Key Structures\nProstate gland: A walnut-sized gland that produces essential enzymes and fluid that help semen liquefy prior to ejaculation.\nCowper’s glands: Nestled behind the prostate, these glands at the base of the penile shaft in urethra provide lubricant for seminal fluid just prior to ejaculation.\nSeminal vesicles: Tubular glands that produce energy in the form of sugar fructose sperm need to travel.\nLeydig cells: These cells play a role in producing testosterone.\nSertoli cells: These are cells that produce growth factors that provide nourishment for sperm.\nSeminiferous tubules: Sperm starts to mature here as it’s stored for about 3 months.\nMALE INFERTILITY CAUSES\nThe main symptom of infertility is an inability of a couple to conceive after at least a year of actively trying to achieve this goal. Roughly 20% of all instances of infertility is solely due to the male partner and an additional 30-40% is due to both the male and female partners. Common male infertility causes include:\n- Sperm abnormalities: Some men have issues with sperm quality or production that affect fertility capabilities.\n- Sperm delivery issues: Premature ejaculation, cystic fibrosis and other genetic diseases, structural blockages, and damage affecting reproductive organs are among the issues that can affect sperm delivery.\n- Environmental factors: Exposure to radiation or certain toxic chemicals like pesticides, cigarette smoking, and excessive alcohol consumption are some of the environmental factors that may contribute to male infertility.\nSome men also have fertility problems related to underlying health issues. The side effects of certain medications, high blood pressure, depression, and a poor diet are other factors that could affect the ability to conceive. There’s also evidence frequent exposure to heat around the scrotum and testicles may affect sperm production.\nSome men notice improvements after making certain lifestyle changes, such as eating healthier, wearing loose-fitting underwear, and no longer smoking. Medication adjustments may be helpful as well. Depending on the diagnosis, treatment of male infertility can include the following:\n- varicocele correction surgery\n- vas deferens repair surgery\n- vasectomy reversal surgery\n- sperm retrieval techniques\n- hormone treatment that preserves sperm production\nOnce couples develop a better understanding of the warning signs of infertility issues, it can help to work with a reproductive urologist to determine if there’s a male factor involved. This is a process that allows couples dealing with fertility challenges and inferiority concerns to ask questions, get answers based on reliable results, and make well-informed decisions about what steps to take next."
] | [
"<urn:uuid:f205444d-66a0-4750-9fc0-1109f3df3890>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.austinfertility.com/male-reproductive-system-how-it-works-fertility-issues-treatment/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949958.54/warc/CC-MAIN-20230401094611-20230401124611-00337.warc.gz"
] | [
"en"
] | [
0.9280288219451904
] | [
919
] | [
2.953125
] | [
3
] |
[
"Leonardo da Vinci Begins Apprenticeship at Verrochio's Workshop\nn 1466, at the age of fourteen, Leonardo was apprenticed to one of the most successful artists of his day, Andrea di Cione, known as Verrocchio.\nVerrocchio's workshop was at the centre of the intellectual currents of Florence, assuring the young Leonardo of an education in the humanities. Other famous painters apprenticed or associated with the workshop include Ghirlandaio, Perugino, Botticelli, and Lorenzo di Credi. Leonardo would have been exposed to a vast range of technical skills and had the opportunity to learn drafting, chemistry, metallurgy, metal working, plaster casting, leather working, mechanics and carpentry as well as the artistic skills of drawing, painting, sculpting and modelling.\nMuch of the painted production of Verrocchio's workshop was done by his employees. According to Vasari, Leonardo collaborated with Verrocchio on his Baptism of Christ, painting the young angel holding Jesus's robe in a manner that was so far superior to his master's that Verrocchio put down his brush and never painted again. This is probably an exaggeration. On close examination, the painting reveals much that has been painted or touched up over the tempera using the new technique of oil paint, the landscape, the rocks that can be seen through the brown mountain stream and much of the figure of Jesus bearing witness to the hand of Leonardo.\nLeonardo himself may have been the model for two works by Verrocchio, including the bronze statue of David in the Bargello, and the Archangel Michael in Tobias and the Angel.\nBy 1472, at the age of twenty, Leonardo qualified as a master in the Guild of St Luke, the guild of artists and doctors of medicine, but even after his father set him up in his own workshop, his attachment to Verrocchio was such that he continued to collaborate with him. Leonardo's earliest known dated work is a drawing in pen and ink of the Arno valley, drawn on August 5, 1473.\nVerrocchio had studied under the great artist Donatello, and he served as official sculptor to the ruling Medici family. He was not only a skilled artist but a skilled teacher, and Leonardo received training in all artistic genres, except for large wall murals and frescoes. Leonardo first went to study under Verrocchio in 1467, when he was fifteen. At first, like any apprentice, he would have had to perform simple chores, almost as a servant would. Later he would have learned to prepare pigments and canvases; then he would have drawn studies of Verrocchio's works and other models."
] | [
"<urn:uuid:4475a929-147e-4a0b-b914-929c42610eb7>"
] | [
"CC-MAIN-2020-05"
] | [
"https://worldhistoryproject.org/1466/leonardo-da-vinci-begins-apprenticeship-at-verrochios-workshop"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250592394.9/warc/CC-MAIN-20200118081234-20200118105234-00268.warc.gz"
] | [
"en"
] | [
0.9871854186058044
] | [
558
] | [
3.484375
] | [
3
] |
[
"WHAT WE TREAT\nBites and Stings\nIn most cases, an insect bite or sting is no more than a minor irritation.\nYou might experience a bit of itchiness or pain, perhaps a bit of redness in the affected area, and it can likely be addressed with basic home remedies.\nHowever, it is possible for some people to have severe allergic reactions to certain bites or stings, which can prove fatal.\nSymptoms of Insect Bites or Stings\nAlthough life-threatening allergic reactions to bites and stings are very rare, you should be aware of the symptoms in case you are affected, since anaphylactic shock is a possibility.\nThese symptoms include:\nSwelling of lips, tongue, ears, eyelids, hands and feet\nDisorientation and confusion\nNausea or diarrhea\nReddening of a large area around the bite\nWho is at Risk for Bites and Stings?\nHikers, campers and others who spend a lot of time in forested areas are most susceptible to insect bites and stings, and geographic location may determine how likely you’ll be to encounter dangerous spiders, scorpions and the like.\nTreatment of Insect Bites and Stings\nApplying ice to a sting or bite can reduce swelling, while over-the-counter antihistamines and pain relievers can bring itch and pain relief. Topical analgesics can also help relieve itching.\nEmergency Warning Signs\nIf you have been bitten by a spider or insect and are experiencing any symptoms of anaphylactic shock listed above, seek immediate emergency assistance.\nIf this is a medical emergency, please call 911. For mental health emergencies, call 988."
] | [
"<urn:uuid:f80f4e5c-15bd-4ef9-a954-a52fd3e2be64>"
] | [
"CC-MAIN-2023-14"
] | [
"https://walmarthealthvirtualcare.com/conditions/bites-and-stings"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949107.48/warc/CC-MAIN-20230330070451-20230330100451-00141.warc.gz"
] | [
"en"
] | [
0.93072509765625
] | [
371
] | [
2.90625
] | [
3
] |
[
"Huntington’s disease (HD) is an inherited, relentlessly degenerative brain disorder with physical, cognitive and emotional symptoms. It affects both males and females and symptoms usually begin to appear between 30 and 50 years of age. Less commonly, HD may develop in youth (under 20 years – Juvenile HD) or older adults (Late Onset HD).\nHD is caused by a defective gene on chromosome 4 that causes an excessive build-up of the protein, ‘huntingtin’. This protein build-up damages nerve cells in parts of the brain, affecting neurological function and causing HD. Each child of a parent with the defective gene has a 50% chance of inheriting HD.\nIt was estimated in 1996 that the prevalence for HD in NSW is 7.3 people per 100,000 of the population. Those at 50% risk of inheriting the HD mutation are estimated at 25.2 per 100,000.\nBased on a population for NSW and ACT of 8,375,100 (ABS March 2018) this translates to:\n- 612 people with HD\n- 2,110 people at 50% risk.\nIn fact the prevalence is probably higher than this. New prevalence data are expected in the near future.\nCurrently, there is no definitive treatment or cure for HD. However, research has led to improvements in the management of symptoms. Research is being conducted worldwide to find effective treatments to delay the onset of HD and to slow its progression."
] | [
"<urn:uuid:be726bc2-42f6-4358-bdf5-5c4022e87513>"
] | [
"CC-MAIN-2023-06"
] | [
"https://huntingtonsnswact.org.au/resource/what-is-hd/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500619.96/warc/CC-MAIN-20230207134453-20230207164453-00090.warc.gz"
] | [
"en"
] | [
0.9547439217567444
] | [
302
] | [
3.859375
] | [
4
] |
[
"A national housing strategy is required to reduce and eventually end homelessness in Canada.\nIn Canada, we have 150,000 to 300,000 people who are visibly homeless, plus 450,000 to 900,000 people who are among the “hidden homeless.”\nThe homelessness crisis is about to get worse. In Canada, 365,000 low income households are at risk of losing their homes because the federal government refuses to renew subsidies for social housing. Meanwhile, the waiting list for social housing continues to grow: there are over 168,000 households on the waiting list in Ontario alone.\nIn 2009, Miloon Kothari, the UN Special Rapporteur on Housing, called the housing and homelessness crisis in Canada a “national emergency.” Homelessness costs the Canadian economy $7 billion annually (including emergency shelters, social services, healthcare and corrections). Yet, Canada remains the only G8 nation in the world without a national housing strategy, and our government continues to cut funding to housing and homelessness programs.\nWe are calling for the federal government to ensure that everyone has the right to secure, adequate and affordable housing. We need a rights-based national housing strategy that is adequately funded and is developed in consultation with all levels of government (including First Nations, Métis governments, and Inuit Land Claim Organizations), key community stakeholders, and individuals experiencing homelessness or living in precarious housing situations.\nMore details about what a national housing strategy must include can be found on page 22 of the Dignity for All National Anti-Poverty Plan."
] | [
"<urn:uuid:9d8c4bd8-1e8f-4476-a6e1-9e439020728f>"
] | [
"CC-MAIN-2020-05"
] | [
"https://righttohousing.wordpress.com/national-housing-strategy/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250613416.54/warc/CC-MAIN-20200123191130-20200123220130-00060.warc.gz"
] | [
"en"
] | [
0.9229762554168701
] | [
315
] | [
2.625
] | [
3
] |
[
"Research reveals Coca Cola and PepsiCo responsible for 25% of packaging pollution found on UK beaches\n· The UK’s biggest ever UK packaging pollution brand survey has found a small number of parent companies are responsible for the majority of packaging pollution found on UK beaches and rivers\n· Surfers Against Sewage has submitted the full data to government and calls for transparency from the UK’s biggest polluters to disclose the quantity of their plastic packaging production\n· Photos of the brand audit beach cleans available here:\nThe UK’s biggest ever nation-wide survey of packaging pollution found on UK beaches and rivers has revealed that the vast majority of UK waste found strewn across the coastline is the responsibility of just a handful of companies – with Coca Cola and PepsiCo named the worst offenders.\nThe figures, unveiled by ocean conservation charity Surfers Against Sewage, have been submitted to government as campaigners call for transparency from the UK’s ‘biggest packaging polluters’.\nIt follows the UK’s largest ever nation-wide survey of packaging pollution found on Britain’s beaches and rivers, conducted by more than 45,000 volunteers during SAS’s recent Big Spring Beach Clean series.\n· The full report is available here:\nThe results show that the vast majority of UK branded waste found strewn across the coastline is the responsibility of just a handful of parent companies, with 10 parent companies accounting for well over half the total number of items.\nDuring the 229 cleans in April, 49,413 pieces of pollution were picked up, of which 20,045 were branded, with Coca Cola producing the largest proportion of branded items (15.5 per cent). PepsiCo made 10.3 per cent, followed by Mondelez International, which owns Cadbury, at 6.8%, McDonalds 6 per cent and Nestle 5.5%.\nHugo Tagholm, Chief Executive of Surfers Against Sewage says: ‘Our survey of packaging pollution on beaches and rivers clearly shows that big business is responsible for the scourge of plastic and packaging pollution.\nJust ten companies were responsible for over half of the packaging pollution recorded. These companies must invest more in the redesign of packaging, alternative ways of product delivery and ramping up packaging re-use to truly turn the tide on the plastic pollution that is sweeping our world.\nPeople and planet need these companies to change how they do business. At the moment, the cost of this waste is left in the hands of local councils, tax payers and, finally, the environment.”\nThe research has been submitted to the UK government as evidence in the consultation underway on plastic packaging and Extended Producer Responsibility (EPR) in a bid to make producers (parent companies) take more responsibility for the costs of dealing with their packaging.\nUnder the present EPR guidelines, producers ‘that handle over 50 tonnes of packaging annually and have an annual turnover over £2 million’ should be accountable for the cost and system for dealing with the packaging they create and sell.\nBut, currently, parent companies do not share information on the quantity of packaging they produce, hiding the scale of their damage to the environment – and paying less than 10% of the costs of dealing with it. At the moment, the cost of dealing with this waste is left in the hands of local councils, tax payers and, finally, the environment. New EPR regulation will mean producers become accountable for 100% of these costs, but it is critical that there is transparency in regards to how much packaging is being produced, for new packaging responsibility regulation to be effective.\nHugo Tagholm said: “Producers must offer full transparency and disclosure on the amount and type of packaging they use in order that new extended producer regulation can be truly effective. Our environment is in peril and plastic pollution is a clear indicator that business as usual just won’t do.\n“This is not a littering issue – business needs to provide radical and responsible new systems that drastically reduce their impact on our oceans, forests and nature at large.\nThe analysis of the information collected was undertaken by independent environmental consultancy Eunomia Research & Consulting.\nFull information on the research and analysis methodology can be found here\nThe Top 10 Parent Companies (Branded Pollution Only)\nThe Top 10 Brands (Branded Pollution Only)\nDuring the analysis, research was divided into two levels; firstly, the brand of the product, and, secondly, the parent company who owns the brand.\nA total of 20,045 branded items were submitted over the course of the Big Spring Beach Clean campaign. 496 of the brands had only one or two items associated with them and were not mapped to their parent companies. The remaining 303 brands were mapped to a total of 171 parent companies, the top 50 of which accounted for 92% of the branded items.\nWhile using citizen science as a method of data collection allows us to amass large amounts of data in a cost-effective manner, the data collected has some limitations associated with it owing to the lack of oversight regarding how data are collected and recorded. Inconsistencies in the data gathering process are an accepted characteristic of citizen science projects, and these can introduce an unavoidable level of uncertainty to collected data.\nIn Defra’s guidance, packaging is defined as ‘any material used to hold, protect, handle, deliver and present goods. This includes packaging for raw materials right through to finished goods to be sold or being sold.’"
] | [
"<urn:uuid:2ce67adc-2b41-4984-8a7f-2862e2995d6f>"
] | [
"CC-MAIN-2023-06"
] | [
"https://www.carvemag.com/2019/05/coca-cola-and-pepsico-litter-leaders/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499634.11/warc/CC-MAIN-20230128121809-20230128151809-00211.warc.gz"
] | [
"en"
] | [
0.9520269632339478
] | [
1130
] | [
2.546875
] | [
3
] |
[
"The Florida Water Environment Assn. chose the Central Pasco County Beneficial Water Reuse Project, the 4G Wetlands, as its 2016 David W. York...\nBoth videos can be accessed on the Career Center page of NGWA’s website\nWith a projected shortage of 135,000 geoscientists expected to occur in the U.S. within the next 10 years, the National Ground Water Assn. (NGWA) is promoting two new videos spotlighting groundwater fields of study and careers to precollege and college students.\nA two-minute video primarily targets secondary school students interested in science and/or the outdoors. Groundwater Is Cool highlights the critical importance of groundwater as a freshwater resource for human use and the environment. It contains arresting statistics, fast-paced graphics, and music.\nThe second is a five-minute video targeting both precollege and college students, and includes interviews with students, professors, and professionals about the benefits of groundwater careers.\nBoth videos can be accessed on the Career Center page of NGWA’s website.\nThe projected shortage of geoscience professionals already is being felt in the groundwater industry, according to NGWA.\n“NGWA members have expressed concern about where the groundwater professionals of the future will come from. These videos are just a part of NGWA’s efforts to draw the world’s best and brightest students into groundwater careers of all kinds,” said NGWA CEO Kevin McCray, CAE.\nWhat concerns the groundwater industry presents opportunity for students.\n“There are lots of places in college where you can go to get a degree, but there are not so many places in college you can go to get a job. One of the real benefits of geology and hydrogeology—it’s a profession with a job attached to the end of it,” said interviewee Franklin Schwartz, Ph.D., a professor in hydrogeology at Ohio State University.\nNGWA encourages all groundwater stakeholders to share the videos with high schools and colleges, as well as other industry professionals."
] | [
"<urn:uuid:f5fa63b8-3cbf-4465-b653-4836bd90d2c2>"
] | [
"CC-MAIN-2017-26"
] | [
"https://www.wwdmag.com/education-training/videos-promote-groundwater-fields-study-careers"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320763.95/warc/CC-MAIN-20170626133830-20170626153830-00018.warc.gz"
] | [
"en"
] | [
0.9285891056060791
] | [
431
] | [
2.765625
] | [
3
] |
[
"What is an electrophysiology lab?\nAn electrophysiology lab is where procedures are performed to correct heart rhythm disorders.\nHeart rhythm disorders come in two main varieties, fast and slow. Either of these arrhythmias can be tested for with a procedure called an electrophysiologic study (EP Study). This involves putting small tubes into the heart (catheters) that can record electrical signals in the heart. They also allow for stimulation of the heart to see if arrhythmias can be induced. Depending on the findings of the EP study, your physician may recommend treatment with an implantable device (loop recorder, pacemaker, or defibrillator) or catheter ablation.\nCatheter ablation is a procedure which involves cauterizing or freezing abnormal parts of the heart that allow fast heart rhythms to continue. Arrhythmias that can be readily treated with catheter ablation include (but are not limited to) atrial fibrillation, atrial flutter, supraventricular tachycardia, and ventricular tachycardia.\nShould you have a slow rhythm, devices such as pacemakers can be implanted into the heart to help the heart go faster. At Mather, novel pacing technology is readily available including leadless pacemakers (where the entire pacemaker sits in the heart) and conduction system pacing (specialized pacing to help the heart beat more efficiently).\nImplantable cardioverter defibrillators can also be implanted in patients who are considered to be high risk for developing cardiac arrest. These are often implanted in patients who have a history of heart failure.\nAt Mather, there is a strong commitment to providing the safest and best treatment for cardiac conditions. The efficacy of treatment is only amplified by access to top notch tertiary and quaternary care centers throughout the Northwell network."
] | [
"<urn:uuid:10ad16e3-2857-43d0-b69a-b1f039fdde8b>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.matherhospital.org/care-treatment/cardiac-cath-lab-electrophysiology-lab/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950030.57/warc/CC-MAIN-20230401125552-20230401155552-00559.warc.gz"
] | [
"en"
] | [
0.9136422276496887
] | [
384
] | [
3.375
] | [
3
] |
[
"LevelSet measures the vertical distance from an origin called Base point to a feature, such as a slab and draws level marker with measured value.\nThere are some similarities between LevelSet and Autodesk® AutoCAD® Ordinate dimension. The main differences are:\n- LevelSet can contain more than one level.\n- LevelSet base point can be defined as any positive or negative number. Ordinate dimension origin point is always 0.00 (zero).\n- LevelSet level can be shown with the custom defined symbol.\nNote:LevelSet is anonymous block (block name begins with *U). It holds also not displayed attribute with tag “LevelSet”. You can set name for each LevelSet by using this attribute.\nSegments of LevelSet\nLevelSet can contain one or more Levels.\nEach Level is created with following elements:\n- Symbol (optional)\n- Leader (optional)\nSee screenshot LevelSetSegments for more details.\nModification of LevelSet\nEach Level can be modified by following grip points\n- Level base point\n- Level end point\n- Text (bottom-left justification) point\nThe location of LevelSet base point is displayed as two circles grip point. While holding the mouse at this point the defined value of the base point is displayed.\nSee screenshot LevelSetModification for more details.\nModification commands for LevelSet are also available in the context menu. The context menu is displayed when you do mouse right click while LevelSet is selected.\nPLEASE ADD OPNTIN MULTILEADER , (ARROW WITH TEXT),\nIN MY CASE I NEED ARROW WITH TEXT, SO I CAN MOVE TEXT.\nHOPE YOU UNDERSTAND SIR,\nWorks like it's supposed to do. Does cause the window selection to doubleclick sometimes.\nMuy buena Herramienta para colocar niveles en un plano, recomendado...\nHow to install it\nDlouho jsem hledal podobnou aplikaci pro výškové kóty. tahle je SUPER. Děkuji\nGreat work. Definitely the best plugin i have ever used. Simple, Useful and Powerful. Thank you.\numa excelente ferramenta, não sei porque este aplicativo não vem junto com o AutoCad, pois é muito útil para cotas de nível, parabéns!\nThis tool reduce time to design and check levels!\nIt is the best plugin, it can use very easy, and can set any form you want.\nDear Richard Stima It is posible to eliminate de \"LEVEL LINE\". I dont want to see that line. That line complicates my design. It starts from de reference pont to de text. It cross all my drawings. I prefer to eliminate. Thanks for your advice, I was using an old version, without that function. Now I'm up to date. Have a nice day.\nIn 'Lines and Symbol' tab turn 'Draw Line' off"
] | [
"<urn:uuid:8271fa6e-caf7-4dcf-9fb1-d53abcfa1d70>"
] | [
"CC-MAIN-2023-14"
] | [
"https://apps.autodesk.com/ACD/pt/Detail/Index?id=8340451895184896684&appLang=en&os=Win32_64"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949573.84/warc/CC-MAIN-20230331051439-20230331081439-00560.warc.gz"
] | [
"en"
] | [
0.7958732843399048
] | [
685
] | [
2.546875
] | [
3
] |
[
"What and how we plant, grow or eat today is the benefit of curious minds over the years committed to answer the “what if” question. Think about it! The ability to buy bread rather than make it; the availability of fruit and vegetables anytime from anywhere; and the technology, instruments or utensils to plant or serve food did not just happen. Inventions over the years have changed our lifestyles without us having to think about the person behind the creation. From farm to fork, pioneers in science, engineering, farming, food science and nutrition have made our lives easier when their lives were often not. Salute to our Black scientists over the years who sought to solve, not ignore, obstacles as their curious minds forever changed the way we eat.\nFrom healthy soil to food safety — with a few fun inventions in between — here’s a glimpse of the contributions by some of those curious minds:The Roots of Regenerative Agriculture — George Washington Carver is well known for his work on peanuts, but that was only a small part of his influence on agriculture. Maybe more importantly, Carver originated the core principles of regenerative agriculture. During his Tuskegee days, he observed the Southern soil was depleted of nutrients after years of repeatedly growing cotton. With a focus on improving the health of the soil and farmers’ financial well-being, Carver’s new ideas of farming were accepted. He introduced the idea of rotating between cotton and nitrogen-fixing crops like peas and legumes. He also developed the concept of cover crops; keeping soil covered between plantings. Carver’s commitment to help farmers also drove him to devote laboratory time to developing alternative uses for peas, sweet potatoes, soybeans and peanuts, discovering that these crops could produce flour, starches, sugars and non-food items such as dyes. Beyond these contributions to research, Carver pioneered new ways to bring education to the fields of the farmers and worked on improving the quality of life for financially strapped Southern farmers.1, 2\nManual Labor to Mechanical — Sustainable farming practices were the brainchild of George Washington Carver in the late 1800s, but Henry Blair helped the efficiency of farming earlier in the century with the invention of corn and cotton planters. The horse-drawn inventions allowed farmers to reduce the time to plant crops, improve corn and cotton yields, and control weeds. Blair’s lack of a formal education and his inability to read did not stop him from seeking solutions to problems. He was just the second African American to hold a U.S. patent.2\n“Fresh “Beyond the Backyard — Today’s availability of fresh fruit, vegetables and meats anytime from anywhere is the result of the mechanical skills and inquisitive mind of Frederick McKinley Jones in the early 1900s. Born in 1893, Jones’ early childhood challenges of being orphaned at age seven and quitting school in the sixth grade did not deter him. He found ways to hone his skills as an auto mechanic at an early age in his hometown of Cincinnati before moving to Hallock, Minnesota, at the age of 19 to work on a 50,000-acre farm. Jones served in World War I where his mechanical skills were discovered. From his continuous “on the job” education, his inventions flourished, leading to the creation of a range of items from sound equipment to air-conditioning. He holds 61 patents with the majority in refrigeration technology. His greatest contribution to our everyday life was the 1935 invention of an automatic refrigeration system for long distance land transportation, which was adapted over the years to planes and ships. He became the co-owner of The Thermo King Company and was the first African American to be awarded the National Medal of Technology and Innovation (posthumously).3, 4\nBread on the Shelf — Baking bread became a pandemic phenomenon but thanks to Joseph Lee, we normally do not have to rely on our own baking skills for our daily bread. Born in 1849, Lee’s long career in foodservice, from working in a bakery as a child to hotel management and master cook in his adult years, opened his eyes and curious mind to solving food waste and preparation problems. In 1895, Lee received a patent for a device that turned the previously tossed day-old bread to mechanically torn breadcrumbs. Seven years later, he invented an automatic bread making machine that changed the bakery world forever. His machine is the foundation for all modern-day bread makers and an invention that earned him two patents.3\nEven though biscuits are not a staple today, the invention of a spring-loaded biscuit cutter in 1875 by Alexander P. Ashbourne was a welcomed addition to any kitchen — large or small. The quality and quantity of biscuits were noted as a success and earned him a patent. That same year, Ashbourne also received a second patent for treating and refining coconut oil.5\nSweet Treats and Salty Snacks — From creating a better method to produce sugar to serving sweet treats like ice cream, the inquisitive minds of Black scientists in the 1800s met the challenge. Norbert Rillieux, born free in New Orleans and trained in France, is considered one of the earliest chemical engineers. Using his thermodynamics training, he invented an evaporator that produced a higher quality sugar from cane juice. His invention not only increased production efficiencies and reduced costs, but more importantly, improved the quality of life for workers.3\nAnd though small in size, we also need to recognize the ice cream scoop, which was invented by Alfred Craelle, the first African American in Pittsburgh to receive a patent.5\nIf you prefer salty snacks, you can thank George Crum for for creating the potato chip. Crum created the snack in the mid-1800s in Saratoga Springs, New York, at Moon’s Lake House.\nAccording to history (still disputed at times), the chips were created out of spite. When one of George’s customers kept complaining of his French fries being too thick, Crum sliced his potatoes paper thin and deep fried them. The result: satisfaction that has remained for centuries. 5, 6\nFood Safety — While other colleagues were developing equipment to preserve food, Lloyd Augustus Hall was creating food preservation techniques using natural occurring chemicals like sodium chloride (salt) and lecithin, which are still used today. Born in the late 1890s, Hall discovered that food spoilage could be prevented with the use of various sodium crystals and combinations, and lecithin was the catalyst to keep fats and oils stable and safe on the shelf. Hall also invented a vacuum chamber method to keep foods free from bacteria and molds. He is recognized as one of America’s top food scientists.3\nHeart Health — Food safety is the first step to healthy food but what we eat is the catalyst to our personal health. Marie Maynard Daly conducted early studies on heart health. Born in 1921 in New York, she was the first African American woman in the United States to receive a PhD in chemistry. However, her research on the effects of sugars and other nutrients on heart health, and the relationship of food and diet outweighed the significance of her degree. Her research was groundbreaking and served as a foundation for heart health research.3\nA Glimpse in History\nIt is often said that “It takes a village” to raise all of us. Reflecting on the contributions of the scientists highlighted above confirms that sentiment in my mind. From farming practices to food production, what we consider “routine” today is the result of curious minds from years ago; curious minds, that regardless of education level, ethnicity or economic status, sought to find ways that improved the lives of those around them. May we be reminded that the contributions of so many from different backgrounds allow us to enjoy a variety of safe and healthy foods across the globe.\n1. “Give Credit Where Credit is Due! George Washington Carver Understood Sustainability,” by Marianne Smith Edge, February 2, 2021.\n2. “Black History Month: These African Americans fueled farming,” AGDAILY, February 1, 2021.\n3. “8 Black Scientific Pioneers Who Forever Changed Food,” Institute of Food Technologists’ Brain Food Blog, February 15, 2021.\n4. Frederick McKinley Jones, Wikipedia.\n5. “7 African Americans who changed the way we cook and eat,” Caliplate.\n6. “George Crum, Inventor of the Potato Chip,” ThoughtCo., by Tuan C. Nguyen, Updated February 3, 2020.\nNote: For more insights on George Washington Carver read my February 2021 blog about him.\nGet The AgriNutrition Edge Report\nSubscribe here to receive practical and personal insights about current topics, regulations and studies about food across the value chain – from production to preparation"
] | [
"<urn:uuid:9fa17533-da1d-4e01-83cd-b147e0841383>"
] | [
"CC-MAIN-2023-14"
] | [
"https://agrinutritionedge.com/curious-minds-forever-changed-the-way-we-eat-salute-to-our-black-scientists/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950422.77/warc/CC-MAIN-20230402074255-20230402104255-00742.warc.gz"
] | [
"en"
] | [
0.968877911567688
] | [
1846
] | [
3.359375
] | [
3
] |
[
"AI has the potential to reveal detailed private information through embedded, mobile and wearable devices, advanced facial recognition and predictive analysis, leading to the questions of whether the current privacy and security standards can still protect and safeguard personal data, individual privacy and anonymity. The increasing security vulnerabilities will affect the application of AI technologies in a safe manner, in context of autonomous vehicles and drones, biomonitoring, healthcare robotics, or robots responsible for the maintenance of public order. As AI powered technologies can self-advance, leaving uncertainty in applying standard data protection principles of accountability, transparency, consent, control, how can we ensure that proper data privacy and data security measures and standards are in place. This session will aim to discuss and identify strategies to ensure that AI contributes to the global security and peace, protect individuals against unauthorized manipulation of AI algorithms and not create chaos.\n- Hongjiang ZhangHead ofBytedance Technical Strategy Research Center\n- Virginia DignumProfessor of Ethical & Social Artificial IntelligenceUmeå University\n- Drudeisha MadhubData Protection CommissionerPrime Minister's Office\n- Brian WittenSenior DirectorSymantec Research Labs (SRL) Worldwide\n- Frederike KaltheunerPolicy OfficerPrivacy International\n- Konstantinos KarachaliosManaging DirectorIEEE Standards Association\n- Mark LatoneroLead researcher for the Data & Human Rights programData & Society\n- Sean McGregorTechnical LeadXPRIZE Foundation\nAlgorithm-based machines increasingly learn from and autonomously interact with their environments, thereby developing unexplainable forms of decision making. In many ways this is just as much as a new frontier for ethics and risk assessment as it is for emerging technologies of AI. Should AI be able to make life-and-death decisions, for example, in deciding how autonomous vehicles behave in the moments preceding a crash? Where does the liability rest for harm caused by AI ? How can we avoid the biases in decision-making by AI, causing inequalities and discrimination? How can we ensure that a world of increasingly pro-active computing remains human-centered, protecting human identity and dignity? This session will discuss the challenges of today's world posed by the use of AI and will aim to identify possible solutions that can ensure that the design and operation of AI is at minimum characterized by accountability and respect for human rights and purpose?\n- Luka OmladicLecturer and researcher at Philosophy DepartmentUniversity of Ljubljana\n- Lorna McGregorDirectorHuman Rights Centre\n- Francesca RossiIBM FellowIBM T.J. Watson Research Lab\n- Wendell WallachChair, Technology and Ethics Research GroupYale Interdisciplinary Center for Bioethics\n- Chinmayi ArunResearch DirectorCentre for Communication Governance\nAI will eventually be capable of performing not just routine tasks but also the functions of doctors, lawyers, engineers and other professions reliant on expert judgement and specialized qualifications. How will AI's augmentation of jobs, elimination of jobs affect the quality of life enjoyed by human beings? Will AI's increasing influence on production processes reduce tax revenues to the detriment of social welfare systems, and is it time to revisit the concept of social welfare spending as more and more people hand over their jobs to machines?\n- Barmak HeshmatPI Research ScientistMassachusetts Institute of Technology (MIT)\n- Ekkehard ErnstChief of the Macroeconomic Policies and Jobs UnitInternational Justice MissionInternational Labour Organization (ILO)\n- Irmgard NüblerSenior Economist in the Research DepartmentInternational Labour Organisation (ILO)\n- Olga MemedovicChief, Europe and Central Asia BureauUNIDO\n- Ratika JainExecutive DirectorManufacturing, Confederation of Indian Industry (CII)\n- Manuela VelosoHerbert A. Simon University ProfessorSchool of Computer Science at Carnegie Mellon University\n- Plamen DimitrovPresidentConfederation of Independent Trade Unions of Bulgaria\n- Stuart RussellProfessor of Computer Science at University of California, Berkeley, Author 'Human Compatible: Artificial Intelligence and the Problem of Control'UC-Berkeley\n- Alexandre CadainCo-Founder & CEOANIMA\nAI technology is enabling a wide range of new ways for humans and machines to interact, from intelligent and autonomous robots to smart spaces to natural language and even physical and cognitive human augmentation. These technologies, if well-deployed, can have enormous social impact, supporting independence, economic development and engagement, and cultural diversity. What are the most promising potential applications of novel human-machine interaction in the coming five to ten years, focusing on applications that can support disadvantaged individuals and communities? And what are the associated risks of these technologies and the steps that developers, communities, and governments may need to take to regulate them to ensure that their good outweighs adverse impacts?"
] | [
"<urn:uuid:41273285-972a-4374-b36a-fcb9be940b00>"
] | [
"CC-MAIN-2023-06"
] | [
"https://aiforgood.itu.int/event/%E2%80%8Bbreakthrough-groups-on-privacy-and-ethics/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499713.50/warc/CC-MAIN-20230129112153-20230129142153-00051.warc.gz"
] | [
"en"
] | [
0.8737744688987732
] | [
975
] | [
2.609375
] | [
3
] |
[
"Over the past two decades, concern about the threat posed by biological weapons has grown. Biowarfare is not new. But prior to the recent trend, the threat largely centered on state use of such weapons. What changed with the end of the Cold War was the growing apprehension that materials and knowledge would proliferate beyond industrialized states’ control, and that “rogue states” or nonstate actors would acquire and use biological weapons. Accordingly, in 1993 senators Samuel Nunn, Richard Lugar, and Pete Dominici expanded the Cooperative Threat Reduction Program to assist the former Soviet republics in securing biological agents and weapons knowledge. The Defense Against Weapons of Mass Destruction Act gave the Pentagon lead agency responsibility. Senator Lugar explained, “[B]iological weapons, materials, and know-how are now more available to terrorists and rogue nations than at any other time in our history.” The United States was not equipped to manage the crisis.\nThe actual acquisition of unconventional weapons by nonstate actors augmented concern. In 1984, for instance, the Rajneesh cult in Oregon sought to prevent the local community from being able to vote against its land development plans. The group contaminated local salad bars with Salmonella typhimurium, infecting 751 people. In 1995 Aum Shinrikyo released a sarin nerve gas attack on the Tokyo subway, killing twelve people. And in 1998 an American citizen, Larry Wayne Harris, obtained plague and anthrax (a vaccine strain) and isolated several other dangerous bacteria. His aim was to disseminate biological agents on U.S. soil, using a cropduster, to alert the U.S. government to the Iraqi biological weapons threat, and to create a separate homeland for whites.\nThese and similar incidents pointed to an alarming trend: from previously a dozen or so investigations per year, in 1997, the FBI opened 74 investigations related to the possible acquisition and use of chemical, biological, radiological, or nuclear materials. The following year, it investigated 181 possible incidents. Eighty percent of the cases turned out to be hoaxes, but a significant number represented unsuccessful attacks. By January 31, 1999, Monterey Institute for International Studies had compiled an open-source data base of 415 such incidents—most of which occurred toward the end of the twentieth century—where terrorists had sought to acquire or use weapons of mass destruction.\nLaura K. Donohue, Pandemic Disease, Biological Weapons, and War in LAW AND WAR: (Sarat, Austin, Douglas, Lawrence, and Umphrey, Martha Merrill, eds., Stanford University Press, 2014)\nScholarly Commons Citation\nDonohue, Laura K., \"Pandemic Disease, Biological Weapons, and War\" (2014). Georgetown Law Faculty Publications and Other Works. 1296."
] | [
"<urn:uuid:6be07886-6bfc-40bd-9784-ac5c69cc3948>"
] | [
"CC-MAIN-2023-06"
] | [
"https://scholarship.law.georgetown.edu/facpub/1296/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500294.64/warc/CC-MAIN-20230205224620-20230206014620-00661.warc.gz"
] | [
"en"
] | [
0.9131295680999756
] | [
609
] | [
2.734375
] | [
3
] |
[
"What is Pancreatitis?\nTable Of Content:\n- What is Pancreatitis?\n- Pancreatitis Types\n- What Causes Pancreatitis?\n- Pancreatitis Symptoms\n- Pancreatitis Diagnosis\n- Pancreatitis Treatment\n- Analgesic medications\n- Intravenous nutrition\n- Limiting oral intake\n- Pancreatitis Prognosis\n- Pancreatitis Complications\n- Pancreatitis in Dogs\n- Gallstone Pancreatitis\n- Pancreatitis in Cats\n- Necrotizing Pancreatitis\n- Alcoholic Pancreatitis\n- Hemorrhagic Pancreatitis\n- Can Pancreatitis Cause Cancer?\n- Hereditary Pancreatitis\n- Pancreatitis Diet\n- Pancreatitis in Children\nIt is a condition that leads to swelling of the pancreas, a gland that can be found in a position that is posterior to the stomach. It is the pancreas that releases the hormones glucagon and insulin as well as the digestive enzymes which help humans absorb and digest foods.Picture 1 – Pancreatitis\nSource – animalhealthcare.com\nThere can be various types of Pancreatitis. These are\nIt is a pancreatic inflammation that is persistent and fails to heal or improve over time. It often results in permanent damage of the pancreas. It is mostly a result of alcohol abuse.\nIt refers to a sudden inflammation of the pancreas. Alcohol abuse is supposed to be the main cause of this condition though genetic factors are also held partly responsible.\nIt is an abnormal sac that forms within the abdomen and consists of fluids, pancreatic enzymes, blood and pancreatic tissues. These usually arise after an episode of Acute Pancreatitis. It is basically a collection of secretions from the Pancreas that has been surrounded by swollen tissues and scars. These sacs may get ruptured, infected and suffer from Hemorrhage. Such Pseudocysts may give rise to pain and obstruct structures like the bile duct, thereby giving rise to jaundice. The sacs may even migrate around the abdominal area.\nIt is a pus-filled cavity that develops inside the pancreas. It is generally a result of infected Pancreatic Pseudocysts.\nWhat Causes Pancreatitis?\nThis condition is mostly found to be a result of alcohol abuse over a long period of time. Heredity is also believed to be a causative factor in certain cases. In the United States, approximately 70% cases of this disease are found to be a result of alcohol abuse and alcoholism.\nSome other possible causes of Pancreatitis are\n- Autoimmune Disorders\n- Use of steroids\n- Scorpion sting\n- Medicines, such as diuretics and azathioprine\n- Endoscopic Retrograde Cholangiopancreatography (ERCP)\n- Idiopathic Diseases (disorders arising from unknown causes)\n- Infection of the pancreas by Coxsackie virus\nIf these factors are ruled out, however, further tests may be required to be performed to find out the cause.\nThis condition is mainly characterized by severe pain and tenderness in the upper abdomen. Vomiting (Emesis) and Nausea are other prominent signs of Pancreatitis.\nSome of the main symptoms of Pancreatitis are\n- Fatty stools\n- Clammy skin\n- Mild jaundice\n- Loss of weight\nPatients of this condition are also typically seen to suffer from other discomforting symptoms like elevated respiratory and heart rates. There may also be bowel sounds in some patients.\nThe diagnosis of this disorder is performed with the aid of laboratory tests and imaging studies. Medical examinations performed in the laboratory for this condition involve\n- Abdominal X-Rays\n- Urine tests\n- Blood tests\nLaboratory examinations often involve determining the level of Lipase and Amylase. In acute cases of Pancreatitis, measurement of both enzymes may be carried out. The Phadebas Amylase Test was once used as a dominant method for testing this disease. However, it is no longer a dominant method for testing.\nImaging studies that are performed for this disease includes\n- Abdominal Ultrasound\n- CT scan of the abdomen\nThe treatment for this syndrome is mainly supportive. Cure usually depends on the severity and the type of the condition. However, certain general ways of treatment are\nAnalgesics or pain relieving medications are used when affected individuals suffer from severe aches in their abdomen. Earlier, Meperidine (Demerol) was the preferred drug for curing this disease. However, Meperidine has been found to have high toxic properties and low analgesic characteristics. Morphine is the medicine of choice these days.\nHigh abdominal pain and tenderness makes it difficult to have food. In such cases, salts and fluids are administered to patients in an intravenous manner.\nLimiting oral intake\nIt is important to limit oral ingestion of foods in patients of this condition. It is also important to restrict intake of foods that are rich in fat component. However, recent studies have shown that time for recovery can be shorter oral feeding is resumed more quickly. It can also lead to fewer complications.\nPancreatitis patients need to be constantly monitored and cared after to evade complications in later stages. If gallstone formation leads to this condition, Endoscopic Retrograde Cholangiopancreatography (ERCP ) should be used for cure. In case of acute hemorrhagic pancreatitis, antibiotic medications should be administered to sufferers.\nVarious Scoring Systems can help in predicting the intensity of an attack of this condition. The prognosis of this disease actually depends on the type of the disorder.\nSome of the most severe complications of this disease involve\n- Hypocalcemia (Low calcium level in bloodstream)\n- High amount of glucose in blood\nRespiratory complications are a common complication of this disease. It leads to the death of many sufferers of this condition. Plural Effusion is evident to some degree in almost all patients of this disorder. The pain in abdomen results in shallow breathing which leads to partial or total collapse of the lungs.\nFrequently, the lungs are damaged by pancreatic enzymes. This gives rise to a complicated condition known as Pneumonitis which leads to swelling of the lungs. Pneumonitis may also arise as some condition that results in the obstruction of the airways such as Acute Respiratory Distress Syndrome (ARDS).\nSystemic Inflammatory Response Syndrome (SIRS) may also ensue in some cases. The condition also results in an infection of the swollen pancreatic bed at any period when the disease is present.\nLate complications of this condition involve recurring cases of Pancreatitis and the growth of Pancreatic Pseudocysts.\nPancreatitis in Dogs\nThis condition is commonly seen in dogs. The disease shows no predisposition towards sex, age or breed of dogs. Canines suffer from two main types of Pancreatitis – Acute and Hemorrhagic. Acute Pancreatitis leads to inflammation of the pancreas that allows spillage of digestive enzymes into the abdominal cavity. It may also lead to secondary damage to the surrounding organs like the bile ducts, intestines, gall bladder and the liver.\nCommon symptoms of this disorder in dogs involve fever, vomiting, abdominal pain, nausea and diarrhea. In case of a acute attack, depression, severe shock and even death may also happen.\nIn dogs, the disease is diagnosed with the aid of laboratory tests, ultrasound examination and radiographs (X-Rays). Laboratory examination usually reveals an increase in the amount of white blood cells in the body of the dog. There is also a rise in pancreatic enzymes in the bloodstream due to Canine Pancreatitis. Ultrasound examinations and Radiographs may also be helpful in detecting swollen areas within the pancreas.\nThis is a type of Pancreatitis caused by formation of stones in the gall bladder. Over 20 million adults in the United States have gallstones. However, only 1- 4% of such affected individuals suffer from signs of gallstone disease. Only 5 percent of these patients develop Pancreatitis. It is, thus, a rare condition.\nGallstones are formed of a combination of crystallized deposits of cholesterol or crystals of calcium that are ionized with Bilirubin. Such stones can obstruct bile flow from the gallbladder. This is generally demonstrated as aches in the upper right quarter of the abdominal area. Gallstone pancreatitis arises when a migrating gallstone blocks the ampulla (dilated part) of Vater.\nPancreatitis in Cats\nPancreatitis arising in cats is of lower intensity than the variation which occurs in dogs. Cats with this condition display symptoms like, dehydration, lethargy, weight loss and loss of appetite. Less than 50% cats with this disorder suffer from abdominal pain and vomiting. In some cases of Feline Pancreatitis, jaundice, elevated heart rate and changes in respiratory patterns may also be seen.\nThe condition is diagnosed in cats with the help of Urinalysis, Chemistry Panel and Complete Blood Count (CBC). A biopsy may lead to a conclusive diagnosis. The disease is generally treated with oral medications, appetite stimulants, Pancreatic Digestive Enzyme supplements and Vitamin B12 injections. Small, digestible foods that are low in fat content are also fed to suffering cats.\nIt is the name given to a very severe case of the condition. In this condition, bleeding increases in the abdomen and the tissues located within the pancreas begin to die. Abdominal bleeding gives rise to two different signs. These are\nIt is a greenish brown or reddish purple color in the flank region.\nIt is indicated by a bluish color in the region surrounding the navel.\nIt is a type of pancreatic inflammation caused by consumption of alcohol for many years. It usually arises in men who are about forty years old. Early symptoms of this condition involve vomiting and severe abdominal pain in upper abdominal area and also the back. One can get relief from such painful symptoms by leaning forward.\nThe pain may remain for 2 to 3 days in mild cases of this disease. The short-term prognosis is very good in such cases However, the pain may last for several weeks in acute cases and the risk of death increases to approximately 30 percent. Pancreatitis can be entirely free of pain in rare cases and can only be diagnosed from signs of insufficient pancreatic function, like Steatorrhea (excessive fat in stool) and diabetes.\nIt is a severe case of Pancreatitis that is very fatal in nature. Substantial immunosuppressive Therapy is needed for patients of this disorder. Acute cases of this disease are the result of problems in the pancreas due to autolysis of various tissues.\nThis condition is usually the result of factors like\n- Fatty necrosis\n- Overconsumption of alcohol\n- Pancreatic cancer\nBleeding disorders such as Gastrointestinal Bleeding, Rectal Bleeding, Digestive Bleeding and also bruising can lead to this condition. The presence of this disease is indicated by symptoms like\n- Weak pulse rate\n- Abdominal tenderness\nThis is a very severe disease that needs to be treated and monitored in time. Delay in cure can put the life of the sufferers at risk. If not treated in time, death of sufferers may be unavoidable.\nCan Pancreatitis Cause Cancer?\nChronic cases of this condition have been associated with cancer of the Pancreas. However, this condition has not been directly reported as a cause of Pancreatic Cancer. However, people with this condition in their family have been found to be at higher risk of suffering from this condition.\nThis is a variation of Pancreatitis that is genetic in nature and affects production of enzymes in the pancreas. This condition is caused by the activation of the abnormal Trypsinogen that leads to the damage of the pancreas from within.\nThe symptoms of this disease are similar to that of Acute Pancreatitis which is marked by constipation, vomiting and acute abdominal pain. There is no known cure for this disease. However complications like malnutrition can be cured with the aid of Supplementary Pancreatic Enzymes.\nIn the United States, approximately 1000 individuals suffer from this condition on an annual basis.\nThe diet of Pancreatitis patients should consist of low fat foods. Consumption of fatty foods can supply large amounts of fat to the bloodstream which triggers conditions such as Pancreatitis. Fat content should not be more than thirty percent of the total calorie intake of the body.\nBreakfast can involve fruits, yoghurt and honey. Lunch can include cheese sandwiches while grilled fishes can be incorporated in the diet for dinner. A best diet for Pancreatitis should be a low carbohydrate plan.\nPancreatitis in Children\nAcute types of this condition are relatively rare in children. Chronic variety of this disorder is even rarer. However, acute types of this disease usually result from a viral infection, abdominal injury or side effects of drugs. Classic symptoms of the condition include nausea, vomiting and abdominal pain. Fortunately, the condition resolves in a few days or weeks although treatment and hospital stay is required during this period."
] | [
"<urn:uuid:b02a8931-af75-4a41-8062-d6a75a09945e>"
] | [
"CC-MAIN-2023-06"
] | [
"https://www.hxbenefit.com/pancreatitis.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499967.46/warc/CC-MAIN-20230202070522-20230202100522-00396.warc.gz"
] | [
"en"
] | [
0.9342604279518127
] | [
2978
] | [
3.15625
] | [
3
] |
[
"The cornea is an amazing tissue that is clear as glass, but is indeed a living tissue. It allows light to enter the eye, which permits the horse to see. The cornea is approximately 1.5mm thick, which is approximately the thickness of a penny. The cornea is exposed to all the elements of our environment and therefore serves as a protective cover, shielding the eye from bacteria and infection.\nThere are three primary layers to the cornea; the outer layer or epithelium, stroma (the middle, thickest layer), and the endothelium (the interior layer). When the epithelium is scratched or punctured it allows bacteria or fungi access to the inner layers of the cornea. Bacteria and fungi can thrive in this environment and once established can result in the loss of an eye. All of this the result from a minor scratch that breaks the outer barrier, the epithelium, and disease can then set in.\nCorneal ulcers can sometimes be seen with the naked eye but ulceration is positively diagnosed using special ophthalmic stains. A healthy cornea is smooth and nonporous and stains will slide off the cornea. When the outer layer of the cornea is breached or damaged, it exposes the stroma (the middle layer of the cornea). The Stroma is porous and the stain will adhere to it, exposing the damage. The fluorescein stain strip is orange but the stain on the eye will be bright green. We also use a Rose Bengal stain, which is a deep red color. This stain will not stick to the cornea if the tear film is normal and well adhered to the cornea. The tear film is critical to the health of the eye and an abnormal tear film will seriously compromise an ulcers ability to heal. Again, be aware that any size ulcer in the eye is a serious situation and you should seek immediate medical attention. Prompt treatment could save your horse’s eyesight or eye.\nCatching corneal ulcers early improves the changes of your horse keeping its eyesight or even the eye itself. Recognizing the signs your horse’s eye is in pain and seeking the help of a professional gives both you and your horse options that might not otherwise be available."
] | [
"<urn:uuid:7dfca2c8-e127-4770-944e-4f8baa2e542b>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.midriversequine.com/understanding-corneal-ulcers-with-dr-tim-ellis/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945372.38/warc/CC-MAIN-20230325191930-20230325221930-00341.warc.gz"
] | [
"en"
] | [
0.9283057451248169
] | [
468
] | [
3.171875
] | [
3
] |
[
"Baby Steps to Healthy Weight: Positive Steps for Families\nWeight problems are a reality for many families — and not just the adults. One area of concern is the growing population of preschoolers who struggle with weight problems. According to the Centers for Disease Control and Prevention (CDC), almost 15 percent of toddlers and preschoolers aged 2–5 years are considered obese (defined as a BMI greater than the 95th percentile).\nTo help young children grow into healthy adults, it’s all about prevention and taking baby steps to a healthy weight. This means no crash diets, no intensive exercise for the two-year-old, and no interference with healthy growth and development. So, how can parents help their young ones achieve a healthy weight and maintain it? This series of articles will help you identify questions and solutions to promote healthy weight in your preschool-age children, answering questions like:\nMealtime structure: How often do toddlers and preschoolers need to eat and why? Where should they eat and what should you be cautious about? We’ll answer these questions and more!\nFruits and veggies: How many fruits and vegetables do little ones need? How do you fit it all in, especially vegetables? We’ll show you some creative ways to help all young children partake in fruits and veggies.\nWhole grains: With so many refined grains available today, what is the right balance to strike and how much fiber do children really need?\nHealthy fats: You can have an impact on lifetime health just by the types of fat you have in your home! This article shows you how to maximize healthy fats and minimize the unhealthy ones.\nDairy foods: How much milk (or milk substitute) does your toddler need, and how much is too much? When should you transition to lower fat milk? These are the burning questions, and we’ve got the answers!\nProtein sources: Serving a variety of protein sources is important (especially fish and beans), but what if you have a little one who doesn’t like meat? How much protein does a young child really need? We’ll help you figure this out.\nManaging junk food: This will be a growing concern as your little one goes out into the world. What is the most effective way to manage these foods? Should treat foods be allowed, and if so, when? How do you know when enough is enough?\nBaby at the table: When should baby come to the table? When is it time to start solid foods, and what do you need to know about the benefits and drawbacks?\nActivity: Should your baby, toddler, and preschooler be exercising? What does this look like? We’ll show you how playtime is a way to make sure young children are active, including ideas to keep it fun and engaging.\nPowered by Bundoo®"
] | [
"<urn:uuid:b35be2c3-52ef-4558-8dbb-509e04648d65>"
] | [
"CC-MAIN-2023-14"
] | [
"https://nabtahealth.com/articles/baby-steps-to-healthy-weight-positive-steps-for-families/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949331.26/warc/CC-MAIN-20230330132508-20230330162508-00545.warc.gz"
] | [
"en"
] | [
0.955665111541748
] | [
586
] | [
3.484375
] | [
3
] |
[
"Over 20 million people suffer from vision loss across the United States, according to the American Foundation for the Blind. There are as many as 150 different causes of vision loss, including glaucoma, cataracts, other eye disorders, and advanced age. These conditions can simply require the person to wear classes or be as severe as cause them to be classified a legally blind.\nThe Social Security Administration (SSA) has many assistance programs, including offering financial aid to those suffering from a disability, such as vision loss. If you or a loved one is unable to work due to vision impairment, the SSA may be able to help.\nThe Financial Costs of Vision Loss\nVision problems or blindness are some of the most expensive chronic conditions, with Americans paying on average about $7,000 each year in treatment and management costs, Prevent Blindness reported. However, the expenses can easily rise to $10,000 or more depending on the actual debilitating condition.\nThe directs expenses include medical vision aids, other medical devices, education or school screening, costs of diagnosed disorders, and undiagnosed vision loss. According to Prevent Blindness, senior citizens consistently suffer the heaviest cost burden. Indirect costs include productivity loss at work and expenses for nursing homes and other assisted care. They account for about half of all costs.\nIn total, the United States spends almost $140 billion dollars countrywide on vision complications, which is more than double of the cost ten years ago. Just over $70 million of these costs are out paid out of pocket, with government assistance and insurance covering the remaining half.\nMedically Qualifying for Benefits with the Blue Book\nThe Blue Book is the SSA’s official published list of impairments. It includes all of the conditions and the SSA recognizes as disabilities and the required severity of each condition. The SSA uses the Blue Book to evaluate every application for benefits it receives.\nVision loss can be found under Section 2.00—Special Senses and Speech.\nIn order to qualify for benefits via the Blue Book, you need meet or equal the following requirements:\n- The central vision clarity in your best eye is 20/200 or less despite corrective measures, such as glasses or surgery.\n- Your visual field, which would normally be 30 degrees of vision and central fixation, and extend100 degrees to the sides, 60 degrees to the middle, 60 degrees upward, and 75 degrees downward, is contracted due to one or more of the following:\n- A. The widest diameter extending under the angle around the point of fixation is 20 degrees or less.\n- B. The total amount of vision loss (the mean devotion or defect or MD) is 22 decibels (dB) or higher.\n- C. Your visual field efficiency, which is the combination of visual clarity and visual field, is 20 percent or less, despite corrective measures.\n- Your visual impairment value is greater than 1.00 in your better eye after corrective measures. Your visual impairment is calculated using the measurement for your central vision clarity for distance and your MD measurement, both in your better eye.\nThe technical qualification for vision loss is confusing for applicants who are not legally blind. For more information on the vision calculations or if your vision loss is severe enough to interfere with your ability to work, talk to your doctor about applying for disability benefits.\nQualifying Without Meeting a Medical Listing\nIf you or your loved one doesn’t meet the SSA’s Blue Book requirements for vision loss, you can still apply for benefits. If your vision loss is severe enough that you can’t work a full time job, then you may be eligible for disability benefits through your Residual Functioning Capacity (RFC).\nYour RFC is the SSA’s measure of your physical and mental ability to perform substantial gainful activity, which, in 2023, is considered to be work that earns at least $2,460 per month for the blind and $1,470 per month for any other applicants. To qualify for disability, your disability needs to be expected to last for at least 12 months, though if improvement isn’t likely, as often happens with vision loss, your chances of approval will be higher and the SSA will review your case less often.\nThe SSA classifies five levels of work: sedentary, light, medium, heavy, and very heavy, though generally, disability isn’t offered to those who can do heavy or very heavy work. Looking at the severity of your vision loss, they put in a category of work ability. Next, the SSA will look at your work history, age, education level, and skills to evaluate the jobs, if any, that are available in your work level. The rules the SSA follows for these calculations are called grid rules.\nThe grid rules only apply to claimants 45 years and older, but it’s possible for younger Americans to be approved in more severe cases. Though vision loss affects all aspects of your vision, such as central vision, focus points, peripheral vision, depth perception and more, the amount of jobs available ultimately depends on your education level. Many jobs, both sedentary and active, you may not be able to perform. No matter your age, your must show all the limitations your vision loss causes you, whether it be at work, at home, or other daily living activities.\nMany positions can be accommodated for those with failing vision, but many positions also rely on eyesight. Those who worked in fields required a lot of physical work or where sight was crucial, such as medical, construction, scientific research, manual labor, driving, or food service, you will have higher chance of approval that applicants with experience in jobs in education, administration, or law. However, because vision loss can be a hard adjustment for anyone, approval is likely in serious cases.\nHow to Apply for Social Security Disability Benefits\nIf you’re approved for disability benefits, you can start receiving benefits five months after your reported onset date. However, many application approvals take up to two years, so you need to decide if applying for disability is right for you. Before starting the process, you should talk to your doctor or consult with a disability lawyer about your likelihood of getting approved either through the Blue Book or an RFC.\nIf you do chose to apply, there will be a lot of medical evidence you need to include in your application. The more information you submit in your initial claim, the higher your chances of getting a quick approval.\nNecessary medical evidence will include:\n- An automated static threshold perimetry test, which measures your mean deviation. A normal dB would be between 0 and -2, and worsening vision is shown in decreasing negative numbers; however, the SSA uses the absolute value, so a normal dB rating to the SSA would be between 0 and 2.\n- A kinetic perimetry test, which measures your ability to recognize objects.\n- Snellen test, which measures what you can see from 20 feet with your best-corrected visual clarity. The SSA may also accept similar tests with comparable testing charts, like the Bailey-Love.\n- Other tests that measure the central fixation of your visual field including the Humphrey Field Analyzer (HFA) 30-2, HFA 24-2, and the Octopus 32. The SSA accepts all of these exams when determining statutory blindness.\nOther important medical evidence will include:\n- Results from any other tests performed related to your vision loss.\n- Detailed reports from your primary care doctor describing your physical limitations.\n- The cause of your visions loss, and any other disabilities caused by those conditions unrelated to vision loss.\n- Records of all hospitalizations and doctor’s visits due to your vision loss.\n- History, length, and outcomes of all prescribed treatments and/or corrective measures.\nEven if you meet the SSA Blue Book listing or grid requirements in an RFC claim, if you don’t submit all of the information needed, including personal identical information, tax reports, and medical evidence, you may be denied or your claim may take longer. A full list of materials needed for the application can be found on the SSA’s website. Make sure to double-check the application for any errors or unanswered questions as well.\nIf your condition worsens after your initial application has been submitted, you can still send additional information. In fact, it’s crucial that you send any updates, like new tests results, hospitalizations, or doctor’s evaluations to the SSA immediately after receiving them, as they can influence the SSA’s decision on your case.\nYour spouse and children may also be able to collect benefits if you’re approved. To learn more about the different types of disability assistance the SSA offers, visit our pages on Social Security Disability Insurance and Supplemental Security Income."
] | [
"<urn:uuid:218b35f3-22e1-47c2-aa8d-578151138683>"
] | [
"CC-MAIN-2023-06"
] | [
"https://www.disabilitybenefitscenter.org/social-security-disabling-conditions/vision-loss"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764495012.84/warc/CC-MAIN-20230127195946-20230127225946-00603.warc.gz"
] | [
"en"
] | [
0.9433296322822571
] | [
1833
] | [
2.84375
] | [
3
] |
[
"Shiva in yogic tradition is known by many names. In some tradition of yoga, Shiva is known as Adi Yogi – the first yogi who’s the ultimate source of strength.\nShiva taught many practices in yoga that a seeker can use to gain or accumulate the whole power of the body in one place. Sometimes these practices are practiced in the form of yoga asana, sometimes in Pranayama, but the easiest method among all is mudras of yoga.\nHere one such mudra of yoga is Rudra mudra, that is known to build element of fire & earth within the body. Thus increase the overall strength of the body.\nRudra Mudra: The Gesture of Strength\nRudra Mudra is a powerful healing mudra that gives a lot of energy to the body.\nBasically, the most dominant element in the human body is the Earth element. This element is the source of strength in the body. This mudra increases the earth element in the body. It results in a healthy, strengthen, and energetic body.\nRudra mudra constructs by a connection of the thumb (fire element) index finger (air element) and ring finger (earth element). This connection leads to the powerful combination of fire, air and earth element in our bodies. Thus, this mudra keeps us mentally fit and physically fit.\nRudra Mudra is the ruler of the third chakra (fire center)) in our body. As it rules the fire center in the body, the practice of this mudra enables the ultimate inner strengths of our body therefore this mudra is also called “The gesture of strength“.\nThis mudra is also performed by many yogis to stimulate solar plexus and to gain their strength & self-control.\nMeaning of Rudra Mudra\nThe word Rudra mudra is a Sanskrit word. Here ‘Rudra‘ means ‘howler‘ or ‘terror‘ and ‘mudra‘ means ‘seal‘ or ‘gesture‘. In Rigveda, the word Rudra is praised as “Mightiest of the mighty“.Rudra is the name of Hindu lord “Shiva” who is known for his destructive power cause of the excessive fire. As this hand gesture works on fire element in the body, it’s known by a synonym of Shiva that is Rudra.\nHow to Perform Rudra Mudra\nRudra mudra includes movement of the index finger, thumb, and ring finger. To do this mudra, all you need to do is touch the tips of the index finger and ring finger, with the tip of the thumb. Leave the rest two fingers extended.\nTo perform it, you need to follow the following steps.\n- First, sit in any comfortable yoga asana, such as Padmasana (lotus position) or Vajrayana (thunderbolt pose). If you are not comfortable to sit, you can practise it standing.\n- Now, close your eyes and focus on the ‘in and out’ movement of the breath. This will help you generate awareness.\n- Fold your index and ring fingers towards the thumb.\n- Now touch the tips of index fingers and ring fingers with the thumb.\n- Leave the remaining two fingers extended as much as possible.\n- Do this with both hands.\n- Now, without disturbing the posture of fingers, place both your hands on upper thighs.\n- For better concentration, chant Ram (pronounced Rahm).\nWhat Is the Ideal Time to Do Rudra Mudra\nThere is no ideal time to perform Rudra Mudra, but it is always better to perform it in the morning time. You can concentrate better with a fresh mind in the morning.\nYou should perform Rudra Mudra more than 20 minutes a day. You can also do it six times a day for 5 minutes.\nResearch suggests performing a mudra for more than 20 minutes gives the best results.\nPrecautions to Take\nYou need to take the following precautions for better and safe results.\n- Keep the spine straight for better flow of prana.\n- Wear comfortable clothes. You will feel hard to concentrate with uncomfortable clothes.\n- Don’t press the fingers hard. Touch them gently.\n- If you wanna concentrate better, perform this mudra in a quiet place.\n- If you have Kapha excess, practice this mudra moderately.\nHow does Rudra Mudra Works\nTo control and avoid all type of tense states of mind and body, we need to get centred on our soul, we need to get closer to our Chitta.\nThe power of centring us on our soul is associated with the earth element, because the earth element is the main source of energy in the body.\nIn Rudra mudra, the ring finger (Earth element), comes in contact with the thumb (fire element) and index finger (air element). This leads to the perfect balance of earth element in the body.\nBenefits of Rudra Mudra\nThe Rudra mudra comes with a lot of spiritual and physical health benefits.\n- Helps to Stimulate the Third Chakra (Solar Plexus/ Manipura Chakra).\nSolar plexus is the centre of vitality and fire in the body. Rudra mudra is directly associated with the Solar plexus (third chakra).\nIn this mudra, the contact of thumb (fire element) with the index finger (air element) and ring finger (earth element), regulates the flow of energy to the area of this chakra. Thus, this Mudra helps to stimulate the root chakra.\nThe simulation of solar plexus/third chakra gives\n- Prolonge age.\n- Better willpower and self-confidence.\n- Good concentration.\n- Better eating habits and prevents eating disorders (food addictions)\nPhysical Health Benefits\n- Avoid Dizziness and Dullness\nDue to the lack of earth element, the flow of elemental energies to the head area decreases. This decrease makes a person feel dull, weighed down and dizzy.\nRudra mudra increases the earth element in the body, which prevents such signs of illness. This makes us energetic and refreshed.\n- Prevents Stomach Related Problems\nThe earth element rules the energy of the stomach, spleen, and pancreas.\nGrowth in earth element improves the function of these body parts. This helps to prevent disorders in the stomach, such as indigestion, high cholesterol, diabetes nausea and vomiting.\n- Helps in Low Blood Pressure\nThe proper flow of energies of the earth element in the body clears the blockage of our veins. This increases blood circulation in the body.\nBetter circulation of blood makes the blood pressure normal. Thus, performing Rudra mudra helps in low blood pressure.\n- Helps in Burning Fat\nThe practice of Rudra mudra produces heat inside the body. This helps in burning fat and removing the impurities from the body.\nIf you wanna lose your weight, this mudra is very helpful to you, as it burns extra pounds of body.\n- Along with these all benefits, regular practice of Rudra mudra improves eyesight, maintains the good health of the heart and improves concentration power"
] | [
"<urn:uuid:9f5a0b56-e78d-43fd-974f-1f1054657894>"
] | [
"CC-MAIN-2023-06"
] | [
"https://fitsri.com/yoga-mudras/rudra-mudra"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499695.59/warc/CC-MAIN-20230128220716-20230129010716-00577.warc.gz"
] | [
"en"
] | [
0.9106020331382751
] | [
1545
] | [
2.515625
] | [
3
] |
[
"\"Outward and Visible Signs of Inward and Spiritual Grace\"\nThe Sacraments are outward and visible signs of inward and spiritual grace, windows in the universe between the dimension of physical reality (matter, space, time) and the dimension of spiritual reality. Christianity recognizes the whole universe as sacramental, as means of making God'ss presence and grace available to the physical dimension. The sacramental rituals of the Church acknowledge the special combination of natural means of grace (water, bread, wine, hands, oil, tears) and the conscious prayers and intentions of the Church. Through the Sacraments of the Church, the community of the faithful initiates, nourishes, makes covenants, empowers, reconciles, heals, and commends one another to God.\nThe Christian Sacraments include: Holy Baptism, Holy Eucharist, Confirmation, Holy Matrimony, Confession, Healing, and Burial."
] | [
"<urn:uuid:1c2ecf54-27ca-4cd6-a4aa-d404e7977952>"
] | [
"CC-MAIN-2017-26"
] | [
"http://sanmarcosepiscopal.org/219/Sacraments.htm"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320873.54/warc/CC-MAIN-20170626235612-20170627015612-00672.warc.gz"
] | [
"en"
] | [
0.8980475068092346
] | [
194
] | [
2.65625
] | [
3
] |
[
"We will make sea creatures and monsters from paper card and scraps. No drawing required just cutting and sticking. You can use almost anything, from coloured paper to old birthday cards, sparkly sweet wrappers to magazine pages.\nThe creatures might be fish, octopi, crabs and lobsters, jelly fish or just made up beasties!\nThis is what we're aiming for....\nYou will need.......\nSticky tape or cheap masking tape\nSplit pins are a useful luxury if you can buy them cheaply at a stationery store, a stapler is also handy but only for older kids and grown-ups.\nColoured scraps of card or paper\nShiny bits and sparkles\nPipe cleaners and strings or little ribbons, wool does nicely\nAnd maybe a bit of string to hang them up.\nHere's how to do it....\n1. The children will have lots of ideas but the easiest way to start is to glue a strip of card into a loop.\n2. Add as many legs as your creature needs. The best way is to use sticky tape as the legs tend to fall off before glue has time to dry. Don't worry about how many legs the creature is meant to have.....I think the best sea monsters have lots and lots of different coloured legs!\n3. Now leave the kids to decourate madly adding fins, tentacles, tails, faces, teeth, pincers and scales.\n4. Hang the creature up with a piece of string once the glue has dried......best to hang it where it will give granny a nasty shock!\nAnd that's that....a really easy one but the children will go on to make endless variations, especially if we encourage them by making one or two of our own.\nIf you need inspiration there is a great book with fabulous pictures called \"Fidgety Fish\"\nIt's by Paul Bright and Ruth Galloway. You can get it in most British libraries, high street book stores and from Amazon. It's been one of our bedtime favourites for years. It has lots of sea creature pictures to feed the imagination.\n(Dear Paul and Ruth, I hope you don't mind a free plug for your book!)\nThese simple models are great for developing the children's making skills but are even better for exercising their imaginations. If you ask questions like, \"What does this one eat?\" or \"Can this one creep out of the water?\" or \"He looks like a friendly chap, where are his friends?\", the children will quickly make up stories to tell about them.\nSlightly older children might record their stories in words or pictures, or even by video.\nHaving said that, you may just find that they use them as puppets and chase their little brother round the house with them, making, what I was assured were squid noises!\nWhat noise does a squid make?.....perhaps I'm happier not knowing!\nSee you next week for pirate fun!"
] | [
"<urn:uuid:ee65454b-57a5-4417-a378-be03536758ef>"
] | [
"CC-MAIN-2017-26"
] | [
"http://heliroche.blogspot.co.uk/2011/09/sea-creatures.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320476.39/warc/CC-MAIN-20170625083108-20170625103108-00259.warc.gz"
] | [
"en"
] | [
0.9603664875030518
] | [
610
] | [
2.59375
] | [
3
] |
[
"Grade 2 Date 15/10\nThe Theme: “What colour is it?” 2 cынып\nSkills: Vocabulary and speaking\nTo use active vocabulary in oral speech\nIntroduction of new words\nTo improve speaking confidence\nTo develop children’s memory by repeating some difficult words for children\nTo develop and practice speaking skills\nTo develop children’s activity on the lesson\nTo develop children’s interest in learning English\nQuestions: “What colour is it?”;\nInter-subject connection: practice of speech, practical grammar.\nType of lesson: mixed.\nMethods of teaching: demonstration, exercises, instruction, practice.\nThe equipment of the lesson:\nVisual aids: Cards, pictures, text-book, whiteboard, Presentation.\nLiterature: English text-book for the 2 form\nDuration of the lesson: 45.\nLevel: 2 form.\nThe procedure of the lesson:\nStage of the lesson\nGetting acquainted with the pupils\nPreparing pupils to the lesson\nTeacher greets students:\n“Good morning children! I’m glad to see you! My name is Meruert Husanbayevna. I’ll teach you English. Let’s begin our lesson. Today we’ll check up your homework, learn new words and learn new question: “What colour is it?” (Slide 1-2)\nGood morning teacher!\n2. Presentation of the theme\nTo develop students’ activity on the lesson\nTeacher asks students:\n“What theme do these words refer to? … Right, today we will speak about colours.”\n“What colour is it?”\n3. Warm up\nImproving of the sounds pronunciation\nStudying new vocabulary\nTeacher asks students:\n“Look here, people, at the board (Slide 3). Listen and repeat these words.”\nKey words: black, blue, red, brawn, white, yellow, orange, pink, green, grey.\nStudents look at the board and read those words.\n4. Grammar: question:\n“What colour … ?”\nGrammar rules explanation\nGrammar rule fixation\nToday we’ll learn new question: “What colour is … ?” and adjectives (black, blue, red, brawn, white, yellow, orange, pink, green, grey).\nLook at the board and see some pictures of meaning these words. Try to suspect their meaning. (Slide 4).\nS1, S2 … Students look at the board and try to name it.\nGood for you!\nLook at the board (Slide 5). Here you can see some pictures and some groups of words. Try to suspect their meaning and circle the correct word in each group of words.\nStudents look at the board, read those words and circle the correct word.\nNow, look at the board (Slide 6). Here you can see colours crossword. Can you name these pictures? And write the complete words for the colours there (in the correct order)… and then put the words into the grid.\nAnswers: (Slide 7)\nS1, S2… Working colours crossword\n- Vocabulary fixation\nNow, look at the board (Slide 8). Here you can see colours wordsearch. Search for the words. They are hidden left to right and down.\nAnswers: (Slide 9)\nS1, S2… Working colours wordsearch\n- Vocabulary fixation*\nNow, I’ll hand out you these cards, where you can see some pictures, drawing. You must paint them. You have 5 minutes. Then I’ll check up it.\nS1, S2… Working crossword puzzles\n5. Giving the home task\nHome task explanation\nYour home task will be “Coloured pens”.\nNow, I’ll hand out you cards “Coloured pens”, where you can see crossword, pens and shit of paper. In your imagination, pick up these pens one by one – taking the top one each time. Then write the complete words for the colours there (in the correct order)… and then put the words into the grid.\nIs everything clear for you? Please, ask questions, who didn’t understand.\n6. Conclusion and assessment\nWell, students, today we learnt a lot. We learnt some new words and grammar material. I hope you like today’s lesson. Thank you for your activeness. The lesson is over. Good-bye. (Slide 10)\n1 task. Translate\nA pen a table a calculator\nA pencil a notebook a eraser\nA ruler a chair a copybook\nA rubber a bag a computer\nA book a sharpener a pencil-case(box)\n2. task. Answer the questions\n- What’s this?\nThis, Is it a pencil?\nNo, itsn’t. It’s a pen\nIt’s a calculator. Now go away.\n3task. Continue: What’s this? What’s that?\nIt is a _____. It is a ________. It’s a ________.\n1 task. Listen and repeat:\nWhat’s this? Is it a pencil?\nNo, it isn’t. It’s a pen.\nWhat’s that? Is it a ______.\nNo, it isn’t. It’s a _______.\nWhat’s this? Is it a desk?\nYes, it is.\nComplete the diagram\nWhat is this? That?\nMy family tree\n1. Answer the questions\nWhat’s your name?\nWhere’re you from?\nHow are you?\nHow old are you?\nWhat’s your address?\nHow do you spell your name?\nWhere is she/he from?\nWhich class are you in?\nHave you got a camera?\nBrown, green, violet, white, grey, dark, red, pink, orange, yellow, purple, black.\nHome-lesson: Learn the dialogue\n- To use active vocabulary in oral speech\n- Introduction of new words\n- To improve speaking confidence\n- To develop children’s memory by repeating some difficult words for children\n- To develop and practice speaking skills\n- To develop children’s activity on the lesson\n- To develop children’s interest in learning English\nОставьте свой комментарий:\nКомментарии:↓ Показать еще коментарии ↓"
] | [
"<urn:uuid:4a32769c-7b22-419f-8bb5-5e22e4135019>"
] | [
"CC-MAIN-2017-26"
] | [
"https://www.metod-kopilka.ru/what_colour_is_it-57531.htm"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320545.67/warc/CC-MAIN-20170625170634-20170625190634-00671.warc.gz"
] | [
"en"
] | [
0.8204070329666138
] | [
1471
] | [
4.25
] | [
4
] |
[
"Gender inequality is one of the most widespread and persistent barriers to securing a world of hope, tolerance and social justice. As one of the greatest injustices of our time, climate change amplifies the risks faced by people who\nare already poor and marginalised, with widespread negative consequences primarily for women and girls, and for society as a whole. Social inequality and the injustice of climate change not only reinforce each other, but have common roots in various forms of domination by powerful elites and in a development model which too often puts human rights and the environment second and economic growth first, compromising the wellbeing of billions for the benefit of a few.\nIn 2015, governments will seek to agree three major international policy frameworks with long-term implications reaching at least into 2030.These include the post-2015 sustainable development framework, a future UN climate change agreement, and the post 2015 framework for disaster risk reduction. Within these negotiations, governments have taken their vital first steps towards addressing gender inequality, which has built on progress achieved over the last 15 years under the Millennium Development Goals, and specifically Goal 3. Now is the moment for governments to make truly historic choices to globally shift course towards far more equitable and ambitious sustainable development and to tackle the underlying drivers of vulnerability and climate injustice. Tackling climate change and reducing gender inequality are not optional extras. They lie the core of building a fair and sustainable world for all."
] | [
"<urn:uuid:46e0bb25-1cf8-4c66-ac25-9425e6b79e1f>"
] | [
"CC-MAIN-2017-26"
] | [
"http://canafrica.com/publication/2015-and-beyond-action-for-a-just-gender-equitable-and-sustainable-future/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323864.76/warc/CC-MAIN-20170629033356-20170629053356-00088.warc.gz"
] | [
"en"
] | [
0.9345899820327759
] | [
280
] | [
3.25
] | [
3
] |
[
"What are cookies?\nA cookie is a small file that websites send to your browser and download to your computer.\nCookies allow the website to store and retrieve information about your visit, such as your preferred language and other options, in order to improve the services offered and contribute to a better browsing experience for the user.\nTypes of cookies\nDepending on who manages the domain from which the cookies are sent and how the data is processed, a distinction will be made between own cookies and third party cookies.\nCookies can also be classified according to the length of time they remain stored in the user’s browser, with a distinction being made between session cookies and persistent cookies.\nFinally, depending on the purpose for which the information collected is processed, cookies can be classified into the following categories:\n- Technical cookies: they allow the user to navigate through a website and use some of the services offered by it (such as, for example, those that serve to remember the elements that make up a shopping cart).\n- Personalisation cookies: these allow the user to access the website with certain characteristics, such as language.\n- Security cookies: they serve to prevent or hinder attacks against the website.\n- Plug-in cookies for exchanging social content: so-called plug-ins, which allow content to be shared on social networks.\n- Analysis cookies: they allow the person in charge to track the user’s behaviour.\n- Advertising cookies: they allow the management of the website’s advertising spaces.\n- Behavioral advertising cookies: like the previous ones, they are used to manage the website’s advertising spaces based on the information collected on the user’s behavior and habits, adapting advertising to the user’s profile.\n- Geolocation cookies: used to find out the country where the user is located.\nHow to change cookie settings\nYou can restrict, block or delete cookies from JUMIPA S.L or any other website using your browser. Each browser operates differently, and you can find out how to do this in your browser’s help menu, which sets out the procedure for deleting cookies. For further information:\nBy disabling cookies the website may not function properly or you may not be able to access certain features of the website.\nCookies used on the website\nDifferent types of cookies are used on the web portal for different purposes. The following is a list of the cookies used:\n- Own cookies\n- Third-party cookies\n- Session Cookies\n- Persistent cookies\n- Technical Cookies\n- Personalisation cookies\n- Analysis cookies\nModificación de las condiciones"
] | [
"<urn:uuid:23320f81-fdcb-442c-b4fc-12c430522859>"
] | [
"CC-MAIN-2023-06"
] | [
"https://puertadealgadir.com/cookies-policy/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500041.18/warc/CC-MAIN-20230202200542-20230202230542-00875.warc.gz"
] | [
"en"
] | [
0.9146623611450195
] | [
725
] | [
2.75
] | [
3
] |
[
"The United States is producing oil at record levels – 10.88 million barrels per day – and the country will end this year as the world’s top producer despite the fact that its output growth was expected to slow down slightly for this year compared to previous estimates. Production this year was thought to go up by 1.53 million bpd a day, down from the EIA’s previous estimate of an increase of 1.55 million bpd. The current all-time US yearly output peak was in 1970 at 9.6 million bpd. In 2019, US crude oil production is forecast to reach around 12.06 million bpd, the Energy Information Administration (EIA) said.\nA shale revolution has helped the United States to produce at record amounts and surpass even Saudi Arabi and Russia as the world’s biggest producers. In February this year, US crude oil production exceeded that of Saudi Arabia for the first time in more than 20 years. In the summer, the United States toppled Russia in crude oil production for the first time since February 1999. Thus, overall, “the United States will conclude 2018 as the world’s largest producer of crude oil,” commented EIA Administrator Dr. Linda Capuano.\n“EIA’s December short-term outlook largely attributes the recent decline in Brent crude oil spot prices, which averaged $65 per barrel in November, to record production among the world’s largest crude oil producers and concerns about weaker global oil demand,” Dr. Capuano also explained. Crude prices have fallen by more than 30 percent from their near four-year highs in early October over concerns of a potential glut in the market. Next year, oil demand is forecast to go up by 330,000 bpd to 20.81 million bpd, up from its previous estimate of a rise of 220,000 bpd."
] | [
"<urn:uuid:34027f47-f43e-49f8-b0ee-7c7bfbc8bc08>"
] | [
"CC-MAIN-2020-05"
] | [
"http://phosphateprice.com/2018-market-update-united-states-rises-to-worlds-no-1-oil-producer/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251728207.68/warc/CC-MAIN-20200127205148-20200127235148-00163.warc.gz"
] | [
"en"
] | [
0.9575498700141907
] | [
389
] | [
2.71875
] | [
3
] |
[
"A few months ago I came across this article in the New York Times, Why Your Kid’s Bad Behavior May Be a Good Thing. I’ll confess that I picked it up at first simply because it had an intriguing title, but after reading it I was pleasantly surprised to find that the content does a nice job of highlighting some of the research behind our approach here at Bixby!\nTo be clear, our goal at Bixby is not to foster a Lord of the Flies-esque mentality, but rather to use our understanding of healthy child development to foment children’s honest self-awareness and authentic confidence in themselves. As the article points out, “when children feel safe and loved, they are better able to ‘find their voice and figure out the world for themselves.”\nThis sentiment has been at the heart of Bixby School since our founding and it feels keenly relevant today. Our children are growing up in a world that will have opportunities and challenges that are unprecedented. Although a body of shared knowledge and skills will be foundational, their ability to navigate and shape the unknown will rely upon their ability to create new knowledge and experiment with new solutions. All of this is hard to do if not impossible unless our children have a grounded sense of self from which to take risks. The design of our school is intentionally oriented to do just this – build relationships over time, create the space for exploration and mistakes, and provide unconditional love and belonging to students. From there, anything is possible.\nOur students don’t need to cure cancer or invent a better mousetrap in order to make a positive contribution to their community, but they are less likely to do either unless they have a healthy sense of security. Our focus on joy, caring and connection is not simply a “feel-good-nice-to-have” feature of our small school. It is a necessary ingredient to our ability to nurture children’s love of learning as they discover their individual gifts and prepare to make meaningful contributions to their world."
] | [
"<urn:uuid:0e0b9d51-34bb-472e-b6b7-78fb441856b8>"
] | [
"CC-MAIN-2023-14"
] | [
"https://bixbyschool.org/creating-self-awareness-authenticity-at-bixby/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943704.21/warc/CC-MAIN-20230321162614-20230321192614-00151.warc.gz"
] | [
"en"
] | [
0.9664289355278015
] | [
424
] | [
2.515625
] | [
3
] |
[
"Norway wants to get rid of gasoline-fueled cars, plans to become carbon neutral by 2030 and spends billions on helping poor countries reduce their carbon footprints. Meanwhile, it's pushing ever farther into the Arctic Ocean in search of more oil and gas, the AP reports. \"We know there is a paradox,\" admits Vidar Helgesen, Norway's climate and energy minister. \"We have been living well from oil and gas. But there is no country in the world that has done more to undermine the oil and gas industry than Norway.\" The Scandinavian country of 5 million people is torn between its ambition to be a global leader on climate change and the awareness that its wealth is linked to the world's dependence on fossil fuels.\nNorway is accused of environmental hypocrisy, grandstanding overseas with environmental projects while allowing its domestic oil and gas industry to pump ever-larger quantities of carbon into the atmosphere. Plans for carbon neutrality involve buying credits for helping reduce emissions abroad. \"The plan has always been to buy carbon credits to allow us to continue polluting as a country,\" says Lars Haltbrekken, chairman of the Norwegian chapter of Friends of the Earth. Environmental activists bristle at exploration permits handed out to 13 oil companies in May to drill in a new area of the Norwegian Arctic. In June, Norway became one of the first countries to ratify last year's Paris Agreement on climate change. Haltbrekken says that any Norwegian contribution to this target that does not involve a reduction in oil and gas is empty. Helgesen disagrees: \"Norway has the cleanest hydrocarbons anywhere in the world. And as long as the world needs oil and gas, we will provide it.\""
] | [
"<urn:uuid:8901345e-6844-4aa8-bfaa-d485fef0c080>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.newser.com/story/228978/norway-seeks-to-balance-oil-production-carbon-reduction.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320215.92/warc/CC-MAIN-20170624031945-20170624051945-00478.warc.gz"
] | [
"en"
] | [
0.9716037511825562
] | [
346
] | [
2.5625
] | [
3
] |
[
"Connectivity is at the core of Industry 4.0, linking physical networks with cyber networks, combining into one system, and allowing a real-time flow of information.\nThese connected systems allow data to be collected and turned into information and insights that can then be quickly acted upon.\nSuch digital connectivity is based around a combination of:\n- The Industrial Internet of Things (IIoT) – machines and technologies collecting, sharing and acting on data without the need for human intervention\n- Big Data – the capture and real-time analysis of data by machines and systems in order to determine improvements and potential difficulties\n- Digital Infrastructure – a secure and resilient digital infrastructure is required to link all of the elements together\nTo realise the benefits of digital connectivity, the insights from industrial data must be transmitted and communicated in real time.\nAs a result, data management, analytics and cutting-edge networking are critical skill sets and technologies that must be maintained in order to minimise downtime costs.\nHowever, for industry, this delivers the benefit of understanding exactly what is happening at a given moment in a process, whether that’s how a product is being used or how production systems are performing.\nIssues or problems can be acted upon quickly, maximising equipment efficiencies, minimising downtime and gaining new data-driven insights to help drive growth strategies and respond to customer demands.\nIncreased insights from data also enable industries to create new business models, leading to higher value activities and thereby increasing competitive advantage, potentially by enabling mass customisation, service-enhanced business models, service-oriented business models, factory-less goods producers, and the growth of the circular economy.\nDigital transformation does not necessarily mean replacing old equipment on the shop floor, which can be costly, but rather the augmentation of existing industrial facilities, connecting them through reliable networks, such as Ethernet and 5G.\nTWI has been working closely with a number of businesses to explore and expand digital connectivity for manufacture, fault detection, and more."
] | [
"<urn:uuid:22b3148c-f218-4580-803e-eb3afd1f8546>"
] | [
"CC-MAIN-2023-06"
] | [
"http://only-sunshine.com/connectivity.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499890.39/warc/CC-MAIN-20230131190543-20230131220543-00101.warc.gz"
] | [
"en"
] | [
0.9180367588996887
] | [
407
] | [
2.75
] | [
3
] |
[
"The descent of the French was successful at least in this, that it aroused the cupidity and ambition of the king of Spain and of the emperor. Italy was proved to be any one’s prize at Fornovo, and when Louis XII. succeeded Charles VIII. in 1498 and combined in his own person the claim of the French crown to Naples and to Genoa and the Orleans claim to Milan, Venice, instead of being doubly on guard, thought she saw a chance of extending her Lombard dominions. She refused the alliance Sforza offered and promised to assist Louis in return for Cremona and its contado. In other words, she committed treason to Italy and thus justified, if anything could justify, the League of Cambray.\nSforza’s first act was to urge the Turk, who needed no invitation, to attack the republic, whose fleet in 1499 was utterly defeated at sea by the Orientals, who presently raided into Friuli. Venice was forced to accept a humiliating peace. It was in these circumstances that, with all Italy alienated from her, the papacy began to act against her.\nIts first and most splendid effort to create a reality out of the fiction of the States of the Church was the attempt of Cesare Borgia, who actually made himself master of the whole of the Romagna. Venice watched him with the greatest alarm, but chance saved her, for with the death of Alexander VI., Cesare and his dream came to nothing. Venice acted at once, for indeed even in her decline she was the most splendid force in Italy. She induced by a most swift and masterly stroke the leading cities of the Romagna to place themselves under her protection. It was a great stroke, the last blow of a great and desperate man; that it failed does not make it less to be admired.\nThe rock which broke the stroke as it fell and shattered the sword which dealt it was Pope Julius II.\nLouis and the emperor had come together, and when in June 1508 a truce was made they would have been content to leave Venice alone; it was the pope who refused, and by the end of the year had formed the European League for the purpose of “putting a stop to losses, injuries, rapine, and damage which Venice had inflicted not merely on the Holy See, but also on the Holy Roman Empire, the House of Austria, the Duchy of Milan, the King of Naples and other princes, seizing and tyrannically occupying their territories, cities, and castles as though she were conspiring to the common ill....” So ran the preamble of the League of Cambray. It contemplated among other things the return of Ravenna, Faenza, Rimini, and the rest of the Romagna to the Holy See; Istria, Fruili, Treviso, Padua, Vicenza, and Verona being handed to the emperor; Brescia, Bergamo, Crema, and Cremona passing to France, and the sea-coast towns in Apulia to the king of Spain; Dalmatia was to go to the king of Hungary and Cyprus to the duke of Savoy.\n[Illustration: ROCCA VENIZIANA]\nIn the spring of 1507, Julius launched his bull of excommunication against Venice; Ravenna, which was held by the podesta Marcello and by Zeno, was attacked by the pope’s general, the duke of Urbino, and after the disastrous defeat of the Venetians by the French and Milanese, at Aguadello, on the Adda, the republic ordered the restoration of Ravenna to the Holy See, together with the other cities of the Romagna."
] | [
"<urn:uuid:19ffc8b5-695d-4066-ac69-59b68ac15d3f>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.bookrags.com/ebooks/12542/150.html"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320049.84/warc/CC-MAIN-20170623100455-20170623120455-00708.warc.gz"
] | [
"en"
] | [
0.9797829985618591
] | [
775
] | [
2.5625
] | [
3
] |
[
"Bahasa Indonesia is the national and official language in the entire country. It is the language of official communication, taught in schools and spoken on television. Most Indonesians today speak at least two languages or more, Bahasa Indonesia and their local language, of which Indonesia counts more than 300 regional languages.\nBahasa Indonesia is based on the high Malay language as spoken and written in the Riau Islands, as in the early 19th. century, Malay was the lingua franca throughout the then Dutch East Indies, the language spoken in trade transactions. The more democratic Malay language was preferred by nationalistic youth above the Javanese language, despite the fact that Javanese is more sophisticated and at the time spoken by the majority population, Yet, Javanese is feudal as it has different levels of language depending on ones status and the status of the person spoken to. The Youth Pledge of 1928, therefore, vowed to build one Indonesian country, one nation, speaking one language: bahasa Indonesia.\nSince then, Bahasa Indonesia has developed rapidly incorporating Javanese terms, Jakarta dialect, as well as many English and Arabic words into its vocabulary.\nBahasa Indonesia use Latin alphabets but some parts of Indonesia have their own scripts, too. Bahasa Indonesia is rather easy to learn and once you get the hang of it, youll find out that its actually quite simple. You can try some simple Indonesian phrases, to get youstarted.\nFact: there are 583 languages and dialects spoken by the different ethnic groups in Indonesia. Imagine a school of 583 students who each speaks different languages or dialects. Confusion will be an understatement. Therefore its very fortunate that every single ethnic group embraces Bahasa Indonesia as the national language."
] | [
"<urn:uuid:6cc61d75-2c21-46ea-bec4-7538032fdf68>"
] | [
"CC-MAIN-2017-26"
] | [
"http://www.indonesia.travel/en/facts/language"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128322320.8/warc/CC-MAIN-20170628032529-20170628052529-00163.warc.gz"
] | [
"en"
] | [
0.939274787902832
] | [
361
] | [
3.015625
] | [
3
] |
[
"- Sixty Minute War\nThe Sixty Minute War is a fictional event in\nPhilip Reeve's Mortal Engines Quartet. It is a cataclysmic conflict which is deliberately left vague, but was evidently fought between the American Empireand Greater China. It is likely that the Middle Eastwas involved, as this region has been reduced to a flooded maze of atomic craters.\nThe name suggests that the war took only an hour to begin and end, presumably due to the widespread destruction caused by the massive amounts of weaponry deployed. However, it is possible that there was a cold war leading up to this event and that the \"sixty minutes\" only refers to the actual fighting.\nMost human technology was lost during the conflict, and the world collapsed into a\nFollowing the war came a period of immense geological instability, as\nearthquakes, tsunamis, glaciersand volcanosswept across Earth. It is uncertain whether this was an unfortunate coincidence, or directly caused by the Sixty Minute War (since weapons technology was greatly advanced at the time of the war, this is not out of the question). The isthmus linking North and South America was destroyed by Slow Bombs [cite book|last=Reeve|title=Infernal Devices| year=2005| pages= 96] , volcanoessprouted up in Europe and new oceans and mountain ranges were formed. [cite book|last=Reeve|title=A Darkling Plain| year=2005| pages= 365]\nNorth America was reduced to a\nradioactivewasteland [cite book|last=Reeve|title=Predator's Gold| year=2003| pages= 28] , along with much of eastern China. The surviving Chinese fled into the Himalayasand formed a new civilization that would later become Shan Guo, leading nation of the Anti-Traction League. Africa escaped much of the devastation and parts of it became the center of another new civilisation though it was weakened by the Traction Citiescenturies later.\nThis destruction led to the so called \"Black Centuries\", an era presumably similar to the\nDark Ages. During this period, barbaric nomad tribes wandered Europe.\nAfter these centuries (at least 10,000 years after them), Nicholas Quirke transformed London into the first of the\nTraction Citiesand this led to the rise of Municipal Darwinismand the Traction Era.\nRemnants of weaponry\nThe scale of the war meant that particle compressing weaponry, some deployed upon orbital platforms, were utilized to great extent. More powerful weapons were also used or at least developed; the \"American Empire\" is mentioned in passing to have possessed weaponry that made the gods quake in fear, such as weapons capable of somehow drawing power from parallel universes. [cite book|last=Reeve|title=Mortal Engines| year=2001| pages= 205]\nSeveral items featured in the series are deadly relics of the conflict, including a directed-energy weapon called MEDUSA which is later mounted upon the Traction City of London. This weapon (and the computer that controls it) was recovered by a group of explorers from an ancient military base on the American continent. MEDUSA is a key element of the plot in\nAnother featured weapon was the device known as ODIN (acronym for Orbital Defence INitiative), an ancient weapon consisting of an particle cannon mounted on a space platform in Earth's orbit.ODIN is a key element of the plot in\nInfernal Devicesand A Darkling Plain, as several major organisations (particularly the Green Storm) attempt to gain control of the device to destroy their enemies.\nOther Ancient orbital weapons mentioned in passing are the Diamond Bat, Jinju 14, and the Nine Sisters [cite book|last=Reeve|title=A Darkling Plain| year=2006| pages= 378] , although these take no part in the plot and are not described beyond their name. It is implied that they are likely to have fallen out of orbit during the long millennia between the Sixty Minute War and the rise of the Traction Cities.\nHungry City Chronicles\nWikimedia Foundation. 2010."
] | [
"<urn:uuid:ec06ef5f-bd01-438c-8ba5-6f9fdb0c6348>"
] | [
"CC-MAIN-2023-14"
] | [
"https://en-academic.com/dic.nsf/enwiki/805333"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948900.50/warc/CC-MAIN-20230328232645-20230329022645-00141.warc.gz"
] | [
"en"
] | [
0.9525059461593628
] | [
889
] | [
2.734375
] | [
3
] |
[
"Martin Luther’s Sola Fide\nIn 1531, long after the initial controversies over justification were hammered out, the “mature” Luther taught a bipartite justifying righteousness composed of both a forensic and a renewal element:\nThese are the two parts of justification. The former is the grace revealed through Christ, that through Christ we have a God appeased, so that sin is no longer able to accuse us, but the confidence of conscience in the mercy of God is reduced to certainty. The latter is the bestowal of the Spirit with his gifts, who illuminates against the pollution of the spirit and the flesh.\nLuther taught that the justification of a sinner involved being declared righteous on account of the righteousness of Christ received only when one partakes in the sacrament of baptism with faith. This righteousness includes 1) the non-imputation of sins or the removal of guilt based on the atonement of Christ and 2) the communication (or imputation) of the righteousness of Christ through the renewal of the Holy Spirit whereby we are spiritually united to Christ so that our hearts are made new and gladly obedient to the law of God. Both kinds of righteousness are received through faith because faith brings the Spirit which causes the heart to love, and therefore fulfill, the law. For Luther, “works of the law” (also called “works-righteousness”) are works done in one’s own free will apart from the grace of the Spirit:\nAccustom yourself, then, to this language, and you will find that doing the works of the law and fulfilling the law are two very different things. The work of the law is everything that one does, or can do toward keeping the law of his own free will or by his own powers. … To fulfil the law, however, is to do its works with pleasure and love, and to live a godly and good life of one’s own accord, without the compulsion of the law. This pleasure and love for the law is put into the heart by the Holy Ghost. … But the Holy Ghost is not given except in, with, and by faith in Jesus Christ, as he says in the introduction … Hence it comes that faith alone makes righteous and fulfils the law [italics mine].\nLuther believed that although this righteousness is worked within us (in nobis), because it is brought about by the gift of the Spirit, it does not originate from within us, it originates from outside of us (extra nos). Therefore, it is an alien righteousness.\nAlthough Luther reduced the number of sacraments to only two, baptism and the Eucharist, when it came to the sacramental mediation of saving grace, Luther preserved the basic paradigm of the Catholic Church. Luther believed, “in short, whatever God effects in us he does through such external ordinances.” One of the ways Luther attempts to acquit himself from teaching salvation by human works, is to claim that baptism is not merely an act done by men, but is ultimately God’s act. He answers the accuser like this: “Yes, it is true that our works are of no use for salvation. Baptism, however, is not our work but God’s.” Since Luther limited God’s supernatural saving grace to the sacrament of baptism, trusting in anything but God’s salvific work through baptism—including faith in Christ—is to be guilty of trusting in human works.\nWe know that wherever there is a divine promise [such as the promise of salvation through baptism], there faith is required, and that these two are so necessary to each other that neither can be effective apart from the other. For it is not possible to believe unless there is a promise, and the promise is not established unless it is believed. But where these two meet, they give a real and most certain efficacy to the sacraments. … Thus Christ says: “He who believes and is baptized will be saved; but he who does not believe will be condemned” [Mark 16:16, emphasis mine].\nThus, when Luther says “it is not baptism that justifies or benefits anyone, but it is faith in that word of promise to which baptism is added,” he is often misinterpreted as teaching a pure sola fide which rules out baptism as efficacious for salvation. Faith is necessary for baptism to effect salvation—but it is still baptism effecting that salvation. Because baptism is the work of God and comprehends God’s promise of salvation, we can be certain about our justification. However, according to Luther, just as faith only makes righteous, only unbelief can cause a person to fall away from their baptism and loose justifying grace. Furthermore, Luther taught that justification is an ongoing process of receiving forgiveness of sins and inward holiness. Compared to John Calvin, whose doctrine of justification had more influence on Protestantism and even Luthernism than Luther’s, Luther’s view of justification is strikingly Roman Catholic. It is easy to see why Lillback concludes that “Luther’s theology of justification does not neatly fit the classic pattern of the Reformational debate,” for it is much closer to the Catholic view than is widely acknowledged among Protestants of the Reformation heritage. In spite of a great divergence from Luther’s sola fide in modern Protestantism, many protestants still hold to Luther’s teaching of the centrality of the doctrine of justification, believing it to be the message of the gospel. Therefore, many understand Luther’s Reformation to be a rediscovery of the gospel itself.\nThe Roman Catholic Doctrine of Justification\nSince the Roman Catholic doctrine of justification is much like Luther’s, it will be sufficient to note only those aspects of Rome’s doctrine unique to the Catholic position. First, while Luther preferred to speak of the righteousness of God and/or Christ communicated to us (or imputed to us) by the Holy Spirit, the Catholic Church prefers to speak of the righteousness of God and/or Christ “infused by the Holy Spirit into our soul” [emphasis mine]. Second, the Catholic view holds that once a person looses their justification, the only way to get it back is through the sacrament of penance. Third, the Catholic formulations of salvation and justification include the language of “cooperation” when taking into account the non-passivity of man in justification (and salvation in general) and man’s ability to reject prevenient grace. Fourth, the Catholic Church teaches that Christians cannot have “an absolute and infallible certainty” that they will persevere in their faith, and thus, their justification—unless they receive such certainty through a special revelation of God.\nFifth, Catholic dogma holds that final justification (or the inheritance of eternal life at the final judgment) is by grace-wrought works of faith done by the merit of Christ. Although I list this fifth doctrine as unique to the Catholic position, it may have also been taught by Luther. Sixth, it is a part of Catholic teaching that such works, therefore, merit eternal life. For these last two distinguishing aspects of the Catholic teaching, it is important to understand two distinctions. First, to merit something is different than deserving it, but refers to God’s rewarding of good works—itself an act of grace—which good works were done by grace in the first place. Second, final justification is different from initial justification: the former is merited, the latter is not: “No one can merit the initial grace of forgiveness and justification, at the beginning of conversion.” Seventh, although not incompatible with Luther’s teaching of the centrality of the doctrine of justification, Catholic teaching tends to emphasize that justification is one among many ways the Bible describes the free gift of salvation, rather than, as Luther, emphasizing its unique role in Pauline theology.\n Cited in Peter A. Lillback, “Calvin’s Development of The Doctrine of Forensic Justification: Calvin And the Early Lutherans On The Relationship of Justification and Renewal,” in Justified in Christ: God’s Plan For Us in Justification, ed. Scott Oliphint (Geanies House, Fearn, Ross-shire, Great Britan: Christian Focus Publications, 2007), 76.\n “Hence it comes that faith alone makes righteous and fulfils the law; for out of Christ’s merit, it brings the Spirit, and the Spirit makes the heart glad and free, as the law requires that it shall be. … Grace does so much that we are accounted wholly righteous before God. … Righteousness, then, is such a faith and is called ‘God’s righteousness,’ or ‘the righteousness that avails before God,’ because God gives it and counts it as righteousness for the sake of Christ, our Mediator, and makes a man give to every man what he owes him. Martin Luther, Commentary on Romans, trans. J. Theodore Mueller (Grand Rapids, Michigan: Zondervan Publishing House, 1954), xv-xvii. Although this comment was written in the period of the early Luther, the editor and translator writes: “In short, a scholarly edition of Luther’s Romans must satisfy all scholarly demands, while this popular and abridged edition seeks only to acquaint the average Christian reader with the fundamentals of Luther’s evangelical teachings. We might add that Luther’s commentary on Romans contains some thoughts which later he modified or discarded altogether. In order to avoid confusion, such portions are largely omitted in this practical edition.” Ibid., ix. More importantly, Lillback marshals compelling evidence that Luther endorsed Melanchthon’s doctrine of justification which included inward renewal of the Spirit and that Luther himself connected inward renewal to justification even in his later, more mature works. Lillback, “Calvin’s Development of The Doctrine of Forensic Justification,” 66-80.\n Luther, Commentary on Romans, xv. “Of these [true, faith-wrought works] the work-righteous saints know nothing, but feign works of their own in which there is no peace, joy, confidence, love hope, boldness, nor any of the qualities of true Christian works and faith” [italics mine]. Ibid., xxi.\n “God certainly desires to save us not through our own righteousness, but through the righteousness and wisdom of someone else or by means of a righteousness which does not originate on earth, but comes down from heaven. So then, we must teach a righteousness which in every way comes from without and is entirely foreign to us.” Ibid., 28-29.\n Lohse makes the judgment that although Luther “with his emphasis on the strict correlation of baptism and faith…gave new accent to traditional baptismal theology…on the whole [he] did not attack it.” Bernhard Lohse, Martin Luther’s Theology: Its Historical and Systematic Development, trans. Roy A. Harrisville (Minneapolis, Minnesota: Fortress Press, 1999), 303. Lohse also recognizes that Luther appealed to “the concept of the sacrament as ‘effective in itself’ (ex opere operato)” in his defense of infant baptism. Ibid, 302.\n Martin Luther, The Book of Concord: The Confessions of the Evangelical Lutheran Church, trans. Theodore G. Tappert (Philadelphia, Pennsylvania: Muhlenberg Press, 1959), 440. The fact that God’s Word (the promise of salvation) is attached to baptism is sufficient (in Luther’s mind) to defeat the skeptics who say, “How can a handful of water help the soul?” (i.e. anyone who would deny baptismal regeneration). Ibid., 438. In his Large Catechism, Luther gives more argumentation against those who deny the efficacy of the sacraments than on any other issue. Not only are those who claim that baptism is merely an external sign having no spiritual effect “so foolish as to separate faith from the object [Gods Word] to which faith is attached and bound,” but Luther argues that they miss the point that God’s grace has been limited to being distributed only through the external sacraments. “Yes, it must be external so that it can be perceived and grasped by the sense and thus brought into the heart, just as the entire Gospel is an external, oral proclamation. In short, whatever God effects in us he does through such external ordinances.” Ibid., 440. Therefore, faith alone will not do, because although “faith alone makes the person worthy to receive the salutary, divine water profitably,” faith apart from the actual administration of the sacrament of baptism is nothing but a faith which is mustered up apart from the power of God’s grace and severed from God’s Word—and thus it is a human work. Such faith is just as shaky ground for salvation as any other human work. Ibid., 440.\n Ibid., 441.\n Tranvik argues that Luther saw pre-baptism faith as a human work, not the work of God, and thus he considered anyone who believed faith came before baptism to be in the same heretical camp with Rome, trusting in human works and denying the gospel.\nTherefore, one dare not base his baptism on his faith. For who can be sure if he really believes? The Enthusiasts’ stress on subjectivity, like the late medieval view of penance and monasticism, troubles Luther because it put the question of salvation back into the hands of a frail and doubting humanity. … From Luther’s perspective, the dispute with the Enthusiasts is not merely about the nature of material things and whether or not they can be mediums of the divine. Rather, the gospel itself is at stake. … In his conflict with enthusiasm, Luther suspects that faith itself is being idolized, the very faith that is subject to the vagaries of human moods and emotions. Faith simply cannot bear that burden and remain salvific. Again, as was the case with Rome, Luther believes the enthusiasts are shrouding the life-giving promise. God must move from the external to the internal. To reverse the order is to make faith a work and set up a pernicious ordo salutis based on law. What Luther did was expose the essential nomism of the Enthusiasts.\nMark D. Tranvik, “Luther on Baptism,” Harvesting Martin Luther’s Reflections on Theology, Ethics, and the Church, ed. Timothy J. Wengert (Grand Rapids, Michigan: William B. Eerdmans Publishing Company, 2004), 32-33. “And he most sharply rejects the attempt to determine whether or not an adult believes, particularly in the form in which it was practices by the Baptists.” Althaus, The Theology of Marin Luther, 365. Luther considered the Anabaptists to be sects of the devil. “Here we come to a question by which the devil confuses the world through his sects, the question of infant Baptism.” Luther, The Book of Concord, 442.\n Ibid., 67.\n Ibid., 66.\n For example, in a relatively recent treatment (2001) of doctrine throughout church history, John D. Hannah misrepresents Luther as believing in sola fide in such a way as to rule out sacramental mediation of saving grace. John D. Hannah, Our Legacy: The History of Christian Doctrine (Colorado Springs, CO: NavPress, 2001), 227-229. His misunderstanding appears to be rooted in a misinterpretation of Luther’s phraseology of baptism as God’s Word. Since Luther denies that water all by itself saves, but rather asserts salvation through the Word which is attached to the water and faith which receives it, Hannah concludes that Luther did not believe in the efficacy of the sacrament of baptism. “The sacraments, then, have a subjective function as a witness to faith in God’s generosity; they do not have an objective function of being the actual means of acquiring God’s grace.” Ibid., 229. In the same vein, Hannah represents Luther has having a view in which “the symbol has no efficacy.” Ibid. Lohse tries to correct this false interpretation of Luther’s “sign” language (pardon the pun). “When Luther at times used the word ‘sign,’ particularly in his doctrine of the Supper, that use may not be construed in Zwinglian terms. Luther never intended the term to be merely ‘symbolic.'” Lohse, Martin Luther’s Theology, 300.\n “God’s works [such as baptism], however, are salutary and necessary for salvation, and they do not exclude but rather demand faith, for without faith they could not be grasped. Just by allowing the water to be poured over you, you do not receive Baptism in such a manner that it does you any good. But it becomes beneficial to you if you accept it as God’s command and ordinance, so that, baptized in the name of God, you may receive in the water the promised salvation. This the hand cannot do, nor the body, but the heart must believe it. … Actually, we insist on faith alone as so necessary that without it nothing can be received or enjoyed.” Luther, The Book of Concord, 441.\n Tranvik, “Luther on Baptism,” 32-33.\n “All of us do not remain with our baptism. Many fall away from Christ and become false Christians.” Martin Luther, What Luther Says, ed. Ewald M. Plass (St. Louis, Missouri: Concordia Publishing House, 1986), 1:280. “Through baptism these people threw out unbelief, had their unclean way of life washed away, and entered into a pure life of faith and love. Now they fall away into unbelief and their own works, and they soil themselves again in faith.” Martin Luther, Luther’s Works, ed. J. Pelikan (St. Louis, Missouri: Concordia Publishing House, 1967), 30:190. “Indeed, even the righteous man, if he presumes to be justified by those works, loses the righteousness he has and falls from the grace by which he had been justified, since he has been removed from a good land to one that is barren.” Ibid., 27:331. Luther understood unbelief to be the root and sum of all sin. “And the Scriptures look especially into the heart and have regard to the root and source of all sin, which is unbelief in the inmost heart.” Luther, Commentary on Romans, xv.\n “Now we are only halfway pure and holy. The Holy Spirit must continue to work in us through the Word, daily granting forgiveness until we attain to that life where there will be no more forgiveness. In that life are only perfectly pure and holy people, full of goodness and righteousness, completely freed from sin, death, and all evil, living in new, immortal and glorified bodies.” Martin Luther, Selected Writings of Martin Luther, ed. Theodore G. Tappert (Philadelphia: Fortress Press, 1967), 418. Cited in Lillback, “Calvin’s Development of the Doctrine of Forensic Justification,” 76. Lillback concludes: “Luther conceives of this forgiveness as an ongoing process to remedy the partial holiness of the believer.”\n Lillback, “Calvin’s Development of the Doctrine of Forensic Justification,” 76. Lillback argues that Luther never used the word “forensic” (although Melanchthon himself used it and although forensic elements are one part of Luther’s bipartite doctrine of justification), and that John Calvin was the first to teach that justification was merely forensic. Ibid., 79. If Lillback’s [and my own] reading is right, Luther is not only misrepresented as teaching a pure sola fide that rules out sacramental mediation, but Calvin’s teaching of justification is read back into Luther. For example, Erickson has Luther’s doctrine of justification only addressing the problem of forensic guilt, but not the problem of the corruption of human nature, and appears to teach that Luther did not think that in justification God actually causes the one justified to fulfil the law but rather to be merely treated as if he had fulfilled all the law. Millard J. Erickson, Christian Theology, second edition (Grand Rapids, Michigan: Baker Academic, 1998), 968. Johnson and Webber understand Luther to teach that justifying righteousness is alien in the sense that it does not belong to the one justified by it, but rather to Christ. Alan F. Johnson, Robert E. Webber, What Christians Believe: A Biblical and Historical Survey (Grand Rapids, Michigan: Zondervan Publishing House, 1993), 310. Others seem unaware that such major differences exist between Luther and Calvin and treat these two magisterial Reformers (and the Reformers in general) as if they all believed the exact same thing. “The Reformers proclaimed justification by grace alone through faith alone on the ground of Christ’s righteousness alone.” J. I. Packer, “Justification,” in Evangelical Dictionary of Theology, second edition, ed. Walter A. Elwell (Grand Rapids, Michigan: Baker Academic, 2001), 646.\n “Perhaps the most distinctive feature of Luther’s mature doctrine of justification is the emphasis he places on its theological centrality. It was Luther above all who saw the articulus iustificationis as the word of the gospel, to which all else was subordinate.” Alister McGrath, Iustitia Dei (New York, New York: Cambridge University Press, 2005), 223.\n The basic Catholic definition of justification is as follows: “The grace of the Holy Spirit has the power to justify us, that is, to cleans us from our sins and to communicate to us ‘the righteousness of God through faith in Jesus Christ’ and through baptism.” Catechism of the Catholic Church: With Modifications from the Editio Typica, second edition (New York, New York: Dobuleday: 1995), 535, par 1987. It is also the Catholic position that justification depends entirely on the grace of God (sola gratia), faith is a necessary part of baptism, and the purpose of justification is the glory of God. “With justification, faith, hope, and charity are poured into our hearts, and obedience to the divine will is granted to us” [emphasis mine]. Ibid., par 1991. “Justification is conferred through baptism, the sacrament of faith. It conforms us to the righteousness of God, who makes us inwardly just by the power of his mercy. Its purpose is the glory of God and of Christ, and the gift of eternal life” [emphasis added]. Ibid., par1992. “Our justification comes from the grace of God. Grace is favor, the free and undeserved help that God gives us to respond to his call to become children of God, adoptive sons, partakers of the divine nature and of eternal life.” Ibid., par 1996. “This vocation to eternal life is supernatural. It depends entirely on God’s gratuitous initiative.” Ibid., par 1998. “The preparation of man for the reception of grace is already a work of grace.” Ibid., 2001. Like Luther, the Catholic view believes that justification is a process. “Sanctifying grace is an habitual gift, a stable supernatural disposition that perfects the soul itself to enable it to live with God, to act by his love.” Ibid., 538, par 2000.\n This brief treatment will not allow for a comprehensive listing. Therefore, I have attempted to list those that seem most important.\n Ibid., 538, par 1999. Since Luther’s language of imputation appears to still include soul transformation through the “communication” of righteousness, the differences between his language of imputation and the Catholic language of “infusion” may be a matter of emphasis (or choice of words) rather than a significant difference in substance.\n “Christ instituted the sacrament of Penance for all sinful members of his Church: above all for those who, since Baptism, have fallen into grave sin, and have thus lost their baptismal grace and wounded ecclesial communion. It is to them that the sacrament of Penance offers a new possibility to convert and to recover the grace of justification. The Fathers of the Church present this sacrament as ‘the second plank [of salvation] after the shipwreck which is the loss of grace.” Ibid., 403, par 1446.\n Although, according to McGrath, Luther insisted upon the “utter passivity of humans in justification,” it appears from my own study of Luther’s doctrine that Luther’s notions of passivity are compatible with Catholic teaching justification. The non-passivity and “cooperation” in Catholic teaching is defined in terms of “the assent of faith” that works through love. Ibid., 537, par 1993. The Catholic language of non-passivity and cooperation, then, appear to be concerned with ruling out the idea of a person’s being justified without a real change effected in the person’s heart and life—they believe, repent, and live by a faith that works through love.\n “Justification establishes cooperation between God’s grace and man’s freedom. On man’s part it is expressed by the assent of faith to the Word of God, which invites him to conversion, and in the cooperation of charity with the prompting of the Holy Spirit who precedes and preserves his assent: ‘When God touches man’s heart through the illumination of the Holy Spirit, man himself is not inactive while receiving that inspiration, since he could reject it; and yet, without God’s grace, he cannot by his own free will move himself toward injustice in God’s sight.’” Ibid., 537, par 1993.\n “If anyone says that he will for certain, with an absolute and infallible certainty, have the great gift of perseverance even to the end, unless he shall have learned this by a special revelation, let him be anathema.” Canons and Decrees of the Council of Trent, trans. Rev. H. J. Schroeder, O.P. (Rockford, Illinois: Tan Books and Publishers, Inc., 1978), 44, can.16.\n “If anyone says that the good works of the one justified are in such a manner the gifts of God that they are not also the good merits of him justified; or that the one justified by the good works that he performs by the grace of God and the merit of Jesus Christ, whose living member he is, does not truly merit an increase of grace, eternal life, and in the case he dies in grace, the attainment of eternal life itself and also an increase of glory, let him be anathema.” Ibid., 46, can 32.\n “Luther does not, as he is frequently represented, reject the necessity of good works in justification.” McGrath, Iustitia Dei, 231. The quotation from Luther that McGrath puts forth as evidence, however, only shows that Luther believed in the necessity of works for salvation—not the causal role of works in justification.\n Canons and Decrees of the Council of Trent, 44, can.16.\n The section on merit in the Catholic Catechism begins with Augustine’s famous quote: “You are glorified in the assembly of your Holy Ones, for in crowning their merits you are crowning your own gifts.” Catechism, 541. Indeed, as if a response to protestant objections, this is the chief emphasis of the section. “With regard to God, there is no strict right to any merit on the part of man. Between God and us there is an immeasurable inequality, for we have received everything from him, our Creator. … [T]he merit of good works is to be attributed in the first place to the grace of God, then to the faithful. Man’s merit, moreover, itself is due to God, for his good actions proceed in Christ, from the predispositions and assistance given by the Holy Spirit. … [Adoption by grace] can bestow true merit on us as a result of God’s gratuitous justice. … Grace, by uniting us to Christ in active love, ensures the supernatural quality of our acts and consequently their merit before God and before men.” Ibid., 541-42, par 2007, 2008, 2009, 2011.\n Ibid., 542, par 2010.\n “[Justification] stands in an essential relation to all truths of faith, which are to be seen as internally related to each other. It is an indispensable criterion that constantly serves to orient all the teaching and practice of our churches to Christ. When Lutherans emphasize the unique significance of this criterion, they do not deny the interrelation and significance of all truths of faith. When Catholics see themselves as bound by several criteria, they do not deny the special function of the message of justification.” Joint Declaration on the Doctrine of Justification: The Lutheran World Federation and the Roman Catholic Church, English-Langauge Edition (Grand Rapids, Michigan: Eerdmans Publishing Company, 2000), 16, article 3, par 18."
] | [
"<urn:uuid:0daefe25-c534-4083-8569-67552c690065>"
] | [
"CC-MAIN-2017-26"
] | [
"https://theophilogue.com/2010/04/30/luther-vs-catholics-on-justification-2/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320323.17/warc/CC-MAIN-20170624184733-20170624204733-00008.warc.gz"
] | [
"en"
] | [
0.9425920248031616
] | [
6274
] | [
2.65625
] | [
3
] |
[
"Recently I was very fortunate to be able to spend some time with the student/Occupy protests known as the Umbrella Revolution in Hong Kong.\nMy photos included this astonishing map of the Admiralty area, which was located in the Admiralty MTR (mass transit railway) station, created by the protesters. It tells people where you can find first aid, supplies, social workers, “the stage” from which people sing and make announcements, and a self study area for students.\nOn looking at the map, which many people were stopping to study, I realised that for me one immediate visual reference was the official map of Admiralty station, which I’d seen further inside the station.\nSo I went back inside and took a further photograph of that map.\nI used these maps among other images in an exploration of multimodality in a lecture I gave on returning in my undergraduate Understanding Media course. I couldn’t have been more delighted than when after the lecture two students came up to me and offered to help me further with my interpretations. Since then they’ve suggested that in its detailed indication of details of everyday life, the protesters’ map may evoke a painting, attributed to Song Dynasty artist Zhang Zeduan called “Along the River during the Qingming Festival”. The painting captures the daily life of people and the landscape of the capital back then from the Northern Song period.\nLooking into this painting I found indeed that it is “widely considered to be China’s best known painting” by: the Columbia University (2013) Asia for Educators: The Song Dynasty in China 960-1279. Life in the Song seen through a twelfth century scroll.\nFurther, I discovered that in the tradition of Chinese art,the practice of creating new versions, sometimes adding contemporary details, is a much respected practice. Take a look at this presentation of a Qing dynasty version in the collection of the National Palace Museum in Taipei, completed in 1736 and now with a contemporary reworking on the Museum’s virtual media site. It’s really worth playing to show how imaginatively they’ve added animation and music to the presentation of the 18th century scroll.\nAll these images vary, of course, but have in common a panorama which includes many details illuminating everyday lives, including as to social interactions and even the idea of people of different social classes co-existing. This photograph shows the extraordinary disjunct between the tiny tents and the buildings of the business district.\nSo I’m now engaged in turning this into a research project, which means of course that I need to think ethical procedures through properly and make a submission to our ethics committee. That’s why I can’t name the helpful students, yet, although I intend to find ways of developing a proper collaboration and crediting their work.\nWhat was I doing in Hong Kong for a week in the middle of term? Well, I had quite a few things to do. I taught Research Methods to a wonderful group of students on our MA TESOL (Hong Kong) who are about to embark on their independent dissertation projects. I also visited the School of English, University of Hong Kong, and the Department of English in the City University of Hong Kong. By the way the latter is now housed in a rather exciting site: the School of Creative Media, in the Run Run Shaw Creative Media Centre. I presented papers on my Edwardian Postcard Project. I also met up with Winnie Ho, one of my PhD students – so we’ve had a good laugh about how far Lancaster Uni supervisors are willing to go to meet their supervisees! Finally, I was fortunate to catch up with Carmen Lee, of the Chinese University of Hong Kong, a long term associate of the LRC, including, of course, co-author with David Barton of Language Online: investigating digital texts and practices."
] | [
"<urn:uuid:6c04254e-9f99-48a7-ac53-2f5190688a90>"
] | [
"CC-MAIN-2017-26"
] | [
"https://literacieslog.wordpress.com/2014/11/27/hong-kong-student-protest-map/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319575.19/warc/CC-MAIN-20170622135404-20170622155404-00529.warc.gz"
] | [
"en"
] | [
0.9659013152122498
] | [
808
] | [
2.6875
] | [
3
] |
[
"Growing Older Means Strengthening Your Bones\nOsteoporosis, a condition that causes brittle, weak, and easily broken bones, affects about 200 million individuals worldwide. Keeping your bones strong as you age can help reduce your risk of osteoporosis and its complications.\nThere are ways to strengthen aged bones. The majority of these approaches will also increase your general health and longevity. Buckeye Home Health Care recommends that you follow these tips for bone health and graceful aging.\nExercising for 30 minutes every day can help build bones and prevent osteoporosis. Weight-bearing workouts like yoga, tai chi, and simply walking assist the body resist gravity and accelerate the growth of bone cells.\nDairy products, seafood, and leafy green vegetables are all high in calcium and vitamin D, which have been linked to bone health. Aim for five servings of fruits and vegetables every day, as well as low-fat or nonfat dairy products such as milk, cheese, and yogurt. Our home health aide in Westerville, Ohio is delighted to assist you in preparing meals that fit your health needs.\nSunlight aids in the absorption of vitamin D from the foods you eat. Experts recommend getting five to ten minutes of sun exposure on the hands, arms, and face two to three times a week to help the body digest the vitamin D needed for bone health.\nWhile a bone density scan will not strengthen your bones, it will tell you if you’re doing enough to improve your bone health. A bone density scan is advised for all women over the age of 65 and men over the age of 70.\nIf you or a loved one needs home health care services in Ohio, don’t hesitate to reach out for help. We also provide high-quality skilled nursing in Chillicothe, Ohio."
] | [
"<urn:uuid:5a8f5e59-09d3-48dc-a8ec-262dbde7fb70>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.buckeyehomehealth.net/growing-older-means-strengthening-your-bones"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946445.46/warc/CC-MAIN-20230326173112-20230326203112-00758.warc.gz"
] | [
"en"
] | [
0.9324111342430115
] | [
374
] | [
2.625
] | [
3
] |
[
"Can I Sue for Clostridium Perfringens Food Poisoning?\nYes, if your case can be linked to a restaurant, grocery store, or food company. Our lawyers have helped people like you hold businesses accountable for selling tainted food.\nWhat is Clostridium Perfringens?\nClostridium perfringens (C. perfringens) is a bacterium that can contaminate food, forming spores that spread throughout the food. These spores produce a food poisoning toxin that makes people sick when it gets to the small intestine. The illness caused by this toxin is called perfringens poisoning.\nThe common form of perfringens poisoning is characterized by intense abdominal cramps and diarrhea which begin 8-22 hours after consumption of foods containing large numbers of those bacteria. The illness is usually over within 24 hours, but less severe symptoms may persist in some individuals for 1 or 2 weeks.\nIn most instances, the actual cause of poisoning is food stored at the wrong temperature. Small numbers of the organisms are often present after cooking. These can multiply to food poisoning levels if the cool down time is too long, especially when a large quantity of food is stored in a large container. Meats, meat products, and gravy are most frequent source of these outbreaks.\nThis is one of the most commonly reported foodborne illnesses in the U.S.\nInstitutional feeding (such as school cafeterias, hospitals, nursing homes, prisons, etc.) where large quantities of food are prepared several hours before serving is the most common circumstance in which perfringens poisoning occurs. Therefore, young children and the elderly are the most frequent victims. Except in the case of necrosis enteritis (also called pig-bel), complications are few in persons under 30 years of age. Elderly persons are more likely to experience prolonged or severe symptoms.\nWhat can be done to prevent infection?\nTo prevent Clostridium perfringens growth, food handlers should be sure to wash their hands before preparing or serving foods and after handling raw meat or poultry. Meat and poultry based foods should be cooked thoroughly to safe final internal temperatures. This bacteria grows best between 45° and 140°F, so it is best to keep hot foods hot (above 140°F) and cold foods cold (below 40°F). If a large portion of food is left over, it should be divided into smaller portions not over three inches deep, and promptly refrigerated so it cools quickly. Foods should be refrigerated immediately and not left at room temperature to cool. Prepared food should not be left unrefrigerated for more than two hours. Food should be reheated to at least 165°F.\nYou can call 1-888-377-8900 or click here to contact our lawyers for your free consultation. We are a national food safety law firm that represents clients throughout the United States in personal injury and wrongful death lawsuits against food companies, restaurants, and others."
] | [
"<urn:uuid:ecea38b8-2503-4fd8-b3eb-076eb3cef3ab>"
] | [
"CC-MAIN-2023-14"
] | [
"https://www.pritzkerlaw.com/food-litigation/food-poisoning-attorney/clostridium-perfringens/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949107.48/warc/CC-MAIN-20230330070451-20230330100451-00139.warc.gz"
] | [
"en"
] | [
0.9434853792190552
] | [
609
] | [
3.09375
] | [
3
] |
[
"The oldest known oil paintings were created by Buddhist artists in Afghanistan and date back to the 7th century AD. The technique of binding pigments in oil was later brought to Europe in the 15th century, about 900 years later.\nWhen were oil paintings first used?\nThe origins of oil painting, as was discovered in 2008, date to at least the 7th century ce, when anonymous artists used oil that may have been extracted from walnuts or poppies to decorate the ancient cave complex in Bamiyan, Afghanistan.\nWhen and where were pre made oil paints invented?\nOil paints were first used in Asia as early as the 7th century AD and can be seen in examples of Buddhist paintings in Afghanistan.\nWho developed painting with oils?\nMany sources consider the Dutch brothers, Jan and Hubert van Eyck to be inventors of oil painting in the early 15th century. Undoubtedly, their bold move from tempera to oil painting persuaded many Dutch and Venetian artists, however, they were not the first who painted with oils.\nWhat does original oil painting mean?\n“Original” quite simply means a unique one-off piece or small edition hand-pulled print from the artists own hand i.e an oil, acrylic, watercolor painting, etching or a drawing (i.e. not a machine driven process like a giclee).\nDid Renaissance artists paint on canvas?\nWhile many artists were skilled in all three techniques, as the Renaissance wore on, fresco was reserved for ceilings, tempera for small religious panels, and oils for wood panels or canvases, sometimes very large ones.\npls subscribe my channel 😊my first oil pastel paintings #youtubeshorts #shortsvideo #shorts(4)\nDesert Mountain Landscape – Oil Painting on Panel\nOil Painting! My First Full Movie Animation Created By FlipaClip!"
] | [
"<urn:uuid:af62e20d-470d-47d4-ae27-b38fa9b258d6>"
] | [
"CC-MAIN-2023-06"
] | [
"https://www.dependablepickup.com/who-used-oil-painting-first/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500288.69/warc/CC-MAIN-20230205193202-20230205223202-00543.warc.gz"
] | [
"en"
] | [
0.9782671332359314
] | [
397
] | [
3
] | [
3
] |
[
"Noel, Noel, Noel, Noel,\nBorn is the King of Israel.\nThe refrain of the song, The First Noel, calls for the joyful celebration of Christmas because the King of Israel was born on Christmas day. The magi from the East came looking for the new-born Jesus because they were convinced that the star that appeared marked the birth of a special king of the Jews (Matthew 2:2). That Jesus was this special king is affirmed many times in Scripture.\nWhen Jesus revealed that He possessed extraordinary knowledge of Nathaniel even before laying eyes on him for the first time, the latter testified, “Rabbi, you are the Son of God; you are the king of Israel” (John 1:49). When Jesus led the procession into Jerusalem, before His crucifixion, the people greeted Him with palm branches by singing, “Blessed is the king of Israel” (John 12:13).\nWhen Jesus was crucified, a board was fastened to the cross, as ordered by the Roman governor Pontius Pilate; it read “Jesus of Nazareth, The King of the Jews” (John 19:19). It was common at Roman public executions to state the crimes of the condemned prisoner. Because Pilate could not pin any charge on Jesus (John 19:6), he simply wrote what Jesus claimed to be when he had asked Him, “Are you the king of the Jews?” (John 18:33).\nThe words on the cross were written in three languages: Aramaic (the local language), Latin (the official language of the Roman government), and Greek (the language of trade and academia). It was as if the truth that Jesus was the King of the Jews (which Pilate had unwittingly placed as a sign on the cross) was being declared far and wide, to every sphere of life and society. The Latin words on the sign were “Jesus Nazarenus Rex Iudaeorum”, which is why in paintings of the crucifixion the sign on the cross often reads “INRI”, which are the initials of the Latin phrase.\nThe first stanza of The First Noel refers to the story of the shepherds who, while watching over their flocks, saw an angel come down from heaven to tell them the good news about the birth of the Saviour. The reference to “a cold winter’s night” (Stanza 1) is due to cultural influence in Western Christianity. Because Christmas falls at the end of December, it became associated with the cold deep winter, as is often depicted in songs and paintings.\nScripture says that the shepherds were out with their flocks “at night” (Luke 2:8). They would not have been out in the open if it had been winter. Many scholars think that the original Christmas event took place in spring, in a warmer climate. But people like to set Christmas in winter (a nostalgic idea in the Western hemisphere), and that is what the last line of the stanza conveys.\nThe next four stanzas speak of the experience of the magi from the East. They saw the star that signified the birth of Jesus, and were led by it “day and night” (Stanza 2) to the very place that Jesus was. Their arrival was not on the same night that Jesus was born. Scripture says that they found Jesus in a “house” in Bethlehem (Matthew 2:11). There is no mention of a stable or manger.\nAlso, when King Herod sought to kill the new-born king, he ordered his soldiers to kill all boys in Bethlehem “two years old and under” (Matthew 2:16), suggesting that some time had elapsed between the birth of Jesus and the arrival of the magi.\nWhat the magi did upon arriving at the house is the subject of the fifth stanza. They “bowed down and worshipped him” (Matthew 2:11), “Full reverently upon their knee” (Stanza 5). They then “presented him with gifts of gold, frankincense and myrrh” (Matthew 2:11). They paid homage to the child and recognised Him for who He was.\nWe too are inspired to do the same, to make every attempt to find Jesus, to come to Him and humbly worship Him (we are never too important to bend our knees before Him), and offer Him our best, even our own lives.\nThe final stanza is a rousing call to all to worship and thank God for what He has done for us through Christ. He who made heaven and earth from nothing, creatio ex nihilo (see Hebrews 11:3), has bought humankind and redeemed us from our sins with the blood that was shed on the cross by the One who was born on Christmas Day, born to die that we may live.\nTake time to reflect on what it means to look for Jesus, find Him, go to Him, and worship Him. In what way does Jesus exercise His kingship over you, and what do you have to offer Him?\nExcerpted and adapted from Songs of Christmas by Robert Solomon. © 2018 by Robert Solomon. Used by permission of Discovery House. All rights reserved.\nWindows on Christmas\nExperience the Christmas story in a new way! Join Our Daily Bread author Bill Crowder as he highlights history that points us back to God’s heart for humanity.\nRead more here.\nBack to Finding Rest for the Soul"
] | [
"<urn:uuid:0641ac81-4132-41c4-83d8-54655391a46e>"
] | [
"CC-MAIN-2023-06"
] | [
"https://ourdailybread.org/article/frfts-the-first-noel/"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499911.86/warc/CC-MAIN-20230201045500-20230201075500-00435.warc.gz"
] | [
"en"
] | [
0.9738085269927979
] | [
1162
] | [
3.96875
] | [
4
] |
[
"RELEASE OF BIRTHS, AUSTRALIA, 2010 (CAT. NO. 3301.0)\nBirths, Australia, 2010 (3301.0) was released on 25 October 2011. This product presents statistics on live births and fertility for Australia and the states and territories based on calendar year of registration data. Data presented in this publication includes information on the characteristics of live births such as place of usual residence, sex, Indigenous status, martial status of the parents, median age of the parents, previous number of children of the mother and nuptiality of the birth. Statistics on regional births is also available for download from the ABS website.\nThere were 297,900 births registered in 2010, a slight increase (0.7%) from the number of births registered in 2009 (295,700). This is the highest number of births ever recorded in Australia in a calendar year. Of the total births registered in 2010, 16,100 births were registered where at least one parent was reported and recorded as being an Aboriginal person, Torres Strait Islander or both on the birth registration form.\nDespite this record number of births, Australia's total fertility rate declined slightly to 1.89 babies per woman, down from a recent high of 1.96 in 2008. Fertility rates increased for New South Wales, South Australia, the Northern Territory and the Australian Capital Territory in 2010, while the remaining states recorded decreases in their total fertility rates. The Northern Territory had the highest fertility rate (2.11 babies per woman) and Victoria had the lowest (1.75 babies per woman).\nThe median age of all mothers for births registered in 2010 was 30.7 years, while the median age of fathers was 33.1 years, both slightly older than in 2009.\nFurther information on births and fertility at the national and the state and territory levels, including information on births to Aboriginal and Torres Strait Islander mothers, is available from the ABS website."
] | [
"<urn:uuid:7e3e938f-1eb9-4ce2-a0d4-a75150c2df7d>"
] | [
"CC-MAIN-2020-05"
] | [
"https://www.abs.gov.au/AUSSTATS/[email protected]/39433889d406eeb9ca2570610019e9a5/89ea9940ccfdee76ca25729e0073daca!OpenDocument"
] | [
"s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601241.42/warc/CC-MAIN-20200121014531-20200121043531-00390.warc.gz"
] | [
"en"
] | [
0.9480338096618652
] | [
398
] | [
2.6875
] | [
3
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.