text
large_stringlengths
1k
155k
id
large_stringlengths
47
47
dump
large_stringclasses
95 values
url
large_stringlengths
16
401
file_path
large_stringlengths
125
155
language
large_stringclasses
1 value
language_score
float64
0.65
0.99
token_count
int64
500
36.8k
score
float64
2.52
4.72
int_score
int64
3
5
raw_reasoning_score
float64
0.3
3.25
reasoning_level
int64
0
3
interpretation
stringclasses
4 values
topic
stringclasses
23 values
Children can be a bit more complicated to draw than other subjects. The trick is to simplify the face features and body lines as much as you can; by doing so you'll avoid making your kids' faces look old rather than young. This tutorial will help you draw two little girls of different ages. 1Sketch the heads. Draw an oval with guidelines on the right side of the paper. Draw another, slightly rounder oval with guidelines to the left of this, leaving plenty of space between them. 2Sketch the bodies and body positions using geometric shapes. Draw a vertical rectangle for the torso and a horizontal rectangle for the lower body, connected to each other and the head by a curved line (like a spine). Draw straight lines for the hands and legs, with circles for joints, and rectangles for the hands and feet. - Make a taller body for the right head than for the left head, since this is the older sister/friend of the pair. 3Create the shape of the body on the sketched “skeleton." Draw the face and ears, but don't include features like the eyes and mouth just yet. Add the rest of the body to the “skeleton”. - Don't detail the hands or feet too much at this step (same as the faces). 4Draw the facial features. Start with the girl on the right. - Make big eyes (following the horizontal guideline) and eyebrows above them, with a small triangular shape for the nose and a horizontal curved line for the mouth. - Give her a bob hairstyle with bangs. 5Follow the same steps for the smaller girl. However, make her eyes bigger and for the nose draw a flat oval. Change the hairstyle as well. Draw bangs and shoulder length hair. - If you want your girls to be sisters or very close friends, you can actually give them more similar hair/facial expressions--it's all about the choices you make for your drawing. 6Add the clothing and detail the hands. Carefully erase the “skeleton” lines. - Draw a sleeveless dress for the bigger girl and a dress with short sleeves for the smaller girl. Add collars for both of them, but draw them in different styles. - Make crinkles on both dresses. - Finish up with the shoes. 7Strengthen the lines, carefully erase all the sketch lines and add in color. Use the illustration as reference, or color them as you wish. - People are always hardest to draw, even in simple sketches like this, so don't give up if yours doesn't look right on the first try. - Do not give up! Keep trying. - If you use the copic markers then you have to use a waterproof liner and a not too thick paper. - Draw your nose underneath and in-between your eyes. - Make the eyes in the center of the head. - Use coloring pencils because it helps you to color small details better. Categories: Drawing People and Features In other languages: Thanks to all authors for creating a page that has been read 114,178 times.
<urn:uuid:c7790270-46c4-450a-8e4a-55d312d4daf5>
CC-MAIN-2016-50
http://www.wikihow.com/Draw-Children
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542828.27/warc/CC-MAIN-20161202170902-00420-ip-10-31-129-80.ec2.internal.warc.gz
en
0.922132
661
2.984375
3
1.456275
1
Basic reasoning
Art & Design
Central Theme: Written March 1915, detailing the transition between Winter and Spring to offer the accumulation of the specifics associated with the coming of Spring. Structure: 4 stanzas, conjuring the image of four seasons. Moreover, the poem is one long sentence, creating a sense of the intermingling of the seasons - seeing it as a transitionary process opposed to set-in-stone dates of the year. The cyclical nature of the seasons is reflected by the Iambic Tetrameter Rhyming Scheme: Regular, accentuating the idea that Thomas sees nothing inharmonious about dying, decaying and fragmenting 'things' he sees in Spring, instead finds interest and even beauty in them. - The use of internal rhyme 'these things are also Spring's' helps to emphasise the power of season's and highlight their significance in nature that is commonly overlooked. - There are occassionally slight crescendos in the poem, followed by bathos, such as when Thomas refers to 'Spring's' on the first line initially connoting hope are revigoration, only to juxtapose this with the 'long-dead' grass, which does not conform to this expectation. Thomas is accentuating that Spring is a more complex season than people imagine and wants to emphasise an aspect very different from its conventional depiction by introducing the contrasting theme of death and decay. - This is reinforced by the jarring partial rhyme of 'grass' and 'was', giving prominence to what most people would either disregard or find unusual about Spring. - 'Than all Winter it was': syntactical order is not only reversed for lyrical effect but also emphasises something which many people would see as a reversal of the natural order. Stanza Two and Three - Essentially broken by caesura to draw attention to the imagery of small, discarded minutiae. They are associated through their small sizes perhaps emphasising the shrinkage during decay, which is reinforced by the monosyllables of 'mite', 'chip', 'dung', 'small'. These short, sharp phrases regulate the pace of the poem, evoking the process of transition between seasons. - Not only this, but they are all associated with the inanimate; belonging to winter and the 'white' and 'bleached' suggests a draining of colour as if they is purity in decay. Thomas is trying to recreate the very cusp of the old world and the new: Winter as it becomes Spring. - 'White things a man mistakes for earliest violets', that fact violets can be mistaken for 'these things' emphasises the beauty and delicacy of decay. - Thomas refers to 'something to pay Winter's debts', suggesting natures beauty (aesthetically pleasing 'things'), compensate for the destructive 'ruins' of Winter. This anaphorically links with 'mite', ambiguously meaning a small particle and also a coin, thus, also use of monetary diction. - Thomas portrays the cyclical and continuous nature of the transition through 'starling flocks by chattering on and on', the use of present continuous tense in the dynamic verb 'chattering' suggests the infinity of seasons. The anthropomorphism of birds occurs frequently in Thomas' poetry, believing birds hold a higher power, reiterating the beauty of nature that is often discarded. - The caesura of the last line comprises two short clauses, emphasising the contrast between the seasons 'And Spring's here, Winter's not gone.'. The fronted coordinating conjunction evokes how quickly the transition of seasons have occured for Thomas, as if he was distracted by his admiration for nature that he didn't notice the passing seasons. Perhaps he chose not to as in 1915, Thomas' would be soon choosing to enlist in the First World War. - The full stop only at the end reinforces the point where he must face reality - the intermingling of seasons has reached an end.
<urn:uuid:b28623a5-2cb4-4b04-8752-1723c9f144d1>
CC-MAIN-2017-22
https://getrevising.co.uk/revision-cards/but_these_things_also_edward_thomas
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607702.58/warc/CC-MAIN-20170523202350-20170523222350-00120.warc.gz
en
0.955282
815
3.34375
3
2.927322
3
Strong reasoning
Literature
The Cossacks (novel) Portrait of a Cossack by Alexander Litovchenko |Original title||Казаки (Kozaky)| |Translator||Eugene Schuyler (1878), Peter Constantine (2004)| |Publisher||The Russian Messenger| Published in English |Pages||161 p. (Paperback)| |Wikisource has original text related to this article:| The Cossacks (Russian: Казаки [Kazaki]) is a short novel by Leo Tolstoy, published in 1863 in the popular literary magazine The Russian Messenger. It was originally called Young Manhood. Both Ivan Turgenev and the Nobel prize-winning Russian writer Ivan Bunin gave the work great praise, Turgenev calling it his favorite work by Tolstoy. Tolstoy began work on the story in August 1853. In August 1857, after having reread Iliad, he vowed to completely rewrite The Cossacks. In February 1862, after having lost badly at cards he finished the novel to help pay his debts. The novel was published in 1863, the same year his first child was born. Disenchanted with his privileged life in Russian society, nobleman Dmitri Olenin joins the army as a cadet, in the hopes of escaping the superficiality of his daily life. On a quest to find "completeness," he naively hopes to find serenity among the "simple" people of the Caucasus. In an attempt to immerse himself in the local culture, he befriends an old man. They drink wine, curse, and hunt pheasant and boar in the Cossack tradition, and Olenin even begins to dress in the manner of a Cossack. He forgets himself and falls in love with the young Maryanka, in spite of her fiancee Lukashka. While spending life as a Cossack, he learns lessons about his own inner life, moral philosophy, and the nature of reality. He also understand the intricacies of human psychology and nature. The young idealist Dmitriy Olenin leaves Moscow, hoping to start a new life in the Caucasus. In the stanitsa, he slowly becomes enamored by the surroundings and despises his previous existence. He befriends the old Cossack Eroshka, who goes hunting with him and finds him a good fellow because of his propensity to drinking. During this time, young Cossack Luka kills a Chechen who is trying to come across the river towards the village to scout the Cossacks and in this way gains much respect. Olenin falls in love with the maid Maryanka, who is to be wed to Luka later in the story. He tries to stop this emotion and eventually convinces himself that he loves both Luka and Maryanka for their simplicity and decides that happiness can only come to a man who constantly gives to others with no thought of self-gratification. He first gives an extra horse to Luka, who accepts the present yet doesn't trust Olenin on his motives. As time goes on, however, though he gains the respect of the local villagers, another Russian named Beletsky, who is still attached to the ways of Moscow, comes and partially corrupts Olenin's ideals and convinces him through his actions to attempt to win Maryanka's love. Olenin approaches her several times and Luka hears about this from a Cossack, and thus does not invite Olenin to the betrothal party. Olenin spends the night with Eroshka but soon decides that he will not give up on the girl and attempts to win her heart again. He eventually, in a moment of passion, asks her to marry him, which she says she will answer soon. Luka, however, is severely wounded when he and a group of Cossacks go to confront a group of Chechens who are trying to attack the village, including the brother of the man he killed earlier. Though the Chechens lose after the Cossacks take a cart to block their bullets, the brother of the slain Chechen manages to shoot Luka in the belly when he is close by. As Luka seems to be dying and is being cared for by village people, Olenin approaches Maryanka to ask her to marry him; she angrily refuses. He realizes that "his first impression of this woman's inaccessibility had been perfectly correct." He asks his company commander to leave and join the staff. He says goodbye to Eroshka, who is the only villager who sees him off. Eroshka is emotional towards Olenin but after Olenin takes off and looks back, he sees that Eroshka has apparently already forgotten about him and has gotten back to normal life. - Orwin (2002), p. 72 Missing or empty - Orwin (2002), p. 29 Missing or empty - Orwin (2002), p. 21 Missing or empty - Orwin (2002), p. 24 Missing or empty - Orwin (2002), p. 27 Missing or empty - Orwin (2002), p. 69 Missing or empty - Orwin, Donna Tussing, ed. (2002). The Cambridge Companion to Tolstoy. Cambridge University Press. ISBN 978-0-521-79271-4. - Existential Quest and Artistic Possibility in Tolstoy’s The Cossacks pdf - The Cossacks at Internet Archive (scanned books and audiobooks)
<urn:uuid:57512510-b3dd-4866-be81-db3dc98bc32a>
CC-MAIN-2014-15
http://en.wikipedia.org/wiki/The_Cossacks_(novel)
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609535095.7/warc/CC-MAIN-20140416005215-00395-ip-10-147-4-33.ec2.internal.warc.gz
en
0.951945
1,177
2.8125
3
2.972724
3
Strong reasoning
Literature
Excessive heat, discriminative housing practices, and trees are three things that may not immediately seem connected, but in Richmond, Virginia, their connection is coming to light. Through a National Fish and Wildlife Foundation grant, the Greening Southside Richmond Project will plant trees, create green space, and remove heat-absorbing concrete and asphalt from Southside Richmond communities. These neighborhoods were historically harmed by redlining, leaving them sweltering and causing residents to have higher rates of chronic illnesses. Through the grant, CBF and partners not only want to help improve the health of the James River and Chesapeake Bay, but also the health of long-term residents. Get the story straight from members of Southside ReLeaf, Friends of Swansboro Park, and CBF as they share more about these combined efforts in this short video. How racist housing policies have left neighborhoods sweating In the mid-20th century, the federal government created maps of cities across the U.S. that rated the risks of different neighborhoods for real estate investment by grading them on a color-coded scale that ranged from “best” (green) to “hazardous” (red). As detailed by the New York Times, race played a significant role. Black and immigrant neighborhoods were typically rated “hazardous” and outlined in red. Redlining was born. For decades, bankers and other lenders were able to deny mortgages and investments in these redlined neighborhoods, fueling a cycle of disinvestment. While Congress and the courts formally banned the practice decades ago, it continues to hurt communities nation-wide. According to a recent study by the Science Museum of Virginia, Virginia Commonwealth University, and Portland State University, formerly redlined neighborhoods can be 5 to 12 degrees hotter than other parts of the same city due to their lack of trees and green space. These formerly redlined neighborhoods also tend to have more heat-absorbing concrete and asphalt that increase temperatures and puts residents at risk for heat-related illness and death. Going green to beat the heat Thanks to a grant from National Fish and Wildlife Foundation, a new initiative in Southside Richmond will plant more than 650 new trees—which provide shade and release water vapor to cool temperatures—in neighborhoods suffering from extreme heat and heat-related illnesses. The two-year Greening Southside Richmond Project will educate homeowners on the value of trees, train local youth for green jobs, transform asphalt into green space, and begin the process of cooling some of the hottest neighborhoods in Richmond. Community partner Southside ReLeaf will work closely with community residents to ensure they are involved from day one and that we have community buy-in for the project. “That’s really the only way for any project to be successful,” said Southside ReLeaf co-founder Sheri Shannon. “We can’t just plant a tree or say we’re going to do a community garden and say that the work is done. It takes education, community engagement, and of course follow-up to make sure that young trees or any of these green spaces are able to survive and thrive.” “With that education for the community we’re talking about all the wonderful things about trees and the benefits they provide, but we’re also looking at the historic context of how we got to this place and figuring out how as a community we can start to dismantle redlining and move toward a ‘greenlining’ process,” explained Sheri. These locations aren’t chosen at random. CBF used the Richmond Office of Sustainability’s Climate Equity Index map to identify Southside census tracts where green space is most needed to reduce heat and improve the health of residents. Residents in these census tracts are 86% African American and Hispanic. As partners in the project, the city’s departments of Public Utilities and Parks, Recreation and Community Facilities identified parks and community centers in Southside that need more shade. And as the trees grow, CBF and partners hope they will shade Southside Richmond’s long-term residents for years to come. “This notion of really being intentional about greening spaces where people without access to resources not only will live, but will be able to live, and having those conversations is very important…. Folks who have paid the price will also reap the benefit,” said Rob Jones, Executive Director of grant partner Groundwork RVA. And the work doesn’t just end after the project’s two years. “We hope this grant will be a starting point for other great projects,” says Ann Jurczyk, CBF Director of Outreach and Advocacy. “We have pulled together a coalition of partners who each contribute unique expertise to ensure our success. With luck, that success will attract additional private investment and funding partners who want to complement these efforts.” What’s this all have to do with the health of the Bay? While the shade provided by trees helps keep communities cool and reduce electricity bills, they also have significant benefits for the Bay. During rain events, polluted runoff carrying things like litter, soil, and car oil, washes off hard surfaces and streets directly into streams and rivers. Trees slow and absorb large amounts of runoff, reduce flooding, and stop harmful pollutants from entering rivers, streams, and the Bay. Trees and other plants also help improve air quality. Trees act as lungs, absorbing carbon dioxide and emitting oxygen. They’ve been called “livers” of the ecosystem as well due to their ability to adsorb atmospheric pollutants and fine particulate matter through their leaves. Residents of formerly redlined neighborhoods tend to have higher rates of chronic illnesses, like diabetes, heart disease, and COPD. These new trees and green spaces will not only cool temperatures and improve air quality, trees and green spaces have been proven to reduce stress and lower blood pressure, improving the health and quality of life of local residents. As Oscar Contreras, Deacon at Branch’s Baptist Church—where a half acre of asphalt will be removed and replaced with trees—said, “We’re going to be making history and setting an example for other churches and other communities. Instead of losing trees to growth, we can plant more trees in our cities as we grow.” The Greening Southside initiative will be a model for how unused paved areas and neighborhoods lacking tree canopy can be transformed, beautifying an area while benefiting the environment and people.
<urn:uuid:184a82d9-7bce-4d3a-9378-994b8fef503d>
CC-MAIN-2022-49
https://www.cbf.org/blogs/save-the-bay/2020/09/formerly-redlined-areas-of-richmond-are-going-green.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710711.7/warc/CC-MAIN-20221129200438-20221129230438-00232.warc.gz
en
0.949901
1,353
3.4375
3
2.958548
3
Strong reasoning
Science & Tech.
The clivia genus is small, contains only six known species, and it belongs to the Amaryllidaceae family. The clivia is endemic to Southern Africa, and is world renowned for its showy flowers. Each species has flowers which are borne on the end of a peduncle, or flower stalk, and this inflorescence is called an umbel. Clivias are slow-growing plants, and are long-lived. The six species are evergreen, with thick fleshy roots that are very well-equipped for water storage during periods of drought. The plants were very popular and sought after in the late nineteenth century, after which they faded from view for a significant time. They have now been “rediscovered” in recent times, and are perfectly suited to modern life. They make ideal container grown plants for both indoors and the shady exterior, and they will grow outdoors, under trees and in narrow dark spaces where few other plants will flourish. They have spectacular flowers in a variety of colours, and are now the subject of near obsession around the world, where electronic communication has enabled enthusiasts from different countries and regions to communicate with each other, and also to trade seeds and plants which are considered highly desirable (Koopowitz pp18-20). The six species of clivia will be discussed briefly below. The name ‘caulescens’ refers to the very distinct aerial stem that is developed by the mature plant. Clivia caulescens is found in the evergreen forests of sheltered ravines and damp valleys of mountainous regions. It is found growing either on rocks which are covered with moss and lichen, or on tree trunks. The roots make their way through well-decayed leaf mould and humus covering the rocks. They are found in the mountain forests of the Eastern Transvaal and Swaziland. These clivia usually grow from 500mm to 1500mm in height, however, mature plants form long, leaf-bearing aerial stems, which can be one metre in length, and in rare cases as long as three metres. The leaves of this genus are smooth and pointed, usually between 35 and 70 mm wide, and the length between 300mm and 600mm. The flowers of Clivia caulescens are tubular and pendulous, are orange-red with green tips, and it normally flowers in spring and summer in the southern hemisphere. (Photo courtesy of Helen Marriott) This plant thrives in cultivation, doing equally well whether used an an indoor plant, or planted in a shady part of the garden, and will flower reliably each year as long as their growing requirements, for example, good drainage, are met. The name ‘gardenii’ is in reference to Major Robert Garden of the 45th Sherwood Foresters Regiment, who sent plants of this species to the Royal Botanic Gardens, Kew. Clivia gardenii are usually found in steeply sloping areas, usually south or south east facing, in evergreen forests under a very tall canopy. They prefer a welldrained soil in the wild, but have been recorded in marshy areas as well. They come primarily from KwaZulu- Natal, and have also been found in Swaziland. These clivias usually grow from 800mm to 1300mm in height, with bright green leaves that form a tuft. The leaves often differ from other species, as they have a paler section along the lower third of the leaf. The leaves have pointed tips, and are 25mm to 60mm wide, and about 350mm to 900mm long. The flowers are usually orange to red, tubular and pendulous. There are, however, unusual colour clones such as yellow or pink. It normally flowers from May to July in the southern hemisphere, and has the ability to flower well even when planted in dense shade. (Photo courtesy of Helen Marriott) This plant thrives in cultivation, and is in flower when other clivias are not, making it a valuable addition to the garden. They are long lived and flower reliably every year. The name ‘miniata’ is in reference to the flame-coloured flower, “coloured with red lead or cinnabar” (Duncan. p58). Clivia miniata are always found under tree cover, often growing on well –draining slopes of the forest floor rich with leaf mould. They can also be found on rocky ledges and between sandstone boulders on slopes. They are found in areas from the Eastern Cape Province to Swaziland and KwaZulu-Natal. These clivia grow from 500mm to 1 metre in height, and they sucker freely and will form large clumps. The leaves are usually about 50mm wide in the wild, but cultivated varieties can have leaves over 100mm wide. The leaves can be up to 1 metre in length. The flowers in the wild tend to be orange in colour, although there are very rare paler yellows, peaches, and pinks that have been found. The flower shapes in the wild can vary from small and open to large, trumpet shaped flowers. This is the most easily recognisable clivia, and is, in horticultural terms, the most important of the species. In cultivation, the flower colour can be cream, pink, peach, yellow, orange to red, and even green. This is the variety most commonly planted in parks, conservatories, and used as an indoor plant, largely due to the ease of culture, and the spectacular flowers it produces reliably each year. In the southern hemisphere, this clivia normally flowers from early spring to early summer. (Photo courtesy of Helen Marriott) The name ‘mirabilis’ is in reference to the miracle of discovering this unusual species in a very inhospitable environment. Clivia mirabilis is a newly discovered species that was only confirmed in 2001. They are found in the Northern Cape, and are extremely rare in cultivation. There is no known population outside the Oorlogskloof Reserve. In the wild, they grow in the humus between cracks in sandstone rocks, in light woodland of evergreen forests. These clivia have very thick roots that will survive under rock slabs. Unlike the other five species of clivia, this clivia originates from a Mediterranean–type climate, and requires a relatively dry summer, when it is naturally dormant. These clivia grow from 600mm to 1200mm in height, and the leaves are distinguished by a pale white striation on the leaves, which gradually fades as the leaves age. The basal part of the leaves is also distinguished by a deep maroon tinge. The flowers are tubular and pendulous, and are orange-red to salmon-pink in colour, often with some pale green. In the southern hemisphere, this clivia normally flowers from late spring to early summer. (Habitat photo courtesy of Ian Coates) Of all the clivias, this is the most difficult to grow in cultivation, as it is extremely sensitive to over-watering, and will rapidly rot if drainage is not sharp. This is the genus that was named in honour of the Duchess of Northumberland, who had the family name of Clive, and it is the first clivia that was discovered. This species is only found in the Eastern Cape, mainly in coastal areas. They are found in coastal dunes, and also under the dense canopy of evergreen forests, on rocky slopes, and also on river-banks. These clivia grow from 500mm to 1100mm in height, and the leaves are distinguished by leaf margins that have a distinct serration, with the apex having either a weak or strong notch. Seedlings of Clivia nobilis are very slow to develop compared to the other species. The flowers are borne on an umbel which may contain up to 60 florets, on a peduncle which may be up to 300mm long. The flowers are very variable in colour, from pale orange, yellow, orange-pink, to a deep orange-red, with bright green tips. In the southern hemisphere, these normally flower from mid-winter to early summer, but may flower at other times. (Photo courtesy of Helen Marriott) In cultivation, these plants make wonderful container plants, and are also very well-suited to the garden. They are very drought tolerant once established, and readily produce offsets. The leathery leaves make them less susceptible to fungal diseases then other clivia species. The name ‘robusta’ is in reference to the robust nature of this species, and it also resembles a robust form of the species Clivia gardenii. Clivia robusta is usually found in swampy terrain or near water, in deep shade in forested areas. They are found from the Eastern Cape to Oribi Gorge in the southern part of KwaZulu-Natal. These clivias grow between 1 and 2 metres in height, and may or may not produce buttress roots. The leaves are between 400mm to 1200mm long, and 35mm to 90mm wide. There may be a weak pale striation occasionally in younger leaves. The flowers are orange-red with pronounced green tips, and are pendulous. The colours, however, may vary, and are known to occur in pale peachy-pink with green-yellow tones. The flowers are often very similar to those of Clivia gardenii. In the southern hemisphere, these normally flower from late May to late June. (Habitat photo courtesy of Ian Coates) This plant is ideally suited to cultivation, both as a potted plant and in the garden. Forms that originate from the swampy habitat can be grown in poorly drained soil, but also thrive in normal growing conditions. Duncan G – Grow Clivias – South African National Biodiversity Institute, Koopowitz H – Clivias – Timber Press, Portland, Oregon. USA. 2002 Botha G – Clivia Website – www.clivia.sa.cx/clivia.htm
<urn:uuid:a9421605-4a42-486e-8bb1-f024e2105a8d>
CC-MAIN-2023-40
https://www.melbournecliviagroup.org.au/articles/clivia-species/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.19/warc/CC-MAIN-20230923162848-20230923192848-00050.warc.gz
en
0.961798
2,100
3.296875
3
1.719865
2
Moderate reasoning
Science & Tech.
The evolution of off-road motorcycles, commonly called dirt bikes, is a long and complicated story. The first motorcycles were actually nothing more than modified bicycles with attached gasoline engines. These powered bicycles were amazing inventions in their day. Unreliable, but amazing methods of transportation, these motorcycles began captivating people across the globe. Since paved streets were not quite the norm at the time, motorcycles generally could be considered dirt bikes right from the start. No single person or company has been credited with the invention of the dirt bike. Off-road motorcycling is really an evolution of many years, with better tires, better suspension and seats, stronger frames, and better control features being credited to many individuals who were essentially modifying their own bikes for better off-road use. Triumph motorcycles did however design a motorcycle specifically built for dirt riding in 1914, although this model is not actually credited with being the first dirt bike. Motocross racing seems to have had it origins in Europe, very possibly France with these early motorcycles being raced through wooded trails or racing to the top of a mountainous road for publicity. Many of these early races were not races of speed but races against time where riders simply competed against each other on an individual basis. Racing expanded as did the production of motorcycles to include scrambles and cross country events which excited and entertained spectators. Incidentally, the word motocross was derived from the words motorcycle and cross-country. The races would eventually be moved to a shorter, closed track for easier viewing by the spectators and better monitoring of the racers themselves. With the world at war and the Great Depression, off-road motorcycles may not have been a priority concept with people for many years but the interest in dirt racing wasn’t about to go away. Then Soichiro Honda came along in 1946 with his idea to produce cheap transportation for people after the second world war. Honda became the most predominant name in motorcycles and dirt bikes in particular, undoubtedly due to the fact that they are the largest motorcycle manufacturer in the world. They were joined by other manufacturers over the years who would eventually become household names as well. Suzuki produced their first motorcycle in 1954, Yamaha in 1955, and Kawasaki in 1960. Although dirt bikes were still far in the future for the big four, this was the beginning of the onslaught of a motorsport unlike any other. Dirt bikes and dirt bike racing would eventually become one of the most popular motorsports in the world. After a mix of both two stroke and four stroke motors in various models through the years, Honda finally designs and builds a competitive two stroke motocross motor in 1972. It reached the USA in 1973 and is called the Elsinore CR250. It immediately becomes the fastest production off-road race bike in its class and placed Honda alone at the top of the heap in regard to motocross racing. In the 1970’s, motocross racing would finally do what motorcycle manufacturers hoped it would. Off-road motorcycling would become a recreational activity not unlike bicycling with its popularity exploding among the general public. The big four Japanese manufacturers would eventually produce a full product line of dirt bikes in a variety of sizes for various racing classes and ages. Children’s dirt bikes would become available for those early starters and dual-use motorcycles would also become available with dirt tires and suspension along with street-legal features. Other manufacturers also joined the specialized dirt bike market including Maico, Gas Gas, and KTM. To this day, dirt bikes continue their evolution with almost constant improvement in weight reduction, suspension, engine reliability, and overall performance. They are used as weekend recreational vehicles by millions of people around the world. The world of motocross racing has become more popular than ever before thanks to dirt bike riding basically evolving into an art form. Freestyle riding and stunt riding are captivating more young riders every year and the manufacturers continue to respond by producing high quality, cutting edge dirt bikes. Chet is the webmaster of Bikes Trikes and Quads, a classified ad site dedicated to serving up free ads for motorcycles and atv’s. BTAQ also features dirt bike parts and street bike accessories from leading suppliers. BTAQ is owned and operated by Val Marketing of Carbondale, Pennsylvania.
<urn:uuid:0701d5bb-3ba5-4356-94fe-89cc97f9dd6b>
CC-MAIN-2019-35
https://mylatestcars.com/2017/01/07/the-evolution-of-the-dirt-bike/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027330913.72/warc/CC-MAIN-20190826000512-20190826022512-00273.warc.gz
en
0.981697
871
2.78125
3
2.456099
2
Moderate reasoning
Sports & Fitness
How Can Leaders Benefit from Being Kind? “A single act of kindness throws out roots in all directions, and the roots spring up and make new trees.” –Amelia Earhart There are three big dates on the calendar in November. In the US, Election Day offers the privilege and choice to express our views on those willing to serve. Veterans Day acknowledges those who have served and sacrificed for freedom. And Thanksgiving Day, introduced by George Washington in 1789 and reestablished by Abraham Lincoln in 1963, sets aside time for families to celebrate their blessings. Another date, not as widely practiced, is World Kindness Day on November 13th. While some leaders roll their eyes and offer skepticism about World Kindness Day, with the cost of incivility in the workplace rising, more leaders are curious about what they can do. They wonder if demonstrating kindness can make a difference. Current research suggests that there are distinct benefits not only for the person receiving a kindness, but for the giver and those who witness a kindness, as well. A recent book by David R Hamilton, PhD., The Five Side Effects of Kindness (2017) identifies the kindness benefit as: happiness, heart health, longevity, better relationships and positive ripple effects. In fact, kind acts, when witnessed, are contagious and inspire third-party observers to be similarly good, kind, courageous and compassionate. Leaders can build a culture of respect and more positive working relationships by modeling kind actions in the workplace. A series of Oxford University experiments showed that another benefit of leaders choosing to be kind is that it has a positive effect on them personally. People being kind were happier, more satisfied with life, more compassionate, trusting, regarded humanity more positively and had greater social connections. You may wonder about the difference between acts of kindness and random ones. Random Acts of Kindness may have a greater impact in the workplace than those that are planned. There is a belief that kind people deserve kindness. When someone receives a kindness, whether they’ve earned it or not, the randomness implies that every person has inherent value and is worthy of kindness. The random acts seemed to boost morale, anticipation and positive outlooks. Kind acts have distinct benefits for leaders. And with recent natural disasters, violence and tragedies across our nation and around the world, employees seek leaders who offer encouragement and kind acts to help renew the human spirit. Take a moment to choose an act of leadership kindness today. Make a donation, volunteer, send a note or do something unexpected. For suggestions, download Leadership and Random Acts of Kindness.
<urn:uuid:eb610ec6-e9b7-47be-b184-b0cb7e118a0c>
CC-MAIN-2019-09
https://innolectinc.com/how-can-leaders-benefit-from-being-kind/
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247494424.70/warc/CC-MAIN-20190220024254-20190220050254-00379.warc.gz
en
0.94752
527
2.5625
3
2.879154
3
Strong reasoning
Social Life
This article was originally published by the S. Rajaratnam School of International Studies (RSIS) on 18 January 2017. UN Resolution 2334 condemning Israeli settlements was passed by the Security Council only because the US did not exercise its usual veto. As expected, the resolution was strongly opposed by Israel, which threatened to cut its funding to the United Nations. As we face an uncertain global order, it is crucial that countries work within the international system. UNITED NATIONS Resolution 2334, and the abstention vote by the United States, was a significant exercise in international diplomacy and its relationship with international law. The resolution condemned Israel’s illegal but expanding settlement project and demanded that Israel “immediately and completely cease all settlement activities in the ‘occupied’ Palestinian territory, including East Jerusalem.” The resolution was adopted with 14 votes in favour with only the US abstaining. The passing of the resolution, made possible because of the US’ holding back its usual veto demonstrated that the decision to do the right thing through the international system is not necessarily based on the legality of the issue. While international law is clear on the illegality of settlements, this resolution was only adopted because key actors, such as the US, decided it was time to do the right thing. This allowed the Security Council to produce a fair outcome. International Law and Weakness of the UN system While the Security Council is perhaps one of the world’s most powerful yet imbalanced international institutions, often at the mercy of the veto power of the five permanent members, this resolution demonstrated an instance where the Council issued a resolution based on merit in international law and nothing more. International law is a complicated system to say the least, and there are only some issues where the rules are clear or even codified. The issue of illegal settlements is one such. As an occupying power, Israel is obligated under the Fourth Geneva Convention to not forcibly transfer protected persons from the occupied territories to the territory of the occupying power. It is also unlawful under Article 49 for an occupying power to transfer parts of its own population into the territory it occupies. International humanitarian law therefore prohibits the establishment of settlements, and considers it a form of population transfer into occupied territory. The Security Council was initially scheduled to vote on a resolution presented by Egypt on behalf of Palestine. However, Egypt pulled back the text of the resolution at the last minute supposedly after Israeli Prime Minister Netanyahu exerted pressure on Egyptian President Abdel Fatah Al-Sisi. He also lobbied US politicians, including president-elect Donald Trump and his team, to veto the resolution. The following day saw a new resolution being introduced to the Security Council on the same subject, authored by New Zealand, Malaysia, Venezuela and Senegal. Despite settlements clearly being a violation of international law, the US abstention was a surprise to many, and signaled a drastic shift in Washington’s long-standing support for Israel. This position is however likely to reverse or even harden under the incoming Trump administration. The reasoning put forward by the US for the abstention vote was not directly connected to the illegality of settlements under international law, but about how the expanding settlement enterprise was becoming a major obstacle to the achievement of a two-State solution and a just, lasting and comprehensive peace. The process leading up to this resolution, and in many similar circumstances, confirms the dismal reality that perhaps the biggest shortcoming of international law is that its adherence and enforceability depend largely on states’ voluntary consent and compliance. Holding the System Hostage Immediately following the adoption of the Security Council resolution on Israeli settlement construction, Netanyahu ordered a cut of approximately US$7.8 million in funding to five UN institutions that he deemed especially hostile to Israel, with more funding cuts to follow. It is ironic that what started as Israel’s concerns with the US vote has extended to a reaction against the whole UN system. Being on the receiving end of an unfavourable UN resolution should not lead countries to threaten to or suspend their contributions to UN bodies. The UN and its use to a country as a member state cannot be premised on always getting favourable outcomes. However, this is not the first instance of a country threatening to boycott the system due to an unfavourable outcome. A similar trend was seen in late 2016 with states threatening to withdraw from the International Criminal Court (ICC). Burundi, South Africa and the Gambia decided to begin the process of withdrawing from the ICC because the ICC was seen as focusing inordinately and prejudicially on African states. However, Russia and the Philippines have also made statements indicating their intention to withdraw from the Court, even though in Russia’s case the Kremlin never ratified the Rome Statute following its signing in 2000. Certain member states spend more time thinking about how to get out of the international system than on righting the wrongs that would see them on the receiving end of condemnation or potential punitive action to begin with. It is likely that we will see an increase in states trying to withdraw from international institutions in the coming years, especially if major global players set the pace for others to follow. States should work together to reform the UN system and its institutions to ensure it works for everyone, instead of making threats to boycott or leave the system. After all, it’s only fair to expect everyone to play by the rules. About the Author Sangeetha Yogendran is a Senior Analyst with the Humanitarian Assistance and Disaster Relief (HADR) Programme, Centre for Non-Traditional Security (NTS) Studies at the S. Rajaratnam School of International Studies (RSIS).
<urn:uuid:b3e773e5-d80a-424e-9173-4e4c69ad5bba>
CC-MAIN-2021-49
https://isnblog.ethz.ch/international-relations/the-politics-of-legality-and-un-resolution-2334
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358480.10/warc/CC-MAIN-20211128073830-20211128103830-00299.warc.gz
en
0.961674
1,162
2.546875
3
3.036786
3
Strong reasoning
Politics
|시간 제한||메모리 제한||제출||정답||맞은 사람||정답 비율| |3 초||256 MB||36||28||28||77.778%| The Internet Computer Parts Company (ICPC) is an on-line shop that sells computer parts. Pairs of in-line electrical connectors are among the most popular parts that ICPC sells. However, they are also one of the parts that are returned more often by unsatisfied customers, because due to errors in packaging the connectors sent to the costumers may not be compatible. An in-line connector is composed of five connection points, labelled from 1 to 5. Each connection point of a connector can be either a plug or an outlet. We say two connectors are compatible if, for every label, one connection point is a plug and the other connection point is an outlet (in other words, two connectors are compatible if, for every connection point with the same label, a plug and an outlet meet when the two connectors are connected). The figure below shows examples of two connectors that are compatible and two connectors that are not compatible. ICPC is introducing a state-of-the-art Automated Checking Machine (ACM), with an optical checker, which will verify whether the two connectors packaged for a customer are indeed compatible. The complex and expensive hardware of the ACM is ready, but they need your help to finish the software. Given the descriptions of a pair of in-line connectors, your task is to determine if the connectors are compatible. The first line contains five integers Xi (0 ≤ Xi ≤ 1 for i = 1, 2, . . . , 5), representing the connection points of the first connector in the pair. The second line contains five integers Yi (0 ≤ Yi ≤ 1 for i = 1, 2, . . . , 5), representing the connection points of the second connector. In the input, a 0 represents an outlet an a 1 represents a plug. Output a line with a character representing whether the connectors are compatible or not. If they are compatible write the uppercase letter “Y”; otherwise write the uppercase letter “N”. 1 1 0 1 0 0 0 1 0 1 1 0 0 1 0 1 0 1 1 0
<urn:uuid:4baae919-8d48-448d-8e82-dd4b201b3e5d>
CC-MAIN-2017-09
https://www.acmicpc.net/problem/10395
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170613.8/warc/CC-MAIN-20170219104610-00473-ip-10-171-10-108.ec2.internal.warc.gz
en
0.900609
520
2.6875
3
1.897287
2
Moderate reasoning
Software Dev.
The three centuries from 1100 to 800 B.C. are known as the Dark Age-dark because we have too little evidence to obtain a clear picture of Greek life, and dark also because civilization took dramatic steps backward. Literacy virtually vanished, and writing stopped. Poverty and primitive conditions prevailed, causing suffering, a loss of skills, a shrinkage of the communities, a great forgetting of the past, and a halt in progress. After about 1050 B.C., however, iron began to replace bronze for weapons and utensils. Moreover, we know that there were migrations of Greeks to the Aegean coasts of Asia Minor and especially to the central region later called Ionia by 800 B.C. On the mainland, the Athenians escaped the full impact of the Dorian invasions; perhaps their good fortune started them on the way to leadership of Greece. The end of the Dark Age is closely tied to the oral composition of the Iliad (sixteen thousand lines) and the Odyssey (twelve thousand lines). It seems probable that both poems took roughly the form in which we know them at some time between 850 and 750 B.C. The Odyssey was almost surely composed later than the Iliad, though it may be a later work of the same person who composed the Iliad in his youth. This person, whom we call Homer, was really a singer, putting together in these monumental narratives shorter songs about the deeds of heroes. Such singers, accompanying themselves on stringed instruments, sang the shorter separate songs to audiences seated at table in a princely household, or to a gathering of villagers in a public square, or to soldiers around a campfire. The Iliad and the Odyssey represent only a fraction of the epic material that existed in the Dark Age; there were many other tales of heroes that were less popular or that stood the test of performance less well. The composer of the long poems was selecting favorites that, when assembled, would make a coherent narrative. Works as long as the Iliad or Odyssey would have taken several days to recite. They may have been put together specifically for some nobleman’s prolonged feast or for a religious festival. But it seems more probable that a great singer who knew many of the individual songs was inspired to assemble them. For a long time after their composition, both poems continued to be transmitted orally. In the sixth century B.C., the Iliad and the Odyssey were recited in public every four years at an Athenian festival; the law required that this be done in order and without omissions. By then, presumably, the poems had been written down; but it was not for another three centuries that a stable “scholarly” text was produced in Alexandria. The Iliad deals with a single episode that took place during the siege of Troy-the wrath of the Greek hero Achilles, who stopped fighting and sulked in his tent because the commander, Agamemnon, had taken from him a captive Trojan girl. Agamemnon had allowed himself to be persuaded to restore his own captive girl to her family, and made up for his loss by taking Achilles’ prize away. While Achilles refused to fight, the great combat continued. Eventually, when Hector, a Trojan prince, had killed Achilles’ best friend and comradein-arms, Patroclus, Achilles returned to the battle and slew Hector. At the very end he returned the body to Hector’s sorrowing father, Priam. The Odyssey tells of the ten-year wanderings of another Greek hero, Odysseus, after the siege of Troy was over, and of the extraordinary places and peoples he visited on the way back to his home on the island of Ithaca, where his faithful wife Penelope awaited him despite the attention of many suitors, and whence their son Telemachus had set out to find his father. Put in this summary form, the two stories seem blunt and commonplace. But a deep humanity pervades both. Despite the continual bloody fighting in the Iliad, modern readers-like all before them-are moved by the terror of Hector’s baby son, Astyanax, when he sees his father with his fierce plumed war helmet on; feel the truth of the passage in which the old men of Troy admit that Helen was well worth all the fuss; share the grief and dignity of Priam as he begs Achilles to return Hector’s body for a decent burial; and appreciate Achilles’ courteous generosity to an enemy when he reluctantly agrees. The romantic Odyssey, with its lotus eaters, sirens, men turned to swine by enchantment, and fierce one-eyed giant, provides similar moments of high human drama in the homecoming of Odysseus in disguise; in the responses of his favorite dog and his old nurse; and in the sorrow of the beautiful island princess Nausicaa when she finds that Odysseus will not stay and be her lover. It is possible that there are real links stretching backward from the Iliad and the Odyssey across the Dark Age, when the singer’s art was kept alive in Ionia, to heroic songs composed by Mycenaeans themselves. The long Catalog of the Ships in the Iliad, for example, lists the contingents supplied to the Greek armies at Troy by the various Greek settlements, and names their commanders. Many think it a real Bronze Age document that provides evidence about the diverse political organization of Mycenaean society: by city, by the captain the troops followed, and by tribe. The description of Odysseus’s household as including more than fifty slaves is often taken to indicate that slavery was common in Mycenaean times. And some draw conclusions from the poems about the inheritance of royal power or the existence of assemblies of elders. Whether or not we use the poems as history today, the Greeks themselves certainly did so, forming their own conception of their ancestral past from the Iliad and the Odyssey. Together with the Hebrew Bible, the Homeric poems form the greatest literary and cultural legacy of ancient people. Indeed, many modern scholars maintain that both Homeric and Hebrew civilizations grew directly from a common eastern Mediterranean background and point to many parallels in action and attitude.
<urn:uuid:1e1099eb-590f-4def-9c06-9574326b34e7>
CC-MAIN-2021-21
https://bigsiteofhistory.com/the-dark-age-homer-the-first-civilizations/
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988828.76/warc/CC-MAIN-20210507211141-20210508001141-00467.warc.gz
en
0.973657
1,300
3.828125
4
2.97546
3
Strong reasoning
History
1. Description of Our Community Muir School is a Title I magnet school in the San Diego Unified School District. We have 350 students in kindergarten through grade 12 who arrive daily from all parts of the city in school busses. Our county, San Diego County, is in the southwestern corner of the United States. We border Mexico and from the air San Diego and the Tijuana area look almost like one city. 2. Summary of Our Project Our goal is to explore San Diego and to imagine our future in this city. First, we studied local government and businesses and the jobs they provide. Then, we imagined life here in the future. Our youngest students discussed buildings they see each day and what work people do there. They drew pictures of places they like to visit. Fourth and fifth graders thought about where they might work, and they learned to imagine future jobs from looking at stores, talking to friend, or looking in the Yellow Pages or Union Tribune want ads. Sixth graders interviewed our Muir teachers about jobs they have had besides teaching. Seventh and eighth grade AVID students made connections between their college plans and jobs. The CyberFair project gave them a good reason to contact workplaces in San Diego. One eighth grader started a forum for students and workers. Seventh and eighth also wrote persuasive letters to convince today’s leaders to make changes to improve the future. High school students visited the largest employer in San Diego County--UCSD. They discovered internships and service projects during CyberFair, including work at Miramar Stables, the AMC Cinema, and a tsunami relief fundraiser. Our district career counselor trained them to look business contacts in the eye, to speak firmly and politely, and to write follow-up notes. Many high school students wrote about places where they worked or places they visited in San Diego. The government class studied the various county governments as a part of CyberFair, using email to contact mayors and coucilmen. On these pages we have collected the work of students of all ages from Muir. We are eager to see projects from other places to expand our thinking about San Diego in our global future. 3. Our Computer and Internet Access A. Percentage of students using the Internet at home:21-50% B. Number of workstations with Internet access in the classroom:more than 6 C. Connection speed used in the classroom:dedicated connection D. Number of years our classroom has been connected to the Internet:more than 6 E. Additional comments concerning your computer and/or Internet access (Optional): Six years ago we had only five student computers in our whole school, so we have learned to use the new technologies together during the past few years. Most of our students use the internet only at school or in the public library. 4. Problems We Had To Overcome Most of us are fairly new to computers. We have learned to search and to communicate online. Time was probably our biggest challenge. We solved this problem by starting early in the year and staying after school so that students could use the school computers. We hope that the project helped us with our biggest challenge--the challenge of improving school reading and math scores. 5. Our Project Sound Bite With CyberFair, we came together as a family school with students ages five to eighteen to put together a jigsaw of San Diego organizations and to imagine our future working together. 6. How did your activities and research for this CyberFair Project support standards, required coursework and curriculum standards? Content standards addressed: Information Literacy Continuum: 3.2.6: Student uses appropriate technology tools for data collection, information analysis, problem solving, group collaboration and presentation. English Writing Standards: 2.0 Writing Applications: Students write narrative, expository, persuasive, and descriptive texts. The writing demonstrates a command of standard American English and the research, organizational, and drafting strategies outlined in Writing Standard 18.104.22.168 Reading Comprehension (Focus on Informational Materials) Students read and understand grade-level-appropriate material. They describe and connect the essential ideas, arguments, and perspectives of the text by using their knowledge of text structure, organization, and purpose. Required curriculum: CyberFair helped our AVID classes complete the required study of careers, and it gave the government class an interesting way to learn about city governments. New skills: Web page building was new to all of us. For some, word-processing was also new this year. An eighth grade student taught everybody how to incorporate a free forum into our webpage. Group concepts: This is a perfect chance for us to enjoy our K-12 community at Muir. Older students helped younger ones with their projects. Younger students inspired the older ones. Role we play in our school community: We each take on some kind of leadership when we come to Muir. We are so small that everybody has to be in charge of something! We have gained a new respect for the jobs our parents do. Internet for teaching and learning: We'll always remember the day the mayor of Santee answered our email with a very candid interview! The internet not only gives us information quickly but it gives us information that is personalized in a way never before dreamed of. We are looking forward to reading the projects of other schools.
<urn:uuid:a6110c8c-d649-4088-a94a-3a1d841dd0df>
CC-MAIN-2019-04
http://www.globalschoolnet.org/gsncf/narrative_view.cfm?narrid=888
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583660818.25/warc/CC-MAIN-20190118213433-20190118235433-00533.warc.gz
en
0.953037
1,091
2.921875
3
2.459528
2
Moderate reasoning
Education & Jobs
A Self-Study Workbook with Answer Key Self-Study Workbook with Answer Key is intended to be used together with Hjulmand and Schwarz's Concise Contrastive Grammar of English for Danish Students, which is a systematic and pedagogical introduction to English grammar for Danish students at bachelor level. The workbook is divided into two parts: the first part contains exercises (different from those in the 2014 Workbook), the second part an answer key. The exercises are structured in such a way that each chapter in the grammar book matches a chapter in the self-study workbook. The answer key provides answers to the exercises, and in many cases also explains why it is the correct answer. There are exercises of many different kinds. Some aim at explanation and exemplification, others at awareness-raising and recognition of particular structures. Some aim at production, e.g. translation or insertion of particular forms or structures, others at recognizing differences between English and Danish. Finally, there are a number of exercises where students can practice identifying and correcting mistakes which are typical for Danish learners of English. ABOUT THE AUTHOR: Lise-Lotte Hjulmand is a senior lecturer at Copenhagen Business School, where she teaches English grammar and related subjects. She is also an external lecturer at Copenhagen University. Chapter 1 WORDS and WORD CLASSES 11 Chapter 2 SENTENCE ANALYSIS, FUNCTION and MATERIAL 13 Chapter 3 The NOUN PHRASE 33 Chapter 4 The ADJECTIVE PHRASE and ADJECTIVES 74 Chapter 5 The ADVERB PHRASE and ADVERBS 80 Chapter 6 The VERB PHRASE 86 Chapter 7 The PREPOSITIONAL PHRASE and PREPOSITIONS 129 Chapter 8 CONCORD 136 Chapter 9 CONSTITUENT ORDER 148 Chapter 10 MULTIPLE SENTENCES 159 Chapter 11 BRITISH ENGLISH AMERICAN ENGLISH 172 Chapter 12 PUNCTUATION and CAPITAL LETTERS 177 Chapter 1 WORDS and WORD CLASSES 190 Chapter 2 SENTENCE ANALYSIS, FUNCTION and MATERIAL 194 Chapter 3 The NOUN PHRASE 229 Chapter 4 The ADJECTIVE PHRASE and ADJECTIVES 266 Chapter 5 The ADVERB PHRASE and ADVERBS 272 Chapter 6 The VERB PHRASE 277 Chapter 7 The PREPOSITIONAL PHRASE and PREPOSITIONS 314 Chapter 8 CONCORD 319 Chapter 9 CONSTITUENT ORDER 328 Chapter 10 MULTIPLE SENTENCES 338 Chapter 11 BRITISH ENGLISH AMERICAN ENGLISH 353 Chapter 12 PUNCTUATION and CAPITAL LETTERS 357 ABBREVIATIONS and SYMBOLS 364 Bestil pensumeksemplarEr du underviser, har du mulighed for at bestille et pensumeksemplar af bogen.Gå til bestilling Har du spørgsmål? Du er altid velkommen til at kontakte os på [email protected] eller på telefon: 44 22 38 80.
<urn:uuid:dfa0a76e-dead-47a2-9b90-7bbdb3af2558>
CC-MAIN-2019-51
https://samfundslitteratur.dk/bog/self-study-workbook-answer-key
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00550.warc.gz
en
0.75633
677
3.125
3
2.245268
2
Moderate reasoning
Education & Jobs
Combat Capability [42%], Role and Missions, Structure of the Navy, in-service ships, surface ships, submarines, chronology. |Tell a friend Major Problems in Establishing of the Modern Navy Politico-Military Side of the Development of the Ocean-going Navy The Designing of Theoretical Foundation of the Development of Nuclear-Missile Weapon and Modern Ocean-Going Navy Construction of the Navy and Taking the Oceans The Challenges the Science Encountered During the Period of Military-Strategic Parity The Issues the Navy and Science Faced During 1986-1996 Military Related Technical Problems of Establishment and Development of the Modern Navy Command and Control Systems and Ways of their Solution USA as the primary superpower leading coalition of the states opposed to socialist camp and separated from the latter and the majority of its allies by oceans and seas in the military construction favored the naval forces and their missile-nuclear component in particular centering about 65-75% of their nuclear capabilities at the nuclear-powered ballistic missile submarines (NPBMS). The scheme of combat patrols of NPBMS was like a clock-work: two thirds of 41 missile carrying submarines (60’s-70’s) were in commission (the rest had been undergoing repairs), the half of them had been at sea on combat patrols (the ratio of level readiness (RLR) = 0.67, sea-to-base ratio (SBR) = 0.5). The same situation can be observed even now although the number of SSBN of Trident class in commission decreased to 16-17 units. Out of over 100 nuclear-powered attack submarines commissioned in the US Navy in the 70’s from 15 to 22 of them had been at sea at combat patrol on permanent basis meeting anti-submarine and intelligence tasks (SBR about 0.2) including Barents Sea, Seas of Okhotsk and Japan in many cases trespassing USSR marginal waters. From the 60’s US nuclear-powered attack submarines regularly started to explore the area of the Arctic and still expanding their presence there nowadays. Out of 16-20 operational US aircraft-carriers 3-4 of them had been cruising off the European and Asian coasts. Currently US Navy comprises 12 aircraft-carriers (including 7 nuclear-powered) and their number in the frontline Task Groups remained almost the same. In order to ensure stationing of their nuclear submarine forces (SSBN) in Europe the USA rented the bases in Holy-Loch (Great Britain) and Rota (Spain) the bases in Naples and Augusta for the carrier groups were rented in the Mediterranean, in Asia the submarines were assigned to Apra-Bay at Guam and the carriers to the ports of Yokosuka and Subic-Bay. Currently these bases are closed down. At the same time the USA seeming to consider the Mediterranean the most important area from geopolitical and strategic standpoints. US Naval Squadron located there since the war time in the late 40’s was reorganized into the 6th Fleet functioning as a tool for strategic politico-military leverage not only at Arab states opposing US’s allies and Israel in particular but at nations of socialist camp with the USSR in lead as well. From 1963 till 1967 the amount of SSBN on patrol and with missiles aimed at this country had been increased in the Mediterranean theater from 2 to 10. The main body of the 6th Fleet comprised two aircraft-carriers, two cruisers, four frigates, and over ten destroyers. In the Pacific and Indian Oceans the USA were represented the 7th Task Fleet with number of ships variable due to the situation namely from 50 to 225 naval and auxiliary ships and complement strength from 58 to 87 thousand men. USA introduced new types of armament in the second half of the 70’s - antiship missiles Harpoon and Tomahawk. Alongside with the increase of US Navy the bloc-allied navies of Great Britain, France, Italy, Spain, Japan and other also saw considerable increase and development. Thus the post-war politico-military situation featured constant increase of the naval forces and revitalization of blocs activities with the USA in the lead openly directed against the Soviet Union assuming to solve strategic issues and thus implementing the concept of “war conducting from the sea against the land”. This concept provided for delivering strikes by nuclear weapons of the submarines and ship-based air forces to the territory of the Soviet Union and army supply lines in Europe. In other words the expected war could have been performed with the assistance of naval forces only from with the main body of the latter consisted of the attack aircraft-carriers and SSBN. As the result the nations of the socialist commonwealth under USSR found themselves surrounded by the opposing party from the seas and oceans. In order to lift such a “blockade” it was required to command a powerful ocean-going navy, with the main striking force of the latter consisting of nuclear-powered submarines. In addition the geostrategic location of the Soviet Union without oversea bases pressed the naval forces to make their way on considerable distance, force crossing of narrow waters and channels frequently controlled by NATO Allied Naval Forces (ANF) that in turn was possible with the most surreptitious forces only. The submarines appeared to be the very efficient force to stand against the powerful surface fleet. The same role could have been performed by aircraft-carriers and the issue of their construction was addressed in the government that time. But for the country rising with much difficulty the economy had ruined by the late war the construction of such capital ships was definitely a back-breaking burden. However this issue had always being in the focus and the steps were taken gradually for its materialization. The decision taken of primary construction of the highly-efficient forces nowise meant the cold storage of surface fleet development. In the end of 40’s - 50’s yet about one third of the total funding for the Navy purposes was allocated for the surface fleet. The development of the ocean-going navy took a bit of doing from the nation for the long post-war period that can be relatively divided into four stages: - 1946-1955 – designing of theoretical foundation for the development of nuclear-missile weapon and structure of modern ocean-going navy, mass production of diesel-driven submarines, medium and small size surface ships; - 1956-1975 – the stage of ocean-going navy construction, presence of the Navy in the World Ocean; - 1975-1985 – achievement and sustaining of military-strategic parity of the Navy with NATO ANF; - 1986-1996 – the stage of justification finding of the Navy’s proposals with regard to efficiency increase and their implementation in the radically changed geopolitical situation in the world. The Designing of Theoretical Foundation for the Development of Nuclear-Missile Weapon and Structure of the Modern Ocean-Going Navy (Navy Construction Start 1946-1955)The post-war period in construction of the Armed Forces of the country in general and the Navy in particular featured increased role of both fundamental and applied including military science. It became constitutive due to sophistication of selection and decision making with regard to development of weapons and military equipment. It became obvious that the up-to-date engineering solutions were simply impossible without advancing of basic research as only empirical knowledge (as before) was not enough for solution finding. In this context it should be remembered what dedicated efforts were applied by I.V. Kurchatov, A.D. Sakharov, A.P. Aleksandrov and other distinguished scholars and research teams ruled by them in order to develop not only theoretical basis of thermonuclear weapon but the weapon itself. As the result the Soviet Union only four years later carried out nuclear tests imposing shock on the governments of the former allies especially United States that previously solely possessed the atomic bomb and rather straightforwardly threatened the Soviet Union with it. Under such circumstances only the possession of own nuclear weapon could guard against the outside aggression. Along with the development of the nuclear weapon the issues regarding the grounding and designing of weapon delivery means had been addressed. The development of ballistic and winged missiles for different purposes was advancing rather quick and steadily. In charge of these schools were academicians S.P. Korolev, V.N. Chalomei, V.P. Makeev and others. The achievements in the rocket and missile engineering appeared to be so significant that it became possible to perform the first in the world submarine firing in 1955 already (the chief designer of the missile system - S.P. Korolev, submarine’s CO – Captain of the II rank F.I. Kozlov, head of submarine’s missile division - Senior Lieutenant S.F. Bondin). Simultaneously with military rocket and missile engineering the science made progress to the benefit of cosmic exploration. The Soviet Union was the first to launch artificial satellite in 1957 and the first man get to the earth orbit in 1961. Despite of the main emphasis of the first post-war decade on the construction of diesel-driven submarines the question of nuclear powered submarines construction as nuclear delivery vehicles was posed that time already. In 1952 V.N. Peregudov was assigned to take the lead in construction of the first Soviet nuclear-powered submarine. His weight as a scholar, designer and manager was exceptionally high. His teammates called Vladimir Nikolaevich “Tupolev in shipbuilding” and Academician A.P. Alexandrov equalized his gift with I.V. Kurchatov’s. Of course V.N. Peregudov was not the only one to design the submarine. The series of eminent scientists took direct participation in sub’s project and in particular the chief designer of the reactor Academician N.A. Dollezhal, laureates of State and Lenin Prize G.A. Voronin, G.A. Gasanov, P.D. Degtyarev, V.P. Goryachev, V.I. Pershin, G.I. Kapyrin and many others. These gifted specialists had to solve the most complicated scientific and engineering issues under tight schedule. Their work equal to a heroic deed was crowned with success namely with the launch of the first Soviet nuclear-powered submarine K-3 (the Leninskiy Komsomol, project 627) and in 1958 her CO Captain of the I rank L.G. Osipenko in the presence of Commander-In-Chief of the Navy Admiral S.G. Gorshkov hoisted the naval flag. It took only a decade to increase the number of the Soviet nuclear submarines to 50! The development of the modern ocean-going navy (including nuclear submarines) required solution of scientific and engineering challenges related to shipbuilding improvement, power generation, weapon, radio detection, hydroacoustics, communication, navigation, control, etc. During the first post-war decade it was built and commissioned 248 diesel-driven submarines and 619 surface ships. Table 1 shows that by the end of the decade about 80% (482 units) of the commissioned surface ships fall on the small crafts of the “mosquito fleet”, the end of the decade also demonstrates the tendency for the increase in construction of capital ships. For total by 1955 the Navy (including ships constructed during the pre-war and wartime periods) comprised 265 diesel-driven submarines and about 900 surface ships (about 80% of them were coastal crafts). Table 1. The amount of ships commissioned for the Navy during 1946-1955 The tendency for growth of construction of diesel-driven submarines should be noted. Such a tendency proves demonstratively the increasing economical power of the Soviet Union that had managed to dig up the resources for erection of shipbuilding plants and basing sites for the Navy during difficult post-war years of recovery. Table 2. The amount of submarines commissioned for the Navy during 1956-75 By the end of the period under review the parity with the opposing side in submarines amount was achieved. The construction of the surface ships during the mentioned period suffered considerable difficulties. The Commander-In-Chief of the Navy Admiral Sergey Georgievish Gorshkov as well as his predecessor Admiral of the Fleet N.G. Kuznetsov adhered to the construction of the ocean-going fleet including surface fleet comprising aircraft-carriers and other seagoing surface ships. But the objectively needed reduction in Armed Forces that followed in the early 60’s led to the decommission of seven entirely new cruisers (including the ones finished in construction). Yet despite the subjectivity of decisions taken S.D. Gorshkov was able to convince the government on the necessity of the construction of the Navy that would meet the security interests of the nation. After 1964 the dispute around development of aircraft-carrying fleet reappeared. On one side of the fence standing against the construction of aircraft-carriers were the Director of USA and Canada Institute Academician G.A. Arbatov, Deputy Head of the General Staff Admiral N.N. Amelko and some others. The other side was represented by the Head of Naval Academy Admiral V.N. Ponikarovskiy, specialists from several Naval Research Institutes who produced reasons and correctly considered it impossible to carry out any operations at sea without air supremacy (including combat support of submarines). The second standpoint gained the upper hand and as the result the early 70’s witnessed the designing and construction of aircraft-carrying ships of project 1143. Yet the ships of this project had been carrying vertical takeoff and landing aircrafts and the latter had comparatively low airspeed and ceiling, small cruising range and the anti-ship missiles with firing range of about 500-600 km, all this made it impossible to match adversary’s Carrier Task Groups. Anyway the construction of the ocean-going navy in the Soviet Union went heavily on although not without blunders and deviations of both objective and subjective nature. During 1956-1975 it was commissioned about 900 surface ships of various purposes, including over 400 of landing ships, over 300 mine-sweepers, 7 cruisers (including 4 missile cruisers of project 58), 30 destroyers, 68 corvettes. Due to the considerable “threat from underwater” high priority was given to antisubmarine issues. At the same time there were constructed two helicopter carrier cruisers of project 1123 (Moskva and Leningrad), 45 large submarine-hunters of projects 61 and 1134 of various modifications. At the same time the possession of the great amount of ships capable to work tasks at sea was not yet the same as ocean-going navy build-up. The navy could be considered as ocean-going when being at sea the ships could fulfill tasks at the highest degree of preparedness in time of peace. So the presence of the constant threat from oceans and seas from foreign Navies that partially was at the level readiness to use nuclear weapon not only against land targets inside USSR but underwater aims as well, forced us to proceed to act more aggressively and send ships from time to time for long-haul cruises. Those ships were to scout the activities of the naval Task Forces of the opposing nations. Certainly that time the primary objective for the West from geopolitical standpoint was the Mediterranean area. That is why the Soviet naval forces started to acclimate it yet in the 50’s. Before the mid 50’s the Mediterranean theater saw 5 detachments of Soviet naval ships. Starting August 1958 Albanian government approved stationing of four diesel-driven submarines in the Bay of Valera. This number was increased to 12 submarines in a year. But in 1962 due to the tension between the governments the detachments ceased to exist with 8 submarines redeployed and the rest left in Albania. Along with the Mediterranean the Soviet navy had been exploring other areas. For instance in summer 1962 nuclear-powered submarine K-3 (project 627) made the first in the navy history a cruise to the North Pole under Arctic ice. In autumn 1963 submarines K-115 (project 627A) and K-178 (project 658) were redeployed from the Northern to Pacific Fleet through the Arctic. K-181 submarine (project 627A) planned to perform under-ice cruise in the Arctic. The first combat patrol in the North-Eastern Atlantic was carried out in spring 1963 by K-107 (project 629) and from July to September K-133 (project 627A) was the first to explore equatorial zone. Next year two nuclear submarines were transferred from the Northern to Pacific Fleet. The forces of the Pacific Fleet had been exploring the areas of the Pacific, Philippine, East China Seas and Seas of Okhotsk and Japan. In 1964 there were 5 cruises made into these areas, 12 in 1965, 27 (including 10 made by nuclear subs) in 1966. In other words increase in Navy’s numbers led to an increase of cruises to the remote areas and occasional cruises of nuclear subs had been transformed into the regular basis and these combat patrols served as the prime way of sustaining combat readiness of the Fleets. Should during the first two post-war decades the issue of combat readiness increase had been resolved by perfection of means for increasing of preparedness depending on the current situation than in later years it sustained qualitative changes based on the tactical employment of the forces in peace time on the regular basis initiated in the mid 60’s. Table 3 represents the number of combat patrols of the naval forces from 1965 till 1976. Table 3. The number of combat cruises of the Navy in 1965-1976 Table 3 demonstrates the advancement in number of combat patrols of nuclear submarines including ballistic-missile submarines and surface ships but the cruises of diesel-driven submarines gradually decreased. Thus established in the early 60’s the system of combat service as the primary counter-move against activities of NATO ANF by mid 70’s had already passed several stages of its making developing from patrols of single ships or groups and detachments of vessels to organization of systems of task and contingency forces, from occasional and short-run tracking of opponent’s attack groups to gaining sea supremacy in vital areas of the World Ocean, from single instances of patrols of diesel-driven submarines armed with ballistic-missiles (project 629) to organization of system capable to maintain the highest level of readiness of naval strategic nuclear forces (NSNF) when specific number of NPBMS situated at sea at combat duty at the preset level of readiness for delivery of strikes to the targets in the territory of a supposed adversary at any distance from this country. Should in 1965 the combat patrols were carried out by one submarine armed with ballistic-missiles, 5 nuclear attack submarines, 5 diesel-driven submarines, 25 surface ships then in 1976 they amounted to 38, 30, 59, and 111 respectively. For the ten years of combat service the missile-nuclear capability deployed at seas had increased more than in 200 times, the number of combat patrols of submarines increased sixfold, surface ships more than fourfold and the amount of supplies delivered to the combat service forces in 120 times. The main features of naval combat service in peacetime were (as opposed to the activities of the other branches of the Armed Forces) the following: - Vast areal range (should in the 60’s combat patrols covered only 30% of the World Ocean then in the 70’s the area increased to 80%); - Considerable remoteness of operational areas from the bases and home country (up to 12-15 thousand kilometers), the areas where no other branches of the Armed Forces can operate; - Direct contact with the naval component of the opposing nations in conditions of active interference from them (scouting and tracking with usage of electronic blanketing and other). The main principles of combat service in 60’s-70’s were the following: - Mustering strength against the main naval groups that posed the greatest threat; - Keeping contact with the main attack groups of foreign nations in the set areas and especially in the most tense periods of time; - Set of reserves for timely build-up of combat service forces; - Compliance of objectives with current situation and initial plans; - Compliance of force structure and their tactical set-up with the objectives; - Strict compliance with deception and concealment mode for the forces on combat service; - Full-scale support of the combat service forces; - Close cooperation between groups of combat service forces, reserve force, troops and units of other branches of the Armed Forces, assigned for joint operations; - Reliable command of the combat service forces. The combat service at that time answered the most efficient alternative of forces usage and provided for their redeployment, increase and replenishment of materials. The second half of the 70’s posed the following objectives for the combat service: - Combat patrols of ballistic-missile submarines; - Combat support of NPBMS in order to provide combat stability in case of hostilities break out; - Scouting and tracking foreign nuclear-powered submarines armed with ballistic-missiles, and be at level readiness to destroy them from the very beginning of a war; - Tracking carrier and other groups of foreign navies in the set areas and be at level readiness to use weapon against the primary targets. In connection with the frequent instances of foreign naval crafts (including scouts) spotting off our coasts in many cases within marginal waters of the USSR there was another challenge to appear namely deliberate denial of foreign reconnoitering in the vicinity of our coasts. Aside from the combat service, the naval forces on the regular basis had been participating at military exercises carried out under the Ministry of Defense. There were deployed about 30 surface ships, 42 submarines (8 nuclear, 4 diesel-driven armed with rockets and 30 attack submarines) during the first major exercises of the Northern Fleet in summer 1965 (codename Pechora). During Okean-70 exercises the Northern Fleet was represented by 60 surface ships and 40 submarines (including 10 nuclear-powered) and the Pacific Fleet had 32, 28 (9) respectfully. The figures for other exercises are the following: Okean-75: Northern Fleet: 38, 35 (13) – Pacific Fleet: 21, 24(10); Sever -77: Northern Fleet: 19, 22 (10); Raduga -77: Pacific Fleet: 11, 21 (10); Okean-80: Both Fleets: over 70, 50 (including 21 NPBMS). While the exercises the missile submarines had been practicing to perfection the transition to the highest level of readiness for strikes delivery with the rest of the of the forces supporting their stability by means of training in destruction of carrier air groups, convoys, landing forces and submarines sweeping. Mass production of the ocean-going navy and its presence in the oceans delivered a set of problems to the government and resolving of it required further development of military science and perfecting of research methods. One of the major issues was the further construction of the navy not as the given set of naval crafts but as the unified combat system comprising several subsystems namely strike (crafts and weapon proper), support (combat support forces), command and control (means of control and communication), maintenance (means of technical assistance and logistic support). Handling of this issue required theoretical justifications of navy’s balance not only between different branches of the navy but directly between the branches and their infrastructure as well with the main justification criterion “efficiency vs. cost”. Due to continuous enhancement of naval warfare means, considerable reduction of submarines noise, development of precision long range weapons the problem appeared related to battle support of the forces including provision of intelligence data and target marking. Increasing of speed for the “delivery” of weapon to the remote targets required enhancement control and command methods on the basis of automation principles. The military science also faced a problem of naval operations improvement with regard to selection of the most proper way to run such operations as well as strategic and tactical principles of naval forces usage. Solution of the first issue was assigned to the Ministry of Defense Research & Development (R & D) Institutes (that had been “rendering services” to the Navy, as for the second issue it was basically covered by the Naval Academy. Therefore it was necessary to encourage the progress of the military science as much as possible because the further development was almost impossible without implementation of the latest achievements in radio electronics and application of military cybernetics practices. Regrettably in the first post-war years the development of the cybernetics was checked on account of purely subjective reasons. Yet the first half of the 50’s all the sectors of the national economy and security saw the quick advancement of computing technology. Under very tight schedule there had been developed and commissioned the first Soviet computing machines such as Strela, Ural, BESM, portable units M-2, M-3 and others. One of the premier positions in development of the new means and equipment was taken by the military scientific institutions working on the needs of the Navy. In December 1952 the Deputy of Naval Minister Admiral N.E. Basistiy took a decision on establishment of the Naval Computation Centre (CC) with the authorities equal to R & D Institutes. The staff list of the Center was approved in August 1955 and at the same time the constriction site in Petrodvorets was allocated. In November 1955 the CC came into operation already. Initially the CC was focused upon complicated computation applicable to the designing of new types of weapon and military equipment as well as to resolving of tactical tasks. The outcome was not to be long waited as the amount of tasks resolving for the Navy purposes was increased more than twofold, the quantity and quality of computing operations improved dramatically. But fulfillment of only computing operations soon became insufficient for the Navy as it was needed to deal with the issue of prospective navy building with the features of integrated and balanced operational system and therefore development of automated command and control systems for the different levels. In March 1961 the Computation Center had been transformed into the 24th R & D Institute of the Ministry of Defense and later took the leading position in military-economic feasibility studies of the Navy development prospects and automation of naval forces command and control. Solution of issues related with the prospective construction of the Navy as the integrated operational system mostly depended on scientific coverage of the decisions taken by the government and Naval Command. Such coverage was provided by experts of systems study who had succeeded to optimally choose the directions and priorities of Navy’s development, come up with the requirements applicable to warfare and equipment corresponding with the conditions of their operational use. The highly fruitful years of scientific coverage of weapons construction programs the scholars of the Soviet military science had justified the approaches, techniques and practices equal to the world standards, and in the area of statistics systematization they left everybody behind. All in all the following groups of issues related to the prospective construction of the Navy can be highlighted: - Foresight of the types, forms, and means of combat struggle at sea as well as goals and objectives of the Navy supervene; - Selection of criteria for the most efficient fulfillment of tasks by naval forces; - Argumentation of requirements set up to military characteristics and the level of development of parameters combat systems of ships, aircrafts and other warfare of the navy; - Envisaging of possible components of promising systems and attainable levels of development of their parameters; - Comparative analyses of Navy progress of highly developed naval powers; - Prospective appraisal and evaluation of qualitative composition of naval warfare; - Determining of efficient numerical strength of the Navy; - Providing balance of naval warfare composition and expedient distribution of resources for its development. Foresight of the types, forms, and means of combat struggle at sea was considered the main reference condition for weapons development justification. This was the task of naval warfare theory and the latter provided for applicable methods enabling close relationship with weapons development as it was known types, forms, and means of combat struggle in many ways defined by warfare parameters and vice versa types, forms, and means of combat struggle set a number of requirements to the warfare parameters. The first who developed the method of successive approximation were S.K. Svirin, V.S. Babii, Yu.A. Alexeev, V.N. Khyaninen and others. Basically the productivity of positive outcomes with the solutions of further tasks and the value of developed proposals was defined in many ways by the accuracy of chosen efficiency criteria. The solution of this issue was greatly contributed by R.A. Chervinskiy, G.O. Barkalaya, A.N. Zoloteev and others. The greatest value at the stage of prospective systems philosophy forming used to have argumentation of requirements set up to military characteristics on the assumption of analysis of targeted object. Such requirements had been stimulating the scholars and designers to find possible ways to give weapons the required properties. At the stage of determination of developments ways of warfare the greatest attention was paid to the parameters of the prospective weapons. The leading scholars who had been working on the issue were A.L. Zamuraev, V.M. Kolesnikov, G.A. Khoroshilov, Yu.N. Sinchenko, V.B. Naumov, Yu.K. Gavrya, G.V. Sandalov and others. Every research phase regularly witnessed comparative analyses of Navy progress of highly developed naval powers, comparison of directions, parameters and level of their warfare in order to determine targeted objects, analysis of their properties to have the basis for justification of military characteristics for development of the own naval weapons providing for qualitative superiority. The development of comparative analyses was greatly contributed by V.N. Khyaninen, I.Yu. Nychinin, S.V. Korotkevich, and others. The issue of warfare composition appraisal lies in the choice of weapons samples that from one side thanks to their military characteristics could have provided for the required types and levels of forcing of adversary’s targets and from the other could have been produced by the industry in sufficient amount in a set period of time. Determining of efficient numerical strength of the Navy was carried out generally with the help of weapons comparative assessment methods taking into account end objectives of combat struggle at sea. These methods are most generally employed while finding ways of weapons development and also in justification of general operational requirements (GOR), top level specifications (TLS), and in appraisal of projects designs when as the rule specific ships and weapons are being considered. The following people should be credited as contributors into the solution of this problem O.S. Zhukovskiy, Yu.G. Solnyshkova, L.N. Mileiko, G.S. Kondratenko, and others. The stage of efficient numerical strength determining of the Navy was one the main one and at the same time one of the final in the line of phases making the body of the study on justification of navy’s development prospects. The methods for determination of quantitative composition hold a prominent place in any systems study. In these latter days the real life presses for solution of issues of synthesis and optimization within complex systems consisting of elements bound together by functional connections. Navy systems especially nowadays can be considered as instances of such systems featuring elevated complexity of functioning mechanisms. The urgent necessity in development of methods of complex systems synthesis appeared due to implementation of goal-oriented planning and systems’ development management. In the Navy the methods of determination of quantitative composition systems took their start from the mid 60’s almost simultaneously with the methods development for military-economic studies and justification of perspectives of naval warfare development. The methods of synthesis are most generally employed while grounding the development trends and weapons programs. The development of these methods is connected with the names of M.D. Iskanderov, V.V. Bulavin and others. Providing balance of naval warfare composition and expedient distribution of resources for its development is to be resolved at last stage of justification of weapons production plans. The core of program planning method is the way for resolving the given issue. Mathematical formulation of the task of balancing of naval warfare and the principles for issue solution were outstandingly drawn up by S.G. Svirin, G.O. Barkalaya and others. In 1981 the 24th R & D Institute of the Ministry of Defense as the leading institution within the Ministry of Defense pertaining to resolving of the mentioned issues as well as analysis of combat duties and forces command and control automation in order to fulfill the assigned issues was reorganized into the Central Institute of the Ministry of Defense. For 30 years the specialists of the 24th R & D Institute of the Ministry of Defense developed over 2000 proposals and recommendations with 80% of them implemented in the Navy and industry enabling efficiency increase of the problems handling for 35-30%. The founders of combat service analysis philosophy were A.N. Zoteev, G.V. Kosintsev, M.B. Trophimov, V.I. Dudkin. It is hardly possible to overestimate the contribution of the teaching staff of the Naval Academy who in 1956-1975 had been dealing with the issue of naval warfare improvement and personnel training for the Navy. As it was already mentioned that in the 60’s the Navy started receiving great numbers of radically new ships armed with ballistic and winged missiles and anti-submarine weapon of project 629 (1959-1962), project 658 (1960-1964), project 667A (1960-1964), nuclear and diesel submarines armed with winged missiles of project 651 (1963-1968), project 675 (1968-1970), project 670 (1970), attack submarines of projects 627, 659 (1960-1964) and later project 671 with variations. This gave an impetus for the totally new approach in the theory of naval warfare namely usage of the navy for the blowing-up of military and economy strength of an aggressor at his territory, impacting and weakening of its nuclear strikes aimed at this country from the seas. At that time the most recent trend in naval warfare development was conducting of independent operations with the Navy interacting with other branches of the Armed Forces met the goal objectives mainly by its own activities. Such operations were then called “strategic operations in the ocean theater”. The creative approach was also applied to the Navy use in cooperation with Army Forces. Unlike the experience of the Great Patriotic War and the first post-war decade such cooperation took the form of Navy’s participation in land theater of operations. The increase of in value of supporting operations, wide use of electronic warfare, raised role of operational logistics became the distinctive features of the new theory of naval warfare developed in the 60’. The enhancement of naval major tactics is bound to the gift of I.S. Isakova, V.A. Petroshevskiy, A.P. Alexandrov, V.A. Belly, V.S. Lisyutin and other experts. Lack of adequate means and methods of combating missiles and overestimation of capabilities of nuclear-missile weapon gave a rise to an idea that a carrier strike group, convoy or land forces of the potential enemy could have been destructed with the help of a single submarine or a group of missile-launching aircrafts armed with nuclear weapon. Therefore it was mistakenly assumed as inexpedient to establish coordination between the branches of the naval forces both in combat and operation. Exactly this point of view was expressed by K.A. Stalbo in a discussion on the pages of Morskoi Sbornik magazine in 1960-1961. The head of Tactics Department of the Naval Academy adhered to another standpoint pressing for the necessity of participation of all-arms forces and their coordination in both combat and operation at sea. Initially the first one got the upper hand and even recognized by the command. Eventually it was overturned by theory providing enough reasons. The researches now featured the development of battle conducting methods against potential enemy possessing powerful defenses that could not be penetrated by a strike from the uniform forces. Battle conducting theory has gained a significant importance. The performance of particular researches required involvement of existing or creation of brand new mathematical tools, wide use of calculation devices, development of common arithmetic reasoning and assessment criterion of the issues under consideration. During the validation of decisions of operational objectives and running mimic warfare it was theory and skills of personnel training and executing naval operations that practiced to perfection. V.I. Potapov, V.I. Vlasov, B.B. Schukin, Yu.M. Ischeikin, A.N. Popov, G.A. Slyusarev, G.N. Shvetsov and other experts had contributed greatly to the solution of this issue. Thus the post-war period had witnessed numerous changes of naval armament systems. Subsequently every change needed the revision of naval warfare not only its theoretical but applicable part as well. Every such adjustment had been accompanied by rather punishing work that in many cases resulted in full-scale overall studies. Yet the turning point in the theory of major tactics development appeared to be the transition to nuclear-missile weapons and construction of nuclear-powered submarines. That was nothing but revolution in the art of war, war science that grounded the theories of strategic and operational forces usage. Table 4. Submarines construction in 1976-1985 This very time the Navy Command and military science came to a conclusion that the military-strategic parity approach provides for not only approximate balance of the forces built and under construction between the opposing sides but the balance in the capability of these sides to instrument the cumulated forces as well. Such a capability mainly depended upon the level of preparedness of the forces in the peacetime. That is why during the reviewing period the combat service as the highest level of Navy battle readiness called even more attention. Table 5 presents data on combat service cruises (sorties) during 1976-1985. Table 5. Combat service of the Navy in 1976-1985 The analysis of the given data shows that prior to 1981-1982 there was an increasing trend in the numbers of crafts on combat service the trend later flattened and then descended slightly. Besides should before 1979 the amount of sorties of antisubmarine, reconnaissance and naval missile-carrying aviation was rather equal in number then later it increased dramatically. It should be noted that the combat service during that period reached radically new qualitative basis. In 1976 the Mediterranean Squadron was transformed into the task group comprising no less than 40 naval ships (15-25 before) including 2-3 nuclear submarines, 3-5 diesel submarines, 3-4 large missile carrying surface ships, 7-10 antisubmarine ships including the ones equipped with helicopters and other forces. About the same time officially in the Persian Gulf a task force came into being comprised of the squadrons of ships from the Pacific and Northern Fleets. Two squadrons stayed at sea on the permanent basis far from the home ports and the rest two detachments remained in their bases and put to sea occasionally. The nuclear submarines (especially NPBMS) started to be used on the strictly regulated cycle with the prescribed sea-to-base ratio (relation of total time on combat service to service life of the ship). Cyclic usage of the forces enabled having their constant amount at combat service (See Table 6). Table 6 demonstrates that the peak of battle readiness of submarine forces in the period under review fell on the first third of the 80’ later the intensity descended slightly. It should be mentioned that yet in the palmy days the SBR of NPBMS was a little bit lower of the same of American SSBN (0.5). Table 6. Sea-to-base ratio data during 1976-1985 During the considered period the scope of issues to be resolved increased namely in strikes delivery by NPBMS including from the Arctic Ocean with breaking ice when surfacing for missiles firing; land-based targets firing increased for 3-4 times; searching and spying on adversary’s nuclear submarines – 1.5-2 times, hitting carrier task groups - 1.5-2 times. This time the Russian science including military one was dealing with development and validation of proposals for clearance of causes impacting issues solution. There was a requirement set for nuclear submarines to reduce unmasking mediums especially acoustic fields, proposal to implement more advanced reactors with liquid-metal coolant, utilize titanium alloys for pressure hulls construction enabling diving depth to one thousand meters. As before the fundamental issue to be considered in of antisubmarine assignments was the lack of getting the means of underwater situation understanding and primary detection of submarines (like American system SOSUS covering the half of the World Ocean that cost USA hundreds billions of dollars). As the mean for primary submarine detection the surface ships and submarines were equipped with systems for wakes finding that improved the antisubmarine challenge that time. The continuous combat service provided for maintenance of favorable operational situation in the most vital areas of the World Ocean for our country. For instance in 1967 and 1973 the prompt build-up of combat service forces in the Mediterranean to the required quantity normalized the situation in the Middle East not allowing the 6th US Fleet to interfere Arab-Israel conflict at Israel’s side that would have led to the escalation of hostilities. In 1983 similar normalizing mission without forces increase was fulfilled by Mediterranean Task Force of the Soviet Navy during conflict in Lebanon. In 1979 during aggression of China upon Socialist Republic of Vietnam the timely deployment of combat service forces of the Pacific Fleet in the hub areas of East China and South China Seas prevented stepping-up of the Chinese Navy and its attacks against Vietnam from sea. According to the documents related to the combat service in 1976-1985 the continuous presence of Navy’s forces in the flash point of the World Ocean allowed to deterrent aggressive pretensions of some nations (e.g. breaking attack attempts against Libya and Angola, revolution in Guinea, etc) Thus the naval forces in the 70’s-80’s solve essential combat issues in the peacetime. The Russian science greatly contributed to the Navy’s increase and its putting to sea. The analysis that had been carried out revealed serious mistakes in Navy’s construction process and the way it had been operated with regarding to commonality in shipbuilding that led to increase of ships’ types and projects and resulted in insufficient balance of naval forces between its attacking part and supporting infrastructure. In consequence of this there was increase ships with expired overhaul life and forced to stand idle awaiting plant repair. Table 7. The amount of combat service cruises during 1986-1995 The scope of issues had been dealt with before by the forces of combat service was added another issue apparently the major one at that moment of time i.e. participation in the peace-making in world’s flash points. Right with this purpose (resolving of Bosnian conflict) in 1995-1996 the detachment of Russian naval ships headed by aircraft carrier Admiral Flota Sovetskogo Soyuza Kuznetsov made a cruise to the Mediterranean Sea. Then what sort of issues the Russian science including military one was to deal with at this stage? The main one was the scientific justification of sufficiency principle for the defense purposes as the parity principle in Navy’s construction has become outdated and the Russian economy at that stage was not capable to materialize it. And what is more the very parity principle in strategic weapons led to such an accumulation of weapons of mass destruction enabling to kill all the living beings on earth and the planet itself. A special commission was called in order to define the efficiency of scientific researches. The sufficiency principle provides for construction of Armed Forces and its branches as integrated operational systems balanced between their attack subsystems and supporting infrastructures. Only system approach should be laid as the basis for the military science validating the sufficiency principle and without system approach it is meaningless trying to realize the named principle. This very objective is pursued by O.T. Shkiryaev, Yu.N. Sinchenko, A.L. Zamuraev, V.S. Gnitsevich and others. Military Related Technical Problems of Establishment and Development of the Modern Navy Command and Control System and Ways of their SolutionCommand and control of the naval forces stands for organized process of formulation and delivery to the forces of instructions and signals providing for their efficient usage in pursuing set goals in armed struggle at sea. The requirements to the qualitative and quantitative parameters of basic features of control and command as a process i.e. efficiency, flexibility, continuity, reliability, and concealment at first hand result from the doctrine of naval strategies and have been developed on the basis of adequacy of naval combat power command and control capabilities. Administrative and material basis ensuring implementing of command and control process is considered naval command and control system (CCS) comprising of hierarchy of institutions (headquarters, command centers) and control and command means operated by specially trained personnel. Should the first steps in establishment and development of CCS was done by the Russian Navy as a matter of native and international experience of seafaring and naval battles (flagship, signal flags, spyglasses, top men, flagship’s evolutions – as the means of commands and signals passing) then in the early 20th century with the mass-produced various types of ocean-going ships and long-range artillery the further development of CCS was almost impossible without holistic scientific theories and fundamental technical solutions. Creation of up-to-date CCS by means of the Soviet Navy can be split into two major stages namely early 50’s – mid 70’s, late 70’s – till present. The key factors acted as the basis for the theory and practice of establishment and development of CCS were: - Orientation of military doctrines of the leading world nation including USSR for the decisive use of nuclear-missile weapon pursuing strategic goals in the armed struggle; - Transformation of theaters of ocean and sea operations into strategic ones due to the wide construction of nuclear ocean-going fleets by the leading powers and intensive development of nuclear-missile sea-launched weapons. Change-over to the continuous operational activities of the Navy at the vast sea and ocean theaters of operations necessitated of scientific definition and validation of such features of the Navy like spacial coverage, maneuver effectiveness, battle readiness, economical efficiency. The new qualitative content and considerably more strict requirements were raised to flexibility, stability and reliability of CCS. This entailed the search for other unconventional with regard to the period of the Great Patriotic War ways of practical approach to the resolution of such military technical issues as: - Ensure high viability of CSS against nuclear weapon; - Ensure high viability of CSS in the environment of multiple interference attacks including electronic interference; - Global acquisition of information needed for decision making of force usage and coming up with the commands and signals of combat control; - Ensure the capacity to process massive streams of information under pressure of tight schedule at every commanding level; - Severe reduction if time frames in forces command. Sci-tech searching of the most efficient solutions of the mentioned issues was primarily aimed at the development of the following: - Infrastructure of Navy command authorities structure on the new qualitative basis; - Up-to-date system of forces and facilities for interpreting situation at sea and ocean theaters; - High-efficiency systems and facilities of communication and data transmission; - Systems and means of Navy command and control automation. Every mentioned trend was requiring performing series of science and technical engineering works that in its turn generated a need to engage scientific and technical potential of the whole country. With this end in view the Naval R & D Institute carried out a great number of research works and exploratory developments in order to define and validate the requirements of qualitative and quantitative parameters of CCS. In addition the results of in-depth studies and scientific and technical experiment s applicable to electronics, cybernetics, air and space technology, architecture and construction were taken into account. Thanks to the combined efforts of the experts of the Naval R & D Institute, Academy of Science, R & D Institutes of other branches the native industry managed for the period of time in view to achieve significant gains and accumulate sufficient scientific and technical reserve with regard to engineering and development of CCS of the Navy. By early 70’s the central command chain of the Navy and the Fleets received a network of the forces CCS within the protected commanding centers equipped with means of command and control. At the same time a series of experimental, engineering and practical works was carried out aimed at the development of back-up CCS infrastructure designated for maintenance of efficient control of the strategic naval forces and general purpose naval forces for the cases of global nuclear conflict. In particular during the period in consideration the forces were reinforced by ship-based command and control stations that took the form of converted cruisers of project 68U, command ship Kosmonavt Vladimir Komarov, airborne operations centers and radio relay aircrafts based on Il-22 and Tu-142 MRC (maritime reconnaissance and target marking). In addition the first steps were made towards the establishment of elements of land-based mobile CCS component in the way of vehicles and mobile railroad operations centers. At the third stage the developed scientific and technical solutions pertaining to the development of up-to-date reconnaissance and watching means enabled establishment at the Fleets of entire system for situation interpreting. In particular it was designed and commissioned maritime cosmic reconnaissance systems Legenda that allowed global coverage of seas and oceans areas and prompt delivery of surface targets coordinates directly to the naval attack forces. The Fleets received wings and squadrons of long and medium range reconnaissance aviation comprised of Tu-95R, Tu-16R, Tu-22R aircrafts. The land-based observation facilities were re-equipped allowing the increase of surveillance coverage from two to several tens of kilometers. By this time the long range hydroacoustic surveillance and over-the-horizon radiolocation research and development has advanced significantly. At the third stage the developed scientific and technical solutions pertaining to the development of high efficiency communication and data transmission means enabled establishment in the 70’s of deployed global communication system of the Navy including involvement of earth satellites namely transponders of Parus space communication system. In addition there were significant gains pertaining to engineering of communication means for infrared and ultraviolet wave bands. Special part in the fulfillment of requirements set before the process of command and control of naval forces during operations and battle actions played wide introduction of automation means in the activities of operations centers. The pre-condition for designing and implementation of the first home-produced systems and suits of command and control automation was the need to increase efficiency and accuracy of acquisition, accumulation and storage of considerable data amount, perform calculation for the planning purposes of Navy’s tactical employment. It should be noticed that the appearance of electronics and computer technologies in the country in the considered period of time animated the works in this area. In the mid 60’s the cooperation of industrial institutions under military and scientific support of the 24th R & D Institute of the Navy it was developed a pilot item of the first automated command and control system of the Navy (system AS-4). This suit was implemented at the Northern and Pacific fleets and in the Navy General Staff as well and provided for automated acquisition of data regarding to own force, adversary force and environment condition. To a considerable extent the commissioning of the AS-4 system allowed intensifying and simplifying of controlling activities for the operators and naval command. The operators of the Main Naval Operations Center and Operations Center of the Northern Fleet contributed greatly into implementation and mastering of the advanced technology. The implementation experience of the first automated command and control system of the Navy by the end of the 70’s provided for a wide range of research and development works and experiments aimed at the upgrade of existing systems and development of radically new automation systems for the Navy tacking into account the latest advances in the area of electronics and cybernetics. Among some of the major factors that directly impacted the development and scientific validation of the requirements to the parameters and features of Navy CCS of the mid 70’s should be announced the following: - Redirection of the military doctrines of the leading powers from the “massive nuclear retaliation” to “target selection” thanks to the usage of innovative technologies in the area of precision weapons development; - Wide implementation of the technological advances i.e. “artificial intelligence” into the military life; - Large scale involvement of the leading world powers in the development of the programs of global coverage of the World Ocean areas i.e. “transparent ocean”; - Development of the up-to-the minute means of electronic warfare. The factors necessitated the raise of qualitative and quantitative standards applicable to CCS of the Navy were to: - Ensure the guidance of sea-launched precision weapons flight to the targets not from the platform but from the control elements of the higher level; - Ensure information circulation within CCS in near real time scale; - Provision of capability of simultaneous integrated control of space, land, water surface and underwater areas of Navy responsibility. The outcome of the scientific studies had carried out by naval experts gave evidence that the way of the mentioned requirements was the development of integrated CSS of the Navy on the basis of new technology that would enable the possibility to integrate all the process of command and control under real time scale. The major military and technical issues to be resolved at this stage were the following: - Finding of efficient ways to create highly-accuracy automated means for reconnaissance and observation of different location including utilization of the latest digital signal processing techniques; - Finding of optimal design of automated networks and data communication channels; - Selection of efficient technical solutions of direct delivery of commands and signals from the operations centers of the higher level to the forces at sea; - Selection of efficient ways for introduction of mathematical support of the automation systems. During the period under review the conjoint studies and experiments carried out by the Naval R & D Institute, the Academy of Sciences, and a number of leading industrial institutions that came to the following results. By mid 80’s combat command-control system (CCCS) was developed and commissioned for the use of Navy CINC operation centers, the Fleets and their main divisions. This system provided for flexibility in command firstly of the strategic naval forces and main general purpose attack groups. The leading role in the development and adaptation of the mentioned system was taken by scientific and technical teams of 24th R & D Institute of the Ministry of Defense and scientific-production association (NPO) Mars. Among the scientists and designers contributed greatly to the development of this system the names of a laureate of State Prize Yu.N. Naklakov, M.G. Volkov, V.L. Luschik should be mentioned and of course the chief designer a laureate of State Prize V.V. Alekseichik. The development of CCCS for the nation’s security purposes had been performed under the supervision of Academicians N.I. Semenikhin and K.N. Trofimov. At the same time the battery of studies was commenced for the development of global automated reconnaissance and observation at sea and ocean theaters. The plans of the mentioned research and development studies envisaged the ability to equip the Navy, Fleets and directly attack naval groups with highly-accuracy data on adversary’s location in near real time scale. Out of many who worked on the development and automation of reconnaissance and observation the names of a laureate of State Prize Academician A.I. Savin, scholars Yu.V. Alekseev, L.N. Mileiko, chief designers of systems and its components Yu.P. Kuleshov, S.A. Mishukov, A.I. Voronoi, G.D. Litvinov should be remarked. As the result of research and development works considerable amount of data was accumulated pertaining to the further development of infrastructure and complete large-scale automation of back-up CCS with degree of endurance and interference resistance. There was accomplished a number of engineering developments with regard to establishment of automated systems of ship and land-based naval command and control elements based on the new concepts. Automated airborne operations center at Il-80 aircraft was developed and passed state tests by the end of the 80’s. Considerable contribution in its development was made by Yu.N. Kalashnikov, Yu.N. Golovko, A.I. Zaparov, and chief designer Yu.V. Peslik. Simultaneously with the establishment of the new operations centers of the Navy there was started a series of works on the upgrade and development of computer-based message systems and systems of data transmission to submarines and surface ships. There were created the automated communication packages providing for efficient delivery of command information to the naval forces. Considerable contribution in the development of the systems was made by N.F. Directorov, Academician V.I. Miroshnikov and many others. Upon the completion of works on automation means of information-computing systems AS-4 and CCCS, R & D Institutions of the Navy conjointly with the scientific-production industrial institutions started to carry out research and development program aimed at phased establishment of integrated automated control system Mars. The named program envisaged: - Selection of engineering solution on integration of separate ACS into the joint ACS; - Expansion of special mathematical support (SMS) applicable to automation of control process functions; - Examination of gained world experience and searching for applied was of development of ACS for the Navy in terms of using the latest software hardware. The data accumulated in the process of the mentioned program fulfillment made it possible to initiate in the late 80’s – early 90’s the actual works on automation of CCS facilities using the worldwide standard information processing technology. The works were the following: - Introduction of high performance local area networks equipped with personal computers; - Adoption and implementation of high-level machine languages, up-to-the minute methods of database building; - Mastering and introduction of “artificial intelligence” ACS methods into SMS. The whole scope of scientific and practical works on the development and advancing of the up-to-date CCS of the Navy provided all the required combat characteristics enabling efficient command of the naval forces of different levels in all kinds of developments of the unleashed aggression. Lots of efforts were spent by the scholars in development of operational command and control systems. Development of ACS of the Navy was impossible without resolving critical issues and providing for special mathematical support. The experience gained in the area of ACS development suggested that combat effectiveness is directly dependent on the scope and quality of special mathematical and software support (SMSS). The analysis of the acquired experience in SMS development, its high labor and science intensity required to work out unified scientific, methodical, and engineering basis for the solution of this issue. In 1976 according to a decree of USSR Council of Ministers in the 24th R & D Institute of the Ministry of Defense there was established the Center of Special Mathematical Support of ACS (RDI SMS since 1988) that was dealing with the variety of issues starting form development of directions and programs for special mathematical and software support of ACS, stipulating of operational and tactical requirements to practical implementation and operational support. S.M. Kostin was the first head of the SMS Center. The major scientific and practical efforts of the Center were aimed at the creation of series of naval operations physical models and a system of dual-sided service-simulating tests of combat struggle at sea as well as development and perfecting of SMS for ACS and training simulators. The following practical issues were formulated for the Center to fulfill: - Development of SMSS for ACS MBU-B2 and CCCS, models of operations and battle actions, designed tasks for Fleet’s computer information centers; - Designing SMS of ships’ combat control information systems (CCIS) and theater and tactical simulation systems and their simulation with the help of computers and later delivery to manufactures for them to install them within ships’ computing system including CCIS suit Omnibus for six submarine projects of the third generation, suits Alleya, Lesorub for surface ships, theater and tactical simulation systems Dialoma, Zapevala, Kollimator. Within a short period of time the SMS Center has become a leading institution in the area of methodology and technology of automation equipment. Besides that time conjointly with the Academy of Sciences of the Ukrainian Soviet Socialist Republic (AS UkSSR) the Center was working on the following projects: - Creation of set of programming tools for ballistic support of naval strategic nuclear forces (NPO Agat); - Development of basic programming features for information and linguistic support (ILS) ACS More (NPO Mars), AS Yupiter (AS UkSSR), MBU-B2. The achievements of Center’s activities in 1976-1985 were: - Software for tactical employment of naval strategic nuclear forces with regard to manufacturing of information-carrying medium; - Information and linguistic support of ACS More of the first generation and AS Yupiter with regard to development of dictionaries, qualifiers, and data bases; - Set of physical models of naval operations (battle actions) regarding naval operation support, NPBMS stability, forces deployment, fighting nuclear missile submarines, carrier forces, convoys, attack groups of surface ships as well as supporting landing operations and commercial shipping. The results of the studies were materialized in MBU-B2, AS Yupiter, and ACS More of the first generation. These years gave a start to the schools of mathematical programming, operations research and battle actions simulation they were led by laureate of State Prize Sh.K. Vakhitov, G.A. Velichko, I.S. Novikov and S.M. Kostin. The greatest contribution in the achievements of the results was made by N.G. Nikitin, V.A. Pavlovich, V.S. Chernov, V.L. Rodin, S.V. kochergin and S.I. Cheremushkin. In 1986-1995 the Center was dealing with the following major issues: - Development of special mathematical and programming support of automation control means for naval strategic nuclear forces, ACS More, AS Dozor-M; - Formulating scientific methods for systems engineering of programming tools of the local area network (LAN) using the latest achievements in the information processing technology; - Establishment of service-simulating tests of naval operations (battle actions); - Utilization of programming support of automation control means for process automation in planning of Navy tactical employment; - Development of prototype of graphics station at simulation stands; - Provision scientific, methodological and processing compatibility of SMS of control elements of the Navy. Conjointly with the Institutions of the Academy of Sciences and industrial organizations the following research trends were engaged: - Engineering of ballistic support system for the tactical employment of naval strategic nuclear forces (State Rocket Center of Machine Building Design Bureau named for Academician V.P. Makeev, NPO Agat); - Introduction of local area networks in the Navy operations centers (NPO Algoritm, CJSC Programprom, NPO Mars, NPO Kometa, NPO Kibernetica); - Creation of systems computers security and unauthorized access protection of software and data storages (Saint-Petersburg State Technical University NPO Mars, company Konfident, OJSC Nienshants-Zaschita). Research and development activities of the Center in 1986-1995 resulted in: - Development of computing means for detailed planning of tactical employment of naval strategic nuclear forces; - Justification local area network of Navy combat control group of 20 automation-equipped working places; - Development of application packages for automation-equipped working places in Navy command and control organizations; - Introduced simulated tactical operations system (STOS) of the Navy with integrated computer network; - Determination of software packages for quality certification of automation processes of Navy command and control. The research and development results were materialized in ACS More of the second generation, AS Dozor-M, Inford-VMF-1, STOS Azov. The most distinguished scholars involved in these researches were G.D. Litvinov, V.V. Zemlyanukhin, I.N. Zadvornov, V.S. Potekhin, Yu.P. Guschin, A.M. Zubakha, V.I. Sedov. All the activities with regard to mathematical support of ACS and automation equipment used to have and still have clear-cut scientific and application-oriented nature and ultimately take the form of handing over of an end product to a customer or implementation of developed products into systems. There are over 30 techniques and tactical operations physical models, 56 application software packages for operators commissioned in the Armed Forces. STOS Azov and computer network in the Headquarters of the Pacific Fleet are in the process of pilot operation. Right now the work of SMS R & D Institute is aimed at the automation of the activities of Navy command and control bodies with the help of personal computer networks and up-to-date computer technologies.
<urn:uuid:8892a9f4-113b-43b8-90d1-0b95aaa80ef9>
CC-MAIN-2024-10
http://rusnavy.com/science/reality/sf1.htm
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475711.57/warc/CC-MAIN-20240301225031-20240302015031-00268.warc.gz
en
0.94881
13,529
2.578125
3
2.979916
3
Strong reasoning
Science & Tech.
Agility is an important factor in Basketball. In order to dodge the opposing team, get pass them with little effort etc agility is a necessity. The anaerobic exercise I will be doing to improve my agility is by a Ladder drill. I will improvise a floor ladder by using tape or sticks. The ladder will be flat, 4 meters long with 20 cm squares (400 cm�) and 20 rungs. I will first begin with 2-4 movements going across the ladder placing only one alternative foot in the middle of each square. This will be repeated for the full length of the ladder, therefore I will have to repeat the whole sequence 5 times. I will then run through the ladder touching both feet in each square. Each week I will increase the number times I do one whole sequence by 10, starting from 50. These patterns should to some extent mimic the movements that I will be undertaking in a Basketball match. In addition, I will try to each week increase the pace at which I complete one full move. The following shows general guidelines to all the ladder skills that I will apply for an effective training: Push off from the balls of my feet and not the toes Pump my hands from shoulder height to hips Keep my elbows at 90 degrees at all times Keep my arms, shoulders and hands relaxed Try to keep my head still as much as possible A high level of stamina is extremely valuable in basketball as well as in nearly all the other physical activities. It mainly contributes to decline in the possibility of being fatigue very quickly. Hence, this will enable me to perform many skills like producing multiples of accurate shots from the beginning until the end, allow me to keep running up and down the court. I will carry out continuous training, an aerobic training in order to improve my stamina as it keeps the pulse and heart rate at a high level. There are varieties of ways in performing continuous training and I have particularly chosen to do running so as to imitate since I will be running a lot during my chosen sport basketball. I will begin by doing 25 minute runs and gradually build up in which an additional five minutes to be supplemented every week. Thus within the last week of this 6 weeks programme, I will be running for 50 minutes continuously. I will also try to increase the pace each week. My training zone will be between 60-90% of my maximum heart rate. The following is the formula deployed to find out my particular zone: 220- my age (16) = 204 maximum heart rate. 2.04 * 60= 122.4 2.04 * 90= 183.6 Therefore, I should be working within these 122.4-183.6 zones. PLANNING 4. Use of Principles of Training Specificity- The precise training I have chosen are suitable in every way to the two fitness components I am hoping to develop on. I am well conscious of the two factors in which individuals will respond differently to the same methods and each activity will have different, and specific, demands. Progression- As I progress through the programme I must increase the stress I put in my body in an attempt to improve essentially. However, these supplementary stresses I put in must be steadily increased since my body will only alter gradually, according to the amplified stress I put in. For e.g. for my muscular endurance I will each week run an additional five minute more than the previous one. This also avoids injuries in muscles because too much is not done. I am also well aware of the ‘plateauing’ effect. Overload- To actually improve, I must extend my capacity by means of augmenting the workload in which my body will responsively adjust to it. This system comprises three crucial methods: Reversibility- This is the opposite of progression in which you lose the effect from all your training. Therefore, to evade it I will ensure that I follow the programme I have planned so I know exactly what I am doing. I will acknowledge all the safety measures and will note go on holiday or abuse drugs. Nonetheless, I am also conscious of the fact that I cannot always control this factor. Tedium- To avoid tediousness I will try different things, such as running somewhere else not just around the football pitch, do my running and ladder drill while listening to some music. I will vary my programme. Frequency- This is solely to do with increasing the frequency of a skill in a given time of each training. I will increase the number of times I do a complete sequence for my agility each week. Intensity- This is merely just working harder upon the training method. Therefore, for my agility, I would perform patterns that are more complex each week and with running, I would increase my pace steadily each week. I will be training within my training zone 122.4-183.6. I must not work above or below this specific training zone that is suited to me. Time- This is solely to do with lengthening the time of each training. Thus, each week I would spend longer on the training than the previous week.
<urn:uuid:1458c447-1f4c-4011-b387-48b1bd7506d3>
CC-MAIN-2018-26
https://healtheappointments.com/effective-training-essays/
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864257.17/warc/CC-MAIN-20180621192119-20180621212119-00443.warc.gz
en
0.962026
1,029
2.796875
3
2.105786
2
Moderate reasoning
Sports & Fitness
Home Law International Handbook of Juvenile Justice AGE OF MAJORITY From 1866 to 1905 the age of criminal responsibility was 10 years of age. From age 10 to age 15 the level of maturity (the ability to act responsibly) had to be considered in court from case to case. From 1905 to 1933 the age of responsibility was 14. In the criminal law which came into force in 1933 and is still in force—with adjustments—the age of criminal responsibility was fixed at the age of 15 (Greve 2004). Neither Denmark nor any other Scandinavian Country have (or have ever had) a particular Juvenile Justice system or Juvenile Justice Law and in all the Scandinavian Countries the age of criminal responsibility as well as the age of (sexual) consent is 15. However, this tradition is currently being challenged by Denmark. The first challenge to this long tradition was in the period between July 2010 and February 2012 where the age of criminal responsibility was lowered to 14. One political party (Danish People’s Party) had proposed this several times before but it was always turned down. In 2009 a political situation came up where the government was in the minority and needed votes for the decision of the state budget for 2010. A compromise was made where the People’s Party voted for the budget and in return the party gained consensus on the lowering of the age of criminal responsibility. A few other rules in the Criminal Code were changed in a repressive direction at the same time such as a removal of a maximum of 8 years of imprisonment if the offender was below 18 when the offence was committed. After the following election a new government was in power and the age of criminal responsibility was returned back to 15. The age of consent was not changed and is not included in the renewed debate. In 2014 a new proposal was presented by four political parties in the Parliament. This was not a proposal for a new law but a proposal to instruct the government to bring forward a proposal for a new juvenile court directed at juveniles between 12 and 17 (B 19/2014). Included in a new court system is a new probation service and a new juvenile criminal process. Included in the proposal was an effort to be consistent with the UN Convention on the Rights of the Child that the Government should secure that juveniles could not be imprisoned with persons over the age of 18. At first this proposal was not endorsed by the Parliament. But after an election (June 2015) the new government has announced that the Juvenile Justice system will be renewed in the near future. The rhetoric in the debate for the time being (spring 2016) is concentrated on a focused response to juvenile crime, defeating the “the hard core” offenders, and things like “stopping little brothers’ involvement with crime.” On the other hand, the Minister of Justice says in public that as far as he is concerned, children should never go to prison. Important questions have still not been answered, including: what age defines the transition from child to juvenile. For the time being it seems likely that later this year Denmark will become the first Scandinavian Country to introduce a Juvenile Justice Law and a Juvenile Justice System. The age of sexual consent has not been included in the debate and is not likely to be included. It seems most likely that the age of consent will remain 15. Today it is widely believed that there is no criminal response to cases where a 14- and a 15-year-old have sexual intercourse. How a similar situation will be handed in the future if they are both included in a criminal justice system is hard to say. |< Prev||CONTENTS||Next >|
<urn:uuid:de870d48-0a53-472e-8ab1-be4a16bdd543>
CC-MAIN-2019-39
https://m.ebrary.net/33158/law/majority
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574077.39/warc/CC-MAIN-20190920200607-20190920222607-00441.warc.gz
en
0.984298
739
3.5
4
2.988055
3
Strong reasoning
Crime & Law
An intervention occurs when someone with a substance use disorder is confronted in a nonthreatening manner by family members and friends, in an effort to motivate that person to seek treatment. Individuals performing an intervention attempt to point out the person’s destructive behavior associated with substance abuse. By pointing out this destructive behavior and how it affects the individual’s friends and family, it is hoped that the person will see the need to engage in some form of treatment and agree to participate in a treatment program. Different Types of InterventionsThere are several different types of interventions. First, interventions can be classified by the number and type of people actually performing the intervention: A simple intervention occurs when one individual, most often a friend or family member, confronts the person with the substance use disorder in some kind of neutral environment. The person performing the intervention will have better success if prior to actually doing the intervention, a professional is consulted. A professional interventionist (people who have training in performing interventions and how to organize them), a therapist or substance abuse counselor, or another person who has experience/expertise in substance abuse can be consulted for advice. The person performing the intervention can discuss concerns with this individual and develop a plan. The goal is to confront the person with the substance use disorder in a nonthreatening manner, point out what the person organizing the intervention observes regarding the negative aspects of the subject’s substance abuse, express concerns for the subject, and suggest that the subject of the intervention seek treatment. Crisis interventions occur more or less on the spot when the subject’s substance abuse has resulted in some potentially threatening or dangerous situation. The individuals who are present during this time immediately confront the person with the substance use disorder and attempt to get the person to commit to a treatment program.Interventions can also follow a specific approach. These approaches require some intensive planning and organization. On the other hand, crisis interventions, because of their very nature, are typically not planned. They may, or may not, involve the use of an interventionist who is contacted at the last minute. The following approaches can be utilized in classic and family systems interventions, and to a lesser extent in a simple intervention format: - The confrontational approach is often what the media or entertainment industry depicts an intervention to be. The subject of the intervention is often chastised, confronted in an aggressive manner (as the approach title suggests), and demands are made regarding entering treatment. Consequences for not complying with the demands of the intervention are made clear. The confrontational approach has the least chance of being effective and is generally not a recommended approach. - A softer version of the confrontational approach is known as the tough love intervention. Typically, this is a classic intervention where the group meets before the actual intervention to discuss the goals of the intervention, the role of each member, and the demands and consequences of the subject not taking the advice of the group. The intervention is then implemented in a surprise manner. Each member of the group expresses concern and love for the subject, details how the subject’s substance use is affecting them, and the specific consequences that will be placed on the subject if treatment is not sought. Most often, these consequences will range from a lack of support (emotional or financial support)to participants stating that they will no longer be involved on a personal level with the subject if treatment is not sought. The intervention is an attempt to shift the power from the person with the substance use disorder to the members of the group, and to use coercion to get the subject to change. Research indicates that coercion is not the most effective form of persuasion when trying to institute change in an individual. The Love First approach is a softer version of the tough love form of intervention. It too is a classic intervention model. Members meet prior to the intervention with a therapist or interventionist to develop the plan for the intervention. Depending on the situation, there may be more than one such meeting. Each member of the team is instructed to write a letter to be read in the intervention. There are three components to each letter: - The introduction discussing how the two people met and their experiences together - The body that expresses the affection that the team member has for the individual who is the subject of the meeting - A conclusion section that explains that the author will be available to help the person throughout recovery The Johnson Model of intervention consists of the usual team of family and friends and a therapist or interventionist. The team has an initial planning session where they decide what it is they want to explain to the subject, and the interventionist helps the team develop these goals. This is a nonconfrontational approach that focuses just on the facts regarding the individual’s substance use, the concern that the team members have for the subject, and real evidence (this can also include statistical information from research studies) as to how the individual’s substance abuse is detrimental. There is no expression of anger or blame allowed. The team also decides on a minimum of three treatment options to present to the subject. These treatment options are most effective if they cover a range of different types of treatment as opposed to three separate types of the same treatment. The research indicates that when a Johnson Model intervention is implemented, it can be successful; however, the majority of individuals who attempt this approach actually did not fully complete the intervention. The Albany-Rochester Interventional Sequence for Engagement (ARISE) model is a complex model of intervention that has three levels to its approach. It was developed as a functional alternative to the Johnson Model. Level I begins when a prospective member of the intervention team contacts a certified interventionist to help organize an intervention. The interventionist organizes an initial meeting with all members of the intervention team, and the subject of the intervention is encouraged to join the organizational meetings. Level II occurs when the actual intervention meetings take place. In this model, there can be more than one intervention meeting. The subject is encouraged to get help at these meetings and often enters treatment. In level III, the subject is presented with serious consequences if treatment is not chosen. This is a last-resort meeting. The ARISE model has empirical research to support its use and is the model developed by the Association of Interventionist Specialists to get individuals with substance use disorders into treatment. Who Should Perform an Intervention, and When Should One Be Used? Because of their very nature, interventions need to be performed by people who are close to the subject. The intervention will not be as effective if the group consists of many acquaintances who have only superficial relationships with the person. Effective interventions are typically performed by individuals who share a strong bond with the subject and care for that person. This brings the intervention to a close and intimate level that has meaning for both the people performing the intervention and for the subject of the intervention. Typically, close family members, close friends, and close coworkers are involved in the intervention. Friends or acquaintances of family members and others who do not have a solid relationship with the subject should not attend. In addition to including only individuals close to the subject, the chances of performing a smooth and successful intervention will increase if a professional interventionist is present. Interventions should be performed when it is clear that the substance use of the subject is leading to a number of negative consequences for that person and the person’s family members and close friends. Many times, individuals with substance use disorders do not conceptualize the ramifications of the substance use and engage in a number of subjective explanations and perceptions that continue to foster the substance abuse. The goal of the intervention is to make the person aware of the negative ramifications of the substance abuse and encourage the person to engage in treatment.
<urn:uuid:db41b081-9df1-408e-a3de-cb3d822ffaa5>
CC-MAIN-2017-34
http://americanaddictioncenters.org/intervention/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886133449.19/warc/CC-MAIN-20170824101532-20170824121532-00639.warc.gz
en
0.947513
1,572
3.359375
3
2.771403
3
Strong reasoning
Health
Louisa Jacobs was an author, abolitionist and activist who was born into slavery. Her mother, Harriet Jacobs, was also an author, abolitionist, and activist, born into slavery in Edenton, North Carolina, but is perhaps best known for her narrative that details her life and escape from slavery, Incidents in the Life of a Slave Girl. Louisa and her mother moved to Washington D.C. in 1862 to assist former slaves who had become refugees during the war. In 1863, the two women founded a school in Alexandria, Virginia. Louisa and Harriet left Alexandria at the end of the Civil War and moved south to Savannah, Georgia, where they continued their efforts to educate former slaves. Below is an 1866 report by Louisa Jacobs regarding her and mother's work to educate freed people in Savannah, Georgia. In the report she discusses not only events and experiences related to the school, but also the adversity and exploitation faced by the freed people in the community. I wish you could look in upon my school of one hundred and thirty scholars. There are bright faces among them bent over puzzling books: a, b, and p are all one now. But these small perplexities will soon be conquered, and the conqueror, perhaps, feel as grand as a promising scholar of mine, who had no sooner mastered his A B C's, when he conceived that he was persecuted on account of his knowledge. He preferred charges against the children for ill-treatment, concluding with the emphatic assurance that he knew a "little something now." I have called mine the Lincoln School. We learn from the record kept at the Freedmen's Bureau, that there are two thousand two hundred children here. Some six or seven hundred are yet out of school. The freedmen are interested in the education of their children. You will find a few who have to learn and appreciate what will be its advantage to them and theirs. The old spirit of the system, "I am the master and you are the slave," is not dead in Georgia. For instance, the people who live next door owned slaves. They are as poor as that renowned church mouse, yet they must have their servant. Employer and employed can never agree: the consequence is a new servant each week. The last comer had the look and air of one not easily crushed by circumstances. In the course of a few days, the neighbors were attracted to their doors by the loud voice of the would-be slaveholders. Out in the yard stood the mistress and her woman. The former had struck the latter. I am no pugilist, but, as I looked at the black woman's fiery eye, her quivering form, and heard her dare her assailant to strike again, I was proud of her metal. In a short time the husband of the white woman made his appearance, and was about to deal a second blow, when she drew back telling him that she was no man's slave; that she was as free as he, and would take the law upon his wife for striking her. He blustered, but there he stood deprived of his old power to kill her if it had so pleased him. He ordered her to leave his premises immediately, telling her he should not pay her a cent for the time she had been with them. She quietly replied that she would see about that. She went to the Bureau, and very soon had things made right. In this beautiful Forest City,—for it is beautiful notwithstanding the curse that so long hung over it,—there is a street where colored people were allowed to walk only on one side. Not long since an acquaintance of mine, while walking on what had been the forbidden side, was rudely pushed off by a white man, and told that she had no right there. She gave him to understand that Sherman's march had made Bull Street as much hers as his. Veils were not allowed to be worn by colored women. After the army came in, they went out with two on,—one over the face, the other on the back of the bonnet. Many of the planters have returned to their homes. Some wish to make contracts with their former slaves; but the majority are so unfair in their propositions, that the people mistrust them. Here is but one instance. A Mr. H—— has brought with him his old overseer. The master was noted for cruelty. For the slightest offence, he would cause his slaves to be stripped and whipped, while he would walk up and down, indulging in coarse jokes. After a hundred lashes had been given, he would say to the foreman, "Look out, there! you are not doing your duty." On which the man would take off his jacket, and say to the poor victim, "De Lord hab mercy on you now. I'se 'blige to do it." This man proposes to make contracts on these conditions: a boat, a mule, pigs and chickens, are prohibited; produce of any kind not allowed to be raised; permission must be asked to go off of the place; a visit from a friend punished with a fine of $1.00, and the second offence breaks the contract. Is this freedom, or encouragement to labor? Those who have had a taste of freedom will not make contracts with such men. Are they to be blamed, and held up as vagrants too lazy to earn a living? Others will not hire men who are unwilling to have their wives work in the rice swamps. There is no limit to the injustice daily practised on these people. There were some here, this week, who never knew they were free, until New-Year's Day, 1866. They had been carried into the interior of South Carolina. Now they are brought and driven back into the State: This references was to the Biblical story of Moses, who led the Hebrews out of Egypt, where they had been enslaved.. They are looking for "de freedom," they say. God grant they may find it! Mother, in her visits to the plantations, has found extreme destitution. We were told to-day, by Mr. Simms, the freedmen's faithful friend and adviser, Many formerly enslaved people took over plantations that had been deserted by their masters. Former slaves believed that the land also belonged to them because they had worked and lived on these plantations. Legally, though, the plantations were not theirs, and when the plantation owners returned, many slaves were were forced to leave. Others simply abandoned the plantation, fearing that their former masters would treat them unfairly or abuse them.. There are eight freedmen's schools here; the largest has three hundred scholars. The teachers of the two largest schools are colored; most of them natives of this place. These schools have been partially supported by the colored people, and will hereafter be entirely so. Jacobs, Louisa. "From Savannah." The Freedmen's Record, March 1866. Published online by Documenting the American South. University Library, University of North Carolina at Chapel Hill. https://docsouth.unc.edu/fpn/jacobs/support14.html
<urn:uuid:25418d0d-abe9-4232-acb1-761622aa8544>
CC-MAIN-2021-17
https://www.ncpedia.org/anchor/louisa-jacobs-freedmen
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038863420.65/warc/CC-MAIN-20210419015157-20210419045157-00219.warc.gz
en
0.992456
1,461
3.0625
3
2.905225
3
Strong reasoning
History
Techniques of Family Therapy I Think It's Me Difference Display as a Contextual Event, A Family With a Little Fire, The Open Door: A Structural Approach to a Family with an Anorectic Child Some psychiatric patients (most notably, young adult schizophrenics) seem unable to get better because of the pressures their families exert on them. This common clinical observation gave rise, some fifteen years ago, to attempts to treat families as a whole. The number of clinicians treating families has since multiplied (there were several thousand at the last government count, with training programs at a dozen major city teaching hospitals), and they would describe themselves as the Family Therapy movement. There are two main schools within family therapy. One derives from psychoanalysis, and is interested in how the inner lives of family members interlock. The other school, more controversial though increasingly influential, is interested in families as “systems.”The instructions of a systems-minded supervisor to a beginning family therapist might run like this: Assemble the family in one room. Ask them to pick out one of their problems and to try to negotiate a solution. Sit back and follow the structure of their conversation—the form, not the content—the sequences of “transactions” that take place. A transaction might take the form of people blaming each other, or of a child raising his demands each time the parents are about to agree, or of one person “invalidating” another’s perceptions. See what you can learn about the family by watching the patterns of their communication. Ask yourself: What alliances are formed in this family, and when? Why do their arguments never reach “closure” and what keeps happening to prevent a resolution? Where does the child’s “symptom” (for example, withdrawal or provocative courting of danger) appear in this sequence of transactions? Making observations of this kind is clearly a persuasive experience, especially as it soon becomes apparent that every unhappy family does indeed have certain sequences of “transactions” which seem to recur automatically. It is doubtful whether a young psychiatrist or social worker who tries this experiment could ever think about the problems of therapy exactly as he did before. However, to carry it out, a different sort of attention from that of a psychoanalyst is required. The psychoanalyst, deliberately using his own empathy as a tool, pays close attention to the emotional “content” of what people say. While it is true that he observes the style of communication in order to detect “defenses,” he asks himself a rather different question: What form of relationship is this patient trying to re-create with me? Family therapy shifts the emphasis to the family as a whole and to the transactions within it as they take place in the present. Many in the family therapy movement prefer to think of themselves as anthropologist-consultants to very small tribes in distress rather than as doctors who cure individual “cases” of psychological illness. Their new style of thinking was shaped by the work of the anthropologist Gregory Bateson1 and in fact all the books under review derive in part from the Palo Alto research group that, under Bateson’s leadership in the mid-Fifties, produced the “double-bind theory of schizophrenia.” This hypothesis has… This article is available to online subscribers only. Please choose from one of the options below to access this article: Purchase a print premium subscription (20 issues per year) and also receive online access to all all content on nybooks.com. Purchase an Online Edition subscription and receive full access to all articles published by the Review since 1963. Purchase a trial Online Edition subscription and receive unlimited access for one week to all the content on nybooks.com.
<urn:uuid:a8e9f1ee-6e4d-459d-9238-f8c305c8a4a6>
CC-MAIN-2016-18
http://www.nybooks.com/articles/1975/02/20/the-new-wave-in-psychiatry/
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860127407.71/warc/CC-MAIN-20160428161527-00150-ip-10-239-7-51.ec2.internal.warc.gz
en
0.964431
787
2.796875
3
2.86678
3
Strong reasoning
Health
KS2 Number Properties & Ordering Drag and drop the number tiles to their correct position on the Venn diagram. Place the number tiles into the correct order on the track. There are 3 levels of difficulty. A+Click SMS SMS stands for Short Math Situation. Don’t confuse with SMS (Short Message Service), which is used as an acronym for all types of short text messaging. The last one is the most widely used data application in the world with several billion active users. If the length of the SMS text messages is limited to 140 characters, the Short Math Situation questions are limited to 64 characters. Everything should be made as short as possible, but no shorter. A+Click SMS are: CEMC - Math Circles The Waterloo Math Circles is a free weekly enrichment activity for grade 6 to 12 students organized by the Faculty of Mathematics of the University of Waterloo. Registration All students interested in attending the Fall Math Circles in 2014/15 will need to register. Space in the program is limited – register early. The 2014/15 program will begin the week of October 6th, 2014. Games Make A Pattern Complete The Pattern Make Moon Rock Patterns Crazy Pattern Machine - 5 Levels Counting Games Connecting to Math in Real Life By Wendy Petti Who needs math games when a world of meaningful real-life fun is beckoning? It's easy and rewarding to connect to the real world in math class. On the Information Highway," we can find online collections of real-world math activities, math activities with a specific real-life focus (including natural disasters), online data sources, portals for joining or launching collaborative math and science projects, and more. Shape Worksheets I organized these shape worksheets by grade level, as sometimes, if a child is motoring ahead, or lagging behind in a certain area, the last thing you as a parent wants to do is spend time scouring a website looking for the next level worksheet. If you are currently working on a specific grade level rather than this specific topic - please vist the geometry worksheets zone. Geometry is the study of shapes, so this section cannot be overlooked by any student. Many times, because of the structure of the elementary educations, a second grader has lost much of their knowledge of shape recognition. This is because geometry is not an area of major focus in first or second grade. Hello and welcome to my 34th gems post. This is where I share five teaching ideas I've seen on Twitter. The summer holidays are finally here! Let's be honest though - although it's lovely to have the opportunity to rest and play, the majority of us do a fair amount of school work over summer - creating resources, organising and tidying, preparing for September, catching up on reading... Fields Institute - Math Circles NEWS 2014: Math Circles Instructors wanted! (Apply here) Math Circles at the Fields Institute is looking for new volunteers to teach bright high school students interesting topics in mathematics. The goal of Math Circles is to introduce different topics in mathematics not necessarily taught in school, while keeping things fun! In particular, we are looking for instructors to do one of the following topics: Introduction to Real Analysis Introduction to Graph Theory Introduction to Topology Introduction to Groups and Rings The Game of Go Game Theory Optimization
<urn:uuid:76c30328-0ac4-4e4e-b1dd-1d45659104a2>
CC-MAIN-2019-35
http://www.pearltrees.com/u/22659874-mathsstarters-great-lesson
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313536.31/warc/CC-MAIN-20190818002820-20190818024820-00521.warc.gz
en
0.920531
677
3.578125
4
1.887889
2
Moderate reasoning
Science & Tech.
“Charlotte … perform(s) particularly bad. These systems do not have enough riders to produce the economies of scale that make transit provision by rail significantly less expensive than bus.” — UC Berkeley Urban Densities and Transit: A Multi-dimensional Perspective While public transit is required to help accommodate the area’s population growth, the central question is what technology do we require to solve what problem? And when do you use one versus the other? So where rail transit might be economically sound by re-purposing along existing rail corridors surrounded by high-density populations, does it make sense to use rail transit all of the time? Is rail the only tool in the transit kit? What really matters to transit-oriented development [TOD] outcomes? According to the report, the #1 predictor is strong government support for redevelopment, while the #2 predictor is real estate market conditions. The #3 predictor is the usefulness of the transit services — frequency, speed, and reliability as ensured by an exclusive right of way. Using rail vs bus technologies does not appear to matter much at all. — yes, great bus service can stimulate development! There seems to be a continued LRT bias where advocates claim that LRT is the only way to support population growth using TOD (Transit Orient Developments) and that TOD has an inherent affinity for LRT over BRT. However, studies from the US GAO (BUS RAPID TRANSIT, Projects Improve Transit Service and Can Contribute to Economic Development) and a recent study of 21 North American transit corridors across 13 cities by the Institute for Transportation and Development Policy suggests otherwise. The study concluded that strong government support for redevelopment and real estate market conditions were the primary drivers that drove successful TOD. The use of transit technologies (rail vs bus) did not matter at all. Outside of the US, in cities like Curitiba, Brazil, and Guangzhou, China, there is copious evidence that BRT systems have successfully stimulated development. Curitiba’s early silver-standard BRT corridors, completed in the 1970s, were developed together with a master plan that concentrated development along them. The population growth along the corridor rate was 98% between 1980 and 1985, compared to an average citywide population growth rate of only 9.5%. Many cities, therefore, consider investing in mass transit to stimulate the hoped-for development. Indeed, a good mass transit investment can be such a catalyst. Yet city planners and politicians, who do not always work closely with transportation professionals, commonly begin to view mass transit in and of itself as a silver-bullet solution for stimulating development. — ITDP study, More Development For Your Transit Dollar The DOLRT study area projects 32% population growth. It is the lowest projection of the counties and regions in the study, suggesting that there are other population areas that are growing substantially FASTER than the DOLRT corridor. Based on the Alternative Analysis, the corridor study area is projected by 2035 to have a population density of 4052 ppsm or people per square mile (231K / 57). Using 1/2 mile walk-up radius around each of the 17 proposed stations, approximately 68,000 people will be within walking distance of a station. The national average for public transportation utilization is 5% (Durham 3%). This suggests walk access will be approximately 6800 daily boardings (68K * 5% * 2) rather than the projected 12,180 by GoTriangle in 2040. “It is broadly accepted that fairly dense urban development is an essential feature for a successful public transit system. Our analysis suggests that light-rail systems need around 30 people per gross acre … (for) cost-effective investments in the US … urban densities are the most critical factor in determining whether investments in guideway transit systems are cost effective” — UC Berkeley Urban Densities and Transit: A Multi-dimensional Perspective So how much population density do we need to make light rail cost-effective? Let’s do the math, there are 640 acres in one square mile. So that means we would require a density of 19,200 people per square mile. So with our current 3071 ppsm (175K / 57) along the DOLRT study corridor, that is 16% of the recommended population density. Or stated differently, we would have to reach a population of over 1 million people by 2040 (or today’s entire Wake county population) just within the 57 square mile study corridor.
<urn:uuid:cc6de29a-c53b-4c56-86be-645a0de8f117>
CC-MAIN-2019-18
https://smarttransitfuture.org/tag/growth/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578610036.72/warc/CC-MAIN-20190423174820-20190423200820-00231.warc.gz
en
0.941327
930
3
3
2.985048
3
Strong reasoning
Transportation
Instead of cooling the air to condense its moisture, desiccants attract moisture from the air by creating an area of low vapour pressure at the surface of the desiccant. The pressure exerted by the water in the air is higher, so the water molecules move from the air to the desiccant and the air is dehumidified. Most solid materials can attract moisture. For instance, plastics like nylon can absorb up to 6% of their dry weight in water vapour. Gypsum building board can also store a great deal of water vapour. The difference between these materials and commercial desiccants is capacity. Desiccants designed for water vapour collection can attract and hold over 10,000% of their dry weight in water vapour making them an exceptionally efficient vehicle for dehumidification. The essential characteristic of desiccants is their low surface vapour pressure. If the desiccant is cool and dry, its surface vapour pressure is low and can easily attract moisture from the air. When a desiccant is wet and hot its surface vapour pressure is high and it will give off water vapour to the surrounding air. Vapour moves from the air to the desiccant and back again depending on vapour pressure differences. Desiccants can be either solids or liquids - both can collect moisture. For example, the common small packet found in consumer goods is usually silica gel, a solid desiccant. Also, triethylene glycol, a liquid similar to antifreeze is a powerful desiccant which can absorb moisture. Liquid and solid desiccants both behave in the same way - their surface vapour pressure is a function of their temperature and moisture content. One subtle distinction between desiccants is their reaction to moisture. Some simply collect it like a sponge collects water - the water is held on the surface of the material and in the narrow passages through the sponge. These desiccants are called adsorbents and are usually solid materials. Silica gel is an example of a solid adsorbent. Other desiccants undergo a chemical or physical change as they collect moisture. These are called absorbents, and are usually liquids or solids that become liquid as they absorb moisture. Lithium chloride is a hygroscopic salt which collects water vapour by absorption, sodium chloride - common salt - is another. When moisture is removed from air the combined gas laws apply and heat is liberated. In a cooling-based system it is less apparent because the heat is removed immediately by the cooling coil. In a desiccant system, the heat is transferred to the air and to the desiccant so the dehumidified air usually leaves the dehumidifier warmer than when it entered the desiccant unit. The temperature rise is directly proportional to the amount of moisture removed from the air - the more moisture removed by the dehumidifier the warmer the air leaving will be. Comparing the desiccant process on the psychrometric chart clearly illustrates how desiccant dehumidification differs from cooling based systems. Using the same values as the previous example air entering the dehumidifier at 25ºC and 50% relative humidity, the dry bulb temperature rises as the moisture falls so that the total energy (enthalpy) of the air stays the same. In practice the total energy increases slightly because of waste heat transferred to the air from the reactivation process. In many applications - notably product drying and unheated storage - this temperature rise is desirable. In other cases the additional sensible heat is not an advantage and the dry air has to be sensibly cooled before being delivered to the point of use. We have mentioned four types of desiccant systems used in Industry. All have advantages and disadvantages but all types have been widely applied. By far the most common is the rotating honeycomb. Fig1: Illustration of desiccant rotor with reactivation The desiccant rotor The renowned Swedish engineer and scientist Carl Munter first patented the desiccant rotor over 50 years ago. Since then rotor technology has advanced significantly with dewpoint temperatures as low as -70ºC (0.002 g/kg) having been achieved. The restrictions on rotor design are not due to the materials utilised but the mechanical process involved in preventing leakage across seals in the equipment. Whatever desiccant or combination of desiccant rotor is used, the principle of operation is the same. The desiccant is impregnated into the semi - ceramic structure, which in appearance resembles corrugated cardboard that has been rolled up into the shape of a wheel. The wheel rotates slowly between the process and reactivation airstream. The process air flows through the flutes formed by the corrugations and the desiccant impregnated into the structure absorbs/adsorbs the moisture from the air. As the desiccant picks up moisture it becomes saturated and its surface vapour pressure rises. Then, as the wheel rotates into the reactivation airstream the desiccant is heated by the hot reactivation air, and the surface vapour pressure further rises. This allows the desiccant to release its moisture into the reactivation air. Following reactivation, the hot desiccant rotates back into the process air where a small proportion of the process air cools the desiccant so it can collect more moisture from the balance of the process airstream. This is known as the cooling section and most desiccant rotors have this fitted. This type of system has several advantages over other desiccant systems. The structure is lightweight and porous. Different kinds of desiccants - both solid and liquid - can be impregnated into the structure which allows a rotor to be tailored for specific applications. Because the flutes of the structure are like individual desiccant lined air ducts, the surface area available for drying is maximised. This reduces the static resistance significantly. Low dewpoint and high capacity - the two mutually exclusive goals - can be achieved by combining different desiccants in the same rotor. And, since the rotating mass is low compared to its moisture removal capacity the design is highly energy efficient. The one concern with this type of desiccant is the cost of the rotor. It is expensive to manufacture and care must be taken to ensure the rotor is not damaged during maintenance. However, the first cost is generally balanced by operational advantages. Efficiency, simplicity, reliability and easy maintenance make this the system the most widely installed type of all desiccant dehumidifiers. Choosing between desiccant and cooling dehumidifiers In many situations, both desiccants and cooling- based dehumidifiers can remove moisture from air, so the question arises - which type to use? Like choosing between different types of desiccants there are no simple answers but there are some general guidelines that have emerged in the industry. · Cooling and desiccant based dehumidification systems are most economical when used together. The technologies complement each other; each strength of the desiccant covers a weakness of cooling systems and vice versa. · The difference in cost of electrical power and thermal energy will determine the optimum mix of desiccant to cooling based dehumidification. Desiccant dehumidifiers can use steam, gas or electricity for reactivation energy. If thermal energy is cheap and power costs high then economics favour the desiccant to remove the bulk of the moisture. · Cooling based dehumidification systems are more economical than desiccants at high air temperatures and moisture levels. They are very seldom used to dry air below 5°C dewpoint because condensate freezes on the coil. · Desiccant systems should always be used when dewpoint of 5°C or lower are required with close control. It is relatively easy to control desiccant systems at low dewpoint when the process or application requires close control. With thanks to Mike Creamer of Business Edge who revisits his Masterclass series of articles, updating and adding to the information which proved so useful to readers when the series was first published over ten years ago. In this reincarnation, the series will cover both air conditioning and refrigeration and serve as an on-going source of technical reference for experienced personnel as well as providing a solid educational grounding for newcomers to our industry.
<urn:uuid:e598a10a-03db-4214-bc37-1f19403c3a96>
CC-MAIN-2019-51
https://www.acr-news.com/masterclass-dehumidification-part-51--
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540484815.34/warc/CC-MAIN-20191206050236-20191206074236-00345.warc.gz
en
0.932476
1,737
4.3125
4
2.657229
3
Strong reasoning
Science & Tech.
This post is part of a series of learning topics presented by technology experts. Today’s post comes courtesy of Jin Xiaocheng, Data Scientist and Data Analyst, who gives us a primer on A/B testing usage and pitfalls. The content comes from a recent training session delivered by Jin in our workplace. What is A/B testing? A/B testing means running a controlled experiment to compare results from two options. In the world of product management it is often used to test user experience and user engagement on websites and applications. You have probably heard of A/B testing done by Netflix and Facebook, where a new feature is rolled out to a limited group of users or the way content is served up is rolled out differently to different groups, and the results in user behaviour are then compared, to decide whether that change is worth rolling out to everyone. A/B testing can be simple or complex, and can be effective or not, depending on the design. Two common uses of A/B testing are: - Evaluating Return on Investment. We spent $$$ on a product or feature and believe it is successful. But is it being used? - Testing a new feature or web design by comparing results between groups of users Some pitfalls of A/B testing Jin gave us a simple case study: Case Study 1: website upgrade A company updates its website to increase user engagement. After the upgrade, the product owner reports that users are spending more time on the website, so “user engagement” is up. The upgrade is deemed a success. But is it really? There are multiple reasons why users could be spending more time on the new website, including: - The new website is more interesting and engaging – e.g. it is more fun to use, or content is surfaced better and users are staying longer to do more things - The new website is harder to navigate and users are taking longer to find what they need Based on available information from Case Study 1, there is not enough information to know. Lesson One of A/B testing: Correlation is not Causation Let’s look again at Case Study 1. Say you wanted to examine whether the fact that users are spending longer on the site is evidence of a better user experience, what could you measure? You could measure Click-Through Rate (CTR). If users are spending longer on the site, what are they clicking? Are they constantly going back and forth in menus, or are they moving through stages of a process logically? You could test this by comparing the CTR of users on the old and new website when completing the same task. But what happens if your two groups do not vary greatly on that measurement? In fact this happens quite often in A/B testing: after measuring, you may find there is little difference between the two groups. What do you do then? Can you tweak your tests? Can you change what is being tested? Should you test something different? The answer could be any of those, but you have to be wary of “hacking” your way to the desired result through changing values and tests. It could also be that what you are testing is not as significant as you thought it might be. Let’s look at another hypothetical example, for a holiday booking website. Case Study 2: testing highlighting A travel booking website wants to test whether adding a highlight to the selection button on search results encourages users to select the highlighted option. The site adds highlights to different search results, when users look for a hotel in a certain area. The site randomly assigns users to four groups A, B, C and D: A: 10% of users: search results shown without any highlighting B: 40% of users: rule-based: top ten hotels have highlighting C: 40% of users: highlight based on machine learning algorithm D: 10% of users: random 10% of results have highlighting If there is no discernible difference in the selection of hotels across these four user groups, then it can be reasonably decided that the highlighting feature is not important and isn’t needed. In fact, in most cases, highlighting works. It helps users make decisions and can help boost the site’s revenue. This has been verified by businesses using A/B testing1. But importantly, you need good design in testing, and you need to measure multiple things in the A/B tests: both Click-Through Rate (CTR) and revenue. Lesson Two of A/B testing: Comparing performance (e.g. CTR) is not always enough Sometimes, what can appear to be a significant test result, might not be. The results you see could be occurring from other factors. This opens the statistical can of worms that is p-value. P-value is the probability of obtaining the most extreme test result observed, even if there is no relationship between the two groups. In this case, if you keep testing, you can get different results. Similarly, beware of false positives, and beware of ‘null’ results. “Absence of evidence is not evidence of absence”. Jin recommends viewing ‘Dance of the P-Values’ to understand these concepts. Lesson Three of A/B testing: Know how to interpret P-value. Beware of ‘the dance of P-values’ and p-value hacking Sometimes A/B testing is not helpful. Sometimes, A/B testing is not the right tool for what you want to find out. To illustrate this, Jin showed us another case study. Case Study Three: testing ROI You are a data scientist in e-commerce, working on a virtual credit card product similar to Afterpay. Your target is to get 1 million new users in a month. You have a budget of $2m. What is your “growth hack” plan to meet your target? How can you work out whether the plan is likely to succeed? I’ll be honest here. I had ZERO suggestions for this one. I wouldn’t even know where to start. But some of the team’s suggestions were: - Offer a discount over existing providers - Use Google analytics to try to understand trends in the market, then search for businesses in industries that might be open to targeted promotion - Look at other providers and existing offers and promotions, and test if our budget allows us to compete The important factor in this case is Return on Investment (ROI). You have limited time and an ambitious target. You could come up with a plan, and you could try different approaches and A/B test them. But what if you spent your $2m budget and didn’t meet your 1m user target? Is this a good project, if you can’t test whether you can reach your target? This is the kind of question that A/B testing does not help solve. In this particular case, what was important was not the quality of tests or data, but timing. A product like this launched in 2016 had a good chance of reaching its target, given Afterpay was new and didn’t have a lot of users at that time. A similar product launched in 2020, in a saturated market, would have zero chance of meeting the same target, even with a good plan and budget. Understand the limits of A/B testing. It is not always the best evaluation tool for the situation. If you want to learn more about statistics, check out: - Be careful about P hacking https://www.youtube.com/watch?v=HDCOUXE3HMM - Power analysis https://www.youtube.com/watch?v=VX_M3tIyiYk - Dance of P values https://www.youtube.com/watch?v=5OL1RqHrZQ8 If you want to play with some very simple comparisons before and after for your website, the ‘wayback machine’ provides a simple start: https://web.archive.org/ 1Real-world examples of A/B testing: Booking.com has published academic papers about using advanced data science techniques, such as this one in the journal KDD, which shows how A/B testing is used to evaluate results of various experiments: 150 Successful Machine Learning Models: 6 Lessons Learned at Booking.com
<urn:uuid:6c168f36-59a4-47e7-b06b-878a8590fe7c>
CC-MAIN-2021-21
https://nonprojectproject.com/2020/09/02/learn-from-the-experts-a-b-testing/
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991224.58/warc/CC-MAIN-20210516140441-20210516170441-00085.warc.gz
en
0.934052
1,762
3.03125
3
2.783213
3
Strong reasoning
Science & Tech.
The Foundation of an Organic Garden Compost, its the left over bits and poop of bacteria, fungus and worms. Its filled with all sorts of goodness for plants. Thats pretty much my definition of what compost is, for a clinical definition I turn to the University of Illinois which states “Composting [is] a biological process that decomposes organic material under aerobic ([meaning] oxygen [is] required) conditions. […] Composting speeds up the natural process of decomposition, providing optimum conditions so that organic matter can break down more quickly.” The thing that I came to realize is that there are two types of composting- vermicomposting and aerobic composting. The above U. of I. description is about the bacteria composting process which is aerobic. Worm composting, like aerobic composting, creates a by product that breaks down complex organic material broken down (essentially the poop) to a consistency that plants can use it at. In trying to compost, my biggest challenge was convincing my parents, whose house I am experimenting at, to let me do it. Firstly my parents were skeptical about the whole concept because 1) you can buy the “dirt” and we had a whole lot of it; 2) it will attract fly’s and other vermin; 3) the smell will be horrible and 4) finally it will just become a big mess. Finally, there was some “past” history that didn’t bode well for me. A couple of reasons I chose to do vermicomposting involved the idea that the worms compost faster and they also control the smell. Both of which were important to addressing my parents concerns about this project. I can’t say that worms breakdown and convert the kitchen vegetable scraps faster than the bacteria. During the winter it seems like life goes slower all around so whatever I put in the composter will be an investment four to six months down the line when it comes out as platinum soil level. Constructing a Composter So depending on what you want to do- vermicomposting or aerobic- will dictate the type of composter being created. Because I had worms I need to keep out possible predators and nuisance bugs like flys. I also wanted to collect the compost tea (a nice way of calling the gross disgusting liquid that comes out of the decomposing process). The verdict is out on how beneficial it is but I tend to think that if its coming out of the process and won’t kill the weeds, then it might just be good for the flowers and rose bushes. To that end I set about to constructing a platform structure that has a mesh enclosing it all around it. I would share a schematic of it, however, one of the things I set about doing from the get go was to use as much scrap wood lying around my parents house. I can gladly say that this structure is 65% reclaimed/repurposed/recycled wood. Pretty much the only new wood I had to buy were the six post and the four sliding front panels. One thing you want to make sure of is that the wood that your using hasn’t been chemically treated- paint, stains etc. That will seep into your compost and contaminate it. If you plan to use the compost to plant vegetables you will eat, well, inevitably you will be eating those compounds in whatever form it is broken down to. It might actually be concentrated enough to kill your plants as well, so make sure you check that out before rushing to use wood around the yard. Getting the Scraps to Fuel the soil investment The continuous throwing of trash from the house hides the actual consumption that is happening in a household of five. In the two weeks I started getting my Mom to collect just veggie scraps, we found that we were throwing away close to two pounds of rinds, skins, cores, cobs, stems, leaves and what not. In a month, my family, I am estimating is throwing out close to 15 pounds of decomposing waste. This waste is not even bad for the landfills, but given the overall crap that we throw away that 15 pounds of less waste that is being converted to something productive. The way I see it that waste isnt getting thrown into a landfill where it doesnt benefit anyone or anything. 3 thoughts on “Vermicomposting- Compost for the Organic Soul”
<urn:uuid:870a6a55-6f05-4466-b32e-cb0115803943>
CC-MAIN-2023-14
https://affadshaikh.com/2012/11/20/vermicomposting-compost-for-the-organic-soul/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950247.65/warc/CC-MAIN-20230401191131-20230401221131-00669.warc.gz
en
0.96478
919
2.53125
3
2.785931
3
Strong reasoning
Home & Hobbies
Interactive dials are a great way to simulate real-world objects and tasks in your e-learning courses. Dials are similar to sliders, but where sliders move along a straight path, dials move in an arc or a circular path. Dials also use less space than sliders, so learners can quickly scroll through large amounts of data. Dials and knobs can be used to: - Explore cause-and-effect relationships - Scroll through a lot data quickly - Navigate menu items or options Challenge of the Week This week, your challenge is to share a new slider interaction. If you’re brand new to Storyline, try reworking one of the dial templates in the downloads section. New Entries Only! For this week’s challenge, we’re asking you only share new examples. You're welcome to rework an earlier example you’ve shared or come up with something entirely different. Articles and Tutorials Examples and Downloads - 4 Dial Downloads to Help You Turn Up Your E-Learning - 30+ Creative Ways to Use Interactive Dials in E-Learning #151 - 3 Dial Interactions That Show You What’s Possible - Turn Up the Interactivity with These 6 Dial Demos Share Your E-Learning Work - Comments: Use the comments section below to share a link to your published example and blog post. - Forums: Start your own thread and share a link to your published example.. - Personal blog: If you have a blog, please consider writing about your challenges. We’ll link back to your posts so the great work you’re sharing gets even more exposure. - Twitter: If you share your demos on Twitter, try using #ELHChallenge so your tweeps can track your e-learning coolness. Last Week’s Challenge: Before you dial into this week’s challenge, try your luck at the e-learning jeopardy games your fellow community members shared in last week’s challenge: Wishing you a great week, E-Learning Heroes! New to the E-Learning Challenges? The weekly e-learning challenges are ongoing opportunities to learn, share, and build your e-learning portfolios. You can jump into any or all of the previous challenges anytime you want. I’ll update the recap posts to include your demos.
<urn:uuid:0af8be2c-de73-4e7f-8a27-8e82fc90494b>
CC-MAIN-2020-50
https://community.articulate.com/articles/using-dials-in-elearning
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141180636.17/warc/CC-MAIN-20201125012933-20201125042933-00423.warc.gz
en
0.849863
504
2.671875
3
1.347042
1
Basic reasoning
Education & Jobs
Send the link below via email or IMCopy Present to your audienceStart remote presentation - Invited audience members will follow you as you navigate and present - People invited to a presentation do not need a Prezi account - This link expires 10 minutes after you close the presentation - A maximum of 30 users can follow your presentation - Learn more about this feature in our knowledge base article Do you really want to delete this prezi? Neither you, nor the coeditors you shared it with will be able to recover it again. Make your likes visible on Facebook? Connect your Facebook account to Prezi and let your likes appear on your timeline. You can change this under Settings & Account at any time. BESC 320- River Sills Transcript of BESC 320- River Sills Used to prevent mixing of fresh water flows entry of salt water into fresh water channels concrete River Sills Canals on riverbed bottoms allow for salt water to creep upstream Salt water is more dense than fresh water For the Mississippi River, channel deepening is the main cause of salt water intrusion Can progress by 3-4 miles per day Salt Water Intrusion Built to halt/ divert intruding salt water through the Mississippi River to protect habitats and drinking water 45 feet long, 45 feet tall 47 feet under water Designed to create a reservoir to hold salt water Case Study: Mississippi River Results Successful in slowing salt water intrusion rate Feasible mitigation technique on a short timeline (4-6 weeks total) Will remain stable during drought-induced low river flow levels Can be used as a model to apply to other estuarine zones in the same circumstance Case Study: Mississippi River Farthest south Parish in Louisiana 2 sills installed in 1988 and 1999 Can be used to predict larger economic changes Loss of production in fisheries, cattle ranches, and citrus groves are projected Loss of $1 billion in shipping Must import 5.5 million gallons of fresh water to meet human needs per year Sill Economics: Plaquemines Parish, LA Sills are a viable way to slow down salt water intrusion rates However, negative economic impact is high Slows down intrusion rate Under water infrastructure, no high impact on ecosystem Expensive to build and maintain May cause economic strain on the community around it Not a true solution Conclusion Depiction of sill specifications References Dr. Jeff Masters' WunderBlog : America's Achilles' heel: the Mississippi River's Old River Control Structure | Weather Underground [Web log post]. (n.d.). Elliott, D. (2013, January 29). Drought Causes Ripple Effect Along Mighty Mississippi River [Web log post]. Fagerburg, Timothy L., and Michael P. Alexander. "Underwater Sill Production for Mitigating Salt Wedge Migration on the Lower Mississippi River." Underwater Sill Production for Mitigating Salt Wedge Migration on the Lower Mississippi River (1994): 1-11. US Army Corp of Engineers. US Army Corp of Engineers. Web. 18 Apr. 2013. Grunfield, David. "Greater New Orleans." The Times-Picayune. The Times-Picayune, 16 Aug. 2012. Web. 21 Apr. 2013. Loftin, C. S., Aicher, S. B., & Kitchens, W. M. (2000). Effects of the Suwannee River Sill on the Hydrology of the Okefenokee Swamp: Application of Research Results in the Environmental Assessment Process. USDA Forest Service Proceedings RMRS-P, 3, 102-110. McWhirter, Jan. Saltwater in Mississippi Taints Drinking Supply. 2013. The Wall Street Journal. Morgan, Jan. Plaquemines Parish Profile, (2013). LSU AgCenter. Article River closed as crews start work on sill | New Orleans CityBusiness [Web log post]. (n.d.). Sanburn, Josh. The Not So Mighty Mississippi. (2013). Time. US Army Corps of Engineers (2009). Old River Control. Case Study: Mississippi River River flow and salt water intrusion Sill Economics: Plaquemines Parish, LA River Sills River Sills Above River Sill
<urn:uuid:e746b03d-d93a-4c79-87a9-608fd5f374f3>
CC-MAIN-2017-04
https://prezi.com/6mz_von0qki1/besc-320-river-sills/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279379.41/warc/CC-MAIN-20170116095119-00165-ip-10-171-10-70.ec2.internal.warc.gz
en
0.804399
902
2.609375
3
2.593822
3
Strong reasoning
Science & Tech.
Solutions to Overcrowding The current stated policy aim of all Australian governments - reduce overcrowding in Indigenous housing. The following is quoted from the FaHCSIA website. "Improving housing conditions is essential to achieving improvements in Indigenous health, education and employment to help close the gap in life outcomes between Indigenous and other Australians. Under the National Indigenous Reform Agreement, ‘Healthy Homes’ is one of seven inter-connected ‘building blocks’ — or priority action areas — that underpin the Closing the Gap strategy agreed by the Council of Australian Governments (COAG). The Australian Government has committed $5.5 billion over ten years to 2018 under the National Partnership Agreement on Remote Indigenous Housing: - significant overcrowding - poor housing conditions - the severe housing shortage in remote Indigenous communities." The policy aims may be good, and there is a lot of money promised BUT the current implementation, nationally, is poor and the chances of reducing overcrowding are very, very small. Building new houses alone will NOT reduce overcrowding ……..if this sounds impossible then read on because we believe this is a BIG ISSUE. Overcrowding effects on housing and health The National Indigenous Housing Guide (NIHG) is endorsed by Australian Federal and State Governments and is a key compliance document for the National Indigenous Housing program. One of the nine Healthy Living Practises is "Reducing the impacts of overcrowding" where some of the health risks of overcrowding are outlined alongside effective strategies for reducing the negative impacts of health through housing. Crowded living conditions increase the risk of the spread of infectious diseases, such as meningococcal disease, rheumatic fever, tuberculosis and respiratory infections. In a crowded house it can also be more difficult to access health hardware, such as hot water, showers and clothes washing facilities. To reduce these risks, consider how to minimise the effects of crowding when planning the living environment. Beware estimating house population by dividing population by house numbers because this could mean that houses will not be designed to have sufficient space and health hardware, and the residents will experience increased health risks. It is also possible that specific parts of a house can become crowded at particular times. For example, in extreme climatic conditions, all members of the household are likely to congregate in the one room of the house that is able to be cooled or heated and this can lead to the increased spread of infection, even in small households. Even if all houses in a community are fully functional, some families will choose to live in large, multi-generational households, despite other houses being available in the community. These families will not necessarily consider their house to be crowded, but could suffer health effects if the health hardware is not adequate for the number of people living in the house. A large household population can also cause health hardware to fail prematurely simply because it is constantly in use. Large populations may also result in high power bills for the main residents unless energy efficiency has been considered in house design and specification. More houses can reduce the negative impacts of over-crowding, however the example above shows that it is also necessary to design for peak populations. This can be achieved by providing more health hardware in houses, developing the yard and edges of houses to provide more household service, cooling and heating several rooms in the house, providing additional sleeping areas, and ensuring the health hardware in most houses in a community is functioning most of the time through regular maintenance. Consider the following options as solutions to overcrowding, the common reactive solution of building more houses will reduce overcrowding as opposed to a mixed solution which focuses on sustainable solutions. Does building more houses effectively reduce overcrowding? Community A has 20 houses and 120 people live in the community This gives a crowding level of 6 people per house Assume a new small house around 130 sq.m (current average size of an Indigenous house about half the size of the average non-indigenous house) can be built for $3,000 /sq.m = $400,000 approx per house + on costs = $450,000 5 houses are built in the community and there are now 25 houses with the same 120 people using the houses. The improved assumed crowding rate is reduced to 4.8 people per house (120 people / 25 houses). With a total capital cost for the 5 houses of $ 2.25m (including all costs) Crowding levels have been reduced and the national policy targets have been met.... right? House function is what delivers benefits to the resident. The NIHG highest health priority is: The ability to wash. This example will use this priority to assess overcrowding. If the 20 original houses were tested we would find that only 35% of the houses had a functioning shower to serve a total population of 120 people (from HfH national data). That means only 7 houses have a working shower to serve the total population. This means a functional crowding level of 17 people per house to have a shower. Of the 5 new houses, at least 1 will have no function due to poor initial construction (from HfH national data) Using the NIHG highest health priority: The ability to wash, this example shows the following results. 11 functioning houses for a population of 120 people. This gives a functional crowding level of 11 people (approx) per house ……for a total capital cost of $2.25 million Does a mixed solution reduce overcrowding? If we take the same community and start with a maintenance program resembling Housing for Health(HfH). This will quickly: - improve urgent safety and health function of all houses - gather data on houses and infrastructure to plan for future upgrades or new housing - employ and train local community staff Assume cost per house = $11,000 (HfH max per house) and this raises the number of houses with functioning showers to 82% (HfH achieved result) or 16 functioning houses for 120 people = This results in a functional crowding level of 7.5 people per house For a cost of 20 x $11,000 = $220,000 Using the budget spent in Option A ($2.25M) as a guide - $220,000 on initial maintenance bringing all houses up to an improved standard With the $2.05m remainder: - replace the bathroom/laundry and toilet areas in the 4 x houses that were not previously improved (4 x $100,000 = $400,000 installed (using the HfH prefab bathroom) - build 2 x new houses with a higher specification & inspection for $500k each = $1m - employ a local maintenance team for 2 years (to maintain all 22 houses using $4,000 per house x 2 years) = $200,000 Total spent would be $1.82m over 2 years on capital & ongoing maintenance Comparison of the two different approaches - cost $2.25m - provided 5 new houses, giving a total of 25 houses. - Functional crowding level for washing people of 11 people per house (with no maintenance period) - cost a total $1.82m on initial maintenance, various capital works and ongoing maintenance for 2 years - provide 22 houses with ongoing maintenance and function for 120 people - Functional crowding level for washing people of 5.4 people per house The models shown are simple and have ignored: - Population growth - Population shift - Clan and internal community dynamics that always mean population will not be equally distributed - Community anger at new houses being built with no change to existing houses and widening the housing gap Current national policy tends toward Option A: more money and crowding This means overcrowding levels will not be reduced.
<urn:uuid:9e03479a-e0c6-4236-8f54-e1443bf27d97>
CC-MAIN-2019-26
http://www.healthabitat.com/big-issues/overcrowding
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998513.14/warc/CC-MAIN-20190617163111-20190617185111-00552.warc.gz
en
0.944449
1,617
3.390625
3
2.976546
3
Strong reasoning
Home & Hobbies
Broken Arrow is a big city situated in Tulsa and Wagoner counties in the northeastern portion of the US State of Oklahoma. The city is in the Green Country region, one of the 11 ecoregions of Oklahoma, which features lush vegetation, sparkling lakes, and gentle hills. Northeastern State University is a significant institution in Broken Arrow, along with the Tulsa Technology Center. The city’s early history was deeply enshrined by the displacement of the Creek Nation influenced by the Indian Removal Act. Once an agriculturally dependent community, over many decades, Broken Arrow has emerged as having the third-highest congregation of manufacturers in Oklahoma state. Geography And Climate Of Broken Arrow Broken Arrow is situated within Tulsa County and Wagoner County of Northeastern Oklahoma. The southernmost city limits are formed by the 2,364 km long Arkansas River, a tributary of the Mississippi River. To the east, the Verdigris River runs north to south, constituting the edge of Broken Arrow, and offers scenic views at Bluffs Landing Public Use Area before joining the Arkansas River. Broken Arrow is located close to Tulsa, which is about 14 miles northwest. The other nearby cities include Muskogee, about 36 miles southeast; Winchester, about 36 miles southwest; Claremore, about 26 miles northeast; and Skiatook, about 32 miles northwest. As for day trips: Turner Falls Park is about 192 miles southwest, Red Rock Canyon State Park is 172 miles west, Wichita Mountain Wildlife Refuge is about 208 miles southwest, and the Blue Whale of Catoosa is 16 miles north. According to the Köppen Climate Classification, Broken Arrow experiences a humid subtropical climate, with muggy summers and snowy, windy winters. January is the year's coldest month with a recorded average low of 26.0 °F, while July is the year's warmest month with a recorded average high of 93.1 °F. Of the 77.6 days that produce precipitation, there is an annual rainfall of 42.0 inches and snowfall of 5.3 inches. On average, 228 days of sunshine comprise a median UV index of 4.9. History Of Broken Arrow The name Broken Arrow is a nod to the Creek Nation, who were forced to resettle from Alabama to Oklahoma amidst the Trail of Tears. Henceforth, the Creek Nation established themselves along the Rekackv Creek, with “rekackv,” meaning broken arrow. In 1902, the Missouri-Kansas-Texas Railroad set out prospects for a railroad and sold three unnamed sites to the Arkansas Valley Town Site Company. It was the duty of the company’s secretary, William S. Fears to select the names of these future towns. Just outside Tulsa and north of an Indian settlement, the name Broken Arrow was chosen after the Native American dwelling. The completion of the railroad came a year later, in 1903, and runs under the Union Pacific name as of today. Aside from the rail industry, agriculture was the main economic driver for many decades until the coal mines were discovered around the city in the 20th century. A population boom came at the height of the completion of the Broken Arrow Highway that connected the city to Tulsa in the 1960s. From here, Broken Arrow’s population has continued to explode. The Population And Economy Of Broken Arrow As per the latest US Census, Broken Arrow has a population of 113,540 residents. Expanding over 161.78 sq. km, there is a population density of 687.93 people per sq. km. Of the population, there is a median household income of $91,281. As for cultural/racial background: 75.57% are identified as White, 8.88% were two or more races, 4.96% were Native American, 4.78% were African American, 4.00% were Asian, 1.72% were of another race, 0.07% were Native Hawaiian or Pacific Islander. Of the 55,700 people employed in Broken Arrow, 7,353 work in healthcare and social assistance, 6,144 work in manufacturing, and 6,144 work in retail trade. As for the top-earning jobs: mining, quarrying, oil and gas extraction made $77,966; agriculture, forestry, fishing, hunting, and mining made $75,075; and management of companies and enterprises made $67,708. Attractions In And Around Broken Arrow Ray Harral Nature Park And Center Ray Harral Nature Park and Center offer 40 acres of wooded green space. It serves as the perfect choice for a peaceful afternoon, with 3 miles of hiking trails that feature a suspension bridge under a woodland canopy. The vast size of the center doubles as a space for a family gathering, with ample picnicking space. Just watch out for the resident wildlife, with tree frogs, turtles, and even tarantulas. The Museum Broken Arrow Come and be immersed in the local history of Broken Arrow with many interpretive and temporary exhibits. A great activity for every family member, one can learn of the impact of the Native Americans, the early days of downtown Main Street, and the significance of the railroad and coal industries. Exhibits of the note include: the Childer Cabin, Muscogee Tribal exhibit, a jail cell from old City Hall, and a working scale railroad. Bluffs Landing Public Use Area Just upstream of the Newt Graham Lock and Dam, Bluffs Landing is a locally loved spot for outdoor recreation. One can partake in waterfront camping, hiking, biking, picnicking, kayaking, and fishing on the Verdigris River. Among the most popular catches are varieties of catfish, including channel, flathead, bullhead, and many bass species. Set up a camping reservation and enjoy how surprisingly quiet Bluffs Landing is. Just don't forget the camera. Broken Arrow is home to many exciting sights that will keep one captivated by this city. There are a variety of attractions for everyone, whether one is a nature lover, history buff, or both. Although widely regarded as a bedroom community to Tulsa, Broken Arrow has taken on its unique image that is certain to please locals and tourists alike.
<urn:uuid:9f643fb9-57ef-4287-9714-ad5d9d393e98>
CC-MAIN-2023-06
https://www.worldatlas.com/cities/broken-arrow-oklahoma.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499871.68/warc/CC-MAIN-20230131122916-20230131152916-00827.warc.gz
en
0.955154
1,277
2.734375
3
1.570545
2
Moderate reasoning
History
Southern Rhodesia rejects joining the Union of South Africa Date: 27 October, 1922 Southern Rhodesia (now Zimbabwe) rejected joining the South African Union in a referendum. Voters had to choose between establishing self government, joining the Union of South Africa or continuing under the British South Africa Company (BSAC). The BSAC had governed Southern Rhodesia since October 1889 when it was granted a mining exploration charter by the British government. Its founder Cecil John Rhodes was given permission to explore the area north of the Transvaal with unlimited powers. In 1890 the BSAC founded the town of Salisbury (now Harare) in Mashonaland and named the territory Rhodesia in honour of Cecil John Rhodes. From 1890 the company operated as the government of Southern Rhodesia until 1923. In 1898 a governing body called the Legislative Council was established with members of the BSAC dominating the body. In 1910 the Union of South Africa was formed bringing together former Afrikaner Republics and the Cape Colony. South Africa was granted self governing status as a colony within the larger British set of colonies. This resulted in the division of opinions for settlers in Southern Rhodesia. As early as 1914 the Legislative Council considered the question on whether it was prudent for the BSAC to continue as governing body of the colony, or should the colony join the Union of South Africa. This was postponed as a result of the outbreak of the First World War. After the elections in April 1920, there was strong push for the need to decide on whether for Southern Rhodesia should become a British colony with self governing status or merge with the Union. In May 1920 the Legislative Council pushed for resolution of the issue. A Commission was established by the British government under the leadership of Earl Buxton. Some representatives from Southern Rhodesia visited Cape Town to consult the Jan Smuts led government on terms which they could be admitted to the Union of South Africa. Other representatives went to London to push for establishment of self government and negotiate the terms of self government. This culminated in a referendum on 27 October 1922 where the white settler minority overwhelmingly voted against merging with the Union of South Africa. In 1923 Southern Rhodesia became a crown colony with self governing status limited to white settlers. - Michael Brecher & Jonathan Wilkenfeld, (1997), A Study of Crisis, (University of Michigan Press), p.103. - Martena Tenney Sasnett & Inez Hopkins Sepmeyer, (1966), Educational systems of Africa: interpretations for use in the evaluation of academic credentials, (Cambridge University Press), p. 918. - Anon,;Rhodesia and the Central African Federation from the National Archives, Cabinet Papers 1915-1979, online Available at www.nationalarchives.gov.uk[Accessed 19 October 2010]
<urn:uuid:5bc12627-0a6d-4a20-b884-cc8cb270cc39>
CC-MAIN-2014-10
http://www.sahistory.org.za/dated-event/southern-rhodesia-rejects-joining-union-south-africa
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999669324/warc/CC-MAIN-20140305060749-00071-ip-10-183-142-35.ec2.internal.warc.gz
en
0.952444
566
3.59375
4
2.933125
3
Strong reasoning
History
01. Four Mitzvot Concerning the Prohibition against Ḥametz Four Torah commandments deal with the prohibition against ḥametz on Pesaḥ: three negative and one positive. The first prohibition is to refrain from eating ḥametz, as it is written, “And ḥametz shall not be eaten” (Shemot 13:3). Our Sages taught that the prohibition against eating ḥametz on Pesaḥ includes not deriving any kind of benefit from the ḥametz. The Torah further states: “You shall not eat any leavened product (maḥmetzet)” (Shemot 12:20). Our Sages concluded from this verse that not only something that had fermented on its own is prohibited, but even food that had been leavened by some external agent may not be eaten on Pesaḥ. It must be noted that the Torah was particularly stringent concerning the prohibition against eating ḥametz. Almost all of the Torah’s food prohibitions are punishable by lashes, while eating ḥametz on Pesaḥ is punishable by karet (extirpation), as it is written, “whoever eats ḥametz from the first day until the seventh day, that soul shall be cut off from Israel” (Shemot 12:15). The second prohibition is that no ḥametz may be found in our possession, as it is written, “Seven days there shall be no se’or found in your homes” (Shemot 12:19). Se’or is the “starter” or leavening agent used to make dough ferment. This verse means not only that se’or is forbidden, but also that no ḥametz may be found in our possession. This prohibition is often called bal yimatzei. The third prohibition is that no ḥametz may be seen in our possession, as it is written: “Matzot shall be eaten seven days; and no ḥametz of yours shall be seen, and no se’or of yours shall be seen within all your borders” (Shemot 13:7). One violates the second prohibition (bal yimatzei) and this third prohibition (called bal yera’eh) only if one has in his possession on Pesaḥ at least one olive’s bulk (kezayit) of ḥametz. If the volume of the ḥametz that remained in one’s possession was less than a kezayit, he does not violate bal yera’eh and bal yimatzei on account of that ḥametz. The fourth mitzva – a positive commandment – is to eliminate ḥametz and se’or in advance of Pesaḥ, as it is written, “Seven days you shall eat matzot; however, on the first day you shall remove the se’or from your houses” (Shemot 12:15).
<urn:uuid:6537099a-beb4-4bc8-bfcf-209608647fe4>
CC-MAIN-2023-23
https://ph.yhb.org.il/en/category/pesah/02-general-rules-of-the-prohibition-against-hametz/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644571.22/warc/CC-MAIN-20230528214404-20230529004404-00006.warc.gz
en
0.949399
667
2.53125
3
2.804543
3
Strong reasoning
Religion
Our understandings of the formation and beginnings of the universe suggest that a black hole with such a huge mass shouldn't actually have been able to form, scientists say. The existence of this supermassive black hole when the Universe was only 690 million years old, just five per cent of its current age, reinforces early models of black hole growth that allow black holes with initial masses of more than about 10M⊙ (refs 2, 3) or episodic hyper-Eddington accretion. "In some sense, what we've done is determine with a high degree of accuracy when the first stars in the universe turned on", he said. "The universe was just not old enough to make a black hole that big", Simcoe said in a statement from MIT. IPL 2018: MS Dhoni Back to Chennai Super Kings When news filtered in on Wednesday on IPL player retention, there was relief and joy in the Chennai Super Kings camp. Teams will have to spend a minimum of 75% of the salary cap for each season, the council said. "I don't think 10 or 15 years ago anybody would expect there to be such a massive black hole that early in the universe", Geballe said. The instrument was developed with the participation of the Professor Robert Simcoe, and today he operates a 6.5-meter Giant Magellan telescope, located in Chile. During its early stage, the universe went through what is sometimes called the Dark Age - not a metaphor, as it is for the human period, but a truly a dark age as there was no light. As more stars turned on throughout the universe, their photons reacted with neutral hydrogen, ionizing the gas and setting off what's known as the epoch of re-ionization. "This black hole grew far larger than we expected in only 690 million years after the Big Bang, which challenges our theories about how black holes form", said study co-author Daniel Stern of NASA's Jet Propulsion Laboratory. To make things even more interesting, this appears to be a supermassive black hole - the most massive known objects in the universe, the likes of which are thought to lie at the center of all galaxies. They extrapolated from that to estimate that the universe as a whole was likely about half neutral and half ionized at the time they observed the quasar. Healthy Living: CDC says flu cases this year are double; get vaccinated Flu is a contagious respiratory illness that is spread mainly through droplets in the air when people cough, sneeze or talk. Doctors add that even if the vaccine is only 10% effective, it's still important to get one. The object was discovered by Eduardo Bañados, an astronomer at Carnegie, as he was looking through multiple all-sky surveys - maps of the distant universe. Follow-up observations, as well as a search for similar quasars, are on track to put our picture of early cosmic history onto a solid footing. Astronomers have at least two gnawing questions about the first billion years of the universe, an era steeped in literal fog and figurative mystery. "We now have the most accurate measurements to date of when the first stars were turning on". That means that the black hole quasar was formed exactly during that reionization phase after the Big Bang event. Extremely large black holes, such as the one identified by Simcoe and his colleagues, should form over periods much longer than 690 million years. This research was supported, in part, by the National Science Foundation (NSF), with support from construction of FIRE from NSF and from Curtis and Kathleen Marble. Tennessee hires Alabama assistant Jeremy Pruitt as coach Reports linked Oklahoma State's Mike Gundy and Purdue's Jeff Brohm to Tennessee's vacancy, but both stayed with their teams. Alabama topped the nation in run defense last season and ranks third in that category this year.
<urn:uuid:27ee1e82-ac7d-4454-8252-70a4f3b34079>
CC-MAIN-2018-13
http://weekly-recorder.com/2017/12/scientists-have-discovered-an-anomalous-black-hole/
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648000.93/warc/CC-MAIN-20180322190333-20180322210333-00599.warc.gz
en
0.969782
806
3.265625
3
2.873153
3
Strong reasoning
Science & Tech.
Community cooperation models the same design of Nature for self-prolific and self-sustainable systems. Through beneficial partnerships with each other we too can unlock the unlimited potential within each other through community cultivation. Soil, light, darkness, and the cool refreshing gift of water. In all, they are supporters of life. Soil bacteria, fungi, and insects infiltrate every niche and space in the underworld creating a rich soup of goodness for our plants known as humus (grow chick peas or garbanzo beans with herbs and spices to make hummus). Which leaves us with the critical question of how do you prepare the soil? It depends, but this post is about community in relation to soil and gardening. (Give me some time and I’ll write about soil another day.) When it comes to the development of human necessities and other luxuries, the main limiting factor is people. To build homes, install gardens, or to establish community, all require willing and capable individuals to establish, maintain, and develop the communal link to succeed in any project. By doing so, infinite opportunities and networks form much like the mycelial network of fungi relationships with plants roots and all other soil life. This extension enables the necessities for human development and growth to become a reality through our communal imagination and collaboration. The question is how do we develop the necessary links to actualize this potential? To conquer this feat, it helps to look at the history of mankind’s relationships to each other and the evolution or succession of empathy that is occurring. In comparison to permaculture design methods, the development of sustainable and prolific ecosystems are guides in co-creating the landscapes we dream of. In the same way, communities can be guided towards similar outcomes through our observation and analysis of our past, present, and potential way of life. Looking into Past Communal Relations A great video and speech that opened my eyes to the development of human relationships is a Renaissance Society of America video on the Empathic Civilization. Jeremy Rifkin describes the communal relations that have advanced with time. We have evolved from relating to our blood ties and viewing others outside of our family as alien. In time, as knowledge and information became prolific after the advent of agricultural irrigation we developed a new type of empathy through religious ties. As communities developed, new relations formed to create nations. (Listen and watch to the video if you wish to get further details, otherwise, let’s move on.) Co-Creating the Community of Today for Tomorrow Much as tribes coalesced to create new potentials, we are on a new stage today — a world of communal networks and relations. It begins by realizing that our blood ties are to each other and everything in this world (even our beliefs and ideas) are very much the same when expressed through peaceful actions and gestures instead of abstract words and ideas. Disintegrating our own personal wants and focusing on our necessities is bridging the gaps between individuals and organizations. As an example, schools are beginning to partner with outside organizations to create environments conducive for youth development with the benefit of academic and personal success in life for all parties involved. Furthermore, non-profit organizations are finding methods of infiltrating the for-profit world to add ethical elements into the business world. Elements and design features of co-creating a successful community partnership are dynamic just like ecological systems, which can be terraformed in a number of ways. Understand that it is Inevitable Yes, community cultivation and networks are inevitable, just as nature will create prolific ecological systems with time. If left alone to its own wits, it’ll happen naturally just as the soil built itself up without any outside influences and actions and will do so with or without you or us. It’ll just happen a lot later in our frame of time. (Estimated 100-400 years to build a centimeter of topsoil.) In a permaculture design, it’s essential to sit back and watch the elements unfold. Allocation of personal needs and desires, climate, landforms, soil, plant and animal life, and more, all contribute to the formation of ideas for a particular area. In a similar fashion, understanding the dynamics of a community and its resources are pertinent in creating successful partnerships for particular projects. It could be beneficial to take the time to map community assets and networks while observing the societal dynamics. It’s not going to be the same for a city as it is for a rural area. In relation to gardening, the desert is going to need more development and potential work than the tropics. Design and Implementation of Community Cultivation Developing relations and networks takes time just as it does to build the soil. There is a saying that the first year a garden sleeps, the second year it creeps, and the third year it leaps. An important lesson I learned from Community Cultivators and educating children is to make it fun and interactive. Many times I believed that the community around me and the children in it were at fault for not participating in an event or a lesson. Ultimately at the end of the activity, I began to look at myself. In a similar fashion to gardening and farming, people often view nature as the enemy. The diseases, pests, and ailments that affect our landscapes are often blamed on natural systems when it is we who are at fault for destroying the soil foundation. Do not be hasty to blame others or yourself. It’s all a learning process. With the appropriate lessons, the internal development of yourself will encourage the motivation and action to get yourself into the playing field as well as the passion to communicate and develop it within others. As relations grow, the processes and ideas will naturally flow to achieve the feats and developments that are essential for a community base, which means don’t set any expectations. As an example, many community gardens here in Dallas-Fort Worth have created the idea that a garden will be prolific and abundant in the first harvest or season. This assumption creates a mind frame that expects the garden to yield phenomenal results. Although this can happen with proper planning and implementation, if there are shortcomings that are not communicated people can get discouraged and dissuaded to continue the project or to continue their journey in gardening while the "masters" stay behind to maintain it themselves. This single idea has created more work at some of these locations for annual gardening, to find new gardeners, or persuade the dissuaded ones to come back. Instead of having a community garden, they manifested a working farm with high expectations. Likewise, community cultivation is an ongoing process that requires time, energy, and love. Given these essential resources, development has infinite possibilities. Just like the food forest (paradise), we can cultivate the foundations to actualize the unlimited potential of ourselves through each other and create self-sustainable loving relationships that cater to all of our necessities and more. In fewer words, community cultivation is the pure joy of over abundance within cooperation and collaboration. Enjoy every moment of it.
<urn:uuid:63988255-128f-4dd0-b45d-4cadd63fc00e>
CC-MAIN-2015-40
http://permaculture.org.au/2011/12/01/preparing-the-soil-for-community-cultivation/
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736678592.48/warc/CC-MAIN-20151001215758-00196-ip-10-137-6-227.ec2.internal.warc.gz
en
0.943123
1,445
2.828125
3
2.91139
3
Strong reasoning
Social Life
NEW DELHI: Today’s Doodle by artist Manjit Thapp celebrates the work Kamala Das left behind, which provides a window into the world of an engrossing woman. Kamala Das was one of the many voices that began featuring in cult anthologies in the 1960s when art in Calcutta was undergoing a tumultuous time. Kamala Surayya was born in Punnayurkulam, Thrissur District in Kerala, on 31 March 1934, to the former managing editor of Mathrubhumi VM Nair and Nalapat Balamani Amma, a renowned Malayali poet. She spent her childhood in Calcutta, where her father was employed with Walford Transport Company, and at the Nalapat ancestral home in Punnayurkulam. Kamala Das took to writing like her mother. Her great uncle Nalapat Narayana Menon, also a prominent writer, was a big influence in her life. She fell in love with poetry from an early age. At the age of 15 she was married to Madhava Das, a banker by profession. He encouraged her to write, and she started publishing her works both in English and Malayalam. On this day in 1976, Kamala Das released her autobiography, “My Story”. Her life and work had a certain boldness and shape-shifting quality, whether it was the many genres she wrote in or the various languages in which she expressed herself. Ms Das lived her life fearlessly resisting the labels of a “feminist”. She wrote under various pseudonyms. When she began publishing, she used the pseudonym Madhavikutty; Ami was her pet name; and Suraiyya, the name she gave herself upon converting to Islam. Her autobiography captures her life from childhood to marriage and beyond, describing the rich inner world of a creative soul. She began writing this book in English but soon started translating it to Malayalam as she wrote along. Her relatives, among others, tried to block her autobiography from being published and released; but many others were left spellbound by her honesty and the way she expressed herself through words. Through every upheaval in her life, Kamala Das never gave up on writing poetry and prose. Her unflinching and passionate approach touched many lives even after her death in 2009. She was honoured with Sahitya Academy Award in 1984, one of the many awards she received in her lifetime.
<urn:uuid:97fec5bc-b70a-4d00-81a3-87078e6537c7>
CC-MAIN-2020-45
https://www.gossipwires.com/google-doodle-google-celebrates-work-and-life-of-kamala-das-with-a-doodle/
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107866404.1/warc/CC-MAIN-20201019203523-20201019233523-00578.warc.gz
en
0.984476
522
2.578125
3
2.476655
2
Moderate reasoning
Literature
Analyse and discuss the legal, ethical and professional issues as applied to a chosen scenario. The relationship between any health care professional and a patient is based on mutual self respect and understanding irrespective of culture, religion or moral values. Ethical decision-making is prominent in everyday nursing care and should always be dealt with in an appropriate manner. There are clear and concise guidelines governing correct procedures and there is a legal obligation to the patient that these are made known and every effort made to ensure that they are fully understood. The scenario in this case is that of Samuel, aged 64 years, married and planning to move to the Caribbean. He has recently retired and the couple are looking to take a holiday there to make arrangements prior to their actual move. While in hospital for investigations, Samuel was diagnosed with bowel cancer. There is a positive prognosis if it is treated immediately. However, Samuel wants to hold back on the treatment until after his holiday. His wife disagrees and would like him to have the treatment straight away. When a patient is being prepared for any medical procedure it is the responsibility of the health care professional to ensure that there is informed consent before any action is carried out. The consent is a two way process between the patient and the professional. There is an ethical right for every patient to have the final say in any procedures carried out on his body. This is the case when the intrusion is fairly minor through to where the actions can involve major surgery. At a basic level it can be seen as being a common courtesy. At a deeper level it will involve legal implications. In order that the patient may be deemed to have a capacity to give informed consent, several guidelines need to be met: “ · understand, in broad terms and simple language, what the medical treatment is, its purpose and nature and why it has been proposed. · understand its principal benefits, risks and alternatives. · understand, in broad terms, what the consequences are of not receiving the proposed treatment. · make a choice free from undue pressure · retain the information long enough to make an effective decision. “ In the course of treatment it should be remembered that these guidelines may need to be reviewed at various points. A patient’s ability to fully understand different procedures may vary for a variety of reasons. It is quite possible for a patient to become very anxious at times which can make an impact on the ability to concentrate and it may impede the process. The professional should always carefully record and keep accurate documentation about any consent given – written consent by the patient is not deemed to be proof of true understanding by the patient. Every individual patient should be reassessed regularly and a good nurse will take care to adhere to the ethical and legal issues and not become complacent purely due to experience. Each case must be assesses on its own merits. Every patient must make their own decisions based on their own morals, rightly or wrongly. The patient’s decision must be respected. Decision making on correct care is often based on the Four Principled Theory defined by Beauchamp and Childress (2001) “aims to support consideration of ethical issues in a range of healthcare settings. The four principles include respect for autonomy, benificence, non-malificence and justice. Autonomy is defined in many different contexts but in relation to healthcare it is the capacity of a rationale individual to make an informed, uncohersed decision. Respect for autonomy is about respecting the decision-making capacities of autonomous persons and allowing them to make reasoned, informed choices (Beauchamp and Childress, 2001). However, respect for patient autonomy is fraught with difficulties relating to the capacity of the patient to make sound decisions.” (JCN Online) In the case of Samuel, consent would have to have been gained at a variety of times. The initial visit to hospital would have been carefully discussed with him detailing what his immediate medical problem was and how it would be subsequently investigated. All procedures would have been carefully explained to him and care taken to ensure that he fully understood what would be happening at each stage. When the investigations discovered bowel cancer he would have been carefully counselled on the implications of the disease, the impact on his health and also details of his subsequent treatment discussed. It is at the stage of consent to subsequent treatment that the scenario starts to raise ethical issues. Samuel does not want to have the treatment immediately as advised but would rather postpone any procedures for a period of time. As shown in the previous discussions of the patient’s right to consent, it would be unwise for the professionals to go ahead despite his opinions. His wife feels that he should have the treatment immediately but her opinion is not taken into consideration from a medical ethical capacity. In this case, careful documentation would be needed should there be any legal considerations at a later stage. “One case law in respect of this is Case 7.4 Refusal to be ventilated. Miss B suffered a ruptured blood vessel in her neck which damaged her spinal cord. As a consequence she was paralysed from the neck down and was on a ventilator. She was found of mind and knew that there was no cure for her condition. She asked for the ventilator to be switched off. Her doctors wished her to try some special rehabilitation to improve the standard of care and felt that an intensive care ward was not a suitable location for such a decision to be made. They were reluctant to perform such an action as switching off the ventilator with the courts approval. Miss B applied to court for a declaration to be made that the ventilator could be switched off. “ (Dimond, 2005, p.144) It should be noted that with the case of Samuel, there would not necessarily be a terminal outcome should he decide to postpone the treatment. It was deemed preferable from a medical standpoint that timing of treatment was important. There have been some high profile cases involving ethical and legal issues. One such case was that of Diane Pretty. Pretty was diagnosed as having motor neuron disease and over time her condition deteriorated whereby she could not communicate with anyone or move easily. She did, however, still have full mental capacities. She felt strongly that she wanted to be allowed the right to die with dignity at home with her family. This sparked off considerable debate as to the ethics of lawful euthanasia whereby her husband would help her to die – the Law stated that this was unlawful assisted suicide. Using the Human Rights Act, legal representation on behalf of Mrs Pretty presented their case to the Director of Public Prosecutions. Lawyers put forward that anyone who was involved in helping Mrs Pretty to die should be exempt from any form of prosecution. The case was turned down in both British court and also at appeal to the House of Lords. Determined to fight her case it was then taken to the European Court of Human Rights but again it was turned down. Another case for consideration is that of Tony Bland, a Liverpool football supporter who was severely brain damaged in the Hillsborough disaster. He was 18 years old at the time of the accident and despite never regaining consciousness after the incident he was kept alive until the age of 22 years. A long court battle ensued over that time whereby the hospital, supported by his parents applied to the courts for an order to allow him to ‘die with dignity’. In the incident Bland suffered terrible internal injuries which ultimately left him with an insufficient supply of oxgyen. This resulted in him being left in a Persistent Vegetative State (PVS). Because Bland was unable to speak for himself, under a law that states that he was deemed incompetent, an Official Solicitor was appointed as his guardian ad litem. The Official Solicitor was necessary because if the Airedale NHS Trust went ahead and withdrew the medical care necessary to keep Bland alive, then they could be charged with his murder. Eventually, on March 3rd, 1993 after a legal ruling allowing the doctors to withdraw his treatment, Bland was able to die. These high profile legal cases do highlight the difficult and complex ethical issues involved in patient care. The patient’s rights, values and opinions must always come first in the healthcare setting and this is only possible by adhering to strict legal and professional standards. Dimond B (2005) Legal Aspects of Nursing (4th edition) Longman, Harlow Dougherty, L & Lister S, (2004) Clinical Nursing Procedures (6th edition), Blackwell Publishing, Oxford.
<urn:uuid:f358c60c-09a6-46d0-a886-39d205059a78>
CC-MAIN-2020-40
https://writemyessay.co.uk/free_resource/ethics-in-nursing-1400-word-essay/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400188049.8/warc/CC-MAIN-20200918155203-20200918185203-00586.warc.gz
en
0.97881
1,738
2.671875
3
3.003394
3
Strong reasoning
Health
Did you know that when your computer is connected to the internet, it has over 131,000 ‘ports’ that a hacker could connect to? These ports are like doors in a building and if they aren’t protected properly, then someone could sneak in without you noticing. If the hacker is not installing a virus, they can still do some serious damage without alerting your security software, including transmitting your personal information. So how do you watch all of these doorways to your information? You need a firewall! In construction terms, a firewall is a fire-resistant wall that subdivides a building to stop the spread of fire from one area to another. In computer terms, we need to stop communications between your computer and others on the internet. A total block of all internet communication would be useless though, so you need a way of selecting which type of communications you want to receive. For this, computer firewalls have rules and filters much like construction firewalls have access doors. Where do I put this firewall? Firewalls can be on a hardware box (a separate unit or part of your internet modem or router) or can be software installed on your computer. Most popular security software packages also include a firewall. A hardware firewall is great for providing a barrier before your computer is even reached and will also mean that your computer doesn’t have to spend its precious resources on running the firewall software. It also reduces the risk of the firewall itself being compromised, as some viruses can try and disable security software features that are running on your computer. The downside is that a hardware-based firewall can be more expensive and not as easy to configure and maintain if you are unsure of how to use them. If Microsoft gives me a firewall, do I need another one? The Windows Firewall (on Windows XP Service Pack 2 and Vista) only examines inbound communications coming into your computer from the internet. If your computer becomes infected (e.g. if you install some free software that turns out to have a hidden nasty) then your outbound communication to other computers on the internet won’t be examined or filtered. This can turn your computer into a source of infection, impacting your security and internet connection. It’s also not recommended that you run more than one software firewall as this uses more processing power and can cause conflicts, so if your security software includes a firewall, turn off the Windows Firewall. If I have a secure wireless connection do l need a firewall? A wireless connection is another way to get onto the internet and wireless security controls who can use that connection. This is similar to allowing who can plug into your phone line. Once you are connected, your 131,000+ ports are still open to hackers, so you still need a firewall. A firewall may be included on your wireless router but it pays to check. Why does it keep on giving me messages? If you are doing something specific (like installing new software or troubleshooting a connection problem) you may need to temporarily disable your firewall. Software firewalls may alert you that a connection has been attempted and blocked and may ask if you wish to allow that kind of connection in the future. In general, if you are doing something new which would probably involve a connection to the internet, you can allow the connection – either ‘this time only’ or for all future connection attempts. If in doubt, block it, as you can always allow it later if you find that it is needed. Firewalls provide an enhanced level of security that has now become the minimum standard to protect your computer. If you have a Windows computer you should have firewall protection built in. If you have tips on using firewalls to share with others, feel free to share in the comments below.
<urn:uuid:6d99434c-4ade-44f5-9a13-69b0c94892ef>
CC-MAIN-2014-15
http://www.freecomputermaintenance.com/internet-tips-tricks/how-firewall-can-help-protect-pc/
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223204388.12/warc/CC-MAIN-20140423032004-00521-ip-10-147-4-33.ec2.internal.warc.gz
en
0.943797
776
3.046875
3
2.097963
2
Moderate reasoning
Software
In the beginning of October, one day Per Hansa, Hans Olsa, and Henry Solum go east to the Sioux River after wood. Beret sits at home knitting, her mood of melancholy deeper than ever. She looks out over the prairie and sees a wagon train approaching. Beret feels that she should do something to turn the people back, to tell them to stay away from the wilderness. But Hans is excited and rides off to tell Tönseten. When the strangers arrive, it is discovered that they are all Norwegians. Tönseten is delighted, although he wishes that Per Hansa were there to do the honors. He insists that the newcomers sleep in his house before moving west to look for homesteads. The next day, the would-be settlers go out to look at the land, and Tönseten does everything in his power to persuade them to settle in the area. After looking over the available sites, the majority of the newcomers decide it would be a good place to settle. They intend to return in the spring with their families. Tönseten is delighted at the thought of a growing Norwegian community. The time comes when Per Hansa finds it necessary to go into town to get needed provisions. This time he will be gone a week, and Beret dreads the thought of being on the prairie without him. Thanks to the potatoes that he had sold the Irish and the newly-arrived Norwegians, Per Hansa's cash supply is a good deal larger than when he had first arrived in early summer. Before his father leaves, Hans tells him he is worried about Beret, and Per Hansa tells the boy that there may be a little one coming along around Christmas time. Per Hansa finds he has more potatoes than he needs and loads his wagon with the surplus to try and sell in town. Per Hansa and his companions are happy to be going to town. At the Sioux River, they catch three fish, and that night when they stop at Split Rock Creek, they eat the fish with potatoes. The next morning, they continue their journey and discover that in the wilderness they had seen in the summer, there are now numerous sod huts of settlers. Late in the forenoon, they come across two sod huts and find that they are inhabited by a Norwegian couple who have nothing but a pair of oxen and a cow. Per Hansa senses that they are short of food and gives them a generous supply of his potatoes. He is happy that he has been able to do something for others. When they reach Worthington, a frontier settlement on the railroad line, Per Hansa tries to peddle his potatoes but has little luck until he meets a Danish widow who trades him three chickens for some of his potatoes. The widow asks Per Hansa to stay for dinner, and he consents; he is impressed by the interior of her sod hut, which is white, and discovers that it is whitewashed. After the meal, Per Hansa goes to a lumberman the widow had told him about and barters potatoes for lime and lumber. Later, Per Hansa trades for a plow and rake on credit and for net twine and rope. Finally, Per Hansa asks for some calico of a gaudy pattern, ribbon and thread, then cloth, tobacco, matches, kerosene, molasses, and salt. After the everyday needs are looked after, the men buy several bottles of liquor. Late in the afternoon, they set off for home. They are all happy, and when they pitch camp for the first night, Per Hansa starts to knit the twine into a net. The boys find the days long while their father is gone, and Beret says little to them to brighten their days. Then they hear that Tönseten has killed a bear; they go to his place and receive a pail of "bear" meat, bring it home, and give it to Beret. They ask her if they can take the old shotgun and go after the mother bear, but Beret flies into a rage and beats them with a switch — something that has never happened before in their lives. Beret makes a stew of the meat, with potatoes and carrots, but when it comes time to eat the boys say that it cannot be bear, but badger, and no one can eat the meal. Beret throws it out, and later she hangs more clothes over the window and sits up very late, unable to sleep. That night Beret is unable to sleep. The thought of the badger that they had almost eaten is the last straw as far as she is concerned. They must go back east, leave this desolate place. In the morning, Beret worries about the lack of wagons but feels that that is Per Hansa's problem. She begins to pack the few belongings they have, and Hans realizes that something is wrong. He tries to comfort his mother and succeeds in doing so to an extent. Beret cries and feels the baby moving within her. At that moment, Ole comes running in to say that the caravan is returning. At dinner after Per Hansa returns, he is very happy and tells the boys of his adventure. Even Beret smiles at the way in which the boys receive the tale. In turn, the boys tell their father about Tönseten and the badger and he laughs in turn. After dinner, Per Hansa and the boys bring in things from the wagon, and Per Hansa insists that Beret have a drink. Per Hansa is so happy and irresistible that Beret for a time feels as she had in the past. The boys are put to work knitting the net, and Per Hansa busies himself making ready to mix the lime he had bought in town. After the boys are asleep, Per Hansa continues to work on the net and tells Beret how he intends to catch fish with it. The fact of the matter is he intends to catch ducks with it, but he wishes to keep this his secret. That night, Beret sleeps well, without covering the window. Here again, Rölvaag works on the picture he has been painting all along — of Per Hansa, the man of action who is in his element in the wilderness and happy so long as he has something to do, and of Beret, who is growing more and more obsessed by the desolate country. While Rölvaag does not belabor the point, we are struck by the fact that while Per Hansa, with each passing day, is adjusting to the environment, exactly the opposite is true of Beret. In the beginning of the chapter, we are told of how new settlers are coming all the time; to Per Hansa this is a good thing, but to Beret it only means that others are coming to suffer along with her. This disparity in viewpoint is the main theme. Note how Per Hansa is constantly thinking of what he can do to make life better for his family in a material way. He purchases various things in town and plans to whitewash the sod hut so that it will be more livable. Note that all this pertains to the material — or pragmatic — side of things, while Beret is concerned with the emotional, the spiritual. While the chapter ends on a more-or-less happy emotional note, it is clear that Beret is increasingly unhappy about the wilderness life, and her pregnancy adds nothing to make her cheerful. On the other hand, Per Hansa obviously feels that he is on the way to building his dream empire.
<urn:uuid:ad828ff7-cfdd-45a2-8b90-f66a93deb814>
CC-MAIN-2015-22
http://www.cliffsnotes.com/literature/g/giants-in-the-earth/summary-and-analysis/book-i-chapter-5
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928423.12/warc/CC-MAIN-20150521113208-00118-ip-10-180-206-219.ec2.internal.warc.gz
en
0.979268
1,567
3.140625
3
2.847676
3
Strong reasoning
Literature
Edward Plantagenet (17 June 1239 – 7 July 1307) was the eldest son of Henry III, and despite being involved in revolts against his father, he was reconciled and supported him throughout the Second Barons' War against Simon de Montfort, and Edward became king when his father died in 1272. The only complication was that he was on his way back from Crusade at the time, and seems to have been in little hurry to return, so it was not until 19th August 1274 that he was crowned in Westminster Abbey. Persistent issues with the Welsh led to a full-scale conquest in 1282-83, and to hold this new territory a series of formidable castles were constructed to plant settlers in key areas and to keep the locals subdued. Many of these remain in good condition, and a visit to Conwy, Beaumaris or Harlech is highly recommended. The death of King Alexander III of Scotland in 1286 offered Edward a further chance of expansion and a way to achieve the ambitions of his father, as the only heir to the throne was his three year old grand daughter Margaret, then in Norway. When Margaret died in 1290 on her way to Scotland, the Scottish nobility was left with a number of distant claimants to the throne, and a civil war looked inevitable. Instead, they turned to Edward for guidance, and he agreed to judge the relative merits of the fourteen Claimants to the throne. In 1292, he decided that John Baliol was the legitimate king, and Baliol was duly crowned at Scone on 30th November of that year, suitably on St. Andrews Day. Whether Baliol had the better claim remains in dispute, with the suspicion being that Edward had in effect appointed a puppet who would rule in name only, rather than recognising the claim of Robert Bruce (5th Lord of Annandale, and the elderly grandfather of the man who would become king a few years later) who could perhaps have been a strong and independent ruler. It therefore seems to have come as something of a shock to Edward to find that his puppet's strings were cut in 1295, when a council of Guardians was appointed by the leading men of the kingdom to "advise" their king, which in reality seems to mean that they took over and bypassed the ineffectual Baliol. Edward had no choice but to intervene again, and in 1296 he attacked with all his strength, defeating the Scots at Dunbar and eventually capturing Baliol at Montrose. Having apparently resolved his problems in Scotland, Edward turned to his territories on the other side of the channel, and planned a campaign in Flanders, but his continual problems in financing his forces in Scotland and Wales had led to the imposition of a high level of taxation, and the country seemed on the verge of another civil war. His nobles had documented their grievances, in what became known as the Remonstrances, which were delivered to London at the same time as Edward left for Flanders with a smaller force than planned. In Scotland, the background levels of resentment sparked into flame with rebellions against the English rule in several areas, including a major threat in the form of Sir Andrew Moray. Edward had left John de Warenne, Earl of Surrey, in control in Scotland and in response to these stirrings of revolt he became increasingly drawn into military action. When Moray joined up with another rebel, William Wallace, the whole country seemed aflame, and de Warenne gathered a large force to subdue the revolt. The armies met at Stirling Bridge on 11th September 1297, where the Scots achieved an overwhelming victory. Edward was thus presented with an opportunity to unite his kingdom in avenging this loss, and in 1298 he led his army in his first major battle since his prominent part in the Battle of Evesham in 1265. Deploying his archers and cavalry together in a masterly action, the Scots were cut down in their hundreds, and although Wallace escaped the field alive, his reputation suffered and he stood down from his position as Guardian. However, Edward was unable to consolidate this victory, and by the end of the year the Scots were secure and had captured many of the castles which had been held by the English, the most important of which was Stirling. Beset by financial problems, a nobility which was unhappy at the constant demands on their wealth and manpower, pressure from the Pope in response to successful lobbying by the King of France, Wallace and others, Edward was unable to follow up on Falkirk in any meaningful way. Campaigns in each of the subsequent years proved ineffectual, due to the Scots avoiding any direct confrontation and then raiding into England in return, but the balance of power seemed to be moving in Edward's direction with several of the leading Scottish nobles, including Robert Bruce, returning to his side. The betrayal and capture of William Wallace in 1306 should have cemented Edward's hold on Scotland, but whether in revulsion at the mistreatment and public execution of Wallace or due to Edward's failing health, Bruce again changed sides and within months had murdered his main rival and had himself crowned King. Edward quickly dispatched another army to deal with the threat, but although this was initially successful Bruce emerged again in the following year and won a decisive victory at Loudoun Hill. Edward stirred himself to lead an army in person, but camped within sight of Scotland at Burgh on Sands in Cumbria, he died on the 7th July 1307. He is buried in Westminster Abbey. Despite being seen by many as a strong and successful king, Edward continually struggled to finance his ambitions and had substantial debts with several international bankers during his reign. Among many schemes to raise cash, Edward expelled the Jews from England in 1290 and confiscated all of their property. While this was not a new idea (having occurred in France and Brittany over fifty years before), it has left a long-lasting stain on his reign.
<urn:uuid:dd8871a4-3d90-4265-b093-e5a2652e77b8>
CC-MAIN-2020-05
https://tournee.org/index.php/c14th-century/edward-i-1239-1307
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601040.47/warc/CC-MAIN-20200120224950-20200121013950-00477.warc.gz
en
0.99073
1,223
2.828125
3
3.003058
3
Strong reasoning
History
You can download them over at Drawn 2 B Creative. I love that this set was especially designed for Catholics, and all of the O Antiphons are included at the end. What a great way to enjoy many Catholic traditions all with 1 set! Around the Clock Here is a center game to reinforce clock numeral placement. For each game board, glue a construction paper clock to a colored background. Label each of several chips in sets of 12 chips with numerals 1 - In turn have each player roll a 12 sided die, then cover that number on her clock with the correctly labeled chip. If a player rolls a numeral that has already been covered with a chip, she must pass the die to the next player. Continue play until on numerals on each clock are covered. Start collecting fry containers. Then write a different number on each box. Make fries by cutting yellow sponges into strips. Place the boxes and fries in a center. To do this activity, a child places the appropriate number of fries in each box. For each jar you gather think of a fruit or veggie to make out of colored paper apple, grape, corn, banana. Now cut out the shapes of the veggies and fruit. For each fruit or veggie jar think of an activity to place on the jars. For instance, one jar may be called apple activities. You would cut out apple shapes and label the jar appropriately. You may choose to write math problems on the apples. The student will take the jar and complete all the math problems on another sheet of paper. You might choose to name another jar corny questions and place corn cut-outs with questions written on in the jar. The student will take the jar and answer the questions on a sheet of paper. Make as many jars as you would like be creative and place them in a line on a shelf. Place a box of colorful breakfast cereal and a supply of three-ounce paper cups at the enter. The student fills one cup with cereal. Then she uses pieces to complete a variety of tasks. Post the following tasks in the center and a worksheet with the following: Place a plastic shoebox, a can of shaving cream, and a list of current spelling words at the center. A student sprays a small amount of shaving cream into the shoebox and uses her finger to write the spelling word she sees. Or a friend tells her a spelling word and she spells it without looking. After she is sure the word is correct she spreads the foam around to erase the word, then repeats the procedure until all the words have been spelled correctly. Actually, I did this with a life skills class using numbers and all you need to do or have the student do is wipe it up with a paper towel and the shoebox is ready for the nest student. You may want to have four or five shoeboxes in the center.A collection of free Easter Crafts, Printables and Resources you can use in your personal homeschool or Sunday School Classroom! Children can learn the true meaning of Easter Sunday with our Easter Story Resurrection Eggs! We have a great selection of Easter Bible Printables including coloring pages, activities, games, crafts, worksheets and more! Lots NEW! Fun printables for kids with a sheep theme! We've got posters and lacing cards for younger children, jigsaws and drawing tutorials for older kids. Are you ready to improve your handwriting skills? If you haven’t been following my blog for long; back in January (), I decided my handwriting was like the scrawl of a 4-year-old (seriously!) and decided to do something drastic. You don’t need letter of the week to teach the alphabet to kids. Read below about how (and why!) to use fun and meaningful activities to teach children about letters. Click here to download the A-Z Tracing Worksheets! I’m adding some additional handwriting practice to my Letter of the Week curriculum this year just to kick it up a notch for my 4yr old. This is a tracing worksheet for her, I included a blank page for extra practice once she has the formation down pretty well. I’m honored and so giddy excited to be able to share with you the first free lesson of Reading the Alphabet!. If you have questions concerning this curriculum, click here to read more about it. Find all the lessons of our free Reading the Alphabet curriculum.. Keep scrolling until the end of this post to grab the free version of Letter Tt: Reading the Alphabet!
<urn:uuid:773a5026-a1fd-4ad5-8249-fbffc3749f17>
CC-MAIN-2020-29
https://tulagyrubafyhaw.barnweddingvt.com/pretty-print-handwriting-alphabet-printables-24143td.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655900335.76/warc/CC-MAIN-20200709131554-20200709161554-00439.warc.gz
en
0.942604
941
3.5
4
1.442673
1
Basic reasoning
Education & Jobs
Looking for a unique Mother's Day gift? How about Space Roses? Proceeds from the sale of these far-out blooms support student space weather research. | || | ALMOST NO CHANCE OF FLARES: Solar activity is very low. There are two sunspots on the solar disk, but neither one has the type of unstable magnetic field that poses a threat for explosions. NOAA forecasters say the chance of a strong flare today is no more than 1%. Solar flare alerts: text or voice ANTARCTIC AURORAS: A solar wind stream is blowing around Earth. On April 23rd, it sparked a G1-class geomagnetic storm and auroras around the poles. Gabriel Saiquita photographed the display from Argentina's Belgrano II Base in Antarctica: "We are deep inside the Antarctic Circle at a latitude of -78 degrees," says Saiquita, a member of the research station's winter crew. Similar auroras danced across Arctic skies, but they were mostly invisible due to the waxing glow of the summer Midnight Sun. As the seasons change, aurora sightings shift from one pole to the other. The winter night at Belgrano II Base is 4 months long, so stay tuned for more aurora australis. Aurora alerts: text or voice Realtime Aurora Photo Gallery THE MICRO-MOON: We've all heard of supermoons--full Moons that are extra big and bright because they occur close to Earth. This week's full moon was the opposite--a micro-moon. April's full Moon was as much as 14% smaller than other full Moons of 2016. Marek Nikodem photographed the shrunken orb over a cement factory in Piechcin, Poland: "Hot smoke rising over the factory distorted the shape of the lunar disk and made it seem that the Moon was being drawn into the smokestack," says Nikodem. Not even a micromoon, however, is small enough to fit inside a chimney. Photos taken moments later reveal the disk floating free. Full Moons vary in size because of the oval shape of the Moon's orbit. The Moon follows an elliptical path around Earth with one side ("perigee") about 50,000 km closer than the other ("apogee"). Full Moons that occur on the apogee side of the Moon's orbit seem a bit smaller and dimmer than usual. That's what happened on April 22nd. The Moon became full at 05:24 UT only 13 hours after apogee--a coincience that reduced the size of the lunar orb. The supermoon will return on Nov. 14 when the Moon becomes full at perigee. Stay tuned for that. Realtime Space Weather Photo Gallery SPACE WEATHER PROBE TAKES SELFIE: Last December, Joyce and Tad Lhamon of Seattle, Washington, bought their 12-year-old grandson Barrett a far-out Christmas gift--that is, a trip to the edge of space. In exchange for this gift certificate, Barrett could fly any experiment he wanted to the stratosphere onboard an Earth to Sky Calculus helium balloon. He thought about it for months and, after discarding many ideas, Barrett decided to fly a convex mirror. The payload's cameras could look into the mirror and take a new kind of "space selfie." Would it work? On April 17th, we flew Barrett's experiment, and the results were better than anyone dreamed: "Spaceweather.com and the students of Earth to Sky Calculus have flown more than 150 missions to the edge of space monitoring cosmic rays and stress-testing microbes. We've never seen our payload quite like this before. A particularly interesting sequence of images shows the balloon exploding above the payload 117,100 feet above Earth. The following video frames are separated by only 1/30th of a second: #1, #2, #3, #4. Note how the payload remains motionless during the explosion. It takes more than a second for the shock wave from the explosion to propagate down the long cord connecting the payload to the balloon. Congratulations, Barrett, on a very successful experiment! Realtime Space Weather Photo Gallery Realtime Comet Photo Gallery Every night, a network of NASA all-sky cameras scans the skies above the United States for meteoritic fireballs. Automated software maintained by NASA's Meteoroid Environment Office calculates their orbits, velocity, penetration depth in Earth's atmosphere and many other characteristics. Daily results are presented here on Spaceweather.com. On Apr. 24, 2016, the network reported 2 fireballs. In this diagram of the inner solar system, all of the fireball orbits intersect at a single point--Earth. The orbits are color-coded by velocity, from slow (red) to fast (blue). [Larger image] [movies] Potentially Hazardous Asteroids (PHAs ) are space rocks larger than approximately 100m that can come closer to Earth than 0.05 AU. None of the known PHAs is on a collision course with our planet, although astronomers are finding new ones all the time. On April 24, 2016 there were potentially hazardous asteroids. Notes: LD means "Lunar Distance." 1 LD = 384,401 km, the distance between Earth and the Moon. 1 LD also equals 0.00256 AU. MAG is the visual magnitude of the asteroid on the date of closest approach. | ||Cosmic Rays in the Atmosphere | These measurements are based on regular space weather balloon flights: learn more. |Situation Report -- Oct. 30, 2015 ||Stratospheric Radiation (+37o N) | |Cosmic ray levels are elevated (+6.1% above the Space Age median). The trend is flat. Cosmic ray levels have increased +0% in the past month. | |Sept. 06: 4.14 uSv/hr (414 uRad/hr) | |Sept. 12: 4.09 uSv/hr (409 uRad/hr) | |Sept. 23: 4.12 uSv/hr (412 uRad/hr) | |Sept. 25: 4.16 uSv/hr (416 uRad/hr) | |Sept. 27: 4.13 uSv/hr (413 uRad/hr) | |Oct. 11: 4.02 uSv/hr (402 uRad/hr) | |Oct. 22: 4.11 uSv/hr (411 uRad/hr) | Approximately once a week, Spaceweather.com and the students of Earth to Sky Calculus fly "space weather balloons" to the stratosphere over California. These balloons are equipped with radiation sensors that detect cosmic rays, a surprisingly "down to Earth" form of space weather. Cosmic rays can seed clouds, trigger lightning, and penetrate commercial airplanes. Our measurements show that someone flying back and forth across the continental USA, just once, can absorb as much ionizing radiation as 2 to 5 dental X-rays. For example, here is the data from a flight on Oct. 22, 2015: Radiation levels peak at the entrance to the stratosphere in a broad region called the "Pfotzer Maximum." This peak is named after physicist George Pfotzer who discovered it using balloons and Geiger tubes in the 1930s. Radiation levels there are more than 80x sea level. Note that the bottom of the Pfotzer Maximim is near 55,000 ft. This means that some high-flying aircraft are not far from the zone of maximum radiation. Indeed, according to the Oct 22th measurements, a plane flying at 45,000 feet is exposed to 2.79 uSv/hr. At that rate, a passenger would absorb about one dental X-ray's worth of radiation in about 5 hours. The radiation sensors onboard our helium balloons detect X-rays and gamma-rays in the energy range 10 keV to 20 MeV. These energies span the range of medical X-ray machines and airport security scanners. | ||The official U.S. government space weather bureau | | ||The first place to look for information about sundogs, pillars, rainbows and related phenomena. | | ||Researchers call it a "Hubble for the sun." SDO is the most advanced solar observatory ever. | | ||3D views of the sun from NASA's Solar and Terrestrial Relations Observatory | | ||Realtime and archival images of the Sun from SOHO. | | ||from the NOAA Space Environment Center | | ||the underlying science of space weather |
<urn:uuid:f001aed0-ef0b-4acb-aa05-6b14cbec7b37>
CC-MAIN-2018-17
http://www.spaceweather.com/archive.php?day=24&month=04&year=2016&view=view&PHPSESSID=rrlv28276436gsr7l006jtivv6
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948126.97/warc/CC-MAIN-20180426105552-20180426125552-00487.warc.gz
en
0.920982
1,812
2.765625
3
2.359477
2
Moderate reasoning
Science & Tech.
Micro Controller Programming Assignment Help | Micro Controller Programming Homework Help Get custom writing services for Micro Controller Programming Assignment help & Micro Controller Programming Homework help. Our Micro Controller Programming Online tutors are available for instant help for Micro Controller Programming assignments & problems. Micro Controller Programming Homework help & Micro Controller Programming tutors offer 24*7 services . Send your Micro Controller Programming assignments at [email protected] or else upload it on the website. Instant Connect to us on live chat for Micro Controller Programming assignment help & Micro Controller Programming Homework help. Process of Transferring the microcontroller program from compiler to memory is known as microcontroller programming. Compiler is used to debug, write and test a program of microcontroller. The programs of microcontroller are written in C and assembly language. After that, compiler creates a hex file which has machine language instruction and then it transferred to the microcontroller memory. Programs of microcontroller are loaded in flash memory. In microcontroller programming, firstly, we need to write a program code on our system then compile it for the microcontroller. Microcontroller programming's main elements are Assembly language,Interpreters,Compilers. Programs of microcontroller can be written in assembly language. Assembly language converts a program in understandable language. It is human readable form of machine language. Machine language also known as assembly language. Interpreter is a translator that converts high level program into machine level program. BASIC and FORTH are the popular interpreters of microcontroller. FORTH is difficult to write and read. BASIC is simple interpreter while FORTH is fast interpreter. Compiler is also a translator that translates source code language into computer language. C and BASIC are the most popular compilers of microcontroller. Some of the homework help topics include: - 8085 microprocessor IC pin outs ,absolute and partial Mapping techniques – I / O mapped - signals, address, data and control ,I ,O and memory mapped I / O ,Serial I/O lines of 8085 - Interrupt system of 8085 ,Stack and subroutine ,Types of memory and memory interfacing ,Decoding techniques Implementation asynchronous serial data communication using SOD and SID,Programming with 8085,buses,8085 features Micro Controller Programming questions help services by live experts: - 24/7 Chat, Phone & Email support - Monthly & cost effective packages for regular customers; - Live help for Micro Controller Programming online quiz & online tests, Micro Controller Programming exams & midterms; If you are facing any difficulty in your Micro Controller Programming assignment questions then you are at the right place. We have more than 3000 experts for different domains. Help for complex topics like: - Conditional call and return instructions ,operations related programs ,Debugging programs ,Study and Interfacing of peripherals 8155, 06 ,8255, 8253/8254, 8259 with 8085 ,Basics of 8051: 08 - Comparison of microprocessor and microcontroller,Architecture and pin functions of 8051 chip controller,CPU timing and machine cycles,Internal memory organization,Program counter and stack - Input/output ports,Counters and timers,Serial data input and output Interrupts.Power saving modes ,Programming with 8051:Instruction set, addressing modes,immediate - registers, direct and indirect data movement and exchange instructions,push and pop op-codes,arithmetic and logic instructions,bit level operations,jump and call instructions - input/ output port programming,programming timers,asynchronous serial data communications, and hardware interrupt service routines.Interfacing of LCD display - hex keyboard,ADC0808, DAC0808 and Stepper motor with 8051 Current trends in microprocessors and practical implementation ,ARM Processor ,ARM family architecture - Register architecture,Memory Access and addressing modes,Arithmetic and Logical Instructions,Branching Instructions ,Comparative study of salient features of 8051,and its derivatives like 89C51, 89C52, 89C2051,AND 89C2052. Current processor and controller Our Micro Controller Programming Assignment help services are available 24/7: - Qualified experts with years of experience in the Micro Controller Programming help - Secure & reliable payment methods along with privacy of the customer. - Really affordable prices committed with quality parameters & deadline - Basic instruction set,Timing states, machine cycles and instruction cycles ,Instruction Timing diagram and ,interrupt process and timing diagram,survey. (cost, availability, popularity ) Get help for case studies , reports , proposals - Embedded Computing, Microcontroller systems, Low-level C programming techniques, Memory mapped I/O, Polling, Handshaking, Interrupts and DMA, Timers - External interfacing, Applications, Microcontroller Organization and Architecture, Data Representation and Memory Usage, Operating Systems, Problem Solving and Algorithm Development - Assembling/Compiling and Execution, Assembly and C Programming, Analysis of timing and memory requirements, mechatronic applications, design appropriate micro-controller based solutions - hardware units within a modern micro-controller,software tools available for the design and testing of micro-controller based applications, software development process - interface external devices to a micro-controller, need to undertake lifelong learning
<urn:uuid:33db0ee8-17d0-4921-83f1-1ff9fb436fbf>
CC-MAIN-2020-40
https://globalwebtutors.com/micro-controller-programming-assignment-help
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400196999.30/warc/CC-MAIN-20200920062737-20200920092737-00739.warc.gz
en
0.831032
1,110
2.75
3
2.236048
2
Moderate reasoning
Software Dev.
Compact Disc: 25 years old today First commercial disc pressed on 17 August 1982 The 14-bit codes are cleverly crafted to ensure any two binary ones in the code is separated by 2-10 binary zeros. Three further bits are used to separate the 14-bit codes on the disc. While this approach may be less efficient from a storage space perspective - 17 pits on the disc's data surface are used to encode half that number of bits - it makes it much easier for the optical head to read the data correctly. CD encoding also employs Cross-Interleaved Reed-Solomon Coding (CIRC), which adds an extra, parity byte for every three bytes of data. The upshot: the player's electronics can easily and efficiently 'guess' what data masked by errors should have been, eliminating clicks and pops. Sony's CDP-101: introducing... More advanced versions of this technique would later be used in DVD and Sony's Super Audio CD (SACD) format. The SACD has yet to win the broad appeal enjoyed by the CD, which proved a major driver for the music industry as consumers dashed to replace old or scratched vinyl LPs and hissy cassettes with shiny new compact discs. By the late 1990s, however, in part due to the growing popularity of computer games, and first sell-through videotapes and later DVDs, but also the advent of both the MP3 music format and peer-to-peer file sharing networks, CD sales began their inevitable decline. ...the world's first CD player CD remains the dominant format for legitimately purchased recorded music - some 200bn have been sold in the past 25 years, Philips reckons - but it's lead is being eaten into by downloads. Fans are finding they'd rather buy individual tracks than albums of songs. This week, the UK recording industry's Annual Survey forecast that Apple's iTunes store will outsell other music suppliers within two years - on other words, downloads will have become more popular than the CD. Philips' CD100: VHS styling The Compact Disc may not strictly speaking be a forgotten technology, but at that rate it soon will be. More Forgotten Tech... • 15 years ago: the first mass-produced GSM phone • From 1981: the World's first UMPC • The IBM ThinkPad: 15 years old today • Apple's first handheld: the Newton MessagePad • Atari's Portfolio: the world's first palmtop • 'Timna' - Intel's first system-on-a-chip • BeOS: the Mac OS X might-have-been • Sony's first Mylo
<urn:uuid:580cefb3-702e-4e32-9822-c2c6cb208e95>
CC-MAIN-2017-51
http://www.theregister.co.uk/2007/08/17/ft_compact_disc?page=3
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948597485.94/warc/CC-MAIN-20171217191117-20171217213117-00405.warc.gz
en
0.928002
550
2.671875
3
2.485932
2
Moderate reasoning
Hardware
Minimum Impact Riding In most cases where trails are closed to mountain bikes, the reason is often environmental impact or social incompatibility. Environmental impact can be reduced to insignificant levels by proper trail design and by riding responsibly. Likewise, cyclists who ride in control, yield trail, and slow down when passing other trail users pose no more threat to hikers and equestrians than these groups pose to each other. Some non-bikers have a negative image of mountain biking as the result of an interaction with an unruly cyclist. These interactions are the exception, but the negative image they create far outweighs the slow, steady progress responsible riders have made towards improving our image. Responsible riding has as much to do with how we are perceived as a group as it does with how we actually behave on the trail. In order for mountain bikes to be a respected and viable member of the outdoor community, it is essential that patrols understand and educate mountain bikers on the importance of respecting the trail, the surrounding area, and other trail users. In other words, follow and actively promote IMBA's shared use concepts: - Other Visitors - Slow down & communicate when passing. - The Land and Wildlife - Leave no trace. - Trail Rules - Be responsible. Trails: Trail closure to mountain biking is sometimes based on the perception that mountain bikes cause damage to trails. While it is true that particularly steep trails and those with fragile soils may not be appropriate for mountain bikes, many of the trails that are open to hiking are also appropriate for mountain biking. It is important that patrollers observe the following simple rules for low impact riding: Patrollers should be able to tactfully explain to other mountain bikers why they should follow these rules and the consequences of breaking them. Know which trails are closed to mountain bikes and when. Be familiar with the various causes of trail erosion and proper trail building techniques. This knowledge is an important component of the NMBP's mission to educate our fellow trail users. The surrounding area: To be respected by other trail-use groups, patrollers must take a pro-active stance on relevant environmental issues, including minimum impact on trails. Learn what the particular environmental concerns are in your riding area. Ask your local land manager to provide this information. The fragile cryptobiotic crust that covers much of the ground in the Moab, UT area and other parts of the Southwest is good example of this is kind of concern. The Moab Mountain Bike Patrol has done a great job educating riders about the importance of staying on the trail and off nature's delicate soil builders. Take care not to disturb sensitive wildlife habitat. High speeds, reckless riding, spooking horses, unnerving other trail users - these are the most common accusations leveled at mountain bikers. It comes down to two key points: safety and respect. Patrollers should stress the importance of yielding the trail to other users. Yielding does not necessarily mean stopping. Slowing to a controlled, non-threatening speed and being prepared to stop quickly and smoothly is usually sufficient. Use common sense. Note: One important exception is passing equestrians. Bikers should always pull over and stop or ask permission before passing horses. Racers training for competition will want to ride fast. Some trails are appropriate for high-speed riding. Others are not. Patrollers should be prepared to suggest alternative trails where high speed riding is more acceptable. Awareness of non-recreational land users (like ranchers) may also be an issue. Bikers need to respect crops and livestock. Finally, do not ride on trails closed to bicycles. For various reasons it is appropriate that some trails are closed to bikes. If you feel a particular trail should be open to biking, talk to your land manager/land owner and work with them to open it.
<urn:uuid:aa4938dc-8218-4dec-89e9-cdafc00ea9ba>
CC-MAIN-2015-27
https://www.imba.com/resources/nmbp/minimum-impact-riding
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375095806.49/warc/CC-MAIN-20150627031815-00289-ip-10-179-60-89.ec2.internal.warc.gz
en
0.949453
782
3.203125
3
2.982046
3
Strong reasoning
Sports & Fitness
Definition of Fighting. Meaning of Fighting. Synonyms of Fighting Here you will find one or more explanations in English for the word Fighting. Also in the bottom left of the page several parts of wikipedia pages related to the word Fighting and, of course, Fighting synonyms and on the right images related to the word Fighting. Definition of Fighting FightingFighting Fight"ing, a. 1. Qualified for war; fit for battle. An host of fighting men. --2 Chron. 2. Occupied in war; being the scene of a battle; as, a fighting field. --Pope. A fighting chance, one dependent upon the issue of a Fighting crab (Zo["o]l.), the fiddler crab. Fighting fish (Zo["o]l.), a remarkably pugnacious East Indian fish (Betta pugnax), reared by the Siamese for spectacular fish fights. Meaning of Fighting from wikipedia - the distance of the combatants: Clinch fighting Ground fighting Stand-up fighting Military combat can involve multiple - The General Dynamics F-16 Fighting Falcon is an American single-engine supersonic multirole fighter aircraft originally developed by General Dynamics - A fighting game is a genre game that involves combat between two or more characters. Fighting game combat often features mechanics such as blocking... - The Ultimate Fighting Championship (UFC) is an American mixed martial arts (MMA) promotion company based in Las Vegas, Nevada. It is owned - opposition. Fight may also refer to: Combat sport Fighting in ice hockey Martial arts Philadelphia Fight , an American rugby league , stickfighting, or stick fighting , is a variety long, slender, blunt, hand-held, generally wooden the Good Fight " is a traditional, classic favorite hymn and Christian song. It was written by John Samuel Bewley Monsell - Dog fighting is a type of blood sport game and fighting in a physical fight to the death, for the purposes arts communities, street fighting and self-defense are often considered for human fighting goes back 430,000 years ago in Spain... - The 2023 Illinois Fighting Illini football in the West Division of the Big Ten Conference during the 2023 NCAA... Recent Searches ... Related images to Fighting
<urn:uuid:c2f44655-7e73-4afc-b8f3-17d69e7deded>
CC-MAIN-2023-50
https://www.wordaz.com/Fighting.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100724.48/warc/CC-MAIN-20231208045320-20231208075320-00789.warc.gz
en
0.791452
518
2.859375
3
0.873372
1
Basic reasoning
Literature
Significantly the test appeared to have struck near the eastern coast of Russia, which prompted a reaction on Monday from Russian President Vladimir Putin. North Korean state media KCNA claimed that the apparently new Hwasong-12 missile reached an altitude of 2,111.5 kilometers (1,312 miles). If confirmed, that would make it the highest test out of the seven Pyongyang has conducted this year. What's worrying to the United States, among other countries, is that if this missile were fired at a different trajectory, it could have reached the US Andersen Air Force Base in Guam, according to aerospace engineer John Schilling's 38 North blog, which is published by the US Korea Institute at Johns Hopkins University. Guam is situated around 3,500 kilometers (2,200 miles) southeast of North Korea. And the US rotates heavy bombers, including B-1s, B-2s and B-52s, through the island. "North Korea's latest successful missile test represents a level of performance never before seen from a North Korean missile," Schilling wrote. Pyongyang has long threatened to develop a nuclear-tipped missile that could reach the United States, a distance of around 8,000 km (4,800 miles). But Tong Zhao, an analyst with the Carnegie-Tsinghua Center for Global Policy, said Sunday's test may give Pyongyang "a regional nuclear deterrence" option, meaning it might no longer need to pursue a weapon to reach as far as the US mainland. The US military's Pacific Command said the type of missile fired was "not consistent" with an intercontinental ballistic missile (ICBM), according to Reuters reports. But Melissa Hanham, senior research associate at the James Martin Center for Nonproliferation Studies in California, said the test could just as easily be a stepping stone to a longer-range weapon. "This may become half or a third of an ICBM," she said, pointing out that such missile are built in two or three stages stacked atop of each other. Sunday's test is also the first from North Korea since South Korean President Moon Jae-in took office last week. Moon has advocated dialogue with North Korea to denuclearize. In response, Moon said the missile test violates UN Security Council resolutions and called it a severe challenge to the peace and security of the Korean Peninsula and the world. Could North Korea launch a nuclear missile? North Korean state media claimed that Sunday's test proved that the country could launch a missile with a nuclear tip. While North Korean's arsenal of missiles is becoming clearer, there is less certainty about how developed its nuclear program is. To actually deliver such a missile, Pyongyang would have to have advanced technology in both miniaturizing its nuclear weapons as well as in protecting a nuclear warhead from being destroyed upon re-entry in the earth's atmosphere. North Korean state media claimed that Sunday's test verified a homing feature in the missile that allowed it to survive "under the worst re-entry situation" and accurately detonate. But that claim has not yet been verified by experts or officials in other countries. "It's a challenging form of technology, and there's no indication yet in the public realm that North Korea has it," Martin Navias from the Center for Defense Studies at Kings College London told CNN. "If you think of a space vehicle re-entering the earth's atmosphere, they have heat protectors to stop it from burning up inside. The speed at which a missile comes through the atmosphere creates an enormous amount of air pressure and heat." Will this provoke Russia? Sunday's test missile flew 787 kilometers (489 miles) across North Korea and into the Sea of Japan, also known as the East Sea, according to state media, and it appeared to have struck near the eastern coast of Russia. US officials said the missile hit the water around 60 miles (around 100 kilometers) from eastern Russia's Vladivostok. However, Russia said it fell 310 miles (500 kilometers) from its coast. The White House condemned the attack and made an unusually speculative statement, saying that "the President cannot imagine that Russia is pleased." On Monday, Russian President Vladimir Putin condemned the launch as "counterproductive, damaging, dangerous." But he warned against "intimidating" Pyongyang. Russia initially responded to Sunday's test by putting its far eastern air defenses on high alert, according to Russian state media, and Putin reportedly discussed the launch with Chinese President Xi Jinping during a meeting in Beijing. "Concern was expressed about the escalation of tension, including in connection with the launch (of the missile of the DPRK)," Kremlin spokesman Dmitry Peskov was quoted as saying in Russian state media. The test is unlikely to mark a new phase in North Korea's missile and nuclear ambitions. Russia is one of the few countries that has diplomatic ties with North Korea. Russia has shown concern about Pyongyang's missiles, but it may also see North Korea as an opportunity to gain leverage with the West, the US in particular, according to CNN Moscow Bureau Chief Matthew Chance. "If Russia can be instrumental in resolving a key international dispute like North Korea, they will want to parry that into something else, to use it as a bargaining chip," he said. What will the US do? US President Donald Trump's administration has made North Korea a priority security issue. The US has sent warships and submarines to waters off the Korean Peninsula, engaged in drills with South Korean and Japanese forces, and has pushed for stronger economic sanctions on Pyongyang. Following Sunday's test, the US called for repercussions from the international community. "Let this latest provocation serve as a call for all nations to implement far stronger sanctions against North Korea," said the statement from White House press secretary Sean Spicer. Trump has advocated for a diplomatic solution to the uptick in North Korean aggravations, but he said last month that he would not rule out a major conflict with North Korea.
<urn:uuid:2554c5d9-2fd7-4f44-b796-1e03da8599ae>
CC-MAIN-2018-13
https://edition.cnn.com/2017/05/15/asia/north-korean-missile-test-explainer/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257644877.27/warc/CC-MAIN-20180317100705-20180317120705-00055.warc.gz
en
0.963026
1,222
2.59375
3
3.015356
3
Strong reasoning
Politics
A revolutionary procedure involving a patient’s own stem cells has allowed British researchers to grow artificial body parts in their lab, including noses, ears, tear ducts, and blood vessels, which they can then reattach to the patient’s body. Researchers at the University College London have developed a technique they say is similar to baking a cake — only their oven is a little more sophisticated. They’ve already developed smaller organs, such as blood vessels and windpipes, although they hope to be the first scientists to transplant a nose made partly of stem cells. Last year, team leader Alexander Seifalian and his colleagues attached a lab-grown nose onto the arm of a British man who’d lost his own nose to cancer. The skin has engulfed the nose, accepting it; all that remains is the approval to transplant it. The body parts are made of a polymer material that includes a scaffolding mold and stem cell samples taken from patients’ fat. To get the desired spongy texture for the man’s artificial nose, the team added a mixture of salt and sugar to the mold. Seifalian holds a patent on the polymer used to make noses and hopes to extend it to include other organs. Currently, he and his team are working on building coronary arteries, although ears are admittedly the most challenging. "Ears are harder to make than noses because you have to get all the contours right and the skin is pulled tight so you see its entire structure," Dr. Michelle Griffin, a plastic surgeon who’s made handfuls of ears and noses as part of Seifalian’s team, told The Associated Press. The challenge with building ears also lies in the cartilage that’s used for them, which must come from a patient’s ribs and is highly invasive to extract, Griffin added. If the scientists working on the project reach a consistent level of success, their next hope is to conquer larger, more sophisticated organs. These include kidneys, lungs, and livers. In the meantime, however, there are still details that need ironing out. Invasiveness is one glaring hurdle. Another is cost. Seifalian has already put approximately $16 million into the research. He hopes one day the procedure will only burden patients by a few hundred dollars. Suchitra Sumitran-Holgersson, a professor of transplantation biology at the University of Gothenburg in Sweden, echoed Seifalian’s optimism. "I'm convinced engineered organs are going to be on the market soon,” she told the AP. Of course, there is always the battle of getting patients onboard. Stem cells aren’t exactly uncontroversial. They cut to the heart of many people’s discomforts with modern science, as the initial tests of embryonic stem cells in 2009 forced people to decide whether the technique destroyed life or effectively extended it. Since then, scientists have used adult stem cells to mimic embryonic growth, grow mini-organs, and “cut out” the human immunodeficiency virus (HIV) from mice. Seifalian has high hopes that the technique will be well-received. "If people are not that fussy, we could manufacture different sizes of noses so the surgeon could choose a size and tailor it for patients before implanting it," he told the AP. "People think your nose is very individual and personal but this is something that we could mass produce like in a factory one day."
<urn:uuid:a854f4b2-87bb-455b-bc30-1de416f68b61>
CC-MAIN-2015-27
http://www.medicaldaily.com/scientists-use-stem-cells-grow-body-parts-their-lab-including-noses-ears-and-tear-ducts-275122
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375098071.98/warc/CC-MAIN-20150627031818-00272-ip-10-179-60-89.ec2.internal.warc.gz
en
0.966077
723
3.25
3
2.873687
3
Strong reasoning
Science & Tech.
Denial of Service Attack A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. The term is generally used with regards to computer networks, but is not limited to this field, for example, it is also used in reference to CPU resource management. One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately. Denial-of-service attacks are considered violations of the IAB's Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers. They also commonly constitute violations of the laws of individual nations. Contents - 1 Symptoms and Manifestations - 2 Methods of attack - 3 ICMP flood - 4 Teardrop attacks - 5 Peer-to-peer attacks - 6 Permanent denial-of-service attacks - 7 Application level floods - 8 Nuke - 9 Distributed attack - 10 Reflected attack - 11 Unintentional denial of service - 12 Denial-of-Service Level II - 13 Blind denial of service - 14 Incidents - 15 Performing DoS-attacks - 16 Prevention and response - 17 Firewalls - 18 Switches - 19 Routers - 20 Application front end hardware - 21 IPS based prevention - 22 Prevention via proactive testing - 23 Blackholing/Sinkholing - 24 Clean pipes - 25 Side effects of DoS attacks - 26 Backscatter - 27 Denial-of-service attacks and the law Symptoms and Manifestations The United States Computer Emergency Response Team defines symptoms of denial-of-service attacks to include: * Unusually slow network performance (opening files or accessing web sites) * Unavailability of a particular web site * Inability to access any web site * Dramatic increase in the number of spam emails received—(this type of DoS attack is considered an e-mail bomb) Denial-of-service attacks can also lead to problems in the network 'branches' around the actual computer being attacked. For example, the bandwidth of a router between the Internet and a LAN may be consumed by an attack, compromising not only the intended computer, but also the entire network. If the attack is conducted on a sufficiently large scale, entire geographical regions of Internet connectivity can be compromised without the attacker's knowledge or intent by incorrectly configured or flimsy network infrastructure equipment. Methods of attack A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. There are two general forms of DoS attacks: those that crash services and those that flood services. Attacks can be directed at any network device, including attacks on routing devices and web, electronic mail, or Domain Name System servers. A DoS attack can be perpetrated in a number of ways. The five basic types of attack are: 1. Consumption of computational resources, such as bandwidth, disk space, or processor time 2. Disruption of configuration information, such as routing information. 3. Disruption of state information, such as unsolicited resetting of TCP sessions. 4. Disruption of physical network components. 5. Obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately. A DoS attack may include execution of malware intended to: * Max out the processor's usage, preventing any work from occurring. * Trigger errors in the microcode of the machine. * Trigger errors in the sequencing of instructions, so as to force the computer into an unstable state or lock-up. * Exploit errors in the operating system, causing resource starvation and/or thrashing, i.e. to use up all available facilities so no real work can be accomplished. * Crash the operating system itself. See also: Smurf attack, Ping flood, Ping of death, and SYN flood A smurf attack is one particular variant of a flooding DoS attack on the public Internet. It relies on misconfigured network devices that allow packets to be sent to all computer hosts on a particular network via the broadcast address of the network, rather than a specific machine. The network then serves as a smurf amplifier. In such an attack, the perpetrators will send large numbers of IP packets with the source address faked to appear to be the address of the victim. The network's bandwidth is quickly used up, preventing legitimate packets from getting through to their destination. To combat Denial of Service attacks on the Internet, services like the Smurf Amplifier Registry have given network service providers the ability to identify misconfigured networks and to take appropriate action such as filtering. Ping flood is based on sending the victim an overwhelming number of ping packets, usually using the "ping" command from unix-like hosts (the -t flag on Windows systems has a far less malignant function). It is very simple to launch, the primary requirement being access to greater bandwidth than the victim. SYN flood sends a flood of TCP/SYN packets, often with a forged sender address. Each of these packets is handled like a connection request, causing the server to spawn a half-open connection, by sending back a TCP/SYN-ACK packet, and waiting for a packet in response from the sender address. However, because the sender address is forged, the response never comes. These half-open connections saturate the number of available connections the server is able to make, keeping it from responding to legitimate requests until after the attack ends. A Teardrop attack involves sending mangled IP fragments with overlapping, over-sized payloads to the target machine. This can crash various operating systems due to a bug in their TCP/IP fragmentation re-assembly code. Windows 3.1x, Windows 95 and Windows NT operating systems, as well as versions of Linux prior to versions 2.0.32 and 2.1.63 are vulnerable to this attack. Around September 2009, a vulnerability in Vista was referred to as a "teardrop attack", but the attack targeted SMB2 which is a higher layer than the TCP packets that teardrop used. Attackers have found a way to exploit a number of bugs in peer-to-peer servers to initiate DDoS attacks. The most aggressive of these peer-to-peer-DDoS attacks exploits DC++. Peer-to-peer attacks are different from regular botnet-based attacks. With peer-to-peer there is no botnet and the attacker does not have to communicate with the clients it subverts. Instead, the attacker acts as a 'puppet master,' instructing clients of large peer-to-peer file sharing hubs to disconnect from their peer-to-peer network and to connect to the victim's website instead. As a result, several thousand computers may aggressively try to connect to a target website. While a typical web server can handle a few hundred connections/sec before performance begins to degrade, most web servers fail almost instantly under five or six thousand connections/sec. With a moderately big peer-to-peer attack a site could potentially be hit with up to 750,000 connections in a short order. The targeted web server will be plugged up by the incoming connections. While peer-to-peer attacks are easy to identify with signatures, the large number of IP addresses that need to be blocked (often over 250,000 during the course of a big attack) means that this type of attack can overwhelm mitigation defenses. Even if a mitigation device can keep blocking IP addresses, there are other problems to consider. For instance, there is a brief moment where the connection is opened on the server side before the signature itself comes through. Only once the connection is opened to the server can the identifying signature be sent and detected, and the connection torn down. Even tearing down connections takes server resources and can harm the server. This method of attack can be prevented by specifying in the p2p protocol which ports are allowed or not. If port 80 is not allowed, the possibilities for attack on websites can be very limited. Permanent denial-of-service attacks A permanent denial-of-service (PDoS), also known loosely as phlashing, is an attack that damages a system so badly that it requires replacement or reinstallation of hardware. Unlike the distributed denial-of-service attack, a PDoS attack exploits security flaws which allow remote administration on the management interfaces of the victim's hardware, such as routers, printers, or other networking hardware. The attacker uses these vulnerabilities to replace a device's firmware with a modified, corrupt, or defective firmware image—a process which when done legitimately is known as flashing. This therefore "bricks" the device, rendering it unusable for its original purpose until it can be repaired or replaced. The PDoS is a pure hardware targeted attack which can be much faster and requires fewer resources than using a botnet in a DDoS attack. Because of these features, and the potential and high probability of security exploits on Network Enabled Embedded Devices (NEEDs), this technique has come to the attention of numerous hacker communities. PhlashDance is a tool created by Rich Smith (an employee of Hewlett-Packard's Systems Security Lab) used to detect and demonstrate PDoS vulnerabilities at the 2008 EUSecWest Applied Security Conference Application level floods On IRC, IRC floods are a common electronic warfare weapon. Various DoS-causing exploits such as buffer overflow can cause server-running software to get confused and fill the disk space or consume all available memory or CPU time. Other kinds of DoS rely primarily on brute force, flooding the target with an overwhelming flux of packets, oversaturating its connection bandwidth or depleting the target's system resources. Bandwidth-saturating floods rely on the attacker having higher bandwidth available than the victim; a common way of achieving this today is via Distributed Denial of Service, employing a botnet. Other floods may use specific packet types or connection requests to saturate finite resources by, for example, occupying the maximum number of open connections or filling the victim's disk space with logs. A "banana attack" is another particular type of DoS. It involves redirecting outgoing messages from the client back onto the client, preventing outside access, as well as flooding the client with the sent packets. An attacker with access to a victim's computer may slow it until it is unusable or crash it by using a fork bomb. A Nuke is an old denial-of-service attack against computer networks consisting of fragmented or otherwise invalid ICMP packets sent to the target, achieved by using a modified ping utility to repeatedly send this corrupt data, thus slowing down the affected computer until it comes to a complete stop. A specific example of a nuke attack that gained some prominence is the WinNuke, which exploited the vulnerability in the NetBIOS handler in Windows 95. A string of out-of-band data was sent to TCP port 139 of the victim's machine, causing it to lock up and display a Blue Screen of Death (BSOD). Distributed Denial of Service Attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. These systems are compromised by attackers using a variety of methods. Malware can carry DDoS attack mechanisms; one of the better-known examples of this was MyDoom. Its DoS mechanism was triggered on a specific date and time. This type of DDoS involved hardcoding the target IP address prior to release of the malware and no further interaction was necessary to launch the attack. A system may also be compromised with a trojan, allowing the attacker to download a zombie agent (or the trojan may contain one). Attackers can also break into systems using automated tools that exploit flaws in programs that listen for connections from remote hosts. This scenario primarily concerns systems acting as servers on the web. Stacheldraht is a classic example of a DDoS tool. It utilizes a layered structure where the attacker uses a client program to connect to handlers, which are compromised systems that issue commands to the zombie agents, which in turn facilitate the DDoS attack. Agents are compromised via the handlers by the attacker, using automated routines to exploit vulnerabilities in programs that accept remote connections running on the targeted remote hosts. Each handler can control up to a thousand agents. These collections of systems compromisers are known as botnets. DDoS tools like stacheldraht still use classic DoS attack methods centered on IP spoofing and amplification like smurf attacks and fraggle attacks (these are also known as bandwidth consumption attacks). SYN floods (also known as resource starvation attacks) may also be used. Newer tools can use DNS servers for DoS purposes. See next section. Simple attacks such as SYN floods may appear with a wide range of source IP addresses, giving the appearance of a well distributed DDoS. These flood attacks do not require completion of the TCP three way handshake and attempt to exhaust the destination SYN queue or the server bandwidth. Because the source IP addresses can be trivially spoofed, an attack could come from a limited set of sources, or may even originate from a single host. Stack enhancements such as syn cookies may be effective mitigation against SYN queue flooding, however complete bandwidth exhaustion may require involvement Unlike MyDoom's DDoS mechanism, botnets can be turned against any IP address. Script kiddies use them to deny the availability of well known websites to legitimate users. More sophisticated attackers use DDoS tools for the purposes of extortion — even against their business rivals. It is important to note the difference between a DDoS and DoS attack. If an attacker mounts an attack from a single host it would be classified as a DoS attack. In fact, any attack against availability would be classed as a Denial of Service attack. On the other hand, if an attacker uses a thousand systems to simultaneously launch smurf attacks against a remote host, this would be classified as a DDoS attack. The major advantages to an attacker of using a distributed denial-of-service attack are that multiple machines can generate more attack traffic than one machine, multiple attack machines are harder to turn off than one attack machine, and that the behavior of each attack machine can be stealthier, making it harder to track down and shut down. These attacker advantages cause challenges for defense mechanisms. For example, merely purchasing more incoming bandwidth than the current volume of the attack might not help, because the attacker might be able to simply add more attack machines. A distributed reflected denial of service attack (DRDoS) involves sending forged requests of some type to a very large number of computers that will reply to the requests. Using Internet protocol spoofing, the source address is set to that of the targeted victim, which means all the replies will go to (and flood) the target. ICMP Echo Request attacks (Smurf Attack) can be considered one form of reflected attack, as the flooding host(s) send Echo Requests to the broadcast addresses of mis-configured networks, thereby enticing many hosts to send Echo Reply packets to the victim. Some early DDoS programs implemented a distributed form of this attack. Many services can be exploited to act as reflectors, some harder to block than others. DNS amplification attacks involve a new mechanism that increased the amplification effect, using a much larger list of DNS servers than seen earlier. Degradation-of-service attacks "Pulsing" zombies are compromised computers that are directed to launch intermittent and short-lived floodings of victim websites with the intent of merely slowing it rather than crashing it. This type of attack, referred to as "degradation-of-service" rather than "denial-of-service", can be more difficult to detect than regular zombie invasions and can disrupt and hamper connection to websites for prolonged periods of time, potentially causing more damage than concentrated floods. Exposure of degradation-of-service attacks is complicated further by the matter of discerning whether the attacks really are attacks or just healthy and likely desired increases in website traffic. Unintentional denial of service This describes a situation where a website ends up denied, not due to a deliberate attack by a single individual or group of individuals, but simply due to a sudden enormous spike in popularity. This can happen when an extremely popular website posts a prominent link to a second, less well-prepared site, for example, as part of a news story. The result is that a significant proportion of the primary site's regular users — potentially hundreds of thousands of people — click that link in the space of a few hours, having the same effect on the target website as a DDoS attack. An example of this occurred when Michael Jackson died in 2009. Websites such as Google and Twitter slowed down or even crashed. Many sites' servers thought the requests were from a virus or spyware trying to cause a Denial of Service attack, warning users that their queries looked like "automated requests from a computer virus or spyware application". News sites and link sites — sites whose primary function is to provide links to interesting content elsewhere on the Internet — are most likely to cause this phenomenon. The canonical example is the Slashdot effect. Sites such as Digg, the Drudge Report, Fark, Something Awful, and the webcomic Penny Arcade have their own corresponding "effects", known as "the Digg effect", being "drudged", "farking", "goonrushing" and "wanging"; respectively. Routers have also been known to create unintentional DoS attacks, as both D-Link and Netgear routers have created NTP vandalism by flooding NTP servers without respecting the restrictions of client types or geographical limitations. Similar unintentional denials of service can also occur via other media, e.g. when a URL is mentioned on television. If a server is being indexed by Google or another search engine during peak periods of activity, or does not have a lot of available bandwidth while being indexed, it can also experience the effects of a DoS attack. Legal action has been taken in at least one such case. In 2006, Universal Tube & Rollform Equipment Corporation sued YouTube: massive numbers of would-be youtube.com users accidentally typed the tube company's URL, utube.com. As a result, the tube company ended up having to spend large amounts of money on upgrading their bandwidth. Denial-of-Service Level II The goal of DoS L2 (possibly DDoS) attack is to cause a launching of a defense mechanism which blocks the network segment from which the attack originated. In case of distributed attack or IP header modification (that depends on the kind of security behavior) it will fully block the attacked network from Internet, but without system crash. Blind denial of service In a blind denial of service attack, the attacker has a significant advantage. The attacker must be able to receive traffic from the victim, then the attacker must either subvert the routing fabric or use the attacker's own IP address. Either provides an opportunity for the victim to track the attacker and/or filter out his traffic. With a blind attack the attacker uses one or more forged IP addresses, making it extremely difficult for the victim to filter out those packets. The TCP SYN flood attack is an example of a blind attack. -The first major attack involving DNS servers as reflectors occurred in January 2001. The target was Register.com. This attack, which forged requests for the MX records of AOL.com (to amplify the attack) lasted about a week before it could be traced back to all attacking hosts and shut off. It used a list of tens of thousands of DNS records that were a year old at the time of the attack. -In February, 2001, the Irish Government's Department of Finance server was hit by a denial of service attack carried out as part of a student campaign from NUI Maynooth. The Department officially complained to the University authorities and a number of students were disciplined. -In July 2002, the Honeynet Project Reverse Challenge was issued. The binary that was analyzed turned out to be yet another DDoS agent, which implemented several DNS related attacks, including an optimized form of a reflection attack. -On two occasions to date, attackers have performed DNS Backbone DDoS Attacks on the DNS root servers. Since these machines are intended to provide service to all Internet users, these two denial of service attacks might be classified as attempts to take down the entire Internet, though it is unclear what the attackers' true motivations were. The first occurred in October 2002 and disrupted service at 9 of the 13 root servers. The second occurred in February 2007 and caused disruptions at two of the root servers. -In February 2007, more than 10,000 online game servers in games such as Return to Castle Wolfenstein, Halo, Counter-Strike and many others were attacked by the hacker group RUS. The DDoS attack was made from more than a thousand computer units located in the republics of the former Soviet Union, mostly from Russia, Uzbekistan and Belarus. Minor attacks are still continuing to be made today. -In the weeks leading up to the five-day 2008 South Ossetia war, a DDoS attack directed at Georgian government sites containing the message: "win+love+in+Rusia" effectively overloaded and shut down multiple Georgian servers. Websites targeted included the Web site of the Georgian president, Mikhail Saakashvili, rendered inoperable for 24 hours, and the National Bank of Georgia. While heavy suspicion was placed on Russia for orchestrating the attack through a proxy, the St. Petersburg-based criminal gang known as the Russian Business Network, or R.B.N, the Russian government denied the allegations, stating that it was possible that individuals in Russia or elsewhere had taken it upon themselves to start the attacks. -During the 2009 Iranian election protests, foreign activists seeking to help the opposition engaged in DDoS attacks against Iran's government. The official website of the Iranian government (ahmedinejad.ir ) -was rendered inaccessible on several occasions. Critics claimed that the DDoS attacks also cut off internet access for protesters inside Iran; activists countered that, while this may have been true, the attacks still hindered President Mahmoud Ahmadinejad's government enough to aid the opposition. -On June 25, 2009, the day Michael Jackson died, the spike in searches related to Michael Jackson was so big that Google News initially mistook it for an automated attack. As a result, for about 25 minutes, when some people searched Google News they saw a "We're sorry" page before finding the articles they were looking for. -June 2009 the P2P site The Pirate Bay was rendered inaccessible due to a DDoS attack. This was most likely provoked by the recent sellout to Global Gaming Factory X AB, which was seen as a "take the money and run" solution to the website's legal issues. In the end, due to the buyers' financial troubles, the site was not sold. -Multiple waves of July 2009 cyber attacks targeted a number of major websites in South Korea and the United States. The attacker used botnet and file update through internet is known to assist its spread. As it turns out, a computer trojan was coded to scan for existing MyDoom bots. MyDoom was a worm in 2004, and in July around 20,000-50,000 were present. MyDoom has a backdoor, which the DDoS bot could exploit. Since then, the DDoS bot removed itself, and completely formatted the hard drives. Most of the bots originated from China, and North Korea. -On August 6, 2009 several social networking sites, including Twitter, Facebook, Livejournal, and Google blogging pages were hit by DDoS attacks, apparently aimed at Georgian blogger "Cyxymu". Although Google came through with only minor set-backs, these attacks left Twitter crippled for hours and Facebook did eventually restore service although some users still experienced trouble. Twitter's Site latency has continued to improve, however some web requests continue to fail. -In July and August, 2010, the Irish Central Applications Office server was hit by a denial of service attack on four separate occasions, causing difficulties for thousands of Second Level students who are required to use the CAO to apply for University and College places. The attack is currently subject to a Garda investigation. A wide array of programs are used to launch DoS-attacks. Most of these programs are completely focused on performing DoS-attacks, while others are also true Packet injectors, thus able to perform other tasks as well. Some examples of such tools are hping, JAVA socket programming, and httping but these are not the only programs capable of such attacks. Such tools are intended for benign use, but they can also be utilized in launching attacks on victim networks. In addition to these tools, there exist a vast amount of underground tools used by attackers. Prevention and response Firewalls have simple rules such as to allow or deny protocols, ports or IP addresses. Some DoS attacks are too complex for today's firewalls, e.g. if there is an attack on port 80 (web service), firewalls cannot prevent that attack because they cannot distinguish good traffic from DoS attack traffic. Additionally, firewalls are too deep in the network hierarchy. Routers may be affected even before the firewall gets the traffic. Nonetheless, firewalls can effectively prevent users from launching simple flooding type attacks from machines behind the firewall. Some stateful firewalls like OpenBSD's pF, can act as a proxy for connections, the handshake is validated (with the client) instead of simply forwarding the packet to the destination. It is available for other BSDs as well. In that context, it is called "synproxy". Most switches have some rate-limiting and ACL capability. Some switches provide automatic and/or system-wide rate limiting, traffic shaping, delayed binding (TCP splicing), deep packet inspection and Bogon filtering (bogus IP filtering) to detect and remediate denial of service attacks through automatic rate filtering and WAN Link failover and balancing. These schemes will work as long as the DoS attacks are something that can be prevented by using them. For example SYN flood can be prevented using delayed binding or TCP splicing. Similarly content based DoS can be prevented using deep packet inspection. Attacks originating from dark addresses or going to dark addresses can be prevented using Bogon filtering. Automatic rate filtering can work as long as you have set rate-thresholds correctly and granularly. Wan-link failover will work as long as both links have DoS/DDoS prevention mechanism. Similar to switches, routers have some rate-limiting and ACL capability. They, too, are manually set. Most routers can be easily overwhelmed under DoS attack. If you add rules to take flow statistics out of the router during the DoS attacks, they further slow down and complicate the matter. Cisco IOS has features that prevent flooding, i.e. example settings. Application front end hardware Application front end hardware is intelligent hardware placed on the network before traffic reaches the servers. It can be used on networks in conjunction with routers and switches. Application front end hardware analyzes data packets as they enter the system, and then identifies them as priority, regular, or dangerous. There are more than 25 bandwidth management vendors. Hardware acceleration is key to bandwidth management. IPS based prevention Intrusion-prevention systems (IPS) are effective if the attacks have signatures associated with them. However, the trend among the attacks is to have legitimate content but bad intent. Intrusion-prevention systems which work on content recognition cannot block behavior-based DoS attacks. An ASIC based IPS can detect and block denial of service attacks because they have the processing power and the granularity to analyze the attacks and act like a circuit breaker in an automated way. A rate-based IPS (RBIPS) must analyze traffic granularly and continuously monitor the traffic pattern and determine if there is traffic anomaly. It must let the legitimate traffic flow while blocking the DoS attack traffic. Prevention via proactive testing Test platforms such as Mu Dynamics' Service Analyzer are available to perform simulated denial-of-service attacks that can be used to evaluate defensive mechanisms such IPS, RBIPS, as well as the popular denial-of-service mitigation products from Arbor Networks. An example of proactive testing of denial-of-service throttling capabilities in a switch was performed in 2008: The Juniper EX 4200 switch with integrated denial-of-service throttling was tested by Network Test and the resulting review was published in Network World With blackholing, all the traffic to the attacked DNS or IP address is sent to a "black hole" (null interface, non-existent server, ...). To be more efficient and avoid affecting your network connectivity, it can be managed by the ISP. Sinkholing routes to a valid IP address which analyzes traffic and reject bad ones. Sinkholing is not efficient for most severe attacks. All traffic is passed through a "cleaning center" via a proxy, which separates "bad" traffic (DDoS and also other common internet attacks) and only sends good traffic beyond to the server. The provider needs central connectivity to the Internet to manage this kind of service. Prolexic and Verisign are examples of providers of this service. Side effects of DoS attacks In computer network security, backscatter is a side-effect of a spoofed denial of service (DoS) attack. In this kind of attack, the attacker spoofs (or forges) the source address in IP packets sent to the victim. In general, the victim machine can not distinguish between the spoofed packets and legitimate packets, so the victim responds to the spoofed packets as it normally would. These response packets are known as backscatter. If the attacker is spoofing source addresses randomly, the backscatter response packets from the victim will be sent back to random destinations. This effect can be used by network telescopes as indirect evidence of such attacks. The term "backscatter analysis" refers to observing backscatter packets arriving at a statistically significant portion of the IP address space to determine characteristics of DoS attacks and victims. An educational animation describing such backscatter can be found on the animations page maintained by the Cooperative Association for Internet Data Analysis. Denial-of-service attacks and the law In the Police and Justice Act 2006, the United Kingdom specifically outlawed denial-of-service attacks and set a maximum penalty of 10 years in prison. In the US, they can be a serious federal crime under the National Information Infrastructure Protection Act of 1996 with penalties that include years of imprisonment, and many countries have similar laws.
<urn:uuid:93c82dff-a9bb-4186-be37-92418c685346>
CC-MAIN-2019-13
https://www.mywot.com/wiki/index.php/Denial_of_Service_Attack
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202131.54/warc/CC-MAIN-20190319203912-20190319225912-00401.warc.gz
en
0.942046
6,576
3.4375
3
3.060918
3
Strong reasoning
Software
Its full name is Nuestra Señora de la Encarnación (Our Lady of Incarnation) although in Málaga it is simply known as “the Cathedral”. Cathedrals are important in all cities, but here in Málaga it is even more important than usual. It is not only a religious building but a landmark, a national landmark, a milestone along the road and a witness to many events. The building is one of the best examples of Spanish religious art and it is located on the remains of other cultural buildings such as the early Almohad mosque. Its foundations were laid around 1530 and work ended in the 17th century, although it is unfinished and lacks coping on the main façade and the south tower. The missing tower has led to it being popularly known as La Manquita (one-armed) and a legend that is still told today says that the money allocated for its completion in the 19th century was sent to pay for the wars in America, although there is evidence that the money actually went to fund emergency public works in the province. With three naves with ambulatories, it is in some ways an evolution of Gothic art. This style initially welcomed the new Renaissance ideas building all the naves to the same height with ribbed vaults forming the characteristic cupolas that can be seen from above, for example, when you observe the cathedral from the Málaga Palacio hotel. The elevation integrates Siloé’s style with the Brunelleschi cube, helping to give greater height and visual impact without distorting the canon. The design of the apse makes the Manquita the sister of Granada and Guadix, both 16th century Andalusian cathedrals. However, the choir relates it to the Choirs of Toledo and Córdoba, the three most important of Spain. The Málaga choir has 42 carvings that are mostly the work of Pedro de Mena and a masterpiece made after previous interventions by Luis Ortiz de Vargas and the Apostleship by sculptor José Micael Alfaro, all of which make it one of the most important works of its kind. There are also two magnificent organs with more than 4,000 pipes, rare and beautiful examples of 18th century musical instruments. Today they are still being put to good use and are frequently played in concerts. The façades of the cathedral are known as “de las Cadenas” or “of the Chains” that face the Zea-Salvatierra Palace with its gardens and courtyard of orange trees. The main façade, is referred to as the Plaza del Obispo (Bishop’s Square) and also, although it is not physically part of the Cathedral, as the Tabernacle façade. Since the mid-20th century, the Cathedral has been completely detached after the last houses that were attached to it in the area by the park were demolished. You will find the Museo Catedralicio (Cathedral Museum) inside the cathedral, which is currently housed where the old Chapter House can be found. There are two rooms, part of the 18th Century building work, with beautiful 19th Century coffer-work, pieces from the Cathedral itself and other sites. Some original rooms have now disappeared such as the old Room of Ornaments, also called the Cathedral Treasury, and the old Chapter House itself. The first room houses most of the sacred works.
<urn:uuid:8cb11e4f-3e55-4da7-b92f-f5eb728c6c19>
CC-MAIN-2020-16
https://lifeinmalaga.com/en/malaga-cathedral/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371624083.66/warc/CC-MAIN-20200406102322-20200406132822-00559.warc.gz
en
0.97162
731
2.578125
3
2.389259
2
Moderate reasoning
History
BLOGS BY TOPIC BLOGS BY AUTHOR BLOGS BY YEAR PowerPivot is a superb addition to Excel: it allows you to create pivot tables based on multiple tables taken from a variety of data sources, and its DAX language lets you report any statistic you want. This overview summarises how to get started with PowerPivot, and what it does. Posted by Andy Brown on 31 January 2013 You need a minimum screen resolution of about 700 pixels width to see our blogs. This is because they contain diagrams and tables which would not be viewable easily on a mobile phone or small laptop. Please use a larger tablet, notebook or desktop computer, or change your screen resolution settings. Stage 4 - creating measures using DAX My sole purpose of this part of the blog is to give an idea of what PowerPivot allows you to do. It's not intended to be a full-blown tutorial. In particular, I'm not showing how to create and use a calendar table to show year-to-date, period-to-date and other time-based aggregate data. Our example - showing the proportion of films made Suppose we want to show not the number of films made, but the proportion: |We want to show not this ...||... but this.| So for example Steven Spielberg made 3 films in the 1990s, comprising 60% of all of the films made in that decade. Although there is a way to do this using standard Excel pivot tables, we'll create a measure. Creating the measure To create our measure, right-click on the Films table and choose to add it: Right-click to add the new measure. You can now create the measure as follows: - Give the measure a sensible name (here we've called it Proportion). - Type in a formula which makes sense (see below for what this does). - Choose a number format (we'll display the number as a percentage). - Choose OK. These numbered steps are shown below: The steps to follow to create our measure. Explanation of the measure formula You write measures using the DAX language, a variant of the MDX language used in Analysis Services. Here's a sample: This has two parts. The first part just counts the number of films for the current pivot table cell (this is called the filter context): A pivot table just showing =COUNTA(Films[FilmName]). The number selected is 3, because the count of films made by Steven Spielberg in the 1990s was 3. The second part counts the number of films made for all directors, for the current filter context: This is what =CALCULATE(COUNTA(Films[FilmName]),ALL(Films[Director])) would show: the number of films made by all directors, for the given decade. Dividing the first part of the formula by the second gives the proportion of films made by each director for any given decade: The percentages must sum to 100%. Learning DAX is where the fun starts! If you're in the UK and you're interested by what you've seen, Wise Owl run a two-day PowerPivot course. So now you're displaying the right measure, the last thing to show is how to create KPIs!
<urn:uuid:e9416c37-bf08-4084-83cd-e112ff8eacb4>
CC-MAIN-2017-04
http://www.wiseowl.co.uk/blog/s342/measures.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00255-ip-10-171-10-70.ec2.internal.warc.gz
en
0.910262
699
2.703125
3
1.94318
2
Moderate reasoning
Software
On a sword, the crossguard, or cross-guard, also known as quillons, is a bar of metal at right angles to the blade, placed between the blade and the hilt. The crossguard was developed in the European sword around the 10th century for the protection of the wielder's hand. The earliest forms were the crossguard variant of the Spatha used by the Huns, the so-called Pontic swords. The crossguards were not only used to counter enemy attacks, but also to get a better grip on the sword. They were later seen in late Viking swords, and is a standard feature of the Norman sword of the 11th century and of the knightly arming sword throughout the high and late medieval period. Early crossguards were straight metal bars, sometimes tapering towards the outer ends. While this simple type was never discontinued, more elaborate forms developed alongside it in the course of the Middle Ages. The crossguard could be waisted or bent in the 12th and 13th century. Beginning in the 13th or 14th century, swords were almost universally fitted with a so-called chappe or rain-guard, a piece of leather fitted to the crossguard. The purpose of this leather is not entirely clear, but it seems to have originated as a part of the scabbard, functioning as a lid when the sword was in the scabbard. In the 14th to 15th century, many more elaborate forms were tried. A feature of such late medieval forms is the cusp or écusson, a protrusion of the crossguard in the center where it is fitted on the blade. Also from the 14th century, the leather chappe is sometimes replaced with a metal sheet. An early example of this is a sword dated to c. 1320–40 kept at the Kelvingrove Museum in Glasgow. A later example is the "Monza sword" of Estore Visconti (early 15th century), where the rain-guard is of silver and decorated with a floral motif. After the end of the Middle Ages, crossguards became more elaborate, forming first quillons and then, through the addition of guard branches, the basket hilt, which offered more protection to the unarmored hand. Ewart Oakeshott in chapter 4 of his The Sword in the Age of Chivalry (1964) classifies medieval cross-guards into twelve types: - a plain horizontal bar, tapering towards the end. This is the basic shape found from the late Viking era through the 17th century. - waisted type, popular in the 15th century. - a relatively short bar with a rectangular cross-section. Popular during 1150–1250 and again during 1380–1430. - the terminals of the bar are bent towards the blade. - "bow tie" style with widened and flattened terminals. - a curved or bent variant of type 5. - the bar has a flat cross-section and is bent towards the blade; popular in the 14th century. - bent terminals as in style 4, but a more elaborate form with a hexagonal cross-section of the part fitted around the tang and a pronounced écusson, popular in the late medieval period. - an elaborate late medieval type with the bar bent towards the blade and a flat diamond or V shaped cross-section and a pronounced écusson. - the arms of the bar taper towards the hilt rather than away from it; mostly also with a pronounced écusson. - knobbed terminals, with round or rectangular cross-section, popular during the 15th to 16th centuries - the bar curves strongly in the horizontal plane, forming an S-shape; this type dates to the end of the medieval period and is transitional to the early modern quillon types. The medieval dagger in the 14th and 15th century also adopted a variant with quillons, styled after the hilt of a sword. Quillon-daggers remained popular in the 16th century, after the sword type it resembled had fallen out of use. - a quillon is "either of the two arms forming the cross-guard" (OED). The term arises in Middle French in the late 16th century, and is adopted in English only in the 19th century. The French word is a diminutive of quille "bowling pin", itself a loan of German kegel. - Frederick Wilkinson, Edged weapons, 1970, p. 71 - Ewart Oakeshott, The Sword in the Age of Chivalry (1964), chapter 4. - Oakeshott cross types (myarmoury.com)
<urn:uuid:997f8641-cd8b-47c6-a583-448652bfc56f>
CC-MAIN-2018-51
https://en.wikipedia.org/wiki/Crossguard
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826842.56/warc/CC-MAIN-20181215083318-20181215105318-00045.warc.gz
en
0.95448
979
3.734375
4
2.243058
2
Moderate reasoning
History
Clinical trials on an Indian-made product have yielded promising results in the prevention of meningitis. Following these promising findings, it might not be long before a cost effective meningitis vaccine is made available, say researchers, hopeful about the same. The vaccine has already demonstrated a high level of safety and efficacy and is claimed to confer long lasting protection against Meningitis A, more prevalent in Africa. Clinical trials of the low cost vaccine would soon be initiated in Africa. Meningitis Vaccine Project, a non-profit group headed by Dr Mark LaForce, would coordinate the clinical trial. AdvertisementPhase II clinical trials of the vaccine would soon be initiated in Mali and Gambia. Dr Mark LaForce intends to license the vaccine in India soon and request the WHO to permit bulk purchase of the vaccine, through the UNICEF. If the vaccine were found to be safe for use in the African population, massive production of the vaccine would be taken up by the Serum Institute of India. The institute further guarantees delivery of the vaccine at a subsidized rate of 40 cents per dose, for a period of 10 years. The researchers intend to achieve the target of widespread use of the vaccine in sub Saharan Africa by the end of 2009. Approximately 30, 000 to 250, 000 children in this region contract the infection, every year. About 10% of those infected lose their lives while the rest of the survivors turn deaf. If the above plan were to be materialized, it would mark the first ever initiative taken for production of the vaccine, exclusively for use by the developing and underdeveloped countries. It would also ensure that the drug manufacturer receives an optimal level of profit. Currently, GlaxoSmithKline and Sanofi Aventis, both leading pharmaceutical companies, are producing meningitis vaccine. The high cost of the vaccine and the high effectiveness of the vaccine in children over 2 years of age, limit the widespread use of the vaccine by those in the developing countries. While the Western based pharmaceutical companies claim that development of such a vaccine would cost at least $800m or more, said the Meningitis Vaccine Project said that it could meet the target for just $70m, before 2011, inclusive of vaccine development, licensing and commercialization of the vaccine. The possibility of developing cost-effective vaccines by using novel strategies developed by researchers in the developing nations represents a groundbreaking approach in the competitive area of drug development. PMMR Vaccine Immunizations Rates Are On The Rise 37 times unlucky Failure to Diagnose Cancer, Takes the Life of a 31 year old father M You May Also Like
<urn:uuid:30e68c2d-562b-40ed-aa5c-98003f33068c>
CC-MAIN-2016-44
http://www.medindia.net/news/view_news_main.asp?x=8526
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718309.70/warc/CC-MAIN-20161020183838-00159-ip-10-171-6-4.ec2.internal.warc.gz
en
0.933593
534
2.84375
3
2.92195
3
Strong reasoning
Health
Aplastic anemia is a condition that occurs when your body stops producing enough new blood cells. Aplastic anemia leaves you feeling fatigued and with a higher risk of infections and uncontrolled bleeding. A rare and serious condition, aplastic anemia can develop at any age. Aplastic anemia may occur suddenly, or it can occur slowly and get worse over a long period of time. Treatment for aplastic anemia may include medications, blood transfusions or a stem cell transplant. Aplastic anemia symptoms may include: - Shortness of breath with exertion - Rapid or irregular heart rate - Pale skin - Frequent or prolonged infections - Unexplained or easy bruising - Nosebleeds and bleeding gums - Prolonged bleeding from cuts - Skin rash Aplastic anemia can progress slowly over weeks or months, or it may come on suddenly. The illness may be brief, or it may become chronic. Aplastic anemia can be very severe and even fatal. Aplastic anemia develops when damage occurs to your bone marrow, slowing or shutting down the production of new blood cells. Bone marrow is a red, spongy material inside your bones that produces stem cells, which give rise to other cells. Stem cells in the bone marrow produce blood cells — red cells, white cells and platelets. In aplastic anemia, the bone marrow is described in medical terms as aplastic or hypoplastic — meaning that it's empty (aplastic) or contains very few blood cells (hypoplastic). Factors that can temporarily or permanently injure bone marrow and affect blood cell production include: - Radiation and chemotherapy treatments. While these cancer-fighting therapies kill cancer cells, they can also damage healthy cells, including stem cells in bone marrow. Aplastic anemia can be a temporary side effect of these treatments. - Exposure to toxic chemicals. Exposure to toxic chemicals, such as some used in pesticides and insecticides, may cause aplastic anemia. Exposure to benzene — an ingredient in gasoline — also has been linked to aplastic anemia. This type of anemia may get better on its own if you avoid repeated exposure to the chemicals that caused your initial illness. - Use of certain drugs. Some medications, such as those used to treat rheumatoid arthritis and some antibiotics, can cause aplastic anemia. - Autoimmune disorders. An autoimmune disorder, in which your immune system begins attacking healthy cells, may involve stem cells in your bone marrow. - A viral infection. Viral infections that affect bone marrow may play a role in the development of aplastic anemia in some people. Viruses that have been linked to the development of aplastic anemia include hepatitis, Epstein-Barr, cytomegalovirus, parvovirus B19 and HIV. - Pregnancy. Aplastic anemia that occurs in pregnancy may be related to an autoimmune problem — your immune system may attack your bone marrow during pregnancy. - Unknown factors. In many cases, doctors aren't able to identify the cause of aplastic anemia. This is called idiopathic aplastic anemia. Confusion with myelodysplastic syndrome Aplastic anemia can be mistaken for a condition called myelodysplastic syndrome. In this group of disorders, the bone marrow produces new blood cells, but they're deformed and underdeveloped. The bone marrow in myelodysplastic syndrome is sometimes called hyperplastic — meaning that it's packed with blood cells. But some people with myelodysplastic syndrome have empty marrow that's difficult to distinguish from aplastic anemia. Connections with other rare disorders Some people with aplastic anemia also have a rare disorder known as paroxysmal nocturnal hemoglobinuria. This disorder causes red blood cells to break down too soon. Paroxysmal nocturnal hemoglobinuria can lead to aplastic anemia, or aplastic anemia can evolve into paroxysmal nocturnal hemoglobinuria. Fanconi's anemia is a rare, inherited disease that leads to aplastic anemia. Children born with it tend to be smaller than average and have birth defects, such as underdeveloped limbs. The disease is diagnosed with the help of blood tests. Aplastic anemia is rare. Factors that may increase your risk include: - Treatment with high-dose radiation or chemotherapy for cancer - Exposure to toxic chemicals - The use of some prescription drugs — such as chloramphenicol, which is used to treat bacterial infections, and gold compounds used to treat rheumatoid arthritis - Certain blood diseases, autoimmune disorders and serious infections - Pregnancy, rarely If you have signs or symptoms of aplastic anemia, start by making an appointment with your family doctor or a general practitioner. If your doctor suspects aplastic anemia, you'll likely be referred to a doctor who specializes in treating blood disorders (hematologist). If aplastic anemia comes on suddenly, you may begin treatment in the emergency room. Here's some information to help you get ready for your appointment, and what to expect from your doctor. What you can do - Write down any symptoms you're experiencing, including any that may seem unrelated to the reason for which you scheduled the appointment. - Write down key personal information, including any recent life changes, such as a new job, particularly one that exposes you to chemicals. - Make a list of all medications, as well as any vitamins or supplements, that you're taking. - Ask a family member or a friend to stay with you while you talk to your doctor. You may be tired or overwhelmed by all the information. A friend or a family member can take notes for you, or bring up questions you may forget to ask. - Write down questions you want to ask your doctor. Preparing a list of questions ahead of time can help you make the most of your time together. For aplastic anemia, some basic questions to ask your doctor include: - What's the most likely cause of my symptoms? - Are there other possible causes for my symptoms? - What's my prognosis? - What treatments are available, and which do you recommend? - Are there any alternatives to the primary approach that you're suggesting? - I have another health condition. How can I best manage them together? - Are there any brochures or other printed material that I can take with me? What websites do you recommend? In addition to the questions that you've prepared to ask your doctor, don't hesitate to ask questions during your appointment. What to expect from your doctor Your doctor is likely to ask you a number of questions, such as: - Have you had any infections? - Have you had any unexpected bleeding? - Have you felt more tired than usual? - When did you begin experiencing symptoms? - Is there anything new in your life, such as a new job or a new medication? - Does anything seem to improve your symptoms? - Does anything appear to worsen your symptoms? To diagnose aplastic anemia, your doctor may recommend: - Blood tests. Normally, red blood cell, white blood cell and platelet levels stay within a certain range. Your doctor may suspect aplastic anemia when all three of these blood cell levels are very low. - Bone marrow biopsy. To confirm a diagnosis, you'll need to undergo a bone marrow biopsy. In this procedure, a doctor uses a needle to remove a small sample of bone marrow from a large bone in your body, such as your hipbone. The bone marrow sample is examined under a microscope to rule out other blood-related diseases. In aplastic anemia, bone marrow contains fewer blood cells than normal. Once you've received a diagnosis of aplastic anemia, you may need additional tests to determine an underlying cause. Treatments for aplastic anemia may include observation for mild cases, blood transfusions and medications for more-serious cases, and in severe cases, bone marrow transplantation. Severe aplastic anemia, in which your blood cell counts are extremely low, is life-threatening and requires immediate hospitalization for treatment. Treatment for aplastic anemia usually involves blood transfusions to control bleeding and relieve anemia symptoms. Blood transfusions aren't a cure for aplastic anemia. But they do relieve signs and symptoms by providing blood cells that your bone marrow isn't producing. A transfusion may include: - Red blood cells. Transfusions of red blood cells raise red blood cell counts. This helps relieve anemia and fatigue. - Platelets. Transfusions of platelets help prevent excessive bleeding. While there's generally no limit to the number of blood cell transfusions you can have, complications can sometimes arise with multiple transfusions. Transfused red blood cells contain iron that can accumulate in your body and can damage vital organs if an iron overload isn't treated. Medications can help your body get rid of excess iron. Another possible complication is that over time, your body may develop antibodies to transfused blood cells, making them less effective at relieving symptoms. However, the use of immunosuppressant medication makes this complication less likely. Stem cell transplant A stem cell transplant to rebuild the bone marrow with stem cells from a donor may offer the only successful treatment option for people with severe aplastic anemia. A stem cell transplant, which is also called a bone marrow transplant, is generally the treatment of choice for people who are younger and have a matching donor — most often a sibling. If a donor is found, your diseased bone marrow is first depleted with radiation or chemotherapy. Healthy stem cells from the donor are filtered from the blood. The healthy stem cells are injected intravenously into your bloodstream, where they migrate to the bone marrow cavities and begin generating new blood cells. The procedure requires a lengthy hospital stay. After the transplant, you'll receive drugs to help prevent rejection of the donated stem cells. A stem cell transplant carries risks. There's a chance that your body may reject the transplant, leading to life-threatening complications. In addition, not everyone is a candidate for transplantation or can find a suitable donor. For people who can't undergo a bone marrow transplant or for those whose aplastic anemia may be due to an autoimmune disorder, treatment may involve drugs that alter or suppress the immune system (immunosuppressants). Drugs such as cyclosporine (Gengraf, Neoral, Sandimmune) and anti-thymocyte globulin (Thymoglobulin) are examples. These drugs suppress the activity of immune cells that are damaging your bone marrow. This helps your bone marrow recover and generate new blood cells. Cyclosporine and anti-thymocyte globulin are often used in combination. Corticosteroids, such as methylprednisolone (Medrol, Solu-Medrol), are often given at the same time as these drugs. Immune-suppressing drugs can be very effective at treating aplastic anemia. The downside is that these drugs further weaken your immune system. It's also possible that after you stop taking these drugs, aplastic anemia may return. Bone marrow stimulants Certain drugs — including colony-stimulating factors, such as sargramostim (Leukine), filgrastim (Neupogen) and pegfilgrastim (Neulasta), and epoetin alfa (Epogen, Procrit) — may help stimulate the bone marrow to produce new blood cells. Growth factors are often used in combination with immune-suppressing drugs. Having aplastic anemia weakens your immune system. You have fewer white blood cells in circulation to fight off germs. This leaves you susceptible to infections. At the first sign of infection, such as a fever, see your doctor. You don't want the infection to get worse, because it could prove life-threatening. If you have severe aplastic anemia, your doctor may give you antibiotics or antiviral medications to help prevent infections. Aplastic anemia caused by radiation and chemotherapy treatments for cancer usually improves once you complete those treatments. The same is true for most other drugs that induce aplastic anemia. Pregnant women with aplastic anemia are treated with blood transfusions. For many women, pregnancy-related aplastic anemia improves once the pregnancy ends. If that doesn't happen, treatment is still necessary. If you have aplastic anemia, take care of yourself by: - Resting when you need to. Anemia can cause fatigue and shortness of breath with even mild exertion. Take a break and rest when you need to. - Avoiding contact sports. Because of the risk of bleeding associated with a low platelet count, avoid activities that may result in a cut or fall. - Protecting yourself from germs. You can reduce your risk of infections with frequent hand-washing and by avoiding sick people. If you develop a fever or other indicators of an infection, see your doctor for treatment. Tips to help you and your family better cope with your illness include: - Research your disease. The more you know, the better prepared you'll be to make treatment decisions. - Ask questions. Be sure to ask your doctor about anything related to your disease or treatment that you don't understand. It may help you to record or write down what your doctor tells you. - Be vocal. Don't be afraid to express any concerns you have to your doctor or any other health care professional treating you. - Seek support. Ask family and friends for emotional support. Ask them to consider becoming blood donors or bone marrow donors. Consider joining an aplastic anemia support group. It may be helpful to talk to others coping with the disease. Ask your doctor if he or she knows of any local support groups, or contact the Aplastic Anemia & MDS International Foundation. It offers a peer support network and can be reached at 800-747-2820. - Take care of yourself. Proper nutrition and sleep are important to optimize blood production. There's generally no prevention for most cases of aplastic anemia. However, avoiding exposure to insecticides, herbicides, organic solvents, paint removers and other toxic chemicals may lower your risk of the disease. March 18, 2014 - Aplastic anemia. National Heart, Lung, and Blood Institute. http://www.nhlbi.nih.gov/health/health-topics/topics/aplastic/. Accessed Sept. 14, 2013. - Lichtman MA, et al. Williams Hematology. 8th ed. New York, N.Y.: The McGraw-Hill Companies; 2010. http://www.accessmedicine.com/resourceTOC.aspx?resourceID=69. Accessed Sept. 14, 2013. - Schrier SL. Aplastic anemia: Prognosis and treatment. http://www.uptodate.com/home. Accessed Sept. 14, 2013.
<urn:uuid:d65bf78c-a3a2-4077-8b50-96eee02b2027>
CC-MAIN-2016-30
http://www.mayoclinic.org/diseases-conditions/aplastic-anemia/basics/treatment/con-20019296?p=1
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469258950570.93/warc/CC-MAIN-20160723072910-00093-ip-10-185-27-174.ec2.internal.warc.gz
en
0.92719
3,202
3.671875
4
2.283265
2
Moderate reasoning
Health
What is Cryptocurrency? Cryptocurrency is a digital money system designed to make transactions super secure. The complex tender uses cryptography, a form of secret coding originating from the Second World War to process transactions securely and to verify them. A host of different currencies exist under the cryptocurrency title. The most well-known, Bitcoin, was created in 2009 as a form of digital money and world payment system. Unlike regular money, the cybercash has no physical presence and differs from regular transactions by using decentralised control as opposed to central banking systems. In the world of cryptocurrency, the production of currency is generally capped. Bitcoin’s younger brother Litecoin consists of 84 million units, for example, as opposed to its sibling’s 21 million. The risks of investing in cryptocurrencies: - Cryptocurrency is subject to minimal regulatory oversight, susceptible to cybersecurity breaches or hacks, and there may be no recourse should the cryptocurrency disappear. - Cryptocurrency accounts are not insured by the Federal Deposit Insurance Corporation, which insures bank deposits up to $250,000. - The high volatility of cryptocurrency investments makes them unsuitable for most investors, especially those investing for long-term goals or retirement. - Investors in cryptocurrency are highly reliant upon unregulated companies, including some that may lack appropriate internal controls and may be more susceptible to fraud and theft than regulated financial institutions. - Investors will have to rely upon the strength of their own computer security systems, as well as security systems provided by third parties, to protect purchased cryptocurrencies from theft. Can you earn by buying/trading cryptocurrency? Similar to the stock market (although not exactly), you exchange dollars, or whatever your country’s currency is for virtual coins or part of a coin (you can buy a sliver of a coin up to eight decimal places). There are more complicated ways to buy or sell crypto that avoid fees, however using some sort of broker that will include a small fee for every time you buy or sell. Similar to stocks you can buy a small piece of many, or go all in one two to three coins. There are other brokers that allow you to buy a variety of coins, however, to buy those other coins you’ll have to exchange Bitcoin, not dollars. How do you make money? Buy and hold. That’s it. The coins’ worth can be exchanged for dollars using these networks. Some say it’s about timing, others have a longer strategy. When you get ready to cash out, cash out. If one would have spent $1,000 on Ethereum on March 12th, 2017, at $25 a coin, he/she would have had 40 coins. If one held these coins until, June 9th 2017, one coin would be worth $269. A virtual portfolio would have gone from $1,000to $10,760 . That’s a 10x return. The beauty of it is you can buy just one coin, or a part of a coin. In order to realize these gains, one would need to convert it to cash. Today 20 Jan 2018, one ETH is worth 1.300$. You can also earn a lot by trading, “buy low, sell high” as we like to say. How can you trade? It’s easy, first you educate yourself about how to read charts and risk management. Than you create an account on an exchange and start trading. I use and recommend one of the biggest exchanges: www.binance.com But there are others too, you can do your research and register on the exchange you believe it’s the best or go with my recommendation based on my research and experience using it. Good luck and don’t trade base on your emotions. And also, keep in mind one thing: DO NOT INVEST MORE THAN YOU ARE WILLING TO LOSE!
<urn:uuid:4d7e2868-1fb3-487d-941a-255751c8b24d>
CC-MAIN-2019-43
http://www.wealth-and-power.com/cryptocurrency-trading/
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987750110.78/warc/CC-MAIN-20191020233245-20191021020745-00404.warc.gz
en
0.954862
808
2.953125
3
2.105477
2
Moderate reasoning
Finance & Business
|UNESCO World Heritage Site| |Location||Vicenza, Province of Vicenza, Veneto, Italy| |Part of||City of Vicenza and the Palladian Villas of the Veneto| |Criteria||Cultural: (i), (ii)| |Inscription||1994 (18th Session)| The Teatro Olimpico ("Olympic Theatre") is a theatre in Vicenza, northern Italy, constructed in 1580-1585. The theatre was the final design by the Italian Renaissance architect Andrea Palladio and was not completed until after his death. The trompe-l'œil onstage scenery, designed by Vincenzo Scamozzi, to give the appearance of long streets receding to a distant horizon, was installed in 1585 for the very first performance held in the theatre, and is the oldest surviving stage set still in existence. The full Roman-style scaenae frons back screen across the stage is made from wood and stucco imitating marble. It was the home of the Accademia Olimpica, which was founded there in 1555. The Teatro Olimpico is, along with the Teatro all'antica in Sabbioneta and the Teatro Farnese in Parma, one of only three Renaissance theatres remaining in existence. Both these theatres were based, in large measure, on the Teatro Olimpico. It is still used several times a year. Since 1994, the Teatro Olimpico, together with other Palladian buildings in and around Vicenza, has been part of the UNESCO World Heritage Site City of Vicenza and the Palladian Villas of the Veneto. Design and construction The Teatro Olimpico is the last work by Palladio, and ranks amongst his highest masterworks. The Vicentine architect had returned to his native city in 1579, bringing with him a lifetime of detailed study into all aspects of Roman architecture, and a more detailed understanding of the architecture of classical theatre than any other living person. Palladio had illustrated Daniele Barbaro's Italian translation of Vitruvius' De architectura; the prints for this edition include floorplans for Roman theatres and an elevation for the scaenae frons of Vicenza's ruined Roman theatre, the Teatro Berga. As well, Palladio's papers include plans for the imagined reconstruction of the ruined Roman theatres in Pola and Verona. Palladio, a founder of the Olympic Academy (the Accademia Olimpica, created in 1555), had already designed temporary theatre structures at various locations in the city. The most notable of these had been erected some seventeen years previously in the great hall of the Basilica Palladiana. In 1579 the Academy obtained the rights to build a permanent theatre in an old fortress, the Castello del Territorio, which had been turned into a prison and powder magazine before falling into disuse. Palladio was asked to produce a design, and despite the awkward shape of the old fortress, he decided to use the space to recreate an academic reconstruction of the Roman theatres that he had so closely studied. In order to fit a stage and seating area into the wide, shallow space, it was necessary for Palladio to flatten the semicircular seating area of the Roman theatre into an ellipse. Scamozzi takes over This section does not cite any sources. (March 2011) (Learn how and when to remove this template message) Palladio died in August 1580, only six months after construction had started on the theatre. Despite this setback, construction continued, with Palladio's sketches and drawings serving as a guide, and Palladio's son, Silla, taking charge of the project. Soon, the other prominent Vicentine architect, Vincenzo Scamozzi, was called upon to complete the project. Scamozzi had already stepped in to complete Palladio's other great unfinished project, the villa just east of Vicenza that is today known as La Rotonda. It is a mark of Scamozzi's genius that both these projects are today regarded as being among Palladio's most successfully executed works. Scamozzi's contributions include the Odèo and Antiodèo rooms, as well as the entrance archway which leads from the street, through an old medieval wall into the courtyard of the old fortress. In order to make the archway fit with its surroundings, and to prepare visitors to the theatre for the transformation from medieval to classical surroundings, Scamozzi built the archway to be the same size and shape as the porta reggia or triumphal arch at the center of the scaenae frons or rear wall of the stage. However, the entrance archway was rusticated to make it fit with the rough and well-worn wall into which it was being inserted. However, Scamozzi's most famous and most original contribution to the theatre was his elaborate stage set, with its remarkable trompe l'œil street views. He not only designed the sets, but also put considerable effort into designing the lighting that permitted the make-believe houses of the stage scenery to be lit from within, completing the illusion that these were real streets. Design and construction of the scenery Aside from a single sketch of the scaenae frons, Palladio left no plans as to what kind of scenery should be used onstage. His illustration of an idealized Roman scaenae frons for Barbaro's edition of Vitruvius had shown perspective street views similar to those which would later be built in the Teatro Olimpico. But the sketch of the proposed scaenae frons for the Teatro Olimpico shows no such street scenes; the space behind the central archway and the doors to each side is blank. The simplest explanation for the absence of any street scenes in this drawing is that the Academy had not yet obtained the land on which the scenery would later be built. This land was acquired in 1582, after Scamozzi had taken charge of the project. This made it possible to extend the building (including a special apse-shaped projection to accommodate the longest and most elaborate of the seven street views). The Academy's petition to the city government for the additional land anticipated that if acquired, the space would be used to create perspective scenery; it explains that the extra land would be used to build a theatre "along the lines laid out by our colleague Palladio, who has designed it to permit perspective views." Therefore, Palladio can be given credit for having inspired the remarkable perspectives which are visible to the audience through the central archway of the scaenae frons (also known as the "porta reggia") and also through the smaller side openings. But it is also appropriate to regard Scamozzi as the technical genius behind their remarkably successful execution. Scamozzi's stage set was the first practical introduction of perspective views into Renaissance theatre. The scenery consists of seven hallways decorated to create the illusion of looking down the streets of a city from classical antiquity. Ancient Thebes, was to be the setting for the first play staged in the theatre. A set of seven extraordinarily realistic trompe-l'œil false perspectives provide the illusion of long street views, while actually the sets recede only a few meters. The way in which seats in all parts of the theatre were provided with at least one perspective view can be seen by observing the theatre floorplan and following the sight lines of audience members in different parts of the theatre. This section does not cite any sources. (March 2011) (Learn how and when to remove this template message) The theatre was inaugurated on March 3, 1585, with a production of Sophocles' Oedipus Rex. However, the theatre was virtually abandoned after only a few productions. The scenes, which had been created in wood and stucco for Oedipus Rex, and which were meant to represent the streets of Thebes, were never removed: despite bombings and other vicissitudes, they have miraculously preserved into modern times. The original lighting system of glass oil lamps, designed by Scamozzi, heightened the illusion of space, has been used only a few times because of the high cost and the risk of fire. Scamozzi's lighting system was used when, in 1997, the theatre was again employed for a production of Oedipus Rex. The Teatro Olimpico is still used for plays and musical performances, but audience sizes are limited to 400, for conservation reasons. Performances take place in two theatre seasons—classical plays in the autumn and the festival Il Suono dell'Olimpico in the spring. It is not equipped with heating or air conditioning, which could damage the delicate wooden structures. Some authors have incorrectly stated that when the Teatro Olimpico was constructed in 1580-1585, it was the first purpose-built theatre in Europe in over a thousand years. In reality, the theatre was one of a number of new permanent theatres being constructed at the time. Records show that permanent theatres were constructed in Ferrara (1531), Rome (1545), Mantua (1549), Bologna (1550), Siena (1561), and Venice (1565). This last theatre was designed by Palladio himself, for the Compagnia della Calza. Over the centuries, the Teatro Olimpico has had many admirers, but relatively few imitators. One critic has observed, "In the history of theatre design, the Teatro Olimpico was a temporary hiatus, for succeeding generations adopted the proscenium arch and painterly stage sets. Palladio's ideas are closer to the spirit of the modern theatre, which favors the relationship of audience to action." Another notes, "The rigid form of the scenic arrangements of the Teatro Olimpico...precluded any further development," and that the theatre was, in a sense, a prisoner of its creators' emphasis on "considerations of archaeology" and truthfulness to the Roman model. The successful completion of Palladio's experiment in reconstructing the ancient model meant that there was no longer any need to pursue the objective of recovering the Roman past; it was now possible to start making innovations, starting with eliminating the rigid and unchangeable scaenae frons and the unchanging perspective views. The first theatre to draw inspiration from the Teatro Olimpico, and the one in which its influence is the most obvious, is the Teatro all'antica in Sabbioneta. This theatre, which was designed by Vincenzo Scamozzi, is sometimes also referred to, somewhat confusingly, as the "Teatro Olimpico", and some of its design elements, including most notably the colonnade behind the seating area and the self-conscious references to ancient Rome, are clearly drawn from the original Teatro Olimpico. However, the elaborate scaenae frons is absent in Sabbioneta, and only a single perspective view, along a single street, is employed onstage. As well, the seating area departs radically from Palladio's elliptical plan (perhaps as a result of the much narrower shape of the building in which the theatre is housed). The English architect Inigo Jones visited the Teatro Olimpico shortly after its completion, and took careful notes, in which he expressed particular admiration for the perspective views: "[T]he chief artifice was that whear so ever you sat you saw one of thes Prospects...." - Reproduced in Gino Nogara, Cronache degli spettacoli nel Teatro Olimpico di Vicenza dal 1580 al 1970. Vicenza: Accademia Olimpica, 1972, Plate 6 (following p. 418). - Licisco Magagnato, "The Genesis of the Teatro Olimpico", in Journal of the Warburg and Courtauld Institutes, Vol XIV (1951), p. 40. - Licisco Magagnato, "The Genesis of the Teatro Olimpico", in Journal of the Warburg and Courtauld Institutes, Vol XIV (1951), p. 217. The original documents which record the existence of this temporary theatre are in the records of the Accademia Olimpico at the Biblioteca Beroliana in Vicenza. - Licisco Magagnato, "The Genesis of the Teatro Olimpico, in Journal of the Warburg and Courtauld Institutes, Vol. XIV (1951), p. 216, 217. - Mullin, Donald (1970). The Development of the Playhouse. Berkeley, California, USA: University of California Press. p. 19. - For example: "The Teatro Olimpico certainly was a landmark work. It was the first true theatre built after over a thousand years." Susan Crabtree and Peter Beudert, Scenic Art for the Theatre, p. 241. Also: "[T]he first permanent theatre to be built since antiquity." Dan Cruickshank, Sir Banister Fletcher's A History of Architecture, p. 882. - Sir Nikolaus Pevsner, A History of Building Types. London: Thames and Hudson, 1976, p. 66. - Caroline Constant, The Palladio Guide. Princeton, New Jersey: Princeton Architectural Press, 1985, p. 17. - James Laver, Drama--Its Costume and Decor. London: The Studio Publications, 1951, p. 77. - For example, see Knopf Guides: Italy. New York: Knopf, 2006, p. 265, which says, "Sabbioneta's reputation as a "Little Athens" rests particularly on the beautiful Teatro Olimpico, a masterpiece by Vincenzo Scamozzi...." - Jones is quoted in James Laver, Drama--Its Costume and Decor. London: The Studio Publications, 1951, p. 76. |Wikimedia Commons has media related to Teatro Olimpico (Vicenza).|
<urn:uuid:67bfdb86-22d0-43de-9e43-2d9d77a9b669>
CC-MAIN-2019-26
http://www.let.rug.nl/~gosse/termpedia2/termpedia.php?language=dutch_general&density=7&link_color=000000&termpedia_system=perl_db&url=http%3A%2F%2Fen.wikipedia.org%2Fwiki%2FAccademia_Olimpica
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998298.91/warc/CC-MAIN-20190616202813-20190616224813-00333.warc.gz
en
0.950626
2,993
2.890625
3
2.921182
3
Strong reasoning
Art & Design
How property taxes work in Oregon The property tax system is one of the most important sources of revenue for more than 1,200 local taxing districts in Oregon. Property taxes rely on county assessment and taxation offices to value the property, calculate and collect the tax, and distribute the money to taxing districts. We provide support and oversight to counties to ensure uniformity and equity in property tax administration. Appraisal is the process of identifying taxable property and assigning a value to it. County assessors appraise most Oregon property. The Department of Revenue appraises certain large industrial sites and utility properties. The value of property is determined as of January 1 of each year. Property subject to taxation includes all privately owned real property (land, buildings, and fixed machinery and equipment), manufactured homes, and personal property used in a business. There is no property tax on: - Household furnishings. - Personal belongings and automobiles. - Crops or orchards. - Business inventories. - Certain intangible property. Personal property assessments All personal property must be valued at 100 percent of its real market value unless otherwise exempt (ORS 307.020). Personal property is taxable in the county where it's located as of January 1 at 1 a.m. Personal property is either tangible or intangible. Intangible personal property is not taxable, and tangible personal property may or may not be taxable. Examples of non-taxable personal properties: - Inventories that are held for sale in the ordinary course of business. - Household goods, furniture, clothing, tools, and equipment exclusively for personal use in your home. - Farm machinery and equipment (ORS 307.394). Taxable property includes machinery, equipment, furniture, etc., used previously or presently in a business. Each individual, partnership, firm, or corporation that has taxable personal property must file a return by March 15. The return must contain a full listing of all assets, date of acquisition, cost, and a statement of real market value. This listing must include items that have fully been depreciated, in storage, or expensed. It's the taxpayer's responsibility to obtain a copy of the return and file. The information on the return is a confidential record in the office in which it's filed. The return assists the assessor in determining the value of the property. All returns that are filed late receive a penalty. The penalty is a percentage of the taxes and is 5 percent, 25 percent, or 50 percent depending on how late the return is filed. You'll receive a tax statement after October 25 showing the value of the personal property, the amount of tax due, and any late filing penalty. Taxing districts subject to Oregon's Local Budget Law prepare their budgets for the coming fiscal year. During this process, the budget committee and governing body determine the amount of property taxes the district needs to support the budget. Public meetings are held to gather community feedback. Taxing districts have constitutional and statutory limitations on the amount of taxes they can impose: 1. Taxes under a taxing district's permanent rate limitation. Once a permanent tax rate limit is established, it can't be changed by any action of the district or its patrons. The Legislature can add additional, lower statutory limits. New districts, or districts that haven't levied in the past, can ask voters to choose a permanent rate limit for the district. A permanent rate limit is the tax rate per thousand dollars of assessed value. A local taxing district can only have one permanent rate limit. 2. Taxes from a taxing district's local option tax authority. Most taxing districts can ask voters for temporary taxing authority above the permanent rate limitation. This is known as "local option tax." Local option taxes are limited to five years for operation and 10 years for capital construction purposes. 3. Levies for bonded indebtedness. Most taxing districts can ask voters for the authority to issue general obligation bonds to raise money for capital projects. If the bonds are approved, the district can levy annually an amount sufficient to pay principal and interest for the bonded debt. Proceeds from a bond levy can't be used for a purpose other than the one stated in the ballot measure approved by the voters who authorized the bonds. Voter-approved bond levies used for capital construction aren't subject to Measure 5 property tax limits. The county assessor places the taxes certified by the taxing districts on the tax roll in the fall of each year. Property taxes are placed on the tax roll in the form of a rate per $1,000 of assessed value. In most cases, the taxes for operations are the permanent rate limits certified by the districts. When a district certified a dollar amount tax levy, such as a local option tax or bond tax, the assessor must calculate a tax rate. To compute a tax rate, the tax levy amount is divided by the taxable assessed value of the property in the district. This tax rate is placed on the individual property tax accounts in the district. The total amount of tax placed on a property is computed by multiplying the property's assessed value by the combined tax rates of all the districts in which the property is located and then adding any assessments. Taxable value limitation The Oregon Constitution limits the rate of growth of property value subject to taxation. The limit is based on a property's maximum assessed value (MAV). MAV can't increase by more than 3 percent each year, unless there are changes to the property, such as the addition of a new structure, improvement of an existing structure, or subdivision or partition of the property. Each year the MAV and RMV for each property tax account are calculated. The property is then taxed on the lesser of these two values, which is called the "taxable assessed value." The constitution limits the amount of property taxes that can be collected from each property account. To calculate these limits, taxes are divided into education and general government categories. If taxes in either category exceed the limit for that property, the taxes are reduced or "compressed" until the limit is reached. Local option taxes are compressed first. If the local option tax is compressed to zero and the limit still hasn't been reached, other taxes in the category are proportionally reduced. These limits are based on the RMV of the property, not the taxable assessed value. Paying property taxes Property taxes are paid to the individual counties. Contact the county assessment and taxation office in the county where your property is located for more information. You have the right to appeal if you feel the county assessor has estimated the value of your taxable property incorrectly. The appeal is to the county Board of Tax Appeals and must be submitted by December 31. You do not need to be present to have your complaint heard. Find out how to appeal your property value.
<urn:uuid:60518bbf-e39e-4d82-8bb6-07903b0ee9a9>
CC-MAIN-2024-10
https://www.oregon.gov/dor/programs/property/Pages/Personal-Property.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474795.48/warc/CC-MAIN-20240229071243-20240229101243-00375.warc.gz
en
0.943285
1,390
2.53125
3
2.40632
2
Moderate reasoning
Finance & Business
In 1976, a group of activists known as the Union of Physically Impaired Against Segregation (UPIAS), introduced a set of terms intended to counter medicalized definitions of disability. While the medicalized definitions previously articulated were ultimately reducible to individual pathology, the UPIAS definitions locate the “causes” of disability within society and social organization. The UPIAS defined disability in this way: Disability is something imposed on top of our impairments by the way we are unnecessarily isolated and excluded from full participation in society. Disabled people are therefore an oppressed group in society. To understand this it is necessary to grasp the distinction between the physical impairment and the social situation, called ‘disability,’ of people with such impairment. Thus, we define impairment as lacking part of or all of a limb, or having a defective limb, organ or mechanism of the body; and disability as the disadvantage or restriction of activity caused by a contemporary social organization which takes no or little account of people who have physical impairments and thus excludes them from participation in the mainstream of social activities. Physical disability is therefore a particular form of social oppression. In Female Forms: Experiencing and Understanding Disability, Carol Thomas interviewed some of the women who had been members of the UPIAS. The women were candid about the sexism that seemed to pervade the group. While the women recall that male dominance and sexism conditioned the interactions and leadership within the Union as well as its agenda, most of them are nevertheless in agreement that the long-term gains of the UPIAS outweigh this, and other, negative aspects of the group. As disability theorists and activists know, the UPIAS definitions were given more comprehensive articulation by British disability theorist Michael Oliver in “the social model of disability.” In 1990, Oliver wrote that “the personal tragedy theory of disability” underpins medicalized and individualized conceptions of disability. If disability is represented as a tragedy, Oliver remarked, disabled people will be perceived as the victims of some tragic happening or circumstance; furthermore, this perception will translate into social policies that aim to compensate disabled people for the tragedies that have befallen them. Oliver argued that disability should instead be regarded as a form of social oppression. If disability were defined as social oppression, he asserted, then disabled people would be recognised as the collective victims of an uncaring and ignorant society (rather than as individual victims of circumstance); furthermore, this definition would translate into social policies that aim to rectify and redress social injustice, rather than correct and compensate individuals. An example of this misrepresentation of disability — the “personal tragedy” theory of disability — was, disappointingly, posted the other day to the Feminist Philosophers blog under the heading of “Olympic Tragedy”. The post briefly quotes from a New York Times article about a dancer who fell and was injured during the opening ceremonies of the Olympics and who now, in the words of the Times, “suffers from nerve and spinal damage.” One has to wonder why this story was posted to FP, for there is no political analysis by FP of the way in which this accident was reported by the Times: neither the assumptions underpinning the reporting (e.g., why did this become an international news item?), nor the language employed to describe the accident are interrogated. Indeed, the author of the post at FP uses the following poignant sentence to end the quote from the Times: “Doctors have told her family it is unlikely she will ever walk again.” To those unacquainted with the arguments of disability theorists and activists and disability studies perspectives the remark which ends the Times quote might seem like an innocent prediction of future events. However, to those who hold a social-political analysis of disability the sentence will probably seem like code for some version of the following: “her [your] life is over,” “ her [your] quality of life will be poor,” “her [your] life will not be worth living,” “she [you] would be better off dead”. As various disability theorists have explained, furthermore, such a remark overestimates the importance of the activity of “walking,” elevates it to an almost sine qua non status, as a defining characteristic of the human being, without which one’s humanity is compromised. This set of beliefs (which has been given expression in films such as the truly awful “Million Dollar Baby”) conditions the discrimination, exclusion and widespread physical inaccessibility wheelchair users experience on a daily basis. Thankfully, the post has at the time of this writing received only one unfortunate comment, according to which the fall is “a terrible shame” for, among other actors, “the world”. Never mind Darfur. Forget climate change. That one individual will possibly become a wheelchair user is a tragedy that has been visited upon humankind. Though the tone of my previous remark might seem excessive, it is meant to underscore the fact that the “personal tragedy” approach to disability often goes unrecognized, unaknowledged and unexamined because language, narrative and interpretation are perspectival and situated, because the oppression of disabled people is so pervasive, and furthermore, because disabled people have not had access to prominent forums and venues in which to articulate their subjective understandings of the disadvantaged social circumstances they confront, the social relations from which they arise, and what is required to rectify them. Oliver and other “social modellists” claim that the radical innovation of the social model (and the UPIAS document from which it derived) is that it severs the causal relation between the bodies of disabled people (impairment) and their social circumstances (disability). As Oliver put it, “the social model insists [that] disablement is nothing to do with the body. It is a consequence of social oppression.” On the social model, he explained, disability is comprised of the innumerable aspects of social life that impose restrictions on disabled people, including personal prejudice, inaccessible public buildings, unusable public transportation systems, segregated education, exclusionary workplace arrangements, and so on. He pointed out, furthermore, that the consequences of these restrictions do not simply fall on random individuals as the personal tragedy theory implies, but rather systematically accrue to disabled people as a group who experience institutionalised discrimination throughout society. In other contexts, I have shown why one ought not to accept the foundationalist assumptions of the social model, nor its argument according to which there is no causal connection between impairment and disability. Notwithstanding the fact that proponents of the social model misunderstand the productive machinations of modern power, however, their arguments have historical importance insofar as they generated the social unrest that spawned a social movement (at least in the UK), they resonate in much current disability theory, and they have rich insights to offer with regard to a host of contemporary states of affairs.
<urn:uuid:4b80a250-a1f4-48c0-8c79-597b790dcbba>
CC-MAIN-2014-23
http://whatsortsofpeople.wordpress.com/2008/08/15/the-personal-tragedy-theory-of-disability-mike-oliver-and-the-social-model/
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997894976.0/warc/CC-MAIN-20140722025814-00120-ip-10-33-131-23.ec2.internal.warc.gz
en
0.961906
1,431
3.109375
3
3.006506
3
Strong reasoning
Politics
Guidelines for Life Cycle Analysis of Fuels Cells and Hydrogen Even environmentally benign technology must be questioned with respect to the life cycle impact on the environment. After all, many materials used today are ‘exotic' and little information is publicly available on potential pitfalls, for instance in mining and manufacturing processes. Fuel cell developers need tools to be able to evaluate and optimise the impact of their products. This allows for the design of products to eco-design requirements. Replacing one material by another may result in considerable savings in impacts and emissions. Similarly, the source and production process of the hydrogen fuel needs careful analysis in calculating the direct and indirect emissions during fuel cell operation. The project FC-HyGuide, by the Fuel Cell and Hydrogen Joint Undertaking (FCH JU) has taken up the task of compiling transparent and standardised data and work sheets for the environmental analysis of fuel cells and hydrogen production. Project developers and evaluators have received clear guidelines on how to assess their projects using simplified and well structured tools. Draft results were presented to external experts, intensely discussed, and tested for completeness and practicality on case studies before being released to the general public. One important application of the project results was the standard assessment of the FCH JU's own projects with respect to their environmental benefits. The work sheets developed track all materials necessary for manufacturing a fuel cell system, the emissions from operation (direct and indirect), and even cover the end-of-use recycling phase. The work sheets can be applied to fuel cells for stationary and mobile applications, for instance those used in the Callux und CHIC projects in residential heat & power supply and in fuel cell buses, respectively. PLANET closely cooperated with the universities of Naples, Split, Graz and Athens, in order to compile data and work sheets for different fuel cell types. These included the low temperature polymer type (PEFC), as well as the two high temperature variants, molten carbonate and solid oxide fuel cell (MCFC and SOFC). PLANET contributed knowledge on materials and manufacturing processes of fuel cell systems and its extensive know how in environmental analysis. PLANET thereby builds on its profound know how in the field of Life Cycle Analysis (LCA) and environmental analysis. As early as 1999 PLANET commissioned a thesis on the analysis of the environmental impact of various routes for hydrogen vehicle fuel production. In the following years PLANET frequently returned to the topic, for instance in the NaturalHy project. Not unexpectedly, it was found that a sustainable supply of hydrogen has to build on renewable energy input. The project has 11 partners and ran from October 2010 until September 2011. Coordinators were the Italian energy research institution ENEA and PE International, a consultancy in sustainability from Germany.
<urn:uuid:60e0cff7-729a-418d-ad39-8c283eceb3c2>
CC-MAIN-2018-30
http://planet-energie.de/gb/planet/Projekte/fchyguide.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591455.76/warc/CC-MAIN-20180720002543-20180720022543-00090.warc.gz
en
0.934507
564
2.625
3
3.015622
3
Strong reasoning
Science & Tech.
He held many important posts during his time in the Navy, including Director of the Office of Naval Intelligence, Naval attaché to Kaiser Wilhelm II, and aid for naval personnel. During the Spanish–American War, he participated in the Battle of Santiago de Cuba, after which he commanded a number of ships. In 1913, he was forced into retirement after not having spent a large enough portion of his service at sea. This forced retirement sparked outrage from many, and led to letters and marches of protest. A United States Senator even introduced a bill in Congress to have him re-instated. Though these efforts all ultimately failed, they led to greater scrutiny of the retirement board. As governor, he forbade the men under his command to marry native Chamorro women and increased funding to fight disease on Guam. Potts was born on November 1, 1855 in Washington, District of Columbia He received his education in the Washington area private school system. On May 10, 1902, Potts married Alden Brown in a civil ceremony in Berlin. He died on March 22, 1927 in Pasadena, California. Potts attended the United States Naval Academy and, entering on June 6, 1872 and graduating on June 20, 1876. In 1877, he served aboard the United States Ship Plymouth as a midshipman. He also served aboard the United States Ship Swatara in 1879 and the United States Ship Palos from 1879 to 1892. During the Spanish–American War, he served aboard the United States Ship Massachusetts, where he participated in the Battle of Santiago de Cuba. From 1885 to 1887, he served on the United States Ship Pensacola. From October 1, 1902 to December 30, 1904, he served as Naval attaché to Rome, Vienna, and Berlin. During this tour of duty, Potts was a lieutenant commander. He served as commanding officer of the United States Ship Des Moines and of the United States Ship Georgia in 1908. That same year, he obtained the rank of Captain. From December 17, 1909 to January 25, 1912, Potts was Director of the Office of Naval Intelligence. In 1911, he acted as the official United States representative for the reception of Japanese Admiral Tōgō Heihachirō. Soon after, he became Navy aid for personnel. From 1912 to July 2, 1913, he commanded the United States Ship Louisiana. After this command, Potts was forced into retirement. The Captain had passed his examination for rear admiral, but had been let go nonetheless, as he had not spent at least half of his time as captain at sea. His case drew national attention after he saved the Louisiana from flooding following a valve blowout in the ship"s starboard engine room that left a hole in the ship"s hull. He consulted his lawyers about the possibility of reinstatement, and a group of sailors protested the forced retirement through demonstrations and letter-writing, and a Senator even introduced a bill in Congress to reinstate him with the rank of Rear Admiral. Despite the criticism, the Navy did not reinstate him. Potts served as Governor of Guam from December 3, 1906 to October 3, 1907. Potts sought to separate whites from the native Chamorro population by denouncing interracial marriage, calling it "degenerating to the whites", and threatened to forcibly discharge any military man who married a native Guamanian woman. He successfully obtained additional funding from Congress to combat outbreaks of leprosy and yaws on the island.
<urn:uuid:0be365ac-a1dc-461a-824a-325fa0900350>
CC-MAIN-2021-25
https://prabook.com/web/templin.potts/1842629
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487600396.21/warc/CC-MAIN-20210613041713-20210613071713-00461.warc.gz
en
0.982567
726
3.078125
3
2.376295
2
Moderate reasoning
History
This sweet, rhyming counting book introduces young readers to numbers one through fifteen as Grandma’s family and friends fill her tiny house on Brown Street. Neighbors, aunts, uncles, nieces, nephews, and grandkids crowd into the house and pile it high with treats for a family feast. But when the walls begin to bulge and nobody has space enough to eat, one clever grandchild knows exactly what to do. Where there’s a will there’s a way when families grow and come together. Practice division while searching through the items in an old attic! This charming title, that has been translated into Spanish, follows the story of four children whose grandparents are moving out of their old house. The attic has old photos, comic books, baseball cards, and paper dolls just waiting to be discovered, but everyone needs to get a fair turn! Divide four boxes to open amongst four children! This book challenges young readers to practice their division skills by dividing up all sorts of collections found in this attic. Not only will they improve their division and STEM skills, but they will learn how to best share things equally with other children. Each year, the Coles look forward to their family reunion. This year, the Coles are in charge of all the planning. They use two-digit subtraction in a lot of the planning, especially when deciding how much food to buy and figuring out how many people are coming. Look inside to see more subtraction in action! Join the Garcia kids on their harvest adventure at their grandparents' apple orchard. Picking apples, eating apple pie, and bobbing for apples are just a few of the fun things they will do there. The kids will help prepare a big lunch for everyone. They will also plan games. They will use two-digit subtraction to help them with the menu, shop for food, and set up the games. What is your favorite apple game or treat? Practice two-digit addition and subtraction while planning a family reunion! This charming title encourages young readers to use subtraction skills and STEM concepts to help plan the reunion by determining how many people are attending and how much the family will need to accommodate everyone. Add up the tallies to determine where the reunion should be! Calculate how many children are attending by subtracting the number of adults from the number of total guests! Examples like these and more pair with helpful mathematical charts and vivid images to make useful skills like addition and subtraction seem easy and fun! Introduce young readers to division with this engaging title! Knowing how to use division makes planning a camping trip much easier! This book will excite readers by using practice problems, vibrant images, and helpful mathematical diagrams to improve their division and STEM skills. Meet a family of three who makes 12 smores, then divides 12 by three, giving each family member four smores! Meet five friends who have ten hot dogs, then divide ten by five, giving each friend two hot dogs! Division can help families and friends make things even on a camping trip and can help children in daily life. Mira como nosotros usamos numeros, marcas de conteo y tablas para compartir informacion acerca de cosas que a nuestras familias les gusta hacer. More is better! Natalie Marshalls goofy monsters made their debut in a book about monsters and manners - Monster Be Good! This time, its monsters and math, as every monster-member of this funny, grumpy, not-too-scary gang counts jelly beans, teddy bears, apples, donuts, toys, and even kisses. What do they all have in common? They all want ONE MORE! As each monster gets his wish, kids can chime in with the new number that ONE MORE adds up to. When the next-to-last monster gets TEN goodnight kisses, ONE mom-ster hug is just enough to cap off this tale of merry monster-math! Entertaining as it educates, Monster Needs One More! offers a perfect primer for introducing preschoolers to counting and addition. Who could ask for more? This four-book series explains the complex concept of money in a simple, fun and amusing way. In this book, we will learn how our family spends its money. Children learn how money comes into the family and the huge number of demands on how it is spent. See how we use numbers, tallies, and charts to share information about the things our families like to do. Shapes can be seen everywhere we go. What shapes can you see? It's fun to count. It's even more fun to count with someone you love! Take a trip to the city and practice addition! This charming title follows the story of a family who visits the city for the day, discovering how many ways addition and early STEM skills are a part of transportation and daily life. Students will add ticket prices, travel times, passengers, taxis, and more! Vibrant images, fun practice problems, and helpful mathematical charts help young readers practice addition and early STEM themes. This book makes addition fun and encourages children to see what they can add in their daily lives! Use subtraction to plan a harvest lunch! This charming title challenges young readers to practice two-digit subtraction and STEM skills to plan food, games, and more. For the first game, subtract 24 apples from 50 apples, leaving 26 apples for other activities! Practical examples like this, along with helpful mathematical diagrams and charts, show children that subtraction can not only be very useful, but can be easy and fun! Practice division while searching through the items in an old attic! This charming title follows the story of four children whose grandparents are moving out of their old house. The attic has old photos, comic books, baseball cards, and paper dolls just waiting to be discovered, but everyone needs to get a fair turn! Divide four boxes to open amongst four children! This book challenges young readers to practice their division skills by dividing up all sorts of collections found in this attic. Not only will they improve their division and STEM skills, but they will learn how to best share things equally with other children. Find three-dimensional shapes in a fort! This fun title challenges children to find cylinders, cones, and pyramids in a fort while introducing them to terms like base, vertex, face, and more! Young readers will improve their STEM skills and learn how to recognize these three-dimensional shapes all around them! Vibrant images, clear examples, and helpful mathematical diagrams work together to make geometry seem easy and fun! Practice standard measurement at a farmers market! This engaging title teaches young readers how to measure common food items by their height, circumference, and more, improving their mathematical and STEM skills! Vibrant images, practical examples, and simple mathematical charts help children use standard measurements, showing them how they can use these measurements in their daily lives. Practice nonstandard measurement at the zoo! This exciting title encourages readers to practice measuring their favorite zoo animals, such as elephants, giraffes, pandas, and more. A gorilla weighs the same as three men! When a cheetah runs, its stride length is the length of three men! An elephant weighs the same as three pickup trucks! Vivid images, fun practice questions, early STEM themes, and helpful mathematical diagrams make nonstandard measurement entertaining and easy for children to understand.
<urn:uuid:ef2d4f19-1c35-4d19-b41e-ad2035aba365>
CC-MAIN-2019-22
https://www.biguniverse.com/library/books?category%3AGenre=Family&amp;category%3ASubject=Math
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255837.21/warc/CC-MAIN-20190520081942-20190520103942-00253.warc.gz
en
0.930066
1,536
3.65625
4
1.638658
2
Moderate reasoning
Science & Tech.
- slide 1 of 6 This easy-to-teach lesson plan requires few materials and will help deepen your preschoolers understanding of family. After completing this lesson, your students should be able to give a simple definition of family. Use this lesson as part of a unit on family or on its own. - slide 2 of 6 - My Family by Debbie Bailey - Photos of students’ family members - Construction paper (9x12) - Yarn or fishing line - Hole punch - slide 3 of 6 Bring in a picture of your family. Show it to your class. Talk about who your family members are. Explain that every family looks different. Encourage students to share who is in their family. - slide 4 of 6 Show students the cover of the book. Have students make predictions about what the book will be about. Read the story stopping to discuss the pictures. Make sure to emphasize that every family looks different. You can even discuss how some children live with stepparents and some live with grandparents. Others even live with aunts and uncles. When you finish reading, ask students what they think a family is. Make sure that students understand the basic concept of family, which is a group of people who live together and that most of the time they are related. - slide 5 of 6 Prior to teaching this lesson plan, have students bring in photos of family members. Be sure to explain to parents that the photos will not be returned. Have them bring in photos of just immediate family members for this project. It is up to you whether or not to include pets. Pass out construction paper to your students. Have them draw a picture of the house they live in. Discuss different types of houses that people live in, such as apartments; single family homes, mobile homes, duplexes, and town homes. Once they have finished drawing their home, have them cut it out. Some students will need help cutting out the picture. Punch holes in the bottom of the picture they drew. Punch one hole for every picture that will be on the mobile. Pass out the photos that students brought in. A good idea is to trim the photos and hole punch the top of them beforehand so that they can all fit on the mobile. Attach the photos to the house picture using the yarn or fishing line. When everyone is finished, hang the mobiles throughout the classroom. Before you hang them up, have students stand up and show one or two pictures and tell who the people are. - slide 6 of 6 Have students draw a picture of who is in their family. Circulate around the room and have students tell you who is in their drawing.
<urn:uuid:0202cdaf-d0fe-4a8e-8ee2-cf88cb6d5713>
CC-MAIN-2013-48
http://www.brighthubeducation.com/pre-k-and-k-lesson-plans/52268-make-a-family-mobile-pre-k-lesson-plan/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163051590/warc/CC-MAIN-20131204131731-00013-ip-10-33-133-15.ec2.internal.warc.gz
en
0.965055
554
3.78125
4
1.559654
2
Moderate reasoning
Education & Jobs
Councils are using humour to raise awareness of road safety issues among children and parents. They are handing out booklets, by creative agency Serious Comedy, which feature amusing scenarios to shed light on dangerous parking and driving as well as offering children advice on how to cycle safely to school. One of the guides - ‘Should You Sack Your Chauffeur?’ - shows parents committing offences such as using a mobile phone while driving, to the chagrin and dismay of their child passengers. Another, entitled ‘Why Animals Can’t Ride Bikes’, has a procession of ‘calamitous creatures’ committing a series of cycling errors. The illustrated booklets are being used by councils across the UK including Peterborough, Hampshire, East Ayrshire, Dudley, Thurrock, Southend on Sea, Cambridgeshire and the London boroughs of Croydon, Lewisham, Harrow, Camden, Enfield, Haringey and Islington. Jeffrey Sarpong, Harrow’s senior road safety officer, says: “Humour is an effective way of influencing behaviour, especially for children. The humorous elements of the booklets make them memorable and help with interaction and keeping them engaged on the road safety message.” Harrow council offer the booklets to every pupil in selected year groups, says Sarpong. “So, for example, all our Year 4 pupils will receive a copy of ‘Should You Sack Your Chauffeur?’ as the language and terminology is appropriate for that age group. “Each school operates differently – some schools use them as part of a class discussion or incorporate as part of a ‘road safety/school travel’ themed activity. Others simply hand them out to pupils to take home.” Sarpong believes that the booklets help reinforce key road safety messages to pupils. “Schools have submitted positive reviews of the booklets and have used them in initiatives such as road safety and school travel campaigns.” This is echoed by Susan Martin, Croydon’s senior road safety officer. “Teacher feedback has been positive in respect of the style and the content of the different booklets,” she says. “As this is a relatively new project we are in early stages of gauging depth of behaviour change. The booklets all fit in with our other areas of work within road safety education such as Bikeability, sustainable travel, transitional package and scoot safe.” 'Should You Sack Your Chauffeur?' has been given to all Year 3 pupils in the borough and, in some cases, also to Year 4 children “due to increasingly dangerous driver behaviour on school runs and parking at schools”, says Martin. Both Harrow and Croydon say that funding for the booklets came from Transport for London’s Local Implementation Plan (LIP). Darren Ruddell, creative director at Serious Comedy, says: “Humour breaks down walls and disarms resistance. If you can make someone laugh, or even smile, you've got them on your side and they're more open to taking your message on board.” There is also the “evangelising effect”, he says. “If something makes you laugh you want to share it. That's the holy grail for a lot of advertising agencies; to make something for a brand that people want to share. Kids in particular get bored of being told what to do, or even worse what not to do, and straight away the barrier goes up. But the content we produce is couched in terms they associate with fun and enjoyment. They want to read it and show it to their friends.” Ruddell believes that “shock and horror” tactics are no longer seen as an effective way of conveying the road safety message. “We’ve been fortunate to find a number of forward thinking individuals within the road safety sector who are receptive to our methods. They realise we need to engage with our audience on another level. Those who’ve seen the success we’ve had with the road safety booklets now want to use the same approach in other fields.” He adds: “In the main our booklets are given to each child in a specific year. We would love every child to be able to take a booklet home but understand that budgets might not always permit that, so they work as standalone booklets, which the children will love to read or in conjunction with lesson plans in the classroom. “To make it possible for everyone to have a booklet which they can keep we’re now looking to run a collective purchase scheme allowing boroughs to purchase 5,000 booklets at a greatly reduced price.” Serious Comedy is developing techniques to help generate feedback from readers to the booklets. An online feedback form is included at the back of ‘Should You Sack Your Chauffeur?’ “This enabled enabled the children testing their parents to input the test results,” says Ruddell. “This creates an analytic we send back to the councils showing the parental driving behaviours. To date, of the parents tested, 100% said that the test made them consider the way they drive. “This a direct and quantifiable effect of the interaction prompted by the booklet, without the need for the council to deliver any kind of finger-wagging lecture to the parents. In the future we hope to develop the booklet into an App that will allows children to email their parents a funny dismissal letter and at the same time gather data.” TransportXtra is part of Landor LINKS © 2020 TransportXtra | Landor LINKS Ltd | All Rights Reserved Subscriptions, Magazines & Online Access Enquires [Frequently Asked Questions] Email: [email protected] | Tel: +44 (0) 20 7091 7959 Shop & Accounts Enquires Email: [email protected] | Tel: +44 (0) 20 7091 7855 Advertising Sales & Recruitment Enquires Email: [email protected] | Tel: +44 (0) 20 7091 7861 Events & Conference Enquires Email: [email protected] | Tel: +44 (0) 20 7091 7865 Press Releases & Editorial Enquires Email: [email protected] | Tel: +44 (0) 20 7091 7875 Website design by Brainiac Media 2020
<urn:uuid:d0449b7d-3683-451b-9cee-a7714f4afdca>
CC-MAIN-2020-29
https://www.transportxtra.com/publications/local-transport-today/news/52612/laughter-helps-drive-home-the-road-safety-message
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657134758.80/warc/CC-MAIN-20200712082512-20200712112512-00190.warc.gz
en
0.937749
1,394
2.53125
3
2.872104
3
Strong reasoning
Transportation
Management of Neuropathy_2 on Smoking and Diabetes, A Deadly Combination Management of neuropathy_2 covers a lot of issues. So far we’ve covered eating healthy, exercising, stopping prolonged pressure, avoiding things that can cause damage to the nerves and daily foot care. This page deals with smoking. 6. Quit Smoking: It is deadly to mix diabetes and smoking. Why? Because of the shared threat for heart disease. Smoking is linked to a host of health problems but it is more dangerous to mix it with diabetes. Quitting smoking therefore is of utmost importance and is a crucial issue in the management of neuropathy_2. Smoking and diabetes can increase the risk of stroke and heart attack. The diabetics are two to four more times to have a stroke and heart attack than those who do not have diabetes. Persistent high blood sugar damages the blood vessels which can lead to a heart attack and stroke. Smoking is also associated with stroke and heart attack because it can raise blood sugar, lower HDL or good cholesterol and the amount of oxygen that reaches the organs and can cause blood clots to form. The diabetics who smoke are three more times likely to die from a heart disease than the diabetics who do not smoke. Can you see why this is such an important part of the management of neuropathy_2? The Painless Stop Smoking Cure Program In addition, smoking can raise the risk to develop the other dangerous diabetes complications like retinopathy or diabetic eye disease, kidney disease, foot problems and nerve damage. Smoking can also raise the blood sugar level making it difficult to control diabetes. Smoking also can lead to insulin resistance so it is time to quit. So you see that smoking makes diabetes worse. To keep the blood sugar under control, it is important to quit smoking. I know it is not easy to quit because it is addicting but you can kick this habit no matter how long you have been smoking. You will be healthier. People who have succeeded use a combination of medication and behavioural modification techniques. Here are some tips to succeed: 1. Select the date when you quit and tell all friends and family about this. 2. Get some counselling. Your doctor can make a suggestion on an appropriate a smoking cessation for you. 3. Don’t stop cold turkey although I know people who have done so successfully. Find out from your doctor about nicotine replacement products like gum or patch. 4. Throw away all ashtrays, cigarettes and lighters. 5. Write down why you are quitting and bring that note with you wherever you go. Read it whenever you feel the urge to smoke. 6. Be prepared when you crave for a cigarette. Have the gum and sugar-free candy always ready to use as soon as you feel a craving for a cigarette. Then play with a deck of cards, rubber band or anything you can put in your hands when you miss having a cigarette in your hand. 7. Get a friend to quit smoking with you. That way you can cheer each other on. 8. Accept there may be setback. This is normal and should not be a reason for you to stop trying to quit smoking. 9. Keep busy with activities that you cannot do while smoking like exercising. 10. Avoid places where there are a lot of people smoking at least for awhile. Hopefully, this web page has helped one realize that to quit smoking is the thing to do, most specially if one has diabetes. There are a lot of things in favour of quitting this habit, foremost of which is avoiding the complications associated with diabetes. That is why this is such a crucial part of the management of neuropathy_2. If you want more information about diabetes, please visit: Blogging for Diabetes and You If you want to make any comments or other feedback, please fill in the contact form below so I can send you my email address. This is to avoid spam. Please sign up for our free ezine entitled Diabetes Positive Approach. We will publish this once a month where you will read about some encouraging news, positive experiences from others who want to share them with you and perhaps a dessert recipe good for the whole family. And you can unsubscribe anytime. Refresh The Diabetic Companion on Neuropathy Primer - Part 7d Management of Neuropathy_2 - Quit Smoking Return from The Diabetic Companion on Neuropathy Primer - Part 7d Management of Neuropathy_2 - Quit Smoking to Symptoms-of-Diabetes Home Page for the Disclaimer. The Diabetic Companion on Neuropathy Primer - Part 7b Management of Neuropathy - Daily Foot Care The Diabetic Companion on Neuropathy Primer - Part 7c Management of Neuropathy_1 - More Daily Foot Care The Diabetic Companion on Neuropathy Primer - Part 7E Management of Neuropathy_3 - How To Manage Neuropathy = Site Map of free-symptoms-of-diabetes-alert.com for Easy Navigation Where Do You Want to go Next? You didn’t find what you were looking for? Search for it at Google right here:
<urn:uuid:621c0dd6-386d-4e9f-ba18-34dccb1e602b>
CC-MAIN-2017-13
http://www.free-symptoms-of-diabetes-alert.com/managementofneuropathy_2.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188926.39/warc/CC-MAIN-20170322212948-00457-ip-10-233-31-227.ec2.internal.warc.gz
en
0.921328
1,063
2.53125
3
1.809209
2
Moderate reasoning
Health
Was Einstein Wrong About Space Travel? March 22, 2006: Consider a pair of brothers, identical twins. One gets a job as an astronaut and rockets into deep space. The other stays on Earth. When the traveling twin returns home, he discovers he's younger than his brother. This is Einstein's Twin Paradox, and although it sounds strange, it is absolutely true. The theory of relativity tells us that the faster you travel through space, the slower you travel through time. Rocketing to Alpha Centauri—warp 9, please—is a good way to stay young. Or is it? Some researchers are beginning to believe that space travel could have the opposite effect. It could make you prematurely old. Above: Albert Einstein's theory of Special Relativity says that time slows down for fast-moving space travelers, effectively keeping them young. Space radiation acting on telomeres could reverse the effect. [More] "The problem with Einstein's paradox is that it doesn't fold in biology—specifically, space radiation and the biology of aging," says Frank Cucinotta, NASA's chief scientist for radiation studies at the Johnson Space Center. While the astronaut twin is hurtling through space, Cucinotta explains, his chromosomes are exposed to penetrating cosmic rays. This can damage his telomeres—little molecular "caps" on the ends of his DNA. Here on Earth, the loss of telomeres has been linked to aging. So far, the risk hasn't been a major concern: The effect on shuttle and space station astronauts, if any, would be very small. These astronauts orbit inside of Earth's protective magnetic field, which deflects most cosmic rays. But by 2018, NASA plans to send humans outside of that protective bubble to return to the moon and eventually travel to Mars. Astronauts on those missions could be exposed to cosmic rays for weeks or months at a time. Naturally, NASA is keen to find out whether or not the danger of "radiation aging" really exists, and if so, how to handle it. Science is only now beginning to look at the question. "The reality is, we have very little information about [the link between] radiation and telomere loss," says Jerry Shay, a cell biologist at the University of Texas Southwestern Medical Center at Dallas. With support from NASA, Shay and others are studying the problem. What they learn about aging could benefit everyone, on Earth and in space. A Lit Fuse Like the fuse of a time bomb, telomeres are long strands of repeating DNA that shorten each time a cell divides. When the telomeres become too short, the cell's time is up: It can no longer divide, a state of affairs known as "replicative senescence." Right: Telomeres (white) cap the ends of human chromosomes (gray). Image credit: U.S. Department of Energy Human Genome Program. [More] One current theory of aging holds that, as the cells of a person's body start to hit this telomere-imposed limit, the lack of fresh, new cells causes the typical signs of aging: wrinkled skin, failing organs, weaker immune system, etc. Whether or not telomere loss actually causes aging remains a matter of debate, Shay notes. The fact that shortened telomeres go hand in hand with aging is well documented. People with shorter telomeres, for example, are known to not live as long on average as people with longer telomeres. But mere correlation doesn't prove whether telomeres are in fact the cause. "It's hard to prove cause and effect in these things. But I think there's a sufficient number of these correlative studies from a variety of different investigators that one has to start believing that short telomeres are a marker of aging," Shay says. Recent research, performed by Frank Cucinotta and colleagues, showed that iron-nuclei radiation (a chief component of cosmic rays) does indeed damage the telomeres of human cells: reference. Left: Human chromosomes revealed by RxFISH. Image credit: NASA/JSC. [More] "We had this surprising result that iron particles are much more damaging to telomeres than gamma rays," Cucinotta says. He suggests that this difference might be due to the wider path of damage caused by iron nuclei. Telomere strands wrap into elongated loops, like little knots on the ends of chromosomes. Gamma rays can only strike one side of these loops or the other, but iron nuclei can affect both sides at the same time, inflicting lasting damage on the telomere—possibly causing its complete deletion. This explanation is still speculative, however. The task now is to quantify the risk telomere damage might pose to astronauts, so that mission managers and the astronauts themselves can make informed decisions about the risks they face. In all likelihood, the effects will be modest, Shay says. "We're talking about subtle things. These people are probably not going to wind up in wheelchairs or something like that from being in space," Shay says. Right: Iron nuclei are especially damaging to telomeres. Of greater concern is possible aging of the brain and spinal cord. Experiments with rats have shown that brain tissue is vulnerable to "aging" by iron-nuclei radiation--this according to research by Jim Joseph of Tufts University and Bernie Rabin at the University of Maryland. (See references below.) "It is looking more and more likely that this could be a problem for long-term space travel," Cucinotta says. However, if scientists can tease apart the exact ways that iron-particle radiation affects telomeres, they may be able find a way to avoid or correct it. The solution could be as simple as a pill containing DNA-repair molecules. "There are many ways that we can intervene," Shay says. One way or another, NASA plans to keep their astronauts feeling young. Editor's note: This story should not be construed to mean that Einstein's theory of Special Relativity is wrong. It is correct. The Twin Paradox was concocted in Einstein's day to illustrate time dilation only. It was never intended to treat all aspects of space travel. The newly discovered effect of space radiation on telomeres is the "paradox on the paradox," says Frank Cucinotta. Durante, M., et al. 2006. Chromosomes Lacking Telomeres are Present in the Progeny of Human Lymphocytes Exposed to Heavy Ions. Radiation Research, Jan;165(1):51-8 Joseph, J.A., et al. 1992. Possible "accelerated striatal aging" induced by 56Fe heavy-particle irradiation: implications for manned space flights. Radiation Research, Apr;130(1):88-93 Rabin, B.M., et al. 2005. A longitudinal study of operant responding in rats irradiated when 2 months old. Radiation Research, Oct;164(4 Pt 2):552-5 Shay, J.W., and Wright, W.E., 2001. Aging. When do telomeres matter? Science 291, 839–840. Are Telomeres the Key to Aging and Cancer? -- a tutorial from the Genetic Science Learning Center at the University of Utah Was Einstein a Space Alien? -- (Science@NASA) Dr. Jerry Shay -- home page The twin paradox: Is the symmetry of time dilation paradoxical? -- a tutorial from the University of New South Wales
<urn:uuid:5ffeaa45-e7b9-4781-ab30-161c1858da34>
CC-MAIN-2017-13
https://science.nasa.gov/science-news/science-at-nasa/2006/22mar_telomeres/
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188924.7/warc/CC-MAIN-20170322212948-00556-ip-10-233-31-227.ec2.internal.warc.gz
en
0.93815
1,576
3.421875
3
2.982791
3
Strong reasoning
Science & Tech.
Delphinium carolinianum Walter Carolina larkspur, Blue larkspur, Prairie larkspur, Espuela del caballero Ranunculaceae (Buttercup Family) USDA Symbol: deca3 This is a slender, upright perennial, with unbranched stems from 1-2 ft. tall. White to pale blue, spurred flowers in a narrow cluster on a finely downy stalk. Pale blue to white, spurred flowers appear in a narrow, terminal spike. Leaves are divided and lobed into narrow segments. Basal leaves often form a winter rosette which withers before the flowers open. The Spanish name is Espuela del caballero from its resemblance to a horsemans spur. When in flower, this midwestern species can carpet acres of prairie before the grasses take over. Plains Larkspur was once considered to be a separate species, D. virescens, but studies of variation in larkspurs have now classified it as a subspecies of the widespread Carolina Larkspur, D. carolinianum ssp. virescens. The species, with three subspecies, ranges from the eastern edge of the West to the southeastern United States. Some phases may be blue. Larkspurs intergrade among species, and flower color varies from white to pale or dark blue in some species, making them difficult to classify and identify. Most blue-flowered species have white-flowered variants, and a few are consistently white or very pale blue. The geographic range of the white-flowered Wooton’s Larkspur (D. wootonii) overlaps with that of Plains Larkspur on the plains of eastern Colorado and southwestern Nebraska, but most of its range is to the south and west, to southeastern Arizona and western Texas. Wooton’s Larkspur usually has leaves mostly at the base and reflexed sepals, whereas Plains Larkspur has leafy stems and spreading sepals. Also white-flowered are Alkali Larkspur (D. gypsophilum), found in the San Joaquin Valley and the southern Coast Ranges of California; Peacock Larkspur, a hybrid between D. menziesii subsp. pallidum and Cow Poison (D. trolliifolium), with brightly glandular-hairy petals, found in western Oregon; and Pale Larkspur (D. nuttallii ssp. ochroleucum), without glandular petals, found in the vicinity of Portland, Oregon. From the Image Gallery Plant CharacteristicsDuration: Perennial Flower: Flowers in 6 inch spikes Size Class: 1-3 ft. Bloom InformationBloom Color: White , Blue , Violet Bloom Time: Apr , May , Jun , Jul DistributionUSA: AL , AR , CO , FL , GA , IA , IL , KS , KY , LA , MN , MO , MS , ND , NE , OK , SC , SD , TN , TX , WI Native Distribution: C. TX to FL, n. to IA, IL & TN Native Habitat: Dry, open woods; sandy hills; brushlands Growing ConditionsWater Use: Low Light Requirement: Part Shade Soil Moisture: Dry Cold Tolerant: yes Soil Description: Dry, sandy soils. Sandy, Sandy Loam, Medium Loam, Clay Loam, Clay, Acid-based, Calcareous Conditions Comments: Looks best in clusters. Dormant in summer. Adapts to a variety of soils. BenefitUse Ornamental: Perennial garden, Wildflower meadow Use Medicinal: Seeds ground and soaked in alcohol to kill head lice. Warning: Plants of the genus Delphinium contain toxins, and no parts of them should ever be eaten. They can be fatally poisonous to both humans and animals. Sensitivity to a toxin varies with a person’s age, weight, physical condition, and individual susceptibility. Children are most vulnerable because of their curiosity and small size. Toxicity can vary in a plant according to season, the plant’s different parts, and its stage of growth; and plants can absorb toxic substances, such as herbicides, pesticides, and pollutants from the water, air, and soil. Conspicuous Flowers: yes PropagationPropagation Material: Seeds Description: Propagate by seed sown in early fall or spring. Seed Collection: Seeds are formed dry in a pod, which call for close observation in order to collect seeds before they are thrown out. Seed Treatment: Not Available Commercially Avail: yes Find Seed or Plants View propagation protocol from Native Plants Network. Mr. Smarty Plants says Native plants for shady small spaces in Houston, TX June 18, 2006 What are the best plants and flowers to plant in small spaces in an urban area in Houston, Texas? I have several flower beds that are 3 foot wide and 10-12 foot long that get half day sun. The area... view the full question and answer From the National Organizations DirectoryAccording to the species list provided by Affiliate Organizations, this plant is on display at the following locations: Fredericksburg Nature Center - Fredericksburg, TX Brackenridge Field Laboratory - Austin, TX Mt. Cuba Center - Hockessin, DE Herbarium Specimen(s)NPSOT 0008 Collected April 27 1990 in Bexar County by Judith C. Berry BibliographyBibref 946 - Gardening with Prairie Plants: How to Create Beautiful Native Landscapes (2002) Wasowski, Sally Bibref 355 - Landscaping with Native Plants of Texas and the Southwest (1991) Miller, G. O. Bibref 765 - McMillen's Texas Gardening: Wildflowers (1998) Howard, D. Bibref 318 - Native Texas Plants: Landscaping Region by Region (2002) Wasowski, S. & A. Wasowski Bibref 248 - Texas Wildflowers: A Field Guide (1984) Loughmiller, C. & L. Loughmiller * The Midwestern Native Garden: Native Alternatives to Nonnative Flowers and Plants An Illustrated Guide (2011) Adelman, Charlotte and Schwartz, Bernard L. Bibref 328 - Wildflowers of Texas (2003) Ajilvsgi, Geyata. Search More Titles in Bibliography Additional resourcesUSDA: Find Delphinium carolinianum in USDA Plants FNA: Find Delphinium carolinianum in the Flora of North America (if available) Google: Search Google for Delphinium carolinianum MetadataRecord Modified: 2013-10-24 Research By: TWC Staff
<urn:uuid:9d794d5e-e60f-4906-9e19-d61857b3e705>
CC-MAIN-2015-06
http://www.wildflower.org/plants/result.php?id_plant=deca3
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122087108.30/warc/CC-MAIN-20150124175447-00094-ip-10-180-212-252.ec2.internal.warc.gz
en
0.851557
1,454
3.09375
3
2.074847
2
Moderate reasoning
Science & Tech.
Bringing a child into the world comes with a ton of responsibility. Providing for them and keeping them away from trouble are obvious. Additionally, you also have the responsibility of teaching your kids about personal finance and how to manage money. Part of this is teaching them how to use credit & debit responsibly. Preparing your children to handle it early is important. As a nonprofit credit counseling agency, ACCC has tips to share with you! Teaching Your Kids To Use Credit & Debit Responsibly The school system often lacks an emphasis on financial education and personal financial management. However, you are a living breathing example of everything for your child. Therefore taking on the responsibility of teaching your kids to use credit & debit responsibly is all a part of the job! The sooner you get your kids involved in financial management practices the better they will be prepared in their adult life to handle consumer debts. Teaching your kids to use credit & debit responsibly many require tactics and efforts. Kids may not immediately understand the difference between a credit card and a debit card. They look the same, but of course the concept of a debit card versus a credit card is very different. This is something that should be explained to kids before they are old enough to get their own credit or debit cards. As far as other financial topics, we have plenty of information for you! There is some great material that ACCC offers to help educate your kids. ACCC Youth & Money Financial Literacy Resources Core Money Concepts For Kids – First, use these Core Concepts to see what and how you should teach them. For example, the important thing to teach the younger kids is that money is an asset. It is something you need to earn and not something that just pops out of an ATM. You can help them set up a bank account for saving, and make them work for their money. Give them a chore chart and an allowance for successfully completing their jobs. Teaching the Value of the Dollar – Next is helping your kids understand the value of a dollar. The best way to do this is for them to earn their own money. They can learn money management skills through practice! Some parents choose to do this through allowance, while other parents choose to have their children earn money outside of the home. You can also do a combination of both. Whatever they end up earning, consider helping them divide it into threes – one part for saving, one part for spending, and one part for a charity of their choice. This shows kids the valuable skill of saving and the importance of charity. Focus on the basics. Budgeting, needs vs wants, saving, and financial planning are some of the basics that you should work on from a younger age. Use practical examples to teach the basics of credit and debt to build a solid foundation. If you’re struggling to pay off debt, ACCC can help. Schedule a free credit counseling session with us today.
<urn:uuid:f3d18ef0-029c-4d91-8a33-435cc97a768c>
CC-MAIN-2024-10
https://www.consumercredit.com/blog/teaching-your-kids-to-use-credit-debit-responsibly/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473690.28/warc/CC-MAIN-20240222030017-20240222060017-00509.warc.gz
en
0.968067
597
3.328125
3
2.107475
2
Moderate reasoning
Finance & Business
Myanmar is rapidly transforming. After nearly a century of economic stagnation and decades of authoritarianism that ended only a few years ago, the country is in a development push, including both political and economic reforms. But that growth comes at an environmental cost that Myanmar is ill-equipped to handle. So microbial ecologist Merja Itävaara of the VTT Technical Research Centre of Finland travelled there earlier this year – with support from the Elsevier Foundation-TWAS Sustainability Visiting Expert Programme – to work with local experts to build the nation’s environmental sciences. “In Myanmar, there is a great need for environmental education and especially environmental microbiology and ecotoxicity, which are lacking,” said Itävaara. “There is also needed basic education in microbiology, and lab courses to train the students.” The Elsevier Foundation-TWAS programme provides institutions in developing countries with outside contacts that could lead to strong, long-term links with experts in sustainability science. Itävaara is one of six researchers sponsored in 2017 for such a visit by the programme, aiming to form connections that could lead to further collaborations between European researchers and those from Myanmar. The programme focuses on research for sustainability, as well, in an effort to help developing countries achieve the United Nations’ Sustainable Development Goals and thrive in a way that will last deep into the future. Visiting experts are expected to interact closely with faculty and students at the host institution to strengthen their work and help open new lines of research. That research is complimented by lectures and seminars, and discussion of future collaborations, and conduct research themselves. Any qualified scientist working in sustainability science is encouraged to apply. The programme began in 2016. “Locally relevant research is vital for solving local issues in specific communities,” said Elsevier Foundation Director Ylann Schemm. “International collaboration gives scientists access to resources beyond their own, enabling them to tap larger networks to tackle the challenges their countries face. Working with TWAS, the Elsevier Foundation aims to facilitate knowledge exchange, and support the growth of sustainability science.” "With this programme, TWAS uses science to catalyze sustainable development," said TWAS Programme Coordinator Max Paoli. "A new mindset is required to truly embrace sustainability, so the educational component of the expert's visit is useful. It sharpens least-developed countries' ability to focus on local and global challenges." Myanmar is one of the fastest developing countries in the world. The International Monetary Fund ranked it as having the second-highest growth levels from 2000 to 2016 – ranking only behind China, and driven mainly by agriculture, energy, mining, manufacturing and infrastructure projects. But as a direct result of poorly regulated growth, agricultural pesticides and fertilizers are polluting waterways, making access to clean water more difficult. Illegal logging is driving deforestation and upsetting local ecosystems. Contaminants such as cyanide and heavy metals from Myanmar’s ruby and gold mines find their way into rivers, sending those toxic substances directly to local communities. The country lacks strong environmental standards to control this pollution and its inevitable effects on people’s health. “Locally, the problem is huge,” said Itävaara. “There’s no environmental research. But we know that the major issue here is to help link with European scientists.” Some international research projects are already under way in Myanmar to address these problems. Most are connected to the Mekong River – an important water source that runs from China through Myanmar and into Laos – and the Inle Lake area. For example, the lake absorbs a large amount of wastewater from surrounding villages where homes lack latrines. But current research clearly is not enough. The country’s low education level, from childhood to university, has made it difficult for Myanmar to develop the expertise required to keep up with the growth, and environmental research of all kinds is needed to make sure that future growth is sustainable. Itävaara said Burmese scientists are working hard to elevate the education level of students and young scientists there. “There are several professors who have studied outside Myanmar and have good scientific background and they want to raise the education level of their country eagerly,” said Itävaara. And, she added: “To my astonishment, most of the professors are women.” Teaching about desirable microbes There was a natural match between Itävaara’s expertise and Myanmar's needs. Her research is focused on how ecosystems function in relation to microbes – for example, how microbial life degrades once-living matter so that the life cycle can begin anew, and how pollutants in the environment can meddle with that process by killing those important microbes. “I think Burmese scientists such as Dr. Nwe are working hard to raise the education level of students and young scientists in their country. The activity and interest of these people give me motivation to work for them.”–Merja Itävaara Myanmar, on the other hand, lacks educational resources and laboratories in the fields of microbiology and ecotoxicity. Plus, there is a need for fundamental environmental research and policy making. While in Myanmar on the Elsevier Foundation-TWAS exchange, Itävaara gave four lectures on environmental biotechnology and biodegradation. Her lectures even included discussion on how to write a grant proposal to secure funding, a process that is not common knowledge among scholars in Myanmar. She gave her lectures at Yangon University in Yangon, Myanmar, in classrooms with at least 50 attendees. Most were university students, though about seven to ten professors were present for each lecture, too. Microbes clean the environment, she taught, and people and plants can’t exist without them. “Although some microbes are pathogens, most are beneficial and restrict spread of pathogens in the environment,” Itävaara explained. “We need microbes to degrade harmful compounds so that they’re nontoxic,” she added, “and to degrade the dead biomass to carbon dioxide and water and transform different elements such as nitrogen and phosphorus to be available for the growth of plants.” Links that could last Itävaara has known her Burmese colleagues for years, and is trying to strengthen the ties between the research communities of Myanmar and Europe. She first went to Myanmar 10 years ago as a tourist, learning about the culture and ways of life of people there. “Ten years ago there were no plastics or any Western type of hotels or restaurants,” she said. “Children were playing with stones, because there were no toys. The Western type of development has caused huge waste problems and the companies making money should take responsibility.” Since then, she has repeatedly returned to Myanmar to help researchers with scientific development. This most recent visit was her third. She discovered Burmese biotechnologist Nitar Nwe through LinkedIn. Nwe is a researcher at ALARM Ecological Laboratory – a nonprofit research unit which is performing socioeconomic and environmental research, mainly chemical analysis of industrial waste waters and also hosting some biotechnology research. She also teaches at several universities in Myanmar. “I think Burmese scientists such as Dr. Nwe are working hard to raise the education level of students and young scientists in their country,” Itävaara said. “The activity and interest of these people give me motivation to work for them.” During Itävaara’s visit, she met with The Department of Research and Innovation, Ministry of Education (DRI) and Yangon University officials, as well as the European Union office in Myanmar to talk over possibilities for funding research activities. Discussions on how to potentially fund a direct exchange programme between the EU and Myanmar are now under way. About the Elsevier Foundation The Elsevier Foundation is a corporate not-for-profit 501(c)(3), funded by Elsevier, a global information analytics business that helps institutions and professionals progress science, advance healthcare and improve performance for the benefit of humanity. The Elsevier Foundation provides over $1 million USD a year in grants to knowledge centered institutions around the world, which are addressing the UN Sustainable Development Goals through innovations in health information, diversity in science and health, research in developing countries and technology for development. The Elsevier Foundation also provides a total of $200,000 in matching funds to charitable organizations supported by employees to encourage community involvement. www.elsevierfoundation.org The World Academy of Sciences for the advancement of science in developing countries – TWAS – supports sustainable prosperity through research, education, policy and diplomacy. TWAS was founded in 1983 by a distinguished group of scientists from the developing world, under the leadership of Abdus Salam, the Pakistani physicist and Nobel Prize winner. Today, TWAS has more than 1,200 elected Fellows from nearly 100 countries; 14 of them are Nobel laureates. The Academy is based in Trieste, Italy, on the campus of the Abdus Salam International Centre for Theoretical Physics (ICTP). Through more than three decades, its mission has focused on supporting and promoting excellence in scientific research in the developing world and applying scientific and engineering research to address global challenges. TWAS receives core funding from the government of Italy and essential programmatic funding from the Swedish International Development Cooperation Agency. (Sida). It is a programme unit of the United Nations Educational, Scientific and Cultural Organization (UNESCO).
<urn:uuid:de6dafa2-7e1a-4f8c-8f88-0260799d15d0>
CC-MAIN-2023-50
https://twas.org/article/knowledge-grow-sustainably
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100686.78/warc/CC-MAIN-20231207185656-20231207215656-00891.warc.gz
en
0.943441
1,963
2.53125
3
3.013761
3
Strong reasoning
Science & Tech.
Fume cupboards are used widely in laboratories and are designed to capture and remove air-borne hazardous substances generated during laboratory experiments, such as gases. Work with substances that generate toxic or harmful fumes, vapours, gases, dust or chemical aerosols should be carried out in a fume cupboard to eliminate or reduce the risk of exposure to an acceptable and safe level. Fume cupboards also serve as physical barriers between reactions and the laboratory, offering a measure of protection against inhalation exposure, chemical spills, run-away reactions and fires. Maintaining the safety of your fume cupboard is vital to ensure both a safe and efficient working environment. Evolve‘s experienced engineers are regularly asked questions on how to keep a healthy fume cupboard and when to call for expert assistance. There are two main elements to ensuring a safe fume cupboard: making sure your carbon filters are working efficiently and regular servicing from a professional Evolve engineer. While there is no set life cycle for carbon filters, Evolve recommends they are replaced every year. We also carry out annual servicing and qualifications to confirm your equipment is safe and adheres to safety standards. This should be done at least once a year. Dos and Don’ts Your Fume Cupboard can be used for various different applications but there is some advice which applies to all fume cupboard users regardless of what methodology they are using. - Do keep chemical storage within the fume cupboard to a minimum - Do keep flammable chemicals in a dedicated fire rated storage cupboard - Do only use the fume cupboard for its intended purpose, for use with chemicals - Do always have the sash at the correct working height - Do keep lids on chemicals held within the fume cupboard when working and especially when the cabinet is switched off - Don’t overfill the cabinet with apparatus or chemicals as this will affect the airflow and protection to users - A safe fume cupboard is a closed and ventilated fume cupboard. Therefore never switch off the fan if possible. To save on costs try and have variable speed motors calibrated with sash position. Evolve expert view Evolve offers a wide portfolio of clean air and containment solutions that facilitate drug development and manufacturing in the pharmaceutical sector. From hospital pharmacies making up personalised oncology treatments, development laboratories pioneering new gene therapies or contract manufacturers tasked with producing medicines containing high potent APIs, fume cupboards supplied and installed by Evolve will deliver the clean air environment you need. Evolve field engineer Lucas Spiteri said: ‘Over the years, Evolve has supplied, installed and maintained dozens of fume cupboards and clean air cabinets as well as rigid and flexible isolators from the best names in science. ‘We’re delighted to work closely with the pharmaceutical and healthcare industries as well as research laboratories and universities. They all put their trust in us.’ For more information on how we can help your next science project, get in touch with the Evolve experts today. You’ll be glad you did. What else are you looking to do? Stay up to date with the latest news, ideas and insights from Evolve By your side with world class science support We consider it our job to do far more than just take your order, we’re here to help. We listen, advise and solve problems. Knowing that your time is precious, we also work fast – often being the only scientific supplier in Malta who can deliver what you need, when you need it. We pride ourselves on the great relationships we nurture and the consistent results we deliver. To find out how we can save you time and give you one less thing to worry about, visit our Support Centre page.
<urn:uuid:a736cbd5-1408-4f69-9779-792cd94148dc>
CC-MAIN-2022-33
https://evolveltd.eu/fume-cupboard-safety/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00478.warc.gz
en
0.939963
787
2.609375
3
2.002808
2
Moderate reasoning
Science & Tech.
Introduction: 35mm Film in Old Camera's (and Redscale Effect) After almost two years following great projects on Instructables, it's time to make one myself! Because this project is very simple, and I'll give you the 3D-files you need, it's just a very short photo-instructable. If you like it, don't hesitate to vote for the contest I participate ;) Why I did it Recently I got some old Kodak camera's. These things are a nice piece of decoration, but it's way cooler to use such vintage camera. There is only one problem: old camera's use old film formats. The spools that fitted in my camera's where 120 and 620 spools. 120 spools are still available, but are pretty expensive. 620 spools are not even made anymore. What I did Some people use empty 620 spools to roll 120 film or modern 35mm film on it. But this process has to happen in complete darkness, and is time-consuming. Instead of doing this, I designed two parts that fit on a 35mm film-spool. These make the 35mm spool longer: as long as a 620 or a 120 spool. Depending on what adapter you used. In this way, you can easily fit a modern (and cheap(er)) 35mm film in an old camera. The adapters are attached to this instructable as .stl-file. Feel free to take them to the 3D-printer! How to use it At this moment, I've made two different adapters: one for 120film camera's and one for 620film camera's. But I'm planning making an adapter for 127film camera's too. Using the adapter is very simple: (1) Each adapter consists of two pieces. Because the 35mm film-spool isn't symmetrical, one of the pieces is a little bit bigger than the other one. Place them in such a way that the 35mm film is in the middle of the entirety. (2) Use tape to attach the end of the 35mm film to an empty spool (normally there is always an empty spool in a camera. In the time these camera's were made, the film was transferred from the loaded spool to the empty spool. (More information on Wikipedia)) (3) Place both spools in the camera and close it. The place where the loaded spool has to be is often indicated on the inside of the camera. (4) To know how many times you have to turn the wind knob after each photo, you divide the width of the exposed piece of film by the circumference of the spool (36mm for a 120spool and 25mm for a 620spool) You can wind the knob a little more to make sure there is a nice gap between each photo. Because the empty spool will become thicker with the film rolled on it, the gap between two photo's on your developed film will become bigger after each photo. (5) When you shot as many pictures as possible on your film, it's time to wind the film back in it's cassette. You have to do this in COMPLETE darkness. Just open the camera, remove the adapter from the spool, and wind the film back in the cassette with a screwdriver. You can cut the last centimeter off the film, where you taped it on the empty spool. The film is now ready to get developed! Some remarks ... Using these adapters has some consequences. Some are positive, some are negative, some are just cool: (1) I can't promise the adapter will fit in all camera's. You have to check the diameter of the 35mm casette with the free space in your camera. This will happen more frequently with 620 film camera's, because the 620 spool is a little smaller. Using the adapter in the Kodak Brownie Hawkeye is not possible, for example. But I'll definitely think about a solution! (2) Using this adapter, you will expose the whole height (also the sprocket holes) of the 35mm film. The reason is that this film is not as high as the original film formats. For this reason, the upper and lower part of what you see in the viewfinder won't be on your film. (3) Using this adapter, you can place the 35mm film with the back of the film faced to the lens hole. This will give you a redscale effect without any further modifications. To use the redscale effect in a modern 35mm film camera, or for more information about this effect, read this instructable. (4) It's very important to do the rewinding of the film in complete darkness. Of course this is not ideal, but I don't know any alternatives.
<urn:uuid:2c05da5d-cd86-4eb5-acfc-83b7878c2df7>
CC-MAIN-2018-30
https://www.instructables.com/id/Use-35mm-film-in-old-cameras/
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590329.25/warc/CC-MAIN-20180718193656-20180718213656-00219.warc.gz
en
0.95019
1,000
2.578125
3
1.94704
2
Moderate reasoning
Art & Design
Join Date: Apr 2005 Mentioned: 0 Post(s) Tagged: 0 Thread(s) Quoted: 0 Post(s) Kate, mom to 7 year old Djuna and 4 yr old Alden. Missing our good friend Hal the cat who died June 2, 2010 DS is in second grade this year. They have started a new thing for homework this year, where they have a "homework menu". There are 16 choices, 4 in spelling, 4 in math, 4 in reading, and 4 in science social studies. We are supposed to do 4 each week till all are done, and then get another menu. Here they are for this time: 1. Do you have your own idea? What is it? Complete your idea. 2. Secret Agent Words Number the alphabet from 1 to 26, and then convert your words to a number code. 3. Make a set of flashcards to study your words. Use the flashcards to study. 4. Write a "lost and found" ad for one of your spelling words. In the ad, describe the missing word so that someone else will recognize it immediately! 5. Create an original game using the facts you have learned. 6. Identify four ways the concepts in this unit are used in the real world. 7. Design a robot using only one shape. Choose a square, circle, rectangle, hexagon, octagon, or triangle. Everything on your robot has to be that shape. 8. Define five of the unit's vocabulary words with sketches or drawings. Reading: List title and author of book used for each activity. 9. Write a poem about two main events in the story. 10. Write a song about one of the main events in the story. 11. Create a puppet that looks like the main character in the story. 12. Create a Venn Diagram comparing and contrasting two characters in the story. 13. Build a model or diorama to illustrate what you have learned. 14. Write a report relating to our Science or Social Studies topic. 15. Design a science experiment about the topic. 16. Make and share a science puzzle. Is this something just in my area/school, or do any of your second graders have homework similar to this? What do you think of it? Definitely different from anything I ever had in second grade... OMG. This is absolute nightmare. There is no way a second grader can complete all this work totally by himself. Probably you would ended up doing much of it yourself. Some of the assignments are very strange and poorly explained. Especially this one about an "idea". Idea of what??? What happens if you do not complete all this staff in time? After 4 weeks, all items will be done, so 4 items per week, but in whatever order you want...you could start with one of each, all one subject, 2 from 2 different subjects, etc., but eventually all 16 have to be completed. Posted via Mobile Device I am just trying to get a feel for if this type of homework is a new trend, or just something "different"? The only other reason I can think of for the "different" homework might be that his school is in the process of becoming certified as an IB "Primary Years Program" school, and maybe they are using this as part of that? In that case, I wouldn't like it at all. Homeworks should be something they can do alone. Some of those projects are WAY to much for 2nd grade hw. |206 members and 20,498 guests| |1babysmom , acardone1702 , Aillidh , AlaskAnne , allirue , americanjuly , anamama , annaconda , annbe , Anne Jividen , aylasebmom , bananabee , BarefootBrooke , BBDLL21 , belltree , birdinflight , Bjugstad , blissful_maia , bluefaery , Brit33 , Brittee , calico_aster , catladymeow , CDeRo , chickabiddy , chiefmir , chknlovr , chuord , clar5108 , cocoheart , Crazybean , Cricket VS , Crimson8 , crystalperez , CutiePie09 , dahlia810 , dani2015 , daytripper75 , dbsam , earthchick , EllaD , elliha , Emanresu , emmy526 , es1967 , esg , Ethelpea , Evelynflower , featherstory , firmfoot , floss&ferd , frugalmama , fruitfulmomma , funfunkyfantastic , FyerFly , greenemami , hottmomma , ian'smommaya , itsnat , JamieCatheryn , japonica , jcdfarmer , jennylam , JennyT , jojobean , joycef , kanani , katelove , kathymuggle , Kelleybug , kitchensqueen , kleinemaus , larali , laura163 , LeLuna , Letitia , lightheartedmom , lilacvioletiris , lilgreen , lilmissgiggles , LiLStar , Linda on the move , loba , LuaBelle , maia71 , Mallow , Mama Chickadee , mama2004 , mama24-7 , mamabear0314 , mamadee17 , mamamargo , mariamadly , Mariluan , MeepyCat , meghanmetz , Michelle42 , Milk8shake , minerva23 , Mirzam , MissMuffet , mommyhood , moominmamma , MoonWomb , morganlefay , MPsSweetie , muldey , Mylie , MylittleTiger , NaturallyKait , Nazsmum , Nemi27 , newmamalizzy , nikkialys , nwlove , oaksie68 , orangemomma , pokeyac , prosciencemum , ProudMamaSF , pumabearclan , rainydaywoman , rockdoctor , RollerCoasterMama , samaxtics , SandiMae , sarafl , sarahl918 , shantimama , Shevas , Shmootzi , shoeg8rl , siennaflower , SkiBum , smilingprego , Smokering , sofreshsoclean , Springshowers , SummerStorm22 , suvisade , TBallman , TealCandy , thtr4me , Tigerle , tomsmom31 , TourmalineMama , TrishWSU , Turner58800 , typebug , Veritas Vitae , Viola P , VocalMinority , WantRice , wassernixe , weliveintheforest , Westcoast Recycle , Wild Lupine , Wild Rose , YogaBoga1 , Zenbe , zzzzzzane| |Most users ever online was 449,755, 06-25-2014 at 12:21 PM.|
<urn:uuid:5810f712-25af-40a9-9e96-16a53cad7406>
CC-MAIN-2015-27
http://www.mothering.com/forum/51-learning-school/1270993-second-grade-homework.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375635143.91/warc/CC-MAIN-20150627032715-00070-ip-10-179-60-89.ec2.internal.warc.gz
en
0.81193
1,499
2.765625
3
1.931246
2
Moderate reasoning
Education & Jobs
Every day, 80 million barrels of oil are sold and bought. At the same time, on the markets, virtually a billion barrels switch hands. It is a trick made possible by “derivatives”, contracts in which an agreement is made for future delivery at a predetermined price. If the value falls below this price, the seller earns, and if vice versa, the buyer gains. These contracts never end with a real delivery. We can simply pay the difference, or do a “rollover”, which means that when the contract is about to expire, it is renewed with as a new contract with a later expiration date. This introduction is necessary to understand what is happening and why oil prices went below zero. Those who wanted to get rid of an expiring contract, did not find anyone who wanted to buy it. At this point, the owner of the contract should have received all the oil purchased (the physical barrels) with the derivative. Generally, however, those who carry out these operations do not physically handle the barrels of oil and do not have the space to store them. Space to stock can be rented, but at the moment, oil deposits are full, due to the collapse in demand caused by the blockage of production activities. This is a particularly accentuated situation in the U.S., where the Cushing Depot in Oklahoma – known as the intersection of the world oil pipelines – is completely full. The drop in oil prices in the last few weeks is a direct consequence of COVID-19 total economic closure that has shut down companies and transportation all over the world. Production plants are closed, ships and planes stopped, and people are stuck at home and do not use cars. Since March, fuel consumption, and therefore the demand for oil, has drastically been reduced. Still, production has not been reduced accordingly with demand. Oil plants cannot be turned on and off with a simple switch: blocking the extraction activities is very expensive. Consequently, at this moment, oil producers have to manage the excess of crude oil that they cannot sell. The situation is so critical that several large companies have run out of physical space to store supplies. Some producers have gone so far as to need to rent, and therefore pay, some oil tankers to stow excess production. Therefore, the negative price of crude oil is an indication of the amount that producers would be willing to pay to sell surplus production and temporarily leave the market without shutting down plants. In the United States, moreover, the imbalance between supply and demand is particularly accentuated by high production costs, which make oil extraction not profitable when the sale price drops below $40 per barrel. This is only the tip of the iceberg. It has come to this point because there has long been an excess of oil supply compared to demand, even before COVID. Of course, the COVID-19 pandemic worsened the situation. At the same time, a battle between Saudi Arabia, Russia and the United States is raging behind the scenes. Riyadh is trying to push Moscow out of the market after the Russians refused an agreement in February to cut production and support prices. Saudi Arabia has the advantage of being able to produce high quality oil at low costs (due to extraction and commercialization). The country manages to earn even with a barrel just above $20, while for Russia the profitability is around $40 – $50 per barrel. Oil price dynamics also affect the U.S. market, because the U.S. is actually an oil exporter on paper only. It is true that the U.S. exports more oil than it imports, but it is still necessary to import because our oil is not high quality and must be “mixed” with more noble crudes before refining. The large amount of crude oil injected into the market by the development of U.S. shale oil (an extraction technique that allows to “suck” oil from rocks that contain it) is one of the causes that determined the structural excess of the offer. For families, however, this situation can bring some limited advantages. Of course the main advantage is the drop in gas prices. However, let’s not expect the price per gallon to be close to $0. In fact, the price of the raw material affects only 15-20% of the final price.
<urn:uuid:2b1effe0-cf12-4f6d-942c-2e51e0fd452f>
CC-MAIN-2020-24
https://www.morethanshipping.com/the-negative-price-of-oil-explained/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348502204.93/warc/CC-MAIN-20200605174158-20200605204158-00115.warc.gz
en
0.972664
889
2.796875
3
2.976232
3
Strong reasoning
Industrial
The enamel that covers and protects your teeth also acts as an insulator. Underneath the enamel is the dentin, which is not only less dense than the enamel, but also contains tiny tubules that contain fluid. These fluid-filled tubules transmit sensation to the nerve of the tooth. Teeth can become hypersensitive, or overly sensitive, when the protective enamel coating becomes worn or damaged. If you are suffering from sensitive teeth, our dentist can help. Sensitive teeth are not necessarily a sign of serious dental problems, but they can be. They can also affect your day-to-day life and make it difficult to enjoy your favorite foods and drinks. To properly address hypersensitivity, our dentist will first need to identify the underlying cause. Some common causes of tooth sensitivity include: - Worn enamel - Exposed tooth roots - Gum disease - Fractured teeth - Worn fillings The treatment we recommend will vary based on the cause of the problem. If dental disease is to blame for your pain, it will need to be treated. Cavities and fractured teeth may need fillings, inlays, or crowns. In some cases, a root canal can be needed to address deep decay or an infection located deep inside the tooth. If the root is exposed, you may need a gum graft or dental bonding to protect it. Most cases of sensitive teeth are caused by worn enamel. A desensitizing toothpaste can be an effective way to manage this type of sensitivity. Desensitizing toothpaste blocks sensations from the exterior to the nerve of the tooth, but you may not get full relief until after several applications. Topical fluoride treatments are also effective against hypersensitivity because they can strengthen the remaining enamel. Proper dental hygiene can help reduce the risk of sensitivity. Brush your teeth twice a day using fluoride toothpaste. Use a soft-bristled brush each time you clean your teeth, and do not brush too hard since this can damage the enamel. Avoid eating and drinking acidic foods and drinks. Acid erosion can significantly damage enamel and contribute to sensitivity. Be sure to schedule regular dental checkups and cleanings to monitor the health of your smile. Call our office today to learn more about sensitive teeth or to schedule an appointment with our dentist. Some of the major insurances we accept are displayed to the right, however, we gladly accept ALL PPO Insurance plans and are a Delta Dental Premier provider. We will gladly help you to understand whether your insurance has limits on the doctors you can see or the services you can receive. If you provide complete and accurate information about your insurance, we will submit claims to your insurance carrier and receive payments for services. Depending on your insurance coverage, you may be responsible for co-payments, co-insurance, or other deductible amounts. Please contact our office or call your insurance carrier should you have any questions. I've been going here since 2010 and I love this dental office! It's very convenient to my residence and they offer an array of services! I'm currently under Invisalign treatment and they gave me a great price! I highly recommend them for any of your dental needs! I really like this dental office, dentists, and staff. The hygienist was very gentle and well mannered, she gave me tips on flossing and brushing properly, I highly recommend them to friends and family.. - Bryan Nickel Now I Can Smile Again! The dentist just made my front teeth/smile look like I had veneers implanted! She took away all my dark spots and heading without crowns and painful implants. It looks amazing! Thank You 🙂 The dentist was very kind + caring. Highly recommend! I only had a few days left on my dental insurance + she helped to prioritize my care + fit me in so that I could get issues taken care of in a pinch. The office manager, couldn't have been sweeter + she helped me to understand the sometimes tricky insurance pieces + actual prices I'd be paying before I made any decisions. A+ experience. 9535 RESEDA BLVD., SUITE 203 NORTHRIDGE CA 91324 TELEPHONE: (818) 349-6373
<urn:uuid:efd99bb2-6378-42d3-957d-24a8cfc98dfa>
CC-MAIN-2018-30
http://emergencydentistsfv.com/sensitive-teeth/
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593004.92/warc/CC-MAIN-20180722022235-20180722042235-00634.warc.gz
en
0.944608
884
3.140625
3
1.580197
2
Moderate reasoning
Health
Silver Spring, Md, April 13, 2013 – April showers bring May flowers, or at least that’s how the saying goes. April showers – as well as May showers, June showers, July, August, and September showers – can also bring lots of thunder and lightning. While many adults love a good thunderstorm, they are scary for many children, especially toddlers and preschoolers. Listen to his fears When your little one comes running to you, do not dimply dismiss his fears. Do not tell him to be a “big boy,” or tell him that he should not be afraid. Listen to what your child has to say. Ask him why he is scared of the thunder or the lightning. Tell him how you used to be afraid of thunderstorms when you were his age. Do not compare him to older siblings, and do not tell him he is being silly. Doing so will not help him face his fears, but may make him less willing to come to you for support. Find a safe space Find a place that he feels safe and comfortable during the storm. That may be in your arms, or in your bed if it is the middle of the night. Maybe the basement is best because the storm is not as loud, or maybe building a fort out of the sofa cushions makes him feel more secure. Finding a safe space will help calm the fear and make riding out the storm easier. Make a game out of the storm Pretend you are the storm clouds, and clap every time there is thunder. Have a pillow fight, hitting each other gently every time there is a grumble or rumble. Pretend lighting is a camera flash and draw a new picture every time you see the sky light up. Set up an indoor bowling lane, using things like empty toilet paper rolls as pins, and try to knock them down whenever there is thunder. Finding creative ways to make a game out of the storm helps make it less scary by providing a fun distraction. “The Itsy-Bitsy Spider,” “Rain, Rain Go Away,” “It’s Raining, It’s Pouring,” “It’s a Rainy Day.” There are many, many children’s songs that deal with rain, and if you are looking for some distraction, then singing songs can help soothe your child. Once they learn the lyrics, they can sing along, and maybe you will not be able to hear that scary thunder. If you cannot play games, or if it is late and you want your little one to stay relaxed and fall back to sleep, try getting him to think happy thoughts. Tell him to think about his favorite toys, or think about playing with his friends. If you have a trip coming up, tell him to think about all the fun things you are going to do one the trip. Tell him that you will stay with him, but to close his eyes and imagine all those good things. Every time he gets upset by a new clap of thunder, gently ask him what his happy thoughts are. Gradually increase storm exposure Eventually your child will start to manage his fear better. To help him fully get over the fear, gradually suggest you watch the storm. Try this once he is comfortable in his safe spot and you can hear the storm moving off. When the thunder is more of a low rumble than a house shaking bang and the lighting is the occasional flash rather than a night illuminating outdoor strobe light, try sitting near a window and talking about what is going on. Ask him what he thinks the thunder and the lighting are. Over time, you can extend how long you watch the storms. Maybe you can even watch one coming in instead of leaving when he gets comfortable enough. Children often develop fear of things they cannot control, and thunder and lightning can be loud and completely uncontrollable. It is no wonder that a middle of the night boom can send a tiny child running to his parents’ bed looking to escape the storm. The fear will pass, but hopefully these tips will help you cope in the meantime. Follow Brighid on Twitter a @BrighidMoret and receive updates when new columns post on Facebook or Google+. She also writes picture book reviews at Big Reads For Little Hands. Read more about first time parenting issues in Parenting the First Time Through at The Communities at The Washington Times. This article is the copyrighted property of the writer and Communities @ WashingtonTimes.com. Written permission must be obtained before reprint in online or print media. REPRINTING TWTC CONTENT WITHOUT PERMISSION AND/OR PAYMENT IS THEFT AND PUNISHABLE BY LAW.
<urn:uuid:6266e786-33a9-49ff-bbeb-fc1099ac25c5>
CC-MAIN-2014-49
http://communities.washingtontimes.com/neighborhood/parenting-first-time-through/2013/apr/13/fear-thunder-helping-your-child-cope-during-storms/
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931007056.0/warc/CC-MAIN-20141125155647-00217-ip-10-235-23-156.ec2.internal.warc.gz
en
0.970878
981
2.953125
3
1.861697
2
Moderate reasoning
Social Life
Natural Stone Floors: Travertine Tile Travertine tile is considered suitable for a variety of architectural styles and is recognized for its timeless beauty. Travertine, a warm honey-colored natural stone quarried for thousands of years, continues to be chosen by some of the world's best-known architects and designers. Because travertine is abundant, weighs less than marble or granite, and is comparatively easy to quarry, it was the natural stone most frequently used by the ancient Romans. Famous structures constructed with travertine tile include the Colosseum, the Trevi Fountain, the colonnade of Saint Peter's Basilica, and many Roman aqueducts. Although obviously weathered by time, the fact that it is still in place attests to travertine tile’s great resistance and strength. Travertine is found in greatest quantity where hot and cold springs have been active for tens of thousands of years. Travertine is quarried in Italy, Iraq, Iran and Peru. The most famous travertine location is Bagni di Tivoli, about 12 miles east of Rome, where travertine deposits over 90 meters thick have been quarried for over two thousand years. Travertine is a limestone formed from the precipitation of heated aquifer waters and mineral springs when it rises to the surface. A thick, banded carbonate stone is built up over time as new dissolved limestone material covers older layers. The intricate texture of travertine is partially the result of gas bubbles, which are often sandwiched between layers of stone, creating voids. When travertine tile is to be used on the floor, these voids should be filled with an epoxy resin. Some installers use a grout to fill these holes but travertine tile can be purchased with the voids already filled with resin at the factory. As travertine is creamy colored, this resin may be opaque, of a creamy color, or transparent. The opaque filler does not reflect the light as well as the surrounding travertine, whereas the clear epoxy gives a three-dimensional appearance to the holes and takes on the shine of the travertine tile. Travertine tile possess a wide range of colors, and cover the spectrum from pure white to coral-red. The various hues of travertine tile can sometimes be constant throughout large pieces and at times are blended. Travertine tile displays distinct veins at times. It can be effectively polished to a smooth, shiny finish. Travertine is quarried from the ground in huge blocks before it is cut into tile. It may be cut in any of the following ways: - Cross-cut – The travertine is cut with the grain of the stone bedding. This insures a more uniform color and texture often revealing a flowery, often circular pattern. - Vein cut – which is against the bedding which reveals the bedding planes, making for a more blotchy, tiger-stripe effect when cut into tiles. After the travertine is quarried, it is stringently selected for color variances, and further assessed after it is cut for voids and chipped edges. Beyond the selection process, the travertine may be subject to any of the following processes: - Honed – the surface of the travertine tile is sanded to create a matte finish. - Tumbled – the travertine is literally tumbled with gravel and bearings, giving it a rough-hewn, aged appearance. - Brushed –the surface of the travertine tile is worn and textured by use of a wire brush. - Filled – The voids in the travertine tile are filled with colored epoxy resin or cement to produce a perfect, solid surface. - Polished – the travertine is sanded and polished, producing a shimmering look. A travertine tile floor is expected to last at least 50 years before replacement in high-traffic commercial areas. High-quality travertine is very durable, since it is formed at the earth's surface in relative equilibrium with the environment. Most other natural stones are formed under different conditions, deep underground.
<urn:uuid:6df0baeb-a24a-46cf-b662-3b77dfdea7b8>
CC-MAIN-2020-50
http://dgfloors.com/CompanyProduct.asp?CompanyID=96415&CategoryID=11&ProductID=432&CompanyProductID=336349
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141193856.40/warc/CC-MAIN-20201127161801-20201127191801-00542.warc.gz
en
0.938628
869
3.109375
3
1.735805
2
Moderate reasoning
Industrial
My son is a writer, but his interest is movies and music. A recent conversation with him was sprinkled with writing and movie terms as well as clear explanations for scene structure, camera angles, and other components of movie making. That got me thinking about my lack in the area of writing. There are literary terms that I know inherently but can’t actually describe or define easily. I want to know them until their definitions (which I’m finding to be quite wonderful) can flow from my mouth like movie-making terms do for my son. Story and plot are first on my list. I’m writing my first novel. As I thought about story and plot, the most basic of writing terms, I realized I couldn’t define them well or make a clear distinction between the two. If asked, my definition for story would have been something like “A story is what it’s all about. You know, the story.” Plot would have been “It’s that underlying-puzzle-kind-of-mysterious-plot thing.” I laughed, too. Go ahead and try it yourself. Define story and plot. I’ll wait. How did you do? I hope you can see what I’m trying for here. I know what story and plot are, but my definitions wouldn’t help me become a better writer. So, I set out with the belief that a good study of these words can only improve my writing. Fortunately, there are experienced writers, past and present, who offer their knowledge to those of us who want to learn. What is a story? A story is composed of three basic elements: a beginning, a middle, and an end. The word is from the Greek histor, meaning “knowing” or “learned.” (Yes, etymology can be fun.) Most definitions include that a story amuses, informs, or interests its readers. E.M. Forster (Howards End, A Passage to India) wrote a book in 1927 called Aspects of the Novel, described as “the timeless classic on novel writing.” I wasn’t aware of it until I started researching writing terms. The book is interesting to read as Forster weaves in other authors’ works to make his points. “Yes–oh, dear, yes–a novel tells a story.” In his chapter about the story, Forster repeats this affirmation several times. He defines a story as a narrative of events arranged in time sequence. “[The story] is the lowest and simplest of literary organisms” and “… it is the highest factor common to all the very complicated organisms called novels.” Forster’s use of organism in this passage is clever. It confirms the way I feel while writing: my story is living, breathing, changing, moving. Here is one of Forster’s observation that all writers should ponder: “[A story] can only have one merit: that of making the audience want to know what happens next. And conversely, it can only have one fault: that of making the audience not want to know what happens next.” How does plot differ from story? Forster supplies another solid definition: A plot is also a narrative of events, yet its focus is on causality (the relationship between cause and effect). He illustrates the difference between story and plot: - With a story we say, “And then what?” (That keeps the reader reading.) - With a plot we ask, “Why?” (That keeps the reader thinking.) The term is from the French complot, meaning “conspiracy.” It’s no wonder, then, that an article at Writer’s Digest.com describes plot as “your weapon of suspense.” WD breaks plot down to three elements: 1. a causal sequence of events 2. a procession through a series of reversals and recognitions • reversal being a shift in a situation to its opposite • recognition being a change from ignorance to awareness 3. a central character who: • wants something intensely • goes after it despite opposition and, • as a result of a struggle, comes to either win or lose Then there are the layers of the plot: conflict, motivation, point of view, tension, climax, dénouement — more writing gems to uncover. What you’ll gain It’s true that you don’t need to know the definitions of writing terms to be a good writer or even an excellent writer. What you can gain from this study is a greater appreciation for and understanding of your craft. And that can only help you become a better writer. Do you have a solid understanding of these terms? Do you know how to use them effectively in your writing? What about other writing terms — do you own their meanings and keep them in your writing toolbox, sharpened and ready to use? I answered “No, but I’m working on it!” to each of those questions. The resources are plenty, both online and in print, and I’ll be sure to share what I learn here in upcoming “Writing Terms” posts. Question: How has a good study of a particular writing term improved your writing?
<urn:uuid:a726d3ba-555b-4b27-8542-1a3cbf06b34a>
CC-MAIN-2014-35
http://www.darlawrites.com/writing-terms-story-plot/
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500830323.35/warc/CC-MAIN-20140820021350-00361-ip-10-180-136-8.ec2.internal.warc.gz
en
0.96547
1,138
2.875
3
2.541453
3
Strong reasoning
Literature
Minik, the Lost Eskimo Narrator: In the summer of 1897, the explorer, Robert Peary, arrived in the northern reaches of Greenland on his third expedition to the Arctic. A lieutenant in the U.S. Navy, Peary had spent the last ten years surveying and charting Greenland's ice caps in search of the most direct route to his ultimate destination — the North Pole. Peary had long been drawn to the uncharted territories of the Arctic. As a sickly young boy he had been captivated by stories of polar exploration. Later, after becoming a naval engineer, he borrowed $500 from his mother and bought passage on a ship to Greenland. While there he found his destiny: He would become the discoverer of the North Pole. "No man could obtain a more royal monument," Peary declared, "than to have his name written forever across the mysterious rocks and ice which form the North Pole." Bruce Henderson, Author, True North: Peary was part of an age of exploration. And I've always looked on him as being one of the last of the old time explorers. And by that I mean the late 19th century explorers who just didn't much care about the people of a new land where they were going, or the wildlife, or anything like that. They just wanted to get where they wanted to get in Peary's case, the North Pole. He was somebody who was so determined to achieve fame, which being the discoverer of the North Pole would get him, that he was ruled by that. Narrator: Now, Peary was back in Greenland with an audacious scheme to excavate an enormous meteorite and take it back to sell in the United States. He planned to use the profits to finance his first full-scale assault on the Pole. As always, Peary turned to the local Inuit for assistance. Over the years, the men had driven his dog sleds and the women had sewn his clothes. They had also helped finance his expeditions. In exchange for biscuits and coffee, the Eskimos gave Peary fur and ivory, which he sold at a huge profit back home. Bruce Henderson: Peary's relationship with the Eskimos was certainly symbiotic. They got something out of it too. They got guns, they got sewing needles, pots, pans, some things that they wouldn't have gotten otherwise if they hadn't traded with Peary or some other white explorer that came in the area. What Peary got was, in my estimation, a lot more. Peary would not have survived in the polar regions without the natives, without their knowledge, without their experience. Narrator: On this trip Peary was also intent on fulfilling an unusual request from the Museum of Natural History in New York. The museum's curator, Franz Boas, wanted him to bring an Eskimo back for study in New York. Ira Jacknis, Anthropologist: In the late 19th century, there was a tradition of anthropologists working with visiting primitives, ethnic people, to bring them from their foreign countries to the metropolis. And I think what was in Boaz's mind, is he was thinking, Well, here is this explorer going to this very distant area with people who are virtually uncontacted. And if we can bring a native person to New York to help us document our collections this would be a wonderful opportunity to get a lot of information very quickly, and then he would go back the next year. Narrator: That August, the western coast of Greenland was largely free of drift ice, and Peary was able to navigate through to Cape York, the southern-most settlement of the Polar Eskimos. That year two families were living in the region, including Qisuk and his seven-year-old son Minik. Minik (as portrayed by actor): I lived in a little igloo with my father. My mother was dead and I had no brothers and sisters, so I loved my father very much. Everyone liked my father. Qisuk, they used to say, is the best hunter of all our people. My father and the rest of the men saw the big ship when it was far out in the water and they went out in the kayaks to meet it. I stayed ashore and watched. Soon Lieutenant Peary and the others would come ashore. We knew what white men do, so our men hid all the furs and ivory to keep them from being stolen. Narrator: When Peary came ashore, he asked Qisuk and Minik for their help. A few years earlier Peary had convinced an Eskimo to show him his people's only source of iron — three giant meteorites buried in the ice. Peary then laid claim to the meteorites, even scratching his initials on the surface of one. Qisuk and several others labored for nine days until finally they heaved the forty ton meteorite on board Peary's ship. The explorer paid them with guns, knives, and biscuits. Then he made a startling proposition. Minik (as portrayed by actor): Lieutenant Peary asked if some of us wouldn't like to go back with him, where there were great buildings and railway trains and lights and many people, and where the sun shone every day in winter and where people didn't have to wear heavy furs to keep warm. He coaxed my father and the brave man, Nuktaq, who were the strongest and wisest heads of our tribe to go with him to America. Our people were afraid to let them go, but Peary promised them that they should have Nuktaq and my father back within a year, and that with them would come a great stock of guns and ammunition, and wood and metal and presents for the women and children. So my father believed that for so much good and comfort for his people they should let him and Nuktaq make the trip. Nuktaq could not part from Atangana, his wife, and his little girl, Aviaq, so he took them with him. My mother was dead, and my father would not go without me, so we said a last farewell to home and went on Peary's ship. Narrator: And so six Eskimos set off on the long journey to America. Also onboard were skeletons Peary had secretly stolen from Eskimo graves. Like the meteorite, he hoped to sell the bones to the Museum of Natural History. Narrator: On September 30, 1897, Robert Peary's ship docked at Ordinance Wharf, directly adjacent to the Brooklyn Bridge. Peary had cabled ahead with news of his exotic cargo. Now a huge crowd eagerly awaited his arrival. Twenty thousand people visited the ship on the first two days to see the giant meteorite and the six Eskimos. But no one was more impressed than young Minik. Never before had he seen so many people. At most his Inuit community comprised only 234 people, spread over many miles. Now he found himself in the heart of a teaming metropolis. Minik (as portrayed by actor): Oh I can remember it very well, that day when we first saw the big houses and saw so many people and heard the bells of the cars. It was like a land that we thought must be heaven. When they took us ashore, they brought five big barrels — they held the bones of our people who had died. When we asked them why, they told us that they were bringing them here to put in nice boxes, where they would be kept safe forever. Narrator: Peary had arranged for the meteorite to be taken to the American Museum of Natural History, but no one had made arrangements for the Eskimos. David Hurst Thomas, Curator: There was a lapse of two years between the time that Boas made his initial request and Peary arrived in Brooklyn. Boas had completely forgotten about that as a possibility, and in fact, he was up to his ears in sending out anthropological expeditions on the Jessup expedition, to the North Pacific. So he was stunned when he found out that Peary had brought Eskimos back to work with anthropological recording here at the museum. Narrator: The museum placed the Eskimos under the care of its superintendent, William Wallace. Wallace scrambled to free up space in the basement to accommodate the four adults and two children. Word soon spread that Eskimos were being kept at the museum and crowds gathered outside, hoping to catch a glimpse of the exotic visitors. Many were disappointed to learn that the Inuit were not on display in an exhibit. A New York Times reporter accompanied Minik on a tour of Central Park. "The sight of a bicycle man made him howl with glee," he noted, "and he was amazed at the size of the 'big dogs' as he called the horses he saw in the driveways." The Eskimo men showed an interest in the local women, and even made proposals of marriage to a few. But within a few weeks the Eskimos came down with colds that became progressively worse. Franz Boas was worried. "Although I am not formally responsible, the whole thing falls on my shoulders," he confided to a friend. "I feel a stone around my heart." Boas contacted Peary. Franz Boas (as portrayed by actor): "My Dear Lieutenant Peary, We feel very much disturbed regarding the health of the Eskimo family at the museum, and I beg to ask if you will kindly call and give us your advice as to what is best to be done for them. They seem to have severe bronchial trouble, and we fear that it may turn into pneumonia. Sincerely, Franz Boas Narrator: But Robert Peary did not reply. He was en route to Europe for a series of lectures promoting his plans for an expedition the Pole. Bruce Henderson: I don't think he felt any responsibility for the Eskimos once he dropped them off at the museum. There's no evidence that he visited them, asked them to dinner, talked to them, cared about them ... He really gave them so precious little. Narrator: Boas attempted to find the Eskimos a way back home. David Hurst Thomas: The closest that Boas could arrange was to get them back to Labrador. But Labrador is a long way from Greenland and he decided that would be a mistake. So they stayed here and, of course, they sickened in the New York environment. Minik (as portrayed by actor): In the hospital, all my father ever did was think about me. He never slept and kept watch over me, day and night. He didn't sleep; he didn't eat. When they brought him something, he demanded that they feed me. And when I seemed to have an appetite, big tears would come to his eyes. Narrator: Boas visited Minik in the hospital and was impressed with his intelligence. "The boy had begun to pick up a few English words as soon as he reached this city," Boas noted. After six weeks at Bellevue, the Eskimos' health had improved enough for them to return to the museum. This time they were given a more comfortable space on the sixth floor where anthropologists were eager to study them. Ira Jacknis: The essential anthropological problem at the time was to try to account for the history of human cultures. How did all these people get to be the way they are? And how were they related or not related? This was really not known at the time. Now, if you measured their bodies, you could compare the measurements of one group to the measurements of people on different continents. The visit of Minik and his family really fits into a much larger story of American anthropology. The overarching world views that anthropologists are working with are very, very racist, built on the notion that the white people are at the top of a ladder, that dark skinned people are at the bottom of the ladder. Boaz enters with a very different perspective, and he's really horrified with all this. And he doesn't buy the initial assumptions. Narrator: Boas set out to collect data from the Eskimos that would challenge conventional notions of a racial hierarchy amongst the world's peoples. Ira Jacknis: His most radical notion is to say that people are not arranged in a hierarchy of more primitive to more advanced, and to better and worse, but that all people are essentially the same. Narrator: But Boas' studies were cut short in January 1898 when the Eskimos again became sick, forcing them to return to the Hospital. Minik (as portrayed by actor): The worst thing for my father was when he got so weak and had to stay in bed and couldn't come over to me. I cried the whole time and couldn't eat anything because I was afraid my father was going to die. He very nearly choked during the night. He was calling out for home, for his family, his friends — and me. I buried my head in my pillow and just cried. When I got to feeling better they allowed me to go over and lie down next to him. He knew he was going to leave me and was filled with the most awful grief. "Your father's spirit will always be with you, Minik," he said in our language. He swallowed heavily, and I knew he was going to die. Narrator: On February 17, 1898, Minik's father died. Initially there was a disagreement over who owned Qisuk's remains. Eventually, an agreement was reached: his internal organs and brain would remain at Bellevue for study, while his skeleton would be sent to the Museum of Natural History, to Franz Boas. Ira Jacknis: The whole experience of Minik and his family, I think, was devastating to Boas. It was a situation that got out of hand. It really — it was nothing that he ever dreamed would happen, and nothing he ever wanted to happen. When things like this happened, you just made the best of it. Narrator: Boas had the skeleton cleaned and mounted for the Museum's collection. He then made a decision that would come to haunt him. Boas had museum staff stage a funeral of Quisik on the museum grounds for Minik to witness. Boas would later say the ceremony was intended to comfort the young Eskimo. David Hurst Thomas: What Boas said is we wanted to spare Minik, the child, the pain of knowing that his father had been rendered into a skeleton and was on the shelves with the rest of the anthropological specimens. So they proceeded with the funeral. Boas took it fairly lightly. He said, "Well, we're doing what's the best for the kid," But today it looks pretty callous. Ira Jacknis: I think Boaz thought, Well, it's very unfortunate these people died. He didn't want them to die. He certainly did want them to return to their home lands. But he thought, Well, now that they were dead, it was — something could come of it, some good could come of their death, and science could learn from the records of their skeletons. Narrator: Boas notified Peary of Qisuk's death. From San Francisco, Peary telegraphed a reply: "Deeply regret Eskimo's death. Confident everything was done. Entire responsibility mine." After Qisuk's death, William Wallace took Minik and the other Inuit to live with him in the Bronx. But the Eskimos' health continued to decline. Within a few weeks, Atangana, who had been the first of the Eskimos to sicken, also died. Nuqtak prepared a traditional Inuit burial ritual for his wife. According to a detailed account by one of Boas' assistants, Nuktaq carried her out of the house into the barn. He then "began to talk to the body, speaking fast and in a very low voice," the assistant noted. "With one hand he lifted up the blanket covering her, and passed his other over her body from her forehead to her heart. He reproached her for being a Shaman and not being able to cure herself, and added 'I am sure I shall die myself.' Then he took her by the shoulder, and shook her hard, telling her to remain where she was. On the tenth day after her death, Nuktaq was very anxious to see the grave, and according to Inuit tradition planned to visit it every ten days thereafter." Narrator: By spring, Minik's health had improved, but the others were still gravely ill. Wallace took the ailing Eskimos to upstate New York, where he owned a farm. He hoped the mountain air would improve their health, but their condition only worsened. On May 14th, Nuqtak died. Ten days later his twelve-year-old daughter Aviaq also died. Franz Boas instructed Wallace to send Nuktaq and Aviaq's bodies back to New York where their skeletons would be archived alongside Qisuk's. After his companions' death, Uisaakassak refused to return to the house in which Nuktaq had died and moved into an old shed near the local church. "It is very difficult to keep him there contented," noted Wallace, who managed to convince Peary to take the 23-year-old Eskimo with him to the Arctic that summer. Eight-year-old Minik, however, remained in New York. Wallace and his wife, Rhetta, had grown fond of the boy. They took him into their home and set about raising him as one of their own. He became known as Mene Wallace, and took the middle name Peary. It had been a year since Peary brought the six Polar Eskimos to New York. Now, Minik was the only one left in America. Narrator: Robert Peary arrived in Greenland in the fall of 1898. He would spend the next four years in the Arctic, on his most ambitious effort yet to reach the North Pole. "If there is no route," he declared, "then I shall make one." But almost immediately Peary encountered a series of setbacks. During the first winter, while pushing North through intense storms and temperatures hovering near minus sixty degrees, the explorer developed frostbite on his feet, requiring the amputation of seven toes. Undeterred, he made another push north. Nothing was heard from him for more than a year, and for a while he was feared lost. On each advance north, Peary relied on the Inuit to drive his sledges. But with each failure to reach the Pole, the number of natives willing to accompany him dwindled. In the spring of 1902, despite the promise of rewards, Peary was able to convince just four Eskimos to travel northward with him across the frozen sea ice. Bruce Henderson: They thought these crazy white men were going to get them killed. They were taking them out onto areas of the ice flow and whatnot that no native in his right mind would go out on, because the ice cracks when it gets too thin, certain time of the year, whatnot. Peary would say, We're going there, because I want to get there. Until the white man came looking for the Pole, the Eskimos didn't really much care about the pole. And why should they? There wasn't any game there. There wasn't any water there. It was a place to go and die. And the natives had always tried to stay away from places where you would go to die. And they thought it was rather curious that these guys like Peary wanted to go to these dangerous places that, frankly, they were afraid of. Narrator: On April 21, 1902, dangerous weather conditions dealt Peary another crushing setback. Stalled by storms and rough ice and still more than 300 miles from the Pole, Peary was forced to turn back. Bruce Henderson: The Navy put right in his orders: You will get to the Pole. We are giving you paid leave to get to the Pole and to represent the Navy, United States Navy. And nothing short will suffice. Well, he came up short. Narrator: As Peary struggled to reach the Pole, Minik was settling into life in America with the Wallaces. He divided his time between the family home in New York and their country retreat upstate. He became close friends with the Wallace's young son Willie and attended Mount Hope Public School, where he learned to read and write. "Born in a land where life means nothing more than a mere physical existence," a journalist noted, "he has been brought by accident into an American home to enjoy all that that means." Minik was enjoying the material comforts of life in America. Then, suddenly, Minik's new life began to unravel. In 1901, after being accused of fraudulent use of museum funds, William Wallace lost his job at the museum. Three years later, Wallace's wife, Rhetta, died; Willie was sent away to live with relatives. Minik dropped out of school. He and his foster father shared an apartment on 14th Street, while Wallace struggled to make ends meet. Peary was also struggling. When he returned from his failed attempt to reach the North Pole, he was dismayed to learn that public support for his efforts was waning. It took him three years to revive public interest in another expedition, and to raise funds from wealthy patrons. Bruce Henderson: Peary was a networker, whether it was the President of the United States, or whether it was any other of these industrialists, wealthy men, Peary did have a way of garnering their support and raising money. And he was certainly a showman. He could go on tours and circuits, and talk about the North Pole, and show the Eskimo dogs, and tell rather dramatic stories. He did have some charisma and he could get people to believe in him. Narrator: Finally, Peary managed to raise $100,000 to build a new expedition ship, which he named after President Theodore Roosevelt, one of Peary's most prominent supporters. In July 1905, the explorer set off for Greenland, only to return a year later, having failed to reach the Pole once again. Bruce Henderson: Getting to the North Pole meant everything to Robert Peary. He was obsessed, and he was determined. And nothing or nobody was going to stop him. Narrator: With Roosevelt's support, Peary convinced the Navy to give him another three years of paid leave to pursue his Arctic expeditions. In July 1907, he announced what he felt certain would be his last attempt to reach the North Pole. "I believe I shall win this time," he wrote Roosevelt. "I believe this is the work for which God almighty intended me ... " That same year, Minik made a shocking discovery. From newspaper accounts he finally learned the truth about his father's burial. It had all been a fake; his father's bones were being held at the museum. The seventeen-year-old Eskimo grew melancholic and restless. "We did our best to cheer him up," Wallace wrote, "but it was no use. His heart was broken. He had lost faith in the new people he had come among." Chester Beecroft, a prominent New Yorker, was moved by Minik's plight and took his case to Washington. Beecroft requested that the government support Minik and his education. In a letter to President Roosevelt, Beecroft described Minik as "a national guest and a national prisoner" whose condition "is becoming a national disgrace." But no one came to Minik's aid. Narrator: In June 1908, as he was making final preparations for his expedition north, Robert Peary received a letter from William Wallace. William Wallace(as portrayed by actor): "Dear Lieutenant Peary, Minik desperately wants to visit his people up north and I beg you to allow him to accompany you on your journey. Please let me know if you can fulfill this request." Narrator: "I have received your letter of June 23," Peary replied, "and while I would like to please Mene in this matter, I regret that my ship will be too crowded for me to take him this summer. Or if he is very anxious to get some things from up there, I shall be glad to try to send him back a kayak or a sledge or whatever he may most desire." More than ever, Peary felt himself in an intense race to reach the North Pole. The previous year, Frederick Cook, a physician and Peary's former colleague, had announced his own plans to reach the Pole using a new route. While the Roosevelt still lay docked in New York, Cook was making his way to Northern Greenland. Bruce Henderson: There's no doubt that Peary was getting increasingly desperate. And I think he felt that he didn't have much time left. And, indeed, he didn't. When he left on his last polar expedition, he was 51 years old, 50, 51. I think he thought that it was now or never. Narrator: Upon his departure, Peary made a dark promise: "This time I will reach the Pole or die." That August, Robert Peary finally set up camp in Northern Greenland. The following winter he set out with 22 Eskimo drivers, and 246 dogs — one of the largest Polar expedition teams ever assembled. Six weeks later, while still more than 100 miles from the Pole, the size of his crew had dwindled to just four Eskimos. Peary would later claim that with this small team he reached the North Pole on April 9, 1909. Upon his return to the U.S. Peary's claim was echoed across the country. Reporter(archival): Here is the cap and climax the finish, the closing of the book on 400 years of history. The discovery of the North Pole on the 6th of April 1909 by the last expedition of the Peary Arctic Club means that the splendid frozen jewel of the north, for which through centuries men of every nation have struggled and suffered and died, is won at last and needs to be worn forever by the stars and stripes. Narrator: But almost immediately, doubts surfaced as to whether Peary had actually reached the Pole. Narrator: The same month that Peary supposedly reached the Pole, Minik decided to leave New York. Increasingly frustrated at the Museum's refusal to return his father's bones, he struck out on his own for Greenland with just five dollars in his pocket. Minik wrote of his decision to Chester Beecroft, who passed his letter along to the press. Minik (as portrayed by actor): "When this reaches you I will be well on my way. You made a brother of me when all the others that were responsible for my being stolen from my own country failed." "... I don't see any chance in New York and I don't want to be a burden for you any longer ... So I go away. They won't give me my fathers body out of the museum and they never keep their promise, so I'm disgusted and will leave it all if I can. Never mind where I am, I'm just working North. I am homesick and disgusted and when Commander Peary, who brought me to New York told me had no room for me on his ship, I lost hope." "This is probably the last letter I will ever write. You see I worked my way up here and you can guess how hard it is to beat your way without any money, and many days I have been hungry and many nights I have cried. Now I am in Canada, and I am sick and weak and have no more strength to fight off the awful want to die." "My poor people don't know that the meteorite that Peary took, it fell from the star. But they know that the hungry must be fed and cold men must be warmed and helpless people cared for and they do it. Wouldn't it be sad if they forgot these and got civilized. I remember one day you told me that the sure way to get revenge is to be unlike the one that hurt you. I'm going to die smiling at Peary and the scientists..." Narrator: When Minik's letter was published, his plight created a national furor. Six weeks after leaving, a bedraggled Minik returned to the city. The San Francisco Examiner promptly published an article with a banner headline announcing Minik wanted to shoot Peary. "I would shoot Mr. Peary and the Museum Director," Minik reportedly said, "only I want them to see how much more just a savage Eskimo is than their enlightened white selves." Robert Peary's wife, Josephine, was enraged. The Minik affair, she feared, was becoming a threat her husband's reputation. Bruce Henderson: Minik was giving interviews with newspapers. From Peary's point of view, he didn't like getting bad press. I mean, that was the last thing Peary wanted. He wanted everything to be positive. He wanted the money flowing in, the support, the accolades, everything. And so Minik was a problem. Narrator: Josephine Peary and a group of Peary's supporters made arrangements for Minik to join a relief expedition taking supplies to the explorer in Greenland. On July 10, Minik, now eighteen, finally left for his Arctic home. But not before he was forced to sign an agreement stating he would never return to the United States. Narrator: In August 1909, Minik looked out on his native land for the first time in twelve years. As his boat sailed into Melville Bay a thick layer of fog shrouded the water. Then a ship became visible in the distance. On board stood Robert Peary, clad in fur skins. He was awaiting passage to New York, where he would make public his claim to have reached the Pole first. Before Minik could leave the ship, Peary forced him to sign a document saying that he had received provisions and supplies from Peary: "All that is needed to make me entirely comfortable." When Minik disembarked, the local Inuits gathered excitedly around him. The ship's crew explained that the young man was the son of the great hunter, Qisuk. Minik was silent; he had forgotten his native language. With gestures, the Eskimos welcomed him back home. Sodaq, a powerful shaman, took Minik under his wing and began to reintroduce him into Inuit life. But after a year, Minik was still having trouble adapting. He confided his alienation to his old friend, Chester Beecroft. Minik (as portrayed by actor): I don't think both ends and the middle of the Earth are worth the price that has been paid to almost find one pole. See all the white bones. Where is my father? Why am I not longer fit to live where I was born? Not fit to live where I was kidnapped? Why am I an experiment there and here and tormented since the great white pirate interfered with nature and made a failure and left me a helpless orphan — young, abandoned — 10,000 miles from home? I have no friend here or anywhere. I am lonely. Come up here and I will show you how to find the Pole. I will make you king. Then if you want me, I will go back to New York with you, or stay here, or go to Hell for you, my friend when there was none. Narrator: Minik also told Beecroft that many Eskimos doubted that Peary had ever reached the Pole. Bruce Henderson: Although Minik, I don't think is an objective observer when it comes to Peary. And certainly he did have his issues with Peary, and I think he was embittered. At the same time, I think that Minik was reporting what he was hearing among Eskimos, and that was there was doubt that he had made it that far. The rest of the world at that time was gathering around Peary and acknowledging him as the discoverer of the North Pole, and Minik's going, "well, wait a minute. This might not have happened." Narrator: As details about Peary's dash to the North Pole emerged, it became apparent that he would have had to travel across the ice at an unprecedented speed to reach the Pole when he claimed. Peary continued to press his case. He won the endorsement of the National Geographic Society, and eventually his well-connected supporters convinced Congress to certify that Peary had in fact reached the Pole first. While Peary worked to secure his place in history, Minik continued trying to adapt to life in the Arctic. He relearned his native language and lived with an Eskimo woman for a while, but they quarreled often and Minik again struck out on his own. His language skills enabled him to find work as an interpreter on American expeditions in the region. But gradually, he came to long for the life he had known in New York. In the fall of 1916, after seven years in his homeland, Minik left the Arctic and returned to America. Confident the Polar controversy still captivated the public, he contacted the press, intending to sell the true story of the discovery of the North Pole. But Americans were preoccupied with a growing war in Europe and no longer interested who had made it to the Pole first. As he waited for offers that never came, Minik worked briefly in a machine shop, visited with old friends, and considered starting a trading business. He talked about returning to Greenland, but never acted on it. Instead, he applied for American citizenship. In the winter of 1917, Minik headed north to New Hampshire, where there was a demand for lumberjacks. Life in the lumberjack camp was hard and the conditions primitive. The timber was cut in winter so it could be sent downstream to sawmills in the spring. Minik was in New Hampshire a year before the flu epidemic that was sweeping the country reached the camps in October 1918. Minik contracted the disease. Seven days later, on October 29th, Minik died in the home of a friend. Ira Jacknis: The story of Minik is a tragedy where someone frankly becomes a stranger in both worlds, all of his worlds, his native world, his newfound world. Raised as an Inuit, he comes to New York at an early age and finds himself an, an orphan ... There's so much that he's uncomfortable with that's difficult for him in New York ... But he makes a go of it like many immigrants. He's trying to learn a new way of life, but it's not fulfilling him so he tries to go back, which many immigrants do. He goes back and tries to rebuild his traditional life and then that doesn't work out either because he's a different person, he's not an Inuit. He has different ideas, different perspectives, different ways of looking at the world that he's gotten in New York. He's caught between worlds. He's not fully Inuit, he's not fully American, he's somewhere in between and those are very sad cases and I think Minik's life is somewhat of that story. Narrator: Within a few decades, the type of research that Franz Boas had conducted on Minik and his family transformed theories of cultural difference, discrediting 19th century concepts of a racial hierarchy. Appointed to the faculty at Columbia University, Boas would come to be regarded as the founder of modern American anthropology. Robert Peary died in 1920, at the age of sixty-three. Nearly fifty years after his death, the National Geographic Society re-examined Peary's records and concluded that most likely Peary had fabricated his claim to have reached the North Pole. The meteorites Peary brought back from Greenland and sold to the Museum of Natural History for $50,000 remain a popular exhibit. In 1993, nearly a century after their deaths, the bones of Qisuk, Nuktaq, Atangana and Aviaq were taken back to Greenland by a representative from the Museum. Minik's body was not among them. He lies buried in a cemetery overlooking a stream in Pittsburg, New Hampshire.
<urn:uuid:560ec3df-961e-4e5c-84f7-e54e200f6164>
CC-MAIN-2015-32
http://www.pbs.org/wgbh/amex/minik/program/pt.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988312.76/warc/CC-MAIN-20150728002308-00039-ip-10-236-191-2.ec2.internal.warc.gz
en
0.990267
7,577
2.84375
3
2.991059
3
Strong reasoning
History
Wanting to do something with "yao" The verb 要 (yào) can be used as an auxiliary verb to indicate wanting to do something. Subject + 要 + Verb + Object - 我 要 吃 饭。I want to eat. - 他 要 学 中文。He wants to study Chinese. - 她 要 去 酒吧。She wants to go to the bar. - 我 要 去 上海。I want to go to Shanghai. - 宝宝 要 睡觉。The baby wants to sleep. - 我们 要 去 超市。We want to go to the supermarket. - 我 要 去 上班。I want to go to work. - 我 今天 要 吃 沙拉。Today I want to eat salad. - 我 要 做 中国 菜。I want to make Chinese food. - 我 要 请 你们 来 我 家。I want to invite you to come to my home. 要 and 想 Instead of using 要 (yào) it is also possible to use the word 想 (xiǎng). These two words are both auxiliary verbs and are largely interchangeable, and both generally mean "to want." The only difference worth mentioning is that 要 (yào) is often used when it is something you want to/need to do, and plan to take action on. It can sound a bit more demanding (and less polite). 想 (xiǎng) on the other hand, is often used as an idea of one's mind, that one may or may not take action on. You can think of it as meaning "would like to." - 我 要 喝 咖啡 。 (I am going to get my hands on some coffee)I want to drink coffee. - 我 想 喝 咖啡 。 (I want to drink a cup of coffee, but may or may not act on that)I'd like to drink coffee. - 你 要 吃 什么 ? What do you want to eat? - 你 想 吃 什么 ? What would you like to eat?
<urn:uuid:dc165e06-dba4-4321-88f6-d9c70eeb67b1>
CC-MAIN-2015-35
http://resources.allsetlearning.com/chinese/grammar/Wanting_to_do_something_with_%22yao%22
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064445.47/warc/CC-MAIN-20150827025424-00207-ip-10-171-96-226.ec2.internal.warc.gz
en
0.879327
586
2.703125
3
1.370413
1
Basic reasoning
Literature
Am Fam Physician. 2007 Feb 1;75(3):337-338. Vaccines for Preventing Influenza in Older Patients Are influenza vaccines safe and effective in persons 65 years and older? According to data obtained primarily from poor-quality observational studies, influenza vaccination in older persons living in long-term care facilities appears to prevent approximately 45 percent of pneumonia cases, hospital admissions, and influenza-related deaths. In older persons living in the community, influenza vaccination prevents about 25 percent of hospitalizations from influenza or respiratory illness. The vaccines appear to be safe. The authors of this review identified 71 case-control studies, cohort studies, and randomized controlled trials (RCTs) assessing the effectiveness of influenza vaccination against influenza or influenza-like illness; 64 of these studies addressed vaccine effectiveness in older persons. There were five RCTs addressing vaccine effectiveness, with about 5,000 observations. Because vaccine type, setting, and outcomes were different in each study, conclusions were limited. A meta-analysis of two of these trials with a total of 2,567 patients showed that inactivated vaccines were more effective than placebo against influenza-like illness and influenza in community settings where there is a high viral circulation (vaccine effectiveness [VE] = 43 percent; 95% confidence interval [CI], 21 to 58 percent); pooled data from three RCTs showed that the vaccines were effective against influenza (VE = 58 percent; 95% CI, 34 to 73 percent). Vaccines appear to be safe. Based on pooled data from four RCTs, local adverse events such as tenderness and sore arm were significantly more common with vaccine than with placebo; however, differences in systemic side effects were not statistically significant between the two groups. In the cohort studies, healthier patients with better access to health care services may have received the vaccination preferentially, making the comparison groups different at baseline and overestimating the effectiveness of the vaccine. Likewise, the benefits for all-cause mortality found only in observational studies may reflect differences between vaccinated and nonvaccinated groups rather than a true effect. Evidence from RCTs, in which bias is reduced, is limited because of the relatively small total number of patients studied. Because of universal recommendations for influenza vaccination in older persons, it is unlikely that a randomized placebo-controlled trial will be performed to provide the high-quality evidence required. Overall, these results support the conclusion that vaccination benefit is maximized if those at greatest risk for influenza complications are successfully targeted for vaccination. The effectiveness of vaccination in older persons living in community-based settings was more modest. The Advisory Committee on Immunization Practices recommends annual influenza vaccination for the following groups: persons at high risk for influenza-related complications and severe disease, including children six to 59 months of age, pregnant women, persons 50 years or older, and persons of any age with certain chronic medical conditions; and those who live with or care for persons at high risk.1 Source: Rivetti D, et al. Vaccines for preventing influenza in the elderly. Cochrane Database Syst Rev 2006;(3): CD004876. 1. Smith NM, Bresee JS, Shay DK, Uyeki TM, Cox NJ, Stri kas RA, and the Advisory Committee on Immunization Practices. Prevention and control of influenza: recommendations of the Advisory Committee on Immuniza tion Practices (ACIP) [Published correction appears in MMWR Morb Mortal Wkly Rep 2006;55:800]. MMWR Recomm Rep 2006;55(RR-10):1–42. O. Copyright © 2007 by the American Academy of Family Physicians. This content is owned by the AAFP. A person viewing it online may make one printout of the material and may use that printout only for his or her personal, non-commercial reference. This material may not otherwise be downloaded, copied, printed, stored, transmitted or reproduced in any medium, whether now known or later invented, except as authorized in writing by the AAFP. Contact [email protected] for copyright questions and/or permission requests. Want to use this article elsewhere? Get Permissions More in AFP MOST RECENT ISSUE Access the latest issue of American Family Physician
<urn:uuid:1450833b-9da1-49a6-966b-403547e97d43>
CC-MAIN-2022-05
https://www.aafp.org/afp/2007/0201/p337.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304835.96/warc/CC-MAIN-20220125130117-20220125160117-00708.warc.gz
en
0.922287
908
3.203125
3
2.957351
3
Strong reasoning
Health
Keep Pets Safe On The Fourth The Fourth of July weekend, with its barbecues, firecrackers and fireworks, is a festive time for millions of families. And it’s also a time to remember your animal companions. The experts at the ASPCA have some strategies for making the holiday a relaxing time for the furry friend(s) in your home. Don’t leave alcoholic drinks within reach of pets. Alcohol can poison animals. Your pet could also go into a coma, the ASPCA says. In severe cases, fatal respiratory failure has occurred. Avoiding putting sunscreen or insect repellents on pets that are not intended for animals. The ASPCA says that ingestion of sunscreen can lead to drooling, vomiting, diarrhea and lethargy. Insect repellent that contains DEET can lead to neurological problems. (Editor’s note: There are sunscreen and insect repellent products for pets; they are available at major pet stores and online.) Keep matches and lighter fluid out of pets’ reach. Certain types of matches contain chlorates, which could potentially damage blood cells and result in difficulty breathing, or kidney disease in some cases. Lighter fluid irritates skin and if swallowed can affect the central nervous system. Even just inhaling lighter fluid can lead to breathing problems. Keep your pets on their normal diet. Any change, even for a meal, can give your pets severe indigestion and diarrhea, the ASPCA says. Older animals, in particular, have more delicate digestive systems and nutritional requirements. Some foods such as onions, chocolate, coffee, avocado, grapes and raisins, salt and yeast dough can all be potentially toxic. Don’t put glow jewelry on your pets, or allow them to play with it. The substance within these propducts isn’t highly toxic, the ASPCA says, but excessive drooling and gastrointestinal irritation. Your pooch could also have an internal blockage as a result of swallowing pieces of the jewelry. Be cautious with pest-control products. Citronella candles and insect coils should be kept out of reach. As with other products that are toxic to animals, these can cause damage to the central nervous system. Animals coming in contact with these products are also vulnerable to aspiration pneumonia, in which food, saliva or vomit gets drawn into the lungs, causing the lungs to swell. Even though your pet is eager to be with you, don’t take him to a fireworks display or have him nearby if you’re setting off some firecrackers of your own. Exposure to fireworks means a risk of burns and injuries to curious pets. Additionally, the noise from a fireworks show can frighten pets, both cats as well as dogs. So keep your pet in a safe and quiet place while you enjoy the Fourth of July display. For more information on pet care, visit www.aspca.org.
<urn:uuid:9e451d18-8db9-4501-9cdf-7da421a1a7db>
CC-MAIN-2017-26
http://thirdage.com/keep-pets-safe-fourth/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128322275.28/warc/CC-MAIN-20170628014207-20170628034207-00553.warc.gz
en
0.939839
599
2.5625
3
1.995343
2
Moderate reasoning
Health
A new Canadian research initiative funded by the CANADA FIRST RESEARCH EXCELLENCE FUND WHAT IS METAL EARTH? Metal Earth is a Canadian $104 million applied R&D program led by Laurentian University. With funding from the Canada First Research Excellence Fund and federal/provincial/industry partners, this initiative will be a strategic consortium of outstanding Canadian researchers from academia and allied Canadian and international research centres, government, and industry. Metal Earth will transform our understanding of the genesis of base and precious metal deposits during Earth’s evolution. It will make Canada a world leader in metal endowment research and world-class innovator through open source delivery of new knowledge and the implementation of new technology. Keys to Understanding Our Planet Metal Earth is initially focussing on the Precambrian era to answer fundamental questions related to how secular changes in Earth’s evolution have resulted in differential metal endowment in space and in time. Research is seeking to determine the geological, geochemical, and geophysical differences between metal endowed, less endowed, and the more common barren areas that appear geologically equivalent. Defining the key characteristics that differentiate endowed versus less endowed crust will transform our understanding of the processes responsible for Earth’s differential base and precious metal endowment. Research is seeking to answer fundamental questions including: - Current metal endowment models emphasize modern geodynamic environments and processes. Precambrian geodynamic environments and processes are controversial. If they differed from those operating today, what are the processes that resulted in early Earth’s metal endowment and how can they be recognized? - Can we recognize subtle differences in the mantle, the subcontinental lithospheric mantle, the crust and in the deep crustal structures between endowed and less endowed areas, which may explain metal endowment localization? Through this new knowledge, Metal Earth is transforming our understanding of Earth’s evolution and the fundamental processes that govern metal enrichment through time, as well as increasing our understanding of the evolution of our planet’s hydrosphere and atmosphere. It is aiding government to assess Canada’s resource potential and to develop strategies for Far North growth and sustainability. Unlocking Earth’s Mineral Wealth The Precambrian era spans 90% of Earth’s evolution and much of the Earth’s timeframe for development of precious and base metal endowment. This includes the Canadian Shield, which represents 30% of Canada’s Far North. While 48% of Canada’s total known base metal wealth is derived from Precambrian base and precious metal deposits, 90% of this wealth comes from mines located south of the 60˚N latitude. The new knowledge and technology generated by Metal Earth will become principal drivers to support Far North development, sustainability, and sovereignty, and will firmly place Canada as a global leader in Mineral Exploration research. The resource sector will benefit through direct application to geoscience surveys to focus exploration and increase discoveries. Recognition of key, measureable and validated criteria defining metal endowed areas is essential for the discovery of Canada’s next generation of mines. CANADA FIRST RESEARCH EXCELLENCE FUND The Canada First Research Excellence Fund is a tri-agency initiative of the Social Sciences and Humanities Research Council (SSHRC), the Natural Sciences and Engineering Research Council (NSERC), and the Canadian Institutes of Health Research (CIHR). The Fund’s objective is to help Canadian postsecondary institutions excel globally in research areas that create long-term economic advantages for Canada. ~$1.35B has been awarded thus far. For details, www.cfref-apogee.gc.ca/home-accueil-eng.aspx MINERAL EXPLORATION RESEARCH CENTRE Laurentian University is the only university in Canada where geology and mineral exploration are integral components of its strategic plan. The Mineral Exploration Research Centre (MERC), the research arm of the Harquail School of Earth Sciences, is an internationally recognized and industry-funded hub for exploration science and education. MERC will provide the scientific and administrative nucleus for Metal Earth. MORE ABOUT METAL EARTH Earth’s metal content is not homogeneous. Its economic metal deposits are extreme examples of localized and concentrated metal endowment where elements are enriched by several orders of magnitude compared to their average crustal abundance. Metal deposits are rare. They are comparatively small, are not uniformly distributed throughout the Earth’s crust and did not form continuously during Earth’s evolution. Metal Earth will undertake collaborative, international research on determining the factors and processes that resulted in differential metal endowment and metal deposit localization. Research findings will be substantiated through integrated, 4-D, geological, geochemical and geophysical research that will produce new MRI-like images of the near surface, crust and mantle in metal endowed and barren areas. Metal Earth’s novel holistic approach will facilitate detailed comparisons between geologically equivalent endowed and less endowed areas in order to determine the processes and controls on metal endowment during Earth’s evolution. Physical comparisons will be established at the deposit, district and belt scale and conceptually at the craton scale. Research will be conducted in past and presently producing metal districts and their barren equivalents that offer accessibility and excellent geological information. The new science and technology generated by Metal Earth will be delivered to the Far North through partnerships with provincial, territorial and federal government geological surveys, the mining industry and the exploration service sector where it will be used to focus exploration on the most prospective areas containing Canada’s next generations of discoveries.
<urn:uuid:3b4051a5-ba13-4330-8946-cf355d29db76>
CC-MAIN-2017-43
http://merc.laurentian.ca/metalearth
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826840.85/warc/CC-MAIN-20171023221059-20171024001059-00083.warc.gz
en
0.900645
1,153
2.546875
3
3.011555
3
Strong reasoning
Science & Tech.
I like to think of music as a means for communication. To further this metaphor, various types of music can be though of as languages with many dialects. Some genres are closely related (like English from Maine and English with a southern drawl) or as disparate as Russian and Chinese. Learning the jazz language can also be the most difficult lesson to learn, especially if you grew up with rock or classical music. Jazz has a dialect all its own. Sure, jazz uses the same notes, rhythms, instruments, etc. as other styles, but the use of those elements is drastically different. Of course you can't learn the language overnight, or even in a few weeks, but there are some things that can help along the way. The first thing to do is to listen to jazz as much as you can. You can study books and sheet music and practice by yourself in your room all you want, but you'll never be able to speak it clearly unless you listen to other people's playing. It's the same way babies learn to speak. Listen to CDs, tapes, a jazz radio station (if you're lucky enough to have one in your area). Listen to as many types of jazz as you can as well (Big Band, Bebop, Cool, Modal, the list goes on). This is learning by osmosis. Do it as much as you can. The next step is in the "swing." Note: For the purpose of learning to improvise, which is what jazz is really all about, the elements of jazz in this column come largely from the bebop tradition. I believe that if you start learning jazz by understanding and playing bebop, all other styles of jazz will come easier. One thing that makes jazz sound different from other types of music is that it swings. So what is swing? Some teachers have tried to describe it in rhythmic terms, like "lazy 8th-notes." I think swing is more an internal physical and mental process. If you've ever looked at a score of jazz music, it may say "swing" up at the tempo marking, but there's nothing in the notation that looks like swing. There is an assumption on the part of the composer that the players know how to swing. Something that helped me learn to swing was to always tap my foot on beats 2 and 4. These are typically where the drummer would play the high hat in a tune. In classical and rock music there is an emphasis on beats 1 and 3, and 2 and 4 are considered weak beats. By tapping on 2 and 4, you can physically aid yourself in swinging, especially when playing music that has a lot of syncopation and off-beat rhythms. Thinking more about the weak beats can make your playing more relaxed and keep you in the groove, or "in the pocket" in jazz lingo. While there isn't always a real emphasis on 2 and 4 (one TWO three FOUR) in the music, by keeping the thought of 2 and 4 in your head you can free yourself from the tyranny of beat one. This will also help your phrasing later on. A good way to practice this is to tap on 2 and 4 when you're listening to jazz. You can also do a comparison test. Tap on 1 and 3 to a jazz tune and see if it feels funny. Try tapping on 2 and 4 to a rock tune. It can actually be difficult to do because it will feel very unnatural. It is not what you're used to, and that's exactly the point. Sean T. Gill is a 4th year undergraduate at the University of Wisconsin-Milwaukee, Wisconsin Conservatory of Music, majoring in jazz and has played guitar for eight years. He performs in university ensembles, works on various recording projects, and teaches privately. He also works for Hal Leonard Publishing as an arranger on various guitar projects. Send comments or questions to:
<urn:uuid:950fa4f6-eb36-4283-b21c-120483659521>
CC-MAIN-2019-39
https://guitar9.com/column/jazz-primer
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573323.60/warc/CC-MAIN-20190918172932-20190918194932-00461.warc.gz
en
0.977589
824
2.859375
3
2.469037
2
Moderate reasoning
Entertainment
AI and VR Could Completely Transform How Doctors Diagnose and Treat Mental Disorders Post Content here A Virtual Therapist Advancements in deep learning, virtual reality (VR), and artificial intelligence (AI) may signal an end to issues engrained within the practice of clinical psychology — such as subjectivity and the difficulty of conducting large-scale studies — perhaps leading us into a new era of diagnosing and treating mental disorders. This new branch of study is known as computational psychiatry. It operates on the tenet that researchers can better understand and treat mental illnesses using the aforementioned technologies. Application vary, but some researchers in the field apply mathematical theories of cognition to data mined from long-standing observations to effectively diagnose and predict cognition, while others use virtual experiments to enable the pure study of human behavior. Click to View Full Infographic Sarah Fineburg of Yale University in New Haven recently published a study that used computational psychiatry to explore borderline personality disorder (BPD), a condition that the National Institute of Mental Health (NIMH) reports includes symptoms such as “ongoing instability in moods, behaviors, self-image, and functioning,” as well as “impulsive actions and unstable relationships.” For her study, Fineburg observed the responses of people with BPD to events in virtual environments. She used a game called Cyberball in which avatars pass a ball to one another, with the patient in control of one avatar. Though they believe the remaining avatars are controlled by other people, their actions are actually determined by computer systems. The game allowed Fineburg to monitor the patients’ emotional responses to the frequency with which they were passed the ball. She found that BPD sufferers experienced greater feelings of rejection than non-sufferers when they did not receive the ball, and they also experienced more negative feelings than non-sufferers even when they received the ball more often than the other avatars. Not only can computational psychiatry be used to study the emotions of BPD patients, it can also help researchers understand their language use, which some have posited was different from that of non-sufferers. However, the data was previously too vast to analyze.“We and others have identified language features that mark psychological states and traits,” Fineberg told MIT Technology Review. “Computational models based on word-use patterns can predict which writers have psychosis or will progress to psychosis.” An App for Depression The two strands of computation psychiatry explored by Fineburg — using virtual environments as clinical spaces and using AI to find patterns in large swathes of data — are being used by other researchers to study other disorders. The use of AI to diagnose disorders and recommend treatments has gained traction in the world of apps, which are acting as “virtual psychotherapists” to treat a variety of mental disorders. A prime example is Woebot, a chatbot that uses cognitive behavioral therapy principles to help combat depression. The results from a small test of the app were promising, with the majority of users reporting a significant reduction in depression symptoms. Alison Darcy, a lecturer at Stanford who pioneered the app, told Business Insider, “The data blew us away. We were like, this is it.” The app does have the potential to help people, but there are also some inherent problems with it. Due to the novelty of such systems, no one has yet studied whether or not psychiatric interactions with a computer over an extended period of time are beneficial for patients. Darcy’s study only had 70 total participants and lasted just two weeks, which is likely too short a time period to produce any certainty about the app’s impact. An error occurred. Virtual environments seem to have fewer pitfalls when used for psychiatric studies. The whole idea of psychology is to study how a person’s perception colors empirical data, so if the senses are sufficiently fooled into believing a virtual scenario is “real,” the results of a VR supported study are just as valid as one conducted in the real world. In fact, these environments give researchers the ability to learn more than they could from a traditional environment as the VR world can be modified in virtually limitless ways. This enables the study of events that may not be possible in the real world, which gives the researchers a more robust data pool and potentially more clarity on their patient’s cognition. Indeed, virtual realities and digital environments have already demonstrated their ability to help researchers study and even treat mental disorders. VR can be used to help ex-soldiers overcome symptoms of PTSD, and it has also been shown to help people overcome depression by increasing their self-compassion. Computational psychiatry could potentially help millions of people, but as with anything that involves the brain, we must careful in how we apply this technology. Without knowing precisely what effect these treatments can have on the mind, we set ourselves up to potentially do more harm than good.
<urn:uuid:b4d215a9-225b-48ea-a54e-e79c8029ec6d>
CC-MAIN-2017-34
https://deemagclinic.wordpress.com/2017/08/04/ai-and-vr/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886117519.92/warc/CC-MAIN-20170823035753-20170823055753-00477.warc.gz
en
0.960378
1,018
3.125
3
3.020469
3
Strong reasoning
Health
Gap theory revisited Published: 20 November 2011 (GMT+10) This feedback concerns gap theory, which tends to rely on a misunderstanding of the word ‘replenish’ the King James Version of Genesis 1:28, which originally meant ‘fill’. Ray K. from New Zealand wrote in, with responses from CMI’s Dr Jonathan Sarfati and Lita Cosner interspersed: Dear Mr K., We’ve been asked to respond on behalf of Dr Wieland and the editors. We must say, upon re-reading Dr Wieland’s article [update: now online—Editor], we’re bewildered by your criticism and wonder how you could have arrived at your conclusions from any fair interpretation of his writing. Please see our comments interspersed. I refer to the article entitled Replenish the Earth by Carl Wieland in Creation 33(2):48–49. This article, like many others in Creation and other CMI-sponsored literature, rubbishes what the writer sneeringly calls “the hoary old gap theory”. Taking a single phrase out of context of the article, it is possible to misread it as ‘sneering’, but I would think any fair reading of the article would take note of the author’s gracious tone throughout, especially where he ended on the note about ‘setting them straight—‘making sure your words are “replete with grace”, of course.’ The issue hinges on whether or not Scripture presents a time-lapse between the creation of the heavens and earth (verse 1 of Genesis 1) and the “waste and empty” condition of the earth as described in verse 2, with a further time-lapse between verses 2 and 3. These time-lapses were not necessarily of long duration as CMI invariably presupposes. Well, if we’re going to define a time lapse as a pause of any period, then I would fit the gap theory, because I would think that perhaps a few moments up to even hours separated the events! But as long as we believe that the entire creation was completed in 6 normal-length days as Exodus 20:8–11 states, it is orthodox. The term ‘Gap Theory’, traditionally understood, is the theory that inserts a gap and pre-history in between the two verses to explain the fossil record and insert long ages by appealing to what is sometimes called ‘Lucifer’s Flood’. Nor do they imply that some kind of human creatures roamed the earth before Adam (a nonsense that no competent Bible scholar to my knowledge has ever propounded). Well, you’re correct that no competent Bible scholar supports it, but this is the classic gap theory. First, I greatly respect and support CMI for its excellent exposures of evolution theory. Thanks, but it’s hard to detect any of that respect in this message. Also, our exposures of evolution are not the primary focus of our ministry! Rather, this is a corollary of our main message, the authority of Scripture. So is our opposition to any scheme that puts death before the Fall, since this undercuts the reason Jesus came to die for our sins. However, I strongly resent CMI’s constant disparagement of those who genuinely believe that those time-gaps are implicit in a plain reading of the Scriptures. You say repeatedly how our goal is to ‘disparage’ people and ‘malign godly students of the Bible’, but such comments ignore the fact that Dr Wieland didn’t mention a single specific gap-theorist in his article, instead focusing on the arguments. It would have been nice had you elected to do the same instead of resorting to emotive language. We don’t doubt there’s people who ‘genuinely believe’ the gap theory—but we genuinely think they’re genuinely wrong. And when those genuinely wrong people happen to be Christian leaders, we have a responsibility to answer their bad exegesis with good. But again, we didn’t mention any specific person in this article. The article in question asserts that “the gap (or reconstruction) theory did not arise from any reading of the text …” This is deceptive and untrue. Well, the gap theory did result from a reading of the text (just not a very good one!) informed more by the desire to fit long ages into the creation account than by anything in the Hebrew (as the full quote says). We wouldn’t say that our statement is deceptive, however—the gap theory never arose from the text before the rise of long-age ‘science’. Such an accusation must stem either from ignorance or from a deliberate attempt to denigrate those whose exegesis of Scripture differs from CMI’s. Well, the case could be made that bad exegesis (and this, not simply ‘different’ exegesis, is the issue) deserves to be called out. In either case, it is inexcusable. It maligns godly students of the Bible (past and present)— men whom Creation has from time to time contemptuously called “gappists”. We don’t make judgments about godliness, lest we be weighed by the same measure with which we judge. But if godliness means ‘conforming with God’s desires for us,’ or ‘being like God’ in certain ways He has ordained, and if Jesus is God, doesn’t that mean that the godly person will have the same view of Genesis that Jesus (who is God) had? And Jesus took a straightforward view of Genesis, with no indication of gaps. See for example Jesus and the age of the world. These include many competent scholars of the inspired Hebrew and Greek texts, who were governed by the Word, not by any base and pragmatic desire to manipulate it to accommodate “long ages”. Please do not insult such men. Again, Dr Wieland’s article didn’t even mention individuals, let alone insult them. But competent exegesis is measured by the degree to which it brings out the actual meaning of the text. Any significant gap of time is excluded because it would require breaking up a single sentence in the Hebrew. The article referred to above focuses on the word “replenish” which occurs in Gen. 1:28 (KJV). The translation of the Hebrew word in today’s English should, I agree, be “fill”. That is not in dispute. Thanks, but this in our experience is the major argument by gappists. The real issue is whether or not “straightforward biblical exegesis” supports the conclusion that an unspecified lapse of time occurred between the original creation of the heavens and the earth (verse 1) and the “waste and empty” state of the earth described in verse 2, with a further time-gap before Elohim commanded light to be on day 1 of the 6 literal days (verse 3). And the answer to that is simply ‘no’, as laid out in that article, Refuting Compromise, and many of our articles. The first verse of the Bible stands majestically alone. Even its unique inspired structure of sevens in the original Hebrew confirms this (as has been often pointed out by Bible scholars since Ivan Panin’s research brought this to light). That heptadic structure does not extend into verse 2. I agree that the first verse of the Bible is majestic. But that has nothing to do with secret patterns that require Christians to ‘get out their magic decoder rings’. Our doctrines should be based on the propositional revelation in Scripture (i.e. facts about things), not on numerology. Verse 1 is not a summary of the ensuing 6 days as some CMI writers have claimed—even Henry Morris admits this: “Neither can verse 1 as a whole be considered a title or summary of the events described in the succeeding verses of the chapter” (H. M. Morris The Genesis Record p.42). The perfect tense of verse 1 marks it as the first verb of the historical narrative that follows. This is basic Hebrew grammar. Furthermore, ‘heavens and earth’ is a merism for all of creation; it means ‘everything’. God didn’t create everything on Day 1, therefore it must include a summarizing. It is surely obvious that verse 1 cannot possibly be a summary of the work of the 6 days because nowhere in the account of those days is there the slightest hint of God’s creating either heavens or earth, i.e. the planet. (The “firmament” or “heavens” of verses 6–8 clearly refers to the atmospheric heavens, not the sidereal heavens of verse 1). This is a stretch. The phrase “heavens and earth” is the typical way the Hebrew Bible authors described the totality of God’s creation, since they lacked a word for the universe. The work of each of the 6 days begins invariably with the words, “And God [Elohim] said”. Verse 1 has no such preface: “In the beginning God created the heavens and the earth.” The absence of the words “And God said” in verse 1 shows beyond reasonable doubt that the primal creation “at the beginning” stands apart from the work of the 6 days. Again, a stretch and an argument from silence. If your claim was “beyond reasonable doubt”, then why didn’t the Church Fathers and Reformers see it? A plain literal reading of Genesis 1 shows us in verse 3 that God spoke light into an already existing earth. Yes, something already existed—because He’d created it earlier that same day. But what existed was a mass of water, which became separated on Day 2. The ‘waters below’ became the earth, and the ‘waters above’ could be different things depending on which cosmology one prefers. It does not say that the heavens and the earth were created on that day. The only thing that God pronounced good on day 1 was light. This undeniable fact would be more than strange if He had created the whole universe on that day. That is straightforward Biblical exegesis. But after Day 6, God pronounced the entire creation “good”; this was the seventh time He had declared this, and seven is a biblical number of perfection. Furthermore, this seventh time was augmented by “very” (Genesis 1:31). This indicates that death, “the last enemy” (1 Corinthians 15:26), could not have been a part of it. This is the intractable problem with all long-age compromises. Much has been made in CMI literature of the Hebrew grammar of verse 2 (“was” versus “became”). Competent Hebrew scholars differ in their views of this. No, competent Hebrew scholars don’t. It’s not exactly rocket science. For one thing, the correct Hebrew grammar for “become” is “to be” “to”; there is no such preposition “to” to go with the verb “to be” in the Hebrew. Second, the grammar of verse 2, a vav-disjunctive, shows that it is a parenthetical statement describing the initial condition of the earth. H.C. Leupold renders this: And now, as far as the earth was concerned, it was waste and void … The Septuagint translators, c. 250 BC, saw it this way, because they rendered this passage: ἡ δὲ γῆ ἦν ἀόρατος καὶ ἀκατασκεύαστος (hē de gē ēn aoratos kai akataskeuastos), and δὲ (de) is often used as a transitional particle. A vav-consecutive, as in the next act, describes the next sequence of a historical narrative; it is just not there in v. 2. However, the evidence for a time-lapse between verses 1 and 2 (and between verses 2 and 3) does not rest on such arguments. It rests upon a plain and straightforward literal reading of the Word (literal hermeneutic). Once again, if this really is a plain (grammatical-historical) hermeneutic, which is presumably what you mean, then it’s strange that no one thought of it before the rise of long ages in ‘science’. We also think that a long time gap is a very non-literal use of the word ‘literal’ . God is light, and is a God of order. It would be wholly incongruous if the earth, fresh from the hand of the Creator by His Word was nothing but a waste and empty mass. You’re forgetting that He hadn’t finished yet—the creation week is about God creating and ordering His creation. Nothing in the text suggests a judgment. In fact, a straightforward reading of Isaiah 45:18 clearly shows that He did not create it in that condition. Henry Morris sought to reinterpret this verse by putting an audacious spin on it (H. Morris, ibid p.49). Please elaborate. God “created it to be inhabited”. This is why He proceeded to form and fill it! Such tactics only prove the fallacy of his argument. Job 38:7 tells us that the angels shouted for joy at the sight of the earth as first created-clearly they celebrated the pristine glory of the scene before them. They would have hardly rejoiced over a dark, waste and empty planet! Since we don’t have pipelines into the minds of angels as you apparently do, it makes it hard to argue. Otherwise we would point out that they likely knew of God’s plan to fill a formless and empty planet (not “waste”). The use of similar language (“waste and empty”) in the context of Divine judgment in Isaiah 24:1 and Jeremiah 4:23 suggests that the waste and empty condition of the earth was the result of a judicial act of God, They suggest nothing of the sort. In the Bible, a judgment was frequently a reversal of creation. E.g. the Flood took the world back to the condition at the beginning of day 3. The book of Revelation has “uncreation” themes as the earth is being destroyed. Thus Jeremiah 4:23 alludes to an uncreation back to the state in Genesis 1:2—the judgment would be so severe that it would leave the final state as empty as the earth before God created anything. very likely related to the fall of Satan (which Jesus saw before His incarnation-Luke 10:18). The devil sinned “from the beginning” (1 John 3:8). But as we argued in Jesus and the age of the world, a sin shortly after creation week, compared to the vast timescale of 4000 years of history before Christ, would be extremely close to the beginning—try drawing a timeline to scale even on the finest graph paper, and the Fall would be visually indistinguishable from the beginning. See also The Fall, Curse and Satan which shows how logical deduction from Scripture constrains the time range in which Satan could have fallen. He became the “prince of the power of the air” (which may account for the fact that God did not pronounce the work of day 2 specifically as good, a remarkable fact that CMI seems to have overlooked). No, we just don’t derive doctrine from arguments from silence, especially when such doctrine contradicts teachings deducible from propositions that Scripture does reveal. But here is another explanation, from Keil and Delitzsch1: … the division of the waters was not complete till the separation of the dry land from the water had taken place, and therefore the proper place for the expression of approval is at the close of the work of the third day.) There is a remarkable fact, which you might have overlooked, that “God saw that it was good” is said twice on Day 3. Keil and Delitzsch’s explanation makes more sense of this fact, which yours does not. Incidentally, some creationists and CMI writers have claimed that angels were created at some time during the 6 days, or even on day 1. Surely this “did not arise from any reading of the text”! It arose by logical deduction (see also Loving God with all your mind: logic and creation) from the facts that Exodus 20:8–11 teaches that all things were made during Creation Week, and that angels are created beings. Nothing of the sort is mentioned in Genesis 1 or anywhere else in the Bible. In fact, Job 38:7 clearly proves that angels were created before the founding of planet earth, which, as the foregoing references show, was prior to day 1 of the 6 days. Or it could have been on Day 1 before the earth was made. In fact, it could have been before Day 3, just before the dry land—also called “Earth”—appeared. A careful reading of Job 38:4–11 and Psalm 104:5–9 will throw light on Genesis 1. These passages show that the pre-Adamic inundation and the darkness were acts of God separate from, and subsequent to, the original creation. Yet these passages don’t say anything about happening in a gap between Genesis 1:1 and 1:2. Actually, these verse numbers are not inspired; perhaps if they hadn’t been inserted mid-sentence, the gap theory might not have arisen. It is a mistake to relate the verses from Psalm 104 to Noah’s flood, where the waters were not “rebuked” and did not “flee” but subsided gradually over about 9 months. This is a poetic account. How fast does “fleeing” need to be? All the same, even if Psalm 104 is not referring to the Flood, there is a far better candidate: the Day 3 separation of land and sea. It should be noted also that the heavens were not waste and empty. It would be anomalous if a perfect heavens and a waste and empty earth were the firstfruits of God’s creative acts. But not if this was only the beginning. That’s like saying that a rough sketch is anomalous for a master painter. But the painter goes on to paint on the canvas. The earth as described in verse 2 was obviously warmed by an external source of heat from the perfect heavens—otherwise the waters of the darkened deep would have been solid ice. Actually, a ball of water that big (remember, this is bigger than the earth, and in one creation cosmology is universe-sized) would be kept liquid by its own heat (remember, God created water, not ice, so it would have some intrinsic heat). The sphere would be kept liquid—the outside wouldn’t freeze because heat would escape to the surface, but it would take a very long time for enough heat to escape for it to freeze (water has very high specific heat and latent heat of fusion—see The Wonders of Water), so it would remain liquid for far longer than the 24 hours we need it to in our view. Also from day 1, the diurnal cycle began visibly, showing that the rotation of the earth in relation to an external light source existed before day 4. The Hebrew word translated “created” occurs only three times in Genesis 1-in verses 1, 21 and 27. Other words are used in Genesis 1 and 2: “make/made”, “formed”, “built” (in relation to Eve). Exodus 20:11 uses “made”, not “created”. CMI writers claim that these different words are synonymous and interchangeable, which, of course, their “anti-gap” stance obliges them to do. We never claimed that they were exact synonyms, but they have a considerable overlap in semantic range, as we have documented (using the lemma or basic form of the Hebrew verbs found in a lexicon): Genesis 2:4: “These are the generations of the heavens and of the earth when they were created (bara’ ברא) in the day that the Lord God made (‘asah עשה) the earth and the heavens.” Isaiah 43:7: “Everyone who is called by my name, whom I created (bara’ ברא) for my glory, whom I formed (yatsar יצר) and made (‘asah עשה).” We never said they were interchangeable in every context. If they meant exactly the same thing there would be no reason to have multiple terms. Even synonyms, such as ‘break’ and ‘fracture’ in English, are not identical—every English speaker knows that hearts break, they don’t fracture. These words are certainly not synonymous or interchangeable, either in Hebrew or in English. Each word in Scripture is precisely chosen by the Holy Spirit. We agree with plenary verbal inspiration. But we also advise against the exegetical fallacy that evangelical New Testament scholar Dr Don Carson called ‘Unwarranted semantic disjunction or restriction’, reading too much difference into words the Holy Spirit chose that overlap considerably in meaning. Genesis 2:3b illustrates very clearly that “create” and “make” are not used interchangeably. It reads (literally translated): “because on it He rested from all His work which God had created to make.” If “create” and “make” were synonymous, that verse would not make sense. To assert that these words are interchangeable is sloppy exegesis (if not eisegesis) and does despite to the verbal inspiration of Scripture. It’s a sloppy charge against us (i.e. a straw man fallacy), since we never said that. Rather, we said: “Gap theorists overstate the distinction between these words … As in English, there is considerable semantic overlap between ‘create’ and ‘make’. Sometimes asah is used to mean ‘create ex nihilo’, e.g. Nehemiah 9:6: “ ‘You alone are the Lord. You made (asah) the heavens, even the highest heavens, and all their starry host, the earth and all that is on it, the seas and all that is in them.’ ” One of the founders of the Brethren movement (renowned for uncompromising adherence to Scripture) wrote as follows from careful reading of the Hebrew text:“There is not a word in Scripture to warrant the strange and hasty assumption that the universe was brought into being in the six days of Gen. 1:3–31, so often referred to throughout the Bible.” He may well have stated this, but he is wrong, as Exodus 20:8–11 shows. He continues, “It is out of the power of any on just principles of interpretation to deny that the first day begins with light, and that the first two verses are marked off in their nature, as well as by their expression, from the work of the six days. Nothing indeed but prepossession can account for the mistake …” (William Kelly, “In the Beginning”). Kelly, like John Nelson Darby, was a very competent Hebrew and Greek scholar who produced translations (not paraphrases) of books of the Bible from the original languages, along with numerous in-depth commentaries on Scripture. You keep talking about ‘competent scholars’, but this is only argument from authority. But even competent Hebrew scholars have been known to be intimidated by “science”. Thus they rationalize away the clear meaning to fit with this ‘science’. The liberals don’t bother—instead, they argue that it means what the Church had always taught, but that it was just wrong. See Refuting Compromise ch. 3, as well as this review of Creation and Change. God said that He created in six days. That means everything in six days: “for in six days the LORD made the heavens and the earth, the sea, and all that is in them, but he rested on the seventh day. (Exodus 20:11). So if there’s something that’s created, like angels, which isn’t specifically mentioned in the creation account, we still know that it has to fit in the six days somewhere, because God said He created in six days. Please remember that the book of Genesis contains the most significant typological teaching in the whole of Scripture. Really? How do you make Genesis’s typology more important than Psalms’ or Isaiah’s? All the typological teaching is important. In terms of that typology, Genesis 1 presents a remarkably accurate delineation of God’s moral dealings with man through the Gospel. It pre-figures how God has worked, and will work in the future, in a scene of moral darkness, waste and emptiness into which man fell when Adam sinned, to bring about conditions in which He can rest. Yes, Adam fell into these things, in a previously good creation. If the creation already had earmarks of a cataclysmic judgement long before Adam, then this connection is undermined. The Spirit of God moves to convict people of their sins, acting with the Word to prepare the way for the light of the Gospel to shine in, leading to new birth, new creation in Christ, and fruitfulness. We fail to see how this supports your view over ours. Typology and history are not mutually exclusive. CMI’s interpretation of Genesis 1 destroys the typical significance of the first page of Scripture. We don’t think there is typology as such in the first chapter of Genesis. That doesn’t mean that there aren’t patterns that are meaningful for us—the six day week for example. Also, as post-Fall creatures, we look forward to the re-creation of the New Heavens and Earth (see also The future: some issues for ‘long-age’ Christians). But that isn’t typology. And as we have said, it is not just “CMI’s interpretation” but the interpretation held throughout most of Church history. Man was not created in a dark and fallen state as CMI’s thesis would force the type to suggest We don’t believe that, and are at a loss to understand how you could say so. Rather, you are the one who believes that Adam was created in a world already racked by a cataclysmic judgment. and thus, far from supporting the Gospel, it inadvertently undermines it. But maybe CMI would write off typology as irrelevant? Sad if that were so. We certainly don’t write off typology, but we don’t see it in every single verse either. Like parable, allegory, etc, it is present in Scripture, but not everywhere. The article which prompted this letter claims that the so-called “gap theory” has produced dire consequences. No proof is cited. This is simply scare-mongering. It is no such thing. As we have amply shown, all such long-age schemes are the result of making ‘science’ the authority over Scripture when it comes to Earth history. Liberals are just consistent compromisers! That is, they make ‘science’ the authority over the rest of Scripture including the Resurrection and Virginal Conception of Christ. After all, ‘science’ teaches that dead men don’t rise and virgins don’t conceive. The real issue is, “What does Scripture actually say?” It is. And if it reads how you claim it does, how come no one understood it this way, until the rise of uniformitarian science, and a perceived need to make the Bible fit? CMI writers are not exempt from reading their own ideas into Scripture, including highly speculative accounts of Noah’s flood and its aftermath, going far beyond (and in one or two cases contradicting) what the Bible actually portrays. Ipse dixit. We are actually very careful to differentiate biblical teaching (both explicit and logically deducible) and models we use to try to elucidate them. See for example Moving forward: Arguments we think creationists shouldn’t use, and Sarfati, J., Flood models and biblical realism, J. Creation 24(3):46–53, 2010. As indicated above, I value Creation’s excellent scientific articles debunking evolution, but in matters of theology I appeal to CMI to stick to the Word of God and desist from misrepresenting what the article in question sneeringly calls “the hoary old gap theory … which did not arise from any reading of the text”, thereby insulting many Bible expositors of evidently greater theological calibre than the author. This is debatable. And as we have shown, while there were great Bible expositors before the rise of uniformitarianism, none saw a long time gap in Genesis 1. P.S. The article to which my earlier e-mail refers points readers to The Answers Book. Unfortunately, the “answer” to the “Gap Theory” in that book is riddled with eisegesis (reading pre-suppositions into Scripture) and misrepresentation of the “gap” teaching. The following is from a paper that I wrote a few years ago on various creation issues: The “Gap” teaching misrepresented. Some anti-gap theorists have misrepresented the “gap” teaching to a greater or lesser degree and have then proceeded to shoot down the caricature they have thus conjured up. The following example of this unfair practice is derived from Fields Weston Fields, in Unformed and Unfilled, was responding to classical gap theorists, in particular Arthur Custance. We see nothing unfair, since he amply documented his claims. We no longer stock this book, but this is no reflection on its fine quality, just that it was very specialized so didn’t sell very well and was addressing a view with disappearing adherents. and quoted approvingly in the CMI Answers Book and in Creation magazine. “In the far-distant dateless past, God created a perfect heaven and perfect earth. Satan was ruler of the earth, which was peopled by a race of men without any souls. Eventually, Satan, who dwelled in a garden of Eden composed of minerals (Ezek. 28), rebelled by desiring to become like God (Isa. 14). Because of Satan’s fall, sin entered the universe and brought on the earth God’s judgment in the form of a flood (indicated by the water of Gen. 1:2), and then a global ice age when the light and heat from the sun were somehow removed. All the plant, animal and human fossils upon the earth today date from this ‘Lucifer’s flood’ and do not bear any genetic relationship with the plants, animals, and fossils living [sic] upon the earth today.” [Ham, Snelling & Wieland: The Answers Book, Australian Edition, 10th printing 1997, p.158]. It’s good to get the most up-to-date version of our books, especially when it’s a core resource and has been considerably expanded and updated in the intervening 14 years. But we have retained the Fields summary. The preposterous idea of a “race of men without any souls” is no part of traditional “gap” teaching. Pre-Adamites unfortunately is a logical deduction from gap theorizing. That is, the gap theory accommodates uniformitarian ‘ages’. Yet this same long-age ‘reasoning’ points to humans existing long before Adam (see The Fall: a cosmic catastrophe). Ergo, pre-Adamites. No wonder that a well-known gap proponent, Clarence Larken, said in Dispensational Truth (1920): “In the words ‘replenish the earth’ we have unmistakeable evidence that the earth had been peopled before it was thrown into a chaotic condition, and that its inhabitants in some way had been destroyed.” Note also his appeal to “replenish”, the point of the article in question. Nor is the assertion that all fossils date from the pre-Adamic flood of Gen. 1:2. Clearly, many fossils (including all human fossils) date from Noah’s flood (or later in some possible instances). All that shows is that Fields might have overstated his case a bit. Yet the classic gap proponent Scofield said in his famous Reference Bible: “The first creative act refers to the dateless past, and gives scope for all the geologic ages. … [Genesis 1:2] indicate the earth had undergone a cataclysmic change as the result of a divine judgment. The face of the earth bears everywhere the marks of such a catastrophe. … It was animal life that perished, the traces of which remain as fossils. Relegate fossils to the primitive creation, and no conflict of science with the Genesis cosmogony remains.” The impression is thus given that the fossils were the result of this pre–creation-week cataclysm, not Noah’s Flood, usually relegated to the silly idea of a local flood. Of course, Scofield was incredibly naïve that it would resolve the conflict. Secular geology assuredly doesn’t teach that a single catastrophe formed the bulk of the fossiliferous sedimentary layers. And many young people are not silly: they could work out that the gap theory was motivated by ‘science’, then learn at university that this dodge doesn’t work, so they wonder how much of the rest of the Bible can be trusted. But it could hardly be clearer that his motivation was “science” not exegesis. Nor is the notion of a pre-Adamic ice age a usual premise of the “gap” teaching. Genesis 1:2 speaks of waters, not ice. Agreed, yet again, the point is that gappists accept the uniformitarian timescale because of undue respect for ‘science’. This same ‘science’ teaches multiple ice ages. So naturally, the gap theorists relegate them to their imaginary gap. The passage cited above inserts some wild and aberrant ideas as though they were part of normal “gap” teaching. They are not. It is unfortunate that some creationists resort to such misrepresentations to discredit what they do not agree with. As shown, and as Fields documents, they were taught by leading gap theorists, and are hard to escape after the main premise of the gap theory is accepted. Lita Cosner and Jonathan Sarfati - Keil, C.F. and Delitzsch, F. Keil and Delitzsch Biblical Commentary on the Old Testament, www.kad.biblecommenter.com/genesis/1.htm Return to text.
<urn:uuid:f02e9111-fa3a-4ea8-9784-68290691bc28>
CC-MAIN-2018-17
https://creation.com/gap-theory-revisited
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125944479.27/warc/CC-MAIN-20180420155332-20180420175332-00627.warc.gz
en
0.958767
7,622
2.625
3
2.975381
3
Strong reasoning
Religion
Parashat ha-Shavua פָּרָשַׁת הַשָּׁבוּעַ And Jacob blessed Pharaoh (Genesis 47:1) ויברך יעקב את פרעה (בראשית מז:י) Following the fateful meeting between Jacob, Joseph’s father and the King of Egypt, we read that Jacob blessed the king before departing. What blessing did the forefather offer the Egyptian monarch? The Midrash offers three suggestions: “Said Rabbi Yehoshua ben Korchah: [He blessed him that] ‘Your years should be greater than mine’; Rabbi Shimon ben Yochai suggested that [he blessed him that] the Nile should rise on my account and sustain the entirety of Egypt. Another opinion is that he blessed him by halting the final five years of famine.” One can view these three suggestions as three elements of a single theme: in a nation ravaged by famine, the most important blessing that Jacob can offer is water—that the Nile should rise and water a famished countryside. This would, of course, end the famine— which would in turn give the Pharaoh the national stability that would ensure him both a long reign, and a long life. As far back as Jacob’s time, the steady supply of water represented a critical aspect of national and international stability. Last month, Israel announced that it will soon begin laying a new pipeline that will double the water supply Israel provides to Jordan, Globes reported. “The new, 5.5 km Kinneret-Beit Shean pipeline will pass mainly through Jordan Valley agricultural areas and will provide the Hashemite kingdom with up to 100 million cubic meters of water per year, compared with 50 million cubic meters at present. The laying of the new pipeline is of critical importance for Jordan. Due to the ongoing civil war in Syria, millions of refugees have flocked to Jordan, resulting in a real water crisis which has made the need to increase water supply more vital than ever.” In exchange, Israel will receive water from the Jordanian desalination plant to be established in Aqaba. Additionally, Jordan recently chose the five firms that will build the first phase of a multi-million-dollar canal linking the Red Sea to the shrinking Dead Sea, following the historic 2015 water treaty between Israel, Jordan and the Palestinian Authority. As water grows increasingly scarce not only in the Middle East, but around the world, Israel’s water technologies will play a critical role in regional and global stability. Moreover, Israel’s desire and willingness to share not only its know-how, but its water resources, represent an important anchor of stability and a force for peace in very volatile region. Shabbat Shalom
<urn:uuid:acf9ee61-eecf-4a72-962f-f7c4987264c3>
CC-MAIN-2020-16
http://templeisrael-valdosta.org/stabilizing-the-world-with-water/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370500426.22/warc/CC-MAIN-20200331084941-20200331114941-00289.warc.gz
en
0.931803
602
2.921875
3
2.88109
3
Strong reasoning
Religion
Springfield Primary School is a local authority school in Sale, Trafford. Located close to the town centre, the original building was constructed in 1905, but had become unfit for purpose and was unable to accommodate the number of students wishing to attend. The new build extension included the addition of junior classrooms,group rooms, staff rooms and offices, a plant room and a learning resource centre. As a non-designated heritage asset, the original period features of the traditional school were maintained, including octagonal chimneys and terracotta entrance portals. Sandy Brown was appointed by Kier Construction to provide acoustic advice in relation to the proposed new build extension at Springfield Primary School, which included providing guidance on: - environmental noise and façade assessment planning - room acoustics - reverberation times - sound insulation and separating elements - acoustic finishes - building services noise and vibration. Special acoustic features There have been many studies that highlight the association between higher noise levels in schools and lower academic performance. Poor acoustics also lead increased amounts of stress for both teachers and children. Yet, in modern learning spaces the design preference for hard materials and a desire for flexible, open plan learning spaces create a louder environment. In designing schools, therefore, a number of acoustic factors need to be taken into consideration. These include: - noise ingress from outside - building services noise - reverberation time - noise transmission between rooms - areas used for particular activities, such as music, drama or sports. For the proposed development at Springfield Primary each of these was considered in line with relevant standards and design guidelines, including: - Building Bulletin 93: Acoustic design of schools – a design guide (2003) - Building Bulletin 101: Ventilation of school buildings – Standards, Regulation, Design guidance - BS 8233:1999 Sound insulation and noise reduction for buildings – code of practice - BS4142 Method for rating industrial noise affecting mixed residential and industrial areas. Ambient noise surveys were conducted to determine external noise conditions and inform the advice for design of the building envelope. This included consideration of the glazing and lightweight roof construction that are a feature of the extension’s design and how these could be incorporated while achieving appropriate background noise within the building. In certain areas required linkages between spaces meant that BB93 standards of sound insulation would not be appropriate. Alternative acoustic design standards were therefore proposed and agreed with the client and end user. One of these areas was the learning resource centre’s break-out area which was accessed directly from classrooms, offices and the school’s reception. Working with the end user enabled the use of the space to be defined and alternative performance standards developed. By providing clear design specifications and liaising with the project stakeholders on all aspects of noise and vibration control, problems in relation to acoustics were ameliorated at an early stage.
<urn:uuid:15881f31-dd8a-4533-8455-21caac079156>
CC-MAIN-2017-34
http://www.sandybrown.com/case-study/springfield-primary-school-sale/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886123312.44/warc/CC-MAIN-20170823171414-20170823191414-00346.warc.gz
en
0.953579
594
2.6875
3
2.835459
3
Strong reasoning
Industrial
Home remedies rarely get scientific attention or respect. The lack of double-blind trials means that it can be difficult to determine whether a specific suggestion will be helpful. Sometimes we get enough testimonials about a remedy, though, that we conclude it may be worth investigating. One of these is a slightly odd recipe purported to lower high blood pressure. Several years ago, a reader asked us the following question: “Have you ever heard of this remedy for high blood pressure? Wash but don’t peel a medium eggplant. Dice it into 1-inch cubes. “Place the cubes in a glass gallon jug and cover the eggplant with distilled water. Put the jug in the fridge for four days. “Drink one ounce of the water per day, taking your blood pressure daily. After a week or so, the eggplant will begin to disintegrate; discard the cubes but keep drinking the ounce of water daily. “Be sure to check your blood pressure, as it may begin to drop dramatically. Once your blood pressure is at a good level, you will need to experiment to determine how often to drink the eggplant water. It may be every other day or less often.” At first we were skeptical. How could eggplant water do anything? But a search of the medical literature revealed that there just might be something to this remedy after all. Researchers have discovered that eggplants contain ingredients that affect ACE (angiotensin converting enzyme). This is the same enzyme blocked by popular blood pressure drugs such as captopril, lisinopril and ramipril (Bioresource Technology, May 2008). So far as we know, there are no clinical trials testing the power of eggplant water to bring blood pressure under control. But we have heard from a number of readers who have done their own personal experiments. Leni shared the following story: “This is an ancient remedy used in my country of origin (Cuba). I’ve known about it since childhood, as I would hear the adults talk about it. I have a friend who lowered her blood pressure by drinking eggplant water. “I had totally forgotten about this natural way to control hypertension, cholesterol and triglycerides, as well as excess body weight and fat. I’ve seen it with my own eyes. “I’m glad I remembered it because I will start drinking this water every day. My people drink it as you would regular water, throughout the day. In other words, you can drink most or all of your daily water intake in the form of eggplant water. It’s also a natural diuretic. You’ll see how well you will feel.” Not everyone has found this remedy helpful: “I tried this, but it didn’t lower my blood pressure. I drank at least a cup a day for three weeks, and there wasn’t any change at all in my pressure.” We include many other nondrug approaches to getting blood pressure down to normal in our Guide to Blood Pressure Treatment. Anyone who would like a copy, please send $3 in check or money order with a long (No. 10), stamped (66 cents), self-addressed envelope to: Graedons’ People’s Pharmacy, No. B-67, P.O. Box 52027, Durham, NC 27717-2027. It also can be downloaded for $2 from our website: www.peoplespharmacy.com. Q: A few months ago, a gentleman wrote to you about having an increase in libido after using beet root juice. You told him that the beet root juice had much the same effect as if he were taking Cialis or Viagra: The juice allowed more blood to flow to the penis, enabling him to have better erections. I am 81 years old, and my wife is 77 years old. We are still very amorous with each other and enjoy “petting.” We would like to go further, but I have a problem maintaining a firm erection, so it is not possible. The cost of Viagra means it’s not a viable option. I would like to try beet root juice to see if it might improve the quality of our lives. My medications include simvastatin, levothyroxine and aspirin. I don’t know if they could cause some adverse sexual effects. Answer: A surprising number of studies (16) have shown that beet root juice lowers blood pressure (Journal of Nutrition, June 2013). By stimulating the production of nitric oxide in blood vessels, this natural compound helps blood vessels relax and improves circulation. Erectile-dysfunction (ED) drugs such as Cialis, Levitra and Viagra also work by stimulating nitric oxide production and improving blood flow to the penis. Beet root juice has not been studied as a way to treat ED. Erectile dysfunction has been reported as a side effect of statin-type cholesterol-lowering drugs such as simvastatin. Although the causal connection is controversial, such drugs do appear to lower testosterone levels (Journal of Sexual Medicine, April 2010). Q: I think I have worn out several remote controls hitting the mute button on many loud drug commercials. But I have to say I am alive today because of hearing them. I was given a new blood pressure medicine. Within an hour of taking the pill, it was affecting my speech. I called the pharmacy to see if it could be the drug and was told to call 911 immediately. I could not finish talking to the 911 operator since I was gasping for air as my throat was closing down. If it had not been for continually hearing long lists of side effects recited on the commercials, I might have waited too long to make that call. A. Thank you for sharing your scary experience. We all can use the reminder that drugs may have serious side effects that need emergency action. Certain blood pressure medicines (ACE inhibitors such as captopril, lisinopril and ramipril, for example) can cause a sudden serious swelling of lips, tongue and throat. This angioedema requires immediate medical attention. In their column, Joe and Teresa Graedon answer letters from readers. Write to them via their Web site, www.PeoplesPharmacy.com.
<urn:uuid:ed7d7cea-3cd3-4f3d-90dc-9dcdfe774684>
CC-MAIN-2015-48
http://www2.tbo.com/health/eggplant-stars-in-improbable-blood-pressure-remedy-20130928/
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398455135.96/warc/CC-MAIN-20151124205415-00215-ip-10-71-132-137.ec2.internal.warc.gz
en
0.959995
1,330
2.75
3
2.785113
3
Strong reasoning
Health
Modern mangroves are among the most carbon-rich biomes on Earth, but their long-term (≥106 years) impact on the global carbon cycle is unknown. The extent, productivity and preservation of mangroves are controlled by the interplay of tectonics, global sea level and sedimentation, including tide, wave and fluvial processes. The impact of these processes on mangrove-bearing successions in the Oligo-Miocene of the South China Sea (SCS) is evaluated herein. Palaeogeographic reconstructions, palaeotidal modelling and facies analysis suggest that elevated tidal range and bed shear stress optimized mangrove development along tide-influenced tropical coastlines. Preservation of mangrove organic carbon (OC) was promoted by high tectonic subsidence and fluvial sediment supply. Lithospheric storage of OC in peripheral SCS basins potentially exceeded 4,000 Gt (equivalent to 2,000 p.p.m. of atmospheric CO2). These results highlight the crucial impact of tectonic and oceanographic processes on mangrove OC sequestration within the global carbon cycle on geological timescales. Oil palm, a plantation crop of major economic importance in Southeast Asia, is the predominant source of edible oil worldwide. We report the identification of the virescens (VIR) gene, which controls fruit exocarp colour and is an indicator of ripeness. VIR is a R2R3-MYB transcription factor with homology to Lilium LhMYB12 and similarity to Arabidopsis production of anthocyanin pigment1 (PAP1). We identify five independent mutant alleles of VIR in over 400 accessions from sub-Saharan Africa that account for the dominant-negative virescens phenotype. Each mutation results in premature termination of the carboxy-terminal domain of VIR, resembling McClintock's C1-I allele in maize. The abundance of alleles likely reflects cultural practices, by which fruits were venerated for magical and medicinal properties. The identification of VIR will allow selection of the trait at the seed or early-nursery stage, 3-6 years before fruits are produced, greatly advancing introgression into elite breeding material. River outgassing has proven to be an integral part of the carbon cycle. In Southeast Asia, river outgassing quantities are uncertain due to lack of measured data. Here we investigate six rivers in Indonesia and Malaysia, during five expeditions. CO2 fluxes from Southeast Asian rivers amount to 66.9 ± 15.7 Tg C per year, of which Indonesia releases 53.9 ± 12.4 Tg C per year. Malaysian rivers emit 6.2 ± 1.6 Tg C per year. These moderate values show that Southeast Asia is not the river outgassing hotspot as would be expected from the carbon-enriched peat soils. This is due to the relatively short residence time of dissolved organic carbon (DOC) in the river, as the peatlands, being the primary source of DOC, are located near the coast. Limitation of bacterial production, due to low pH, oxygen depletion or the refractory nature of DOC, potentially also contributes to moderate CO2 fluxes as this decelerates decomposition. Coral reefs can provide significant coastal protection benefits to people and property. Here we show that the annual expected damages from flooding would double, and costs from frequent storms would triple without reefs. For 100-year storm events, flood damages would increase by 91% to $US 272 billion without reefs. The countries with the most to gain from reef management are Indonesia, Philippines, Malaysia, Mexico, and Cuba; annual expected flood savings exceed $400 M for each of these nations. Sea-level rise will increase flood risk, but substantial impacts could happen from reef loss alone without better near-term management. We provide a global, process-based valuation of an ecosystem service across an entire marine biome at (sub)national levels. These spatially explicit benefits inform critical risk and environmental management decisions, and the expected benefits can be directly considered by governments (e.g., national accounts, recovery plans) and businesses (e.g., insurance). Understanding fluid dynamics under extreme confinement, where device and intrinsic fluid length scales become comparable, is essential to successfully develop the coming generations of fluidic devices. Here we report measurements of advancing fluid fronts in such a regime, which we dub superconfinement. We find that the strong coupling between contact-line friction and geometric confinement gives rise to a new stability regime where the maximum speed for a stable moving front exhibits a distinctive response to changes in the bounding geometry. Unstable fronts develop into drop-emitting jets controlled by thermal fluctuations. Numerical simulations reveal that the dynamics in superconfined systems is dominated by interfacial forces. Henceforth, we present a theory that quantifies our experiments in terms of the relevant interfacial length scale, which in our system is the intrinsic contact-line slip length. Our findings show that length-scale overlap can be used as a new fluid-control mechanism in strongly confined systems. The small ubiquitin-like modifier (SUMO) is implicated in various cellular activities, including transcriptional regulation. We previously showed that the yeast activator Gcn4 becomes sumoylated during activation, facilitating its eventual promoter eviction and transcriptional shut off. Here we show that the corepressor Tup1 is sumoylated, at two specific lysines, under various stress conditions. Mutation of these sites has no effect on Tup1 recruitment or RNAP II promoter occupancy immediately following induction. However, Tup1 levels subsequently decrease, while RNAP II and transcription increase in Tup1 mutant cells. Consistent with this, a Tup1 mutant displaying increased sumoylation led to reduced transcription. We also show that coordinated sumoylation of Gcn4 and Tup1 enhances Gcn4 promoter eviction and that multiple Tup1-interacting proteins become sumoylated after stress. Together, our studies provide evidence that coordinated sumoylation of Gcn4, Tup1 and likely other factors dampens activated transcription by stabilizing Tup1 binding and stimulating Gcn4 and RNAP II removal. The continuing development of improved capture-recapture (CR) modeling techniques used to study apex predators has also limited robust temporal and cross-site analyses due to different methods employed. We develop an approach to standardize older non-spatial CR and newer spatial CR density estimates and examine trends for critically endangered Sumatran tigers (Panthera tigris sumatrae) using a meta-regression of 17 existing densities and new estimates from our own fieldwork. We find that tiger densities were 47% higher in primary versus degraded forests and, unexpectedly, increased 4.9% per yr from 1996 to 2014, likely indicating a recovery from earlier poaching. However, while tiger numbers may have temporarily risen, the total potential island-wide population declined by 16.6% from 2000 to 2012 due to forest loss and degradation and subpopulations are significantly more fragmented. Thus, despite increasing densities in smaller parks, we conclude that there are only two robust populations left with >30 breeding females, indicating Sumatran tigers still face a high risk of extinction unless deforestation can be controlled. Less than half of anthropogenic carbon dioxide emissions remain in the atmosphere. While carbon balance models imply large carbon uptake in tropical forests, direct on-the-ground observations are still lacking in Southeast Asia. Here, using long-term plot monitoring records of up to half a century, we find that intact forests in Borneo gained 0.43 Mg C ha-1 per year (95% CI 0.14-0.72, mean period 1988-2010) above-ground live biomass. These results closely match those from African and Amazonian plot networks, suggesting that the world's remaining intact tropical forests are now en masse out-of-equilibrium. Although both pan-tropical and long-term, the sink in remaining intact forests appears vulnerable to climate and land use changes. Across Borneo the 1997-1998 El Niño drought temporarily halted the carbon sink by increasing tree mortality, while fragmentation persistently offset the sink and turned many edge-affected forests into a carbon source to the atmosphere. Invertebrates are dominant species in primary tropical rainforests, where their abundance and diversity contributes to the functioning and resilience of these globally important ecosystems. However, more than one-third of tropical forests have been logged, with dramatic impacts on rainforest biodiversity that may disrupt key ecosystem processes. We find that the contribution of invertebrates to three ecosystem processes operating at three trophic levels (litter decomposition, seed predation and removal, and invertebrate predation) is reduced by up to one-half following logging. These changes are associated with decreased abundance of key functional groups of termites, ants, beetles and earthworms, and an increase in the abundance of small mammals, amphibians and insectivorous birds in logged relative to primary forest. Our results suggest that ecosystem processes themselves have considerable resilience to logging, but the consistent decline of invertebrate functional importance is indicative of a human-induced shift in how these ecological processes operate in tropical rainforests. Multi-layer structure of functional materials often involves the integration of different crystalline phases. The film growth orientation thus frequently exhibits a transformation, owing to multiple possibilities caused by incompatible in-plane structural symmetry. Nevertheless, the detailed mechanism of the transformation has not yet been fully explored. Here we thoroughly probe the heteroepitaxially grown hexagonal zinc oxide (ZnO) films on cubic (001)-magnesium oxide (MgO) substrates using advanced scanning transition electron microscopy, X-ray diffraction and first principles calculations, revealing two distinct interface models of (001) ZnO/(001) MgO and (100) ZnO/(001) MgO. We have found that the structure alternatives are controlled thermodynamically by the nucleation, while kinetically by the enhanced Zn adsorption and O diffusion upon the phase transformation. This work not only provides a guideline for the interface fabrication with distinct crystalline phases but also shows how polar and non-polar hexagonal ZnO films might be manipulated on the same cubic substrate. Common variants in 94 loci have been associated with breast cancer including 15 loci with genome-wide significant associations (P<5 × 10(-8)) with oestrogen receptor (ER)-negative breast cancer and BRCA1-associated breast cancer risk. In this study, to identify new ER-negative susceptibility loci, we performed a meta-analysis of 11 genome-wide association studies (GWAS) consisting of 4,939 ER-negative cases and 14,352 controls, combined with 7,333 ER-negative cases and 42,468 controls and 15,252 BRCA1 mutation carriers genotyped on the iCOGS array. We identify four previously unidentified loci including two loci at 13q22 near KLF5, a 2p23.2 locus near WDR43 and a 2q33 locus near PPIL3 that display genome-wide significant associations with ER-negative breast cancer. In addition, 19 known breast cancer risk loci have genome-wide significant associations and 40 had moderate associations (P<0.05) with ER-negative disease. Using functional and eQTL studies we implicate TRMT61B and WDR43 at 2p23.2 and PPIL3 at 2q33 in ER-negative breast cancer aetiology. All ER-negative loci combined account for ∼11% of familial relative risk for ER-negative disease and may contribute to improved ER-negative and BRCA1 breast cancer risk prediction. Woody (lignocellulosic) plant biomass is an abundant renewable feedstock, rich in polysaccharides that are bound into an insoluble fiber composite with lignin. Marine crustacean woodborers of the genus Limnoria are among the few animals that can survive on a diet of this recalcitrant material without relying on gut resident microbiota. Analysis of fecal pellets revealed that Limnoria targets hexose-containing polysaccharides (mainly cellulose, and also glucomannans), corresponding with the abundance of cellulases in their digestive system, but xylans and lignin are largely unconsumed. We show that the limnoriid respiratory protein, hemocyanin, is abundant in the hindgut where wood is digested, that incubation of wood with hemocyanin markedly enhances its digestibility by cellulases, and that it modifies lignin. We propose that this activity of hemocyanins is instrumental to the ability of Limnoria to feed on wood in the absence of gut symbionts. These findings may hold potential for innovations in lignocellulose biorefining. Satellite imagery reveals flowstripes on Foundation Ice Stream parallel to ice flow, and meandering features on the ice-shelf that cross-cut ice flow and are thought to be formed by water exiting a well-organised subglacial system. Here, ice-penetrating radar data show flow-parallel hard-bed landforms beneath the grounded ice, and channels incised upwards into the ice shelf beneath meandering surface channels. As the ice transitions to flotation, the ice shelf incorporates a corrugation resulting from the landforms. Radar reveals the presence of subglacial water alongside the landforms, indicating a well-organised drainage system in which water exits the ice sheet as a point source, mixes with cavity water and incises upwards into a corrugation peak, accentuating the corrugation downstream. Hard-bedded landforms influence both subglacial hydrology and ice-shelf structure and, as they are known to be widespread on formerly glaciated terrain, their influence on the ice-sheet-shelf transition could be more widespread than thought previously. Antimicrobial resistance (AMR) is a serious threat to global public health, but obtaining representative data on AMR for healthy human populations is difficult. Here, we use metagenomic analysis of untreated sewage to characterize the bacterial resistome from 79 sites in 60 countries. We find systematic differences in abundance and diversity of AMR genes between Europe/North-America/Oceania and Africa/Asia/South-America. Antimicrobial use data and bacterial taxonomy only explains a minor part of the AMR variation that we observe. We find no evidence for cross-selection between antimicrobial classes, or for effect of air travel between sites. However, AMR gene abundance strongly correlates with socio-economic, health and environmental factors, which we use to predict AMR gene abundances in all countries in the world. Our findings suggest that global AMR gene diversity and abundance vary by region, and that improving sanitation and health could potentially limit the global burden of AMR. We propose metagenomic analysis of sewage as an ethically acceptable and economically feasible approach for continuous global surveillance and prediction of AMR. Comparative whole-genome sequencing enables the identification of specific mutations during adaptation of bacteria to new environments and allelic replacement can establish their causality. However, the mechanisms of action are hard to decipher and little has been achieved for epistatic mutations, especially at the metabolic level. Here we show that a strain of Escherichia coli carrying mutations in the rpoC and glpK genes, derived from adaptation in glycerol, uses two distinct metabolic strategies to gain growth advantage. A 27-bp deletion in the rpoC gene first increases metabolic efficiency. Then, a point mutation in the glpK gene promotes growth by improving glycerol utilization but results in increased carbon wasting as overflow metabolism. In a strain carrying both mutations, these contrasting carbon/energy saving and wasting mechanisms work together to give an 89% increase in growth rate. This study provides insight into metabolic reprogramming during adaptive laboratory evolution for fast cellular growth. Chromosome 8q24 is a susceptibility locus for multiple cancers, including prostate cancer. Here we combine genetic data across the 8q24 susceptibility region from 71,535 prostate cancer cases and 52,935 controls of European ancestry to define the overall contribution of germline variation at 8q24 to prostate cancer risk. We identify 12 independent risk signals for prostate cancer (p The incidence of Plasmodium vivax infection has declined markedly in Malaysia over the past decade despite evidence of high-grade chloroquine resistance. Here we investigate the genetic changes in a P. vivax population approaching elimination in 51 isolates from Sabah, Malaysia and compare these with data from 104 isolates from Thailand and 104 isolates from Indonesia. Sabah displays extensive population structure, mirroring that previously seen with the emergence of artemisinin-resistant P. falciparum founder populations in Cambodia. Fifty-four percent of the Sabah isolates have identical genomes, consistent with a rapid clonal expansion. Across Sabah, there is a high prevalence of loci known to be associated with antimalarial drug resistance. Measures of differentiation between the three countries reveal several gene regions under putative selection in Sabah. Our findings highlight important factors pertinent to parasite resurgence and molecular cues that can be used to monitor low-endemic populations at the end stages of P. vivax elimination. In 2020, 146,063 deaths due to pancreatic cancer are estimated to occur in Europe and the United States combined. To identify common susceptibility alleles, we performed the largest pancreatic cancer GWAS to date, including 9040 patients and 12,496 controls of European ancestry from the Pancreatic Cancer Cohort Consortium (PanScan) and the Pancreatic Cancer Case-Control Consortium (PanC4). Here, we find significant evidence of a novel association at rs78417682 (7p12/TNS3, P = 4.35 × 10-8). Replication of 10 promising signals in up to 2737 patients and 4752 controls from the PANcreatic Disease ReseArch (PANDoRA) consortium yields new genome-wide significant loci: rs13303010 at 1p36.33 (NOC2L, P = 8.36 × 10-14), rs2941471 at 8q21.11 (HNF4G, P = 6.60 × 10-10), rs4795218 at 17q12 (HNF1B, P = 1.32 × 10-8), and rs1517037 at 18q21.32 (GRP, P = 3.28 × 10-8). rs78417682 is not statistically significantly associated with pancreatic cancer in PANDoRA. Expression quantitative trait locus analysis in three independent pancreatic data sets provides molecular support of NOC2L as a pancreatic cancer susceptibility gene. A locus at 19p13 is associated with breast cancer (BC) and ovarian cancer (OC) risk. Here we analyse 438 SNPs in this region in 46,451 BC and 15,438 OC cases, 15,252 BRCA1 mutation carriers and 73,444 controls and identify 13 candidate causal SNPs associated with serous OC (P=9.2 × 10(-20)), ER-negative BC (P=1.1 × 10(-13)), BRCA1-associated BC (P=7.7 × 10(-16)) and triple negative BC (P-diff=2 × 10(-5)). Genotype-gene expression associations are identified for candidate target genes ANKLE1 (P=2 × 10(-3)) and ABHD8 (P<2 × 10(-3)). Chromosome conformation capture identifies interactions between four candidate SNPs and ABHD8, and luciferase assays indicate six risk alleles increased transactivation of the ADHD8 promoter. Targeted deletion of a region containing risk SNP rs56069439 in a putative enhancer induces ANKLE1 downregulation; and mRNA stability assays indicate functional effects for an ANKLE1 3'-UTR SNP. Altogether, these data suggest that multiple SNPs at 19p13 regulate ABHD8 and perhaps ANKLE1 expression, and indicate common mechanisms underlying breast and ovarian cancer risk. Prostate cancer is a polygenic disease with a large heritable component. A number of common, low-penetrance prostate cancer risk loci have been identified through GWAS. Here we apply the Bayesian multivariate variable selection algorithm JAM to fine-map 84 prostate cancer susceptibility loci, using summary data from a large European ancestry meta-analysis. We observe evidence for multiple independent signals at 12 regions and 99 risk signals overall. Only 15 original GWAS tag SNPs remain among the catalogue of candidate variants identified; the remainder are replaced by more likely candidates. Biological annotation of our credible set of variants indicates significant enrichment within promoter and enhancer elements, and transcription factor-binding sites, including AR, ERG and FOXA1. In 40 regions at least one variant is colocalised with an eQTL in prostate cancer tissue. The refined set of candidate variants substantially increase the proportion of familial relative risk explained by these known susceptibility regions, which highlights the importance of fine-mapping studies and has implications for clinical risk profiling.
<urn:uuid:98208811-76c9-4b0a-887e-3c7ffb4eb098>
CC-MAIN-2019-13
http://mymedr.afpm.org.my/search?page=1&q=journal_name.exact%3A%28%22Nature+communications%22%29&qid=a133ba403f&sort=title+desc
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203991.44/warc/CC-MAIN-20190325133117-20190325155117-00499.warc.gz
en
0.91233
4,417
2.65625
3
3.002643
3
Strong reasoning
Science & Tech.
Congratulations on Pakistan Independence Day – celebrating the young state and an old culture! It is a day when all Pakistanis should feel proud and confident about the land and the people, the unity and diversity of the past and the present, looking forward to a bright future. As a matter of fact, Pakistanis are doing well and live mostly peacefully together, often in spite of difficulties and material shortages in many fields. Most of Pakistan’s sunny days are yet to come. What else would we expect in a land of kind and clever people, of strong believers, of farmers and practical businessmen and women, of young people full of innovative ideas and energy! The term nation-building means that we must focus more on what is positive and can unite everyone, and that also means that sub-groups and minorities must be given space and encouragement because there is strength in diversity and divergence of opinions. A healthy democracy must accept the richness of diversity as part of the glue that binds all people in the country together. Independence Day is held to commemorating the birth of Pakistan on14/15 August 1947 when the British Empire had to let go of it crown colony of India. The independent Muslim state of Pakistan was created to include East Pakistan, presently Bangladesh, and West Pakistan, which is today’s Pakistan, needless to say. Pakistan is a large country with a population of close to 200 million people, ranking the world’s sixth most populous one. The green colour in the flag, with the new moon and the star symbolizes the Muslim basis; yet, the white section in the flag symbolizes the religious minorities, the Christians, Hindus and others. Following the difficult independence struggle, many Muslims left the territory of today’s India to settle in Pakistan. However, most Muslims could not move and remained where they lived; hence, today, the Muslim population in India is almost as large as that of Pakistan. The largest Muslim country in the world is Indonesia, followed by Pakistan, India and Bangladesh. Two thirds of the world’s Muslims live in South and South East Asia; twenty percent live in Arab countries. But Islam stretches wider, to include Iran, the Middle East, Turkey, Egypt and other countries in North and Central Africa. There are more Muslims in China than in Lebanon; and more in the United Kingdom than in Syria. Due to recent migration, there are today large groups of Muslims in Europe and North America, although as percentages of the total populations the Muslims are relatively few. France has the highest percentage in Europe but less than a tenth; in my home country Norway, there are about three percent, with the Pakistani immigrants forming the single largest group. Religion was important when Pakistan was created, and it remains important today in defining the land. The full name of the country is the Islamic Republic of Pakistan, which in Urdu and Persian means the ‘land of the pure’. But the role of religion mustn’t be made more important than it was meant to be. It must be realized that Pakistan is a diverse country ethnically, linguistically and in other ways, with a federal government uniting the four provinces, the federally administered tribal and northern areas of FATA and FANA, and the Pakistani administered part Kashmir. It has the fourth largest standing army in the world, and has fought three wars with India, its larger neighbour to the east, with which it shares colonial history. Pakistan is the only Muslim country with nuclear-weapons. In foreign politics it cooperates closely with its neighbours, including China, and that linkage is likely to grow closer; and it also cooperates with the West, especially the United States of America in the current time of ‘war on terror’. Pakistan is also a founding member of the Organization of the Islamic Conference (OIC). Pakistan is a developing country, with a GDP per capital of some USD 3,100 per capita. The economic growth rate is lower than that of many other countries and it has high inflation. Pakistan has a high population growth rate. The textile industry is essential to Pakistan’s economy and it has the third largest spinning capacity is Asia. Agriculture and horticulture are essential to employment and earn foreign currency from export. Some 7 million Pakistanis work abroad or have immigrated to other countries, and the money they send home is valuable to the country’s economy. Pakistan has made its mark in sports, culture, fashion and many other fields. In mountaineering, it is currently Samina Baig and her brother Mirza Ali who make headlines after having climbed Mount Everest in May 2013, and in July 2014, they could celebrate that they had reached the summits if the seven highest peaks on seven continents. Pakistan has in the last decade done well in higher education, but performs poorly in primary education for all. One may suggest that Pakistanis are good traders and managers, but less experienced in many scientific fields. The civil service has many excellent staff and departments, and is better than popular local and foreign opinions have it, yet, corruption is also a problem. Politically, the country has suffered from a dominant role of the military, which in principle should have no role in politics. The democratic tradition and culture are yet to develop, at all levels from top to bottom in society, including at local government levels and in institutions. I would like to emphasize that there is a need for developing systems and procedures for how to debate political issues, and that also includes finding ways for how to proceed when there is disagreement, and how to express alternative and opposing views. I find the current ‘public demagogues’ of Imran Khan and Dr. Tahir ul Qadri to go outside acceptable forms of how to organize debates, especially when it happens on or about 14 August, a time which should be a neutral celebration when all ‘swords or words are be kept in their holsters’. Obviously, I also find it wrong to use violence to settle other moral, cultural, religious and other disagreements. We may not agree with each other all the time; indeed we shouldn’t if we live in dynamic societies. But we must find ways of living together in the new multi-cultural, multi-political, multi-ideological, multi-religious and diverse world and time. We must give room, space and encouragement to all, even those we disagree with. That is actually the way most Pakistanis are at bottom of their heart. Let us express that in public, too, more often than we do, not only today on this year’s Independence Day, but every day. Then we would truly contribute to peaceful nation-building. n The writer is a senior Norwegian social scientist with experience from university, diplomacy and development aid.
<urn:uuid:b170630b-c637-4a3f-acde-20c13e961c89>
CC-MAIN-2015-27
http://nation.com.pk/national/14-Aug-2014/14-august-and-nation-building
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096208.17/warc/CC-MAIN-20150627031816-00262-ip-10-179-60-89.ec2.internal.warc.gz
en
0.965098
1,383
2.8125
3
2.852314
3
Strong reasoning
Politics
Learning how students can best learn is the strongest teaching tool for educators, says an expert in educational studies. “Teaching isn’t just a set of methodologies,’’ said Steven Katz, a cognitive psychologist and researcher with the Ontario Institute for Studies in Education at the University of Toronto. “It’s not just having a set of rules and routines and motions that we go through and then we just assume that learning will be a natural consequence. We actually start off with an understanding of the learning, of where kids are at, of what they can and can’t do. And the nature of what teaching means very much is as response to what we can understand about the learning.’’ Katz told hundreds of educators gathered in a Charlottetown hotel Friday for the P.E.I. Teachers’ Federation Annual Convention that the quality of classroom instruction is the single greatest predictor of student success. “Nothing,’’ he told the teachers, “is more important than you.’’ Katz says the key question is not how to teach, but rather how to learn how to teach. He says emphasis should be placed on determining what leaders need to learn to support what teachers need to learn to support what students need to learn. He describes effective leadership as promoting and participating in teacher learning and development. The single most important leadership quality for administrators like principals is being visible in public and learning alongside their teachers. “I see a lot of places there are many, many administrators who are marvelous lead learners as there are many who see their role as operational and not as instructional as we would hope to see,’’ he said. “So it’s all over the place and that goes for superintendents (of education) and everybody else in the system.’’ Katz says he consistently hears people complain of structural restraints on how much they can and can’t move. He argues that even in a restricted environment, there is always a little room for constructive movement. “So you just decide if a slight shift left or a slight shift right is preferable and so whatever degrees of freedom you have - however much movement you have - you want to be thoughtful and purposeful and intentional about the moves that you are making.’’ He also cautioned the educators from falling into what he calls the activity trap - doings that, while well intentioned, are not needs based and divert both human and material resources away from the school improvement focus. Katz says it is “absolutely critical’’ for teachers to challenge one another’s assumptions about teaching and learning, to be receptive to feedback from their peers, and talk openly with school colleagues. “We must move from an activity-based to a learning-based culture,’’ he said. “You can say a lot of things about teaching,’’ he elaborated in an interview with The Guardian. “You can say I’ve got my teaching objectives, I’ve got my teaching curriculum - I’m covering the curriculum. It doesn’t say anything about learning...that is not where the learning happens and that isn’t learning.’’
<urn:uuid:e78ed739-b22e-467c-bdd2-58f53d7c8c93>
CC-MAIN-2022-05
https://www.saltwire.com/prince-edward-island/news/teachers-taught-importance-of-learning-94845/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304928.27/warc/CC-MAIN-20220126071320-20220126101320-00483.warc.gz
en
0.96375
691
2.84375
3
2.854921
3
Strong reasoning
Education & Jobs
Spiders are small, eight-legged creatures that are best known for spinning silk webs. Spiders spin webs so they can catch insects for their food and even larger and stronger insects cannot escape. spiders spin silk but some don't spin webs. Bolas spiders spin a single line with a sticky end. Any insect near, gets trapped when the spider swings the sticky line near them. All spiders have fangs and most kinds have venom glands. They use their fangs and venom glands to capture their food. A spider's bite can kill insects and other small animals. A few kinds of spiders are harmful to human beings. In North America, six kinds of spiders harm people, they are - the Brown Recluse, Sac, Black Widow, Brown Widow, Red-legged Widow and the Varied Widow. Four of the Widow females are known to bite humans. The bites of these six spiders often cause mild reactions. Usually a person irritates a spider several times for it to bite you. In Australia, the most dangerous spider is the Funnel-Web with the Red-back, a type of Black Widow spider, also being Spiders are helpful to people because they eat harmful insects. They eat grasshoppers and locusts which destroy crops. Spiders also eat flies and mosquitoes which carry diseases. Spiders feed mostly on insects but some capture and eat tadpoles, small frogs, small fish and mice. Most females are larger and stronger than the males and occasionally they eat males. Spiders can live anywhere they can find food like fields, woods, swamps, caves and deserts. One kind of spider spends most of its life underwater. Another kind lives near the top of Mount Everest, the world's highest mountain. Some live in houses, barns, and other buildings. Others live on the outside of buildings, on walls, windscreens and corners of doors and windows. The life span of arachnids in temperate areas is a single season, therefore they rely on eggs to perpetuate the species from year to year. In warm regions, certain groups (some scorpions and tarantulas) appear to live more than a single year, in fact some tarantulas in captivity have survived for as long as 20 years. There are more than 30,000 kinds of spiders. Scientists believe there may be up to 50,000 to 100,000 kinds. Some are smaller than than the head of a pin but some are larger than a person's hand. One kind of spider, a South American tarantula is measured at 25 centimetres but that is with its legs extended. people think spiders are insects but scientists classify spiders as arachnids. Insects are different in a number of ways. Spiders have eight legs but ants, bees, beetles and other insects have only six legs. Most insects have wings or antennae which are feelers. Arachnids include daddy long legs, scorpions, mites and ticks. classify spiders as either true spiders or Tarantulas, according to certain differences in their bodies such as the way their fangs point and move. In addition, spiders can be grouped according to the way they live. Web spinning spiders spin webs to catch insects. Others lie and wait for insects Spiders may be all different shapes - short and fat, long and thin, round, oblong, or flat and one even looks like a stick insect. Their legs can be short and stubby, or long and thin. Spiders are most commonly brown, grey, or black but some species have beautiful colours. Many of these spiders are so small that their colours can be only seen with A spider has no bones and its tough skin serves as a protective outer skeleton. Hairs, humps, and spines (bristles of skin) cover the bodies of A spider's body has two main sections: the cephalothorax, which consists of the head joined to the thorax (chest); and the abdomen. Each of these sections has parts attached to it called appendages Connecting the the cephalothorax and the abdomen is a thin waist called the Ears. A spider does not have ears. Mammals hear with help of hairs that are located in the ear where pressure waves in the air are converted to electric signals. These signals are then sent to the brain and interpreted as sound. A spider hears with very tiny hairs on her legs (thrichobotria). She is very capable of localizing the origin of a sound by interpreting the movement of the air produced by that sound. A spider's eyes are on top and near the front of its head. Different species have different numbers of eyes and the size and position also varies. Most species have eight eyes, arranged in two rows of four each. Other kinds have six, four, or two eyes. Some spiders have can see better than others. Hunting spiders have good eyesight at short distances and their eyesight allows them to form images of their prey and mates. Web-building spiders have poor eyesight and their eyes are used for detecting changes in light. Some species of spiders that live in caves or other dark places have no eyes at all. The spider has two types of eyes; the main eyes and the secondary eyes. The main eyes are always the middle largest ones of the eight eyes the most spiders possesses. There are a few families of spiders with six eyes Sometimes the secondary eyes have a light reflecting layer (tapetum). This can be easily observed if one shines with a light in the eyes of a spider during the night. Mouth. Below the spider's eyes is its mouth opening. Spiders eat only liquids because they do not have chewing parts. Around the mouth are various appendages which form a short "straw" through which the spider sucks the body fluid of its victim. The spider can only eat some of the solid tissue of its prey by predigesting it. The spider sprays digestive juices on the tissue and the powerful juices dissolve the tissue. A large tarantula can reduce a mouse to a small pile of hair and bones in about 36 hours by predigestion Chelicerae are a pair of appendages that the spider uses to seize and kill its prey. The chelicerae are above the mouth opening and just below the spider's eyes. At the end of each chelicera is a hard, hollow, pointed claw, and these claws are the spider's fangs. An opening in the tip of the fang connects with the venom glands so that when a spider bites an insect with its chelicerae, venom flows from the fangs into the wound and paralyses or kills its prey. true spiders, the fangs point crosswise, and the venom glands extend back into the cephalothorax. The fangs of tarantulas point straight down from the head, and the venom glands are in the chelicerae. Spiders also crush their prey with their chelicerae. Some species use their chelicerae to dig burrows in the ground as nests. The spiders' chelicerae can do much more than human teeth ever could. Maybe a human could do more with dental implants, but only if the dental implants were incredibly strong. Pedipalpi are a pair of appendages that look like small legs. One pedipalp is attached to each side of the spider's mouth, and they form the sides of the mouth. Each pedipalp has six parts. In most kinds of spiders, the part closest to the body has a sharp plate with jagged edges. The spider uses this plate to cut and crush its food. In adult male spiders, the last part of each pedipalp has a reproductive organ. Legs. A spider has four pairs of legs, which are attached to its cephalothorax and each leg has seven segments. In most kinds of spiders, the tip of the last segment has two or three claws. Surrounding the claws is a pad of hairs called the scopula. The scopula sticks to smooth surfaces and helps the spider walk on ceilings and walls. Sensitive bristles that serve as organs of touch and perhaps organs of smell also cover each leg. Some bristles pick up vibrations from the ground or air, or the spider's leg while others detect chemicals in the environment. Spiders detect smell with scent sensitive hairs located on their legs. A sense of taste in their mouth is missing. A spider feels her prey with chemo sensitive hairs on her legs and senses if the prey is consumable. The legs consist of seven segments. Beginning from the body these are in the following order and called coxa, trochanter, femur, patella, tibia, metatarsus and tarsus. When a spider walks, the first and third leg on one side of its body move with the second and fourth leg on the other side. Muscles in the legs make the legs bend at the joints but spiders have no muscles to extend their legs so it is the pressure of the blood in their bodies that makes their legs extend. If a spider's body does not contain enough fluids, its blood pressure drops, the legs draw up under the body, and the animal cannot walk. Spinnerets are short, fingerlike organs with which the spider spins silk. They are attached to the rear of the abdomen. Most kinds of spiders have six spinnerets, but some may have four or two. The tip of a spinneret is called the spinning field and the surface of each spinning field is covered by as many as a hundred spinning tubes. Liquid silk flows through these tubes from silk glands in the spider's abdomen to the outside of its body and the silk then hardens into a thread. Respiratory system. Spiders as a group have two kinds of breathing organs - tracheae and book lungs. Tracheae are found in almost all kinds of true spiders and they are small tubes which carry air directly to the body tissues. In front of the spinnerets in most kinds of true spiders is an opening called the spiracle and air enters the tubes through these openings. Book lungs are in cavities in the spider's abdomen and air enters the cavities through a tiny slit on each side and near the front of the abdomen. Each lung consists of 15 or more thin, flat folds of tissue arranged like the pages of a book. The sheets of tissue contain many blood vessels. As air circulates between the sheets, oxygen passes into the blood. Tarantulas have two pairs of book lungs. Most true spiders have one pair. Circulatory system. The blood of spiders contains many pale blood cells and is slightly bluish in colour. The heart, is a long, slender tube in the abdomen, and pumps the blood to all parts of the body. The blood returns to the heart through open passages instead of closed tubes, such as those of the human body. If the spider's skin is broken, the blood quickly drains from its body. Digestive system. A digestive tube extends the length of the spider's body. In the cephalothorax, the tube is larger and forms a sucking stomach. When the stomach's powerful muscles contract, the size of the stomach increases. This causes a strong sucking action that pulls the food through the stomach into the intestine. Juices in the digestive tube break the liquid food into particles small enough to pass through the walls of the intestine into the blood. The food is then distributed to all parts of the body. Food is also pulled through the stomach into a fingerlike cavity called the caeca. Because spiders can store food in the caeca, they can go for long periods of time without eating. Nervous system. In the cephalothorax is the central nervous system including the brain, which is connected to a large group of nerve cells called the ganglion. Nerve fibres from the brain and ganglion run throughout a spider's body. The nerve fibres carry information to the brain from sense organs on the head, legs, and other parts of the body. The brain can also send signals through the nerve fibres to control the activities of the body. Spider silk is made up of protein and forms in the spider's silk glands. As a group, spiders have seven kinds of silk glands. However, no species of spider has all seven kinds. All spiders have at least three kinds of silk glands, and most species have five. Each kind of gland produces a different type of silk. Some silk glands produce a liquid silk that becomes dry outside the body. Other glands produce a sticky silk that stays sticky. Spider silk cannot be dissolved in water and is the strongest natural fibre The spinnerets, which spin the silk, work like the fingers of a hand. A spider can stretch out each spinneret, pull it back in, and even squeeze them all together. A spider can use different spinnerets to combine silk from different silk glands and produce a very thin thread or a thick, wide band. Some spiders also can make a sticky thread that looks like a beaded necklace. To do this, the spider pulls out a dry thread that is heavily coated with sticky silk. It then lets go of the thread with a snap. This action causes the liquid silk to form a series of tiny beads along the thread. A spider uses beaded threads in its web to help trap jumping or Some kinds of spiders have another spinning organ called the cribellum. It is an oval plate that lies almost flat against the abdomen, in front of the spinnerets. Hundreds of spinning tubes cover the spinning field of the cribellum. These tubes produce extremely thin threads of sticky silk. Spiders with a cribellum also have a special row of curved hairs called a calamistrum on their hind legs. Spiders use the calamistrum to comb together dry silk from the spinnerets and sticky silk from the cribellum. This combination of threads forms a flat, ribbonlike silk structure called a hackled band. Spiders use hackled bands in their webs, along with the other silk that they spin. spiders use silk: Spiders, including those that do not spin webs, depend on silk in so many ways that they could not live without it. Wherever a spider goes, it spins a silk thread behind itself. This thread is called a dragline. The dragline is sometimes called the spider's "lifeline" because the animal often uses it to escape from enemies. If danger threatens a spider in its web, it can drop from the web on its dragline and hide in the grass. Or the spider can simply hang in the air until the danger has passed. Then it climbs back up the dragline into its web. Hunting spiders use their draglines to swing down to the ground from high places. Spiders also use silk to spin tiny masses of sticky threads called attachment discs. They use the attachment discs to anchor their draglines and webs to various Many kinds of spiders build silk nests as their homes. Some spiders line a folded leaf with silk to make a nest. Others dig burrows in the ground and line them with silk. Still other spiders build nests in the centre of their webs. Many web-spinning spiders spin sticky bands or wide sheets of silk while capturing their prey. The orb weavers wrap their victims in sheets like mummies so they cannot escape. The female spider of most species encloses her eggs in an egg sac. This sac is a bag made of a special kind of Types of Spiders Hunting spiders creep up on their prey or lie in wait and pounce on it. Some kinds of hunters, including jumping spiders and wolf spiders, have large eyes and can see their prey from a distance. But other hunters, such as water spiders, tarantulas, and crab spiders, have small eyes. The powerful chelicerae of hunting spiders help them overpower their victims. Some hunting spiders spin simple webs that stretch out along the ground and stop insects. These spiders are grouped as hunters because they run after the insects that land in their webs. These spiders are all hunting spiders: spiders creep up and pounce on their prey. These spiders have short legs, but they can jump more than 40 times the length of their bodies. Jumping spiders are the most colourful of all spiders. Many thick, coloured hairs cover their bodies. Most male jumping spiders have bunches of brightly coloured hairs on their first pair of legs. Water spiders are the only spiders that live most of their life underwater. The water spider breathes underwater from air bubbles that it holds close to its body. Its underwater nest is a silk web shaped like a small bell. The spider fills the web with air bubbles, which gradually push all the water out of the bell. The animal can live on this air for several months. Water spiders are found only in Europe and parts of Tarantulas are the world's largest spiders. The biggest ones live in the South American jungles. Great numbers of tarantulas also are found in the south western United States. Many kinds of tarantulas dig burrows as nests. The trap-door spider covers the entrance to its burrow with a lid. A California tarantula builds a turret (small tower) of grass and twigs at the entrance to its burrow. This spider then sits on the tower and watches for insects moving in the nearby grass. A few kinds of tarantulas live in trees. Fisher spiders live near water and hunt water insects, small fish, and tadpoles. These spiders have large bodies and long, thin legs. But because of their light weight, they can walk on the water without sinking. These spiders also can dive underwater for short periods of time. Some fisher spiders are called nursery-web weavers because the female builds a special web for her young. spiders have short, wide bodies and look like small crabs. They can walk backwards and sideways as easily as crabs do. Some brightly coloured crab spiders hide in flowers and capture bees and butterflies. A few kinds of crab spiders can disguise themselves by changing the colour of their bodies to match the colour of the flower blossom. Wolf spiders are very common and are excellent hunters. Many kinds have large, hairy bodies, and run swiftly in search of food. Others look and act like other types of spiders. For example, some wolf spiders make their homes near water and resemble fisher spiders in appearance and habits. Others live in burrows, or spin funnel-shaped webs. Web-spinning spiders, like hunting spiders, live in caves, in grass or shrubs, or in trees. They cannot catch food by hunting because of their poor vision. Instead, they spin webs to trap insects. A web-spinning spider does not become caught in its own web. When walking across the web, it grasps the silk lines with a special hooked claw on each foot. These spiders are all Tangled-web weavers spin a web that consists of a jumble of threads attached to a support, such as the corner of a ceiling. cellar spiders spin tangled webs in dark, empty parts of buildings. One cellar spider that looks like a daddy longlegs has thin legs more than 5 The comb-footed spiders spin a tangled web with a tightly woven sheet of silk in the middle. The sheet serves as an insect trap and as the spider's hideout. These spiders get their name from the comb of hairs on their fourth pair of legs. They use the comb to throw liquid silk over an insect and trap it. The black widow and the Australian redback spider are both comb-footed spiders. Some spiders spin a tangled web containing a hackled band of dry and sticky silk. The ogre-faced stick spider spins a web that is made up largely of hackled bands. The web is only about as large as a postage stamp. This spider spins a structure of dry silk to hold the sticky web in place. The spider hangs upside down from the dry silk. It holds the sticky web with its four front legs. When an insect crawls or flies near, the spider stretches the sticky web to several times its normal size and sweeps it over the insect. Funnel-web spiders live in large webs that they spin in tall grass or under rocks or logs. The bottom of the web is shaped like a funnel and serves as the spider's hiding place. The top part of the web forms a large sheet of silk spread out over grass or soil. When an insect lands on the sheet, the spider runs out of the funnel and pounces on Sheet-web weavers weave flat sheets of silk between blades of grass or branches of shrubs or trees. These spiders also spin a net of crisscrossed threads above the sheet web. When a flying insect hits the net, it bounces into the sheet web. Often, an insect will fly directly into the sheet web. The spider, which hangs beneath the web, quickly runs to the insect and pulls it through the webbing. Sheet webs last a long time because the spider repairs any damaged parts. Dwarf spiders, which are less than 1.3 millimetres long, spin small, square sheet webs near rivers and lakes. Whip or tailed spiders live in Southeast Asia and Australia. They have long, thin, tubelike bodies, 2 to 4 centimetres long. At night the whip spider lets out a few long, thin strands of silk. It then waits for its prey--mainly smaller spiders--to use these silklines as "guide ropes." When the unsuspecting small spider climbs up such a rope the whip spider snares it by wrapping it in a broad band of silk. Orb weavers build the most beautiful and complicated of all webs. They weave their round webs in open areas, often between tree branches or flower stems. Threads of dry silk extend from an orb web's centre like the spokes of a wheel. Coiling lines of sticky silk connect the spokes, and serve as an insect trap. Some orb weavers lie in wait for their prey in the centre of the web. Others attach a signal thread to the centre of the web. The spider hides in its nest near the web, and holds on to the signal thread. When an insect lands in the web, the thread vibrates. The spider darts out and captures the insect. Many orb weavers spin a new web every night. It takes them about an hour. Such spiders often eat their old webs to conserve silk. Other orb weavers repair or replace any damaged parts of their webs. or angling spiders are classed as orb weavers, but they catch flying insects by swinging a silk line with a sticky globule at one end. Some bolus spiders are thought to give off a scent that attracts male moths. Angling spiders have large, cream-coloured bodies with pink, yellow, and brown markings. The magnificent spider of Australia is a type of bolus spider. The life of a spider Each species of spider lives a different life. Many kinds of spiders live for only about a year. Large wolf spiders live several years and some female tarantulas have lived for up to 20 years in captivity. Spiders become adults at different times of the year. Some mature in the autumn, and then mate and die during the winter. Others live through the winter, mate in the spring, and then die. Courtship and mating. As soon as a male spider matures, it seeks a mate. The female spider may mistake the male for prey and eat him, but most male spiders perform courtship activities that identify themselves and attract the females. The male of some species vibrates the threads of the female's web. Some male hunting spiders wave their legs and bodies in an unusual courtship dance. Male jumping spiders use the coloured hairs on their legs to signal females. Male nursery web spiders present the female with a captured fly before Before mating, the male spider spins a silk platform called a sperm web. He deposits a drop of sperm from his abdomen onto the platform. Then he fills each of his pedipalpi with sperm. He uses the pedipalpi to transfer the sperm to females during mating. After mating, the female stores the sperm in her body. When she lays her eggs, several weeks or even months later, the eggs are fertilized by the sperm. Usually, the female does not eat the male after mating as is commonly believed. Females can continue to lay eggs for many months after mating because of the stored sperm. The number of eggs that a spider lays at one time varies with the size of the animal. An average sized female lays about 100 eggs but some of the largest spiders lay more than 2,000 eggs. In most species, the mother spider encloses the eggs in a silken egg sac. The sac of each species differs in size and shape. In many species, the mother dies soon after making the egg sac. In other species, she stays with the eggs until they hatch. Some spiders hang the sac in a web. Others attach the sac to leaves or plants. Still others carry it with them. The female wolf spider attaches the sac to her spinnerets, and drags it behind her and then carries the spiderlings on her back after they have hatched. Spiderlings hatch inside the egg sac and remain there until warm weather arrives. If the eggs are laid in autumn, the spiderlings stay quietly inside their egg sac until spring. After leaving the egg sac, the spiderlings immediately begin spinning draglines. Many spiderlings travel to other areas. To do this, a spiderling climbs to the top of a fence post or some other tall object and tilts its spinnerets up into the air. The moving air pulls silk threads out of the spinnerets. Then the wind catches the threads and carries the spiderling into the air. This unusual way of travelling is called ballooning. A spider may travel a great distance by ballooning. Sailors more than 300 kilometres from land have seen ballooning spiders. Spiderlings moult (shed their outer skin) several times while they are growing. A new, larger skin replaces the skin that has grown too tight. Most kinds of spiders moult from five to nine times before they reach adulthood. Tarantulas moult more than 20 times. Spiders have many enemies including snakes, frogs, toads, lizards, birds, fish, and other animals that also eat insects. Even some insects eat spiders like the wasp which is one of the spider's worst enemies. One group of spiders called pirate spiders eats nothing but other spiders. Researched by Stacey (reference source "World Book Encyclopaedia") and pictures were taken from children's projects and where credited to that child does not claim to be original information. Where possible, permission to reproduce has been sought. Any infringement of copyright is purely Click here to return to the Other Spider's Home Page
<urn:uuid:384abbdf-e73d-476a-b1dd-1d0de990bad7>
CC-MAIN-2018-51
https://spiderzrule.com/spider1.htm
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824525.29/warc/CC-MAIN-20181213054204-20181213075704-00196.warc.gz
en
0.936998
5,980
3.3125
3
1.520501
2
Moderate reasoning
Science & Tech.
Meaning of Baby Name “Yennifer” in Different Languages and Cultures Yennifer is a name that is popular in many different cultures and languages across the world, and it has a rich and varied meaning depending on where it is used. In some cultures, Yennifer is associated with elegance, grace, and beauty, while in others it is linked to wisdom, intelligence, and scholarly pursuits. Let’s explore some of the beautiful and unique interpretations of the name Yennifer in different cultures and languages: In Spanish, Yennifer is derived from the older name Genoveva. The name is believed to mean “of the race of women” and is often associated with beauty and femininity. In some Spanish-speaking countries, it is also considered a name of Christian origin and associated with holiness and purity. In Polish, Yennifer is a variant of the name Jennifer and means “white wave”. This interpretation of the name is associated with purity, clarity, and wisdom. In Poland, the name is often given to girls who are intelligent and studious, and who are expected to succeed in academic pursuits. In German, the name Yennifer is associated with youthful and energetic qualities. The name is derived from the German word “Junge” which means young, and is associated with a vivacious and adventurous personality. Germans often consider the name ‘Yennifer’ to be a name that represents a free spirit with rebel-like qualities. In Arabic, Yennifer means “beautiful mountain” or “gorgeous woman”. This interpretation of the name is associated with great beauty, strength and endurance. In the Arabic language, names are often linked to the natural world, and the name Yennifer may be given to girls who are strong and independent, and who possess a unique and powerful beauty. In modern English, the name Yennifer is sometimes seen as a combination of the names Yen and Jennifer. Yen is a Chinese name that means “graciousness” or “kindness”, and so this interpretation of Yennifer may be associated with those qualities. The name Jennifer, of course, is a very popular name in English-speaking countries, and is often linked to intelligence and creativity. In Brazilian Portuguese, the name Yennifer is a new and unique name that has started to become popular in recent years. The name Yennifer means “fair phantom”. This interpretation of the name is associated with mystery, intrigue and the supernatural. As we can see, the name Yennifer has a wide range of meanings in different cultures and languages. Whether it is associated with beauty, wisdom, youthfulness or strength, the name Yennifer is a name that celebrates the diversity and richness of our different cultures and ways of life. So, if you are considering naming your child Yennifer, you will be giving them a name that is truly unique, meaningful and full of character! We are sorry that this post was not useful for you! Let us improve this post! Tell us how we can improve this post?
<urn:uuid:ed2ec62a-6962-4673-adab-2a7b9da90e40>
CC-MAIN-2023-14
https://www.iworksolo.com/baby-name-meaning-of-yennifer-2/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945433.92/warc/CC-MAIN-20230326044821-20230326074821-00675.warc.gz
en
0.951373
656
2.65625
3
1.914261
2
Moderate reasoning
Social Life
How often do you say that? “Sure I can!” That’s what it takes to launch a positive way of thinking. Too often we can worry ourselves out of reaching our potential, out of trying new things, out of taking a leap for it. How can we train our brain so that we become an optimist rather than a pessimist, reaching for the positive rather than dipping for the negative? Let’s consider some ways to do that. Your face tells a story. Others see the tension in your face before they even hear the tension in your tone. Lighten up your perspective by putting a smile on your face. Those muscles in your face, the ones that you can control by smiling or frowning, are connected to the emotional part of your brain which keeps a tight rein on your moods. If you want to think more positively, make your face look more positive. Smiling more tells your brain, “Sure I can!” Dark words can turn into dark thoughts. Instead, choose words of inspiration – putting a burst of light into your ideas. Or read things that make you laugh outright. That chuckle will do more than lighten up your perspective. Or read how to do something and learn something new. All of these will recharge your way of thinking and make you excited about a different approach. Reading the right stuff tells your brain, “Sure I can!” Some may read this heading as “Spend more….money!” Not so. Spend more time with people who think positively. We really do start to reflect the thoughts and moods of those we spend time with. In fact, if you want to get to know someone better, watch his or her dog carefully. Some will tell you that dogs reflect the personality of their owners. People who are sour will sour your thinking. Avoid them whenever possible. Instead, cozy up to those who are upbeat and energized. Spending time with positive people tells your brain, “Sure I can!” Whenever you feel a negative thought surfacing, zap it. Move it way out of the way by replacing it with something positive. Flip your perspective so that you see that glass half full rather than half empty. Negative thoughts can decay your confidence and immobilize your plans. Don’t let that happen. Be on the lookout for any thought that begins to erode your attitude. Replacing those negative thoughts with positive ones tells your brain, “Sure I can!” Do you find this tip surprising? It’s a proven fact that singing will lighten your mood. No need to sing in public unless that would please you and others. Let music do its magic, let a melody recharge your tune. Turn on your favorite song and belt out the words. If you can’t remember the words, just la-la-la. Even do a soft-shoe shuffle if you are so inclined. Singing a cheerful tune tells your brain, “Sure I can!” “It’s only after you’ve stepped outside your comfort zone that you begin to change, grow, and transform” (Roy T. Bennett). Most will tell you that their comfort zone includes keeping their feet on the ground. Instead, take a lesson here from RUN Guy Nick Anderson who will tell you the view is different when you make the leap. Speaking of that, why not change your view by making a leap with Rank Up Now? That will certainly change your perspective and empower your business.
<urn:uuid:00d940f5-f9ba-4262-80f0-2ee0b8f78f38>
CC-MAIN-2019-51
https://blog.rankupnow.com/2019/05/21/sure-i-can/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540490743.16/warc/CC-MAIN-20191206173152-20191206201152-00133.warc.gz
en
0.948197
730
2.734375
3
2.049635
2
Moderate reasoning
Health
More and more Americans are ditching their sodas, juices, and sugary drinks for some good old, quality H2O. The only problem is, we’re reaching for bottled water instead of the stuff from the tap. Whether you’re one of the many people who don’t trust tap water anymore, or simply think bottled water “tastes better,” take just a second to learn about the wonders of the reusable water bottle. Not only is the bottled water you’re drinking just purified, municipal and river water, these disposable bottles can take up to 1,000 years to biodegrade and, if burned (as most are at the end of their life cycle), can produce toxic fumes that pollute the air we breathe and the water we drink. This means that a majority of these temporary products cast away as litter, end up in a landfill, our city streams, and eventually the ocean – polluting and distancing our relationship with accessible drinking water. While recycling is an option when it comes to this plastic nuisance, it’s not exactly the most environmentally friendly solution. Only certain types of plastic bottles can be recycled and it’s usually a high-energy intensive process to recycle them properly. For a water bottle to not only be good, but be the best, there are a few things it needs to do, but ultimately, it comes down to how you’re going to use it. How to Choose the Right Water Bottle for You All water bottles have some kind of function that makes them standout from the pack. When choosing between the best water bottles, we usually are talking about cold- and heat- retention, portability, and overall durability. - Functionality: Whether your reusable water bottle keeps cold drinks cold, warm drinks warm, or both, you’re going to want to an option that fits your lifestyle. If you simply just need something to remind you to drink water throughout the day, you might not need to splurge on a bottle that will also keep coffee hot for you in the mornings. - Durability: If you’re going to buy a water bottle in order to deviate from the single-use plastic life, go with something that will last a few years – at least. Stainless steel is one of the more durable constructions you can opt for, but other metals, glass, and tough BPA-free plastics can last just as long if you take care of them correctly. You might also want to consider an option that is dishwasher safe, so you don’t end up ruining your bottle after a few uses. - Size: As you may have guessed, water bottles come in all shapes and sizes. It’s up to you to decide what you’ll need on a day-to-day basis, and what is easy to carry when traveling or adventuring outdoors. Big water bottles hold more drinkable water, but they won’t be as portable and convenient as a collapsible water bladder. - Drinkability: Drinkability is one of the most important aspects when you’re looking for a bottle that is going to make you stay hydrated. Some people like to drink with a straw, some like a squeeze bottle for a quick hydrating sesh, and some like to unscrew a lid and let the fluids flow freely. You’ll want to consider your daily usage when picking between the best water bottles. So, let’s all do our part to help ourselves and the environment simultaneously by opting for an eco-friendly, reusable water bottle, rather than your standard 24-pack of Safeway Select. We put together a list of the best water bottles out there to aid you in your transition. Most of these are inexpensive, attractive, and will last you at least a decade – and if not, there is a warranty backing to help you get there. Grab one of these and we guarantee you’ll feel better about how you hydrate. The Best Water Bottles to Buy Now First things first, Lokai’s metal water bottles look fantastic and for what it offers in appearance it matches with tough insulation. Sporting a comfortable silicone grip, a wide lid for ice cubes, and an optimal size for cup holders, the Lokai bottle is ideal for everyday use whether you need cold water or a warm pick me up. And, because Lokai is all about finding the balance, they 10% of net profits to its charity partners, including The Nature Conservancy, The Humane Society of the United States, and more. Built with a double wall vacuum insulation that’s perfect for all-day hydration, Hydro Flask is one of the best bottle brands on the market, so it’s easy to see why it checks off every box when weighing out water bottle effectiveness. Its bottles are crafted with a powder coating for better gripping ability while also reducing the risk of condensation. And, if personalization means a lot to you, Hydro Flask offers its water bottles in a mound of colors and compatible accessories that will improve your bottles versatility for multiple needs, from a sipping lid for the warm coffee you’re bringing in to work, a compatible water filtration straw for each stream pit stop on your hike, or – to quote the great Waterboy – just simply need some quality H2O. The Bindle water bottle was built for outdoor enthusiasts who want to lighten their load. Not only does it provide 24 oz. of space for all your hydration needs, the Bindle unscrews at the bottom, revealing a waterproof storage compartment to hold your small essential items during hikes, trips to the beach, fitting in a quick working out, embarking on a run, or really anywhere where you don’t want to fill your pockets or bring an extra bag. Plus, it provides your beverage with the cold- and heat-retention comparable to some of the other picks on the list. Collapsible water bottles come in handy when a traditional bottle is too big for your travels. The Vapur collapsible water bladder is an excellent companion for traveling, hiking, or everyday use, and you can simply roll it up and stash it away to reduce excess weight when you’re done hydrating. It also boasts a durable 3-ply, BPA-free material that won’t rip when rolled up, it’s dishwasher safe, and it is also freezable if you find yourself in need of an ice pack or a cold beverage on a hot day. This one is for all you Yeti-heads who always dreamt of having a Rambler Tumbler for everyday use; it’s finally here. The Yeti water bottle aims to keep your beverage ice cold for as long as possible, just like its renowned coolers, while also offering durability that is unmatched by many other ottles on the market. It resists dents, dings, and condensation, as it’s functionally designed to supply you with all your hydration needs whether you’re heading down the rapids, walking into a hectic worksite, or embarking on new hiking goals. Unbreakable and made from BPA-free plastic with a fully-attached cap, Nalgene offers a stoic reusable bottle that’s become the set-standard for sports and on-the-go hydration. With a no-spill bite-spout and an interior straw going all the way to the bottom, you’ll never have to crane your neck to get the last drops of water ever again with the CamelBak eddy. Just make sure to wash out the spout ever so often; if water is left for too long, mold can sprout. It’s dishwasher safe, to make your life easier. Unlike most other Klean Kanteen bottle types, this one has a sport opening with a soft silicone spout, 25% higher flow rate and “chirp” free drinking experience. The large opening easily fits ice and the stainless steel design affords durability at a low price. The clipping ability makes Klean Kanteen one of the best water bottles for outdoor use, if not one of the most durable. Your daypack and hike without worrying where your water will come from. It also offers a double wall insulated bottle ($28) that matches up against Hydro Flask and Yeti with ease. It pays to assure clean water on-the-go, especially when it’s absolutely necessary. The Lifestraw Go water bottle is every hiker’s dream and one of the best water bottles out there. Simply fill the 670 ML bottle up from any pond, river or stream and drink clean, filtered water from the integrated filter straw. No need for water purification tablets or a pump here: Lifestraw removes up to 99.9999 percent of waterborne bacteria and 99.9 percent of waterborne protozoa. And this bottle is not only good for you and the environment, for every Lifestraw Go purchased, Lifestraw donates an entire year of clean drinking water during school to a child in Africa. Well, what’re you waiting for? Pick up one of the best water bottles and become the magnificent water-drunkard (or the guy who’s always hydrated) that you were meant to be. And now that you know how you’re going to be drinking your water, why not find a contraption to cook anything in water with our favorite sous vide machines. Article updated January 28, 2019 by Bryan Holt. - The Best Insulated Water Bottles to Keep Your Cool - The Best Portable Water Filters and Purifiers for Outdoor Adventures - The Best Backpack Coolers for Keeping Drinks Cold on Hikes - How to Limit Waste While Social Distancing - How to Grow Herbs Indoors
<urn:uuid:bb02df8c-e8ad-4766-86e4-025087784039>
CC-MAIN-2020-24
https://www.themanual.com/outdoors/best-water-bottles/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413551.52/warc/CC-MAIN-20200531151414-20200531181414-00589.warc.gz
en
0.935203
2,059
2.546875
3
1.737943
2
Moderate reasoning
Home & Hobbies
Communicating in the presence of hearing loss can be trying—for each party. For people with hearing loss, limited hearing can be stressful and draining, and for their conversation companions, the frequent repeating can be just as taxing. However, the difficulty can be alleviated as long as both parties assume responsibility for profitable communication. Since communication is a two way process, the two parties should work together to overcome the challenges of hearing loss. Here are a few useful tips for effective communication. Tips for those with hearing loss If you have hearing loss: - Aim at complete disclosure; don’t simply express that you have trouble hearing. Detail the cause of your hearing loss and supply recommendations for the other person to best converse with you. - Suggest to your communication partner things such as: - Keep small distances between us - Face to face communication is best - Get my attention before speaking with me - Talk slowly and clearly without yelling - Find tranquil locations for conversations. Lessen background noise by turning off music, finding a quiet booth at a restaurant, or identifying a quiet room at home. - Keep a sense of humor. Our patients frequently have happy memories of absurd misunderstandings that they can now have a good laugh about. Bear in mind that people are usually empathetic, but only if you take some time to explain your situation. If your conversation partner is cognizant of your challenges and requirements, they’re much less likely to become agitated when communication is disrupted. Tips for those without hearing loss If your conversation partner has hearing loss: - Get the person’s attention before speaking. Don’t yell from across the room and face the person when speaking. - Ensure that the person can see your lips and articulate your words carefully. Sustain a consistent volume in your speech. - Reduce background noise by choosing quiet areas for discussions. Turn off the TV or radio. - In groups, make sure only one person is speaking at a time. - Remember that for those with hearing loss, it is a hearing problem, not a comprehension problem. Be prepared to have to repeat yourself from time to time, and remember that this is not the result of a lack of intelligence on their part. - Never use the phrase “never mind.” This phrase is dismissive and suggests that the person is not worthy of having to repeat what was significant enough to say originally. When communication breaks down, it’s easy to blame the other person, but that’s the wrong approach. As an example, consider John and Mary. John has hearing loss and Mary has normal hearing, and they are having considerable communication problems. John thinks Mary is insensitive to his hearing loss and Mary believes John is using his hearing loss as a justification to be inattentive. Instead, what if John searched for ways to improve his listening skills, and offered tips for Mary to communicate better? At the same time, what if Mary did the same and tried to find ways that she could communicate more clearly. Now, both John and Mary are taking responsibility for their own communication and are not blaming the other person for the difficulties. This is the only way to better communication. Do you have any communication guidelines you’d like to include? Let us know in a comment.
<urn:uuid:9ba33219-6428-46a8-baee-a07dcd8daf61>
CC-MAIN-2019-47
https://www.mcdonaldhearingservices.com/hearing-loss-articles/tips-for-improving-communication-in-the-presence-of-hearing-loss/
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669795.59/warc/CC-MAIN-20191118131311-20191118155311-00405.warc.gz
en
0.955864
685
2.8125
3
2.404904
2
Moderate reasoning
Health
This week’s post comes to you from guest blogger Jennifer Dryer, who works in the National Declassification Center at the National Archives. Jennifer is completing a cross-training assignment with the Archives I Research Support Branch, where she has been working on reference relating to the upcoming 1940 Census release. Some questions on the 1940 census relate to relief efforts during the Great Depression. In this post, Jennifer looks at one of those New Deal Agencies, the National Youth Administration. 1940 Census: col. 22: “Was [this person] at work on, or assigned to, public EMERGENCY WORK (WPA, NYA, CCC, etc.) during week of March 24-30? (Y or N) President Franklin Delano Roosevelt created the National Youth Administration (NYA) as one of his New Deal agencies, to provide aid to a country trying to lift itself out of the Great Depression. President Roosevelt’s New Deal agencies also included the Works Progress Administration (WPA) and the Civilian Conservation Corps (CCC), but neither of them addressed the problem facing the nation’s unemployed youth. The WPA provided public works jobs for unskilled workers, but did not initially provide training in new jobs skills. The typical WPA worker was the head of household of relief families, which sometimes included women. The CCC typically provided unemployed, unmarried young men ages 18-25 (but not women) on the relief rolls work constructing state parks and other conservation projects. NYA created a means for young men and women between 16 and 24 who had finished school and were unemployed to work and develop skills that they could use to continue working once they finished the program. Their work ranged from building bridges, schools, and furniture for schools to nursing and junior clerks. Others worked in agricultural and industry. Participants in the NYA accompanied their work with studies related to their jobs, which allowed them to prepare for things such as the civil service examinations and homemaking. The most important thing provided to many NYA participants was job experience. Further textual and photographic records concerning the National Youth Administration and other New Deal agencies can be found in Archives II in College Park (RG 119), the Franklin D. Roosevelt Library, and the Tugwell Room in the Greenbelt branch of the Prince Georges County public library. The library in Archives II also has a number of books dealing specifically with the NYA. If you had relatives who worked for the NYA during the Depression, these records will provide more insight into their experiences!
<urn:uuid:4fe67b7f-b9e5-4779-bc41-c8738b3b9c01>
CC-MAIN-2020-40
https://narations.blogs.archives.gov/2011/06/24/family-tree-friday-the-national-youth-administration-1935-1943/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400217623.41/warc/CC-MAIN-20200924100829-20200924130829-00622.warc.gz
en
0.963458
520
2.984375
3
2.47719
2
Moderate reasoning
History
Farming Practices That Farmers Should Do To Conserve Global Food Security Global food security is one of the most pressing issues for humanity, and farming is critical for achieving this. There are many factors that are having severe impacts on food production: water stress and desertification which is reducing the amount of arable land; climate change and plant pests and diseases which are becoming resistant to pesticides. Key elements of plant pest and disease epidemics include some farm management practices that increase host density such as increase of field aggregation, field size and crop species uniformity. Such practices both increase host vulnerability and facilitate movement of the plant pathogen. How Bad Is The Pest Problem? For farmers worldwide, pests already are a serious problem. They are responsible for the loss of 10 -16 % and more of all crops during production and result in further losses after harvest i.e. due to infestations in food stores. From microscopic fungi, bacteria and viruses to insects and other animals, there are numerous different species which affect everyday staples like cereals, potatoes, fruit and vegetables. These pests have evolved to breed quickly and disperse easily, allowing them to move readily to find new hosts. There is immense range of pests and diseases that threaten agricultural crops and that can be sorted into categories according to the damage they cause or means of control: Worst historical pest - the desert locust (Schistocerca gregaria L.), a pest since biblical times, they strip a field bare in an hour and consume a very wide range of crops. - witches’ broom disease of cocoa (Crinipellis perniciosa), introduced in Brazil by humans due to the weakening of the political power of the powerful cocoa landowners. Production across the region fell 75%. Brazil went from being the world’s third-leading cocoa producer to 13th place. Hardest pest to control - South American rubber blight (Microcyclus ulei), which causes the fungus and makes rubber tree production in South America impossible. It notoriously defeated Henry Ford’s attempts to grow rubber for car tires in the eponymous Fordlandia, Brazil, losing him an investment of $250m. - coffee wilt disease (Fusarium xylarioides), which spreads insidiously through the soil and on machetes used to prune the trees. The only way to halt it is a scorched-earth policy of pulling up all trees in infected plots and then waiting a year before replanting – plus another four years until you get a full harvest again Most expensive pest to control - western corn rootworm (Diabrotica virgifera virgifera L.), in terms of a number of pesticides once used to control this pest and the expense of developing a resistant strain, this beetle is a strong contender. - potato blight (Phytophthora infestans), the fungus caused the Irish potato famine (1845-1852), during which one million people died and a further million emigrated from Ireland, causing the population to decrease by about 24% - coffee leaf rust (Hemilaea vastatrix), a fungus that devastated coffee production in Sri Lanka (Ceylon) in the 19th Century and famously led to a switch to tea drinking in the UK Worst stored product pest - the Khapra beetle (Trogoderma granarium L.) is difficult to control because it feeds on a variety of dried materials. It is resistant to insecticides and can go long periods without food. Infestations can result in up to 70% grain damage, making products inedible and unmarketable. Worst climate change threat - mountain pine beetle (Dendroctonus ponderosae L.) has killed 13 million hectares of lodgepole pine forest in British Columbia, Canada. Generally, climate change is likely to mean that many wood-boring pests of cold northern climes will become more destructive since higher temperatures will increase winter survival and possibly enable an extra generation in the summer. Most resilient pest - Colorado potato beetle (Leptinotarsa decemlineata L.), for over 50 years manages to develop resistance to 52 different compounds Next Steps for Managing Plant Pests At any one time, because of weather conditions, mutation to a virulent form, or the emergence of resistance to chemical control, a pest will surge into prominence unexpectedly. What farmers need, is better monitoring and recording of pests in order to take early action, using pest alarms of Agrivi farm management system. According to weather conditions on your fields, the system alerts you 7 days in advance about possible pest and/or disease for all crops you grow. You have enough time to prepare biological or chemical agents for crop protection. Even after food is grown, stored and transported, serious losses can occur. And when some food is lost it’s not just the food that is wasted – it’s percentage of the land, water, labor, seed, pesticide and fertilizer – so a financial and environmental loss too. Track weather conditions in Agrivi system and take care of global food security. Text source: BBC || Springer Link || Global Food Security|| Carbon Brief
<urn:uuid:7bc20808-a4e5-43b1-b8c2-24545db00255>
CC-MAIN-2016-44
http://www.agrivi.com/farming-practices-that-farmers-should-do-to-conserve-global-food-security/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720238.63/warc/CC-MAIN-20161020183840-00534-ip-10-171-6-4.ec2.internal.warc.gz
en
0.924146
1,071
3.609375
4
2.901661
3
Strong reasoning
Industrial
Crawl space encapsulation & dehumidifier The crawlspace! No one is thinking about their crawlspace, that damp, spider infested, dark and scary place underneath your home that no one wants to enter unless they absolutely have to. For most home homeowners, the crawlspace is a forgotten part of their home. Usually there is a small wooden access door to the crawlspace that most homeowners haven’t opened for years unless they needed to discard or hide some unsightly item in their yard. For many, many years the building industry didn’t spend much time thinking about the crawlspace either. The standard practice was to scrape the ground inside the foundation, pour the footer, install the foundation wall on the footer and install a few vents and a small access door in the foundation. After that, the builders also forgot about the crawlspace. We are now learning that the crawlspace should not be forgotten. The thinking and science behind crawlspaces is rapidly changing. The article below from the Building Science Corporation explains the importance of crawlspace encapsulation and waterproofing and the effects an untreated crawlspace can have on health and home. Building Science Corporation – June 18, 2015 Crawlspaces should be designed and constructed as mini-basements. Crawlspaces should not be vented to the exterior (see FAQ on Crawlspace Venting). They should have their floors uninsulated, the ground vapor sealed, their walls insulated and air sealed, and their air conditioned with indoor air. Traditional vented crawlspaces are often damp, moldy and inhabited with pests. They have almost universally been found to be well connected to indoor air through many small unintentional air leaks in the floors, partitions, and ducts. Therefore, to ensure both durability and indoor air quality (and save energy), a crawlspace must be kept dry, conditioned to control temperature and humidity, and sealed tight to be pest free. This is particularly important for crawlspaces that contain mechanical equipment—a situation that is practically guaranteed in buildings that have a crawlspace. Mechanical systems should not be installed outside of a home in unconditioned space unless there is no practical alternative. Crawlspaces should have a continuous sealed groundcover of vapor diffusion resistant materials, such as taped polyethylene or, preferably, a thin poured concrete slab over polyethylene with perimeter and control joints sealed. When the crawlspace ground level is below the ground level of the surrounding grade they should have perimeter drainage just like a basement. There must be good drainage away from crawlspaces (refer to Information Sheet 101: “Groundwater Control”). Crawlspace design and construction should also provide drainage for potential plumbing leaks or flooding incidents by sloping the ground level to a drain. (Read full article here) If your home has a traditional crawlspace with a dirt floor and open vents, it is time to think about your crawlspace in a new way. Your B-Dry® Systems of Louisville consultant understands the importance of eliminating moisture from your crawlspace and can recommend the most effective solution for removing it. Ready to eliminate the moisture in your crawlspace? We offer many, cost effective solutions. Call us anytime (502) 968-4444 B-Dry® Systems of Louisville offers full crawlspace encapsulation using the highest quality vapor barriers and typically installed within one day. We can provide a number of water removal solutions if your crawlspace is experiencing excessive water during rainfall. If you have open vents in your foundation, we can seal them up and install energy saving insulation on your foundation walls. Our consultants will inspect your crawlspace and offer customized solutions to solve any problems that may be found.
<urn:uuid:46321529-be85-4578-b6c1-3c0f5c960030>
CC-MAIN-2018-22
https://www.bdrylouisville.com/crawl-space-waterproofing/
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867055.20/warc/CC-MAIN-20180525082822-20180525102822-00573.warc.gz
en
0.932837
759
2.71875
3
2.287364
2
Moderate reasoning
Home & Hobbies
The Benefits of Power Training Ryan Summerlin October 18, 2012 Power, defined for the purposes of our discussion, simply means the combination of strength and speed. And, while you may perform skills that are strength or speed based alone; it is the combination of these two components that produces power. A practical example of power might be two road cyclists racing and the one who is pushing the biggest gear (strength) going the fastest (speed), wins because they cover the greatest distance in the shortest period of time. And, while you may not be road racing, the possession of power impacts your everyday life which is why we all need to train for power. Consider the following benefits of power training: -Increase in use of your fast twitch muscle fibers, particularly type II which improves your muscular development. Improving muscular development and definition enables you to move through your day with greater power which may help to prevent injury and may decrease the fatigue levels as the day progresses. -Improved neuromuscular adaptations-this usually leads to quicker reaction time and understand that regardless of your age, fitness level or gender, you will benefit from reacting quicker. Not just during sports, but in everyday life. Think of tripping and NOT falling-this may be in part due to your ability to react quickly. And, there is evidence which suggests that improved reaction time attained through appropriate/supervised power training may help to prevent falls in older adults leading to fewer hip fractures. -Improve efficiency within your energy system that lives right in the muscle (i.e. ATP-PC). Without delving deeply into exercise physiology, suffice it to say that you have three basic energy systems and the one described above is ready for immediate use. This system is low in capacity, but high in intensity (i.e. power) and you may train your body to improve it. Conjure up the image of an Olympic short-distance track sprinter-they tend to possess a well-tuned, highly trained ATP-PC system, enabling them to explode off of the blocks and down the track. And, while some of their ATP-PC capacity may be genetically pre-determined, effective power training creates that “winning edge” that wins races. -Your ability to flush and buffer the build-up of metabolic wastes which helps to reduce and perhaps delay fatigue. When the body has been effectively trained for power, it is more efficient at removing those wastes so you recover more quickly and may be able to repeat the effort optimally. -Also, hormones and neurotransmitters, such as testosterone, norepinephrine/epinephrine and cortisol may increase in production leading to greater force production within your muscle contractions as well as access to your stored energy (i.e. ATP-CP). Convinced yet? Wondering how on earth you are a candidate for power training when you have never been an athlete or are currently on the lower end of the fitness level spectrum? Well, there are appropriate progressions/regressions of power training for every level of fitness. So, get ready because next week we will highlight excellent power skills and drills to hopefully meet and exceed your expectations. Jackie Wright is the owner/manager of Never Summer Fitness, LLC located in Grand Lake, Colorado. She may be reached at her website at www.neversummerfitness.com, her email at [email protected], her blog at www.skyhidailynews.com and her Facebook page at Never Summer Fitness.
<urn:uuid:4df14678-fc7d-41fe-8679-40d14f2c5e87>
CC-MAIN-2016-40
http://www.skyhidailynews.com/news/opinion/the-benefits-of-power-training/
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660338.16/warc/CC-MAIN-20160924173740-00273-ip-10-143-35-109.ec2.internal.warc.gz
en
0.951484
720
3.09375
3
2.482083
2
Moderate reasoning
Sports & Fitness
1-2-3 Come Do Some 4 Seasons Activities With Me #1 Sometimes when I sit at my desk with a simple idea, my mind morphs it into a bajillion others. These ideas often come so fast, that if I don't quickly jot them down, my senior brain loses them a moment later. After working over a week on my newest "4 Seasons" packet, which involves glancing out a window, I realized that this could easily be divided into two packets. One with the writing prompts, the other with extra games & activities. Concentrating on just the writing aspect, would be less overwhelming; so Woo Hoo here's packet #1: "4 Seasons Window Craft Writing Prompt". No matter what the age, the 4 seasons are a super-fun topic. We all have glanced out of a window, often succumbing to daydreaming a bit, especially if the view before us, is a summer beach scene, or one filled with gently falling snow. With that in mind, I thought it would be fun to design a seasonal window, where students could write about what they saw, and then illustrate their thoughts. This activity is very versatile and easy to diversify your lessons. Option #1. A booklet: Depending on your students'writing ability, your seasonal booklet can be 5-9 pages long. For younger kiddos, I simply staple the 4, seasonal window pages to the cover to make a 5-page booklet. They write one sentence under the window, then illustrate & color their windowpane. I've included my sample on the left, which you can use to explain what you want your students to do. During the beginning of a season, we complete that page. I start with fall and end with summer. This makes a nice keepsake at the end of the year, which should show improvement in coloring, penmanship & writing ability. For older students, include the additional writing prompt page, which features seasonal graphics. Students begin writing under the window worksheet, then continue on the additional graphic-themed page. There are blank, as well as lined templates to choose from. Students can either illustrate their window FIRST, then write sentences about what they drew; or they can think about various fall things, then write their sentences on the separate seasonal paper. Then, afterwards, they go back and illustrate their window, referring to their writing. You can include these extra writing pages, to make a 9-page booklet, or simply use each of the 4 seasonal windows as a separate activity, then hang up the completed projects on a bulletin board or hallway display. To display, students glue their illustrated window, to the top of their completed writing paper. I’ve included a cover if you want to make a booklet, plus several posters to enhance your display, if you choose to do 4, separate writing prompt craftivities. So that teachers can quickly & easily make examples to share, I've included colorful scenes for each seasonal window, along with a completed writing prompt for each one. Also included, are checklists for students to jot down ideas, as well as 4-part graphic organizers, which will help students organize their thoughts. There's also a rubric. A 3-on-a page, BW one for students (boy & girl options to make it more personal) as well as a colorful poster to introduce the lesson, then hang so students can refer to it. I use these all the time, as they truly help jump start and improve writing. Today's featured FREEBIE is also about the 4 seasons. It's a sweet set of seasonal posters, one of which combines all of the seasons in one silly picture, which students can label. I hope you find them useful. Well that's it for today. Thanks for stopping by. "One of the most beautiful things about learning, is that no one can ever take it away from you." -B.B. King
<urn:uuid:9bdc3918-a5bd-44b1-b3a9-a1248b45254c>
CC-MAIN-2022-05
https://www.teachwithme.com/blogs/getting-to-the-core/item/5192-4-seasons-4-seasons-games-4-seasons-writing-prompts-4-seasons-bulletin-boards-4-seasons-puzzles-4-seasons-centers-4-seasons-crafts
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303709.2/warc/CC-MAIN-20220121192415-20220121222415-00622.warc.gz
en
0.95498
833
2.984375
3
1.756025
2
Moderate reasoning
Education & Jobs
Topics and Objectives (Module 2) A. Time Measurement and Problem Solving Standard: 3.NBT.2, 3.MD.1 Days: 5 Module 2 Overview Topic A Overview Lesson 1: Explore time as a continuous measurement using a stopwatch.(Lesson 2: Relate skip-counting by 5 on the clock and telling time to a continuous measurement model, the number line.() (Worksheet Sprint A) (Worksheet Sprint B. View Homework Help - Homework 3.7 to 3.16.docx from DEAF 310 at Sacramento City College. DEAF 310 ASL 1 Signing Naturally Unit 3 Homework 3:7 Homework 3:8 Write the Numbers 1. 32 2. 66 3. 61 4. 40 5. Lesson 3.4 Lesson 3.5 Lesson 3.6 Lesson 3.7 Lesson 3.8. Lesson 4.1 Lesson 4.2 Lesson 4.3 Lesson 4.4 Lesson 4.5 Lesson 4.6 Lesson 4.7 Lesson 5.1. Lesson 5.2 Lesson 5.3 Lesson 5.4 Lesson 5.5 Lesson 5.6 Lesson 5.7. Practice Reteach Enrichment. Homework Problem Solving English Learners. Houghton Mifflin Math; Grade 5; Leveled Practice; Education. Lesson 15 Homework 3 7 Lesson 15: Solve word problems to determine perimeter with given side lengths. Name Date 1. Miguel glues a ribbon border around the edges of a 5-inch by 8-inch picture to create a frame. What is the total length of ribbon Miguel uses? 2. A building at Elmira College has a room shaped like a regular octagon. LESSON 3: Study Guide Answer Key SA3:10 Sight and Sounds of Greek Words (Module A) A Word to the Wise. After checking your answers to Lesson Three Study Guide, work through the study aids provided for this lesson. It is essential to be fluent as quickly as possible in reading the Greek letters, and correctly pronouncing words. Round Decimals - Lesson 3.4. Decimal Addition - Lesson 3.5. Decimal Subtraction - Lesson 3.6. Estimate Decimal Sums and Differences - Lesson 3.7. Add Decimals - Lesson 3.8. Subtract Decimals - Lesson 3.9. Patterns with Decimals - Lesson 3.10. Problem Solving Add and Subtract Money - Lesson 3.11. Choose a Method - Lesson 3.12. Performance Task. Recent Downloads. ctip general awareness answers; mkt 421 final exam answers 2019 uop; answer to interrogatories nj; biology semester 1 study guide answer key. Answer Key: Lesson 5.3 Homework - Part 1 - Vertical Translations - Answer Key Lesson 5.3 Class Notes - Part 1 Quiz on Lessons 5.1 and 5.2 on Tuesday, November 15th.
<urn:uuid:aa74ae2e-5357-4eaf-a5eb-b7cd0e6a6e1c>
CC-MAIN-2021-43
http://remoteoffice.dumb1.com/hausmann/Lesson-5-Homework-3.7-Answer-Key.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585424.97/warc/CC-MAIN-20211021133500-20211021163500-00176.warc.gz
en
0.738528
644
3.796875
4
1.460544
1
Basic reasoning
Education & Jobs
When Germana Soares was three months pregnant, she went to see her doctor. She was worried, as any expectant mother would be, because she had an itchy rash across her body. But since itchiness was her only symptom, her doctor simply treated her for allergies and sent her home with some medication. It seemed to work. Four days later, her rash had cleared up, and she stopped worrying. The rest of her pregnancy progressed relatively normally. But when her son was born, the doctor noticed something wasn’t quite right. Her son’s head was slightly smaller than it should be, and it was a little asymmetrical, with the left side somewhat smaller than the right. Remembering her rash from months prior, her doctor ordered a series of tests. This condition not only causes a baby’s head to be smaller than normal, but it can also cause a number of other lifelong health problems, including intellectual and developmental disabilities. And in Soares’ case, it was likely caused by a Zika virus infection (transmitted by an Aedes aegypti mosquito) while she was pregnant. Microcephaly is usually considered a relatively rare neurological condition, but in Brazil at that time — especially in the northeastern state of Pernambuco where Soares lives — it wasn’t. In fact, her state was at the center of a Zika pandemic that hit South America between 2015 and 2016, and it saw a huge spike in the number of microcephaly cases as a result. 874 cases of microcephaly — more than any other region in the country. They were scared of prejudice and discrimination, she says through a translator. They were so scared that they decided they would have to hide their son’s illness from the world. They thought it was the only way they could protect him from the kids who might pick on him, the adults who might make assumptions about him, and the society that might exclude him simply because he was born different. But when Soares took her son to his one-month doctor appointment, something wonderful happened: She met Gleise Kelly, another mother of a baby with microcephaly, and they became friends. They talked about their babies, how they both felt alone against the world, and how they felt misunderstood. Just talking to another person who was going through a similar experience helped them both feel so much better. And then, over the next few months as they went to the doctor, they started meeting other moms too. They all exchanged phone numbers to continue their discussions outside the waiting room. They set up a chat group on a phone app called WhatsApp. But Soares and Kelly wanted to go one step further, so they created the Facebook group União Mães de Anjos — the Union of Mothers of Angels. The Facebook group started with just eight mothers, Soares says, but within two months, they had 200. Today, about 400 mothers across Pernambuco have joined. The page became a way to share stories and to get advice on how to cope with the disease and with prejudice. It became a place to ask questions, a place to share resources, and an emotional support group. But slowly, the group also transformed into a way for them to make themselves known to the rest of the community — a community they felt wasn’t accepting of them or their children. “I won’t sit around,” Soares says through the translator. “I am going to do everything I can to fight for my child’s future and I am not going to just wait for people to include him in society.” And the entire group of mothers feels the same way. União Mães de Anjos became their way to raise awareness about microcephaly and to fight for inclusion on behalf of their children. It gave them a voice. And it worked. Their group started getting attention in the local press, and the mayor of Pernambuco reached out to them to organize a meeting so that he could better understand what they were going through and what the government could do to help them. The meeting has now turned into a weekly phone call or in-person meeting, allowing the mothers to advocate on behalf of their children. And Soares says she has begun to see results. For example, there are now more neurologists working in the state to support them. They also receive donations of diapers, food, and clothes, and the group distributes those across the state. Fighting prejudice doesn’t happen overnight, Soares says. Instead, you have to work at fighting it from the ground up — starting inside homes and schools — so that change can happen naturally. “People should respect everyone’s children. They are human beings. They did not choose to be born this way — they are all victims of an illness that was unknown at the time,” she says. “Everyone thinks things will never happen to them — only to others. That is, until it actually does [happen to you].” Soares’ son is now 18 months old, and while he shows some motor skill developmental delays due to his microcephaly, he is showing improvement every day thanks to some early stimulation and therapy. Microcephaly exists and it isn’t going away just because people are uncomfortable with it, Soares says. The best thing they can do is raise awareness of it, help those that need it, and fight prejudice so that every child gets the respect and acceptance they deserve.
<urn:uuid:6e2fe3ec-cd12-4448-aed2-807d8fc8c86d>
CC-MAIN-2017-30
http://madridwriterspress.com/in-brazil-mothers-are-confronting-prejudice-by-raising-awareness-about-microcephaly/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425144.89/warc/CC-MAIN-20170725102459-20170725122459-00545.warc.gz
en
0.984446
1,168
2.640625
3
2.977741
3
Strong reasoning
Health
When it comes to how maps have evolved through history, you should know five maps played a significant role. These accurately documented the evolution of our world, and if you take a closer look at all five of them, you can quickly identify key elements of the modern map. Hence, let’s see up next, which are those five maps that contributed to the mapped world we know today. #1 Ptolemy’s 13th-century map Ptolemy is considered to be the father of geography. He was a scholar with an interesting view over the world, which ultimately gave him the title of father of geography. He created several small maps to create the world’s first global map. An interesting about this 13th-century map is that Europe is positioned in the center. Of course, he didn’t add the Pacific or the American land, as it was yet to be discovered at that time. #2 Muhammad al-Idrisi 1154’s circular map Experts say that al-Idrisi’s vision of the world is a rather interesting one. It was a fact that the world might be round, which is why this circular map attempted to describe it as that. As for today, this is viewed as one of the most advanced ancient maps, as both Islamic and Western cultures influence it. #3 Martin Waldseemuller 1507’s map This is a key map concerning how maps have evolved throughout history. It is the first one to acknowledge and document America. Waldseemuller used the information of the cartographer Amerigo Vespucci, so that he created an accurate map of all the lands comprising our world. Yet, this map came out in only one exemplary, and it got lost, being rediscovered back in 1901. #4 Halford Mackinder 1904’s map Halford Mackinder is considered to be an important contributor to how maps are designed today, along with hoe geography, is perceived. He was the one that paved the path to the birth of geopolitics. He created an interesting geopolitics map of the 1900s, offering an accurate depiction of how continents are positioned and how they can gain power on the globe. #5 Google Earth And since Google shared with the world the 2011s novelty consisting of Google earth, we can say with certainty that this is the peak of map evolution through history. Up until that point, we had limited information about the world surrounding us, while the maps weren’t interactive. But Google Earth came to offer us a novel and enticing geographic component. We are able to see real time representations of specific locations, along with several other useful information. The bottom line is that maps evolved through history and were inspired by important personalities. No matter if we talk about Greek’s first world map or Google’s constant attempts to get us closer to distinct corners of the world, cartography is an interesting field one could study. As for today, the world continually changes, which is why we need to keep a close eye on those small, but important shifts.
<urn:uuid:8fdd9d3c-01ee-4546-99da-5dee3c52a060>
CC-MAIN-2022-40
http://www.mapcontext.com/author/wpadmin/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00444.warc.gz
en
0.965539
641
3.875
4
2.811629
3
Strong reasoning
History
Newcastle upon Tyne Newcastle upon Tyne (usually referred to simply as Newcastle or locally as 'Toon') is a city in the northeast of England, 280 miles north of London and located on the main railway and road between London and Edinburgh. It has many interesting bridges across the River Tyne. It has a population of 270,000, and has existed since being founded by the Roman emperor Hadrian. The people of Newcastle are known as "Geordies" and have a distinctive accent. The New Castle for which the city was named was first established in 1080 at a strategic crossing-point of the River Tyne and a medieval borough was chartered to serve the castle. In 1400 Newcastle became 'the town and county of Newcastle upon Tyne' - that is, it was removed from the authority of the Sheriff of Northumberland and became a county in its own right. It became a city in 1882, and St Nicholas's church was elevated to become a cathedral in 1906, when the diocese of Newcastle was formed from the diocese of Durham. Newcastle's prosperity was at first based upon the castle and on the export of hides, but from the early modern period coal mining and coal export grew to become a massive part of the local economy; glass-manufacture, chemicals, iron smelting, armaments manufacture and shipbuilding followed (all industries making use of the regional coal reserves). The essentially medieval streetscape of Newcastle was radically altered in the 1830s when the developer Richard Grainger (1797-1861) purchased the house and extensive grounds of Anderson Place, in the heart of the city, and there constructed several imposing modern streets in a severe classical idiom, with markets, Theatre Royal and Exchange. The architects John Dobson and John and Benjamin Green were associated with the redevelopments (the Greens designing the Theatre Royal). The two main streets, Grey Street and Grainger Street, converge on a large monument celebrating Earl Grey and the 1832 Reform Act. This district is today known as 'Grainger Town' as was the subject of an extensive refurbishment plan in the 1990s. It has the greatest concentration of listed buildings (or architectural or historical interest) of any English provincial city apart from Bath. Further planned city centre redevelopment took place in the 1960s and 1970s as part of a plan devised by the regional political leader T. Dan Smith and Newcastle's head of planning, Wilfred Burns. The intent was to create in Newcastle a 'regional capital', and, with some foresight, encouraging arts, tourism and education as economic drivers. The brutalist architecture of the period has llkeft its mark on areas of the city, notably the Central Motorway (which Burns sought to celebrate as a visual feature, rather than hide) and an area of multi-level development, segregating pedestrians from traffic, around the central library. Much of this latter area has since been cleared. A more valued legacy from the period is Newcastle Civic Centre, the council chamber of which was built large enough to serve as the location of a Northern regional assembly. Since the 1990s the Quayside area, originally the commercial heart of the city but subject to increasing dereliction, has been subject to an extensive redevelopment. It is now an area of popular recreation, with prestige offices, promenades, hotels, bars, restaurants, cafes and riverside apartments, and is linked by a new bridge to the Baltic Contemporary Arts Centre and the Sage Music Centre in Gateshead. Business and industry Heavy industry is now a thing of the past (with the exception of turbine manufacture, a technology invented in Newcastle by Sir Charles Algernon Parsons of Turbinia fame). The economy is based on public administration (the Department of Work & Pensions offices on the edge of the city are the biggest concentration of civil servants outside London), local government, food manufacture, education (the city has two higher education institutions, Northumbria University and the University of Newcastle upon Tyne), retailing, and leisure & tourism. Newcastle has a thriving night life, based on clubs and bars in the Bigg Market and Quayside areas. Sport plays an important role in Newcastle, principally the local football team, Newcastle United Football Club, who play at St James' Park in the city centre. There is also a successful rugby union team, the Newcastle Falcons, and basketball and speedway teams. Horse racing takes place at Gosforth Park, and greyhound racing and speedway at Brough Park in Byker. Newcastle is the starting point for the world's largest road race, the Great North Run. Every year in the early autumn tens of thousands of people run this half-marathon along public roads between Newcastle and South Shields.
<urn:uuid:9fe8dae1-fe5c-4db6-a0ea-280b41713f39>
CC-MAIN-2018-34
https://www.conservapedia.com/index.php?title=Newcastle_upon_Tyne
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221215261.83/warc/CC-MAIN-20180819165038-20180819185038-00365.warc.gz
en
0.966499
967
2.59375
3
2.322982
2
Moderate reasoning
History