text
stringlengths 222
548k
| id
stringlengths 47
47
| dump
stringclasses 95
values | url
stringlengths 14
1.08k
| file_path
stringlengths 110
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 53
113k
| score
float64 2.52
5.03
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
The European Organisation for Astronomical Research in the Southern Hemisphere (ESO) is the foremost intergovernmental astronomy organisation in Europe and the world's most productive ground-based astronomical observatory. ESO carries out an ambitious programme focused on the design, construction and operation of powerful ground-based observing facilities enabling astronomers to make important scientific discoveries. ESO operates three unique world-class observing sites in the Atacama Desert region of Chile: La Silla, Paranal and Chajnator. The ESO headquarters are located in Garching, near Munich, Germany.
At Paranal, ESO operates the Very Large Telescope, the world's most advanced visible-light astronomical observatory. ESO is a major partner in ALMA, the largest astronomical project in existence. And on Cerro Armazones, ESO is building the 39-metre European Extremely Large Telescope, which will become "the world's biggest eye on the sky" and whose operations will be fully integrated into the Paranal Observatory.
For its Maintenance, Support and Engineering (MSE) Department at the Paranal Observatory, ESO is inviting students from European and Chilean Universities in their career's last period, to participate in the following programme:
Winter Internship 2018
The MSE Department of the Paranal Observatory provides technical support to the four VLT 8-m telescopes, to the VLT Interferometer with its auxiliary telescopes and to all instruments available for scientific observations. The telescopes and instruments are complex systems that involve many advanced technologies and require a high level of engineering support. The MSE Department of Paranal has a total workforce of 67 engineers and technicians distributed in 5 engineering groups.
The three projects for the period 2018 are:
I.- STUDY THE INCREASE OF THE VLTI DELAY LINE STROKE TO IMPROVE SKY COVERAGE.
SUMMARY The limited stroke of the delay lines (DL) severely restricts the sky coverage in some cases, for example, when the baseline is large, and when the stations are not located symmetrically around the laboratory. One can think of several solutions to overcome those limitations, among others:
- Add fixed optical path length (OPL) offsets to some Auxiliary Telescope (AT) stations to overcome the zero OPL.
- Use the DL in double path to increase the OPD stroke.
OBJECTIVES Theoretical activities, questions to be answered:
1. Feasibility of adding fixed OPL offsets to some AT stations.
2. Feasibility of using the DL in double path.
3. In both cases, calculate the loss of transmission and optical quality.
4. Calculate the sky coverage obtained with those two solutions.
5. Prepare a report including the requirements for the DL upgrade, designs overviews with associated performance for the trade-of study.
1. Participate to a simple test for the double path experiment.
2. Help for the alignment of one or two M12 to enable the use of new stations.
STUDENT PROFILE Physics/Optics student with a good theoretical and practical background in classical optics. He/she should be an experienced Zemax user and have some experience in optical design
DURATION AND SHIFT 4 to 6 months, with 8x6 shifts at Paranal, aligned with supervisor.
II.- PREDICTIVE MAINTENANCE ROUTINE BASED ON TOOLS: VIBRATIONS AND ULTRASOUND
SUMMARY The Mechanics Group acquired two measuring and monitoring tools, which require a learning process and the re-definition of the actual Predictive Maintenance Plan. The two measurement equipment are:
- Vibrations Instrument: Adash VA4Pro.
- Ultrasound Instrument: UE Ultraprobe 9000.
- To learn how to use both the Vibration and Ultrasound measuring instruments.
- Train ESO & Contractors staff to operate these instruments.
- Check/improve the actual predictive maintenance master plan, defining which equipment should be monitored, highlights critical and secondary priorities, define the relevant scheduling.
- For the vibrations measurements, in order to assure measurement repeatability: write detailed procedures where the positions of measurement are clearly defined; the sensor orientation; the operational conditions of the equipment to be monitored. This procedure should be prepared to be inserted in our CMMS (Maximo).
- In case of pumps, complement the vibrations measurements with temperature and current measurement, (temperature to be measured with IR gun), marking on site the points where temperature is measured to assure repeatability.
- Perform the first round of measurements to be used later as baseline.
- Evaluate the applicability of specific vibrations analysis techniques (such as demodulation and similar), to the rotation mechanism of the enclosures, in order to verify if vibration measurements could represent a valid predictive tool for such slow speed rotating equipment.
STUDENT PROFILE Mechanical Engineer, both Executive ('Ejecucion en mantenimiento') or Civil are suitable, with knowledge (university courses done) on predictive maintenance techniques, vibrations and ultrasonic.
DURATION AND SHIFT 5 months, with 8x6 shifts at Paranal, aligned with supervisor, as of June 2018.
III.- INDUSTRIAL COMPUTER MONITORING
SUMMARY We lack monitoring points for the computers installed in the UT enclosures. We are now installing Wi-Fi in order to read data from new devices in the field. We expect to improve our capability of predictive and on-condition maintenance and save some money on spares, as well as prevent unexpected failures in electronics racks.
OBJECTIVES Review the work done as well as the results obtained by the previous student, and evaluate a solution based in low-cost massively available Linux-ARM boxes (such as the Raspberry Pi and similar devices). This solution must be useful for:
1. Maintenance, by continuously monitoring fans, VME crate temperatures, power supplies and other easy to measure parameters that will allow MSE engineers to perform better predictive maintenance;
2. The electronic and software groups to replace the old netbooks used as console inside the telescopes;
3. The electronic lab, in order to simplify the Local Control Unit (computer used in the field for telescope systems) diagnosis and rom programming.
The solution must be based in of-the-shelf hardware and commonly used Linux tools, plus some high level python scripts in order to simplify obsolescence management, taking into consideration that low-cost devices evolution is extremely fast but the framework in which they are based is very stable. Implement a robust prototype in the lab and deploy it inside a telescope for tests.
STUDENT PROFILE Either electronics or computing student with knowledge of control/monitoring/automation processes, and with a strong background in Python, and ARM boxes.
DURATION AND SHIFT 4 to 6 months, with 8x6 shifts at Paranal, as of June 2018.
ESO offers a special allowance during the period you are performing your apprenticeship with us; transportation arrangements (plane tickets) from and to Santiago are provided by ESO, with accommodation provided on site. We also cover the cost of an International return trip from/to for students from European universities. The Duty Station is Paranal Observatory, in the II Region, 150km South of Antofagasta. Working schedule will be 8 days on duty and 6 days off duty (8x6).
We invite all students from European and Chilean Universities in their career's last period to apply. The apprenticeship should be supported by the University (Letter should be provided). If you are interested in working in areas of frontline technology and in a stimulating international environment, you are invited to apply online http://recruitment.eso.org/. Applications must be completed in English and should include a motivational letter indicating the project you are interested to apply to, and CV.
The initial deadline for receipt of applications to be considered for the position is 31 May 2018 . However, applications will continue to be accepted until the position is filled.
The post is equally open to suitably qualified candidates irrespective of gender, age, disability, sexual orientation, race or religion.
|
<urn:uuid:3dbf6b78-bb20-45ba-99e4-4234c320f677>
|
CC-MAIN-2019-18
|
https://recruitment.eso.org/jobs/2018_0013/?apply=true
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578551739.43/warc/CC-MAIN-20190422095521-20190422121521-00362.warc.gz
|
en
| 0.898342 | 1,691 | 2.59375 | 3 |
Spruce Beetle — Biology
A brief synopsis of the spruce beetle's life history is as follows:
- Adult females emerge when ambient air temperature exceeds approximately 16* C, find new suitable host material, and emit aggregating pheromones to initiate mass attack.
- Males join the females and each pair construct an egg gallery under the bark, parallel to the grain.
- The sapwood is inoculated with spores of a blue stain fungus as the egg gallery is built.
- Eggs are laid and hatch into larvae which feed on the phloem in feeding channels constructed at right angles to the egg gallery.
- After four instars, larvae pupate and develop into adults under the bark.
- Young adults pick up blue stain fungal spores while in the pupal chamber.
The bark beetle species have similar life cycles, progressing from egg through four larval instars to pupa and finally to adult. However, differences in these beetles' timing and duration affect the selection and application of management tools.
The timing of life-cycle events for any species of bark beetle will vary from year to year and from location to location due to variations in climate and local weather. The timing of various components of the life cycles are summarized in the following table.
The action of the larval feeding in the phloem and fungal colonization of the sapwood completely blocks all translocation tissues and kills the infested tree. In some cases only one side of a tree will be successfully attacked (strip attack); this tree will survive unless living portions are re-attacked in subsequent years.
Adults construct long galleries in the phloem. Light brown to red-brown boring dust will be present on the bark or around the base of infested trees. Pitch tubes are rarely formed by resin flowing out of the entrance holes made by attacking beetles.
Sometimes flaking of the bark by woodpeckers is a sign of infestation. Fading of the foliage to a yellowish-green is usually not noticeable until 18 months or longer following attack, particularly on rich sites. By the second autumn, most of the needles have usually turned brown and are shed by the following spring. Green needles on the ground or on the leaves of ground cover beneath infested trees may appear before any evidence is visible in the crown itself.
Spruce beetles normally infest downed trees or logging debris, but when beetle populations are large, they will attack and kill living trees, causing widespread damage. Large-diameter, mature spruce species are attacked, including Engelmann, white, Sitka and (rarely) black spruce.
Trees are killed when the flow of food and water between the roots and needles is blocked by a combination of feeding larvae and dead sapwood cells killed by the blue-stain fungi carried by the spruce beetle adults.
Attacks by secondary bark beetles may produce boring dust in bark crevices. Ips beetle species — sometimes known as engraver beetles — can be distinguished by the gallery patterns and the lack of frass in galleries. The adult ips beetle differs from the spruce beetle in that it has a rear concave depression lined with spines. Spruce beetle larvae can be distinguished from most other Dendroctonus species by the presence of two anal shields.
|
<urn:uuid:324c434b-3593-43ea-9e65-860bc49abe0e>
|
CC-MAIN-2018-30
|
https://www2.gov.bc.ca/gov/content/industry/forestry/managing-our-forest-resources/forest-health/forest-pests/bark-beetles/spruce-beetle/biology
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676594675.66/warc/CC-MAIN-20180722233159-20180723013159-00609.warc.gz
|
en
| 0.948787 | 677 | 3.921875 | 4 |
Dr. Singleton, a British conservationist is leading an ambitious plan to create a chain of man-made islands in northern Sumatra that would liberate sick or injured orangutans that currently live in cages.
“Depending on the site, it shouldn’t take us too long to create the islands, as long as the moats don’t leak,” Singleton told the Guardian. “The biggest challenge is finding the right land that has the right security and a water supply that isn’t full of effluent.”
Dr. Singleton leads the Orangutan Conservation Programme in the country that is funded by a Swiss NGO, PanEco. His principal goal is to protect and rehabilitate the captive orangutans, but also hopes an education centre and guided walks will help improve the local population’s understanding of these shy creatures.
There are only an estimated 6,000 orangutans left in Sumatra, due to deforestation and conflict with humans.
|
<urn:uuid:ad49455d-93e7-41f2-af89-414d1bd7422f>
|
CC-MAIN-2018-39
|
http://www.onegreenplanet.org/news/indonesia-may-create-islands-for-orangutans/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156252.31/warc/CC-MAIN-20180919141825-20180919161825-00220.warc.gz
|
en
| 0.923867 | 209 | 3.140625 | 3 |
Inexpensive transition metal oxides are competitive water oxidation catalysts (WOCs) in alkaline media. However, they cannot compete with noble metals in acidic media, in which hydrogen production is easier and faster.
José Ramón Galan-Mascaros, Institute of Chemical Research of Catalonia (ICIQ), Tarragona, Spain, and colleagues have investigated WOCs based on earth-abundant metals. They have developed catalysts with enhanced activity containing insoluble salts of polyoxometalates (POMs) with cesium or barium counter-cations. In particular, the barium salt of a cobalt-phosphotungstate polyanion (Ba[Co-POM]) outperforms the state-of-the-art IrO2 catalyst even at pH < 1. Lower onset potentials, higher current densities at lower overpotentials, and Faradaic oxygen evolution demonstrate that these salts are an alternative to the corresponding noble metal catalysts.
In addition, the team has found that a carbon paste (CP; formed by carbon black and an organic oil binder) conducting support with a hydrocarbon binder can improve the stability of metal-oxide catalysts in acidic media by providing a hydrophobic environment. Part of the better performance of the Co-POM/CP electrodes could arise from a better matching between the CP support and the Co-POM catalysts when compared with IrO2. The findings of the team suggest that the use of an insulating hydrocarbon binder, and an appropriate conducting support, could extend the use of classic metal oxides into acidic media oxygen evolution reaction (OER) catalysis.
The catalysts work especially well at low voltages. This saves electricity and will allow, according to the researchers, soon, to obtain the energy required for water splitting from renewable sources like solar panels. This is the first time that a competitive activity is found in a low cost, earth-abundant material, opening unprecedented opportunities to develop technologically and economically viable acid water electrolysis.
- Polyoxometalate electrocatalysis based on earth-abundant metals for efficient water oxidation in acidic media,
M. Blasco-Ahicart, J. Soriano-López, J. J. Carbó, J. M. Poblet, J. R. Galán-Mascarós,
Nature Chem. 2017.
|
<urn:uuid:94fd93cd-a571-4761-a352-03a44465a9dc>
|
CC-MAIN-2023-50
|
https://www.chemistryviews.org/details/news/10675999/Cobalt-Tungsten_Catalyst_For_Water_Splitting/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.17/warc/CC-MAIN-20231205105136-20231205135136-00242.warc.gz
|
en
| 0.901988 | 507 | 2.859375 | 3 |
With a casual launch schedule running from 2014 to 2017, Egyptian Symbols from numiartis was an attractive series of three, 3oz silver coins bringing to life some of the more famous motifs of Ancient Egyptian Culture. The Ankh and the Eye of Horus were fine looking coins, but the third, Winged Isis, was really beautiful and boded well for a fourth release that never came.
Fortunately, the concept is back off hiatus with Egyptian Symbols II. The first coin to launch is ‘Bastet’, the goddess that protected the worshippers home from evil spirits and diseases. Bastet was associated with woman above all else, particularly fertility and chilbirth, but also with the Egyptian civilisations favourite animal, the humble cat (if you could ever call a cat humble, that is…)
An incredibly popular deity, as you’d expect from a domestic guardian, she was the daughter of Ra, and over the history of Egypt, changed from a third millennium BCE depiction as lioness-headed, to having the head of a cat some 2,000 years later. It’s easy to understand why Bastet was so popular. Cats keep down vermin, thus protecting grain and stopping the spread of disease. They also protect their young in a highly relateable way. Worship of the goddess faded in the Ptolemaic era, although the Greeks sometimes equated her with their own goddess, Artemis.
|
<urn:uuid:af011835-c8cc-49e4-8e9c-35f738f9e76a>
|
CC-MAIN-2021-31
|
https://agaunews.com/the-cat-god-bastet-ushers-in-the-second-series-of-egyptian-symbols-coins-and-we-have-a-sneak-peek/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154310.16/warc/CC-MAIN-20210802075003-20210802105003-00719.warc.gz
|
en
| 0.971706 | 295 | 2.625 | 3 |
The temperature-dependent change in volume of polystyrene can be measured with a dilatometer using a special cylinder as a sample holder.
Before the 1st heating, the sample was aged below Glass Transition TemperatureThe glass transition is one of the most important properties of amorphous and semi-crystalline materials, e.g., inorganic glasses, amorphous metals, polymers, pharmaceuticals and food ingredients, etc., and describes the temperature region where the mechanical properties of the materials change from hard and brittle to more soft, deformable or rubbery.glass transition temperature (Tg); the 2nd heating was conducted on the same sample after controlled cooling. The volume RelaxationWhen a constant strain is applied to a rubber compound, the force necessary to maintain that strain is not constant but decreases with time; this behavior is known as stress relaxation. The process responsible for stress relaxation can be physical or chemical, and under normal conditions, both will occur at the same time. relaxation for the 1st heating is clearly visible at the Tg, as is the change in slope at the Tg for the 2nd heating. (measurement with DIL 402 C)
|
<urn:uuid:264a5a70-97be-4296-ae15-c7f90e39ec41>
|
CC-MAIN-2022-21
|
https://analyzing-testing.netzsch.com/ja/applications/thermal-insulation/polystyrene-ps
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662570051.62/warc/CC-MAIN-20220524075341-20220524105341-00252.warc.gz
|
en
| 0.93857 | 257 | 3.0625 | 3 |
How Similar Is Spanish To Italian?
Spanish and Italian are mutually intelligible to various degrees. They both come from “Vulgar Latin ” that’s why they have so much in common. Italian and Spanish share 82% lexical similarity.Feb 18 2021
Can Italians understand Spanish?
Surprisingly yes! It is entirely possible for an Italian speaker to understand Spanish but each person needs to adapt speak slowly and sometimes change their vocabulary. Spanish and Italian are two languages that are very close in terms of vocabulary and grammar.
Is Italian easy if you know Spanish?
What harder Spanish or Italian?
So is learning Italian harder than Spanish Portuguese and French? … It’s a little more difficult than Spanish because the pronunciation of this language is more challenging but it is very similar to Spanish in vocabulary and grammar.
Is Spanish more useful than Italian?
First of all Spanish is much more important than Italian due to the number of countries it is spoken in and consequently used throughout the world much more than Italian. Furthermore Spanish is a more standardized language which makes it easier to learn.
Is Italian a dying language?
Fastest declining languages spoken at home in the US.
Is Spanish more useful than French?
Spanish & French both are considered good for learning due to their potential speaking base in the complete World. As per my experience and understanding Spanish is the most easiest as well as most Spoken European language in the World after English.
What is the hardest language to learn?
As mentioned before Mandarin is unanimously considered the toughest language to master in the world! Spoken by over a billion people in the world the language can be extremely difficult for people whose native languages use the Latin writing system.
Why are Spanish and Italian so similar?
Which language is easiest to learn?
- Afrikaans. Like English Afrikaans is in the West Germanic language family. …
- French. …
- Spanish. …
- Dutch. …
- Norwegian. …
- Portuguese. …
- Swedish. …
Can I learn Spanish in 3 months?
If you have just started learning Spanish it is understandable that you would want to become fluent in Spanish quickly. It is possible to achieve this goal in three months provided you do the work and stay consistent throughout the process of learning Spanish.
Should I learn French or Spanish?
Can Spanish speakers read Italian?
Is it easier to learn Spanish or French?
Spanish is arguably somewhat easier for the first year or so of learning in large part because beginners may struggle less with pronunciation than their French-studying colleagues. However beginners in Spanish have to deal with dropped subject pronouns and four words for “you ” while French only has two.
Is Italian a beautiful language?
Italian. When it comes to the most attractive languages for many people the native language of Italy likely springs to mind. Italian is a famously beautiful language with its rolled ‘r’s round vowels and melodic rhythm.
What is the most forgotten language?
- Latin Dead Language: Latin as a dead language was one of the most enriched languages. …
- Sanskrit Dead Language: …
- Coptic No Longer Alive: …
- Biblical Hebrew Expired Language: …
- Ancient Greek Departed Language: …
- Akkadian No Longer Alive:
What is the rarest European language?
- Tsakonian. Country: Greece. …
- Gottscheerish. Country: Traditionally Slovenia but most speakers now live in the US. …
- Hértevin. Country: Formerly Turkey. …
- Karaim. Countries: Lithuania Crimea Poland and Ukraine. …
- Cornish. Country: Cornwall United Kingdom. …
Is Spanish useful in Canada?
In addition to its two official languages there are more than 200 languages spoken in Canada from Blackfoot to Tagalog. One of the fastest growing Spanish however is one that is increasingly important not only for individuals but also for business.
Which foreign language is best for career?
- Mandarin Chinese.
Which foreign language is in demand?
- Mandarin/ Chinese language. …
- Spanish. …
- Portuguese. …
- German. …
- French. …
- Russian. …
- Japanese. …
What is the sweetest language in the world?
Bengali: Originated from Sanskrit Bengali has been ranked the sweetest of all languages in the world. It is spoken mainly in parts of east India (West Bengal) and all over Bangladesh.
Is Italian hard to learn?
Italian a Romance language is closely related to all of the other languages in the same family like Spanish French and Portuguese to name a few. … For this reason Italian is often considered one of the easiest languages for English speakers to learn.
Is Spanish the hardest language to learn?
What language is closest to Italian?
Are Italian and Spanish genetically similar?
One thing that 23andme results GEDMatch and many genetic studies have consistently shown is that Iberians are genetically not very similar to the southern 2/3 of Italy nor to Greece.
Are French and Spanish similar?
What language is closest to English?
Is French easier than Italian?
When comparing the difficulty of the two languages I’ve got to say this: Italian is much easier pronunciation-wise than French. … As are many of the other French vowels such as the French “u” “e” and several others. So there’s no doubt that Italian vowels are easier to pronounce than those that exist in French.
Is Italian easy to learn for English speakers?
Is Italian hard to learn for English-speakers? We have good news: The Foreign Service Institute (FSI) considers Italian to be one of the easiest languages for English-speakers to learn. In fact they estimate that you just need twenty-four weeks (or 600 hours) to acquire basic fluency.
Is Spanish easier than English?
Spanish is one of the languages that belong to the Romance language family so learning Spanish for a native French or Italian speaker is much easier than for an English speaker. … The grammar and vocabulary make the Spanish language difficult and have some of the most difficult skills to master.
What is the fastest way to learn Spanish?
- Immerse Yourself. …
- Make Learning Fun. …
- Practice Listening. …
- Change Your Phone Settings to Spanish. …
- Make Your Own Vocabulary Lists. …
- Form a New Habit. …
- Find a Language Buddy. …
- Try Spanish Shadowing.
How many hours does it take to become fluent in Spanish?
According to an FSI study it should take 600 classroom hours to achieve conversational fluency in Spanish. Furthermore they suggest an approximate 1:1 ratio between time spent in the classroom and time spent studying independently (most people miss this part).
What is a fun language to learn?
Spanish. Its usefulness aside (more than 400 million people speak it natively) Spanish is really entertaining to learn especially in your first few classes when your mind will be filled with images of Speedy Gonzales Puss in Boots Dora the Explorer and other Latino or Spanish characters.
Is learning Spanish useful?
Spanish is the second most spoken language in the world and it is the most spoken language in the Americas. … It’s a useful language to know when doing business with Spanish or Latin American firms and a great way to strengthen your resume and improve your career prospects.
How Similar Are Spanish and Italian?
Similarities Between Spanish and Italian
Can Spanish Speakers Understand French Italian or Portuguese?
Spanish vs. Italian vs. French vs. Portuguese | Romance Languages Comparison
|
<urn:uuid:44d9c0ad-476a-4611-8fb7-f0dd3e240110>
|
CC-MAIN-2022-33
|
https://www.microblife.in/how-similar-is-spanish-to-italian/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00161.warc.gz
|
en
| 0.944995 | 1,667 | 2.75 | 3 |
Sea robbery is a term used to describe attacks upon commercial vessels in ports and territorial waters. Such attacks are, according to international law, not true acts of piracy but rather armed robberies. They are criminal assaults on vessels and vessel crews, just as may occur to truck drivers within a port area. Such attacks pose a serious threat to trade. The methods of these attacks have varied from direct force using heavy weapons to subterfuge in which the criminals have identified themselves on VHF radio as the national coast guard.These maritime criminals are inclined to operate in waters where government presence is weak, often lacking in both technical resources and the political will to deal effectively with such attacks. International law permits any warship or government vessel to repress an attack in international waters. In a state's territorial waters, such attacks constitute an act of armed robbery and must be dealt with under the laws of the relevant coastal state. These laws seldom, if ever, permit a vessel or warship from another country to intervene. The most effective countermeasure strategy is to prevent criminals initial access to ports and vessels, and to demonstrate a consistent ability to respond rapidly and effectively to notification of such a security breach. Acts of piracy can only be committed by private ships or private aircraft. A warship or other public vessel or a military or other state aircraft cannot be treated as a pirate unless it is taken over and operated by pirates or unless the crew mutinies and employs it for piratical purposes. By committing an act of piracy, the pirate ship or aircraft, and the pirates themselves, lose the protection of the nation whose flag they are otherwise entitled to fly. To constitute the crime of piracy, the illegal acts must be committed for private ends. Consequently, an attack upon a merchant ship at sea for the purpose of achieving some criminal end, e.g., robbery, is an act of piracy as that term is currently defined in international law. Conversely, acts otherwise constituting piracy done for purely political motives, as in the case of insurgents not recognized as belligerents, are not piratical. International law has long recognized a general duty of all nations to cooperate in the repression of piracy. This traditional obligation is included in the 1958 Geneva Convention on the High Seas and the 1982 LOS Convention, both of which provide: "[A]ll States shall cooperate to the fullest possible extent in the repression of piracy on the high seas or in any other place outside the jurisdiction of any State."
It is widely accepted among the government and non-government organizations that track piracy worldwide (including the U.S. Office of Naval Intelligence (ONI), U.K. Defense Intelligence Service (DIS), Australian Defence Intelligence Organization (DIO) and the International Maritime Bureau (IMB)), that the annual number of piracy cases is seriously undercounted. DIS estimates the actual number of piracy cases could be 2,000 percent higher on an annual basis while DIO estimates the underreporting to be 20 to 70 percent.44 Since the establishment of the IMB's Regional Piracy Center in Malaysia in 1992 and its subsequent efforts to publicize the piracy problem, there has been increased reporting on major incidents, but incidents involving fishermen and recreational boaters are still heavily undercounted. Also, the average loss from a piracy incident does not cross the monetary threshold for insurance action, further contributing to underreporting. Most incidents will continue to go unreported except in cases where there is serious loss of property and life or damage to a foreign interest.The concentration of piracy incidents continues to be located in areas with little or no maritime law enforcement, political and economic stability, and a high volume of commercial activity. Incidents of piracy tend to occur in four regional areas: Southeast Asia, Africa, South America, and Central America. Furthermore, most incidents of maritime crime occur in coastal waters with nearly 80 percent of all reported piracy incidents occurring in territorial waters.
|
<urn:uuid:ace78ed0-7210-458f-a5f7-e4b780694b98>
|
CC-MAIN-2017-04
|
https://fas.org/irp/world/para/pirates.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283475.86/warc/CC-MAIN-20170116095123-00214-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.943616 | 784 | 3.171875 | 3 |
Location Location Location
This half term’s French lessons have been all about Location, Location, Location! We have learned the names of various shops and other places around town. We have learned how to ask for and give directions, as well as how to seek help and clarification if we are lost. The children excelled at translating French into English and constructing sentences.
|
<urn:uuid:6b883897-a64e-473b-9c86-4e2e091a63a2>
|
CC-MAIN-2021-31
|
http://boundary-backup.schoolspider.co.uk/location-location-location/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153803.69/warc/CC-MAIN-20210728220634-20210729010634-00424.warc.gz
|
en
| 0.982982 | 74 | 2.515625 | 3 |
Childhood Hunger in America
According to FeedingAmerica.org, 16.7 million American children faced hunger issues in 2008. In a country as abundant as this, why should this be an issue? Rearranging priorities may help. What if schools were required to have garden farms that provided nutrition for the entire neighborhood? This would be a simple program to implement. In fact, there are already grants and other plans in place for those who wish to do so.
Why Create School Garden Farms?
School gardens can help teach kids about agriculture. Giving them a head start in important sustainability lessons may help increase the chance of their success later in life. Schools are often the center of their neighborhood. It's where many events and gatherings take place. The farming could be implemented into the curriculum.
At harvest time for each plant, the kids can divide the crops evenly, according to how many people need them. There will likely be plenty for their families, as well as others in the neighborhood. If various crops are planted according to season, there should be plenty of food year-round. When school is not in session, the garden can still be maintained. This will help make up for the lack of nutrition many people suffer from.
Can School Gardens Really Reduce Childhood Hunger in America?
According to UrbanHarvest.org, community gardens help reduce hunger. Following that pattern, wouldn't it make sense that a school garden could help reduce hunger in children? If the food was distributed evenly to all neighborhood families by default, people may not be so hesitant to take it. Sometimes people are in need, but are embarrassed to admit they need help. Some may not have adequate transportation to get to that help.
By making the community garden a part of the school's curriculum and regular routine, it's possible that childhood hunger could be reduced significantly. Taking away the sometimes grueling application experience and other measures may make this option more desirable for some families. With this type of plan, no one needs to feel left out and no one needs to be put on the spot or labeled.
More on Hunger:
Feeding America Hunger and Poverty Statistics
Urban Harvest on Why Community Gardens are Valuable
Texas Agriculture Commissioner Todd Staples on Urban Gardens
*I originally published a version of this via Yahoo Contributor Network
|
<urn:uuid:c587fac9-4eea-492a-bb52-7373210582f4>
|
CC-MAIN-2022-27
|
http://www.lifesuccessfully.com/homelessness-social-justice-journal/category/garden-farms
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104354651.73/warc/CC-MAIN-20220704050055-20220704080055-00029.warc.gz
|
en
| 0.962543 | 465 | 3.046875 | 3 |
The primary omega-3 fatty acids essential to your good health are DHA, or docosahexaenoic acid, and EPA, or eicosapentaenoic acid. Both are well studied by the scientific community for health benefits ranging from strong hearts to mental well-being. Most people are aware of omega-3s as sourced from fish oil, but newly circulated information about omega-3s sourced from algae is raising questions about the difference and leading many to wonder which to use as a supplement. Talk to your health care provider before adding any supplement to your diet.
Why Algae Sourced?
The spotlight was thrown on algae-sourced omega-3s due to public outcry over krill processing for omega-3s. Krill are small, shrimp-like crustaceans that feed on algae, and, in turn, hundreds of marine animals feed on krill. Environmental activists raised sustainability issues about krill harvesting based on studies reporting decimation of animal populations that rely on krill for food. For example, an April 2011 article published by “Nutra Ingredients” reported that some penguin populations have fallen 50 percent due to a fall in the availability of krill. Consequently, attention fell on farming algae as the originating source of omega-3s.
The abundant omega-3 found in algae is EPA. When krill ingest algae, they metabolize it to create an additional form, DHA fatty acid. Thus, all fish owe their DHA content to krill synthesis. As researchers in the March 2010 issue of the “Journal of Agricultural and Food Chemistry” report, krill oil omega-3s are in the form of phospholipids, while fish oil omega-3s are in the form of triglycerides. The form the body uses is phospholipid; thus, krill omega-3s are much better absorbed by the human body, helping to account for their commercial success.
An April 2011 article published on the “Nutra Ingredients” website discusses a joint venture undertaken by a New Zealand–based company named Photonz Corporation to develop a pharmaceutical grade of EPA by fermenting algae. The fermentation process is proprietary, and it renders a highly purified and concentrated form of EPA. The company cites its extensive experience in working with EPA derived from non-algal sources, including fish, and, as of publication, it aims to market its concentrated version of EPA into the cardiovascular disease market.
Algae Same as Fish
Researchers reporting in the June 2011 issue of “Lipids in Health and Disease” examined the efficacy of using algae as an omega-3 source. They analyzed samples from seven species and found that while green algae, such as that which krill feed on, contain only EPA, red and brown species also contain DHA. They concluded algae provide a viable alternative omega-3 source, which is comforting news to vegetarians. However, they also confirmed that the form of omega-3s found in algae is triglyceride, the same as found in fish oil.
|
<urn:uuid:7500c013-a47e-4573-a69a-af360a969a74>
|
CC-MAIN-2017-39
|
http://www.livestrong.com/article/494410-difference-between-omega-3-algae-source/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687324.6/warc/CC-MAIN-20170920142244-20170920162244-00267.warc.gz
|
en
| 0.953711 | 625 | 2.90625 | 3 |
- Strategy and Management
- 3 min read
How Robotics, Drones, 3D printing are reshaping the food industry
Though, both the terms technology and food seem unrelated but tech is enhancing the food industry at scale.
There is no industry that isn’t penetrated by technology and the food industry is one of them. Technology over the years has changed how we produce and find our food through applications, robotics, data and processing techniques.
For the rapidly increasing world population, technology is helping food manufacturers to produce more efficiently, according to a report from ING. As the human population has reached 7.5 billion, the food demand is rising every year. By using tech to improve processing and packaging, the shelf life and safety of food can also be improved.
Robotics and Machines
With the usage of machines, the food industry could ensure that costs of keeping the food fresh are reduced and productivity is increased. “The rise of robotics in the food industry is a tangible example of food tech. The number of robots in the European food industry is well over 30,000, while the number of robots per 10,000 employees rose from 62 in 2013 to 84 in 2017. Although Germany is the largest market, robot density is relatively highest in Sweden, Denmark, the Netherlands and Italy,” according to the report.
Precision agriculture is a classic example of how technology can make a difference. It is the use of GPS tracking systems and satellite imagery to monitor crop yields, soil levels, and weather patterns to increase efficiency on the farm.
The farmers won’t only just see all that is happening across the fields, but they can also use analysis from the findings to test the soil and the health of the crops. All of this is enabled through drones. These drones can locate and identify diseased or damaged crops and tend to them immediately.
The use of these robots does not eliminate the need for food workers but helps them be more efficient with their work. With strict product requirements at large volumes and demand for lower pricing, the robotic elements help create a faster environment to produce more goods than regular labor.
3D printing has really taken off across many industries in the past few years, and the food industry is one of them. There have been several applications of 3D printing food from NASA printing a pizza to creating soft foods for those who cannot chew hard food to consume. It opens the door for innovation being able to create many things that were undoable earlier, while also being able to help with food sustainability. There are many ways 3D printing is shaking up the industry.
Packaging and Waste
Consuming healthy and sustainable goods is one of the biggest concerns of consumers right now. Consumers pay attention to labels and harmful ingredients, and with the advent of social media, companies cannot get away with it anymore.
Many companies use technology to help them “go green.” By using robotics and digitizing, companies in the food industry are able to find alternatives to plastics and other packaging options that are harmful for the environment.
Consumers are also looking for where companies are sourcing their products and how they are handling their waste. Currently, 40 percent of America’s food is thrown away each year. With the help of technology, there are strides being taken to reduce that number and utilize the extra food.
With all these advancements in technology, there are so many different ways that it can really change how food is produced. Evolving technology could be the key to eliminating world hunger and solving our waste problem- we will just have to wait and see.
The article first appeared on Forbes
|
<urn:uuid:d32dfda1-53d1-40b8-8365-02374028f3d7>
|
CC-MAIN-2023-40
|
https://cio.economictimes.indiatimes.com/news/strategy-and-management/how-robotics-drones-3d-printing-are-reshaping-the-food-industry/69156450
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510671.0/warc/CC-MAIN-20230930082033-20230930112033-00755.warc.gz
|
en
| 0.962582 | 743 | 2.90625 | 3 |
When the young Sarojini Naidu showed her early poetic efforts to Edmund Gosse for his comments, perhaps, she did not know that she was in for a shock . His words of admonition have since become part of history . He told her, " What we wished to receive was not a rechauffé of Anglo-Saxon sentiments in an Anglo-Saxon setting , but some revelation of the heart of India'.' "Sarojini Naidu's poetry was never to be the same again . Her mentor's advice sank deep into her mind . It proved to be a turning-point in her poetic career . She was none the worse for it because the glory that is ancient India and the grandeur that is modern India afforded her full scope for the play of romantic imagination with which she was abundantly blessed !
I consider "Village Song" as an authentic revelation of the heart of India as Edmund Gosse would have liked her poetry to be . In this dramatic lyric Sarojini Naidu reveals the heart of an Indian girl . The girl , carrying pitchers of Jumna water on her head, has to trek along a solitary stretch of land amidst thickening darkness . She blames herself for tarrying to hear the boatmen's song .After all, it was not her fault . Their song was so enthralling ! But now she is tormented by fears of all kinds . The cries of white cranes and owls fill her with superstitious fears . For a moment she thinks about her brother and mother who may be wondering about the cause of her delay . Her mind is again filled with fear of snakes and evil spirits . This wild area is prone to thunde-storms at this time of the year . She chants the name of Lord Rama to protect her from all harms .
This short poem reveals Sarojini Naidu's deep insight into the heart of I9ndian women . It points at Indian women's unflinching faith in their mythical heroes After reading the poem every reader might wonder whether the girl would have made it home if she hadn't had that strong enough faith in Lord Rama as her protector . The poem definitely has a symbolic level of meaning, too . The white cranes and owls symbolize the ills that the flesh is enduring in its journey through the world's wilderness . Indian women are sustained and supported in their moments of trials by their firm faith in their gods and goddesses .
|
<urn:uuid:9ffaca3e-2180-421b-9c27-9079326a230b>
|
CC-MAIN-2016-26
|
http://indoenglishpoetry.blogspot.com/2009/10/sarojini-naidu-village-song.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403508.34/warc/CC-MAIN-20160624155003-00025-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.975952 | 503 | 3 | 3 |
This wiring configuration will excite the alternator to start charging when the engine is running at low rpm s. Alt wire diagram alternator wiring and out the dash warning light 12 volt alternator wiring diagram.
Voltage and amperes varies depending on the type and its purpose but car alternators are usually 13 to 15 volts and produce between 50 and 100.
Alternator wiring diagram. If you are able to look at a manufacturer s diagram of the alternator s connectors the wire that slides over pin 1 of the alternator leads to the positive connection on the vehicle s battery and senses voltage. With key on power is then transferred through the no charge indicator light to the 1 spade on the alternator regulator connection. Typical alternator wiring by james stevens.
Alternators produce electricity to power electrical devices and to charge batteries. Charge wire connects from the alternator to the battery through the. It reveals the elements of the circuit as streamlined shapes and the power and signal links in between the gadgets.
The resistor or directly to the key switch itself switched side. This diagram shows the simple wiring diagram for negative ground delco si series alternators the ignition switch is most commonly powered from the starter battery stud but source may vary depending on application. Collection of delco 3 wire alternator wiring diagram.
If not the structure will not function as it ought to be. A wiring diagram is a simplified conventional photographic depiction of an electric circuit. It s supposed to assist all the typical user in developing a suitable method.
These guidelines will likely be easy to grasp and apply. Wiring an alternator. Each part ought to be placed and linked to other parts in particular way.
This diagram shows how to wire a delco gm internally regulated 3 wire alternator this particular model 10si used in the 1970s and early 80s is the one you ll find on the generation of gm cars most often used in demolition derbies. Wiring diagram arrives with several easy to stick to wiring diagram directions. If the voltage rises above or falls below 12 volts the alternator s internal voltage increases or reduces power output to.
Alternator exciter wiring diagram alternator exciter circuit diagram alternator exciter wiring diagram every electrical arrangement is made up of various different pieces.
|
<urn:uuid:7bfa98b8-e1ad-48d0-91a7-f82b0a21115c>
|
CC-MAIN-2022-40
|
https://easywiring.info/alternator-wiring-diagram/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337906.7/warc/CC-MAIN-20221007014029-20221007044029-00111.warc.gz
|
en
| 0.881609 | 467 | 3.203125 | 3 |
New river dolphin species discovered
London: A new river dolphin species has been discovered in nearly a century in Brazil.
The species was discovered from the Araguaia River basin of Brazil and researchers propose that it be called the Araguaian Boto, or Boto-do-Araguaia.
The new species is diagnosable by a series of molecular and morphological characters and diverged from other South American river species more than 2 million years ago, researchers said.
About 1,000 of these creatures are believed to be living in the Araguaia river basin, `BBC News` reported.
By analysing DNA samples from dozens of dolphins in the Araguaia and Tocantins rivers, researchers concluded the Araguaia river creature was indeed a new species.
"We looked at the mitochondrial DNA which is essentially looking at the lineages, and there is no sharing of lineages," said lead author Dr Tomas Hrbek, from the Federal University of Amazonas.
"The groups that we see, the haplotypes, are much more closely related to each other than they are to groups elsewhere. For this to happen, the groups must have been isolated from each other for a long time," Hrbek said.
"The divergence we observed is larger than the divergences observed between other dolphin species," he said.
Writing in the journal Plos One, researchers expressed concerns about the future of the new dolphin, saying that it appears to have very low levels of genetic diversity. PTI RCL AKJ
More from India
More from World
More from Sports
More from Entertaiment
- DNA: Analysing the importance of Hindi language in our society
- DNA: Analysis of the letter written by defence minister to Kolkata CM?
- DNA: Is political system root cause of corruption in the country?
- IT raids Delhi's Axis bank branch, finds Rs 100 cr deposited in 44 fake accounts
- Demonetisation: Majority of ATMs still out of cash
- PoK erupts with 'azadi' slogans; Pakistan Army brutally thrashes protesters
- Virat Kohli makes fun of Alastair Cook after England exhaust both DRS wrongly, watch video
- This happens only in Pakistan? You won't believe what this boy did in front of his lady teacher - WATCH
- Kapil Sharma is sweating it out! See pics
- OMG! Man punches Kangaroo in face to save dog – Watch video
|
<urn:uuid:72d13310-f705-44bb-b06b-140228836c22>
|
CC-MAIN-2016-50
|
http://zeenews.india.com/news/eco-news/new-river-dolphin-species-discovered_906234.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698544672.33/warc/CC-MAIN-20161202170904-00407-ip-10-31-129-80.ec2.internal.warc.gz
|
en
| 0.946544 | 515 | 3.140625 | 3 |
Common Names: Colorado Blue Spruce, Silver Spruce.
Botanical Name: Picea pungens galuca. Family: Pinaceae (Pine family).
Characteristics: Distinctive evergreen tree. Size: Height 40 - 80 feet, occasionally over 100 feet spread 30 - 40 feet, final spacing 30 - 40 feet. Tree has a layered look and it is the slowest growing of the trees in the spruce family. Bark: Purplish gray to brown flakey and reddish brown and furrowed with age. Foliage: Stiff short sharp pointed bluish green leaves spreading out all around the twig somewhat upswept and curved. Twigs are very short stout, shiny and yellowish brown. Flowers and Fruit: Seed cones are cylindrical long scaly shiny chestnut brown tapered slightly to a jagged tip.
Natural Habitat and Adaptive Range: Rocky mountain region of the United States but can be successful in many parts of the country except for the hot and humid areas where the tree would struggle in the summer. Blue Spruce likes cooler climates and can even survive ice storms well due to its strong branching also make it ideal as a Christmas tree. Zones 3 - 8.
Management: Pruning should not be done during damp weather. Possible Problems: Aphids can sometimes be a problem also bagworms, spider mites and needle miners. Garrett Juice with Bio Wash is the solution. Needle cast disease can be a problem and it is the same solution can also be helped by air circulation around the trees. White pine weevil can sometimes kill the terminal growth on a blue spruce that is in stress. Propagation: Seeds or stem cuttings.
Notes: Many cultivars over 50 are available. Deer can sometimes be a problem, especially on young plants but Deer Scram is the solution.
On planting use my basic recommendations that are under Organic Guides on the Home page of the web site.
|
<urn:uuid:dba80dbe-25f4-400d-8aed-1ad58aed6cc1>
|
CC-MAIN-2020-10
|
https://www.dirtdoctor.com/garden/Spruce-Blue_vq3035.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143079.30/warc/CC-MAIN-20200217175826-20200217205826-00018.warc.gz
|
en
| 0.925947 | 405 | 3.171875 | 3 |
“Here’s a femur,” Dr. Mitch Kent said, pointing to an assortment of human remains on the beach in November. “And there’s a vertebrae; a finger bone here.”
Along the shore in a remote corner of Cootens Bay — a short, jungly trek from the nearest house on the hill — more than just tree branches and coral fragments pockmarked the sand after Irma.
A sun-bleached skull, broken in half just below the eyes, was perhaps the biggest find; part of a jawbone with three teeth still intact rested not too far away.
Dr. Kent, a historian and archaeologist at the Virgin Islands Studies Institute, has become accustomed to examining sugar works ruins, old cemeteries and other historical artefacts over his long career in the territory.
But the job he was tasked to do in Cootens Bay, he admitted, was rather unprecedented — and warranted more than a small amount of delicacy.
Dozens of centuries-old bones had been lying exposed to the elements, right on the waterline of the beach, since being uncovered by the storm surge and heavy winds in September.
About two months after their initial discovery, Dr. Kent was carefully gathering the bones before they could be washed away, broken further or possibly taken.
“All of this ground here — this is a cemetery,” he said in November, walking carefully around an unmarked sandy plot a few dozen feet wide.
Uncovering the burial ground
Dr. Kent suspects that the site in Cootens Bay is a slave cemetery, likely dating back to the plantation era.
There is no modern-day record of the cemetery and at least in recent memory, developers, visitors to the beach, and government officials have been unaware that the burial ground existed at all.
Dr. Kent said a Cootens Bay resident first alerted him to the bones in mid-October after spotting them during a walk on the beach.
As soon as he learned the site existed, Dr. Kent contacted the Governor’s Office, who in turn contacted Police Commissioner Michael Matthews. Once Mr. Matthews understood that the bones were clearly historical remains rather than a recent crime scene, Dr. Kent said, he didn’t see any need for police involvement.
The historian determined the best course of action would be to mark the location, collect the uncovered bones, and potentially arrange for their proper reburial.
The surrounding ruins in Cootens Bay — what used to be a sugar plantation, though two cannons that were discovered on the site raise eyebrows — indicate that many slaves once lived and worked in the area.
But H. Lavity Stoutt Community College President Dr. Janet Smith made clear that details about the gravesite and those buried there remain uncertain.
“The remains have not been confirmed to be those of slaves. It is also known that other persons have lived in the area over the years. Given Dr. Kent’s archaeological knowledge of slave burial grounds on Tortola, he believes the remains could be those of slaves,” she said in a written statement to the Beacon.
Though specifics about the now-unearthed burial ground have not been cemented, there are a few significant features about the site that could denote a slave cemetery.
For one, the only unusual items potentially marking the area are a small patch of lilies and a large head of coral, Dr. Kent said.
“These enslaved cemeteries would only be known to the people on the plantation. Enslaved people weren’t lavishly buried; ultimately there were no funeral markers or anything like that for them,” he said. “So lilies would be planted in those areas and just regenerate over time.”
During the plantation era, the dead were also typically buried in beachside locations because that land was deemed to be worthless agriculturally, he added. The cemetery hugging the coastline in Cane Garden Bay is one example of that practice.
“I’d imagine most of the North Shore is going to be replicated [with other burial sites], especially in the smaller bays. You know, they had to bury somewhere,” he said. “And because that land in between the beach and the fertile land area was useless, that’s essentially where they were doing it.”
Since the discovery of the bones, there has been much discussion between HLSCC and other groups about how to properly handle the remains and publicise their discovery.
The bones that have been safely taken off the beach are expected to be reinterred at some point in the future, but for now the college is awaiting further instruction from the Ministry of Education and Culture on how to move forward.
It’s an unprecedented situation for virtually everyone involved.
“Due respect for the dignity of the ancestors of the natives of the territory is a prime consideration,” Dr. Smith wrote. “The remains are therefore currently stored in a safe location and are being treated with this consideration in mind.”
Inevitably, Dr. Kent said, it’s important to remember that the site represents a final resting place that was unfortunately disturbed.
“These people had a terrible life, an absolutely appalling life, and so their only refuge, their only peace, was in death. To be disturbed like that after — it’s a shame, it’s not right,” he said. “There’s nothing you can do about it: It’s a natural event that’s created this disinterment. But at least we can try and do the right thing by them.”
This article originally appeared in the Feb. 8, 2018 print edition.
|
<urn:uuid:4aa356ab-7734-4b52-b60e-090a5bda69d1>
|
CC-MAIN-2020-29
|
https://www.bvibeacon.com/irma-unearths-human-bones-on-remote-beach/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655901509.58/warc/CC-MAIN-20200709193741-20200709223741-00320.warc.gz
|
en
| 0.971262 | 1,203 | 2.609375 | 3 |
The revolt dates from the ninth year and tenth month of Zedekiah’s reign. Nebuchadnezzar set out for Jerusalem immediately with a full army. He set up camp and sealed off the city by building siege mounds around it. The city was under siege for nineteen months (until the eleventh year of Zedekiah). By the fourth month of Zedekiah’s eleventh year, on the ninth day of the month, the famine was so bad that there wasn’t so much as a crumb of bread for anyone. Then there was a breakthrough. At night, under cover of darkness, the entire army escaped through an opening in the wall (it was the gate between the two walls above the King’s Garden). They slipped through the lines of the Babylonians who surrounded the city and headed for the Jordan on the Arabah Valley road. But the Babylonians were in pursuit of the king and they caught up with him in the Plains of Jericho. By then Zedekiah’s army had deserted and was scattered. The Babylonians took Zedekiah prisoner and marched him off to the king of Babylon at Riblah, then tried and sentenced him on the spot. Zedekiah’s sons were executed right before his eyes; the summary murder of his sons was the last thing he saw, for they then blinded him. Securely handcuffed, he was hauled off to Babylon.
in the ninth day of the month; and hunger had mastery in the city, and there was not bread to the people of the land. (And on the ninth day of the month, famine had the mastery in the city, and there was no food for the people of the land.)
Step 1 - Create an account or log in to start your free trial.
Starting your free trial of Bible Gateway Plus is easy. You’re already logged in with your Bible Gateway account. The next step is to choose a monthly or yearly subscription, and then enter your payment information. Your credit card won’t be charged until the trial period is over. You can cancel anytime during the trial period.
Click the button below to continue.
Step 1 - Create an account or log in to start your subscription.
You’ve already claimed your free trial of Bible Gateway Plus. To subscribe at our regular subscription rate, click the button below.
Upgrade, and get the most out of your new account. An integrated digital Bible study library - including complete notes from the NIV Study Bible and the NKJV MacArthur Study Bible - is just a step away! Try it free for 30 days.
|
<urn:uuid:cb131eb1-9a02-4232-848c-6bb927dcada8>
|
CC-MAIN-2019-04
|
https://www.biblegateway.com/verse/en/2%20Kings+25:3
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584431529.98/warc/CC-MAIN-20190123234228-20190124020228-00611.warc.gz
|
en
| 0.970863 | 538 | 2.578125 | 3 |
The Persian Gulf War
August 2, 1990-February 28, 1991
At the stroke of midnight on August 2, 1990, Iraqi troops blasted across the border of their tiny oil-rich neighbor to the south in Kuwait in order to occupy and annex the small sheikdom and gain control of its ample oil reserves. This invasion provided the spark for the first international conflict of the post Cold War Era known as the Persian Gulf War—also commonly referred to as Operation Desert Storm or simply as the Gulf War. The United Nations Security Council demanded that Iraq's dictator, Saddam Hussein remove his troops from Kuwait. When he refused to comply, U.N. military coalition forces drawn from over thirty countries—brought together by the American President George H.W. Bush—began a campaign to expel Iraqi troops by force on January 16, 1991. Because of the overwhelming military might of the coalition forces, because of the vast superiority of American military technology including laser guided weapons, and because of the unity of purpose from the world community, the war only lasted 44 days and ended with the liberation of Kuwait and a total victory for coalition forces on
George H.W. Bush came to the presidency in 1988 at one of the most extraordinary times in world history. Within his first year, a democratic wave began to sweep across the communist bloc nations of Eastern Europe, an area the Soviet Union had controlled with an iron fist since the end of World War II. The forty-five year old Cold War seemed to be disintegrating all on its own. Perhaps the most iconic symbol of the Cold War, the Berlin Wall, came tumbling down in December 1989 as Germans joyously celebrated the end of decades of bitter tension between the Soviet and American blocs. President Bush encouraged world leaders to think of those earth-shaking events as opportunities to create a “New World Order" —a world in which democracy and diplomacy would prevent future war. During the early months of 1990, with the major international crisis of the 20th century, the Cold War, headed for “the ash heap of history," there seemed to be good reason for Bush's optimism about a peaceful new world. That is until Iraq invaded Kuwait in August.
Iraq had racked up a huge debt from its eight-year war with Iran in the 1980s, much of it owed to its small but wealthy neighbor to the south, Kuwait. The leader of Iraq, Saddam Hussein, ordered troops into Kuwait on August 2, 1990, apparently to get his hands on the abundant oil reserves
Operation Desert Shield: Creating the Coalition (August 3, 1990 – January 15, 1991)
The United Nations Security Council acted immediately in response to Iraq's naked aggression on August 3, with a U.N. resolution ordering Iraqi troops to leave Kuwait at once. But even after the U.N. followed up its resolution by imposing strict economic sanctions on Iraq on August 6, Saddam refused to comply. In response, the American President George H. W. Bush led a massive build up of U.N. coalition forces from over thirty nations in the deserts of Saudi Arabia. Codenamed Operation Desert Shield, this military action was designed to protect Saudi Arabia from potential Iraqi encroachment and to convince Iraq to leave Kuwait. Even Arab nations like Egypt joined in the coalition, and by the end of 1990, coalition forces numbered 700,000—540,000
On January 16, only within hours of the U.N. deadline's passing, coalition forces launched Operation Desert Storm-a sustained bombing campaign of every major military, government, communication, and industrial target in Iraq as well as Iraqi forces and fortifications in Kuwait. Bombing was intense, and sorties flew around the clock, over 100,000 sorties in all. For the first time in history, the U.S. Air Force used “smart bombs” in a major way during a war. These bombs were precision-guided weapons intended to hit very specific targets while minimizing civilian casualties. Not all of these “smart bombs" came from planes though. Many came on Tomahawk cruise missiles shot from the deck of ships stationed hundreds of miles away in the Persian Gulf. General "Stormin' Norman" Schwarzkopf frequently took to the television airwaves in press conferences to show video footage of America's astounding
In any event, Iraq's response to the awe-inspiring bombing campaign was weak, but worrisome nonetheless. Saddam launched dozens of "Scud" missiles at Saudi Arabia and Israel, a close ally of the U.S. Though these attacks had minimal military effects, the concern that Saddam would place chemical or biological weapons on these missiles caused high anxiety among civilians, especially in Israel. This fear was not imaginary. It was well documented that Saddam had used those types of weapons against his own people in the 1980s. As a result, many Israelis donned chemical weapons suits and masks during the attacks, something U.S. forces would also do during "Scud alerts" and during the ground invasion of Iraq. Many Scud missiles failed to reach their targets due to yet another remarkable piece of American military technology—the "Patriot” missile, used to find and shoot down Scud missiles in mid-air before they hit the ground.
Operation Desert Sabre: The 100-Hour Ground War (February 24, 1991 - February 28, 1991)
By February 24, the
American technological advantages on the ground proved to be just as impressive as in the air when Iraqi forces did engage in tank battles. U.S. tanks like the M1 Abrams were equipped with night vision systems and had much longer ranges than Chinese-made and Soviet-Era tanks the Iraqis were using. Even when the Republican Guard, Iraq's so-called elite units, tried to make a final stand on February 27 near Al-Basrah, the coalition forces easily defeated them. By February 28, the coalition had completely liberated Kuwait and pushed Iraqi troops back into Iraq. President Bush declared a cease-fire that day. The 100-hour ground war was over. Iraq lost an estimated 70,000-100,000 soldiers; the U.S. lost 184. The war was a total victory and took a very short time, but it created some long-term problems for the U.S.
Aftermath and Prelude to the Second Gulf War (Iraq War)
As part of the cease-fire agreement, Saddam agreed to respect the territorial
Topics and series. This historical marker is listed in this topic list: War, 1st Iraq & Desert Storm. In addition, it is included in the Former U.S. Presidents: #41 George H.W. Bush, and the Former U.S. Presidents: #43 George W. Bush series lists. A significant historical date for this entry is January 16, 1991.
Location. 30° 13.694′ N, 90° 54.778′ W. Marker is in Gonzales, Louisiana, in Ascension Parish. Marker can be reached from South Irma Boulevard, 0.3 miles north of East Worthey Street, on the right when traveling north. Touch for map. Marker is in this post office area: Gonzales LA 70737, United States of America. Touch for directions.
Other nearby markers. At least 8 other markers are within walking distance of this marker. Louisiana Marines in the Persian Gulf War (here, next to this marker); "The Mother of All Battles Has Begun!" (here, next to this marker); War on Terror: The Iraq War (here, next to this marker); The War on Terror: The Afghanistan War (a few steps from this marker); The War on Terror: The Afghanistan War And The Iraq War (a few steps from this marker); Ascension Parish Residents Fighting the War on Terror (a few steps from this marker); Purple Heart Memorial (a few steps from this marker); The Vietnam War (a few steps from this marker). Touch for a list and map of all markers in Gonzales.
More about this marker. Located in the Gonzales Veterans Memorial Park
Credits. This page was last revised on March 18, 2018. It was originally submitted on March 18, 2018, by Cajun Scrambler of Assumption, Louisiana. This page has been viewed 314 times since then and 38 times this year. Photos: 1. submitted on March 18, 2018. 2. submitted on March 18, 2018, by Cajun Scrambler of Assumption, Louisiana. 3, 4, 5, 6, 7. submitted on March 18, 2018.
|
<urn:uuid:d4dd31f3-db43-47b9-9cb5-b1fc35c3a801>
|
CC-MAIN-2022-40
|
https://www.hmdb.org/m.asp?m=115151
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030331677.90/warc/CC-MAIN-20220924151538-20220924181538-00505.warc.gz
|
en
| 0.961178 | 1,747 | 3.515625 | 4 |
Lessons in this grouping build upon and enrich curriculum units for grade 3 and beyond. More complex content takes more time to introduce and to explore. Lessons open opportunities for group work, so be sure to plan a little time for brainstorming, discussion and experimentation. Each exploration generally takes at least two work sessions. The resulting works can easily be used to create, document and display unique interdisciplinary projects.
|
<urn:uuid:08fa7106-f0ea-4713-8d85-4d67727676af>
|
CC-MAIN-2020-40
|
https://thinkingwithaline.com/advanced/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400244231.61/warc/CC-MAIN-20200926134026-20200926164026-00608.warc.gz
|
en
| 0.842843 | 80 | 2.65625 | 3 |
Part of the “Mon premier animalier” collection, this book features beautiful photos on high-quality glossy pages which are accompanied by simple texts. Your child will discover and learn about endangered animals such as the toucan, the polar bear, the Napoleon fish, and their surrounding environments.
Number of pages: 30
WHO’S IT FOR?
This book is for progressing readers, but any animal lover will enjoy this read. It features large photos with 2-3 sentences about the animal and its habitat. The writing is simple; however, there are some words that are specific to the animal or habitat.
Sample Sentence: Le POISSON NAPOLÉON est l’un des plus gros poissons habitant les récifs de corail des mers chaudes.
|
<urn:uuid:68bd89f4-fa51-4b86-9e20-2887ba89cd72>
|
CC-MAIN-2020-16
|
https://bonjourbooks.ca/products/les-animaux-a-proteger
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370492125.18/warc/CC-MAIN-20200328164156-20200328194156-00144.warc.gz
|
en
| 0.845711 | 169 | 3.109375 | 3 |
Sharing a house is not uncommon these days and many find it very practical move for a whole lot of reasons.
However, it does not dispel the fact that for each housemate living in the same roof, basic utility usage such as electricity is also expected to rise.
But there are ways to save up on cash for energy use and be able to see your power bills drop. Here are some common and practical tips to conserve energy.
Shift to energy-efficient home appliances
Appliance manufacturing has gone through leaps and bounds with technology, which has ushered in the modern wave of home appliances that are smart and energy-efficient.
While you may have saved up some previous dollars with that used fridge, however, if it is an old model and does not carry an energy star rating it literally eats up a lot of power.
So, when looking for home appliances, look for those with an energy star rating of no less than three so you can save up a lot on your energy consumption.
Planning and making meals together makes it less tedious and can also save up on energy consumption. Preparing a communal meal together with your housemate makes the work less tasking and reduces the stress of planning your meals throughout the day.
You could also save up on your grocery expenses.
Use your dishwasher
You’d be surprised to know that you actually save more water and energy by using your dishwasher. When sharing a house, you could also encourage your housemates that have your dishes washed at the same time to minimise the number of times you use the dishwasher in a day.
Just be sure to get a dishwasher with an energy star rating of no less than 3 to optimise energy savings.
Coldwater for laundry
Using tap water for washing clothes is good enough to keep your clothes clean and fresh. Also, you may as well make sure that you wash on full load instead of just half. You get to save money but not using energy to heat the water for washing.
Use detergent formulated for cold water use and produces the same results as hot water machine washing.
Use our dryer sparingly
Avoid the temptation of using your dryer each and every time you do your laundry. Take advantage of the sun by hanging your clothes to dry. You may spend a bit more time hanging your clothes, but it does guarantee you significant savings on your energy bills.
Use your home heater only when necessary
House heating can burn up a lot of energy, so why not add an extra blanket layer or two to keep you warm through the night.
You can also save energy by using an electric blanket instead of getting the entire house warmed up, which can be 16 times much cheaper compared to a house heating system.
During the daytime, you may want to also let sunshine in by opening up your curtains and allow the sunshine to radiate throughout the house and provide natural heat.
Using these simple yet practical tips, you may be surprised to see your energy bills going down. This means less pressure and stress on you and your housemates.
|
<urn:uuid:3e785b97-91df-4282-b38e-997d807efb37>
|
CC-MAIN-2023-50
|
https://www.iproperty.com.au/news/2019/10/18/how-to-save-energy-in-shared-homes/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100304.52/warc/CC-MAIN-20231201183432-20231201213432-00453.warc.gz
|
en
| 0.949623 | 627 | 2.609375 | 3 |
Access to education is a major problem for most governments. How big is this problem? According to Sir John Daniel (1996), “More than one-third of the world’s population is under 20. By 2006, 100 million qualified to enter a university will have no place to go. To meet this staggering demand, a major university needs to be created each week.” Today, that is about 4 universities a week. Clearly that is not happening. How then do we educate the millions?
OpenCourseWare Consortium (OCWC) and the Open Education movement is addressing this question of access by providing millions access to high quality courses developed in the best institutes of higher learning like MIT and Johns Hopkins. And yet is that enough? Anyone, whether educator or student, knows that learners always need help, and learning alone is, well, boring. In the Gates Foundation “Silent Epidemic” study, 88% of the dropouts studied had passing grades. They could have passed, but even in a school were too bored to finish. When you consider distance or online learning you just ring in the death knell. As George Siemens says of online courses, “Great video and talented presenters. My only complaint: I’d like to interact with others who are viewing the resources. Creating a one-way flow of information significantly misses the point of interacting online.” In the same Gates Foundation study, researchers learned that 47% of dropouts say “classes are not interesting.” Other studies show 60% find video lectures “boring” and 60% read less when using e-textbooks. These are the key problems of education: how to bring help to online learners, how to scale it, and how to add interaction so learners are kept engaged.
In my talk at OCW Consortium Global 2011 meeting last week at MIT, I raised these issues. I talked about the notion of Open Social Learning and how it could solve these two problems. The solutions are based on some wonderful and established work in the learning sciences. Leve and Wenger (1991) proposed the theory of a community of practice where members come together with a common passion or a need to do something, to learn something. In such a community, learning is enhanced through interactions, encouragement, role models and support. Peer-to-peer learning allows learners to help one another, benefitting both the learners and the tutors (Fuchs, 1997). Best of all, it is scalable to the millons.
Our Open Social Learning solution to these three problems of education is therefore elegantly simple. In this solution OpenCourseWare courses are augmented by a community of learners who help one another, support one another and learn together as they socialize and spend time together online. Not only is this solution validated by educational research, it is also eminently scaleable because you are not dependent on hiring tutors or teachers to spend time assisting self learners. The community helps one another. Open Social Learning also fits right in with what our digital millenials want to do: hang out online for hours! Why not get them talking about math instead of … well, let’s not go there.
|
<urn:uuid:d770ede8-c576-4ccd-9a37-7cf486740def>
|
CC-MAIN-2015-14
|
http://blog.openstudy.com/2011/05/05/open-social-learning-aka-massively-multiplayer-online-learning-2/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131296456.82/warc/CC-MAIN-20150323172136-00256-ip-10-168-14-71.ec2.internal.warc.gz
|
en
| 0.951519 | 654 | 2.96875 | 3 |
0 degrees Kelvin = -273 degrees Celsius
0K = -273oC
If mercury is cooled below 4.2 K, it loses all electric resistance - it becomes a superconductor..
This was made by H. Kammerlingh Onnes in 1911. Observations were then made that other metals also exhibit zero resistivity below a certain critical temperature.
How do we know the resistance of a superconductor is zero?
The fact that the resistance is zero has been shown by the observation that currents in superconducting lead rings remains constant for many years with no measurable reduction in value. Resistance to a current is rather like the friction experienced by a moving object. If there was no friction and you set an object moving it would theoretically continue at the same speed for ever. The same is true with current. Once you set the charge moving it would continue to move at a sateady rate ( constant current). This has been observed in supercooled metals - they become super conductors.
An induced current in an ordinary metal ring would decay rapidly from the dissipation of heat energy resulting from ordinary resistance, but superconducting rings have exhibited a 'decay constant' for the current of over a billion years!
The critical temperature for a superconductor is the temperature at which the electrical resistivity of the substance drops to zero.
The transition is so sudden and so complete that it appears to be a transition to a different phase of matter.. Several materials exhibit superconducting phase transitions at low temperatures.
The highest critical temperature was about 23 K until the discovery in 1986 of some high temperature superconductors. The 'high' temperatures are still low (125K is considered 'very high'!). These materials with critical temperatures in the range 120 K have received a great deal of attention because they can be maintained in the superconducting state with liquid nitrogen (77 K).They can therefore have easier practical applications. The surprising thing about them is that they are not metals - but ceramics! (Click here to find out more about them)
Applications of superconducting metals
A superconducting electromagnet is an electromagnet that is built using coils of superconducting wire. They must be cooled to cryogenic temperatures during operation. Their advantages are that they can produce stronger magnetic fields than ordinary iron-core electromagnets, and can be cheaper to operate, since no enegy is lost as heat because of ohmic resistance of the windings. During operation, the magnet windings must be cooled below their critical temperature; the temperature at which the winding material changes from the normal resistive state and becomes a superconductor. Liquid helium is used as a coolant for most superconductive coils.
Superconducting magnets are widely used in MRI machines, NMR equipment, mass spectrometers, magnetic separation processes, and particle accelerators.
They are preferred to ordinary electromagnets because:
- They can achieve field that is 10x stronger than ordinary ferromagnetic-core electromagnets.
- The field is generally more stable, resulting in less noisy measurements.
- They can be smaller, and the area at the center of the magnet is empty rather than being occupied by an iron core.
- Most importantly, for large magnets they can consume much less power. (Once set up and stable the only power the magnet consumes is that needed for any refrigeration equipment to preserve the cryogenic temperature).
Superconducting power cables
High-temperature superconductors promise to revolutionize power distribution by providing lossless transmission of electrical power.
The development of superconductors with transition temperatures higher than the boiling point of liquid nitrogen has made the concept of superconducting power lines commercially feasible, at least for high-load applications. It has been estimated that the waste would be halved using this method, since the necessary refrigeration equipment would consume about half the power saved by the elimination of the majority of resistive losses.
In one hypothetical future system called a SuperGrid, the cost of cooling would be eliminated by coupling the transmission line with a liquid hydrogen pipeline.
Superconducting cables are particularly suited to high load density areas such as the business district of large cities, where purchase of an easement for cables (permission to put cables in has to be bought!) would be very costly.
|
<urn:uuid:340c256a-50d2-4b03-a4b8-083822ef49aa>
|
CC-MAIN-2015-40
|
http://www.cyberphysics.co.uk/topics/electricity/higher_electricity/superconductivity.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737935292.75/warc/CC-MAIN-20151001221855-00163-ip-10-137-6-227.ec2.internal.warc.gz
|
en
| 0.941589 | 889 | 3.96875 | 4 |
As late as the 1940s, newspaper stories written about Buffalo’s Italian population were painted with wild strokes of exotic color.
“Off in a section of the city where the rays of the sun, on a bright day, glisten down upon dilapidated housetops and seek their way into narrow streets and by-ways with which the place abounds, are colonized a people in whose native land the skies are the fairest and bluest, and where the very breezes are filled with invigorating fragrance.” – The opening paragraph of “The Italian Colony in Buffalo,” The Buffalo Courier, 1898
Sprinkled throughout 50 years’ worth of these newspaper accountings of how and why Italians came to and flourished in Buffalo, are the facts – and the colorful descriptions – which make up this story.
A handful of Genoese were the first Italians to make Buffalo their home.
When Luigi Chiesa set up his home and birdcage store at Elm and Broadway in the mid-1840s, he didn’t know any English, and there wasn’t anyone in town who knew any Italian. But he quickly became a Buffalo backer.
“Chiesa became a self-appointed immigration agent for Uncle Sam,” reported the Buffalo Express in 1901, “and in his letters to friends in Italy were importunings to this great country, ‘God’s Country.’ ”
His name means “church” in Italian, so not long after arriving in Buffalo, he became well-known among longtime city residents as Louis Church. But to the slowly trickling in numbers of Italians, he was still Luigi and his home was the first hub of Buffalo’s Italian community.
John Roffo was among the first Italians to settle in the neighborhood that would come to be known as Little Italy near today’s Canalside. After arriving in 1847, he was a wine merchant and grocer on Canal Street, then opened a tavern on Erie Street.
Louis Onetto, who owned a macaroni manufacturing works on Broadway near Michigan for more than 50 years, came to Buffalo in 1866.
Those early sons of Italy were northern Genoese, but in the decades to come, the massive numbers came from southern Italian places like Sicily and Naples.
“The Sicilians far outnumber the other Italians in Buffalo,” reported The Express. “They are the dark-skinned, raven-haired, black-eyed Italians who are most numerous on Buffalo’s streets. They are the manufacturers of macaroni, the fruit hucksters, and the bootblacks.”
“The Italian Moses who led the Sicilians to the promised land of Buffalo was Frank Baroni,” reported The Express. He came to Buffalo from Valledolmo, Sicily, in 1882 and immediately wrote home encouraging people to find their way to Buffalo.
“The great majority of the Italian colony,” reported The Express in 1908, “are of the peasant and laboring class.” But not all.
Among the first 42 to heed Baroni’s call from Sicily was a destitute boy, Charles Borzilleri. Eventually, he was the first Italian to graduate from UB Medical School and became prominent not only in the Italian community but in Buffalo at large. He founded Columbus Hospital on Niagara Street and also spent several terms as the president of the Erie County Medical Society.
Those Italians moving to Buffalo settled in one of the oldest parts of Buffalo, displacing the Irish enclave near the Erie Canal and Buffalo Harbor around Canal Street and the Terrace. What was the center of this neighborhood is today covered by the Marine Drive Apartments near Canalside.
“Hemming in on one side by the water’s edge, and intersected on the other by the ponderous traffic of a steam railway, the locality offers few inducements to those who would establish homes within the boundary lines of Buffalo,” reported The Courier in 1898.
That’s why through the 1890s, more Italians began moving onto the other side of the canal as well, into what we would now describe as the West Side.
Long before City Hall was built, St. Anthony’s Church – now in the shadow of City Hall, was the primary place of worship for Buffalo’s Italian population. Italians began to move in from what is now City Hall north to what is now the Peace Bridge.
Right at the center of that newly Italian area was Front Avenue, which would be renamed Busti Avenue in honor of Buffalo’s first celebrated Italian in 1930.
It was the third attempt to name a street after Paulo Busti, an agent for the Holland Land Company. Like many of Holland’s executives, his name appeared as a street name on maps of early Buffalo. The original Busti Avenue was re-christened Genesee Street. The streets now known as Upper and Lower Terrace streets were once known as Busti Terrace, before Busti’s name was dropped off the map for a second time.
A 1930 breakdown said that there were about 20,000 Buffalonians who had been born in Italy, and another 45,000 who had at least one Italian-born parent, making Italians Buffalo’s third most numerous foreign-born residents, behind Germans and Poles.
Buffalo’s Italian community celebrated when, in 1958, the first one of their own was elected mayor. Frank A. Sedita – who grew up in the neighborhood behind City Hall, doing the jobs typical of grammar school-age Italian boys like shoeshine boy and newspaper hawker – was elected to three terms as Buffalo’s mayor.
|
<urn:uuid:8b0e7103-67b4-4d58-9ebe-8e0ff9ea7f8f>
|
CC-MAIN-2021-43
|
https://blog.buffalostories.com/tag/genoese/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323586043.75/warc/CC-MAIN-20211024142824-20211024172824-00602.warc.gz
|
en
| 0.981178 | 1,206 | 2.640625 | 3 |
The brain is extremely powerful; we can store almost an unlimited amount of information. But is there a daily limit? The quick answer is yes. Due to its finite size, there is a limit to how much new information the brain can store per day.
“The brain has a daily limit.”
How much time should I spend studying daily for the Dental Hygiene Boards?
It is hard to say. But not more than 6 hours a day. Why not 10 hours? Why am I stopping you from studying more for the dental hygiene board exams (NBDHE, NDHCE, WREB, CRDTS, CDCA) that will determine your life’s path?
Because it is scientifically proven that our brain has a daily limit. Studying is like sports and physical activities. In fact, the brain takes 30% of our energy, that’s a lot! At the end of the day, we are out of energy, just like your phone runs out of battery.
Is it scientifically proven?
Angelika Dimoka, director of the Center for Neural Decision Making at Temple University, conducted a study that measured people’s brain activity while they were solving problems. Using functional magnetic resonance imaging to measure changes in blood flow, she found that as people received more information, their brain activity increased in the dorsolateral prefrontal cortex, a region behind the forehead that is responsible for making decisions and controlling emotions. But when the information load became too much, it was as though a breaker in the brain was triggered, and the prefrontal cortex suddenly shut down.
If you are trying to fight a brain that has shut down, you are wasting time. You may feel like you are studying, but in reality, you are just staring at the material.
“Don’t wait until the last minute. Read and study a little every day.” – Jessica (Mount Ida College, MA), StudentRDH user
What can I do as a dental hygiene student?
One of StudentRDH’s respectful users, Jessica from Mount Ida College in MA, shared us her advice after successfully passing the dental hygiene boards. “Don’t wait until the last minute. Read and study a little every day. It will be beneficial in the long run!”
But what is a little every day? To be realistic, it is 3-4 hours/day. You have school, chores, and social obligations. You know that a lofty goal of 6-8 hours is rarely achievable. But start with 1-2 hours/day, at a predictable pace. This is much better than fluctuating schedules of 0-8 hours/day.
“Only count the time you spent purely on studying.”
Am I trying to sabotage your success?
You may still wonder why I am trying to stop you from studying more. Here is the key to my article. Quality over quantity. When I say 3-4 hours/day, I mean uninterrupted moments of high-intensity focus. If you looked at your Instagram and Facebook during that 3-4 hours/day, then you are cheating.
Even if you went to get some coffee, that is cheating. Only count the time you spent purely on studying. Use a timer and pause it every time you perform a task other than high-focused studying. I think now you understand what I mean by quality over quantity.
Anything else that can help you pass the dental hygiene board exams?
1. Take a calendar and see how many days you have left to the dental hygiene boards.
2. Write down in detail what you will achieve day by day. The key is to make a consistent schedule that will look the same every day.
3. Challenge yourself to perform a predictable schedule for 21 days in a row. For example, after school, before turning on the TV, spend 1-hour studying. Then you shower and relax. The next morning, squeeze in another 1 hour before school. The key is to have a routine. Once your mind and body absorb the new pattern, the new task will not be new anymore. It will become part of you.
“Challenge yourself to follow a predictable schedule for 21 days in a row”
– Claire (Founder of StudentRDH, expert coach in dental hygiene exams)
We are all shoppers, online or offline. Imagine shopping for an entire closet in one day, 100 pieces of clothes including socks, shirts, and hats. Wouldn’t it be difficult to remember what you purchased? But if you shopped one item per day, you will have the opportunity to spend “quality time” with your new jeans. You will appreciate it more and probably will wear it often.
Speaking of shopping, StudentRDH has 3 fantastic review courses – National Boards, Local Anesthesia, and CSCE that will push you to the TOP.
Happy studying and wish you #SuccessAndNothingLess!
Dental Hygiene Boards Review by StudentRDH
Want to see if StudentRDH works for you?
“The Dental Hygiene Boards are seriously challenging. You will be pushed to a limit you have never experienced before.”
P.S.: If you have any questions about the dental hygiene boards, email us at [email protected]
Do you love topics like this?
(Disclaimer: StudentRDH is NOT affiliated with the NBDHE, NDHCE, CSCE, CDCA, WREB.)
|
<urn:uuid:ebaf21c9-983e-446e-abd0-d8b2ac6d85af>
|
CC-MAIN-2022-40
|
https://blog.studentrdh.com/how-many-hours-should-you-study-daily/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335355.2/warc/CC-MAIN-20220929131813-20220929161813-00536.warc.gz
|
en
| 0.955535 | 1,149 | 3.078125 | 3 |
Seed Certifying Agencies Assist After Wildfires2 weeks ago -
Wildfires across several western states have scorched more than 1 million acres of public and privately owned land. In some areas, fires still burn ,and it may be several weeks before the full extent of the damage is known. Landowners and managers looking to reseed large tracts of land might find it challenging to source adequate amounts of suitable seed. In addition to identifying sources of seed, they will need to be mindful of quality, the appropriate types and varieties for reseeding, and make sure that seed is free of weeds that could cause long-term problems.
Since 1919, the Association of Official Seed Certifying Agencies (AOSCA) has worked with seed certifying agencies across the United States to ensure that seed customers received pure, high quality seed.
“Seed certifying agencies can be a valuable resource for landowners and managers,” according to Chet Boruff, AOSCA CEO. “They understand the challenges unique to each of their states.”
In addition to traditional field crops, seed certifying agencies in several states apply AOSCA standards to native species that are in high demand for their use in revegetating fragile lands ravaged by wildfires.
Once the range and forest fires are controlled, the immediate concern is to hold the soil in place with species that grow rapidly. They need to be chosen with an eye for both soil protection and minimal competition with more permanent native perennials. The Certified seed industry specializes in native and conservation species, and it offers a tool box of seed choices to meet local needs. Certified seed ensures varietal purity and that the seed is suitable for unique geographic areas, soil types and climates.
Idaho contains several thousand acres of fire-damaged land and the state’s seed certifying agency is the Idaho Crop Improvement Association. Doug Boze is the executive vice president of Idaho Crop, and he serves as AOSCA’s president.
“Our office is coordinating with other agencies in our region to identify sources of pure seed and we often work with the U.S. Bureau of Land Management to help it find the seed needed for reclamation projects,” says Boze. “Our goal across the western region is to make sure that seed purchasers of any type know they can contact seed certifying agencies for guidance.”
The AOSCA website contains a full list of seed certifying agencies and their contact information. In addition, AOSCA encourages anyone with further questions to contact 309-736-0120.
“Recovering from this season’s widespread fires will not be easy, but using high quality, pure seed that is well-adapted to each location will give land owners and managers the best opportunity for successfully restoring their land,” Boruff says.
Current average ratings.
|
<urn:uuid:9e56c083-d7f1-48b6-93ff-561c5bc7afdd>
|
CC-MAIN-2017-39
|
http://seedworld.com/seed-certifying-agencies-assist-wildfires/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818691476.47/warc/CC-MAIN-20170925111643-20170925131643-00633.warc.gz
|
en
| 0.956179 | 591 | 2.78125 | 3 |
Teenagers are confronted with a variety of tough issues, and learning how to deal with them can test their confidence. Tough issues range from dealing with changes to their physical appearance to being accepted in friendship groups. This is then reflected in how they behave in public, how well they perform in school and other areas of their life, and family expectations. By becoming more accepting of themselves, teenagers become better equipped to deal with hurtful things that may damage their self-confidence.
This can help if you:
- want to know what issues may be affecting your child’s confidence
- worry that your child is shy or not getting involved in activities at school
- want to know more about how to help your child build their confidence.
Why is self-confidence important for teenagers?
Self-confidence is the belief that you’ll be successful in a particular situation or at a specific task. Your child’s self-confidence is related to their self-esteem, which is feeling good about yourself and feeling that you’re a worthwhile person. But, having high self-esteem doesn’t mean you always feel confident. Self-confidence can vary throughout life, particularly during major life changes such as adolescence. It’s estimated that up to half of adolescents will struggle with low confidence levels during the early teenage years. Self-confidence helps teenagers make safe, informed decisions. Confident teenagers can avoid people and situations that aren’t necessarily right for them, and to find those that are.
What does positive self-confidence look like?
There are signs you can look out for to tell if your teenager is self-confident. These include:
- good posture
- a relaxed walk
- alert eyes
- an ease at both giving and receiving praise
- openness to criticism and feedback
- a curiosity about new ideas
- a refusal to get upset when things go differently than planned.
What are the signs of low self-confidence?
There are some things that you can look out for that may indicate that your child is lacking confidence. These include:
- an awkwardness accepting praise
- unconfident body language, such as walking with their head down and reluctance to make eye contact
- negativity about others and avoidance of social situations
- not joining in on activities
- holding back in class
- being shy or timid
- a willingness to succumb to peer influence
- an expectation that they will fail at things they try, or to not try as hard when things get tricky.
As a parent, you can give your child opportunities to fail and succeed in a safe environment. Often poor self-confidence comes from running up against adversity and not understanding how to recover from it.
You can play an important role in building your child’s self-confidence. Check out some practical strategies for supporting you child.
|
<urn:uuid:79d91f9a-4a52-4d9f-820a-c6b5bd8c0189>
|
CC-MAIN-2019-51
|
https://parents.au.reachout.com/skills-to-build/wellbeing/self-confidence-and-teenagers
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540545146.75/warc/CC-MAIN-20191212181310-20191212205310-00092.warc.gz
|
en
| 0.964372 | 586 | 3.390625 | 3 |
Fluorescence is the visible light some diamonds emit when they are exposed to invisible ultraviolet (UV) rays. On a certificate, fluorescence refers to the strength of the diamonds reaction to long-wave UV, which is an essential component of daylight. The light emitted lasts as long as the diamond is exposed to the UV source.
Is fluorescence common?
Yes. Of all diamonds submitted for certification, approx. 25-35% exhibit some degree of fluorescence. However, only 10% of those show strengths of fluorescence that may impact appearance ie strong or very strong. In more than 95% of diamonds that exhibit fluorescence, the colour seen is blue. In rare instances, the reaction is yellow, white or another colour.
What impact does fluorescence have on the appearance of a diamond?
GIA studies show that, for the overwhelming majority of diamonds, the strength of fluorescence has no widely noticeable effect on appearance. In many instances, observers prefer the appearance of diamonds that have medium to strong fluorescence. In rare cases, some diamonds with extremely strong fluorescence may appear hazy or oily, fewer than 0.2% of the fluorescent diamonds exhibit this effect.
Does fluorescence compromise the structural integrity of a diamond?
No. A diamond that fluoresces has the same integrity as one with no reaction to UV. Submicroscopic substitutions and/or shifts in the diamond structure can cause fluorescence as well as prevent it.
|
<urn:uuid:f15987a1-63df-4f2b-a97e-e6e9ca01f057>
|
CC-MAIN-2019-30
|
https://www.voltairediamonds.co.uk/fluorescence-in-diamonds-engagement-rings/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526324.57/warc/CC-MAIN-20190719161034-20190719183034-00072.warc.gz
|
en
| 0.941643 | 297 | 3.21875 | 3 |
October 1, 2002 | Executive Summary on Middle East
In an historic speech to the United Nations General Assembly, President George W. Bush made a powerful call to the international community to join the United States in addressing the threat posed by Saddam Hussein, the Iraqi regime, and Iraq's growing arsenal of weapons of mass destruction (WMD) and ballistic missiles. Warning that Iraq poses "a grave and gathering danger," he called on the U.N. to "choose between a world of fear and a world of progress. We cannot stand by and do nothing while dangers gather. We must stand up for our security and for the permanent rights and hopes of mankind."
The President's direct challenge to members of the United Nations marked the official beginning of his effort to build an international coalition that will confront the totalitarian regime in Iraq, which has defied 16 Security Council resolutions in the past decade. Though world leaders appear deeply divided over the issue, there are clear signs that the tide is turning against Baghdad and support is growing for the Bush Administration's call for a regime change.
A military campaign against the Iraqi government is likely to be a combined U.S.-U.K. operation, with the strong possibility that Australian forces will also take part. It is conceivable that new members of the North Atlantic Treaty Organization (NATO), such as Poland and the Czech Republic, could also make a military contribution. NATO allies such as Turkey, Italy, and Spain, and a number of Arab nations such as Kuwait and possibly Saudi Arabia, Jordan, and Qatar, should step up to provide logistical and strategic support. Diplomatic backing could come from a growing number of allies once it becomes clear that Saddam Hussein has no intention of complying with U.N. demands and that a military strike is inevitable.
As the debate continues in capitals across the world, it is more widely expected that the United States will not have to go it alone in Iraq. However, Washington will need to continue its efforts to cement support within the U.N. Security Council, Europe, and the Arab world. Specifically, the Bush Administration must:
The opponents of war in Iraq have predicted that America, the world's only superpower, would have to wage war on its own, with perhaps at best the support of the United Kingdom. However, mounting evidence suggests that the people of Iraq may be liberated by one of the biggest strategic and diplomatic coalitions in modern times. A significant and growing number of international allies support a regime change. President Bush's speech to the United Nations was a powerful wake-up call for action by an international community that, for a decade, has been in a state of denial and suspended animation in dealing with the Iraqi threat.
While the bulk of military operations will probably be carried out by U.S. and British forces, strategic and diplomatic support may be provided by a substantial number of allies, including key European nations such as Italy and Spain and some of Iraq's Arab neighbors. There is little likelihood that Arab troops will participate in the military action to liberate Iraq, but invaluable strategic support will be provided by Kuwait and possibly by Saudi Arabia, Jordan, and Qatar. It appears more likely that the U.N. Security Council will not stand in the way of military action. Russia and France have indicated that they may support a U.S.-led strike, while China is likely to abstain. Many more countries will want to participate in a post-war presence in Iraq to help its people rebuild their nation into a successful and free federation.
--Nile Gardiner, Ph.D., is a Visiting Fellow in Anglo-American Security Policy in the Kathryn and Shelby Cullom Davis Institute for International Studies at The Heritage Foundation.
|
<urn:uuid:066bcb68-d02b-41d0-b6e7-66a0c135b852>
|
CC-MAIN-2016-40
|
http://www.heritage.org/research/reports/2002/10/bg1598es-why-america-may-not-have-to-go-it-alone
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660996.20/warc/CC-MAIN-20160924173740-00179-ip-10-143-35-109.ec2.internal.warc.gz
|
en
| 0.96594 | 749 | 2.625 | 3 |
|Alias(es)||Universal Coded Character Set(UCS)|
|Encoding formats||UTF-8,UTF-16,GB18030Less common:UTF-32,BOCU,SCSU,UTF-7|
|Preceded by||ISO 8859, various others|
Unicode is a computing industry standard for the consistent encoding, representation, and handling of text expressed in most of the world's writing systems. The standard is maintained by the Unicode Consortium, and as of May 2019 the most recent version, Unicode 12.1, contains a repertoire of 137,994 characters covering 150 modern and historic scripts, as well as multiple symbol sets and emoji. The character repertoire of the Unicode Standard is synchronized with ISO/IEC 10646, and both are code-for-code identical.
The Unicode Standard consists of a set of code charts for visual reference, an encoding method and set of standard character encodings, a set of reference data files, and a number of related items, such as character properties, rules for normalization, decomposition, collation, rendering, and bidirectional display order (for the correct display of text containing both right-to-left scripts, such as Arabic and Hebrew, and left-to-right scripts).
Unicode's success at unifying character sets has led to its widespread and predominant use in the internationalization and localization of computer software. The standard has been implemented in many recent technologies, including modern operating systems, XML, Java (and other programming languages), and the .NET Framework.
Unicode can be implemented by different character encodings. The Unicode standard defines UTF-8, UTF-16, and UTF-32, and several other encodings are in use. The most commonly used encodings are UTF-8, UTF-16, and UCS-2 (without full support for Unicode), a precursor of UTF-16; GB18030 is standardized in China and implements Unicode fully, while not an official Unicode standard.
UCS-2 uses two bytes (16 bits) for each character but can only encode the first 65,536 code points, the so-called Basic Multilingual Plane (BMP). With 1,114,112 code points on 17 planes being possible, and with over 137,000 code points defined so far, UCS-2 is only able to represent less than half of all encoded Unicode characters. Therefore, UCS-2 is outdated, though still widely used in software. UTF-16 extends UCS-2, by using the same 16-bit encoding as UCS-2 for the Basic Multilingual Plane, and a 4-byte encoding for the other planes. As long as it contains no code points in the reserved range U+D800–U+DFFF, a UCS-2 text is a valid UTF-16 text.
UTF-32 (also referred to as UCS-4) uses four bytes for each character.
Like UCS-2, the number of bytes per character is fixed, facilitating character indexing; but unlike UCS-2, UTF-32 is able to encode all Unicode code points.
However, because each character uses four bytes, UTF-32 takes significantly more space than other encodings, and is not widely used.
|Alias(es)||Universal Coded Character Set(UCS)|
|Encoding formats||UTF-8,UTF-16,GB18030Less common:UTF-32,BOCU,SCSU,UTF-7|
|Preceded by||ISO 8859, various others|
Origin and development
Unicode has the explicit aim of transcending the limitations of traditional character encodings, such as those defined by the ISO 8859 standard, which find wide usage in various countries of the world but remain largely incompatible with each other. Many traditional character encodings share a common problem in that they allow bilingual computer processing (usually using Latin characters and the local script), but not multilingual computer processing (computer processing of arbitrary scripts mixed with each other).
Unicode, in intent, encodes the underlying characters—graphemes and grapheme-like units—rather than the variant glyphs (renderings) for such characters. In the case of Chinese characters, this sometimes leads to controversies over distinguishing the underlying character from its variant glyphs (see Han unification).
In text processing, Unicode takes the role of providing a unique code point—a number, not a glyph—for each character. In other words, Unicode represents a character in an abstract way and leaves the visual rendering (size, shape, font, or style) to other software, such as a web browser or word processor. This simple aim becomes complicated, however, because of concessions made by Unicode's designers in the hope of encouraging a more rapid adoption of Unicode.
The first 256 code points were made identical to the content of ISO-8859-1 so as to make it trivial to convert existing western text. Many essentially identical characters were encoded multiple times at different code points to preserve distinctions used by legacy encodings and therefore, allow conversion from those encodings to Unicode (and back) without losing any information. For example, the "fullwidth forms" section of code points encompasses a full Latin alphabet that is separate from the main Latin alphabet section because in Chinese, Japanese, and Korean (CJK) fonts, these Latin characters are rendered at the same width as CJK characters, rather than at half the width. For other examples, see duplicate characters in Unicode.
Based on experiences with the Xerox Character Code Standard (XCCS) since 1980, the origins of Unicode date to 1987, when Joe Becker from Xerox with Lee Collins and Mark Davis from Apple, started investigating the practicalities of creating a universal character set. With additional input from Peter Fenwick and Dave Opstad, Joe Becker published a draft proposal for an "international/multilingual text character encoding system in August 1988, tentatively called Unicode". He explained that "[t]he name 'Unicode' is intended to suggest a unique, unified, universal encoding".
Unicode is intended to address the need for a workable, reliable world text encoding.
Unicode could be roughly described as "wide-body ASCII" that has been stretched to 16 bits to encompass the characters of all the world's living languages.
In a properly engineered design, 16 bits per character are more than sufficient for this purpose.
His original 16-bit design was based on the assumption that only those scripts and characters in modern use would need to be encoded:
Unicode gives higher priority to ensuring utility for the future than to preserving past antiquities.
Unicode aims in the first instance at the characters published in modern text (e.g. in the union of all newspapers and magazines printed in the world in 1988), whose number is undoubtedly far below 214 = 16,384.
Beyond those modern-use characters, all others may be defined to be obsolete or rare; these are better candidates for private-use registration than for congesting the public list of generally useful Unicodes.
In early 1989, the Unicode working group expanded to include Ken Whistler and Mike Kernaghan of Metaphor, Karen Smith-Yoshimura and Joan Aliprand of RLG, and Glenn Wright of Sun Microsystems, and in 1990, Michel Suignard and Asmus Freytag from Microsoft and Rick McGowan of NeXT joined the group. By the end of 1990, most of the work on mapping existing character encoding standards had been completed, and a final review draft of Unicode was ready.
The Unicode Consortium was incorporated in California on 3 January 1991, and in October 1991, the first volume of the Unicode standard was published. The second volume, covering Han ideographs, was published in June 1992.
In 1996, a surrogate character mechanism was implemented in Unicode 2.0, so that Unicode was no longer restricted to 16 bits.
This increased the Unicode codespace to over a million code points, which allowed for the encoding of many historic scripts (e.g., Egyptian hieroglyphs) and thousands of rarely used or obsolete characters that had not been anticipated as needing encoding. Among the characters not originally intended for Unicode are rarely used Kanji or Chinese characters, many of which are part of personal and place names, making them rarely used, but much more essential than envisioned in the original architecture of Unicode.
The Microsoft TrueType specification version 1.0 from 1992 used the name Apple Unicode instead of Unicode for the Platform ID in the naming table.
Architecture and terminology
Unicode defines a codespace of 1,114,112 code points in the range 0hex to 10FFFFhex. Normally, a Unicode code point is referred to by writing "U+" followed by its hexadecimal number. For code points in the Basic Multilingual Plane (BMP), with code points 0hex to FFFFhex,four digits are used, e.g. U+00F7 for the division sign (÷). For code points outside the BMP, five or six digits are used as required, e.g. U+13254 for the Egyptian hieroglyph designating a reed shelter or a winding wall ( ).
Code point planes and blocks
The Unicode codespace is divided into seventeen planes, numbered 0 to 16:
All code points in the BMP are accessed as a single code unit in UTF-16 encoding and can be encoded in one, two or three bytes in UTF-8. Code points in Planes 1 through 16 (supplementary planes) are accessed as surrogate pairs in UTF-16 and encoded in four bytes in UTF-8.
Within each plane, characters are allocated within named blocks
General Category property
Each code point has a single General Category property. The major categories are denoted: Letter, Mark, Number, Punctuation, Symbol, Separator and Other. Within these categories, there are subdivisions. In most cases other properties must be used to sufficiently specify the characteristics of a code point. The possible General Categories are:
|General Category (UnicodeCharacter Property)|
|Value||Category Major, minor||Basic type||Character assigned||Count(as of 12.1)||Remarks|
|Lt||Letter, titlecase||Graphic||Character||31||Ligaturescontaining uppercase followed by lowercase letters (e.g.,Dž,Lj,Nj, andDz)|
|Lm||Letter, modifier||Graphic||Character||259||Amodifier letter|
|Lo||Letter, other||Graphic||Character||121,414||Anideographor a letter in aunicase alphabet|
|Mc||Mark, spacing combining||Graphic||Character||429|
|Nd||Number, decimal digit||Graphic||Character||630||All these, and only these, haveNumeric Type= De|
|Nl||Number, letter||Graphic||Character||236||Numerals composed of letters or letterlike symbols (e.g.,Roman numerals)|
|No||Number, other||Graphic||Character||888||E.g.,vulgar fractions,superscriptandsubscriptdigits|
|Pc||Punctuation, connector||Graphic||Character||10||Includes "_"underscore|
|Pd||Punctuation, dash||Graphic||Character||24||Includes severalhyphencharacters|
|Pe||Punctuation, close||Graphic||Character||73||Closing bracket characters|
|Pi||Punctuation, initial quote||Graphic||Character||12||Openingquotation mark.Does not include the ASCII "neutral" quotation mark.May behave like Ps or Pe depending on usage|
|Pf||Punctuation, final quote||Graphic||Character||10||Closing quotation mark.May behave like Ps or Pe depending on usage|
|Sm||Symbol, math||Graphic||Character||948||Mathematical symbols(e.g.,|
|Sc||Symbol, currency||Graphic||Character||62||Currency symbols|
|Zs||Separator, space||Graphic||Character||17||Includes the space, but notTAB,CR, orLF, which are Cc|
|Zl||Separator, line||Format||Character||1||OnlyU+2028LINE SEPARATOR(LSEP)|
|Zp||Separator, paragraph||Format||Character||1||OnlyU+2029PARAGRAPH SEPARATOR(PSEP)|
|Cc||Other, control||Control||Character||65 (will never change)||No name, |
|Cf||Other, format||Format||Character||161||Includes thesoft hyphen, joining control characters (zwnjandzwj), control characters to supportbi-directional text, andlanguage tagcharacters|
|Cs||Other, surrogate||Surrogate||Not (but abstract)||2,048 (will never change)||No name, |
|Co||Other, private use||Private-use||Not (but abstract)||137,468 total (will never change)(6,400 inBMP, 131,068inPlanes 15–16)||No name, |
|Cn||Other, not assigned||Noncharacter||Not||66 (will never change)||No name, |
|Reserved||Not||836,536||No name, |
Code points in the range U+D800–U+DBFF (1,024 code points) are known as high-surrogate code points, and code points in the range U+DC00–U+DFFF (1,024 code points) are known as low-surrogate code points. A high-surrogate code point followed by a low-surrogate code point form a surrogate pair in UTF-16 to represent code points greater than U+FFFF. These code points otherwise cannot be used (this rule is ignored often in practice especially when not using UTF-16).
A small set of code points are guaranteed never to be used for encoding characters, although applications may make use of these code points internally if they wish.
There are sixty-six of these noncharacters: U+FDD0–U+FDEF and any code point ending in the value FFFE or FFFF (i.e., U+FFFE, U+FFFF, U+1FFFE, U+1FFFF, … U+10FFFE, U+10FFFF). The set of noncharacters is stable, and no new noncharacters will ever be defined. Like surrogates, the rule that these cannot be used is often ignored, although the operation of the byte order mark assumes that U+FFFE will never be the first code point in a text.
Excluding surrogates and noncharacters leaves 1,111,998 code points available for use.
Private-use code points are considered to be assigned characters, but they have no interpretation specified by the Unicode standard so any interchange of such characters requires an agreement between sender and receiver on their interpretation. There are three private-use areas in the Unicode codespace:
Private Use Area: U+E000–U+F8FF (6,400 characters)
Supplementary Private Use Area-A: U+F0000–U+FFFFD (65,534 characters)
Supplementary Private Use Area-B: U+100000–U+10FFFD (65,534 characters).
Graphic characters are characters defined by Unicode to have particular semantics, and either have a visible glyph shape or represent a visible space. As of Unicode 12.1 there are 137,766 graphic characters.
Format characters are characters that do not have a visible appearance, but may have an effect on the appearance or behavior of neighboring characters. For example, U+200C ZERO WIDTH NON-JOINER and U+200D ZERO WIDTH JOINER may be used to change the default shaping behavior of adjacent characters (e.g., to inhibit ligatures or request ligature formation). There are 163 format characters in Unicode 12.1.
Sixty-five code points (U+0000–U+001F and U+007F–U+009F) are reserved as control codes, and correspond to the C0 and C1 control codes defined in ISO/IEC 6429. U+0009 (Tab), U+000A (Line Feed), and U+000D (Carriage Return) are widely used in Unicode-encoded texts. In practice the C1 code points are often improperly-translated (Mojibake) legacy CP-1252 characters used by some English and Western European texts with Windows technologies.
Graphic characters, format characters, control code characters, and private use characters are known collectively as assigned characters. Reserved code points are those code points which are available for use, but are not yet assigned. As of Unicode 12.1 there are 836,536 reserved code points.
The set of graphic and format characters defined by Unicode does not correspond directly to the repertoire of abstract characters that is representable under Unicode. Unicode encodes characters by associating an abstract character with a particular code point. However, not all abstract characters are encoded as a single Unicode character, and some abstract characters may be represented in Unicode by a sequence of two or more characters. For example, a Latin small letter "i" with an ogonek, a dot above, and an acute accent, which is required in Lithuanian, is represented by the character sequence U+012F, U+0307, U+0301. Unicode maintains a list of uniquely named character sequences for abstract characters that are not directly encoded in Unicode.
All graphic, format, and private use characters have a unique and immutable name by which they may be identified.
This immutability has been guaranteed since Unicode version 2.0 by the Name Stability policy. In cases where the name is seriously defective and misleading, or has a serious typographical error, a formal alias may be defined, and applications are encouraged to use the formal alias in place of the official character name.
For example, U+A015 ꀕ YI SYLLABLE WU has the formal alias YI SYLLABLE ITERATION MARK, and U+FE18 ︘ PRESENTATION FORM FOR VERTICAL RIGHT WHITE LENTICULAR BRAKC ET (sic) has the formal alias PRESENTATION FORM FOR VERTICAL RIGHT WHITE LENTICULAR BRACK ET.
Over the years several countries or government agencies have been members of the Unicode Consortium.
Presently only the Ministry of Awqaf and Religious Affairs of the Sultanate of Oman is a full member with voting rights.
The Consortium has the ambitious goal of eventually replacing existing character encoding schemes with Unicode and its standard Unicode Transformation Format (UTF) schemes, as many of the existing schemes are limited in size and scope and are incompatible with multilingual environments.
Unicode is developed in conjunction with the International Organization for Standardization and shares the character repertoire with ISO/IEC 10646: the Universal Character Set. Unicode and ISO/IEC 10646 function equivalently as character encodings, but The Unicode Standard contains much more information for implementers, covering—in depth—topics such as bitwise encoding, collation and rendering. The Unicode Standard enumerates a multitude of character properties, including those needed for supporting bidirectional text. The two standards do use slightly different terminology.
The Unicode Consortium first published The Unicode Standard in 1991 (version 1.0), and has published new versions on a regular basis since then. The latest version of the Unicode Standard, version 12.1, was released in May 2019, and is available in electronic format from the consortium's website. The last version of the standard that was published completely in book form (including the code charts) was version 5.0 in 2006, but since version 5.2 (2009) the core specification of the standard has been published as a print-on-demand paperback. The entire text of each version of the standard, including the core specification, standard annexes and code charts, is freely available in PDF format on the Unicode website.
Thus far, the following major and minor versions of the Unicode standard have been published.
Update versions, which do not include any changes to character repertoire, are signified by the third number (e.g., "version 4.0.1") and are omitted in the table below.
|1.0.0||October 1991||24||7,161||Initial repertoire covers these scripts:Arabic,Armenian,Bengali,Bopomofo, Cyrillic, Devanagari,Georgian, Greek and Coptic,Gujarati,Gurmukhi, Hangul,Hebrew,Hiragana,Kannada,Katakana,Lao, Latin,Malayalam,Oriya,Tamil,Telugu,Thai, andTibetan.|
|1.0.1||June 1992||25||28,359||The initial set of 20,902CJK Unified Ideographsis defined.|
|1.1||June 1993||ISO/IEC 10646-1:1993||24||34,233||4,306 moreHangulsyllables added to original set of 2,350 characters.Tibetanremoved.|
|2.0||July 1996||ISO/IEC 10646-1:1993 plus Amendments 5, 6 and 7||25||38,950||Original set ofHangulsyllables removed, and a new set of 11,172 Hangul syllables added at a new location.Tibetanadded back in a new location and with a different character repertoire.Surrogate character mechanism defined, and Plane 15 and Plane 16Private Use Areasallocated.|
|2.1||May 1998||ISO/IEC 10646-1:1993 plus Amendments 5, 6 and 7, as well as two characters from Amendment 18||25||38,952||Euro signandObject Replacement Characteradded.|
|3.0||September 1999||ISO/IEC 10646-1:2000||38||49,259||Cherokee,Ethiopic,Khmer,Mongolian,Burmese,Ogham,Runic,Sinhala,Syriac,Thaana,Unified Canadian Aboriginal Syllabics, andYi Syllablesadded, as well as a set ofBraillepatterns.|
|3.1||March 2001||ISO/IEC 10646-1:2000 ISO/IEC 10646-2:2001||41||94,205||Deseret,GothicandOld Italicadded, as well as sets of symbols forWestern musicandByzantine music, and 42,711 additionalCJK Unified Ideographs.|
|3.2||March 2002||ISO/IEC 10646-1:2000 plus Amendment 1 ISO/IEC 10646-2:2001||45||95,221||PhilippinescriptsBuhid,Hanunó'o,Tagalog, andTagbanwaadded.|
|4.0||April 2003||ISO/IEC 10646:2003||52||96,447||Cypriot syllabary,Limbu, Linear B,Osmanya,Shavian,Tai Le, andUgariticadded, as well asHexagram symbols.|
|4.1||March 2005||ISO/IEC 10646:2003 plus Amendment 1||59||97,720||Buginese,Glagolitic,Kharoshthi,New Tai Lue,Old Persian,Syloti Nagri, andTifinaghadded, andCopticwas disunified from Greek.AncientGreek numbersandmusical symbolswere also added.|
|5.0||July 2006||ISO/IEC 10646:2003 plus Amendments 1 and 2, as well as four characters from Amendment 3||64||99,089||Balinese,Cuneiform,N'Ko,Phags-pa, andPhoenicianadded.|
|5.1||April 2008||ISO/IEC 10646:2003 plus Amendments 1, 2, 3 and 4||75||100,713||Carian,Cham,Kayah Li,Lepcha,Lycian,Lydian,Ol Chiki,Rejang,Saurashtra,Sundanese, andVaiadded, as well as sets of symbols for thePhaistos Disc,Mahjong tiles, andDomino tiles.There were also important additions forBurmese, additions of letters andScribal abbreviationsused in medievalmanuscripts, and the addition ofCapital ẞ.|
|5.2||October 2009||ISO/IEC 10646:2003 plus Amendments 1, 2, 3, 4, 5 and 6||90||107,361||Avestan,Bamum, Egyptian hieroglyphs(theGardiner Set, comprising 1,071 characters),Imperial Aramaic,Inscriptional Pahlavi,Inscriptional Parthian,Javanese,Kaithi,Lisu,Meetei Mayek,Old South Arabian,Old Turkic,Samaritan,Tai ThamandTai Vietadded.4,149 additionalCJK Unified Ideographs(CJK-C), as well as extended Jamo for Old Hangul, and characters forVedic Sanskrit.|
|6.0||October 2010||ISO/IEC 10646:2010 plus theIndian rupee sign||93||109,449||Batak,Brahmi,Mandaic,playing cardsymbols,transportandmapsymbols,alchemical symbols,emoticonsand emoji.222 additionalCJK Unified Ideographs(CJK-D) added.|
|6.1||January 2012||ISO/IEC 10646:2012||100||110,181||Chakma,Meroitic cursive,Meroitic hieroglyphs,Miao,Sharada,Sora Sompeng, andTakri.|
|6.2||September 2012||ISO/IEC 10646:2012 plus theTurkish lira sign||100||110,182||Turkish lira sign.|
|6.3||September 2013||ISO/IEC 10646:2012 plus six characters||100||110,187||5 bidirectional formatting characters.|
|7.0||June 2014||ISO/IEC 10646:2012 plus Amendments 1 and 2, as well as theRuble sign||123||113,021||Bassa Vah,Caucasian Albanian,Duployan,Elbasan,Grantha,Khojki,Khudawadi,Linear A,Mahajani,Manichaean,Mende Kikakui,Modi,Mro,Nabataean,Old North Arabian,Old Permic,Pahawh Hmong,Palmyrene,Pau Cin Hau,Psalter Pahlavi,Siddham,Tirhuta,Warang Citi, andDingbats.|
|8.0||June 2015||ISO/IEC 10646:2014 plus Amendment 1, as well as theLari sign, nine CJK unified ideographs, and 41 emoji characters||129||120,737||Ahom,Anatolian hieroglyphs,Hatran,Multani,Old Hungarian,SignWriting, 5,771CJK unified ideographs, a set of lowercase letters forCherokee, and five emojiskin tonemodifiers|
|9.0||June 2016||ISO/IEC 10646:2014 plus Amendments 1 and 2, as well as Adlam, Newa, Japanese TV symbols, and 74 emoji and symbols||135||128,237||Adlam,Bhaiksuki,Marchen,Newa,Osage,Tangut, and 72 emoji|
|10.0||June 2017||ISO/IEC 10646:2017 plus 56emojicharacters, 285hentaiganacharacters, and 3 Zanabazar Square characters||139||136,755||Zanabazar Square,Soyombo,Masaram Gondi,Nüshu,hentaigana(non-standardhiragana), 7,494CJK unified ideographs, and 56 emoji|
|11.0||June 2018||ISO/IEC 10646:2017 plus Amendment 1, as well as 46 Mtavruli Georgian capital letters, 5 CJK unified ideographs, and 66 emoji characters.||146||137,439||Dogra,Georgian Mtavrulicapital letters,Gunjala Gondi,Hanifi Rohingya,Indic Siyaq numbers,Makasar,Medefaidrin,Old Sogdian and Sogdian,Mayan numerals, 5 urgently neededCJK unified ideographs, symbols forxiangqi(Chinese chess) andstar ratings, and 145 emoji|
|12.0||March 2019||ISO/IEC 10646:2017 plus Amendments 1 and 2, as well as 62 additional characters.||150||137,993||Elymaic,Nandinagari,Nyiakeng Puachue Hmong,Wancho,Miao scriptadditions for several Miao and Yi dialects in China,hiraganaandkatakanasmall letters for writing archaic Japanese,Tamilhistoric fractions and symbols,Laoletters for Pali, Latin letters for Egyptological and Ugaritic transliteration, hieroglyph format controls, and 61 emoji|
|12.1||May 2019||150||137,994||Adds a single character at U+32FF for the square ligature form of the name of theReiwa era.|
Many modern applications can render a substantial subset of the many scripts in Unicode, as demonstrated by this screenshot from the OpenOffice.org application.
Unicode covers almost all scripts (writing systems) in current use today.
A total of 150 scripts are included in the latest version of Unicode (covering alphabets, abugidas and syllabaries), although there are still scripts that are not yet encoded, particularly those mainly used in historical, liturgical, and academic contexts. Further additions of characters to the already encoded scripts, as well as symbols, in particular for mathematics and music (in the form of notes and rhythmic symbols), also occur.
The Unicode Roadmap Committee (Michael Everson, Rick McGowan, Ken Whistler, V.S. Umamaheswaran) maintain the list of scripts that are candidates or potential candidates for encoding and their tentative code block assignments on the Unicode Roadmap page of the Unicode Consortium Web site. For some scripts on the Roadmap, such as Jurchen and Khitan small script, encoding proposals have been made and they are working their way through the approval process. For others scripts, such as Mayan (besides numbers) and Rongorongo, no proposal has yet been made, and they await agreement on character repertoire and other details from the user communities involved.
Some modern invented scripts which have not yet been included in Unicode (e.g., Tengwar) or which do not qualify for inclusion in Unicode due to lack of real-world use (e.g., Klingon) are listed in the ConScript Unicode Registry, along with unofficial but widely used Private Use Area code assignments.
There is also a Medieval Unicode Font Initiative focused on special Latin medieval characters. Part of these proposals have been already included into Unicode.
The Script Encoding Initiative , a project run by Deborah Anderson at the University of California, Berkeley was founded in 2002 with the goal of funding proposals for scripts not yet encoded in the standard. The project has become a major source of proposed additions to the standard in recent years.
Mapping and encodings
Several mechanisms have been specified for implementing Unicode.
The choice depends on available storage space, source code compatibility, and interoperability with other systems.
Unicode Transformation Format and Universal Coded Character Set
Unicode defines two mapping methods: the Unicode Transformation Format (UTF) encodings, and the Universal Coded Character Set (UCS) encodings. An encoding maps (possibly a subset of) the range of Unicode code points to sequences of values in some fixed-size range, termed code values. All UTF encodings map all code points (except surrogates) to a unique sequence of bytes. The numbers in the names of the encodings indicate the number of bits per code value (for UTF encodings) or the number of bytes per code value (for UCS encodings). UTF-8 and UTF-16 are probably the most commonly used encodings. UCS-2 is an obsolete subset of UTF-16; UCS-4 and UTF-32 are functionally equivalent.
UTF encodings include:
UTF-1, a retired predecessor of UTF-8, maximizes compatibility with ISO 2022, no longer part of The Unicode Standard;
UTF-7, a 7-bit encoding sometimes used in e-mail, often considered obsolete (not part of The Unicode Standard, but only documented as an informational RFC, i.e., not on the Internet Standards Track);
UTF-8, an 8-bit variable-width encoding which maximizes compatibility with ASCII;
UTF-EBCDIC, an 8-bit variable-width encoding similar to UTF-8, but designed for compatibility with EBCDIC (not part of The Unicode Standard);
UTF-16, a 16-bit, variable-width encoding;
UTF-32, a 32-bit, fixed-width encoding.
UTF-8 uses one to four bytes per code point and, being compact for Latin scripts and ASCII-compatible, provides the de facto standard encoding for interchange of Unicode text. It is used by FreeBSD and most recent Linux distributions as a direct replacement for legacy encodings in general text handling.
The UCS-2 and UTF-16 encodings specify the Unicode Byte Order Mark (BOM) for use at the beginnings of text files, which may be used for byte ordering detection (or byte endianness detection). The BOM, code point U+FEFF has the important property of unambiguity on byte reorder, regardless of the Unicode encoding used; U+FFFE (the result of byte-swapping U+FEFF) does not equate to a legal character, and U+FEFF in other places, other than the beginning of text, conveys the zero-width non-break space (a character with no appearance and no effect other than preventing the formation of ligatures).
The same character converted to UTF-8 becomes the byte sequence EF BB BF.
The Unicode Standard allows that the BOM "can serve as signature for UTF-8 encoded text where the character set is unmarked". Some software developers have adopted it for other encodings, including UTF-8, in an attempt to distinguish UTF-8 from local 8-bit code pages. However RFC 3629 , the UTF-8 standard, recommends that byte order marks be forbidden in protocols using UTF-8, but discusses the cases where this may not be possible. In addition, the large restriction on possible patterns in UTF-8 (for instance there cannot be any lone bytes with the high bit set) means that it should be possible to distinguish UTF-8 from other character encodings without relying on the BOM.
In UTF-32 and UCS-4, one 32-bit code value serves as a fairly direct representation of any character's code point (although the endianness, which varies across different platforms, affects how the code value manifests as an octet sequence). In the other encodings, each code point may be represented by a variable number of code values. UTF-32 is widely used as an internal representation of text in programs (as opposed to stored or transmitted text), since every Unix operating system that uses the gcc compilers to generate software uses it as the standard "wide character" encoding. Some programming languages, such as Seed7, use UTF-32 as internal representation for strings and characters. Recent versions of the Python programming language (beginning with 2.2) may also be configured to use UTF-32 as the representation for Unicode strings, effectively disseminating such encoding in high-level coded software.
Punycode, another encoding form, enables the encoding of Unicode strings into the limited character set supported by the ASCII-based Domain Name System (DNS). The encoding is used as part of IDNA, which is a system enabling the use of Internationalized Domain Names in all scripts that are supported by Unicode. Earlier and now historical proposals include UTF-5 and UTF-6.
GB18030 is another encoding form for Unicode, from the Standardization Administration of China. It is the official character set of the People's Republic of China (PRC). BOCU-1 and SCSU are Unicode compression schemes. The April Fools' Day RFC of 2005 specified two parody UTF encodings, UTF-9 and UTF-18.
Ready-made versus composite characters
Unicode includes a mechanism for modifying character shape that greatly extends the supported glyph repertoire.
This covers the use of combining diacritical marks. They are inserted after the main character. Multiple combining diacritics may be stacked over the same character. Unicode also contains precomposed versions of most letter/diacritic combinations in normal use. These make conversion to and from legacy encodings simpler, and allow applications to use Unicode as an internal text format without having to implement combining characters. For example, é can be represented in Unicode as U+ 0065 (LATIN SMALL LETTER E) followed by U+0301 (COMBINING ACUTE ACCENT), but it can also be represented as the precomposed character U+00E9 (LATIN SMALL LETTER E WITH ACUTE). Thus, in many cases, users have multiple ways of encoding the same character. To deal with this, Unicode provides the mechanism of canonical equivalence.
An example of this arises with Hangul, the Korean alphabet. Unicode provides a mechanism for composing Hangul syllables with their individual subcomponents, known as Hangul Jamo. However, it also provides 11,172 combinations of precomposed syllables made from the most common jamo.
The CJK characters currently have codes only for their precomposed form. Still, most of those characters comprise simpler elements (called radicals), so in principle Unicode could have decomposed them as it did with Hangul. This would have greatly reduced the number of required code points, while allowing the display of virtually every conceivable character (which might do away with some of the problems caused by Han unification). A similar idea is used by some input methods, such as Cangjie and Wubi. However, attempts to do this for character encoding have stumbled over the fact that Chinese characters do not decompose as simply or as regularly as Hangul does.
A set of radicals was provided in Unicode 3.0 (CJK radicals between U+2E80 and U+2EFF, KangXi radicals in U+2F00 to U+2FDF, and ideographic description characters from U+2FF0 to U+2FFB), but the Unicode standard (ch. 12.2 of Unicode 5.2) warns against using ideographic description sequences as an alternate representation for previously encoded characters:
This process is different from a formal encoding of an ideograph. There is no canonical description of unencoded ideographs; there is no semantic assigned to described ideographs; there is no equivalence defined for described ideographs. Conceptually, ideographic descriptions are more akin to the English phrase "an 'e' with an acute accent on it" than to the character sequence <U+0065, U+0301>.
Many scripts, including Arabic and Devanagari, have special orthographic rules that require certain combinations of letterforms to be combined into special ligature forms. The rules governing ligature formation can be quite complex, requiring special script-shaping technologies such as ACE (Arabic Calligraphic Engine by DecoType in the 1980s and used to generate all the Arabic examples in the printed editions of the Unicode Standard), which became the proof of concept for OpenType (by Adobe and Microsoft), Graphite (by SIL International), or AAT (by Apple).
Instructions are also embedded in fonts to tell the operating system how to properly output different character sequences. A simple solution to the placement of combining marks or diacritics is assigning the marks a width of zero and placing the glyph itself to the left or right of the left sidebearing (depending on the direction of the script they are intended to be used with). A mark handled this way will appear over whatever character precedes it, but will not adjust its position relative to the width or height of the base glyph; it may be visually awkward and it may overlap some glyphs. Real stacking is impossible, but can be approximated in limited cases (for example, Thai top-combining vowels and tone marks can just be at different heights to start with). Generally this approach is only effective in monospaced fonts, but may be used as a fallback rendering method when more complex methods fail.
Several subsets of Unicode are standardized: Microsoft Windows since Windows NT 4.0 supports WGL-4 with 656 characters, which is considered to support all contemporary European languages using the Latin, Greek, or Cyrillic script. Other standardized subsets of Unicode include the Multilingual European Subsets:
MES-1 (Latin scripts only, 335 characters), MES-2 (Latin, Greek and Cyrillic 1062 characters) and MES-3A & MES-3B (two larger subsets, not shown here).
Note that MES-2 includes every character in MES-1 and WGL-4.
|8F,92,B7, DE-EF,FA–FF||Latin Extended-B(80–FF...)|
|02||18–1B, 1E–1F||Latin Extended-B (...00–4F)|
|59, 7C, 92||IPA Extensions(50–AF)|
|BB–BD,C7,D6,D8–DB,DD,DF, EE||Spacing Modifier Letters(B0–FF)|
|03||74–75, 7A, 7E,84–8A, 8C, 8E–A1, A3–CE,D7, DA–E1||Greek(70–FF)|
|04||00–5F, 90–91,92–C4, C7–C8, CB–CC, D0–EB, EE–F5, F8–F9||Cyrillic(00–FF)|
|1E||02–03, 0A–0B, 1E–1F, 40–41, 56–57, 60–61, 6A–6B,80–85,9B,F2–F3||Latin Extended Additional(00–FF)|
|1F||00–15, 18–1D, 20–45, 48–4D, 50–57, 59, 5B, 5D, 5F–7D, 80–B4, B6–C4, C6–D3, D6–DB, DD–EF, F2–F4, F6–FE||Greek Extended(00–FF)|
|7F, 82||Superscripts and Subscripts(70–9F)|
|21||22, 26,||Letterlike Symbols(00–4F)|
|22||00,02,03,06,08–09,0F, 11–12, 15, 19–1A, 1E–1F,27–28,29,2A,2B, 48,59,60–61, 64–65,82–83, 95, 97||Mathematical Operators(00–FF)|
|23||02, 0A, 20–21,29–2A||Miscellaneous Technical(00–FF)|
|25||00, 02, 0C, 10, 14, 18, 1C, 24, 2C, 34, 3C, 50–6C||Box Drawing(00–7F)|
|80, 84, 88, 8C, 90–93||Block Elements(80–9F)|
|A0–A1, AA–AC, B2, BA, BC, C4, CA–CB, CF, D8–D9, E6||Geometric Shapes(A0–FF)|
|F0||(01–02)||Private Use Area(00–FF...)|
|FB||01–02||Alphabetic Presentation Forms(00–4F)|
Rendering software which cannot process a Unicode character appropriately often displays it as an open rectangle, or the Unicode "replacement character" (U+FFFD, �), to indicate the position of the unrecognized character. Some systems have made attempts to provide more information about such characters. Apple's Last Resort font will display a substitute glyph indicating the Unicode range of the character, and the SIL International's Unicode Fallback font will display a box showing the hexadecimal scalar value of the character.
Code point lookup
Online tools for finding the code point for a known character include Unicode Lookup by Jonathan Hedley and Shapecatcher by Benjamin Milde. In Unicode Lookup, one enters a search key (e.g. "fractions"), and a list of corresponding characters with their code points is returned. In Shapecatcher, based on Shape context, one draws the character in a box and a list of characters approximating the drawing, with their code points, is returned.
Unicode has become the dominant scheme for internal processing and storage of text.
Although a great deal of text is still stored in legacy encodings, Unicode is used almost exclusively for building new information processing systems.
Early adopters tended to use UCS-2 (the fixed-width two-byte precursor to UTF-16) and later moved to UTF-16 (the variable-width current standard), as this was the least disruptive way to add support for non-BMP characters. The best known such system is Windows NT (and its descendants, Windows 2000, Windows XP, Windows Vista, Windows 7, Windows 8 and Windows 10), which uses UTF-16 as the sole internal character encoding. The Java and .NET bytecode environments, macOS, and KDE also use it for internal representation. Partial support for Unicode can be installed on Windows 9x through the Microsoft Layer for Unicode.
UTF-8 (originally developed for Plan 9) has become the main storage encoding on most Unix-like operating systems (though others are also used by some libraries) because it is a relatively easy replacement for traditional extended ASCII character sets. UTF-8 is also the most common Unicode encoding used in HTML documents on the World Wide Web.
Multilingual text-rendering engines which use Unicode include Uniscribe and DirectWrite for Microsoft Windows, ATSUI and Core Text for macOS, and Pango for GTK+ and the GNOME desktop.
Because keyboard layouts cannot have simple key combinations for all characters, several operating systems provide alternative input methods that allow access to the entire repertoire.
ISO/IEC 14755, which standardises methods for entering Unicode characters from their code points, specifies several methods. There is the Basic method, where a beginning sequence is followed by the hexadecimal representation of the code point and the ending sequence. There is also a screen-selection entry method specified, where the characters are listed in a table in a screen, such as with a character map program.
MIME defines two different mechanisms for encoding non-ASCII characters in email, depending on whether the characters are in email headers (such as the "Subject:"), or in the text body of the message; in both cases, the original character set is identified as well as a transfer encoding. For email transmission of Unicode, the UTF-8 character set and the Base64 or the Quoted-printable transfer encoding are recommended, depending on whether much of the message consists of ASCII characters. The details of the two different mechanisms are specified in the MIME standards and generally are hidden from users of email software.
The adoption of Unicode in email has been very slow.
Some East Asian text is still encoded in encodings such as ISO-2022, and some devices, such as mobile phones, still cannot correctly handle Unicode data. Support has been improving, however. Many major free mail providers such as Yahoo, Google (Gmail), and Microsoft (Outlook.com) support it.
All W3C recommendations have used Unicode as their document character set since HTML 4.0. Web browsers have supported Unicode, especially UTF-8, for many years. There used to be display problems resulting primarily from font related issues; e.g. v 6 and older of Microsoft Internet Explorer did not render many code points unless explicitly told to use a font that contains them.
most of the C0 control codes
the permanently unassigned code points D800–DFFF
FFFE or FFFF
HTML characters manifest either directly as bytes according to document's encoding, if the encoding supports them, or users may write them as numeric character references based on the character's Unicode code point. For example, the references Δ, Й, ק, م, ๗, あ, 叶, 葉, and 말 (or the same numeric values expressed in hexadecimal, with &#x as the prefix) should display on all browsers as Δ, Й, ק ,م, ๗, あ, 叶, 葉, and 말.
Free and retail fonts based on Unicode are widely available, since TrueType and OpenType support Unicode. These font formats map Unicode code points to glyphs, but TrueType font is restricted to 65,535 glyphs.
Thousands of fonts exist on the market, but fewer than a dozen fonts—sometimes described as "pan-Unicode" fonts—attempt to support the majority of Unicode's character repertoire. Instead, Unicode-based fonts typically focus on supporting only basic ASCII and particular scripts or sets of characters or symbols. Several reasons justify this approach: applications and documents rarely need to render characters from more than one or two writing systems; fonts tend to demand resources in computing environments; and operating systems and applications show increasing intelligence in regard to obtaining glyph information from separate font files as needed, i.e., font substitution. Furthermore, designing a consistent set of rendering instructions for tens of thousands of glyphs constitutes a monumental task; such a venture passes the point of diminishing returns for most typefaces.
Unicode partially addresses the newline problem that occurs when trying to read a text file on different platforms. Unicode defines a large number of characters that conforming applications should recognize as line terminators.
In terms of the newline, Unicode introduced U+2028 LINE SEPARATOR and U+2029 PARAGRAPH SEPARATOR.
This was an attempt to provide a Unicode solution to encoding paragraphs and lines semantically, potentially replacing all of the various platform solutions.
In doing so, Unicode does provide a way around the historical platform dependent solutions.
Nonetheless, few if any Unicode solutions have adopted these Unicode line and paragraph separators as the sole canonical line ending characters.
However, a common approach to solving this issue is through newline normalization.
This is achieved with the Cocoa text system in Mac OS X and also with W3C XML and HTML recommendations.
In this approach every possible newline character is converted internally to a common newline (which one does not really matter since it is an internal operation just for rendering).
In other words, the text system can correctly treat the character as a newline, regardless of the input's actual encoding.
Philosophical and completeness criticisms
Various Cyrillic characters shown with and without italics
Han unification (the identification of forms in the East Asian languages which one can treat as stylistic variations of the same historical character) has become one of the most controversial aspects of Unicode, despite the presence of a majority of experts from all three regions in the Ideographic Research Group (IRG), which advises the Consortium and ISO on additions to the repertoire and on Han unification.
Unicode has been criticized for failing to separately encode older and alternative forms of kanji which, critics argue, complicates the processing of ancient Japanese and uncommon Japanese names. This is often due to the fact that Unicode encodes characters rather than glyphs (the visual representations of the basic character that often vary from one language to another). Unification of glyphs leads to the perception that the languages themselves, not just the basic character representation, are being merged. There have been several attempts to create alternative encodings that preserve the stylistic differences between Chinese, Japanese, and Korean characters in opposition to Unicode's policy of Han unification. An example of one is TRON (although it is not widely adopted in Japan, there are some users who need to handle historical Japanese text and favor it).
Although the repertoire of fewer than 21,000 Han characters in the earliest version of Unicode was largely limited to characters in common modern usage, Unicode now includes more than 87,000 Han characters, and work is continuing to add thousands more historic and dialectal characters used in China, Japan, Korea, Taiwan, and Vietnam.
Modern font technology provides a means to address the practical issue of needing to depict a unified Han character in terms of a collection of alternative glyph representations, in the form of Unicode variation sequences. For example, the Advanced Typographic tables of OpenType permit one of a number of alternative glyph representations to be selected when performing the character to glyph mapping process. In this case, information can be provided within plain text to designate which alternate character form to select.
If the difference in the appropriate glyphs for two characters in the same script differ only in the italic, Unicode has generally unified them, as can be seen in the comparison between Russian (labeled standard) and Serbian characters at right, meaning that the differences are displayed through smart font technology or manually changing fonts.
Mapping to legacy character sets
Unicode was designed to provide code-point-by-code-point round-trip format conversion to and from any preexisting character encodings, so that text files in older character sets can be converted to Unicode and then back and get back the same file, without employing context-dependent interpretation. That has meant that inconsistent legacy architectures, such as combining diacritics and precomposed characters, both exist in Unicode, giving more than one method of representing some text. This is most pronounced in the three different encoding forms for Korean Hangul. Since version 3.0, any precomposed characters that can be represented by a combining sequence of already existing characters can no longer be added to the standard in order to preserve interoperability between software using different versions of Unicode.
Injective mappings must be provided between characters in existing legacy character sets and characters in Unicode to facilitate conversion to Unicode and allow interoperability with legacy software. Lack of consistency in various mappings between earlier Japanese encodings such as Shift-JIS or EUC-JP and Unicode led to round-trip format conversion mismatches, particularly the mapping of the character JIS X 0208 '~' (1-33, WAVE DASH), heavily used in legacy database data, to either U+FF5E ~ FULLWIDTH TILDE (in Microsoft Windows) or U+301C 〜 WAVE DASH (other vendors).
Some Japanese computer programmers objected to Unicode because it requires them to separate the use of U+005C \ REVERSE SOLIDUS (backslash) and U+00A5 ¥ YEN SIGN, which was mapped to 0x5C in JIS X 0201, and a lot of legacy code exists with this usage. (This encoding also replaces tilde '~' 0x7E with macron '¯', now 0xAF.) The separation of these characters exists in ISO 8859-1, from long before Unicode.
Indic scripts such as Tamil and Devanagari are each allocated only 128 code points, matching the ISCII standard. The correct rendering of Unicode Indic text requires transforming the stored logical order characters into visual order and the forming of ligatures (aka conjuncts) out of components. Some local scholars argued in favor of assignments of Unicode code points to these ligatures, going against the practice for other writing systems, though Unicode contains some Arabic and other ligatures for backward compatibility purposes only. Encoding of any new ligatures in Unicode will not happen, in part because the set of ligatures is font-dependent, and Unicode is an encoding independent of font variations. The same kind of issue arose for the Tibetan script in 2003 when the Standardization Administration of China proposed encoding 956 precomposed Tibetan syllables, but these were rejected for encoding by the relevant ISO committee (ISO/IEC JTC 1/SC 2).
Thai alphabet support has been criticized for its ordering of Thai characters. The vowels เ, แ, โ, ใ, ไ that are written to the left of the preceding consonant are in visual order instead of phonetic order, unlike the Unicode representations of other Indic scripts. This complication is due to Unicode inheriting the Thai Industrial Standard 620, which worked in the same way, and was the way in which Thai had always been written on keyboards. This ordering problem complicates the Unicode collation process slightly, requiring table lookups to reorder Thai characters for collation. Even if Unicode had adopted encoding according to spoken order, it would still be problematic to collate words in dictionary order. E.g., the word แสดง [sa dɛːŋ] "perform" starts with a consonant cluster "สด" (with an inherent vowel for the consonant "ส"), the vowel แ-, in spoken order would come after the ด, but in a dictionary, the word is collated as it is written, with the vowel following the ส.
Characters with diacritical marks can generally be represented either as a single precomposed character or as a decomposed sequence of a base letter plus one or more non-spacing marks.
For example, ḗ (precomposed e with macron and acute above) and ḗ (e followed by the combining macron above and combining acute above) should be rendered identically, both appearing as an e with a macron and acute accent, but in practice, their appearance may vary depending upon what rendering engine and fonts are being used to display the characters. Similarly, underdots, as needed in the romanization of Indic, will often be placed incorrectly.. Unicode characters that map to precomposed glyphs can be used in many cases, thus avoiding the problem, but where no precomposed character has been encoded the problem can often be solved by using a specialist Unicode font such as Charis SIL that uses Graphite, OpenType, or AAT technologies for advanced rendering features.
The Unicode standard has imposed rules intended to guarantee stability. Depending on the strictness of a rule, a change can be prohibited or allowed.
For example, a "name" given to a code point cannot and will not change.
But a "script" property is more flexible, by Unicode's own rules.
In version 2.0, Unicode changed many code point "names" from version 1.
At the same moment, Unicode stated that from then on, an assigned name to a code point will never change anymore.
This implies that when mistakes are published, these mistakes cannot be corrected, even if they are trivial (as happened in one instance with the spelling BRAKCET for BRACKET in a character name).
In 2006 a list of anomalies in character names was first published, and, as of April 2017, there were 94 characters with identified issues, for example:
U+2118 ℘ SCRIPT CAPITAL P: This is a small letter. The capital is U+1D4AB 𝒫 MATHEMATICAL SCRIPT CAPITAL P
U+034F ͏ COMBINING GRAPHEME JOINER: Does not join graphemes.
U+A015 ꀕ YI SYLLABLE WU: This is not a Yi syllable, but a Yi iteration mark.
U+FE18 ︘ PRESENTATION FORM FOR VERTICAL RIGHT WHITE LENTICULAR BRAKCET: bracket is spelled incorrectly.
Comparison of Unicode encodings
Cultural, political, and religious symbols in Unicode
International Components for Unicode (ICU), now as ICU-TC a part of Unicode
List of binary codes
List of Unicode characters
List of XML and HTML character entity references
Open-source Unicode typefaces
Standards related to Unicode
Universal Character Set
Lotus Multi-Byte Character Set (LMBCS), a parallel development with similar intentions
|
<urn:uuid:170a0cc2-50e9-4136-94ee-f5073d67c991>
|
CC-MAIN-2023-40
|
https://everipedia.org/wiki/lang_en/Unicode
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233505362.29/warc/CC-MAIN-20230921073711-20230921103711-00558.warc.gz
|
en
| 0.874567 | 13,685 | 3.015625 | 3 |
Research is addictive. It’s a lot like writing, taking you on a journey far beyond where you imagined you would go. Researching Elizabeth Alcott’s life is taking me on that unexpected journey. In the next few posts, I will take you there too, into the world of nineteenth century women’s health issues.
Just a note that I am just learning about these things and would very much appreciate your comments as I know many of you know far more than I do!
In Transcendental Wife, Cynthia Barton writes of the doctor’s final diagnosis of Lizzie’s illness: “atrophy or consumption of the nervous system, with great development of hysteria.” (pg. 161, excerpt taken from Abba’s journal in January of 1858). What in the world does that mean?
The root of a woman’s ills
To understand this diagnosis, one needs to know the foundation for all diagnoses of women’s ailments: “medical analysis of a woman began and ended with consideration of an organ unique to her, namely her uterus.” (from Women and Health in America, First Edition, edited by Judith Walzer Leavitt, from the article, “The Fashionable Diseases”: Women’s Complaints and Their Treatment in Nineteenth-Century America” by Ann Douglas Wood). (pg. 223)
It was supposed that women were subjected to twice the number of diseases as men simply because they have a womb. A certain Dr. Dewees, professor of midwifery at the University of Pennsylvania wrote, “Her uterus exercises a ‘paramount power’ over her physical and moral system, and its sway is ‘no less whimsical than potent.’ Furthermore, ‘she is constantly liable to irregularities in her menstrua, and menaced severely by their consequences.” (pg. 224)
Therefore, the root of Lizzie Alcott’s illness according to Dr. Christian Geist (a well-known practitioner of homeopathy), was her uterus.
It’s no wonder Dr. Geist came up with his diagnosis considering the symptoms commonly attributed to the uterus: loss of weight, peevish irritability, hysterical fits of crying and insomnia, constipation, indigestion, headaches and backaches. (ibid)
Prescribed treatment of hysteria (be forewarned!)
Treatment was “local,” beginning with an internal investigation of the womb. When Lizzie was examined by Dr. Geist, it was likely she was put through such an internal. Wood writes that it did not matter whether or not the symptoms were directly related to the uterus: “her uterus might well be subjected to local treatment in the period 1830-1860.” (“The Fashionable Diseases,” pg. 224) Cynthia Barton writes that Lizzie “was, in fact, much agitated by the doctor’s presence and wept all the time he was there.” (Transcendental Wife, pg. 161).
The internal was just the first step in treating hysteria. There were three other stages though not all were applied each time: (warning—this may make for difficult reading)
- Manual investigation
- “Leeching” (actual leeches attached)
- “Injections” (of a variety of elements including water, milk, linseed tea, etc.—you get the idea)
- “Cauterization” (application of nitrate of silver, hydrate of potassa, or the use of a white-hot instrument) (“The Fashionable Diseases,” ibid)
Did Lizzie receive this treatment?
Dr. Geist’s diagnosis of hysteria was made in January of 1858; Lizzie died in March of that year. She was a mere 84-1/2 pounds when he saw her (from Lizzie’s letter to Bronson, December 13, 1857, Houghton Library MS Am 1130.9 (25-27) and MS AM 2745 (71)). There is no mention in family journals or letters of any followup from Dr. Geist’s initial visit. I would speculate that Abba, utterly committed to homeopathic medicine (and also very doubtful of the benefits of medicine–see below), wanted to spare Lizzie the suffering that would come of such treatment.
Like a B-grade horror movie!
As a complete novice to women’s health issues and their treatment in the nineteenth century, I was greatly disturbed; reading Ann Douglas Wood’s essay was like watching a gruesome horror movie. I could not comprehend how supposedly educated men calling themselves doctors actually bought into such a line of thinking–to me it defies logic. Medicine was indeed at a primitive stage often inflicting more pain than it cured. It is no wonder that Abba, exasperated at one point at the failure of doctors to even reach a diagnosis, called the whole medical process “a prolonged Guess.” (from Abba’s letter to brother Sam, August 25, 1857, MS Am 1130.9 (25)).
In many ways, the guessing game exists today as well, especially when it comes to mental health. I recently watched a video of a presentation by Debbie Nathan, author of Sybil Exposed: The Extraordinary Story Behind the Famous Multiple Personality Case (proving that the multiple personalities were faked) where she documented the experimental drug use that patients endured from their psychiatrists; it sounded as crazy as the treatment nineteenth century women received for their ills. Are things really that much better today? It’s hard to say. I would venture to say there is still a lot of guessing in medicine.
Exploring other health issues
In briefly exploring hysteria, I then thought about PMS and puberty. What would puberty have been like for the Alcott girls? Louisa gives us a taste of hers in her journal which I will explore in the next post. Women and Health in America featured two essays about menstruation and puberty for young women during Louisa’s time and I will share a summary of those articles.
And again, if you are knowledgeable about women and health in Louisa’s time, please chime in!
Are you passionate about
Louisa May Alcott too?
Subscribe to the email list and
never miss a post!
Keep up with news and free giveaways on Susan’s books,
Louisa May Alcott: Illuminated by The Message, and River of Grace!
Facebook Louisa May Alcott is My Passion
More About Louisa on Twitter
|
<urn:uuid:7a8c404b-c35f-42e0-ac5c-ca2766e5f0b7>
|
CC-MAIN-2022-21
|
https://louisamayalcottismypassion.com/2016/02/02/womens-health-issues-in-alcotts-time-lizzies-diagnosis-and-its-repercussions/?shared=email&msg=fail
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662545326.51/warc/CC-MAIN-20220522094818-20220522124818-00550.warc.gz
|
en
| 0.967386 | 1,415 | 2.515625 | 3 |
You may have heard that the U.S. Food and Drug Administration is rolling out a new nutrition facts label in 2018 featuring an “added sugar” category. And you’re probably wondering what the heck that means for you.
Here’s the deal: The FDA wants to help you distinguish between added sugars (i.e. things like table sugar and sweeteners) and naturally occurring sugars (like the fructose found in fruit). The U.S. Dietary Guidelines recommend that you get no more than 10 percent of your daily calories from added sugars because they add a lot of calories to your diet without contributing much nutritionally. That's why the FDA wants to make sure you know exactly where the sweet stuff in your food is coming from.
Julie Upton, R.D., cofounder of nutrition website Appetite for Health, applauds the move, and says it should prompt companies to lower the added sugar content in their products. “They know consumers will be looking closely at added sugars and they are now forced to do something about it,” she says. Certified dietitian-nutritionist Lisa Moskovitz, R.D., CEO of NY Nutrition Group. agrees. “Any time more information is available for consumers it can help them make better choices,” she says.
But experts say you might be shocked to know which foods contain added sugars. Here are some biggies to be on the lookout for:
Many types of processed, packaged breads have high added sugar counts to improve taste and preserve the product, Upton says. Until the label change allows you to track which loaves go overboard with sweeteners, try fresh-made bakery loaves, instead. Freeze half so you know you can’t eat it all at once, Upton says.
That sweet flavor doesn’t come from the dairy, says Moskovitz. She recommends switching to plain, unsweetened yogurt and adding fresh fruit to cut back on unnecessary cals.
Ever notice how the pasta sauce you buy tastes different from the stuff you make yourself? That’s because the jarred kind is usually packed with sugar. “Added sugar is a lot less expensive than fresh tomatoes, so some manufacturers pump up sugar and reduce tomatoes to have more profit,” says Upton. Instead of buying a jar of sauce, buy canned tomato sauce and add a few spices to DIY it.
Like pasta sauce, these condiments are packed with added sugar, Moskovitz says. Try switching to salsa or hot sauce to get a little punch without the side of sugar.
It seems weird that you’d put sugar on your salad, but that’s just what you’re doing when you buy most packaged dressings. Added sugars improve flavor and are cheap, so companies add them liberally, says Upton. Consider using olive oil or balsamic vinegar on your salads, instead.
Nut milk sounds healthy, but most of these products have extra calories from added sugar and flavoring, says Sonya Angelone, R.D., a spokesperson for the Academy of Nutrition and Dietetics. If you're a nut milk fan, she recommends opting for an unsweetened version.
Some bars are loaded with sugar, which is one source of the "energy" they provide. "Many bars have a health halo, but are just glorified candy bars," says Angelone. But they all aren't bad. She recommends reading labels and opting for those with less sugar. (Here's exactly what to look for on the label.)
|
<urn:uuid:51bf1a66-07d5-4663-8a18-7c3b06eb2a85>
|
CC-MAIN-2018-39
|
https://www.womenshealthmag.com/food/g19911814/foods-with-added-sugars/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159160.59/warc/CC-MAIN-20180923055928-20180923080328-00164.warc.gz
|
en
| 0.94874 | 734 | 2.671875 | 3 |
Because of their diversity and abundance, insects play major roles in the functioning of terrestrial and freshwater ecosystems. For example, insects influence the nutrient and energy flow of ecosystems in many ways, but perhaps most importantly as decomposers. No source of decaying organic material goes unused by insects, and their action is often necessary before other groups of decomposers can take advantage of the material. In both terrestrial and freshwater aquatic ecosystems, insect decomposers are crucial to the breakdown of plant material (both leaf litter and woody material), dead animals, and waste material. The decomposition of carrion is also slowed when insects are excluded from the process (Payne, 1965).
Despite the many important ways that insects influence ecosystem structure and function, we know relatively little about the insect faunas of most southeastern U.S. habitats, including those in the ACE Basin study area. Based on known and likely distributions, the ACE Basin study area should have 30 orders of insects (out of the 31 recognized in Borror et al. 1989), only lacking the Grylloblattaria, which are known only from beyond the treeline in the mountains and the arctic (Scholtens pers. comm.). Scholtens (pers. comm.) estimated that 8,000 to 10,000 insect species live in the Basin. This estimate should be considered preliminary because so few groups have been surveyed, and for those that have, there are either relatively few collections, or survey work was done outside the ACE Basin study area.
Probably the best studied taxa of insects in the ACE Basin study area and elsewhere are the butterflies and skippers (Papilionoidea and Hesperioidea). They occur in all major habitats in the ACE Basin study area, and approximately 125 butterfly and skipper species are either residents or migrants. Of the 125 butterfly and skipper species in the ACE Basin study area, 41 are classified as habitat specialists. Of these, 27 are restricted to some sort of wooded habitat and 12 to open habitats, and 2 have mixed preferences. Overall, 24 species prefer wet or moist habitats and 17 prefer dry habitats. These numbers indicate that the loss of some specialized habitats, particularly wetlands, could result in the disproportionate loss of species from two families of butterflies and skippers. For at least these insect groups, the numbers emphasize the importance of swamps, freshwater marshes, and saltwater marshes for maintaining species diversity.
For most groups of insects in most habitats, however, a great deal remains to be learned about how they influence the structure and functioning of that ecosystem. Of all habitats characteristic of the ACE Basin study area, the most is known about the community of insects found in salt marshes (Davis 1978; Davis and Gray 1966; Foster and Treherne 1976; Marples 1966; Teal 1962). Davis and Gray (1966) showed that the most abundant insects in the salt marsh are the Diptera (true flies) and Homoptera (hoppers), each with only a few common species represented. The next most abundant orders of insects are Coleoptera (beetles), Orthoptera (grasshoppers, katydids, and crickets), Lepidoptera (butterflies and moths), Hemiptera (true bugs), Hymenoptera (bees, wasps, and ants), and Odonata (dragonflies and damselflies), respectively, as well as smaller numbers of other orders. Vernberg and Sansbury (1972) found similar results in Port Royal Sound, South Carolina, and these same dominants are likely abundant throughout salt marshes in the ACE Basin study area. However, salt marsh habitat has a relatively low diversity of insects despite their high abundance.
Since no group of insects in any ACE Basin habitat has received significant attention, it is difficult to make knowledgeable decisions about how best to maintain insect diversity in the region. However, there is consensus in the field of insect conservation that the most important factor in maintaining diversity is maintaining appropriate habitat (Gaston et al. 1993; Pullin 1995). In this regard the ACE Basin study area is fortunate because large areas of habitat are already set aside as protected lands. Additional conserved areas could be advantageous in maintaining insect diversity, but decisions about which habitats are most important will have to await more complete information on occurrence and distribution of insects in the region.
|
<urn:uuid:b51fb398-cfef-44d6-b0e3-c5997256b02d>
|
CC-MAIN-2015-35
|
http://www.dnr.sc.gov/marine/mrri/acechar/insects.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645176794.50/warc/CC-MAIN-20150827031256-00190-ip-10-171-96-226.ec2.internal.warc.gz
|
en
| 0.930137 | 885 | 4.125 | 4 |
Simple measures can keep problem of inefficient ‘network standby’ from worsening in years ahead, IEA report says.
Today, the world’s 14 billion online electronic devices – such as set-top boxes, modems, printers and game consoles – waste around USD 80 billion each year because of inefficient technology. By 2020, the problem will considerably worsen, with an estimated USD 120 billion wasted. But a report by the International Energy Agency points to a different path, identifying simple measures that can be implemented now to improve energy efficiency in networked devices, resulting in massive savings of energy and money.
The report, More Data, Less Energy: Making Network Standby More Efficient in Billions of Connected Devices, shows that electricity demand of our increasingly digital economies is growing at an alarming rate. While data centre energy demand has received much attention, of greater cause for concern is the growing energy demand of billions of networked devices. In 2013, a relatively small portion of the world’s population relied on these devices to stay connected. But energy demand is increasing as a growing share of the world’s population becomes wired and as network connectivity spreads to devices and appliances that were previously not connected, such as washing machines, refrigerators, lights and thermostats.
“The proliferation of connected devices brings many benefits to the world, but right now the cost is far higher than it should be,” said IEA Executive Director Maria van der Hoeven. “Consumers are losing money in the form of wasted energy, which is leading to more costly power stations and more distribution infrastructure being built than we would otherwise need – not to mention all the extra greenhouse gases that are being emitted. But it need not be this way. If we adopt best available technologies we can minimise the cost of meeting demand as the use and benefits of connected devices grows.”
As the report explains, much of the problem boils down to inefficient “network standby” – that is, the maintaining of a network connection while in standby. In many devices, standby is a misnomer: it suggests that the device has gone to sleep and is almost off. In reality, most network-enabled devices draw as much power in this mode as when activated to perform their main tasks.
In 2013, the world’s networked devices consumed around 616 terawatt hours (TWh) of electricity, the majority of which was used in standby mode. Of that total, around 400 TWh – equivalent to the electricity consumed annually by the United Kingdom and Norway combined – was wasted because of inefficient technology.
“The problem is not that these devices are often in standby mode, but rather that they typically use much more power than they should to maintain a connection and communicate with the network,” said Ms. Van der Hoeven. “Just by using today’s best available technology, such devices could perform exactly the same tasks in standby while consuming around 65% less power.”
The report describes technologies and technical solutions as well as a range of policy options that are available to reduce energy waste. It projects that if better energy efficiency measures were applied to online devices in the coming years, 600 TWh of energy would be saved. That’s equivalent to shutting 200 standard 500MW coal-fired power plants, which would cut emissions by 600 million metric tons of CO2.
In the report, the IEA calls on policy makers, standards development organisations, software and hardware developers, designers, service providers and manufacturers to work together to reduce energy demand. To achieve this, the agency urges an international initiative to enhance standards, as the issue is global.
|
<urn:uuid:b48bb5b3-df54-4ab9-be2f-d17b429cf406>
|
CC-MAIN-2016-26
|
http://www.marinelink.com/news/powering-billion-devices372236.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.69/warc/CC-MAIN-20160624154955-00102-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.949456 | 752 | 3.203125 | 3 |
Obesity is known to be a major contributor to poor health. It is a global problem that is continuing to rise, largely fueled by the modern diet and lifestyle. Traditionally obesity is expressed by a body mass index (BMI) exceeding 30, although a BMI over 25 which is indicative of being overweight can also be associated with detrimental health effects. BMI is the ratio between weight and height. It continues to be the standard for determining obesity but it is not always an accurate reflection of the body fat content. For example, a muscular person may have a higher BMI which indicates obesity yet their body fat content is low.
Abdominal obesity is sometimes a better indicator of health risk associated with being overweight or obese. BMI reflects total body fat and not the fat content in a specific area of the body. Abdominal circumference and its ratio to hip size, known as the waist-to-hip ratio, or just the waist size alone are two ways to determine the abdominal obesity. However, there are two types of fat that need to be considered in abdominal obesity – subcutaneous and visceral.
Subcutaneous abdominal fat is the fat under the skin around the abdomen. It is more easily visible as a flabby belly. Visceral fat is the fat accumulation around abdominal organs that is not visible without diagnostic investigations like an MRI (magnetic resonance imaging). Between the two, visceral fat is believed to be the more dangerous type. When looking at ways to counteract the effects of abdominal obesity, the focus should be on preventing and undoing visceral fat accumulation.
Control Daily Calories
Obesity is largely due to higher than normal intake of calories in the daily diet. The average adult male is said to require about 2,500 calories per day while females need around 2,000 calories daily. This varies depending on a person’s height, age and daily level of physical activity. Exceeding the daily calorie intake while not expending enough calories through physical activity will lead to weight fain. It is a result of fat accumulation as excess calories are converted an stored as fat.
In the modern diet, exceeding daily calorie intake is relatively easy. A single meal of some popular fast foods can be more than 2,500 calories. However, efforts by health authorities in most countries is now making it mandatory that food manufacturers and sellers clearly stipulate the calories contained in different food items. Calorie counting can be tedious but a basic estimate of your calorie consumption should be an ongoing process with every meal. Alternatively, stick to known low-calorie foods and eat it in moderation.
Limit Carbs and Fat
Carbohydrates and fats are the two types of nutrients that are the major contributors to obesity. The problem is that many of the more affordable, and often considered as the better testing foods, are high in carbohydrates and/or fats. While both nutrients are necessary for a healthy body, an excess of either can be a problem in the battle of the bulge. Fat in particular needs to be consumed in small quantities as ounce for ounce it contains about 3 times more calories than carbohydrates.
Not all carbohydrates are handled in the same way in the body. Some carb0hydrates are broken down more faster than others. A rapid rise in the glucose levels will lead to greater insulin secretion by the pancreas. These carbohydrates are said to have a higher glycemic index (GI) since it raises the blood glucose levels quite quickly. It is these types of carbohydrates that should be excluded from the diet. While certain types of fats like saturated fats are not good for you, all fats should eaten in moderation due to its role in obesity.
150 Minutes Of Exercise
Physical activity is important on a daily basis as people who live sedentary lifestyles will naturally gain weight more easily. Exercise has a host of health benefits but its role in preventing excess weight gain and counteracting obesity is probably one of the most significant. It is important to exercise consistently, at least 5 days in a week. But just as important is the type of exercise and duration of sessions that will determine the health benefits and the extent to which obesity can be prevented.
Ideally a person should exercise for at least 120 to 150 minutes per week. This means daily sessions of about 30 minutes for 5 days a week. Or slightly longer sessions for people who exercise less frequently in a week. Both weight training and aerobic exercise is helpful but it is important to get an all clear from your doctor before starting with any exercise program. The importance of consistency cannot be overstated – exercising infrequently can be harmful, even more so than not exercising at all in some situations.
Reduce Stress Levels
Stress is now known to play a major role in weight gain. With abdominal obesity, stress is believed to be one of the most significant contributors to visceral fat. It appears that the stress hormones like cortisol promotes fat accumulation in some organs within the body. It also affects the action of insulin leading to a higher insulin production and consequently contributes to fat deposition. Stress affects eating habits in a number of ways – from eating fewer high calorie meals to comfort eating – which ultimately leads to weight gain.
Stress management should therefore be a important part of any program to combat abdominal obesity. It is not always possible to avoid stress in the modern world. But just how you handle stress is a factor in determining how it will affect you. There are various ways to reduce stress levels, from exercise to techniques like yoga and meditation. It is also important to consult with a psychotherapist to learn proper coping skills to manage everyday stress and not allow it to have a physical impact on your body.
Get Enough Sleep
Work stress. Financial worries. Relationship problems. Academic commitments. These are some of the common reasons for the prevalence of sleep problems in the modern world. Sometimes it is just an excess of stimulus like spending long hours surfing the Net or playing video games when you should be sleeping. Whatever the reason, medical science now knows that sleep plays a significant role in weight control. Not getting enough sleep can cause you to gain weight.
Not every person may need 8 hours of sleep a day. But trying to manage on less than 6 hours daily can in fact affect your health and lead to weight gain. Similarly sleeping for too long in a day means that you are less active and therefore more likely to gain weight due to a sedentary lifestyle. It is about finding the balance between too little and too much sleep. 7 to 8 hours is ideal, but you should not exceed 10 hours. And the quality of sleep is just as important as the quantity of sleep.
|
<urn:uuid:ad884776-f00f-4b3e-bbd2-0d82913dbcd2>
|
CC-MAIN-2017-13
|
http://www.healthhype.com/5-ways-to-prevent-abdominal-obesity.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189403.13/warc/CC-MAIN-20170322212949-00458-ip-10-233-31-227.ec2.internal.warc.gz
|
en
| 0.95571 | 1,335 | 3.71875 | 4 |
- Northern Illinois to get $8.3 million for state construction projects
- Tree-lighting festival kicks off holiday season in Machesney Park
- Roscoe Boy Scout Troop’s tree stand at new location
- Tips for selecting safe toys for kids this holiday season
- Prayer service for World AIDS Day Nov. 30
- Food Bank joins national #GivingTuesday movement
- Lee Hamilton: What lies ahead for Congress
- Rockford Public Schools faces $8.8 deficit, board OKs flat tax, HR chief
- Literary Hook: A holiday tradition: ‘This Thanksgiving, Remember’
- Cold snap does not negate global warming
Chronic wasting disease control program results for 2011-2012
By Douglas R. Dufford
District Wildlife Biologist, Illinois Department of Natural Resources
Chronic wasting disease (CWD) is a fatal disease of deer, elk and moose. It does not appear to be a human health threat, though disease experts caution against eating venison from deer known to be infected.
First observed in the 1960s in captive deer in Colorado, CWD is now a very real and serious threat to wild deer throughout North America. During the past 15 years, the known range of the disease has increased dramatically (at least 17 states and two Canadian provinces have now documented CWD), and the rate of CWD infection appears to be increasing throughout much of that range.
One of the most dramatic examples of the potential of CWD comes from southeastern Wyoming, where more than 50 percent of tested mule deer in the South Converse Hunting Unit (1,224 square miles) had CWD during the 2011 hunting season, compared to only 15 percent in 2001.
Unfortunately, CWD is present in northern Illinois. The first case was found in a white-tailed deer near Roscoe, Ill., in 2002. Through June 30, 2012, the Illinois Department of Natural Resources (IDNR) tested more than 65,000 deer statewide and identified 372 individual deer infected with CWD. These were in 10 northern Illinois counties — Boone, Winnebago, DeKalb, McHenry, Kane, Grundy, LaSalle, Ogle, Stephenson and Jo Daviess. The highest concentration of CWD cases have been found along the Boone-Winnebago county line from Wisconsin down into northwestern DeKalb County.
Shortly after the first case was discovered, the IDNR implemented a CWD Management Program. The goals are to suppress CWD prevalence rates so they remain low, and to slow the rate of spread to the remainder of the state by reducing deer densities in CWD infection areas and maintaining deer herds at lower levels. Lower densities and the removal of CWD-positive deer reduce contact rates between sick and susceptible individuals.
Deer densities are managed at the county level in the CWD area through liberal hunting regulations, including virtually unlimited numbers of firearm deer permits and the addition of a special CWD deer hunting season. Where needed, IDNR supplements hunter harvest with agency sharpshooting performed after the hunting seasons to allow for a focused removal of deer from specific areas where the disease is known to occur.
All sharpshooting is performed with landowner permission only in areas where it is safe to do so; all deer are retrieved and tested; and all venison appropriate for human consumption is donated to the Northern Illinois Food Bank for distribution to northern Illinoisans in need of food assistance.
In 2011-2012, results were obtained from 8,175 deer tested statewide for CWD. Fortunately, only 36 deer in seven counties were found to be CWD-positive. The highest number of positives was found in Kane County (seven), followed by Boone (five), DeKalb (five), Grundy (five),
McHenry (three), Ogle (two) and Stephenson (two). Most tested samples were from hunter-harvested deer (6,726 samples — 82 percent of the total), but sharpshooting accounted for most of the sick deer identified (25 positives, 69 percent of the total). Most positive deer were found in areas already known to have CWD, although expansion into eastern Grundy County was noted.
While most other states and provinces affected by CWD have experienced outbreaks that continue to worsen, infection rates in Illinois have remained relatively stable at low levels, averaging just below 1 percent for the 10 counties where CWD is known to occur.
CWD is distributed in a very patchy pattern in northern Illinois, and there are “hot spots” with much higher infection rates than other areas. Highest infection rates during 2011-2012 were found along the Boone-Winnebago county line from Wisconsin south to northwestern DeKalb County. Of interest is a pattern of decreasing infection rates observed in each of the last three years in the northern part of that area (north and northeast of Rockford), where infection rates declined to 5.4 percent this year. This is the area where the disease was first observed, and which historically has had the highest infection rates.
However, in the southern portions of this band, infection rates have remained steady or have been increasing, reaching Illinois’ highest rate of 12.4 percent in NW DeKalb and NE Ogle counties this past year. This pattern may be the result of differences in our ability to implement the CWD Management Program — landowner cooperation and support is very high in the northern area, but cooperators are much fewer in the south. Concerned, cooperating landowners are the key to disease management, and in the absence of that, disease control efforts cannot be successful.
Illinois’ program of CWD surveillance and active management during the past 10 years has successfully suppressed the rate of disease at very low levels. There is much work left to be done, however, and state budgets are very tight. There is strong evidence from around North America that when left unmanaged, CWD will increase and expand, with potentially devastating consequences for deer populations in the long term.
White-tailed deer are one of our most revered natural resources, and I’d like to think that Illinoisans will do everything in their power to protect that resource. I believe the future of white-tailed deer in all of Illinois lies in the hands of landowners and sportsmen in our CWD-positive areas.
More information is available at the IDNR website (http://dnr.state.il.us/cwd/) or by contacting me at (815) 535-2875.
From the Nov. 7-13, 2012, issue
|
<urn:uuid:2222a3e8-23a0-44bb-be36-3cabaa1c6ed4>
|
CC-MAIN-2014-49
|
http://rockrivertimes.com/2012/11/07/chronic-wasting-disease-control-program-results-for-2011-2012/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931013466.18/warc/CC-MAIN-20141125155653-00108-ip-10-235-23-156.ec2.internal.warc.gz
|
en
| 0.961716 | 1,348 | 2.65625 | 3 |
Open the message you want to forward.
Click the Forward button.
Outlook creates a new message, completing the Subject line. (Fw: is added to the Subject line to indicate that the message has been forwarded.)
Suppose you've received a message, such as a funny joke, that you want to send, or forward, to someone else. In that case, you can use Outlook's Forward feature.
Enter the recipient(s) address(es) by typing it in the To line or by clicking the To button and selecting it from the Address Book.
Type any additional message you want to include.
Click the Send button in the message window's toolbar. The message is sent.
Forwarding from the Inbox
As an alternative, you can forward a message from the Inbox. You follow the same basic procedure as outlined here, but you select the message in the Inbox and then click the Forward button in the Outlook window's toolbar.
|
<urn:uuid:3c31f0c8-27f7-4796-a40d-316f9d5f09d0>
|
CC-MAIN-2017-22
|
http://etutorials.org/Microsoft+Products/microsoft+office+outlook+2003/Part+3.+Reading+and+Handling+E-mail+Messages/Forwarding+a+Message/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463609837.56/warc/CC-MAIN-20170528141209-20170528161209-00450.warc.gz
|
en
| 0.898099 | 199 | 2.5625 | 3 |
Skull of LB1 (Homo floresiensis) and modern human.
A few links and papers on Homo floresiensis brain size and the evolution of primate brain size. It seems that the evolution of brain size in primates is not one directional (always leading to larger brain) but instead body size and brain size is subjected to separate selective pressure. In the evolution of Homo floresiensis, evolution shrunk its brain size much like how evolution shrunk the brain size of Mouse Lemur, Marmosets and Mangabeys. So, the small brain size in Homo floresiensis is not pathological but instead a product of evolution. There’s a good write up at A Primate of Modern Aspect.
A White-collared Mangabay (Cercobebus torquatus)
A Pygmy Mouse Lemur (Microcebus myoxinus). Smallest primate in the world. Photo from National Geographic.
A Pygmy Marmoset (Callithrix pygmaea). Photo from Wikipedia.
Links to paper and articles:
Scientific American: What the small-brained hobbit reveals about primate evolution.
EurekAlert!: Is the Hobbit’s brain unfeasibly small?
EurekAlert!: Does evolution always lead to bigger brains?
Wired Science: Evolution Shrank Some Primates’ Brains.
Originally posted on The Prancing Papio.
|
<urn:uuid:30f9fda8-79cb-4ea1-be38-f29f3f219310>
|
CC-MAIN-2019-18
|
https://primatology.net/2010/01/28/the-evolution-of-brain-size-in-primates-and-homo-floresiensis/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578527720.37/warc/CC-MAIN-20190419121234-20190419143234-00434.warc.gz
|
en
| 0.792449 | 302 | 2.78125 | 3 |
While British North America experienced its own industrialization, international developments shaped the way Canadians first experienced it. Before Confederation, Canada was shaped by its mercantilist relationship to Great Britain. Mercantilism functioned on the premise that colonies would provide raw materials for the “mother country,” which would in turn export finished goods back to the colonies.
The First Industrial Revolution began in the mid-18th century in Great Britain. It was a period in which technological advances were made, such as the spinning jenny and steam power. It was also when innovations in machine tools led to a shift from agriculture to large-scale cottage industries in weaving and textiles. The First Industrial Revolution also brought the development of railways, iron ships and manufacturing tools. Britain was the first country to experience this phase of industrialization, an experience that began later in Western Europe, the United States and Japan. After mercantilism was ended by the British in the 1840s, British North Americans began to engage in activities that led to early industrialization.
First Industrial Revolution in British North America: 1780s to 1860s
The shift from a largely agricultural and extractive economy to one that engaged in manufacturing was propelled by the shift from wind to steam power, and the embrace of new transportation technologies. In mid-19th-century British North America, early industry centred on the development of railways, which connected what is now Ontario, Québec and the Maritime Provinces and eastern United States. Early industrialization was also shaped by the creation of canals, such as Montréal’s Lachine Canal (1820s), which facilitated the transportation of goods.
By the 1850s, some manufacturing, including small factories producing farm implements, tools and other metal goods, had developed in Montréal, Toronto and smaller centres. At the same time, advances in some sectors of the economy such as brewing, milling, textiles and shipbuilding reshaped economies and laid the basis for even greater industrialization. The early, petit bourgeois entrepreneurs of the First Industrial Revolution also reflected the growth of an emerging capitalist class, one that largely utilized small- to medium-sized family-run firms. Industrial investment in this period was often funded through British financing of bonds.
Second Industrial Revolution in Canada: 1860s to 1950s
The Second Industrial Revolution began in the late 19th and early 20th centuries. It was marked by mass automation and the moving assembly line, large-scale factories and time management of workers. During this period, companies reshaped manufacturing, consumption, work and the urban landscape. The Second Industrial Revolution profoundly changed North America, especially the United States, where economies of scale — in the rail, steel, consumer goods and automotive sectors — transformed the economy. Along with further technological advances and developments in production processes, mass manufacturing came of age. In the automobile industry, entrepreneurs and industrialists such as Henry Ford revolutionized mass assembly by creating gigantic factories designed to turn out standardized, inexpensive and durable cars — a departure from the craft approach to manufacturing, which aimed to build luxury vehicles for wealthy customers. Mass production generated new markets for automobiles, and democratized both the production and consumption of cars.
This dynamic occurred in a host of sectors in the Canadian economy, from meat packing to farm implements to small-scale consumer goods to automobile manufacturing. Much of this industrial economic activity took place in Ontario and Québec, where early industry had been established. Extraction of natural resources, particularly coal, forestry, oil and gas, and metals, fuelled these sectors, and also illustrated the broader impact of manufacturing upon non-urban communities. There was also significant development of the coal and steel industries in Nova Scotia, along with some shipbuilding.
After Confederation in 1867, manufacturing sectors of the economy were protected by tariffs outlined in the National Policy (1879). The policy intended to create and nurture industry in Canada by levying a tax of up to 20 per cent on goods made in other countries. While it protected some industries, the National Policy also facilitated the creation of “branch plants.” Factories owned by companies with headquarters in a different country, mostly the United States, branch plants were established in Canada in an effort to leap over the protectionist tariff wall. By the 1920s, American branch plant operations dominated in some industrial sectors in Canada, including automobile assembly, but also in consumer products, chemicals and auto parts. The National Policy also fueled regional grievances. The West and the Maritimes argued that the policy unfairly benefitted industrialists, workers, bankers and the population of Central Canada.
The First World War accelerated the Second Industrial Revolution in Canada. State efforts to support the war effort led to interventionist policies that pushed the manufacture of munitions and arms, transportation and other support equipment (see also Imperial Munitions Board).
Industrial wage economies drew immigrants and other Canadians to cities, where most industrial activity was centred (see Urbanization). During the Great Depression, the majority of Canada’s population became urban. The shift to a wage-dependent economy resulted in tremendous hardship during the depression. Mass layoffs in the industrial centres made many question the capitalist system, of which industrialization was such a large part.
The Second World War ended the Great Depression, in that it sparked a massive intervention in the industrial economy by federal state planners. Those state planners established new industries and crown corporations and directed private industry to produce machinery, transportation equipment and armaments and munitions for the war effort. For instance, Ottawa created the Polymer Corporation, a crown company, to produce rubber for the war effort, which helped revitalize the chemical industry in southwestern Ontario. In places such as Windsor, Oshawa and Ajax, leading manufacturers such as General Motors of Canada provided equipment and vehicles to the Canadian government under contract. The production of consumer goods was suspended for the duration of the war. Meanwhile, shipbuilding boomed on the East Coast, and steel production dominated in cities such as Hamilton, Ontario. By the war’s end, Canada had achieved full employment.
Impacts on the Workplace and Relations between Labour and Capital
The growth of mass manufacturing in the late 19th century reshaped work profoundly. By the time of the 1889 Report of the Royal Commission on the Relations of Labor and Capital in Canada, it was clear that waged labour had become the key form of work for many Canadians. Yet the working conditions that they experienced and the wages they earned were, more often than not, less than ideal. Workplaces were dangerous, unsanitary and often cramped. Industrial accidents were common. Wages and hours were punishing, with child labour a common practice. Tobacco, textiles, heavy manufacturing and a host of other industries were part of an industrial system that exploited workers (see Working-Class History).
Organized labour emerged in the late-19th and early-20th centuries to challenge the exploitation of the working class. Differences within the labour movement — between craft and industrial unions — over who should be part of organized labour often fragmented these efforts. But unionization and the fight for better wages and working conditions continued. By the Winnipeg General Strike (1919), Canada faced a resurgent workers’ movement, one that was challenged by corporate interests and the government, who repressed workers’ organizations through the legal system (see Labour Organization).
During the Great Depression and the Second World War, the labour movement grew and challenged the capitalist system. Organizations such as the Canadian Congress of Labour and new unions such as the international United Auto Workers successfully organized industries and ensured recognition and rights for unions. They launched mass strikes and sit-down protests at workplaces across the country during the war. Changes in the legal system, such as the 1946 decision of Justice Ivan Rand to ensure union dues whether or not all employees were part of a union, also helped to facilitate the establishment of industrial unions in Canada (see Rand Formula). Industrial workers fought for collective bargaining, minimum wages, pensions, vacation pay, workplace benefits, legislated working hours, and legislation to protect against unemployment, workplace accidents and discriminatory hiring practices.
As early as the late 19th century, Canadian families had begun to shift from a farm-based economy to one based on industrial work and wages in urban areas. This required all family members to work for wages, either in factories (often fathers and children, but increasingly women, as well), or at home, where women took in boarders, cleaned and did piecework to stretch the family income. Wages — as opposed to subsistence farming or the selling of crops — became the primary form of work for Canadians, particularly after the 1920s. This reflected the profoundly class-based system of the industrial economy, which placed the means of production in the hands of a small group of wealthy elites.
In the 1950s, industrial work was at a peak in Canada. Cars, airplanes, steel, chemicals, appliances and other consumer goods were manufactured in Canada. Industrial labour constituted the largest segment of the male working population, one that was privileged by state policies that encouraged the male breadwinner ideal. By the 1960s and 1970s, approximately 30 per cent of the Canadian working population was in a union, often an industrial union. Major firms and manufacturing companies such as Massey-Ferguson, Bombardier, General Motors of Canada, the Dominion Steel and Coal Corporation and A.V. Roe Canada Limited dotted the industrial landscape.
Between the 1960s and the 1980s, automation, new production processes and productivity advances started to change the nature of industrial work, leading to greater dependence on technology and worker efficiency. At the same time, competition from newly industrialized or reindustrialized nations in Europe and Asia challenged Canadian manufacturers to remain competitive and to innovate. Starting in the 1960s, both in Canada and, more significantly, in the United States, deindustrialization began to occur, particularly in the industrial Midwest.
After the 1990s, deindustrialization became a significant factor in economic discourse, particularly in Ontario, where much of the industrial economy was located. Some of this deindustrialization was caused by trade agreements such as the General Agreement on Tariffs and Trade/World Trade Organization, and regional trade pacts such as the Canada-United States Free Trade Agreement (1989) and the North American Free Trade Agreement (1994). Those trade deals effectively dismantled the protectionist approach of the National Policy. Meanwhile, automation, innovation and productivity increases meant that fewer workers were necessary to produce manufactured goods.
In the post-1973 period, following the Arab-led oil embargo that helped spur inflation and economic decline in much of the West, many durable goods and consumables were increasingly made outside of Canada, or North America. In the 2000s, auto assembly in Ontario faced restructuring and decline. The 1965 Auto Pact, a managed trade agreement that provided some guarantees for production in Canada, was found contrary to international trade rules, and the North American economy faced the financial crisis of 2008–09 (see Recession).
By the 1970s, the computing revolution and digital technology had transformed the workplace. This impact was multifaceted. With an increasing amount of industrial work done by automation, including robotic processes, manufacturing work became less of a segment of the industrial economy. At the same time, computerization shifted much of the modern economy into the service sector, with retail, banking and finance, communications and other aspects of the economy outpacing manufacturing.
|
<urn:uuid:687d4118-2b89-4437-a3a9-05e7d15cb345>
|
CC-MAIN-2021-17
|
https://thecanadianencyclopedia.ca/en/article/industrialization
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038075074.29/warc/CC-MAIN-20210413213655-20210414003655-00307.warc.gz
|
en
| 0.965571 | 2,318 | 3.9375 | 4 |
The attack force arrived at the remote Aleutian Island stealthily, ready to subdue the unsuspecting enemy, who vastly outnumbered them. It took a week’s travel just to get there, with boats and helicopters hopscotching 1,400 miles of coastline, stopping every few hundred miles – including once, harrowingly, at the base of an ash-spewing volcano.
At the final target, they dropped their ordnance – poison from the air. They also set traps by hand on the ground, trying to be as unobtrusive as possible to avoid detection. With the assault complete, they retreated to the safety of the mainland – uncertain for years whether the effort would be successful in eradicating the foe.
The “invasion” was conducted last fall by a group of scientists and technicians hoping to carry off one of the most ambitious rat-eradication efforts in the world. Appropriately enough, the target of their efforts was a volcanic outcropping in the Aleutian chain called Rat Island.
Centuries ago, Rat Island was believed to be a virtual paradise for seabirds – a spongy redoubt for tufted puffins, whiskered auklets, and storm petrels. But then came the rats, which turned the fecund habitat into a near-dead zone. Now scientists are trying to return the uninhabited island to its original splendor – an experiment that environments believe could be a model for restoration but some critics say is a waste of money.
• • •
In one sense, Rat Island’s narrative is one that has played out around the world. Rats have invaded 90 percent of the globe’s islands, threatening animals that evolved in the absence of vicious land hunters. Rats are specifically blamed for 40 to 60 percent of the recorded island extinctions of birds and reptiles – including the long-departed dodo.
Rat Island was the first site in Alaska to be invaded. Around 1780, a Japanese sailing ship wrecked off the coast, sending the muscular Norway rats swarming ashore. What started out as a few survivors mushroomed over the decades into a Ghengis Khan horde, which systematically wiped out nesting seabirds and their young. The island, once called “Hawadax” (entry) by native Alaskans, was renamed Rat Island.
Since then, a motley mix of ancient ships and modern vessels has introduced rat colonies to about two dozen Alaska communities and islands. Among the worst-hit sites is the Aleutian city of Unalaska/Dutch Harbor, one of the world’s top fishing and cargo ports.
Rats are particularly devastating in the treeless Aleutians. While the diverse marine life that takes refuge there has adapted to the rugged weather and conditions, it lacks any natural defenses against land predators. At Kiska, an island where rats tagged along successive World War II military invasions by Japanese and American soldiers, biologists fear that an auklet colony that numbers in the millions will be wiped out.
Ultimately, Rat Island was selected as the best candidate for Alaska’s first and North America’s fifth island rat-eradication project. At 11 square miles, Rat Island is small enough to be manageable but big enough to be biologically significant. As far as scientists can piece together, it was once, like the other islands in the Aleutian chain, among the world’s best seabird theaters – a place where murrelets and song sparrows thrived in sea grasses, glaucous-winged gulls dove into the surf, and winged denizens burrowed in the thick-rooted island vegetation.
It is also far enough removed from major cargo routes that experts think it unlikely to be invaded by ship-borne rats again. It is part of the sprawling Alaska Maritime National Wildlife Refuge, where the mandate is to protect the natural environment.
When the US Fish and Wildlife Service teamed up with the Nature Conservancy and other experts to launch the Rat Island project, few people objected. Misgivings were limited to worries about the unintended consequences of dropping rodenticide from the air. Federal authorities were able to make the case that this was the least harmful way of eliminating what has turned out to be a dangerous pest. “Rats don’t have a lot of friends,” says Mr. Byrd. “In most cases, I think folks see the value of restoration of native species.”
Not everyone was convinced. Time magazine in December listed a $150,000 congressional appropriation for the Rat Island project as one of the 10 “most outrageous earmarks” of 2008. Actually, the full cost is about $2.5 million, with most funds coming from private sources such as the Nature Conservancy and from fines paid by shippers for past oil spills.
Late fall was chosen as the best time to apply rat poison because any other animals in the vicinity would likely have migrated south. Though biologists will return this spring and next fall to monitor the situation, it will take longer than that to know whether the eradication worked. Even if the rats are all gone, years must pass before the habitat can return to a condition supporting large numbers of birds. “It may take several decades to build populations back up to thousands,” says Byrd.
Rat eradications have been successful on more than 300 islands worldwide, giving Bryd and his colleagues cause for hope. But Rat Island is particularly challenging because of its remoteness and weather. No other such project has been conducted so deep into snow country.
• • •
Byrd knows the area well. After an upbringing in North Carolina and an education as a biologist, he came to the western Alaska in 1968 on assignment with the Navy. He was posted at the once-bustling Navy station on the Aleutian island of Adak. The day he was discharged from the service, in 1971, he went to work for the Fish and Wildlife Service, serving at the Izembek National Wildlife Refuge on the Alaska Peninsula. Now nearing retirement, Byrd has spent much of his career trying to help the environment by targeting “invasive” species – bird-preying foxes, vegetation-tromping reindeer and cattle, and the most persistent villain, rats.
The Rat Island project is only a small part of a broad anti-rat program that is embraced by federal, state, and local governments as well as environmental and native groups. Sweeping Alaska regulations enacted in 2007 make it illegal to own rats or harbor them, even unknowingly. Violations are criminal offenses that carry fines of up to $200,000, plus possible jail time.
Some communities have managed to keep rats at bay. Anchorage, where the rodents have long been outlawed by local ordinance, is home to the Northern Hemisphere’s biggest rat-free port. Still, the rat menace always looms. “Really, it’s a game of Russian roulette,” says Joe Meehan, a rat expert at the Alaska Department of Fish and Game. “One just might have the luck to figure out how to fend for itself and find food and shelter and fend off predators.”
The state regulations require all Alaska ports to have detailed rat-control programs similar to oil-spill contingency plans mandated after the 1989 Exxon Valdez disaster.
“Ecologically, a rat spill is much worse than an oil spill,” Byrd says. Until the recent successes at newly rat-free islands elsewhere in the world, “We assumed if rats got into an ecosystem, it was trashed forever.”
|
<urn:uuid:1296c326-eb61-4243-a189-9330629d4a4b>
|
CC-MAIN-2019-04
|
https://www.csmonitor.com/The-Culture/2009/0312/a-grand-quest-to-rid-an-island-of-rats
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583867214.54/warc/CC-MAIN-20190122182019-20190122204019-00203.warc.gz
|
en
| 0.96091 | 1,584 | 3.4375 | 3 |
Serving Food with a Side of Growth Hormones
Consumer sentiment against the use of growth hormones in food animals has been gaining more attention in recent years. Parents fear that residual hormones in dairy and beef products are causing early puberty in children, especially little girls. Whether this claim is true or not, many diners are willing to pay higher prices to eat at restaurants that serve hormone-free beef and dairy products.
Growth hormones are proteins that stimulate growth. All animals, including humans, naturally produce growth hormones, mostly in early stages of development. Naturally occurring hormones can be replicated and injected into both humans and animals to cause faster growth. Currently, hormone injections are used by a large number of beef and dairy farmers to make more product with fewer animals.
Beef and dairy animals receive their hormones either through direct injection or from an implant placed under the skin.
In beef cows:
Currently, beef cows are the only meat-producing animals approved for hormone injection in the United States. There are five different hormones used, three natural and two synthetic; testosterone is the most well-known. The hormones are administered through an implant under the skin of the ear and deliver measured amounts throughout the animal's life. Implanted beef cows convert feed into muscle faster and more efficiently, leading to quicker maturity and leaner beef.
In dairy cows:
The only growth hormone approved for use in dairy cattle is called bovine somatotropin (bST) or recombant bovine growth hormone (rBGH). The hormone is administered through injection and simulates another naturally occurring hormone (IGF-1) which the cow uses to convert nutrients into milk. Simply put, cows given bST produce more milk than non-injected cows.
Absence labeling is the form of marketing used to identify products that do not contain growth hormones. Rather than mentioning what the food product contains, absence labeling tells consumers what the food does not contain. Many beef and dairy product labels now indicate “Hormone Free” or “Comes from cows not treated with artificial growth hormones.”
Both sides of the growth hormone debate say there are residual levels of hormones in the food and milk. Those in favor of the hormones contend that these hormones are naturally occurring in humans and animals and therefore, cause no ill effects. And those opposed to growth hormones say they do cause harm to both humans and animals.
- Fewer cows are needed to produce milk. Since rBST is designed to increase a cow’s milk production, fewer cows are needed to produce more milk. This reduces the dairy industries impact on the environment.
- Beef cows grow faster and leaner. Beef cows can grow 15 to 20% faster than non-treated animals.2 The meat produced is also leaner than conventionally grown animals.
- Any residual hormones do not harm consumers. If any residual hormones are found in the meat or milk, they are either at too low of levels to cause any response in the human body, or in the case of bST they are dead hormone cells that simply pass through the digestive system.
- Studies have time and again proven the safety of growth hormones. There are over 2,000 published studies on bST alone, undertaken by different scientists around the world.2 All have documented the quality and healthfulness of milk produced by injected cows.
- It is unhealthy for the animal. The label used to package the hormone injected into dairy cattle lists nearly two dozen side effects that can pose risks to the animal. Among the list is mastitis, a painful bacterial infection in the cow’s udder.
- Dairy cow growth hormones are linked to cancer in humans. The number of residual hormones found in cow milk is as much as 10 times higher than non-treated cows.3 Several studies have linked these high levels of residual hormones to an increased risk of breast, colon, prostate and lung cancer in humans.
- Growth hormones can cause early maturity in humans. In the late 1970s, the U.S. banned a growth hormone (DES) known to cause cancer. Rather than destroying the leftovers, the manufacturer shipped remaining hormones to Puerto Rico where the farmers liberally injected their chicken, pork and beef herds. Shortly thereafter, thousands of children as young as two were found to have reached full sexual maturity. The cause was residual DES in meat the children had consumed.4
- Milk from treated dairy cows may have residual antibiotics. Cows treated with bST have a higher rate of udder infections which the farmer treats with antibiotics. The antibiotics do show up in that cow’s milk, and if the farmer does not allow a sufficient withdrawal period, the entire milk supply could become contaminated. >> Learn More (Residual Antibiotics in Food)
Time and again, both the USDA and FDA have stated that meat and dairy products from animals injected with growth hormones are not significantly different than products from non-injected animals. Additionally, in response to the negative affects bST has on dairy cows, the FDA states that these negative affects inflict animals that are not treated with the hormone.5 So there is no evidence to support that bST causes bacterial infections.
Answering to consumer demand, several dairy producers are using absence labeling to indicate their product comes from cows not treated with bST. The hormone manufacturer has retaliated saying absence labeling is misleading since the USDA and FDA have both stated milk from treated cows is no different than milk from non-injected cows. The labeling debate has reached legislative panels in several states, like Ohio, where officials stated this form of labeling is viable, as long as the label includes the following FDA disclaimer: “no significant difference has been shown between milk derived from [the growth hormone] rbST-supplemented and non-rbST supplemented cows.”6
More from Serving Food with a Side of Growth Hormones ...
- Germs that Cause Food Poisoning
- Food Safety Temperatures and The Danger Zone
- Preventing Foodborne Illness
- Preventing Cross-Contamination
- The Importance of Handwashing
- 6 Food Quality Control Tips for Restaurants
- Health Inspection Basics
- General Health Inspection Grading
- Preparing Your Restaurant for a Health Inspection
- What To Do During a Restaurant Inspection
Back to Serving Food with a Side of Growth Hormones
|
<urn:uuid:e459553f-8c69-42b4-af68-6ca131ada5bd>
|
CC-MAIN-2014-49
|
http://www.foodservicewarehouse.com/education/product-safety-public-health/serving-food-with-a-side-of-growth-hormones-/c28196.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931009825.77/warc/CC-MAIN-20141125155649-00054-ip-10-235-23-156.ec2.internal.warc.gz
|
en
| 0.94708 | 1,304 | 3.328125 | 3 |
Carl Zimmer writes about science for The New York Times
and a number of magazines. He is currently a lecturer at Yale University. A 2007 winner of the National Academies of Science Communication Award, Zimmer is the author of several books, including Microcosm: E. coli and the New Science of Life
and The Tangled Bank: An Introduction to Evolution.
He also writes an award-winning blog about science called The Loom
More from Carl Zimmer
A new study indicates soot, known as black carbon, plays a far greater role in global warming than previously believed and is second only to CO2 in the amount of heat it traps in the atmosphere. Reducing some forms of soot emissions — such as from diesel fuel and coal burning — could prove effective in slowing down the planet’s warming.
A new study from a Pacific atoll reveals the links between native trees, bird guano, and the giant manta rays that live off the coast. In unraveling this intricate web, the researchers point to the often little-understood interconnectedness between terrestrial and marine ecosystems.
In pockets ranging from mountain peaks to bogs, scientists are discovering plants and animals that survived previous eras of climate change. Now, conservation biologists say, these climate “relicts” could shed light on how some species may hang on in the coming centuries.
One of the tenets of conservation management holds that alien species are ecologically harmful. But a new study is pointing to research that demonstrates that some non-native plants and animals can have beneficial impacts.
Yale ecologist David Skelly wanted to know why a sizable percentage of frogs in the northeastern United States suffered from deformities. His ongoing research has implicated human activity — but not in the way many researchers had thought.
As warming intensifies, scientists warn, the oxygen content of oceans across the planet could be more and more diminished, with serious consequences for the future of fish and other sea life.
Within the planet’s oceans and soils are trillions of bacteria that store and release far more carbon dioxide than all of the Earth’s trees and plants. Now, scientists are attempting to understand how the world’s bacteria will influence — and be influenced by — a warming climate.
A new study says the seas are acidifying ten times faster today than 55 million years ago when a mass extinction of marine species occurred. And, the study concludes, current changes in ocean chemistry due to the burning of fossil fuels may portend a new wave of die-offs.
In the last two decades, network theory has emerged as a way of making sense of everything from the World Wide Web to the human brain. Now, as ecologists have begun applying this theory to ecosystems, they are gaining insights into how species are interconnected and how to foster biodiversity.
The Earth has nine biophysical thresholds beyond which it cannot be pushed without disastrous consequences, the authors of a new paper in the journal Nature report. Ominously, these scientists say, we have already moved past three of these tipping points.
In a matter of years or decades, researchers believe, animals and plants already are adapting to life in a warmer world. Some species will be unable to change quickly enough and will go extinct, but others will evolve, as natural selection enables them to carry on in an altered environment.
By 2100, the world will probably be hotter than it’s been in 3 million years. In an interview with Yale Environment 360, paleoecologist Anthony D. Barnosky describes the unprecedented challenges that many species will face in this era of intensified warming.
With global warming pushing some animals and plants to the brink of extinction, conservation biologists are now saying that the only way to save some species may be to move them.
A number of companies, including one headed by biologist and entrepreneur Craig Venter, are developing genetically engineered biofuels that they say will provide a greener alternative to oil. But some environmentalists are far from convinced.
Paleontologists and geologists are looking to the ancient past for clues about whether global warming will result in mass extinctions. What they're finding is not encouraging.
Yale Environment 360 is
a publication of the
Yale School of Forestry
& Environmental Studies
e360 on Facebook
Donate to e360
View mobile site
Subscribe to our feed:
Yale Environment 360
articles are now available in Spanish and Portuguese on Universia
, the online educational network. Visit the site.
Business & Innovation
Policy & Politics
Pollution & Health
Science & Technology
Antarctica and the Arctic
Central & South America
A Yale Environment 360
video explores Ecuador’s threatened Yasuni Biosphere Reserve with scientists inventorying its stunning forests and wildlife. Watch the video.
is now available for mobile devices at e360.yale.edu/mobile
The Warriors of Qiugang
, a Yale Environment 360
video that chronicles the story of a Chinese village’s fight against a polluting chemical plant, was nominated for a 2011 Academy Award for Best Documentary (Short Subject).
Watch the video.
Top Image: aerial view of Iceland
. © Google & TerraMetrics.
In a Yale Environment 360
video, photographer Pete McBride documents how increasing water demands have transformed the Colorado River, the lifeblood of the arid Southwest. Watch the video.
|
<urn:uuid:ad5a633c-44cd-40f4-9d2f-0d95c1ac8ae9>
|
CC-MAIN-2013-48
|
http://e360.yale.edu/author/Carl_Zimmer/7/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163048447/warc/CC-MAIN-20131204131728-00099-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.910122 | 1,104 | 2.75 | 3 |
About the Course
This 2-day advanced Python course will provide the students with skills and techniques for flow control, including emulating the switch statement. You will also learn the methods of working with bytes and the internals of objects. In addition, this course revisits and thoroughly explores descriptors, metaclasses, class decorators, and abstract base classes, among others, giving you a comprehensive understanding of the Python language.
Who should do this course?
This course is ideal for those who would like to learn more advanced skills on various techniques, shortcuts, and tips for writing more professional python code. It will lead you on from being a competent programmer to becoming a master.
This course assumes you have completed our beginner and intermediate Python courses or equivalent experience and a solid understanding of all of the programming and object-oriented principles in Python. This includes lambda expressions, decorators and closures, and iterations, mapping, filtering, and the reduce function. You will also need to be familiar with implementing collection protocols, custom context managers, and introspection
Expand full topic list
Unit 1: Advanced Flow Control
- Using else Clauses on Loops
- Investigating an Alternative to Loop else Clauses
- Using the try..except..else Construct
- Emulating Switch
- Dispatching on Type
Unit 2: Byte Oriented Programming
- Understanding Bitwise Operators
- Investigating the Bytes Type in Depth
- Using the Mutable Bytearray Sequence
- Interpreting Byte Streams with the Struct Module
- Using Memory Views
- Using Memory-Mapped Files
Unit 3: Object Internals and Custom Attributes
- Understanding how Python Objects are Stored?
- Using vars() to Access dict
- Overriding getattribute()
- Using Special Methods which Bypass getattribute ()
- Locating the Methods
- Reducing Memory Usage Using Slots
Unit 4: Descriptors
- Reviewing Properties
- Unravelling the Property Function
- Implementing a Descriptor
- Retrieving Descriptors on Classes
- Understanding Data Versus Non-Data Descriptors
Unit 5: Instance Creation
- Understanding Instance Creation
- Customising Allocation
Unit 6: Metaclasses
- Understanding the Object Class
- Understanding how a Class is Allocated and Initialised
- Passing Additional Arguments to the Metaclass
- Investigating Metaclass Methods and Visibility
- Utilising Fine-Grained Instantiation Control with Metaclass Call()
- Examining Practical Metaclass Examples
- Understanding Inheritance in Metaclasses
Unit 7: Class Decorators
- Introducing Class Decorators
- Enforcing Constraints with a Class Decorator
- Enforcing Constraints for Properties
- Chaining Class Decorators
Unit 8: Abstract Base Classes
- Understanding Abstract Base-Classes
- Discussing Why Abstract Base-Classes are Useful?
- Understanding Duck Typing
- Understanding Abstract Base-Classes in Python
- Defining Subclasses with subclasscheck()
- Understanding Non-Transitivity of Subclass Relationships
- Resolving Method Calls in Virtual Base-Classes
- Investigating Library Support for Abstract Base-Classes
- Combining Abstractmethod with other Decorators
- Propagating Abstractness Through Descriptors
- Fixing our @invariant Class Decorator with ABCs
Fill in your details to have a training consultant contact you to discuss your training needs.
Thank you for your enquiry. A consultant will contact with you shortly to assist in your enquiry.
To return to the top of the page, click here.
|
<urn:uuid:94f7312a-24e1-42c8-ab1a-358cce2c959d>
|
CC-MAIN-2021-39
|
https://www.dynamicwebtraining.com.au/python-training-courses/python-advanced
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780060908.47/warc/CC-MAIN-20210928214438-20210929004438-00340.warc.gz
|
en
| 0.800736 | 768 | 2.75 | 3 |
Onset rimes are composed of two parts. The onset is the beginning sound that can be heard when words are sounded out. The rime is the part of the word that is left after the onset is removed. When. Rime hjelper deg med begge deler. Selskapsrett. Fra etablering av gründerselskap og valg av selskapsform, via organisering av forholdet mellom eierne og den daglige driften, til bistand til internasjonale konserner - vi hjelper deg å sikre interessene og verdiene dine slik at du lykkes med virksomheten din The onset is the initial phonological unit of any word (e.g. c in cat) and the term rime refers to the string of letters that follow, usually a vowel and final consonants (e.g. at in cat). Not all words have onsets. Similar to teaching beginning readers about rhyme, teaching children about onset and rime helps them recognize common chunks within words Rime definition is - frost. How to use rime in a sentence. 2: an accumulation of granular ice tufts on the windward sides of exposed objects that is formed from supercooled fog or cloud and built out directly against the win
World time and date for cities in all time zones. International time right now. Takes into account all DST clock changes 6 synonyms of rime from the Merriam-Webster Thesaurus, plus 10 related words, definitions, and antonyms. Find another word for rime • Rime is a word that means an opaque coating of snow or ice over trees and grass. However, it is also a concept dividing words opening with consonants into onsets (consonants) and word families (rimes). • There are words that can rhyme but not rime, and there are words that can rhyme and also rime
Rime definition, an opaque coating of tiny, white, granular ice particles, caused by the rapid freezing of supercooled water droplets on impact with an object. See more rime - find the meaning and all words formed with rime, anagrams with rime and much more Rime definition: frost formed by the freezing of supercooled water droplets in fog onto solid objects | Meaning, pronunciation, translations and example
Construct-a-Word provides a simple, engaging way for students to generate dozens of different words by first choosing an ending (for example -an,-ed,-at,-op) and then adding a beginning letter or blend.When a correct word is created, the word is stored in a Word Bank where students can read and review their words Rime is a talent in the Death Knight's Frost talent tree. You will need to spend 28 points total in Frost to max it. Comment by mjblink I am still using my Greataxe of the Ebon Blade in a 2H frost spec at level 64. Even when using the maximum amount of oblits in my rotation, Rime doesn't proc very often Etymology. The word derives from Old French rime or ryme, which might be derived from Old Frankish rīm, a Germanic term meaning series, sequence attested in Old English (Old English rīm meaning enumeration, series, numeral) and Old High German rīm, ultimately cognate to Old Irish rím, Greek ἀριθμός arithmos number. Alternatively, the Old French words may derive from Latin.
Synonyms, crossword answers and other related words for RIME We hope that the following list of synonyms for the word rime will help you to finish your crossword today. We've arranged the synonyms in length order so that they are easier to find. 3 letter words COL - CUT - CWM - GAP 4 letter words Word Origin Old English hrīm, of Germanic origin; related to Dutch rijm. The word became rare in Middle English but was revived in literary use at the end of the 18th cent. See rime in the Oxford Advanced American Dictionar
develop words suited to the needs of the students. Activity 1: word sort. Provide students with a copy of the following table or have it displayed in your classroom: (Nearly 500 words can be derived from the following 37 rimes) Table for word sort %asset summary_282038 The Rime of the Ancient Mariner (text of 1834) By Samuel Taylor Coleridge About this Poet Samuel Taylor Coleridge is the premier poet-critic of modern English tradition, distinguished for the scope and influence of his thinking about literature as much as for his innovative verse. Active in the wake of the French Revolution as a. Once children have achieved word and syllable awareness, they can focus their attention on the smaller parts within the syllable. At first, this means dividing one-syllable words into onsets and rimes. The onset is the initial consonant or consonant cluster of the word, and the rime is the vowel and consonants that follow it rime definition: 1. frost (= the thin, white layer of ice that forms when the air temperature is below the freezing. Learn more Inflections of 'rime' (v): (⇒ conjugate) rimes v 3rd person singular riming v pres p verb, present participle: -ing verb used descriptively or to form progressive verb--for example, a singing bird, It is singing. rimed v past verb, past simple: Past tense--for example, He saw the man. She laughed. rimed v past p verb, past participle: Verb form used descriptively or to form verbs.
Onset Rime has been shown to be one of the most effective ways of improving phonemic awareness and doing some short onset rime activities regularly with emergent literacy learners can help them to start to hear sounds in speech - which, in turn, helps them to learn to work with words later in their literacy development 'Hector noticed spicules of rime adorning the packing-case shelves like fluffy moulds and hoar on his own beard.' 'He drew a long breath, followed by a longer sigh, then he nodded once, walked out into the great cavern, and vanished, leaving a thick rime of frost on the floor where he had stood. . Explore RiME game detail, demo, images, videos, reviews. Discover yourself in the world of RiME, a beautiful puzzle adventure game where the mystical island you explore - and the massive tower at its center - is only the beginning of the mystery
A land of discovery stretches out before you. Explore the beautiful, rugged world of RiME. Armed with your wits and a will to overcome—and the guidance of a helpful fox—you must explore the enigmatic island, reach the tower's peak, and unlock its closely guarded secrets A vocabulary list featuring The Rime of the Ancient Mariner. Learn the uncommon words used in the poe . Allerede da jeg så spillet for første gang - jeg tror det må ha vært på besøk under Gamescom i 2013 - merket jeg at det var noe helt unikt på gang. Spillet var vakkert, lyst og fargerikt, men samtidig mørkt, mektig og merkelig mystisk
Late Middle English; earliest use found in Robert Mannyng (d. c1338), poet and historian. Apparently either from an unattested Anglo-Norman or Middle French phrase *rime couée, or formed in English from Anglo-Norman and Middle French rime rhyme + Anglo-Norman and Middle French couée, feminine of coué tailed (from coue + -é), apparently after post-classical Latin rithmus caudatus Word families or onset rime is a common tool in word level literacy instruction that can help students to learn to decode. Sturm et al (2006) reported that the large majority of first grade teachers in mainstream classrooms do onset rime based activities in their classrooms at least 3 times a week and that in third grade classrooms onset rime still played an important role in teaching text. Rime Asteroid is an Asteroid Type in the game of Oxygen Not Included. It features a frozen world with some geothermal activity. Due to the unique presence of 10 out of 11 existing biomes and the in-game nature of heat management, Rime Asteroid can be considered an introductory, beginner-friendly preset. 1 Biomes 2 Map Layout 3 Important Resources 3.1 Oxygen 3.2 Water 3.3 Polluted Water 3.4 Raw. A land of discovery stretches out before you. Explore the beautiful, rugged world of RiME, a single-player puzzle adventure. In RiME, you play as a young boy who has awakened on a mysterious island after a torrential storm. You see wild animals, long-forgotten ruins and a massive tower that beckons you to come closer. Armed with your wits and a will to overcome—and the guidance of a helpful. Onset and Rime 1. Onset and Rime A lesson for 1st Graders 2. Onset and Rime Onset and rime is a learning tool tohelp you read words. Every one syllable word has an onset and a rime. 3. What is an Onset?An onset isthe beginning sound in a word, beforethe vowel 4. Onset Examples CAN C AN 5
RiME; RiME. Explore the beautiful yet rugged world of RiME. Show (3) more. Play as a young boy who has awakened on a mysterious island after a torrential storm. You see wild animals, long-forgotten ruins and a massive tower that beckons you to come closer DESCRIPTION: The student practices the reading and spelling of words from word families that have similar pronunciation and shared spelling patterns (rimes) (adapted from Conrad, 2008). NOTE: In a single-syllable word, the onset consists of the consonant(s) appearing at the front of the word, while the rime is the part of the word made up of its vowel and any consonants that follow the vowel
. When you enter a word and click on Check Dictionary button, it simply tells you whether it's valid or not, and list out the dictionaries in case of valid word A List of Interesting Words that Rhyme (to use in your raps or whatever) tuna fish - ludicrous - doin' this spaghetti - Serengeti - ever ready incomplete - sink and weep - toilet seat back street - track meet - that's neat! - half beat dictionary - pictionary - fiction's scary esophagus - preposterous - sarcophagus Ninja Turtles - jumpin' hurdles - flippin' gerbils satchel - at you (atchoo. Oct 22, 2019 - Explore Nita Coker's board onset rime, followed by 119 people on Pinterest. See more ideas about Teaching reading, Word families, Kindergarten literacy
Onset/Rime Assessment This assessment for onset and rime is only a small portion of a larger early reading assessment. The entire assessment can be found here.The assessment is provided by EdData II whose goal is to improve the accuracy, timeliness, and accessibility, [and use] of data for basic education policy and program planning Definisjon av rime i Online Dictionary. Betydningen av rime. Norsk oversettelse av rime. Oversettelser av rime. rime synonymer, rime antonymer. Informasjon om rime i gratis engelsk online ordbok og leksikon. verb intransitiv danne seg rim¹, fryse Det hadde rimet i løpet av natten. verb intransitiv 1. dikte på/lage rim² 'Hest' og 'fest' rimer Welcome to the RiME wiki! Discover yourself in the world of RiME, a beautiful puzzle adventure game where the mystical island you explore - and the massive tower at its center - is only the beginning of the mystery. Available on Microsoft Windows, PlayStation 4, Xbox One, and Nintendo Switch starting May 26, 2017. Developed by Tequila Works Rime is an artistic 3D platformer for the PlayStation 4, PC, Xbox One, and Nintendo Switch. The art style combines bright colors and contoured visuals to create a unique and engaging presentation In the early 1800s, the word was applied to scientific instruments of a similar shape, including the thermometer bulb and the light bulb. It still hasn't found a word to rhyme with though. And, then there's the rhymeless angel, which comes from the Greek word, angelos, which meant messenger of God
Robert Rime Pratt is a British Dota 2 player, coach and caster. Toggle navigation. liquipedia. liquipedia Dota 2 Main Wikis. Alpha Wikis. Pre Alpha Wikis. Counter-Strike PUBG StarCraft II Rocket League VALORANT Overwatch Rainbow Six Apex Legends League of Legends Warcraft Brood War Smash Hearthstone Heroes Artifact Commons . It is easy for students to hear the onset and rime in one syllable words. FYI- I suggest that you don't teach your students the term onset and rime. I teach my students onset, but not rime-- it will confuse them between rime and rhyme Activity for ages 5 to 6. CVC onset rime puzzles are a fun way to help beginning readers learn how to recognize common chunks in words such as at and ip. These print and play puzzles make an awesome addition to a literacy center, word work station or guided reading group. Getting Ready To prep for the activity, I began by [
What is rime? This part of the syllable includes a vowel and any consonant that comes after a vowel. It is basically the letters that follow the onset. For example, at in the word 'cat' is a rime. Why teach Onset-Rime? Giving an understanding of onset and rimes, children can identify a common group of letters in the words Onset-Rime and Phonemic Awareness. Phoneme blending . is the process of smoothly blending phonemes to form words. / M / / a / / n / blends together to make the word . man. Phoneme segmentation is the process of isolating individual phonemes within a word. Phonemic Consider the word . bat. The first sound is / b /, the. Awareness second sound is.
RiME 2017. PS4, XboxOne, PC, Switch. Full-game Leaderboard Level Leaderboard View all Denial Anger Bargaining Depression Acceptance. Guides Resources Discord Streams Forum Statistics Sub-games. Moderated by: T e c h T e c h. Advertisement Any% No Major Skips 100%. . Client: Seliana Armory I've been going bonkers thinkin' about how I can upgrade your specialized tools
Track down all the toys, emblems, outfits and Lullaby shells with the complete collectibles locations for RiME's opening chapter.. Chapter 1 Denial sets players off on a journey across a mysterious island and toward the massive tower in the far distance One assessment includes onset and rime. Students would listen to words (broken apart by onset and rime) and blend them together. The teacher would then check off words they are able to blend together. If just using the onset and rime assessment, I would say no more than 5-10 minutes. Individually administered English Rime Words - Free download as Powerpoint Presentation (.ppt / .pptx), PDF File (.pdf), Text File (.txt) or view presentation slides online. english rime words Rime Wiki: Walkthrough, Puzzle Solutions and Tips - Get all puzzle solutions at one place, the game is all about finding answers for moving ahead. Thi Onset and Rime Mystery Word Games These games reinforcing onset and rime are perfect to use with students orally or as a literacy center where a record sheet is provided to write responses. These games reinforce rhyming and are excellent when played orally to reinforce students' listening skill rime (n.) hoarfrost, Old English hrim, from Proto-Germanic *khrima-(source also of Old Norse hrim, Dutch rijm, German Reif).Old French rime is of Germanic origin. Rare in Middle English, surviving mainly in Scottish and northern English, revived in literary use late 18c
|
<urn:uuid:e0778e65-cfad-46b3-bd9e-5d8710684dad>
|
CC-MAIN-2021-10
|
https://verschrikkelijk-ok.com/onset-and-rime-matching-cards-flip-books-word-lists/5b3c426642f43
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178363782.40/warc/CC-MAIN-20210302065019-20210302095019-00380.warc.gz
|
en
| 0.889778 | 3,498 | 3.59375 | 4 |
Storage virtualization abstracts physical disks and devices into a central pool of storage. This permits organizations to relieve datacenter complexness, costs and overcrowded storage hardware. Additionally, it provides for quicker, more reliable access to important applications.
HPE storage virtualization causes this possible by simply creating an abstraction level between the components of a physical disk or perhaps drive and the operating system that accesses that. This program layer hides the details of this disk or perhaps drive to have the illusion of a single monolithic disk which you can use with existing application software program. This allows intended for Smaller, more consistent access to info and improved performance without the need of the invest in of more hardware.
There are various different varieties of storage virtualization, including network based (SAN) and block-based (FC/iSCSI/SATA) i was reading this virtualization. The most frequent form is definitely network centered which usually utilizes an intelligent switch or purpose-built system to connect to everyone the storage devices in an FC or perhaps iSCSI SAN and has them being a single online pool of storage with each host.
When ever implemented correctly, a storage forvalter can change the positioning of the rational disk that the host is definitely using merely by remapping the mapping of exactly where the meta-data resides over the underlying physical storage device. However , the granularity of the mapping may limit how fast the rational disk could be remapped and how much extra space will need to be available before the earlier logical disk can be runs as free. Also, the majority of implementations need that change your mind of a safe-keeping virtualization environment be done in a non-disruptive way which requires that the umschlüsselung granularity is normally small enough to allow for this.
|
<urn:uuid:653bfc6f-b2c1-4c79-b11c-97949d8a9556>
|
CC-MAIN-2023-40
|
https://centromedicoesteticoelisabet.com/precisely-what-is-storage-virtualization/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506329.15/warc/CC-MAIN-20230922034112-20230922064112-00612.warc.gz
|
en
| 0.945789 | 365 | 2.6875 | 3 |
For all the Americanists out there, what this book does well is remind us that our history as “Americans” does not go back nearly as far as does the history of the English. In London, the Roman ruins scattered throughout the city are old—not the medieval cathedrals. Falling in step with his countrymen, in “The Setting,” Bryson provides his readers with a sweeping pre-history of not only England but Civilization—and its first homes—more generally.
From “The Setting,” Bryson moves on to the evolution of the home. “The Hall” is so titled to invoke the “first” way in which we referred to a permanent (or semi-permanent) home (49). I was expecting a deconstruction of his own home’s front hall (see, for example, Ames’ brilliant Death in the Dining Room), but instead I read about the increase in homes’ rooms over time (suiting evolving preferences for privacy) and the developments in indoor plumbing…and that is where I stopped and realized that Bryson is really only giving us one story, the story of the “upper” classes. For example, Bryson explains that “In England the cabinet became the most exclusive and private of all chambers…Often this private room had a small cell or alcove off it, generally known as the privy (61). However, what Bryson does not note is that this indoor bathroom arrangement would have been available to the wealthiest individuals and their families. Most people made do with chamber pots shoved into dark corners or outdoor privies. In short, Bryson’s observations on excretion relate to the finest homes. To be sure, there are similarities in how the “home” evolved in general, but there is no monolithic home.
So, what about class? The nature of Bryson’s book, filled with unqualified generalizations such as those related to bathrooms, prevents Bryson from teasing out stories based on class differences. How would the bathrooms or bathroom facilities that preceded Bryson’s Rectory look and how would they have been used depending on whether we were peeping into the home of a laborer or a countess, and is it possible to explain with more detail why the Rectory’s Hall or bathroom facilities look the way they did when the home was first built? I doubt this, seeing as all we learn about the rectory hall in question is that it is a “shrunken vestibule” (65).
Bryon’s past is squalid, illogical, and uncreative. Of course, I don’t really blame him for portraying history this way. He is the tour guide for a modern audience who would in fact view most historical homes as dirty, uncomfortable places. If you were to be transported back to medieval Britain, you would also certainly react with the same disgust that Desiderius Erasmus did, as cited by Bryson (51). But it is essential to remember that, like Erasmus, we have been raised in a society that values certain aspects of life which were ignored for much of human history. These things were not ignored because people were unenlightened. The individuals who lived in the past were not simply ignorant version of ourselves, content to live in squalid conditions because no one had told them about germs. Thousands of years of homemaking had created a complex world which seems quite alien to us today. People did not live with smoke-filled rooms because they were too stupid to invent the chimney. A central hearth provided the best possible heating for a small house, and smoke helped preserve foodstuffs in the rafters and keep out insects. People did not sit on the floor because no one had stopped to think up a chair. In fact, according to much recent historical thought, even the idea of comfort itself is a cultural development of fairly recent vintage (see John Crowley’s The Invention of Comfort).
I don’t mean to sell Bryson short. There are hints of relativism in his work, the idea that we must consider another culture without adding our own system of values, and he is writing in a way that makes the past evocative and intriguing. But we cannot view the past as simply another primitive culture to be ogled like rain forest tribesmen in an old copy of National Geographic. If we really want to understand people in the past, to react to them as humans no slower, smaller, or simpler than us, it is important to consider their own view of their worlds. Their entire way of thinking was a product of their culture, and it is well worth our time to set aside condescension, and maybe even consider our own peculiar ways.
Take our own homes, for example. Why do most new houses place the garage at the forefront, almost as if it was the most important aspect of a home’s façade? Or our foodways. Why do we refrigerate thinks like mustard and jam, foodstuffs that were literally invented to avoid spoilage well before artificial coolants? As for our clothes – are our outfits really more comfortable than the past, or do we simply believe we are comfortable because that’s what we have learned? These are only three examples of products of our own culture that may seen as illogical to the future as a central hearth. And it’s important to remember that we’re just as much creatures of our culture as anyone has ever been.
Kenneth L. Ames, Death in the Dining Room & Other Tales of Victorian Culture (Philadelphia: Temple University Press, 1992).
John E. Crowley, The Invention of Comfort: Sensibilities & Design in Early Modern Britain and Early America (Baltimore: Johns Hopkins University Press, c2001).
Katherine C. Grier, Culture & Comfort: Parlor Making and Middle-class Identity, 1850-1930 (Washington, D.C.: Smithsonian Institution Press, 1997).
|
<urn:uuid:89effc76-a49c-4cf4-b550-39a1763fec9f>
|
CC-MAIN-2017-34
|
http://pickingforpleasure.blogspot.com/2011/02/reading-bill-brysons-at-home-chapters-2.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105970.61/warc/CC-MAIN-20170820034343-20170820054343-00350.warc.gz
|
en
| 0.971099 | 1,249 | 2.59375 | 3 |
58 Life and Letters of Francis Galton
was perhaps the most respectable object a man can have in life, and this desire to increase knowledge amounts in some of our greatest men to the equivalent of Spinoza's Amor dei intellectualis ; in the case of Francis Galton it was rather an " intellectual love of man " which was the motive force in his work. Charles Darwin collected facts bearing on selection without any theory and on a .wholesale scale. He made his systematic enquiry and then searched for a law'. This Baconian method was not Francis Galton's. He had formed his problem, and he devised his experiments or recorded his observations so as to give a definite answer yes or no to his questions. It was rather the economy of a business instinct. The inspiration came first, but he did not put it down as possibly his grandfather Erasmus would have done without array of reasoned and well-marshalled facts. He made just the limited observations which confirmed or refuted it, and in almost all Galton's work we see observations collected to answer an individual and relatively closely defined issue. We cannot fit diverse types of mind into rigid categories, but roughly we may say that Erasmus Darwin, Charles Darwin, and Francis Galton all possessed in a high degree scientific imagination. Erasmus put down his inspirations without due demonstration or effective self-criticism. Charles Darwin collected his facts before he allowed his imagination to play on them, he followed his inspirations by self-criticism and due demonstration. Francis Galton used his imagination to find his problem, then narrowed it to a small issue, and tested its truth by experiment and observation before publication. To a certain extent the difference in method is that of Bacon and Newton-possibly that of the biological and mathematical temperament. Something of the difference in Charles Darwin and Francis Galton was hereditary, and marked the concentrated business instinct which Galton inherited from Farmers and Freames, Braines and Barclays, as well as his own name-stock. It was that business instinct applied in science. Perhaps also the' danger of "mental fag," a heritage which we are inclined to think came from the Farmers-was influential in guiding Galton in the matter. He was never a great collector or a mighty reader as his cousin Charles Darwin undoubtedly was.
In the roving lust again we see Cameron, Barclay and Colyear ancestry rather than Darwin, and, as already hinted, this influenced
' See Life and Letters, Vol. i, p. 83.
|
<urn:uuid:c0fc854f-8815-40ea-b1d0-f6eb299685ee>
|
CC-MAIN-2013-20
|
http://galton.org/cgi-bin/searchImages/galton/search/pearson/vol1/pages/vol1_0118.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00052-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.980272 | 515 | 3.03125 | 3 |
On Wednesday 16th October the results of the Reading in Bloom Schools Challenge were announced at a ceremony hosted by the University of Reading. Eight of the ten winning schools attended a meeting that started with a tour of our recently refurbished Tropical Biodiversity Glasshouse. Prizes of Lavender plants, certificates and a cup were presented by Councillor Marian Livingston, The Right Worshipful the Mayor of Reading, and a family apple tree tree for the overall winners was presented by Dr Mark Fellowes, Head of the School of Biological Sciences.
Ann Westgarth and her team had organised refreshments including apple juice produced at the National Fruit Collection, Brogdale, which is manged by the University of Reading, as well as biscuits and coffee for the teachers and helpers that attended.
The glasshouse visit began with a short talk about the role of plants in providing oxygen, food, medicine and even inspiration for art and literature. Some plants also cause problems by become weeds, causing allergies or poisoning people and other animals.Throughout the greenhouse there is robust signage explaining the themes for plant groups and offering snippets of information about them.
The school children were challenged to think about familiar foods and what plants they might come from. The centre of the glasshouse is dominated by a large banana plant – not currently in fruit – but pineapples, papaya, sweet potatoes, taro, rice and many other crops are also on display. The pink banana (Musa brachycarpa) is in full fruit and caused a lot of interest, not just because the fruit are pink and furry but the bananas have many hard black seeds inside!
The large numbers of visitors caused us to run two tours of the glasshouse, a welcome spot of warmth on an otherwise cold and rainy day.
Our greenhouse is run as an educational resource primarily for University students, and visitors are offered the chance to touch and smell the plants, and even taste some of them. One of the plants with a truly wonderful warm and spicy smell is Guinea grains (Aframomum melegueta), which is native to Africa and used there to flavour cookery. Sadly it does not seem to have reached the UK as a popular spice.
Some of the fun plants to play with in the greenhouse are the floating water plants that provide vital ecosystem services by cleaning up water, but can also be weeds that clog those waterways. The purple roots of the Water Hyacinth (Eichhornia crassipes) caused particular interest among some.
There was no doubt that the pond, attracted the greatest interest among visitors – especially the unsinkable plant species!
The tours of the greenhouse entertained the school pupils, their helpers and the Mayor. All had interesting questions to ask and useful comments to make. Some pupils showed great prowess at identifying the food plant species they saw including pineapple, sugar cane, papaya and sweet potato.
This glasshouse was refurbished with a grant from the University Annual Fund which paid for some of the infrastructure and for the excellent signage developed bt Reading University Typography students. Most of the hard work was done by undergraduates on the Biological Sciences BSc Degree course and the MSc in Plant Diversity.
|
<urn:uuid:1f21bd6d-0332-438e-83b4-61495cced95d>
|
CC-MAIN-2021-17
|
https://blogs.reading.ac.uk/tropical-biodiversity/2013/10/reading-in-bloom-schools-challenge-2013/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038061562.11/warc/CC-MAIN-20210411055903-20210411085903-00024.warc.gz
|
en
| 0.970767 | 650 | 2.515625 | 3 |
Wind tunnel T-106
|Flow Mach number||0.15–1.1|
|Reynolds number per 1 m||up to 35∙106|
|Total pressure||50–500 kPa|
|Dynamic pressure||up to 58 kPa|
|Stagnation temperature||290–330 К|
|Angle of attack (α):|
|In-model strain-gauge balance||0°–90°|
|Wing span||up to 1.7 m|
|Length||up to 2.2 m|
|Wing area||up to 0.5 m2|
|Model weight||up to 250 kg|
|Test section dimensions:|
|Cross section diameter||2.48 m|
|Test section length||4.85 m|
|Porosity coefficient of test section walls||15%|
T-106 is a close-layout, continuous-operation, variable-density wind tunnel designed for investigating aerodynamic characteristics of aircraft models and flight vehicle components at subsonic and transonic velocities. The flow is generated by a compressor with an electric drive of 32 MW.
Test section with a circular cross-section and perforated walls is equipped with an electric-mechanical balance and a set of in-model strain-gauge balances for measuring aerodynamic forces and moments of models and their elements, and with supporting devices of 3 types (strip suspension, tail sting and under-fuselage strut).
The wind tunnel is equipped with automated computation and measurement complex for data monitoring, registration, acquisition, and processing during the experiment.
- electric-mechanical and strain-gauge balance measurements of total aerodynamic characteristics of aircraft models and their elements;
- measurement of pressure distribution along the model surface using electronic pressure modules for 1000 points;
- determination of characteristics of inlet models and aircraft models with the flow passing through the internal channels of thenacelles;
- investigation of the models with simulation of the high-pressure jets (power plant nozzles, including those of variable thrust vector,jet flaps, etc.;
- investigation of characteristics of aircraft models static and dynamic aeroelasticity;
- test of half-models on a special supporting device;
- investigation of wing profiles;
- physical investigations.
During 70 years T-106 has been one of the most loaded TsAGI’s facilities for investigating different-application flight vehicles at high subsonic and transonic velocities.
|
<urn:uuid:f1f6dc64-6146-410b-8835-7a91676e1f2a>
|
CC-MAIN-2022-05
|
http://tsagi.com/experimental_base/wind-tunnel-t-106/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304528.78/warc/CC-MAIN-20220124094120-20220124124120-00241.warc.gz
|
en
| 0.867052 | 564 | 2.578125 | 3 |
Foods that could be poisonous
Chocolate contains theobromine, a cardiac stimulant and diuretic. A dog can become excited and hyperactive after ingesting chocolate.
Due to the diuretic effect of chocolate, it may cause large amounts of urine to pass through the dog and become extremely thirsty. Vomiting and diarrhea are also common. The effect of theobromine on the heart is the most dangerous effect.
Theobromine may increase the dog’s heart rate or to cause it to beat irregularly. Death is quite possible, especially with exercise. Many pet owners assume their pet is unaffected after eating the chocolate because the dog doesn't appear to have any immediate symptoms. The signs of sickness may not be seen for several hours, with death occurring within twenty-four hours.
Cocoa powder and cooking chocolate are the most toxic forms. A 20 pound dog can be seriously affected if it eats a quarter of an 8 ounce packet of cocoa powder or half of an 8 ounce block of cooking chocolate. These chocolates contain ten times more theobromine than milk chocolate. Semi-sweet chocolate and dark chocolate are the next most dangerous forms of chocolate, with milk chocolate being the least dangerous. A dog needs to eat more than 8 ounces of milk chocolate to be affected. Obviously, the smaller the dog, the less it needs to eat.
Onions and garlic
Onions and garlic are also dangerous food ingredients that can cause sickness in dogs. Onions and garlic contain thiosulphate, also a toxic ingredient for dogs.
Onions are more of a danger. Pets affected by onion toxicity will develop haemolytic anemia. Haemolytic anemia results when the pet’s red blood cells burst. Pets affected by onion poisoning at first show signs of gastroenteritis with vomiting and diarrhea. They show no interest in food and will be dull and weak.
The red pigment from the burst blood cells often will appear in the dog's urine. The dog will become breathless. The breathlessness occurs because of the reduced number of oxygen carrying red blood cells.
Poisoning occurs a few days after the pet ate the onion. All forms of onion can be a problem including dehydrated onions, raw onions, cooked onions and table scraps containing cooked onions and/or garlic.
Onion poisoning can occur with a single ingestion of large quantities or with repeated meals containing small amounts of onion. A single meal of 20 to 30 ounces of raw onion can be dangerous. The condition improves once the dog is prevented from eating any further onion.
Garlic also contains the toxic ingredient thiosulphate, it seems that garlic is less toxic and large amounts would need to be eaten to cause illness.
The toxic compound found in macadamia nuts is unknown but the affect of macadamia nuts is to cause locomotion difficulties. Dogs develop a tremor of the skeletal muscles, and weakness or paralysis in the hindquarters.
Affected dogs are often unable to rise and are distressed, usually panting. Some affected dogs have swollen limbs and show pain when the limbs are manipulated.
Dogs have been affected by eating as few as six macadamia kernels (nuts without the shell) while others had eaten approximately forty kernels. Some dogs had also been given macadamia butter. Luckily, the muscle weakness, while painful, seems to be of short duration and all dogs recovered from the toxicity.
Pets owners should not assume that human food is always safe for pets. For a healthier pet, never give your pet food scraps.
When it comes to chocolate, onions, garlic and macadamia nuts, such foods should not be given to your dog. Be sure that your dog can’t get into your stash of chocolates, that food scraps are disposed of carefully to prevent onion and garlic toxicity and that your dog is prevented from picking up macadamia nuts if you have a tree in your garden.
|
<urn:uuid:9b1db40d-933b-45ed-97ec-f3f0f4bf5071>
|
CC-MAIN-2018-13
|
http://dachworld.com/poisonousfoods.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647519.62/warc/CC-MAIN-20180320170119-20180320190119-00160.warc.gz
|
en
| 0.953153 | 815 | 2.953125 | 3 |
There is something about clay and food that is so interesting. Bricks are not only used for big and classy houses or for chimneys, these clay-based blocks are also excellent partners when it comes to cooking. The clay on the brick enhances the flavor of the food, giving you a delectable cuisine. Bricks are made from clay and sand. It is considered as the longest lasting and one of the hardest material used in construction throughout history. While it is considered the strongest material, it can still be drilled using a high quality diamond tool such as the core bit.
A diamond core bit is a diamond tool used to create perfect holes on surfaces like bricks, concrete, blocks, tiles, granite, marble, porcelain, stone, and other hard aggregate materials. Its unprecedented cutting performance and flawless creation of holes can be attributed to its high diamond concentration and its hollow center.
Going back to cooking, bricks are used in making ovens. Brick ovens are used primarily for baking. One of the famous foods prepared in a brick oven is the pizza. The idea is to cook the pizza not with direct fire but with the radiated heat coming from the wood and then absorbed by the bricks and finally, radiating out the absorbed heat towards the pizza.
If bricks can turn your ordinary food to a delectable cuisine, the core bit on the other hand can turn your desired hole to a seamless one.
|
<urn:uuid:4e7e46a9-3203-45cb-9f04-e5f8d82cf5d5>
|
CC-MAIN-2015-27
|
http://www.gilatools.com/blog/a-delectable-cuisine-vis-a-vis-a-seamless-hole/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096208.17/warc/CC-MAIN-20150627031816-00089-ip-10-179-60-89.ec2.internal.warc.gz
|
en
| 0.951585 | 288 | 2.828125 | 3 |
The unreal beauty of the agate
There is no other area of Europe which compares to the Idar-Oberstein region
where agates of the most diverse forms and colors can be found. These
treasure-troves of agates were the basis for development of the gem industry
that has kept its prominence until the present, even after the local deposits
were exhausted during commercial mining between 1375 and 1875. Today, raw
stones are imported there from all over the world.
The origin of the agate lies in the
at the end of the earth's Paleozoic era, 285 million years ago, and can be traced
back to the pronounced volcanic activity of the Nahe valley at this time.
Smoky quartz, amethysts, jasper and calcite were also created by this
volcanism. Agate —a special form of the mineral quartz— fills cavities in
volcanic stone. The reason why SiO2 collects in these cavities and is
transformed into agates is still unexplained.
For further information: Landmesser M.,
Zur Geothermometrie und Theorie der Acchate, Mitt. Pollichia 79, 1992: 159-201
|
<urn:uuid:386205d9-d291-41dd-b79c-f3ca6b49377d>
|
CC-MAIN-2017-17
|
http://maasberg.ch/eAchate_Ani.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118740.31/warc/CC-MAIN-20170423031158-00112-ip-10-145-167-34.ec2.internal.warc.gz
|
en
| 0.915984 | 256 | 3.453125 | 3 |
For even the most casual Great Lakes observer, it’s hard to ignore the drama playing out over federal funding in Washington.
Simply put, the Trump administration wants to turn off the federal money spigot that has funneled $300 million annually to the region for restoration projects. That’s all the way off, zero funding.
The Great Lakes community – environmental groups, the Great Lakes Commission, regional federal politicians and others reacted predictably – with outrage. No one likes it when the funding for their work would be abruptly halted.
The Trump administration has turned a deaf ear to protests about the budget cut. Advocates have responded by circling the wagons and are working all the angles trying to save the funding.
Is this just one more budget spat?
An example of Washington dysfunction that has characterized the federal government for a number of years? An issue that will be resolved by an ugly, late night compromise so both sides can declare victory?
Or is it something bigger, a turning point?
A seismic philosophical shift where the federal government washes its hands of environmental problems and turns them back to the states? Should restoring and protecting the Great Lakes be a national priority or regional responsibility?
First, some background.
The federal program to restore the Great Lakes is now nine years old.
It has rolled seamlessly along managing to fly above the political frays in D.C. That’s because it’s about money and politicians universally love to bring money back to their districts and states.
That said, restoration programs have demonstrated some success and they feel like part of the fabric of environmental life in the region.
But some under the age of 30 working on issues related to the lakes probably don’t remember a time when restoration wasn’t an accepted norm.
The seeds for the current program were planted in the early 2000’s and it took a few years for them to sprout. And success wasn’t a given. It’s hard to get the federal government to give a region billions of dollars.
Then the dam broke. A turning point had been reached.
It was an executive order signed by President George W. Bush in 2004 that put Great Lakes restoration on the federal agenda.
The order began:
“By the authority vested in me as President by the Constitution and the laws of the United States of America, and to help establish a regional collaboration of national significance for the Great Lakes, it is hereby ordered as follows.”
What followed said the Great Lakes are a “national treasure” and that the “federal government is committed” to making progress on the “challenges” the lakes face including “funding effective, coordinated and environmentally sound activities in the Great Lakes system.”
With the stroke of a presidential pen the Great Lakes became a national priority, at least on paper. The federal government took ownership along with state, tribal and local communities of the lakes recovery and betterment.
But there was a catch; a big one.
Bush, the fiscally conservative Texan, never put money in his budget for the lakes except for a trickle here and there to show goodwill. A cleanup of the “Black Lagoon” in the Trenton channel of the Detroit River is an example. And congress wasn’t of a mind to write a big check to Rust Belt states.
The Great Lakes may have been declared a “national priority” but they weren’t a “national” funding priority for the federal government.
Then came a young senator from Illinois who lived a short walk from Lake Michigan on Chicago’s south side.
In 2008 candidate Barack Obama made a campaign pledge to fund the program Bush initiated and as president, Obama put $475 million in his 2010 budget proposal and it was approved by congress.
President Obama’s Great Lakes overseer, Chicagoan Cameron Davis, quickly coined the phrase “a new standard of care” for the lakes to differentiate the past from the present and future. Projects like cleaning up toxic legacy sites designated in 1987 that would take decades to finish could finally begin.
Those 2004 and 2009 events were turning points for the Great Lakes. They marked the end of a long period of inertia and benign neglect.
Now comes the presidency of Donald Trump. The maverick real estate mogul and deal maker who, while a Republican, isn’t beholden to either political party. Unlike Obama, candidate Trump talked about the U.S. EPA with disdain and said he’d make the agency a shadow of itself.
With a stroke of his own presidential pen Trump has proposed zeroing out all funding for the Great Lakes.
No review of the program to continue what’s working and to get rid of what’s not, like the inevitable pet projects.
No wind down period to soften the impact. It’s the equivalent of a panic stop in your car where you slam on the brakes and go from 70 to zero in a few seconds. It’s a shock to the system.
And Trump wasn’t done.
While Great Lakes activists ranted about the proposed 2018 budget whacking, Trump announced that he wants to eliminate $50 million from the 2017 budget. He said he’ll use that money to help finance the infamous wall he wants to build between the U.S. and Mexico.
Trump wants to cut EPA staff by 25 per cent. That means the whole office in Chicago that administers Great Lakes programs would likely be eliminated.
Separate from money, Trump has directed agencies to start the process of dismantling Obama’s rules on clean water and clean air – the Waters of the United States and Clean Power Plan rules respectively.
Those moves attack the heart of prevention. It always costs less to prevent pollution than to clean it up later. Curiously, the Great Lakes activists lobbying for money haven’t had much to say about the rules rollback.
Michigan’s Jon Allan is in the center of the storm.
Michigan has the most to lose if federal funding for the Great Lakes goes to zero.
It has twelve of the toxic legacy sites still to be cleaned up. They’re officially designated Areas of Concern. Allan says the loss of federal funding “would cause a near total shut down of our GLRI-related work including work on restoration of the Areas of Concern across the state…”
Allan heads Michigan’s Office of the Great Lakes and has championed cleanup of the legacy sites for years.
In a statement to Great Lakes Now Allan pointed out that restoration is about more than the environment.
“The program generates important ecological and economic returns to our communities, the states, the region and the nation” Allan said.
Note Allan’s reference to the benefits to the “nation.” He clearly believes the Great Lakes’ interest serves the national interest.
How does this end?
The Great Lakes community is making a full court press on the Great Lakes congressional delegation. They want congress to restore budget cuts as it has with minor ones in the past. And they may be successful. Bringing money back to the home folks is the life-blood of federal legislators.
But Sen. Rob Portman urges caution.
Last week the Ohio Republican told a group of Lake Erie advocates that “we have a fight on our hands. Frankly, it’s harder to restore funding if the administration zeroes it out.”
Powerful forces are working at cross purposes and the future of the Great Lakes hangs in the balance.
Whatever happens one thing is certain.
The Great Lakes are at another turning point.
|
<urn:uuid:88467b81-8fb9-49d6-a88c-aa31d25c8d0e>
|
CC-MAIN-2019-35
|
https://www.greatlakesnow.org/2017/04/the-great-lakes-a-national-priority-or-regional-responsibility/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027319470.94/warc/CC-MAIN-20190824020840-20190824042840-00317.warc.gz
|
en
| 0.943765 | 1,595 | 2.6875 | 3 |
Pesticides are among the most widely used chemicals in the world. In fact, every Canadian carries pesticide residues in his or her body.
The David Suzuki Foundation released The Food We Eat in Fall 2006. As part of the Healthy Environment, Healthy Canadians series, this 34-page report evaluates three areas of government activity related to pesticide use, and offers eight key recommendations to reduce the use of those pesticides that are most hazardous. Starting with a comparison of Canada's pesticide regulations with similar standards in the United States, Europe, and Australia, this report presents compelling evidence that Canadian regulations are among the weakest in the industrialized world when it comes to governing the use of pesticides and the potential impact of pesticides on food and health.
In June 2007, the David Suzuki Foundation released Northern Exposure: Acute Pesticide Poisonings in Canada. The report found that thousands of Canadians are acutely poisoned by pesticides each year, with children under 6 at the most risk.
|
<urn:uuid:78b6d6c4-49e4-445d-88df-44591079c472>
|
CC-MAIN-2013-48
|
http://www.davidsuzuki.org/publications/reports/2006/the-food-we-eat-an-international-comparison-of-pesticide-regulations/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163054974/warc/CC-MAIN-20131204131734-00056-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.951177 | 191 | 3.515625 | 4 |
Sorry I was late posting this. Hope you are not in big trouble now. But Albertans who keep honey bees or who own beekeeping equipment are required – by law – to register as a beekeeper by June 29 of each year. Registration is nearly painless – previously-registered beekeepers receive a form to fill out before the deadline. New beekeepers need to ask for the paperwork. Although compliance is more difficult than buying a long-gun in Alberta (which is super easy, believe me, I know from experience), the registration process isn’t too tough. They need your name, location, and number of colonies. This is to help control the spread of bee diseases. If you are new to beekeeping, contact Dr Medhat Nasr, the provincial apiarist, and his staff will help you out. Their number is 1-780-415-2314.
How are Alberta’s bees? With the growing concern over the role neonicotinoids play in severe overwintering problems for honey bees, Alberta beekeepers should be worried, say anti-nic activists. Of course, they are right. The stuff is poison, a pesticide designed to kill sucking bugs. Alberta is Canada’s biggest honey producer (Alberta beekeepers make about 5 times as much honey each year as Ontario beekeepers.) and our main honey crop from canola. Canola grows from seeds treated with neonicotinoids and each year the farmer plants new seeds for each new canola crop. You can see where this is heading. Or maybe not. Last winter, Alberta had excellent wintering of honey bees. According to chief inspector Dr Nasr, the province lost only 10 to 15 percent of its bees. And it was a long, cold, nasty winter. In fact, the Western Producer ran a story about Alberta that beamed, “Bees come through gruelling winter in good condition” and indicated that losses averaged half of last year’s numbers. I can’t understand this. If the neonicotinoids are as bad as claimed (and maybe they are?) then Alberta should be ground-zero for death and destruction. But it is not. I know of one newish beekeeper who had pretty awful wintering this year due to nosema and wind exposure, but the vast majority had great wintering.
I have heard from a lot of Canadian beekeepers. They are worried that neonics will be incorrectly blamed for bee deaths. The beekeepers fear neonicotinoids will be banned and farmers will be back to aerial spraying which slaughtered bees by the billions back in the 1980s. But if the neonics are actually causing the massive deaths attributed to them in other places, we don’t want that either.
|
<urn:uuid:4639238e-98ea-48bf-b972-9d579a3159a0>
|
CC-MAIN-2022-27
|
https://badbeekeepingblog.com/2014/07/02/alberta-deadline/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104660626.98/warc/CC-MAIN-20220706030209-20220706060209-00242.warc.gz
|
en
| 0.965244 | 565 | 2.609375 | 3 |
Dublin (Irish: Baile Átha Cliath, “Town of the Hurdled Ford”) is the capital city of Ireland. Its vibrancy, nightlife and tourist attractions are renowned and it is the most popular entry point for international visitors to Ireland. It’s disproportionately large for the size of Ireland with nearly two million in the Greater Dublin Region – well over a third of the Republic’s population! The centre is, however, relatively small and can be navigated by foot, with most of the population living in suburbs.
Founded in 841, Dublin was originally settled by Vikings amongst a population of Celtic tribes. In the 9th century the Danes captured Dublin and had control until 1171 when they were expelled by King Henry II of England. By the 14th century the king of England controlled Dublin and the nearby area referred to as “the Pale”.
When the English Civil Wars ended in 1649, Oliver Cromwell took over. Dublin experienced huge growth and development in the 17th century because many Protestant refugees from Europe came to Dublin. By the 17th century Dublin was the second greatest city, only behind London, and a period when great Georgian style buildings were constructed that still stand today. Georgian style architecture was popular from 1720 to 1840 during the times when George I, George II, George III, and George IV of England were ruling.
In 1800, the Act of Union between Great Britain and Ireland abolished the Irish Parliament. From this point on, the Irish worked to gain their independence from Great Britain, which they finally won in 1922. The Easter rising in 1916 and the War of Independence greatly helped Ireland win their freedom. One event remembered as a key moment in Irish history is the Easter rising in 1916.
A failed attempt to take over the several important buildings, among them the General Post Office on O’Connell Street, led to the arrest of hundreds and execution of 15, now considered martyrs for the cause. Many believe that this event helped gain sympathy for the fight for independence from Britain.
Dublin is divided by the River Liffey. On the north side of the Liffey is O’Connell Street–the main thoroughfare, which is intersected by numerous shopping streets, including Henry Street and Talbot Street. On the south side are St. Stephen’s Green, Grafton Street, Trinity College, Christ Church, St. Patrick’s Cathedrals, and many other attractions.
Dublin postcodes range from Dublin 1 to Dublin 24. As a rule, odd numbers are given to areas north of the River Liffey, while even numbers are given to areas south of the river. Usually, the lower the postcode, the closer to the city centre.
If you’re already in the city, the main tourist office, located in St. Andrew’s Church just off Grafton Street in the city centre (Dublin 2), is a good place to start for information. You can book accommodation and tours there, as well as find general information on where to go and what to do.
Although some of Dublin’s finest Georgian architecture was demolished in the mid-20th century, a remarkable amount remains. They were a reminder of the past British imperialism and were pulled without regard to their beauty and architectural significance. They were replaced with modernist or pastiche office blocks, St. Stephen’s Green (Dublin 2) being a prime example. Thankfully, attitudes have changed significantly, and Dubliners are now rightly proud of their impressive buildings from all eras.
Being subject to the moderating effects of the Atlantic Ocean and the Gulf Stream, Dublin is known for its mild climate.
Contrary to some popular perception, the city is not especially rainy. Its annual rainfall average is only 732.7mm (28.8 in), lower than London. However, its precipitation is spread out more evenly so that on many days there can be a light shower.
Winters in Dublin are relatively mild when compared with cities in mainland Europe -daytime temperatures generally hover around the 5°C (41°F), but frost is common during the period November through to February when night time temperatures dip below 0°C (32°F) freezing point.
Snow does occur, but it is not very common, and most of Dublin’s winter precipitation comes in the form of a chilly rain and hail. The lowest recorded temperature in the city is -12°C (10°F). It should also be noted that during the first week of January 2010, the city canals froze over for the first time in years–this was a common enough sight back in the 1960’s, 1970’s and 1980’s. It could be said that Dublin’s climate is very comparable to that of the northwest United States and southwest Canada, as well as to much of coastal Western Europe.
Summers in Dublin are also mild. The average maximum temperature is 20°C (68°F) in July, far cooler than even most of the coldest American cities. The hottest temperature ever recorded in Dublin is a mere 31°C (88°F), which in many other parts of the world, even at its own latitude, is just a typical summer day. Don’t plan on too many hot summertime activities. Thunderstorms also don’t happen very often in Dublin, on average only four days a year. Overall, the city’s climate is mild but would be considered drier and less ocean-tempered than western and southern parts of the island of Ireland: expect Dublin to be colder than Cork or Galway in the winter and warmer than those parts of the country in the summer.
Dublin is served by a two terminal airport approximately 10km (6 mi) north of the city centre. A full list of airlines flying to Dublin, along with timetables.
Ireland’s flag carrier airline, Aer Lingus, flies to Dublin from a large number of European cities. Aer Lingus fares are often lower than other flag carriers, but in part this has been achieved by matching the service levels of low-fare competitors. As a result, they now charge for checked-in bags and seat reservation at time of booking. Aer Lingus staff are always very friendly and helpful. The planes and flight attendants are decorated in bright green to get passengers ready to see all of the green in Ireland. Aer Lingus fly almost exclusively from Terminal 2 in Dublin Airport.
Ryanair, Ireland’s second airline and Europe’s largest low fares airline, has one of its main bases in Dublin from which it flies to a large number of European airports including Paris, London, Manchester, Liverpool, Madrid and Frankfurt as well as smaller regional airports such as Nantes or Kaunas. While famous for its low fares, Ryanair can be more expensive than other airlines for last minute bookings. All Ryanair flights depart from Terminal 1.
There are three types of bus transport to Dublin city:
Depending on traffic, journey times can vary from 25min to over an hour. These buses are considerably cheaper than AirLink and Aircoach. Both of these local bus services stop across from Drumcondra train station which is on the Dublin-Maynooth commuter line. Some trains on this line continue past Maynooth and serve stations as far away as Longford. All Dublin Bus buses (except AirLink) do not give change and fares must be paid in coins. Ticket machines near a few outdoor bus stops, including the one at the airport, do not require exact change. Tickets can also be purchased at the newsagent inside the airport. Luggage racks are limited on the local buses, and it is not unknown for drivers to turn away travellers with packs that cannot be stored.
A taxi to the city centre should cost around €20 to €30: it can be comparable to or cheaper than the bus options if you are in a group of three or more (as well as a lot less hassle). Taxis are legally obliged to provide an electronic receipt detailing the fare, distance and other pertinent details. Make sure to ask for one as otherwise they often do not furnish such a receipt.
A metro connecting Dublin Airport to the city centre is planned, but no work has started on this yet.
Unless your destination is Dublin City, it is probably best to use one of the extensive range of other bus services that stop at Dublin Airport and so avoid the city centre traffic.
Dublin has two main railway stations. Heuston Station, in the west of the city centre, serves much of the west and south of the country including an hourly service to Cork which also services Limerick. Connolly Station, in the north-east centre of the city, serves the south east and east coast, Belfast, Sligo in the north-west and suburban commuter services including the Dublin Area Rapid Transit (DART) system. The two main stations are connected by bus and Luas routes. A direct train line also exists between the two stations, but there are no trains connecting Heuston and Connolly stations. Visit the website for all train services local and intercity.
Please note: taxis are available from Connolly station, but there is a group of drivers operating there who will tell you they “don’t know where that is” if you are only going a short distance and will only end up paying them a small amount. This practice is against their own union rules. If this happens, either take their name and registration number (prominently displayed at the front of the car) and tell them you will report them to the union, or follow the luas tracks to the right to busaras. Another taxi stand is past the luas stop on the left, in front of the pedestrian entrance to the bus station, and these drivers will take you where you need to go.
Iarnród Éireann (Irish Rail), the national railway company, has one of the youngest train fleets in Europe and the Cork train in particular is extremely comfortable. Older trains were phased out completely in 2008 with the arrival of a massive fleet of brand new trains built in Spain, Japan and South Korea. There are internet intercity train fares for offpeak services which are substantially cheaper than over the counter tickets. Food on trains is generally overpriced and carrying your own food on board is normally permitted.
Train tickets booked in advance from Irish Rail can often be much cheaper.
A single bus station, Busáras, is the terminus for Bus Eireann services to almost all towns and cities in Ireland (except for a few services to County Meath and County Dublin, which leave from the surrounding streets). It’s next to Connolly train station, 10min by foot from O’Connell Street. There are also services to Northern Ireland and Eurolines services to Continental Europe. Luggage lockers are in the basement, along with the pay-to-enter public toilets.
A number of private bus companies also operate out of the airport and stop in city centre. Kavanaghs has a good service to Limerick and Waterford and Discovering Ireland offers tours around Ireland. Dublin Coach offers an express service to Limerick from Westmoreland Street. Citylink coaches has a good price to Galway and the West, while GoBus now provides a non-stop Dublin-Galway and Dublin-Cork service.
Dublin Port has several passenger ferry services to/from Wales and England. The main routes are Liverpool-Dublin and Holyhead-Dublin. Companies from Wales include Stena and Irish Ferries, and from Liverpool, P&O and Norfolk Line. The once key suburban port of Dún Laoghaire, 10 km (6 mi) south of Dublin, is no longer served by any passenger sailings. Crossings from Liverpool are seven hours, while crossings from Holyhead are from 2.5 hours, depending on whether you take a fast ferry or a larger ferry.
If you are travelling to Dublin from anywhere in Britain, a very cheap option is to purchase a combined SailRail rail and ferry ticket. The cheapest ticket to Dublin Port will cost between £31 and £38 one way depending on departure point (as of November 2013), which is particularly good value considering that the ferry ticket alone can cost up to £30 if purchased separately. See Arriva Trains for more details. Foot passengers departing Ireland do not need to book combined ferry/rail tickets in advance and can just buy them on the day at the ferry port. However, returning from Britain it is sometimes wiser to pre-book as ferry/rail tickets may not be available on the day at some stations.
The combined tickets can be purchased direct from rail stations in Britain or online from e.g. Arriva Trains, but note not all online rail ticket providers sell SailRail tickets.
The only bus from the port to the centre costs €3 and stops at Connolly and Houston stations. Be aware that there is no ATM in the port, and no facility to purchase a Leap card (for bus transport) via card, so change some sterling to Euro on the boat over or you will be stranded in the port 4km from the nearest ATM and forced to walk or take a taxi.
If you are visiting Dublin only for a daytrip and have a car, you can beat the traffic by leaving your car at a Park and Ride station. If you are coming from the south, two ideal places to leave your car are at the Sandyford Luas stop, located just off junction 15 of the M50 on Blackthorn Road, or Bray DART stop, on Bray Road. If you are coming from the west, your best option is the Red Cow Luas stop, off junction 10 of the M50. Coming from the north east, you would do best to use the Park and Ride station at Howth DART station. Tariffs at Park and Ride stations range from €2 to €4.
If you decide to drive into the city center, there are a range of car parks available. Dublin City Centre has sign posts around the city with directions and space availability for all major car parks. The city also offers pay and display parking on streets with a maximum stay of three hours. Car parks are clearly signposted in the city centre with live available spaces information.
While all car rental companies in Ireland have rental desks in the arrivals hall of Dublin Airport, the list of car rental companies with inner city locations is far less. The companies with genuine Dublin City Centre locations are CARHIRE.ie , Europcar, Avis, Hertz, Car Rental Ireland Budget Car Rental Payless NewWay Car Hire and Irish Car Rentals.
Public transportation has improved massively over the last few years, but it is still worse than in other European cities. This is more of a problem for the commuter than the visitor to Dublin, however, as the city centre is easy to get around on foot.
Dublin Public Transport is an independent website providing a range of information on the various modes of public transport available in the city, including an integrated map showing commuter rail lines, tram lines and airport bus links.
The Luas (a tram/light-rail system) runs frequently and reliably, and is handy for getting around the city centre. There are two lines – red (running from Connolly railway station and the Point Theatre to the suburb of Tallaght or Saggart) and green (running from Broombridge to Bride’s Glen in Cherrywood). The two lines connect at O’Connell Street. Tickets can be bought on the platforms at the machines and do not need to be validated. You must purchase a ticket or “touch on” with your Leap Card before boarding the tram. The fare structure is based on zones, with rides within the central zone costing €1.50. The two red and green LUAS lines now intersect meaning that it is much easier to access all areas of Dublin via LUAS. A large amount of further expansion of this network is expected within the next decade.
The DART suburban rail service runs along the coast between Greystones in the south and Howth and Malahide in the north. Tickets can be bought in the stations, from a window or a machine. There are four other suburban rail lines servicing areas around Dublin: three of these lines operate from Connolly Station, the other from Heuston Station.
For Luas and DART network and station maps visit Dublin Transport Office.
The vast majority of bus services in Dublin are provided by state run Dublin Bus. However, since 2018, some are now tendered out to private operator Go-Ahead Ireland. These are all orbital and local routes serving suburban areas. They have a slightly different livery to Dublin Bus services but the fare structure is the same. There are around 200 bus routes in Dublin. The route numbering system, however, can be quite confusing, with numbers having been issued non-sequentially and with suffix letters denoting alternate destinations. The bus will display its final destination on the front of the bus. English-speaking visitors will find most bus drivers helpful, but obtaining an up-to-date route map from Dublin Bus is recommended. Here are some pointers about using the Dublin Bus services:
There are also a handful of private bus operators serving specific destinations.
The Leap Card is a rechargeable E-purse card (similar to London’s Oyster card) that can be used across Dublin Bus services, Luas and DART/Commuter rail lines within the city metropolitan area. Leap cards can be purchased in some outlets in both terminals of Dublin Airport, and at retail outlets within the city area displaying “Leap Card” adverts. The card costs €10 to purchase and comes with €5 credit and a €5 reserve credit. The card can be topped up at retail outlets, Luas ticket machines and at DART/commuter rail station ticket machines. The card can also be managed online with balance retrieval and top up at the Leap Card website. The card should be tagged on and tagged off at Luas stop validator poles, and when entering rail stations through the turnstiles. On buses, either present the card to the reader on the drivers machine and state your destination (the driver will deduct the correct fare from the card) or present the card to the reader on the right hand side of the door (the flat maximum fare of €2.60 will be deducted). You do not need to tag off when leaving the bus. The Leap Card fares are integrated across different modes of public transport so a daily/weekly/monthly cap or rebate is applied for multiple uses of the card. Leap cards cannot be used on Irish Rail’s Intercity routes (Dublin-Cork, Dublin-Limerick etc.) but can be used on some private intercity bus routes and on Bus Eireann services in Cork, Limerick, Galway and Wexford. Fares are on average 10-18% cheaper paying with a Leap card than paying with cash. A 1 day leap card can be purchased for €10 at airport arrivals allowing unlimited travel on all buses, trams and trains and airport buses for 24 hours.
Hiring a bicycle is a handy way to get around if you want to get outside the very centre of the city and are comfortable cycling in traffic. That being said, the city is not very bicycle-friendly, either in terms of quantity & quality of bike paths, pedestrians and drivers honouring the bike paths, road space available where there is no bike path (i.e. numerous narrow roads), or driver attitudes in general.
There are bikes to hire in several locations around the city centre with the Dublinbikes scheme, there is also a bike hire available from Lazy Bike Tours located in Temple Bar, also located at the entrance to the Phoenix Park, Dublin 8. When cycling in the Phoenix Park, note that while there is a dedicated cycle lane on both sides of the main thoroughfare unfortunately pedestrians also use these. When cycling in the city centre, be aware that cycle lanes, where they exist, are generally shared with buses, taxis, motorcycles, and parked automobiles; cyclists should pay particular attention when approaching bus stops where a bus is pulling out.
Motorbikes are not allowed to use the cycle lanes, but many still do so. Passing on the left is also allowed only in limited circumstances but is in fact still common.
If you choose to drive in Dublin, note that road traffic in Dublin is left-hand side.
Driving in Dublin is not to be recommended for much of the day, particularly in the city centre. Traffic can be heavy and there is an extensive one-way system, which some say is explicitly designed to make it very difficult for cars to enter the city centre. The quays along the river are especially bad. There are a large number of bus lanes (only buses, taxis and pedal cycles are permitted – others are promptly fined. It is often legal to drive in bus lanes at certain off-peak times; these times and days are clearly signed. If you absolutely must travel into the city by car (perhaps to load or you have a disability), it is advisable to do research on your required route (using GPS or even Google Maps) and to seek suitable parking in advance.
It can be difficult to find parking other than in multi-storey car parks. On-street parking for short periods is allowed at parking meters, but beware of over-staying your time or you will be “clamped” by the clamping companies who patrol frequently – clamp release fees vary from €70-150 per 24 hours.
A system of two ring roads around the city has been introduced in recent years, with colour coded signage in purple and blue (see the orbital route map. The M50 is Dublin’s motorway, it connects to the M1 (to the north of Ireland and Belfast) near Dublin airport and to the M11 (servicing Wicklow, Wexford and the South) south of the city and to other motorways and national roads along its “C-shaped” route. It has recently been upgraded so is less congested, and is well signposted.
However, crossing the river using the M50 entails crossing the Westlink bridge (between M50 junctions 3 and 4). This is a toll bridge with the amount of the toll varying depending on the type of vehicle and how it is paid. It is important to note that the toll is barrier free and cannot be paid at booths while crossing the bridge but must be paid by internet or phone (or using electronic passes in the vehicle), or in certain shops. The vehicle passes through the toll gate without being stopped but the registration plate is photographed automatically. The toll must be paid by 20:00 the following day
After this deadline, the longer the toll remains unpaid the higher the fees involved. For foreign registered vehicles, this currently presents no problem as the Irish vehicle registration base does not have access to foreign ownership details, but for Irish registered vehicles, including rental cars, any fees due, including penalties for late payment, may well be reclaimed through the rental company and subsequently from the credit card of the person hiring the car.
Outside of the city centre, parking is generally not an issue, and ample free parking can be found outside of the M50 (and in certain areas within the M50 ring road).
Taxis were de-regulated in 2001 leading to a massive oversupply with Dublin now having more taxis than New York City. This is bad news for taxi drivers but good news for tourists, as taxis are now extremely easy to come by. They may be ordered by telephone, at ranks, or just hailed on the street. Point-to-point trips in the city centre should cost between €6 and €10: many taxi drivers will also offer a set fare if asked. There is a national standardised rate for all taxis and taxi drivers must use the meter unless you agree a set fare beforehand. You are entitled to ask for a written receipt at the end of your journey but most taxi drivers will not offer one unless asked. No tip is expected but it is common to round up to the nearest Euro. If the driver has been particularly helpful you may of course tip at your discretion.
Taxis can be recognised by a yellow roof plate which will be illuminated when available for hire. Inside the taxi the driver should have an ID card and licence clearly on display. Most taxis will only take cash payment. If you intend to pay by credit card make sure to confirm this before starting your journey. The ‘Uber’ and ‘myTaxi’ smartphone apps for taxis can be used in Dublin and the latter seems to have the best coverage. Unlike some cities, all Uber drivers in Dublin must be fully licensed taxi drivers.
Taxis are generally safe, reputable, and honest in Dublin. Taxi drivers may attempt to engage you in conversation but this is usually just being friendly. Wheelchair accessible taxis are increasingly available but you might want to book one in advance rather than relying on chance.
O’Connell Street; Spire and General Post Office
In the summer peak season, Dublin’s top attractions can get packed. Show up early to beat the crowds.
The local tourism board Visit Dublin has released a city sightseeing card, Dublin Pass which grants holders free entry and fast track entry to 33 attractions, museums and monuments in Dublin. It also includes airport transfer. Buy it at the booth at the airport in T1. It’s less than half the price for 2 days, with additional discounts for some venues (ie Jameson).
Dublin has many fine suburbs. Some are easily navigated by foot from the city’s centre and are dotted with many upmarket delicatessens and boutiques. Examples include Donnybrook and Ballsbridge – the 46a bus goes through Donnybrook and the 4/7 buses through Ballsbridge, with several stops in the north and south city centre. Ballsbridge is Dublin’s embassy district and is home to some of Ireland’s most expensive roads including ‘Shrewsbury Road’, which is famous for being the sixth most expensive residential thoroughfare in the world and ‘Ailesbury Road’ which is equally as salubrious and home to the bulk of the capital’s embassies including Spain and Poland.
Ballsbridge is also home to The Royal Dublin Society (RDS) which promotes and develops agriculture, arts, industry and science in Ireland. It hosts many concerts and also showcases the annual Show Jumping Competition, a major entertainment event. You can approach Ballsbridge via ‘Herbert Park’, a pleasant public green park and fashionable road, opposite Donnybrook Village and vice-versa..
Dalkey and Killiney which lie on the southern most tip of Dublin are upmarket neighbourhoods and home to such celebrities as Bono, Maeve Binchy and Enya among others. A walk up Vico Road to take in the view is a must-do. Killiney Hill is beautiful, offering panoramic views of the surrounding Dublin Mountains. These areas are best approached by the DART, which runs along the coast and has three main stops in the city centre.
Blackrock or Dun Laoghaire, accessible by bus or DART, are also worth a visit.
Ranelagh and Dartry are also worth visiting- Ranelagh is small but affluent, accessible by the Luas Green line and has several critically acclaimed eateries.
Sandymount, a coastal suburb no more than 2 mi (3 km) south-east of the City Centre, is another quite affluent area with a tiny park and some restaurants. It is the birthplace of W.B. Yeats. The suburb and its strand appear prominently in James Joyce’s Ulysses. There is a wonderful walk from Sandymount across the north end of its beach to the South Bull Wall which reaches a finger well out into the Bay.
Be sure to go north of The Liffey also. Clontarf, Malahide, Skerries and Howth (all accesible by DART/commuter rail are all great places to spend an afternoon. Malahide has a beautiful Castle (including extra doors for the ghost)in a Park and is a nice little village with harbour, beach, estuary and lots of restaurants. You can also take a 20-30 minute walk along the coast up to Portmarnock beach (a 5 km long beach).
Howth was home to a handful of Irish celebrities including Gay Byrne and the late Dolores O’Riordan. Walking the cliff walk or climbing the Ben of Howth, a 561 ft (171 m) high hill on Howth Head, on a fine day is well worth your time. Although the water may be too cold to enjoy a swim, Howth has a small stretch of beach that has a beautiful view of mountains in the distance.
Dublin’s best beach is also to the north. Dollymount Strand and the adjoining bird sanctuary are highly recommended. It’s a great bike ride – there’s an excellent bike path from the city along by the sea, and may also be accessed walking from Clontarf Road DART station or bus route 130 from the city centre.
Dublin’s most famous shopping street is the pedestrianised Grafton Street, which runs between St. Stephen’s Green and Trinity College. It has recently, along with its surroundings, been classified as an ‘Architectural Conservation Zone’. This will involve a re-establishment of the area’s rich historic charm and urban character. The best concentration of shoe shops is found on Grafton Street and the adjoining Wicklow Street.
Brown Thomas, Dublin’s most famous and expensive department store is on Grafton Street along with a wide range of clothing, jewelry, and photography shops, etc.
The Powerscourt Centre , just off Grafton Street, is one of Dublin’s most attractive shopping centres, set in a beautifully restored 18th century townhouse. Here, you will find clothes, cafes, galleries and Irish designer jewelers. You must check out the The Loft Market – it is a haven for Dublin Fashion. There is lots of up and coming young fashion designers and vintage clothing sellers such as Perk Up! Vintage, Lisa Shawgi Knitwear and MO MUSE to shop around. Beware the overpriced antique dealers, some of whom will drop a price by 50% after only the merest suggestion that you are willing to haggle (and it still may not be a bargain). For gifts, there is an engraving business based in the centre next to Bonsai Shop.
Leaving Powerscourt via the ornate steps on to South William Street, you will find yourself facing a small street called Castle Market, which leads to a covered red-brick shopping arcade known alternatively as the Market Arcade or the Georges Street Arcade. This area is worth a visit for vintage clothing, fabrics, unusual accessories, vinyl and club wear. It also features some small cafes.
Alongside the historic Trinity College you will find Nassau Street where there are many shops selling tourist-related items such as Waterford Crystal, Belleek Pottery, Aran sweaters, and other Irish craft items. Shops selling these items include House of Ireland and Kilkenny Design.
Dawson Street, parallel to Grafton Street, is home to the official residence of the lord mayor – the ‘mansion house’ as well as several upmarket clothes shops, restaurants and well stocked large bookshops including Hodges Figgis.
There is also an extensive shopping area on the north side of the river, in Dublin 1, centred on O’Connell Street and Henry Street (Ireland’s busiest shopping street). Clery’s (O’Connell Street)(18 O’Connell Street) and Arnotts (12 Henry Street) are large department stores each with a long history. Two large shopping centres, the Jervis Shopping Centre (Jervis Street), and the Ilac Centre (Henry Street) are nearby. The latter also houses Dublin’s Central Public Library
Just off Henry Street is Moore Street, which has a fruit, vegetable and fish market. It’s worth a stroll if you want to get a slice of life from the less genteel side of Dublin. For a more traditional Dublin shopping experience go to the Liberties area around Thomas street and check out the stalls on Meath street and the liberty market (off Meath Street) on Thursdays, Fridays and Saturdays. At the top of Henry Street on Parnell Street is Chapters, which has a massive selection of books at generally cheaper prices than other high street stores, as well as a large secondhand section. It is especially great for ‘coffee table’ style art books.
The Loop Duty-Free is in both terminal 1 and terminal 2 of Dublin Airport. There are a variety of concession stores within The Loop including Jo Malone and MAC amoung others. The complex stocks a range of discounted products from Ireland as well as 1000’s of big brands in beauty, fragrances, confectionery and more. There is an option to buy online in advance of your flight and collect at the airport.
Be sure to visit Temple Bar’s Temple Bar Square and Meetinghouse Square on a Saturday morning or afternoon for the markets (Dublin 2), which sells all types of foods, from traditional fare to delicious baked goods. Both squares are also home to several very good restaurants. Meetinghouse Square, which lies only about 150 ft (50 m) west of Temple Bar Square, sells much finer fare and more exotic foods than Meetinghouse Square.
The Temple Bar area offers some alternative to shopping at the larger chain-stores. Small clothing boutiques, including the city centre’s only swap shop, are popping up all around the area (Temple Lane, Crow Street and Fownes Street) with an emphasis on vintage and unique original independent designer pieces. If you can’t make it to any of the markets at the weekend, the best can be found here during the week.
Also, in Dublin 8, Cows Lane Fashion and Design Market, which is the largest designer market in Dublin, offers handmade one-off original designs. The market is open every Saturday from 10.00AM-5.30PM. Found outdoors on Cows Lane and indoors in the old Dublin’s Viking Adventure, this market is not to be missed.
For those for whom it just would not be a holiday without hanging out at the mall, there are various shopping centres located around Dublin, including Blanchardstown Centre (Dublin 15) (39 and 70 bus routes), Liffey Valley (Dublin 22) (bus routes 25, 25A, 66, 66A, 67A,78, 78A, 210 and 239), and The Square, Tallaght, (Dublin 24, last stop on the red Luas). Dundrum Town Centre is located in South Dublin and served by the green Luas tramline from St. Stephen’s Green. In Dublin 14, it was awarded the title of best shopping mall in the World, 2006. Harvey Nichols, an upmarket British department store chain housing designer names in fashion, accessories, beauty and food and is located in Dundrum Town Centre.
Another great option is to head to the subarbian seaside town of Dun Laoghaire where the Pavillion is also available with many shops including Meadows and Byrne, cinema and theatre.
Dublin is not cheap for general shopping, although visitors from outside the European Union can obtain a refund of VAT (sales tax: 23%) on many of their purchases. Just look for the refund sign and ask in the shop for details. Keep in mind that most stores will issue VAT refund vouchers only on the same day of purchase. More on VAT refund can be found on Irish eGovernment website.
Also, if you want to find thrifty nick nak shops, then Talbot street is a good start. Like any city, if you look hard enough and don’t get caught up in the glitz and glam when shopping, there are great bargains to be found.
There is fairly extensive duty-free shopping at Dublin Airport, at prices sometimes cheaper than the rest of the city.
Dublin has a wide range of good quality restaurants. Many are overpriced by European standards, however, tougher economic times have given rise to a new wave of stylish but casual, low priced eateries with great food. Main course prices range from €8 at the lower end up to around €40 at the higher end. Wine in restaurants is generally marked up from its already expensive retail price by a factor of at least two and three times retail price would not be uncommon. Look out for “Bring Your Own Bottle” options which can certainly save some money.
There are many excellent value Indian restaurants around the South William Street area, parallel to Grafton Street. These often have reasonable priced lunch and ‘early bird’ deals, offering three course meals for around €10. Particularly to be recommended are the Khyber Tandoori on South William Street and Shalimar on South Great Georges Street. Also excellent is Surma on Camden St and “Govindas” on Augnier Street for very cheap Hare-Krishna vegetarian food. all are in Dublin 2.
A similar multi-cultural hotspot is Parnell Street in Dublin 1 (O’Connell Street-Gardiner Street), which has a dense concentration of Chinese and Asian restaurants extensively frequented by the ex-pat communities.
Don’t forget to try Leo Burdock Fish and Chips (2 Werburgh St, beside the Lord Edward). Small indoor eating area. About 10 Euro for way too much food (share it with someone). Visited by many famous people whose names are listed on the wall.
No visit to Dublin would be complete without a visit to one (or ten) of its many pubs (last count says there are over 600 pubs). Drink is moderately priced by comparison with some European capitals: a pint of stout costs from €5.00 and up, while lager costs around €5.50 and up. Since the government gave a tax break to micro-brewed beer , this had a slight effect on prices in brew pubs. Pubs serve drinks until 24.00 with some drinking-up time allowed. Many bars have late licenses allowing them to serve up to 03:30, although this usually means a cover charge or price increases after 24.00.
Smoking has been illegal in Irish pubs (as well as all indoor workplaces) since March 2004; this has had the positive side effect of increasing al fresco facilities. Beer tends to be more expensive around the Temple Bar area, due to the increased tourist flow, and will be cheaper in more traditional styled pubs.
There are pubs in Dublin offering cheaper drinks, if you are willing to go off the beaten trail or ask other patrons for suggestions. Fibber McGees just off Parnell square, in the City, has €3 per drink for any drink including shorts, every Thursday night. (There is a €5 door fee to enter after 21:00 Thursday) please be aware Fibber McGees is a heavy metal bar, so if loud music is not your thing then best avoid. Craft beer bars also tend to have certain pints available for around €4.
The Temple Bar that people often speak of is an area that used to be a sand bar, not an actual bar. (Originally, anyway; there is a pub called “The Temple Bar” in Temple Bar.) The Temple Bar district has a mixture of food, drink, shopping and music. It appeals to all ages, but is a hot spot for tourists. The narrow, cobble stoned streets gives it an original feeling within the heart of the city. Its central location also makes it easy to walk to from Dublin’s Centre. However, late night revellers tend to make it an unpleasant place to be after dark. It can be taken over by drunken stag and boisterous hen parties, many who travel cheaply from the United Kingdom to avail of Temple Bar’s delights. Tourists should beware that prices in the Temple Bar area can go as high as €7.50 for a pint.
Outside The City Centre
If you go there for a weekend trip, please note that hotels in Dublin book fast for the weekend, especially during Spring; booking 2-3 months in advance is highly recommended.
Dublin is not well-served for visitors who wish to camp in designated sites. The nearest to the city centre is located to the southwest of the city.
There are a huge number of backpackers and youth hostels (mostly around €20 per night in dorm accommodation), bed & breakfasts (around €45 per person), and hotels (€50+ per room). Cheaper accommodation is to be found around Dublin’s main bus station, Busaras. While areas south of the river contain more expensive options.
DigiMarCon is the Largest Digital Marketing, Media and Advertising Conference & Exhibition series in the world, with annual events held in all continents (North America, Latin America, Europe, UK, Asia Pacific, Middle East and Africa) in 13 countries (United States, Canada, Australia, New Zealand, United Kingdom, Ireland, Netherlands, Spain, Brazil, Singapore, India, United Arab Emirates and South Africa), across 33 cities (New York, Philadelphia, Boston, Toronto, Vancouver, Montreal, Houston, Dallas, Chicago, Los Angeles, San Francisco, Seattle, Washington DC, New Orleans, Atlanta, Detroit, Miami, Denver, San Diego, Phoenix, Las Vegas, Honolulu, London, Dublin, Amsterdam, Barcelona, Johannesburg, Cape Town, Dubai, Sydney, Auckland, Singapore and Sao Paulo). All DigiMarCon Events can be attended in-person or online. Wherever you are located there is a regional DigiMarCon event nearby you can attend.
DigiMarCon Conferences are held in top luxury 5-star event venues across the world such as; Royal Caribbean Cruise Ships, Olympic Stadiums, Marina Bay Sands Expo & Convention Centre and Wynn, JW Marriott, Marriott Marquis, Hyatt Regency, InterContinental, The Westin, Renaissance, Hilton, Conrad, W, Sheraton, Loews and Sofitel Hotel properties. Discount hotel room rates at each venue hotel means no hassle getting to and from the venue each day.
Building relationships matter! At DigiMarCon Conferences we have more networking breaks on our program than others. On average there are 8 Networking breaks at each event giving delegates ample opportunities in a relaxed atmosphere to meet others over the 2-days at the event; from 1-hour round table networking luncheons to 3-hour dinner receptions. These networking breaks are set in picturesque locations to facilitate memorable experiences while fostering new relationships. Such experiences include enjoying cocktails and the Sunset over the Pacific Ocean on a private Ocean Terrace in Santa Monica, to being on the Sydney Olympic Stadium playing arena at night enjoying cocktails under the lights, to dining at the 360 Revolving Restaurant at the top of the CN Tower in Toronto for a Dinner Reception, enjoying cocktails on a private promenade overlooking Times Square in New York City, or having fun at the Dazzles Night Club onboard the Royal Caribbean Oasis of the Seas for a Farewell Party, etc.
DigiMarCon Keynotes, Panels and Master Classes are facilitated by the foremost thought leaders in the industry, from celebrity social media influencers to CMO’s from the largest Fortune 500 company brands that are disrupting the digital marketing, media and advertising industry, such as Google, Facebook, Microsoft, Amazon, Oracle, Adobe, eBay, Netflix and more. All presentations are pitch-free, and include actionable takeaways, case studies, strategies and tactics, ready to be applied when back in the office.
At DigiMarCon Conferences you are never ‘left in the dark’…. literally, in a large room far away from the stage and speakers, crushed in tight theater seating, without even a table, while sitting in the dark. At DigiMarCon all delegates have premium meeting space in luxurious ballroom well-lit spaces, with comfortable seating with table enabling delegates to use their laptop to take notes with ample charging facilities onsite in a comfortable space to learn and thrive. All tables are situated close with direct view of the stage.
DigiMarCon Conferences are affordable to attend, from single-day event passes up to two-day VIP options at a fraction of the cost of other industry events. We offer significant discounts for early bird registrations. Additionally, on top of time-limited discount pass rates, because budgets are tight, we want to make sure all groups have a chance to attend DigiMarCon. For government employees, students, academic, startups, non-profit organizations and teams, we offer generous discounts off the prevailing registration price.
Attend DigiMarCon and you become part of the show! DigiMarCon Conferences tap into the talent of the room, drawing from the knowledge and experience of the professionals in the audience. All DigiMarCon events include regular interactive question and answer sessions with speakers and the audience ideal for collaboration, audience polls, along with ice-breaker and group exercises, steered by charismatic Emcees.
DigiMarCon Conferences put you right up and close with the speakers giving you the opportunity to meet these social media influencers which you follow in person. Speakers are never hidden in private speaker rooms away from the audience, they are in the auditorium sitting right beside you and participating.
Attending a conference is a well-researched decision. There are many factors to consider such as location, time, venue, cost, speakers, content, etc. At DigiMarCon our results-obsessed Customer Service team are at your service before, during and after the event to help with your needs. It’s at the core of what we do — it drives our business. Offsite, we are ready to assist you via phone, ticket or chat. Onsite at our Conferences, friendly DigiMarCon staff serve as your hosts. They welcome your input and are happy to assist you.
At all DigiMarCon Conferences is the co-located exclusive event TECHSPO Technology Expo, which showcases the new generation of technology and innovation, including; AdTech, MarTech, Internet, Mobile and SaaS technologies. Be inspired, amazed and educated on how these evolving technologies will impact your business for the better. Unlimited Access to TECHSPO Technology Expo is included with all DigiMarCon passes.
DigiMarCon All Access & VIP Passes include a 12-month on demand access to hundreds of hours of DigiMarCon speaker keynotes, panels and master class presentations from recent DigiMarCon Conferences, including videos, slide decks and key takeaways, available on demand so you can watch what you want, when you want.
Attendees of DigiMarcon Conferences gain membership to an exclusive global Digital Marketing, Media and Advertising Community of over 500,000 worldwide subscribers to our award-winning digital marketing blog and over 100,000 members to the International Association of Digital Marketing Professionals (visit https://iadmp.org). This global community comprises of innovators, senior marketers and branders, entrepreneurs, digital executives and professionals, web & mobile strategists, designers and web project managers, business leaders, business developers, agency executives and their teams and anyone else who operates in the digital community who leverage digital, mobile, and social media marketing. We provide updates to the latest whitepapers and industry reports to keep you updated on trends, innovation and best practice digital marketing.
The events industry has forever changed in a world affected by COVID-19. The health and safety of our guests, staff and community is our highest priority and paramount. The team at DigiMarCon is dedicated to ensuring a great experience at our in-person events, and that includes providing a safe, clean and hygienic environment for our delegates. Some of the key areas we have implemented safe and hygienic measures include;
DigiMarCon has always been industry leaders of the Hybrid Event experience for years (a hybrid event combines a "live" in-person event with a "virtual" online component), no one needs to miss out on attending our events. Each DigiMarCon Conference can be attended in-person (with a Main Conference, All Access or VIP Pass) or online (with a Virtual Pass) giving attendees a choice for the experience they want to have. Attending virtually by viewing a Live Stream or On Demand enables participation by people who might be unable to attend physically due to travel or time zone constraints or through a wish to reduce the carbon footprint of the event. If you would like to meet the speakers, network with fellow marketing professionals at refreshment breaks, luncheons and evening receptions, check out the latest Internet, Mobile, AdTech, MarTech and SaaS technologies providers exhibiting then it is highly recommended to attend DigiMarCon in-person. As the largest Digital Marketing, Media and Advertising Conference series with events in 33 international cities worldwide, across 13 countries, there is bound to be a DigiMarCon Event near you to attend in-person if you can.
DigiMarCon Conference Series is the annual gathering of the most powerful brands and senior agency executives in your region. The Sharpest Minds And The Most Influential Decision Makers - Together for Two Days.
Who Attends Our Conferences
Brands • Agencies • Solution & Service Providers • Media Owners • Publishers • Entrepreneurs • Start-Ups • Investors • Government • Corporates • Institutes of Higher Learning
|
<urn:uuid:d407113e-ab0e-4590-aba7-702252bd93f9>
|
CC-MAIN-2021-31
|
https://digimarconireland.ie/dublin/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153391.5/warc/CC-MAIN-20210727103626-20210727133626-00254.warc.gz
|
en
| 0.953913 | 10,376 | 2.546875 | 3 |
As we know from Section #3: Overview of Whitetail’s Keen Sense of Smell of Whitetail 101, deer rely heavily on their sense of smell to evade predators. Because of this, they have also learned to use the wind to strengthen their advantage. This needs to be kept in mind when setting up and using stands to hunt the wind. Scent control is a great start, but understanding the wind and thermals is the original scent blocker. Hunting the wind will ensure you have the greatest odds of success. In this section we’ll go over some of the ways you can hunt the wind. This knowledge will reduce the need for scent control and cover scents.
Grunt, Snort-Wheeze, and Rattle this to your buddies!
First, let’s go over the common types of “wind”:
These are the winds you see on your weather app – e.g. NE at 10m/h – and are the primary winds you’ll find in open fields and on top of ridges and plateaus. These are created by pressure systems or air masses and have a relatively consistent prevailing direction. Although they are fairly consistent in direction within an area. As the wind hits obstacles such as valleys, thick cover, or hills, the winds can swirl around. Causing your scent to carry in different directions. However, these winds can change dramatically in a very short time as well. These changes are usually caused by a sudden change in weather (such as an approaching storm or the sunrise or sunset).
Unlike prevailing winds, thermal winds are caused by the heat resulting from the sun. As the sun rises and heats the ground, it causes the air to rise. As the sun sets and the ground cools, the air sinks back down. In areas that don’t get sun or are in lows with cold or flowing water, the thermal winds (thermals) will continuously drop as the air around them is warmer.
Where warm and cool thermals meet, the wind mixes and swirls. This effect is also seen when thermals rise through chutes that meet, and especially when they meet prevailing winds on top of ridges or plateaus. This swirling effect can spread as far as a half mile, carrying the scent of whatever enters or blows in throughout the area.
This can also happen on a sunnier hill side that falls into thick cover or a creek bed. In these areas the wind is also likely to swirl as the cool and warm thermals meet.
Thermal wind is most prevalent in areas with greater changes in elevation like the Western US but can still be found in the prairies and lowlands of the Midwest. Essentially, the Midwest will see less intense thermals, but any area with changes in topography or differences in temperature due to sun exposure will see thermal effect winds. We’ll go over some of the common lowland areas that produce thermals later in this section.
Not unlike elk, whitetail deer will utilize the topography and thermals to keep themselves safe. Especially while moving between bedding and feeding areas. While most hunters understand prevailing wind and take it into consideration when planning a hunt. Many fail to realize that they can also utilize it to identify areas where animals will be at their most vulnerable. One of these areas are where the prevailing wind or thermal is moving consistently in one direction (i.e. not swirling). Typically, deer will travel into the wind so as to have the chance to smell any danger that may lie ahead of them. Because of this and what we know about thermals, we can assume that in higher elevation or hilly areas that, as the thermals will move upwards, the deer will move downwards and vice-versa.
These areas give the hunter the best chance at cover as you really only need to worry about the wind from one direction. If there are features of the landscape that funnel deer through these areas, all the better!
Where deer feed and bed can be very different than where they travel. They want the best protection and cover available. They tend to find areas where thermals mix or a thermal and the prevailing wind mixes. This way they can be aware of danger all around them, rather than just from one direction. In flatter areas, this mixing can still happen in places with cover, on the bottoms and tops of valleys, in coulees, ravines, and along creek beds; these are the places you’ll usually find deer bedded and utilizing the mixing wind. They may also do this while feeding, but are less likely to rely on this swirling effect in the prairies and lowlands.
Although this is usually how deer will act, it’s important to scout and try to determine if there is a reason they’ll deviate from this behavior. Whitetails in areas with less hunting pressure are more likely to feel comfortable travelling with the wind, bedding directly in thermals, etc. However, the more pressure they’re under, the more likely they are to use the wind as much as possible.
You’ve probably heard that stand locations should be set up for specific or ideal winds, but first, you need to know the travel of the deer.
This can be done by looking at the tracks in the area your stand looks over. Ideally you’ll want to set up your hunting stand or blind with the prevailing winds blowing your scent away from the trail completely. At the very least away from the direction the deer tend to come from.
For example, if the prevailing wind is typically from the South and the deer movement is typically from West to East on your desired hunting stand, you’ll want your stand to be set on the North side of the trail. It can then be hunted with S, SSE, and SSW winds fairly confidently, even with calmer winds (which will increase the swirl effect). However, if the winds are stronger, your scent is less likely to swirl in the trees and fall onto the trail and you can get away with a solid SE or SW wind.
Tip: Google Earth is a great tool to visualize stand locations and wind direction. Read more here…
The next thing you’ll want to consider is how you’ll enter and exit your stand. Avoid leaving scent that could tip deer off to your location. Ideally, stands should be placed ahead of time (weeks to months if possible. So the impact of your presence fades before the hunting season starts. When placing stands, you should also have an entry and exit strategy that avoids having your path cross your shooting lanes. Avoids blowing your scent into the bedding areas, and reduces the chance of deer knowing you’re in the area.
What most new hunters fail to realize, is that their exit can be just as impactful in deterring deer as their entry. Utilizing wind checkers (commercial or DIY) can help you determine if you’re planned exit strategy will be safe in terms of reducing the impact of your presence on the deer. Key things to keep in mind are:
You’ll want to apply the same ideas laid out in how whitetails use the wind to your own movement. The first thing you’ll need to do is establish where the deer are bedding and feeding. Although these would be ideal areas to shoot. They are likely areas where the wind swirls and thus are challenging to hunt. Once you establish either a bedding or feeding area. You’ll want to set yourself up at an ideal time where the prevailing wind or thermal draws the deer towards you.
Obviously the challenge with this is that the deer will technically be downwind. The means of compensating for this will differ depending on the situation. For the most part, you should be able to mitigate your own scent from being blown into the path of the deer with:
Another thing many hunters forget is that, if you move from a sunny area to a shady area, the thermal winds carrying your scent are likely to change direction. This is important to keep in mind while moving to and from hunting areas.
Hunting the wind is much more complicated than knowing the prevailing wind direction. To be consistently successful, you need to understand how thermals work. The effect topography features and other elements of the field can have on the direction of these winds. Along with how animals use these winds to their advantage. Although we covered most of the basic concepts and theories in this section. The only way to truly understand how these winds will affect your success is by getting out in the field and experiencing them for yourself.
The biggest thing to remember in terms of strategy is that, if you don’t have a chance that day. Figure out how you can set up for the next morning or evening as they travel. While taking into consideration the thermals you can expect throughout the day. This will ensure you don’t pressure the deer by making them aware of your presence before you ever have a chance to take a shot.
|
<urn:uuid:89b49df1-b768-4bd1-a58a-671d31dfcde4>
|
CC-MAIN-2021-31
|
https://1strut.com/hunt-the-wind-for-scent-control-the-original-scent-blocker/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046155188.79/warc/CC-MAIN-20210804205700-20210804235700-00373.warc.gz
|
en
| 0.955299 | 1,863 | 2.71875 | 3 |
Study takes a micro-mechanics approach to understanding how water impacts fiber-wrapped concrete structures
By Alice C. Waugh
Civil & Environmental Engineering
For more than a century, engineers studying the deterioration of materials used to build bridges, roads and dams have relied on continuum mechanics, an approach that looks at the material as one mass rather than a collection of atoms, and assumes that at any area of a structure, the material will follow certain rules of behavior in response to stress. While useful for studying materials on a large scale, the continuum approach doesn’t reveal much about what’s happening with the material at the micro-scale.
MIT researchers have used a technique called molecular dynamics simulation to study how materials interact at the molecular level and recently applied it for the first time to take a close look at the interface between epoxy and silica, one of the primary molecules forming concrete. Epoxy is often used to bond a stretchy supportive fabric or a thin plate made of reinforced polymer composites to concrete structures in order to increase the strength and durability of the structure. Specifically, they are interested in how this interface changes when it gets wet. The researchers hope their work will introduce a new paradigm for structural and design engineers to use when predicting the lifespan of building components and large structures.
Using the classical continuum mechanics model, engineers have learned how epoxy and concrete behave as separate and homogenous materials. “But this is not sufficient to understand the fundamentals of deterioration” where the atoms in epoxy molecules interact with silica and other atoms in concrete — especially when that epoxy-concrete interface is exposed to water, said Oral Buyukozturk, professor in the Department of Civil and Environmental Engineering (CEE). Buyukozturk, CEE Professor Markus Buehler and graduate students Denvid Lau and Chakrapan Tuakta Ph.D. ’11 co-authored a paper published in an April issue of the International Journal of Solids and Structures that describes their use of molecular dynamics simulation to study an epoxy-silica interface from a fundamental perspective that unifies chemistry and mechanics.
Previous research has shown that the presence of moisture increases the likelihood of delamination between concrete and epoxy in situations where epoxy is used to attach fiber-reinforced polymer to the concrete. Researchers had also found that the presence of water changes the way in which the interface starts to fail: moisture makes it more likely to fail because of separation of the layers of material at the interface rather than from cracking in one of the materials itself.
“When water seeps in, it changes the dynamics of the system on a molecular level, though exactly how that happens is unclear,” Buyukozturk said.
The new study was able to quantify the decrease of adhesive energy in the interface by examining the changes in the physical forces of attraction and repulsion between molecules in the two materials – changes that can lead to failure of the concrete-epoxy interface. When peel and shear forces were measured, the simulation showed that in a “wet” scenario, adhesive energy decreased by approximately 15 percent compared to a “dry” scenario. This reduction at the molecular scale may translate into greater adhesive energy reductions in large-scale structures, because local deterioration caused by moisture at different locations of the structure can lead to stress concentrations that can compromise the overall structure.
“The molecular modeling result validates our hypothesis that the adhesive strength of the interface is weakened due to interaction between epoxy and water, and provides a detailed chemistry-based view on the mechanical properties of the interface,” the authors wrote.
Molecular dynamics simulation was first developed in the late 1950s to study the dynamics of a system consisting of several hundred particles. The technique has been more widely applied as computational power has increased and is now used in fields including molecular biology and protein modeling, and increasingly as a powerful tool in computational mechanics.
The continuum approach gives information about materials on a scale of millimeters to meters, while the atomistic approach used in molecular simulation is useful for studying distances of 0.1 to 100 nanometers in materials. A “hand-shaking region” where information can be exchanged between the two regions may be somewhere from 1 to 100 micrometers. The next challenge is further study of that hand-shaking region to bridge the emerging understanding of materials at the nano-level with existing macro-level knowledge and improve the accuracy of predictions about the deterioration and life cycles of large civil structures.
“By advancing the understanding of civil structures from the realm of structures and materials into the domains of chemistry, physics and mathematics, molecular simulation may do for engineering analysis what the introduction of the now-standard mathematical technique of finite element analysis did for continuum mechanics four decades ago,” Buyukozturk said
The work was supported by the National Science Foundation.
|
<urn:uuid:95947006-59ad-4374-b159-560bd6d1ef77>
|
CC-MAIN-2021-49
|
https://cee.mit.edu/study-takes-a-micro-mechanics-approach-to-understanding-how-water-impacts-fiber-wrapped-concrete-structures-2/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363290.39/warc/CC-MAIN-20211206042636-20211206072636-00118.warc.gz
|
en
| 0.92337 | 1,004 | 2.875 | 3 |
Markets in mothers’ milk could be good or a bad thing for women and their children, depending on how governments respond. Making breast milk more easily available may help more mothers breastfeed, and improve the economics of the situation for women.
With maternal breastfeeding now promoted as a choice rather than a biological imperative, it is hypocritical and duplicitous for governments to authorise companies to sell breast milk without strengthening the rights of women to breastfeed, sell or share their own milk.
Global trade in breast milk
The international market for breast milk has grown from both demand and supply factors, and from difficulties common to new mothers worldwide.
The huge accumulation of scientific evidence on the importance of breastfeeding for both women and babies has resulted in an increase in market demand for milk. This is led by health professionals treating medically vulnerable babies.
Potential bacterial or viral contamination of traded breast milk can be avoided by pasteurisation. The risks are comparable to those associated with cow milk infant formula.
The buyers for breast milk in the United States include women having trouble breastfeeding, especially after difficult childbirth. Lack of paid maternity leave for women after childbirth also increases demand for breast milk in the US. Bodybuilders also buy it for sports nutrition.
On the supply side, new technologies are helping lactating women in the US and elsewhere to extract, store and exchange their milk safely and independently. Exchange increasingly occurs online.
For some, selling surplus milk makes maternity leave affordable. Others provide milk to babies of relatives and friends through informal networks.
However, breast milk is in short supply where formula is cheap and breastfeeding rates are low.
Only a small number of companies are involved in the global trade, the biggest being Prolacta. The US company has been collecting milk through milk banks for around US$30 a litre and turning into a commercial product sold to US hospitals for nearly US$500 a litre. Alongside the not-for-profit breastmilk banks, several million ounces of breastmilk are processed in North America each year.
The Australian government recently approved a local dairy entrepreneur, Neolacta, to import and sell breast milk. Neolacta has attracted controversy in India around plans to collect milk without remuneration from poor mothers at a Bangalore hospital and sell it publicly for US$300 a litre, in return for donating the processed milk to the hospital’s neonatal unit
Another company, Ambrosia Milk, was selling breast milk in the United States. Unlike the Indian proposal, the company paid Cambodian mothers for their milk, so they earned at least twice the local wage.
Ambrosia’s scheme barred mothers from contributing milk until babies had been breastfed for six months, and required health checks. Offering women around US$15 a litre for breast milk, Ambrosia found willing suppliers.
However, Cambodian officials shut down the trade this year, declaring:
Even though we are still poor, we are not so poor that we have to sell human breast milk.
Why would women get involved?
To date, the policy debate around the market for breast milk has focused on exploitation, any health risks and milk banking, without exploring the bigger picture of economic incentives and gender inequalities.
Governments have neglected to recognise the economic value of women’s “lactation work” or to provide legitimacy, guidance and safety to informal breast-milk exchange. The work involved in breastfeeding is rarely acknowledged, although it can takes considerable time, skill and energy. International authorities including the World Bank, recently called for better resourcing of breastfeeding, including by paid maternity leave.Breastfeeding image from www.shuttershock.com
US and Australian regulators have helped dairy industry players to position themselves in a commercialised breast milk supply chain, but individual women are discouraged from trading by legal ambiguities about rights and responsibilities. Selling breastmilk is probably not illegal and buyers may sue over unsafe milk. Businesses selling food must be licensed and meet food safety standards. Laws in different jurisdictions differ, depending on whether breastmilk is considered a food or a human tissue, or even a therapeutic good.
Mothers involved in exchanging breast milk are alternatively praised or stigmatised, raising issues about institutionalising medical control of women’s bodies and economic choices.
Health researchers are already experimenting with financial rewards to improve breastfeeding rates. In fact, various studies have shown governments’ own budgets would benefit if more women breastfed. Lower rates of infectious illness and later life chronic disease for breastfeeding mothers and children reduces health care costs.
Maternal breastfeeding and breast milk could be made safer and more accessible to women in both rich and poor countries if governments were innovative and courageous in acknowledging women’s economic and health rights, and if governments acted to protect maternal breastfeeding through comprehensive policies.
Regulating the trade in breast milk
The major risk of the emerging trade is that it will reduce maternal breastfeeding. If mothers are not breastfeeding, their own health is compromised, and the risks of breast cancer are higher. Feeding at the breast also benefits children’s development and bonding, and reduces infection risk even compared to feeding breastmilk.
At the supplier end, in India or Cambodia, breastfeeding mothers may be persuaded to make more milk and lactate longer. However, they may unknowingly sell or donate too much of their own child’s birthright.
If mothers don’t know the true worth of their breast milk, or have few decent work or leave options, they are easy targets for companies marketing cow’s milk substitutes for breast milk.
The overriding goal of regulating the selling or sharing of human milk should be to empower women to breastfeed their own children, while protecting maternal breastfeeding from economic incentives and markets that undermine it.
Although health policymakers may think a market for breastmilk solves the problem of breastfeeding, it doesn’t. Markets work by holding costs down, and selling at a profit to those willing and able to pay, not to the children who most need it.
Public health regulation supported the expansion of markets for infant formula last century. Comparable public health support is now needed to make breast milk more available and breastfeeding less costly for women. Markets increase the need for strong employment and consumer regulation to protect women and children worldwide.
In Australia this could mean National Health and Medical Research Council guidelines to assist safe sharing, selling and buying of human milk. There also needs to be clarification of mothers’ legal rights and responsibilities.
Insurance and technical support could be provided for running women’s breast milk cooperatives, focused on helping mothers with breastfeeding. Health services could screen and certify potential suppliers, and offer storage and logistics support.
For example, in Brazil, the government implemented a comprehensive and integrated national strategy that incorporated community-based milk banking. The integrated strategy dramatically improved breastfeeding rates and children’s health in the country.
World Health Organisation guidance, including the International Code of Marketing on Breast-milk Substitutes, should extend its scope to commercialised breast milk. Import and export regulation for breast milk should include fair trade or fair pay requirements. Product labelling should certify that the women supplying the breast milk received fair pay and health protection.
Governments also need to urgently implement the International Labour Organsation’s conventions on paid maternity leave and lactation breaks. Breastfeeding takes time and “time is money” for women as well as men.
If governments prioritise corporations over women’s economic and health rights, sales of breast milk will result in everyone but mothers benefiting from trade.
|
<urn:uuid:2202e02a-38af-419d-aafb-04a45ed9090b>
|
CC-MAIN-2017-43
|
http://pitchengine.com.au/index.php?option=com_content&view=article&id=7578:without-better-regulation-the-global-market-for-breast-milk-will-exploit-mothers&catid=16&Itemid=158
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824293.62/warc/CC-MAIN-20171020173404-20171020193404-00153.warc.gz
|
en
| 0.95609 | 1,558 | 3.40625 | 3 |
According to Students with Disabilities: An Institutional Policy (1997, p. 8), all candidates for degrees at the University of Texas Medical Branch at Galveston must be able to perform the following essential functions with or without reasonable accommodations:
- Observation (to include the various sensory modalities) - accurately observe close at hand and at a distance to gather data and learn skills.
- Communication - communicate effectively and efficiently; process and comprehend written material.
- Psychomotor Skills - execute the various tasks and physical maneuvers that are required within each program.
- Intellectual and Cognitive Abilities - measure, calculate, reason, analyze, synthesize, integrate, remember and apply information; comprehend three-dimensional relationships; and understand the spatial relationships of structures. Creative problem-solving and clinical reasoning require all of these intellectual abilities.
- Professional and Social Attributes - exercise good judgment and promptly complete all responsibilities required of each program; develop mature, sensitive, and effective professional relationships with others; tolerate taxing workloads; function effectively under stress; adapt to changing environments; display flexibility; and function in the face of uncertainties and ambiguities. Concern for others, interpersonal competence and motivation are requisite for all programs.
- Ethical Standards - demonstrate professional attitudes and behaviors; perform in an ethical manner in dealings with others. All programs require personal integrity and the adherence to standards that reflect the values and functions of the profession. Many programs also require the honoring of codes of ethics
In addition, students in the Master of Science/Dietetic Internship Program will need to perform the following essential cognitive, affective, and psychomotor functions, with or without reasonable accommodations:
- Process, retain, and integrate information from the following types of sources: oral delivery by instructor(s) or student(s); blackboard data and diagrams; printed material (handouts, journals, manuals, books, medical records, computer); overhead transparencies; slides; film and video segments; audio recordings; live demonstrations; one to one and group interactions in the classroom or clinic; lab specimens, instruments, equipment, and machinery; observation, movement, or manipulation of others' bodies; evaluation and treatment tools; and therapeutic activities.
- Complete coursework that may require: independent mobility to various locations on and off campus; individual, partnered, or group efforts; following written or oral instructions; recording personal opinions, knowledge, or ratings; verbalizing personal thoughts, feelings, and opinions; instructing others; presenting oral reports; facilitating group discussions; role playing; manipulating, lifting, and carrying evaluation and treatment materials; managing time effectively; close physical contact with others in simulated and clinical activities; exposure to hazardous materials and body fluids; and working with individuals with infectious diseases and terminal illnesses.
- Take and pass scheduled and pop quizzes, exams, and lab practicals in a variety of formats.
- Interact with others in a professional manner as defined in the Student Responsibilities and Professional Development Process.
- Perform in an ethical manner as described outlined by the Academy of Nutrition and Dietetics Code of Ethics and the UTMB's Professional Charter.
During the Master of Science/Dietetic Internship Program, the student may be required to attend class or laboratory sessions that meet during the evening hours. Required clinical experiences may also involve relocation to other sites in Texas or surrounding states at the student's expense. During the program, the student will develop the ability to perform the following essential functions required of novice practitioners, with or without reasonable accommodations:
- Collaborate with members of a multidisciplinary healthcare team to develop a plan of treatment based on evaluative data that will prevent, treat, or minimize the risk of nutritional problems.
- Perform the Assessment, Diagnosis, Intervention, and Monitoring/Evaluation (ADIME) nutrition care process on patients and clients with diverse backgrounds.
- Document the practice process in a variety of formats.
- Function competently as part of a collaborative healthcare team.
- Function with competence and compassion in a variety of practice settings.
- Contribute to effective and ethical management practices.
- Contribute to the profession's continued growth through research and professional activities.
|
<urn:uuid:aa843a5e-49a8-45f9-879f-ce1e216fa64f>
|
CC-MAIN-2021-39
|
https://www.utmb.edu/shp/nutr/functions
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057018.8/warc/CC-MAIN-20210920040604-20210920070604-00513.warc.gz
|
en
| 0.90442 | 851 | 2.59375 | 3 |
Narcissists can be charming, charismatic, seductive, exciting, and engaging. They can also act entitled, exploitative, arrogant, aggressive, cold, competitive, selfish, obnoxious, cruel, and vindictive. You can fall in love with their charming side and be destroyed by their dark side.
It can be baffling, but it all makes sense when you understand what drives them. That awareness protects you from their games, lies, and manipulation.
Narcissists have an impaired or undeveloped self. They think and function differently from other people. They behave as they do because of the way their brain is wired, whether due to nature or nurture.
Remember that the severity of narcissism varies. Some people have more symptoms with greater intensity, while other narcissists have fewer, milder symptoms. The following discussion thus may not apply to all narcissisic people to the same degree.
1. Narcissists are very vulnerable
Despite having seemingly strong personalities, they are actually very vulnerable. Psychotherapists consider them to be “fragile.” They suffer from profound alienation, emptiness, powerlessness, and lack of meaning.
Due to their extreme vulnerability, they crave power and vigilantly must control their environment, people around them, and their feelings. Displays of vulnerable feelings, such as fear, shame, or sadness are intolerable signs of weakness both in themselves and others.
Their defense system, discussed below, protects them, but hurts other people. When they feel most insecure, they’re more malicious and the impact of their actions is irrelevant.
2. Narcissists have toxic shame
Underneath their façade is toxic shame, which may be unconscious. Shame makes narcissistic people feel insecure and inadequate―vulnerable feelings that they must deny to themselves and others.
This is one reason that they can’t take criticism, responsibility, dissent, or negative feedback even when meant to be constructive.
Instead, they demand unconditional, positive regard from others. Here’s how
To compensate for feeling inferior, they maintain an attitude of superiority. They’re often arrogant, critical, and disdainful of other people, including entire groups they consider inferior, such as immigrants, a racial minority, a lower economic class, or people of less education.
Like bullies, they put down others to raise themselves up.
Their hidden shame accounts for their braggadocio and self-aggrandizement. They’re trying to convince themselves and others that they excel, that they’re uniquely special and the best, smartest, richest, most attractive, and most talented.
This is also why they gravitate toward celebrities and high-status people, schools, organizations, and other institutions.
Being with the best convinces them they’re better than others, while internally, they’re not so sure.
Narcissists feel entitled to get what they want from others regardless of their behavior. Their sense of entitlement masks their inner shame and insecurity. They convince themselves that they’re superior and it follows that they deserve special treatment.
For example, their time is more valuable than others, and they shouldn’t have to wait in line like the masses. There is no limit on what they might expect from others.
Interpersonal relationships are a one-way street, because other people are considered inferior and not separate from them (see below). They don’t recognize their behavior as hypocritical, because they feel superior and special. Rules for other people don’t apply to them.
3. Due to lack of empathy
Narcissists’ ability to respond emotionally and express appropriate care and concern is significantly impaired. According to the Diagnostic and Statistical Manual of Mental Disorders, narcissists lack empathy. They’re “unwilling to recognize or identify with the feelings and needs of others.” (APA, 2013)
Research shows that they have structural abnormalities in brain regions associated with emotional empathy. They may claim they love you, but you must determine whether you feel loved by the way they treat you.
Real love requires empathy, compassion, and deep knowledge of the one we care for. We show active concern for that person’s life and growth. We try to understand their experience and world view though it may differ from ours.
|
<urn:uuid:277b1d11-53d0-4f4d-9cd0-8636d84948b3>
|
CC-MAIN-2021-31
|
https://themindsjournal.com/why-narcissists-act-the-way-they-do/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153934.85/warc/CC-MAIN-20210730060435-20210730090435-00285.warc.gz
|
en
| 0.954258 | 899 | 2.59375 | 3 |
Tax is assessed on the profit of a corporation differently than the business profit of an independent contractor. Self-employed individuals receive a Form 1099 reporting their income as independent contractors. At high income levels, the tax rate for corporate profits is less than the personal rate. A tax savings is even realized when all the corporate profit is personally distributed to the owner.
There are two types of corporations—a regular C corporation and an S corporation. A regular C corporation files an annual tax return and is taxed at corporate tax rates. The highest corporate tax rates are usually lower than the highest personal tax rates.
However, in order to obtain money from the corporation, a shareholder must receive either wages or dividends. Wages are taxed at the shareholder’s personal income tax rate. This expense reduces the corporation’s taxable profit. Dividends are taxed at a lower rate, but are not a tax-deductible expense of the corporation. They have already been taxed as corporate profit and are then taxed again as dividend income for shareholders.
However, distribution of business profit as dividends is not required. The tax consequences are lower for the incorporated business when the shareholder does not personally need the profit. The corporation therefore retains profits after paying taxes at a rate that possibly lower than the personal tax rate.
A more likely tax savings is incurred from creating an S corporation. An S corporation also files a tax return but pays no income tax. Instead, shareholders of S corporations are taxed personally on their respective shares of business profit. Consequently, S corporation profit is taxed at personal tax rates. No self-employment tax is assessed on S corporation profit.
However, shareholders who are active in the business must receive reasonable compensation, upon which employment taxes are assessed. One-half of FICA taxes are deducted from paychecks—just as with any other employee. The company matches the other half of FICA taxes. So shareholders pay 100 percent of the FICA taxes by either payroll deduction or higher business expense.
S corporation shareholders save taxes when their reasonable compensation is less than the business profit. This leaves some corporation profit for distribution to a shareholder that’s separate from their wage compensation. There are no FICA taxes payable on the profit received by shareholders. Only wages are taxed under FICA.
|
<urn:uuid:6e5267d8-730c-4801-9e7b-788f2b6e8fa4>
|
CC-MAIN-2019-04
|
https://www.activefilings.com/how-incorporating-a-business-saves-taxes/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583743003.91/warc/CC-MAIN-20190120224955-20190121010955-00082.warc.gz
|
en
| 0.968473 | 462 | 2.609375 | 3 |
A normal functioning aortic valve has three leaflets, usually referred to as cusps, and is positioned at the end of the left ventricle. This valve is the main pump that delivers oxygenated blood to the entire body. An aortic valve replacement is required if someone suffers from Aortic Valve Stenosis or Aortic Valve Insufficiency. These two issues can cause a significant number of problems and can be life-threatening. Understanding the components that are involved in an aortic valve replacement is essential, especially if you are considering one.
Dr. Ciuffo takes the time to consider your specific situation before moving forward on a treatment plan. If you are looking for this information to guide you through decisions regarding your healthy heart, this is a great place to start. Today we take a deep dive into aortic valve replacement, so you can have the knowledge you need.
When to Consider Aortic Valve Replacement
As already mentioned, there are two reasons why someone would need an aortic valve replacement. When suffering from aortic stenosis, the valve is narrow, causing it to be more challenging for the blood to go through. Basically, the muscle in the heart begins to thicken, causing a hissing sound, which is oftentimes confused with a murmur. With aortic valve insufficiency, the valve tends to “leak” when it is closed. This makes the heart work twice as hard to make the blood flow correctly and in the right direction. To repair this, doctors have created a minimally invasive technique that is much safer and easier on patients.
What to Consider for an Aortic Valve Replacement
Since the breastbone is not being cut into, this replacement procedure is called transcatheter aortic valve replacement, which allows for healing to begin and end much faster. Your doctor will make a small, approximately two-inch incision between the third and fourth rib bone on the right side of the body. From this point, your doctor can securely place the new valve on the heart, exposing it just enough to see and remove what needs to be removed.
Oftentimes, doctors have to remove calcified material from the heart in the process. With previous techniques, doing this left people at a higher risk for strokes. Using this technique, however, lowers the chances of a patient having a stroke because it gives the doctor direct vision of all calcifications.
After the valve has been secured into place and all calcifications have been removed, the doctor will then insert a long-lasting local anesthetic that is injected between the ribs and directly below the incision. Then the wound will be closed, and the patient will typically stay the night in the hospital. The next day it is encouraging that aortic valve replacement patients do some light physical activity, usually walking. After another day or two in the hospital, patients are released and ready to go home.
Oftentimes, patients ask ‘how long does an aortic valve replacement last.’ That’s a reasonable question! The answer is that it depends on the patient’s actions. If they take care of themselves and follow their doctors’ advice, the replacement can last for many years.
Choosing a minimally invasive valve replacement is a more intelligent choice than a traditional procedure because it allows you to feel less pain and have shorter recovery times. If you’re considering an aortic valve replacement, consider using Dr. Ciuffio, who has the experience and expertise needed to help you thrive. There are plenty of resources and treatment ideas to ensure you are on the correct path toward a healthy life. Contact us today to learn more about aortic valve replacement and schedule your appointment.
|
<urn:uuid:633a3644-fadf-47d4-93ae-6e6cc16145ff>
|
CC-MAIN-2023-23
|
https://heartsurgeryinfo.com/a-deep-dive-into-aortic-valve-replacement/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649177.24/warc/CC-MAIN-20230603064842-20230603094842-00739.warc.gz
|
en
| 0.939533 | 773 | 2.59375 | 3 |
An international team of scientists, including some from India, has found a way to breed wheat varieties that are of better quality and have a higher yield while also resisting diseases and the adverse effects of climate change. Read more here.
Genome editing, gene drives, and synthetic biology: Will they contribute to disease-resistant crops, and who will benefit?Innovations
New paper outlines potential uses of genetic engineering technologies to address problems that affect resource-poor farmers and consumers.
Large-scale genomics will improve the yield, climate-resilience, and quality of bread wheat, new study showsInnovations
Scientists identified significant new chromosomal regions for wheat yield and disease resistance, which will speed up global breeding efforts.
|
<urn:uuid:071e6e2f-edbb-480f-b9ee-45155c00e237>
|
CC-MAIN-2023-50
|
https://www.cimmyt.org/news/scientists-identify-genome-regions-that-lead-to-better-yield-disease-resistance-in-wheat/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100112.41/warc/CC-MAIN-20231129141108-20231129171108-00665.warc.gz
|
en
| 0.91563 | 148 | 2.78125 | 3 |
There’s a reason why most people feel uncomfortable about the idea of someone eavesdropping on them—the eavesdropper could possibly overhear sensitive or private information. This is exactly the risk that computer users face with a common threat called a “Man-in-the-Middle” (MITM) attack, where an attacker uses technological tools, such as malware, to intercept the information you send to a website, or even via your email.
Just imagine you are entering login and financial details on an online banking site, and because the attacker is eavesdropping, they can gain access to your information and use it to access your account, or even steal your identity.
There are a variety of ways that attackers can insert themselves in the middle of your online communications. One common form of this attack involves cybercriminals distributing malware that gives them access to a user’s web browser and the information being sent to various websites.
Another type of MITM attack involves a device that most of us have in our homes today: an wireless router. The attacker could exploit vulnerabilities in the router’s security setup to intercept information being sent through it, or they could set up a malicious router in a public place, such as a café or hotel.
Either way, MITM attacks pose a serious threat to your online security because they give the attacker the ability to receive and request personal information posing as a trusted party (such as a website that you regularly use).
Here are some tips to protect you from a Man-in-the-Middle attack, and improve your overall online security:
- Ensure the websites you use offer strong encryption, which scrambles your messages while in transit to prevent eavesdropping. Look for “httpS:” at the beginning of the web address instead of just “http:” which indicates that the site is using encryption.
- Change the default password on your home Wi-Fi connection so it’s harder for someone to access.
- Don’t access personal information when using public Wi-Fi networks, which may, or may not, be secure.
- Be wary of any request for your personal information, even if it’s coming from a trusted party.
- Protect all of your computers and mobile devices with comprehensive security software, like McAfee LiveSafe™ service to protect you from malware and other Internet threats.
|
<urn:uuid:a772e637-8906-42cf-9c5f-dc73394caf15>
|
CC-MAIN-2021-17
|
https://www.mcafee.com/blogs/consumer/family-safety/man-in-the-middle-attack/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038072366.31/warc/CC-MAIN-20210413122252-20210413152252-00523.warc.gz
|
en
| 0.919777 | 490 | 3.25 | 3 |
The new first step is doing chest compressions instead of first establishing the airway, then doing mouth-to-mouth. The new guidelines apply to adults, children and infants, but exclude newborns.
The old way was A-B-C, for airway, breathing, and compressions
The new way is C-A-B, for compressions, airway, and breathing
“By starting with chest compressions, that’s easy to remember, and for many victims that alone will be lifesaving,” says Michael R. Sayre, MD, chair of the emergency cardiovascular care committee for the American Heart Association and co-author of the Executive Summary of the 2010 AHA Guidelines for CPR and Emergency Cardiovascular Care.
The old approach, he says, was causing delays in chest compressions, which are crucial for keeping the blood circulating.
|
<urn:uuid:0c91c9eb-84aa-454e-8026-4268de0904bd>
|
CC-MAIN-2017-26
|
https://www.ghresources.com/resources/cpr-guidelines/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320323.17/warc/CC-MAIN-20170624184733-20170624204733-00651.warc.gz
|
en
| 0.938564 | 180 | 3 | 3 |
Toona sinensis (Juss.) M.Roen
Native Range: Eastern and south-eastern Asia. From North Korea, China, Nepal, Thailand, Malaysia through toWestern Indonesia.
Introduced into parks and gardens in the British Isles in 1862.
- The fruit, bark and leaves are used in traditional Chinese medicine, with young leaves being used as a salad crop in China.
- Extracts from the leaves of Toona sinensis have shown potential in the treatment of prostate cancer
- The timber is used for making the bodies of electric guitars and is used as a substitute for the three Swietenia spp. (True Mahogany); timber is commercially restricted for conservation reasons.
- The young shoots are cooked as a vegetable. The leaves, when crushed, produce a scent similar to that of leeks.
Toona sinensis is one of six species of trees in this genus and they can be found growing across Asia and Australia. This species is fairly hardy but slow growing; the tree in front of you is thought to be one of the largest in the United Kingdom, known as a Champion Tree. You can find more information about champion trees of Britain and Ireland at www.treeregister.org/champion-trees.shtml
Kelly, J. (1995) Hillier’s Gardeners Guide to trees and shrubs, David and Charles
Press release UNEP/181 Cites Trade Controls to take effect for Mahogany
|
<urn:uuid:3df0e0c7-1282-4549-a877-c8e849c78f11>
|
CC-MAIN-2018-51
|
http://www.glasgowbotanicgardens.com/projects/national-tree-collections-of-scotland/tree-trail-online/2-chinese-mahogany/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823303.28/warc/CC-MAIN-20181210034333-20181210055833-00112.warc.gz
|
en
| 0.926201 | 307 | 2.890625 | 3 |
Societies of highly social animals feature vast lifespan differences between closely related individuals. Among social insects, the honey bee is the best established model to study how plasticity in lifespan and aging is explained by social factors.
The worker caste of honey bees includes nurse bees, which tend the brood, and forager bees, which collect nectar and pollen. Previous work has shown that brain functions and flight performance senesce more rapidly in foragers than in nurses. However, brain functions can recover, when foragers revert back to nursing tasks. Such patterns of accelerated and reversed functional senescence are linked to changed metabolic resource levels, to alterations in protein abundance and to immune function. Vitellogenin, a yolk protein with adapted functions in hormonal control and cellular defense, may serve as a major regulatory element in a network that controls the different aging dynamics in workers.
Here we describe how the emergence of nurses and foragers can be monitored, and manipulated, including the reversal from typically short-lived foragers into longer-lived nurses. Our representative results show how individuals with similar chronological age differentiate into foragers and nurse bees under experimental conditions. We exemplify how behavioral reversal from foragers back to nurses can be validated. Last, we show how different cellular senescence can be assessed by measuring the accumulation of lipofuscin, a universal biomarker of senescence.
For studying mechanisms that may link social influences and aging plasticity, this protocol provides a standardized tool set to acquire relevant sample material, and to improve data comparability among future studies.
20 Related JoVE Articles!
Nest Building as an Indicator of Health and Welfare in Laboratory Mice
Institutions: Charles River, Tufts University, Stanford University, Stanford University.
The minimization and alleviation of suffering has moral and scientific implications. In order to mitigate this negative experience one must be able to identify when an animal is actually in distress. Pain, illness, or distress cannot be managed if unrecognized. Evaluation of pain or illness typically involves the measurement of physiologic and behavioral indicators which are either invasive or not suitable for large scale assessment. The observation of nesting behavior shows promise as the basis of a species appropriate cage-side assessment tool for recognizing distress in mice. Here we demonstrate the utility of nest building behavior in laboratory mice as an ethologically relevant indicator of welfare. The methods presented can be successfully used to identify thermal stressors, aggressive cages, sickness, and pain. Observation of nest building behavior in mouse colonies provides a refinement to health and well-being assessment on a day to day basis.
Behavior, Issue 82, Animal Structures, Surgical Procedures, Life Sciences (General), Behavioral Sciences, Mouse, Welfare assessment, Nest building
High-throughput Fluorometric Measurement of Potential Soil Extracellular Enzyme Activities
Institutions: Colorado State University, Oak Ridge National Laboratory, University of Colorado.
Microbes in soils and other environments produce extracellular enzymes to depolymerize and hydrolyze organic macromolecules so that they can be assimilated for energy and nutrients. Measuring soil microbial enzyme activity is crucial in understanding soil ecosystem functional dynamics. The general concept of the fluorescence enzyme assay is that synthetic C-, N-, or P-rich substrates bound with a fluorescent dye are added to soil samples. When intact, the labeled substrates do not fluoresce. Enzyme activity is measured as the increase in fluorescence as the fluorescent dyes are cleaved from their substrates, which allows them to fluoresce. Enzyme measurements can be expressed in units of molarity or activity. To perform this assay, soil slurries are prepared by combining soil with a pH buffer. The pH buffer (typically a 50 mM sodium acetate or 50 mM Tris buffer), is chosen for the buffer's particular acid dissociation constant (pKa) to best match the soil sample pH. The soil slurries are inoculated with a nonlimiting amount of fluorescently labeled (i.e.
C-, N-, or P-rich) substrate. Using soil slurries in the assay serves to minimize limitations on enzyme and substrate diffusion. Therefore, this assay controls for differences in substrate limitation, diffusion rates, and soil pH conditions; thus detecting potential enzyme activity rates as a function of the difference in enzyme concentrations (per sample).
Fluorescence enzyme assays are typically more sensitive than spectrophotometric (i.e.
colorimetric) assays, but can suffer from interference caused by impurities and the instability of many fluorescent compounds when exposed to light; so caution is required when handling fluorescent substrates. Likewise, this method only assesses potential enzyme activities under laboratory conditions when substrates are not limiting. Caution should be used when interpreting the data representing cross-site comparisons with differing temperatures or soil types, as in situ
soil type and temperature can influence enzyme kinetics.
Environmental Sciences, Issue 81, Ecological and Environmental Phenomena, Environment, Biochemistry, Environmental Microbiology, Soil Microbiology, Ecology, Eukaryota, Archaea, Bacteria, Soil extracellular enzyme activities (EEAs), fluorometric enzyme assays, substrate degradation, 4-methylumbelliferone (MUB), 7-amino-4-methylcoumarin (MUC), enzyme temperature kinetics, soil
Marble Burying and Nestlet Shredding as Tests of Repetitive, Compulsive-like Behaviors in Mice
Institutions: Wayne State University School of Medicine.
Obsessive-compulsive disorder (OCD) and autism spectrum disorders (ASD) are serious and debilitating psychiatric conditions and each constitutes a significant public health concern, particularly in children. Both of these conditions are highlighted by the repeated expression of meaningless behaviors. Individuals with OCD often show checking, frequent hand washing, and counting. Children with ASDs also engage in repetitive tapping, arm or hand flapping, and rocking. These behaviors can vary widely in intensity and frequency of expression. More intense forms of repetitive behaviors can even result in injury (e.g.
excessive grooming, hand washing, and self-stimulation). These behaviors are therefore very disruptive and make normal social discourse difficult. Treatment options for repetitive behaviors in OCD and ASDs are somewhat limited and there is great interest in developing more effective therapies for each condition. Numerous animal models for evaluating compulsive-like behaviors have been developed over the past three decades. Perhaps the animal models with the greatest validity and ease of use are the marble burying test and the nestlet shredding test. Both tests take advantage of the fact that the target behaviors occur spontaneously in mice. In the marble burying test, 20 marbles are arrayed on the surface of clean bedding. The number of marbles buried in a 30 min session is scored by investigators blind to the treatment or status of the subjects. In the nestlet shredding test, a nestlet comprised of pulped cotton fiber is preweighed and placed on top of cage bedding and the amount of the nestlet remaining intact after a 30 min test session is determined. Presently, we describe protocols for and show movie documentation of marble burying and nestlet shredding. Both tests are easily and accurately scored and each is sensitive to small changes in the expression of compulsive-like behaviors that result from genetic manipulations, disease, or head injury.
Behavior, Issue 82, compulsive-like behaviors, obsessive-compulsive disorder (OCD), autism spectrum disorders (ASD), marble burying, nestlet shredding, TPH2 KO mice
Automated, Quantitative Cognitive/Behavioral Screening of Mice: For Genetics, Pharmacology, Animal Cognition and Undergraduate Instruction
Institutions: Rutgers University, Koç University, New York University, Fairfield University.
We describe a high-throughput, high-volume, fully automated, live-in 24/7 behavioral testing system for assessing the effects of genetic and pharmacological manipulations on basic mechanisms of cognition and learning in mice. A standard polypropylene mouse housing tub is connected through an acrylic tube to a standard commercial mouse test box. The test box has 3 hoppers, 2 of which are connected to pellet feeders. All are internally illuminable with an LED and monitored for head entries by infrared (IR) beams. Mice live in the environment, which eliminates handling during screening. They obtain their food during two or more daily feeding periods by performing in operant (instrumental) and Pavlovian (classical) protocols, for which we have written protocol-control software and quasi-real-time data analysis and graphing software. The data analysis and graphing routines are written in a MATLAB-based language created to simplify greatly the analysis of large time-stamped behavioral and physiological event records and to preserve a full data trail from raw data through all intermediate analyses to the published graphs and statistics within a single data structure. The data-analysis code harvests the data several times a day and subjects it to statistical and graphical analyses, which are automatically stored in the "cloud" and on in-lab computers. Thus, the progress of individual mice is visualized and quantified daily. The data-analysis code talks to the protocol-control code, permitting the automated advance from protocol to protocol of individual subjects. The behavioral protocols implemented are matching, autoshaping, timed hopper-switching, risk assessment in timed hopper-switching, impulsivity measurement, and the circadian anticipation of food availability. Open-source protocol-control and data-analysis code makes the addition of new protocols simple. Eight test environments fit in a 48 in x 24 in x 78 in cabinet; two such cabinets (16 environments) may be controlled by one computer.
Behavior, Issue 84, genetics, cognitive mechanisms, behavioral screening, learning, memory, timing
A Proboscis Extension Response Protocol for Investigating Behavioral Plasticity in Insects: Application to Basic, Biomedical, and Agricultural Research
Institutions: Arizona State University.
Insects modify their responses to stimuli through experience of associating those stimuli with events important for survival (e.g.
, food, mates, threats). There are several behavioral mechanisms through which an insect learns salient associations and relates them to these events. It is important to understand this behavioral plasticity for programs aimed toward assisting insects that are beneficial for agriculture. This understanding can also be used for discovering solutions to biomedical and agricultural problems created by insects that act as disease vectors and pests. The Proboscis Extension Response (PER) conditioning protocol was developed for honey bees (Apis mellifera
) over 50 years ago to study how they perceive and learn about floral odors, which signal the nectar and pollen resources a colony needs for survival. The PER procedure provides a robust and easy-to-employ framework for studying several different ecologically relevant mechanisms of behavioral plasticity. It is easily adaptable for use with several other insect species and other behavioral reflexes. These protocols can be readily employed in conjunction with various means for monitoring neural activity in the CNS via electrophysiology or bioimaging, or for manipulating targeted neuromodulatory pathways. It is a robust assay for rapidly detecting sub-lethal effects on behavior caused by environmental stressors, toxins or pesticides.
We show how the PER protocol is straightforward to implement using two procedures. One is suitable as a laboratory exercise for students or for quick assays of the effect of an experimental treatment. The other provides more thorough control of variables, which is important for studies of behavioral conditioning. We show how several measures for the behavioral response ranging from binary yes/no to more continuous variable like latency and duration of proboscis extension can be used to test hypotheses. And, we discuss some pitfalls that researchers commonly encounter when they use the procedure for the first time.
Neuroscience, Issue 91, PER, conditioning, honey bee, olfaction, olfactory processing, learning, memory, toxin assay
Design and Operation of a Continuous 13C and 15N Labeling Chamber for Uniform or Differential, Metabolic and Structural, Plant Isotope Labeling
Institutions: Colorado State University, USDA-ARS, Colorado State University.
Tracing rare stable isotopes from plant material through the ecosystem provides the most sensitive information about ecosystem processes; from CO2
fluxes and soil organic matter formation to small-scale stable-isotope biomarker probing. Coupling multiple stable isotopes such as 13
C with 15
O or 2
H has the potential to reveal even more information about complex stoichiometric relationships during biogeochemical transformations. Isotope labeled plant material has been used in various studies of litter decomposition and soil organic matter formation1-4
. From these and other studies, however, it has become apparent that structural components of plant material behave differently than metabolic components (i.e
. leachable low molecular weight compounds) in terms of microbial utilization and long-term carbon storage5-7
. The ability to study structural and metabolic components separately provides a powerful new tool for advancing the forefront of ecosystem biogeochemical studies. Here we describe a method for producing 13
C and 15
N labeled plant material that is either uniformly labeled throughout the plant or differentially labeled in structural and metabolic plant components.
Here, we present the construction and operation of a continuous 13
C and 15
N labeling chamber that can be modified to meet various research needs. Uniformly labeled plant material is produced by continuous labeling from seedling to harvest, while differential labeling is achieved by removing the growing plants from the chamber weeks prior to harvest. Representative results from growing Andropogon gerardii
Kaw demonstrate the system's ability to efficiently label plant material at the targeted levels. Through this method we have produced plant material with a 4.4 atom%13
C and 6.7 atom%15
N uniform plant label, or material that is differentially labeled by up to 1.29 atom%13
C and 0.56 atom%15
N in its metabolic and structural components (hot water extractable and hot water residual components, respectively). Challenges lie in maintaining proper temperature, humidity, CO2
concentration, and light levels in an airtight 13
atmosphere for successful plant production. This chamber description represents a useful research tool to effectively produce uniformly or differentially multi-isotope labeled plant material for use in experiments on ecosystem biogeochemical cycling.
Environmental Sciences, Issue 83, 13C, 15N, plant, stable isotope labeling, Andropogon gerardii, metabolic compounds, structural compounds, hot water extraction
Who is Who? Non-invasive Methods to Individually Sex and Mark Altricial Chicks
Institutions: Freie Universität Berlin.
Many experiments require early determination of offspring's sex as well as early marking of newborns for individual recognition. According to animal welfare guidelines, non-invasive techniques should be preferred whenever applicable. In our group, we work on different species of song birds in the lab and in the field, and we successfully apply non-invasive methods to sex and individually mark chicks. This paper presents a comprehensive non-invasive tool-box. Sexing birds prior to the expression of secondary sexual traits requires the collection of DNA-bearing material for PCR. We established a quick and easy method to sex birds of any age (post hatching) by extracting DNA from buccal swabs. Results can be obtained within 3 hours. For individual marking chick's down feathers are trimmed in specific patterns allowing fast identification within the hatching order. This set of methods is easily applicable in a standard equipped lab and especially suitable for working in the field as no special equipment is required for sampling and storage. Handling of chicks is minimized and marking and sexing techniques are non-invasive thereby supporting the RRR-principle of animal welfare guidelines.
Developmental Biology, Issue 87, songbird, molecular sexing, PCR, individual marking, down feather, DNA extraction, sample storage, zebra finch, buccal swabs, saliva, gender
Measurement of Greenhouse Gas Flux from Agricultural Soils Using Static Chambers
Institutions: University of Wisconsin-Madison, University of Wisconsin-Madison, University of Wisconsin-Madison, University of Wisconsin-Madison, USDA-ARS Dairy Forage Research Center, USDA-ARS Pasture Systems Watershed Management Research Unit.
Measurement of greenhouse gas (GHG) fluxes between the soil and the atmosphere, in both managed and unmanaged ecosystems, is critical to understanding the biogeochemical drivers of climate change and to the development and evaluation of GHG mitigation strategies based on modulation of landscape management practices. The static chamber-based method described here is based on trapping gases emitted from the soil surface within a chamber and collecting samples from the chamber headspace at regular intervals for analysis by gas chromatography. Change in gas concentration over time is used to calculate flux. This method can be utilized to measure landscape-based flux of carbon dioxide, nitrous oxide, and methane, and to estimate differences between treatments or explore system dynamics over seasons or years. Infrastructure requirements are modest, but a comprehensive experimental design is essential. This method is easily deployed in the field, conforms to established guidelines, and produces data suitable to large-scale GHG emissions studies.
Environmental Sciences, Issue 90, greenhouse gas, trace gas, gas flux, static chamber, soil, field, agriculture, climate
Using Coculture to Detect Chemically Mediated Interspecies Interactions
Institutions: University of North Carolina at Chapel Hill .
In nature, bacteria rarely exist in isolation; they are instead surrounded by a diverse array of other microorganisms that alter the local environment by secreting metabolites. These metabolites have the potential to modulate the physiology and differentiation of their microbial neighbors and are likely important factors in the establishment and maintenance of complex microbial communities. We have developed a fluorescence-based coculture screen to identify such chemically mediated microbial interactions. The screen involves combining a fluorescent transcriptional reporter strain with environmental microbes on solid media and allowing the colonies to grow in coculture. The fluorescent transcriptional reporter is designed so that the chosen bacterial strain fluoresces when it is expressing a particular phenotype of interest (i.e.
biofilm formation, sporulation, virulence factor production, etc
.) Screening is performed under growth conditions where this phenotype is not
expressed (and therefore the reporter strain is typically nonfluorescent). When an environmental microbe secretes a metabolite that activates this phenotype, it diffuses through the agar and activates the fluorescent reporter construct. This allows the inducing-metabolite-producing microbe to be detected: they are the nonfluorescent colonies most proximal to the fluorescent colonies. Thus, this screen allows the identification of environmental microbes that produce diffusible metabolites that activate a particular physiological response in a reporter strain. This publication discusses how to: a) select appropriate coculture screening conditions, b) prepare the reporter and environmental microbes for screening, c) perform the coculture screen, d) isolate putative inducing organisms, and e) confirm their activity in a secondary screen. We developed this method to screen for soil organisms that activate biofilm matrix-production in Bacillus subtilis
; however, we also discuss considerations for applying this approach to other genetically tractable bacteria.
Microbiology, Issue 80, High-Throughput Screening Assays, Genes, Reporter, Microbial Interactions, Soil Microbiology, Coculture, microbial interactions, screen, fluorescent transcriptional reporters, Bacillus subtilis
Quantitative Phosphoproteomics in Fatty Acid Stimulated Saccharomyces cerevisiae
Institutions: Institute for Systems Biology.
This protocol describes the growth and stimulation, with the fatty acid oleate, of isotopically heavy and light S. cerevisiae cells. Cells are ground using a cryolysis procedure in a ball mill grinder and the resulting grindate brought into solution by urea solubilization. This procedure allows for the lysis of the cells in a metabolically inactive state, preserving phosphorylation and preventing reorientation of the phosphoproteome during cell lysis. Following reduction, alkylation, trypsin digestion of the proteins, the samples are desalted on C18 columns and the sample complexity reduced by fractionation using hydrophilic interaction chromatography (HILIC). HILIC columns preferentially retain hydrophilic molecules which is well suited for phosphoproteomics. Phosphorylated peptides tend to elute later in the chromatographic profile than the non phosphorylated counterparts. After fractionation, phosphopeptides are enriched using immobilized metal chromatography, which relies on charge-based affinities for phosphopeptide enrichment. At the end of this procedure the samples are ready to be quantitatively analyzed by mass spectrometry.
Cellular Biology, Issue 32, Phosphorylation, Proteomics, Cryolysis, Yeast, HILIC, IMAC, Oleate, SILAC
Synthesis, Cellular Delivery and In vivo Application of Dendrimer-based pH Sensors
Institutions: Eindhoven University of Technology & NEST, Scuola Normale Superiore and Istituto Nanoscienze-CNR, Center for Nanotechnology Innovation, NEST, Scuola Normale Superiore and Istituto Nanoscienze-CNR, Center for Nanotechnology Innovation.
The development of fluorescent indicators represented a revolution for life sciences. Genetically encoded and synthetic fluorophores with sensing abilities allowed the visualization of biologically relevant species with high spatial and temporal resolution. Synthetic dyes are of particular interest thanks to their high tunability and the wide range of measureable analytes. However, these molecules suffer several limitations related to small molecule behavior (poor solubility, difficulties in targeting, often no ratiometric imaging allowed). In this work we introduce the development of dendrimer-based sensors and present a procedure for pH measurement in vitro
, in living cells and in vivo
. We choose dendrimers as ideal platform for our sensors for their many desirable properties (monodispersity, tunable properties, multivalency) that made them a widely used scaffold for several biomedical devices. The conjugation of fluorescent pH indicators to the dendrimer scaffold led to an enhancement of their sensing performances. In particular dendrimers exhibit reduced cell leakage, improved intracellular targeting and allow ratiometric measurements. These novel sensors were successfully employed to measure pH in living HeLa cells and in vivo
in mouse brain.
Chemistry, Issue 79, Investigative Techniques, Chemistry and Materials (General), dendrimer, fluorescence, sensors, pH, delivery, confocal
Fabrication and Operation of an Oxygen Insert for Adherent Cellular Cultures
Institutions: University of Illinois.
Oxygen is a key modulator of many cellular pathways, but current devices permitting in vitro
oxygen modulation fail to meet the needs of biomedical research. The hypoxic chamber offers a simple system to control oxygenation in standard culture vessels, but lacks precise temporal and spatial control over the oxygen concentration at the cell surface, preventing its application in studying a variety of physiological phenomena. Other systems have improved upon the hypoxic chamber, but require specialized knowledge and equipment for their operation, making them intimidating for the average researcher. A microfabricated insert for multiwell plates has been developed to more effectively control the temporal and spatial oxygen concentration to better model physiological phenomena found in vivo
. The platform consists of a polydimethylsiloxane insert that nests into a standard multiwell plate and serves as a passive microfluidic gas network with a gas-permeable membrane aimed to modulate oxygen delivery to adherent cells. The device is simple to use and is connected to gas cylinders that provide the pressure to introduce the desired oxygen concentration into the platform. Fabrication involves a combination of standard SU-8 photolithography, replica molding, and defined PDMS spinning on a silicon wafer. The components of the device are bonded after surface treatment using a hand-held plasma system. Validation is accomplished with a planar fluorescent oxygen sensor. Equilibration time is on the order of minutes and a wide variety of oxygen profiles can be attained based on the device design, such as the cyclic profile achieved in this study, and even oxygen gradients to mimic those found in vivo
. The device can be sterilized for cell culture using common methods without loss of function. The device's applicability to studying the in vitro
wound healing response will be demonstrated.
Cellular Biology, Issue 35, hypoxia, cell, culture, control, wound, healing, oxygen, microfluidic device, bioengineering
DNA Stable-Isotope Probing (DNA-SIP)
Institutions: University of Waterloo.
DNA stable-isotope probing (DNA-SIP) is a powerful technique for identifying active microorganisms that assimilate particular carbon substrates and nutrients into cellular biomass. As such, this cultivation-independent technique has been an important methodology for assigning metabolic function to the diverse communities inhabiting a wide range of terrestrial and aquatic environments. Following the incubation of an environmental sample with stable-isotope labelled compounds, extracted nucleic acid is subjected to density gradient ultracentrifugation and subsequent gradient fractionation to separate nucleic acids of differing densities. Purification of DNA from cesium chloride retrieves labelled and unlabelled DNA for subsequent molecular characterization (e.g. fingerprinting, microarrays, clone libraries, metagenomics). This JoVE video protocol provides visual step-by-step explanations of the protocol for density gradient ultracentrifugation, gradient fractionation and recovery of labelled DNA. The protocol also includes sample SIP data and highlights important tips and cautions that must be considered to ensure a successful DNA-SIP analysis.
Microbiology, Issue 42, DNA stable-isotope probing, microbiology, microbial ecology, cultivation-independent, metagenomics, 16S rRNA gene community analysis, substrates, microbial ecology, enrichment
Physical, Chemical and Biological Characterization of Six Biochars Produced for the Remediation of Contaminated Sites
Institutions: Royal Military College of Canada, Queen's University.
The physical and chemical properties of biochar vary based on feedstock sources and production conditions, making it possible to engineer biochars with specific functions (e.g.
carbon sequestration, soil quality improvements, or contaminant sorption). In 2013, the International Biochar Initiative (IBI) made publically available their Standardized Product Definition and Product Testing Guidelines (Version 1.1) which set standards for physical and chemical characteristics for biochar. Six biochars made from three different feedstocks and at two temperatures were analyzed for characteristics related to their use as a soil amendment. The protocol describes analyses of the feedstocks and biochars and includes: cation exchange capacity (CEC), specific surface area (SSA), organic carbon (OC) and moisture percentage, pH, particle size distribution, and proximate and ultimate analysis. Also described in the protocol are the analyses of the feedstocks and biochars for contaminants including polycyclic aromatic hydrocarbons (PAHs), polychlorinated biphenyls (PCBs), metals and mercury as well as nutrients (phosphorous, nitrite and nitrate and ammonium as nitrogen). The protocol also includes the biological testing procedures, earthworm avoidance and germination assays. Based on the quality assurance / quality control (QA/QC) results of blanks, duplicates, standards and reference materials, all methods were determined adequate for use with biochar and feedstock materials. All biochars and feedstocks were well within the criterion set by the IBI and there were little differences among biochars, except in the case of the biochar produced from construction waste materials. This biochar (referred to as Old biochar) was determined to have elevated levels of arsenic, chromium, copper, and lead, and failed the earthworm avoidance and germination assays. Based on these results, Old biochar would not be appropriate for use as a soil amendment for carbon sequestration, substrate quality improvements or remediation.
Environmental Sciences, Issue 93, biochar, characterization, carbon sequestration, remediation, International Biochar Initiative (IBI), soil amendment
Aseptic Laboratory Techniques: Plating Methods
Institutions: University of California, Los Angeles .
Microorganisms are present on all inanimate surfaces creating ubiquitous sources of possible contamination in the laboratory. Experimental success relies on the ability of a scientist to sterilize work surfaces and equipment as well as prevent contact of sterile instruments and solutions with non-sterile surfaces. Here we present the steps for several plating methods routinely used in the laboratory to isolate, propagate, or enumerate microorganisms such as bacteria and phage. All five methods incorporate aseptic technique, or procedures that maintain the sterility of experimental materials. Procedures described include (1) streak-plating bacterial cultures to isolate single colonies, (2) pour-plating and (3) spread-plating to enumerate viable bacterial colonies, (4) soft agar overlays to isolate phage and enumerate plaques, and (5) replica-plating to transfer cells from one plate to another in an identical spatial pattern. These procedures can be performed at the laboratory bench, provided they involve non-pathogenic strains of microorganisms (Biosafety Level 1, BSL-1). If working with BSL-2 organisms, then these manipulations must take place in a biosafety cabinet. Consult the most current edition of the Biosafety in Microbiological and Biomedical Laboratories
(BMBL) as well as Material Safety Data Sheets
(MSDS) for Infectious Substances to determine the biohazard classification as well as the safety precautions and containment facilities required for the microorganism in question. Bacterial strains and phage stocks can be obtained from research investigators, companies, and collections maintained by particular organizations such as the American Type Culture Collection
(ATCC). It is recommended that non-pathogenic strains be used when learning the various plating methods. By following the procedures described in this protocol, students should be able to:
● Perform plating procedures without contaminating media.
● Isolate single bacterial colonies by the streak-plating method.
● Use pour-plating and spread-plating methods to determine the concentration of bacteria.
● Perform soft agar overlays when working with phage.
● Transfer bacterial cells from one plate to another using the replica-plating procedure.
● Given an experimental task, select the appropriate plating method.
Basic Protocols, Issue 63, Streak plates, pour plates, soft agar overlays, spread plates, replica plates, bacteria, colonies, phage, plaques, dilutions
Linking Predation Risk, Herbivore Physiological Stress and Microbial Decomposition of Plant Litter
Institutions: Yale University, Virginia Tech, The Hebrew University of Jerusalem.
The quantity and quality of detritus entering the soil determines the rate of decomposition by microbial communities as well as recycle rates of nitrogen (N) and carbon (C) sequestration1,2
. Plant litter comprises the majority of detritus3
, and so it is assumed that decomposition is only marginally influenced by biomass inputs from animals such as herbivores and carnivores4,5
. However, carnivores may influence microbial decomposition of plant litter via a chain of interactions in which predation risk alters the physiology of their herbivore prey that in turn alters soil microbial functioning when the herbivore carcasses are decomposed6
. A physiological stress response by herbivores to the risk of predation can change the C:N elemental composition of herbivore biomass7,8,9
because stress from predation risk increases herbivore basal energy demands that in nutrient-limited systems forces herbivores to shift their consumption from N-rich resources to support growth and reproduction to C-rich carbohydrate resources to support heightened metabolism6
. Herbivores have limited ability to store excess nutrients, so stressed herbivores excrete N as they increase carbohydrate-C consumption7
. Ultimately, prey stressed by predation risk increase their body C:N ratio7,10
, making them poorer quality resources for the soil microbial pool likely due to lower availability of labile N for microbial enzyme production6
. Thus, decomposition of carcasses of stressed herbivores has a priming effect on the functioning of microbial communities that decreases subsequent ability to of microbes to decompose plant litter6,10,11
We present the methodology to evaluate linkages between predation risk and litter decomposition by soil microbes. We describe how to: induce stress in herbivores from predation risk; measure those stress responses, and measure the consequences on microbial decomposition. We use insights from a model grassland ecosystem comprising the hunting spider predator (Pisuarina mira
), a dominant grasshopper herbivore (Melanoplus femurrubrum
),and a variety of grass and forb plants9
Environmental Sciences, Issue 73, Microbiology, Plant Biology, Entomology, Organisms, Investigative Techniques, Biological Phenomena, Chemical Phenomena, Metabolic Phenomena, Microbiological Phenomena, Earth Resources and Remote Sensing, Life Sciences (General), Litter Decomposition, Ecological Stoichiometry, Physiological Stress and Ecosystem Function, Predation Risk, Soil Respiration, Carbon Sequestration, Soil Science, respiration, spider, grasshoper, model system
Cryosectioning Yeast Communities for Examining Fluorescence Patterns
Institutions: Fred Hutchinson Cancer Research Center.
Microbes typically live in communities. The spatial organization of cells within a community is believed to impact the survival and function of the community1
. Optical sectioning techniques, including confocal and two-photon microscopy, have proven useful for observing spatial organization of bacterial and archaeal communities2,3
. A combination of confocal imaging and physical sectioning of yeast colonies has revealed internal organization of cells4
. However, direct optical sectioning using confocal or two-photon microscopy has been only able to reach a few cell layers deep into yeast colonies. This limitation is likely because of strong scattering of light from yeast cells4
Here, we present a method based on fixing and cryosectioning to obtain spatial distribution of fluorescent cells within Saccharomyces cerevisiae
communities. We use methanol as the fixative agent to preserve the spatial distribution of cells. Fixed communities are infiltrated with OCT compound, frozen, and cryosectioned in a cryostat. Fluorescence imaging of the sections reveals the internal organization of fluorescent cells within the community.
Examples of yeast communities consisting of strains expressing red and green fluorescent proteins demonstrate the potentials of the cryosectioning method to reveal the spatial distribution of fluorescent cells as well as that of gene expression within yeast colonies2,3
. Even though our focus has been on Saccharomyces cerevisiae
communities, the same method can potentially be applied to examine other microbial communities.
Microbiology, Issue 70, Molecular Biology, Cellular Biology, Basic Protocols, Yeasts, Saccharomyces cerevisiae, Clinical Laboratory Techniques, Cytological Techniques, Environmental Microbiology, Investigative Techniques, Life Sciences, cryosectioning, sectioning, cryotome, fixing, microbial community, yeast colonies, Saccharomyces cerevisiae, community interactions
Isolation of Native Soil Microorganisms with Potential for Breaking Down Biodegradable Plastic Mulch Films Used in Agriculture
Institutions: Western Washington University, Washington State University Northwestern Research and Extension Center, Texas Tech University.
Fungi native to agricultural soils that colonized commercially available biodegradable mulch (BDM) films were isolated and assessed for potential to degrade plastics. Typically, when formulations of plastics are known and a source of the feedstock is available, powdered plastic can be suspended in agar-based media and degradation determined by visualization of clearing zones. However, this approach poorly mimics in situ
degradation of BDMs. First, BDMs are not dispersed as small particles throughout the soil matrix. Secondly, BDMs are not sold commercially as pure polymers, but rather as films containing additives (e.g.
fillers, plasticizers and dyes) that may affect microbial growth. The procedures described herein were used for isolates acquired from soil-buried mulch films. Fungal isolates acquired from excavated BDMs were tested individually for growth on pieces of new, disinfested BDMs laid atop defined medium containing no carbon source except agar. Isolates that grew on BDMs were further tested in liquid medium where BDMs were the sole added carbon source. After approximately ten weeks, fungal colonization and BDM degradation were assessed by scanning electron microscopy. Isolates were identified via analysis of ribosomal RNA gene sequences. This report describes methods for fungal isolation, but bacteria also were isolated using these methods by substituting media appropriate for bacteria. Our methodology should prove useful for studies investigating breakdown of intact plastic films or products for which plastic feedstocks are either unknown or not available. However our approach does not provide a quantitative method for comparing rates of BDM degradation.
Microbiology, Issue 75, Plant Biology, Environmental Sciences, Agricultural Sciences, Soil Science, Molecular Biology, Cellular Biology, Genetics, Mycology, Fungi, Bacteria, Microorganisms, Biodegradable plastic, biodegradable mulch, compostable plastic, compostable mulch, plastic degradation, composting, breakdown, soil, 18S ribosomal DNA, isolation, culture
Expired CO2 Measurement in Intubated or Spontaneously Breathing Patients from the Emergency Department
Institutions: Universit Catholique de Louvain Cliniques Universitaires Saint-Luc.
Carbon dioxide (CO2
) along with oxygen (O2
) share the role of being the most important gases in the human body. The measuring of expired CO2
at the mouth has solicited growing clinical interest among physicians in the emergency department for various indications: (1) surveillance et monitoring of the intubated patient; (2) verification of the correct positioning of an endotracheal tube; (3) monitoring of a patient in cardiac arrest; (4) achieving normocapnia in intubated head trauma patients; (5) monitoring ventilation during procedural sedation. The video allows physicians to familiarize themselves with the use of capnography and the text offers a review of the theory and principals involved. In particular, the importance of CO2
for the organism, the relevance of measuring expired CO2
, the differences between arterial and expired CO2
, the material used in capnography with their artifacts and traps, will be reviewed. Since the main reluctance in the use of expired CO2
measurement is due to lack of correct knowledge concerning the physiopathology of CO2
by the physician, we hope that this explanation and the video sequences accompanying will help resolve this limitation.
Medicine, Issue 47, capnography, CO2, emergency medicine, end-tidal CO2
Assessing Burrowing, Nest Construction, and Hoarding in Mice
Institutions: University of Oxford .
Deterioration in the ability to perform "Activities of daily living" (ADL) is an early sign of Alzheimer's disease (AD). Preclinical behavioural screening of possible treatments for AD currently largely focuses on cognitive testing, which frequently demands expensive equipment and lots of experimenter time. However, human episodic memory (the most severely affected aspect of memory in AD) is different to rodent memory, which seems to be largely non-episodic. Therefore the present ways of screening for new AD treatments for AD in rodents are intrinsically unlikely to succeed. A new approach to preclinical screening would be to characterise the ADL of mice. Fortuitously, several such assays have recently been developed at Oxford, and here the three most sensitive and well-characterised are presented.
Burrowing was first developed in Oxford13
. It evolved from a need to develop a mouse hoarding paradigm. Most published rodent hoarding paradigms required a distant food source to be linked to the home cage by a connecting passage. This would involve modifying the home cage as well as making a mouse-proof connecting passage and food source. So it was considered whether it would be possible to put the food source inside the cage. It was found that if a container was placed on the floor it was emptied by the next morning., The food pellets were, however, simply deposited in a heap at the container entrance, rather than placed in a discrete place away from the container, as might be expected if the mice were truly hoarding them. Close inspection showed that the mice were performing digging ("burrowing") movements, not carrying the pellets in their mouths to a selected place as they would if truly hoarding them.6
Food pellets are not an essential substrate for burrowing; mice will empty tubes filled with sand, gravel, even soiled bedding from their own cage. Moreover, they will empty a full tube even if an empty one is placed next to it8
Several nesting protocols exist in the literature. The present Oxford one simplifies the procedure and has a well-defined scoring system for nest quality5
A hoarding paradigm was later developed in which the mice, rather than hoarding back to the real home cage, were adapted to living in the "home base" of a hoarding apparatus. This home base was connected to a tube made of wire mesh, the distal end of which contained the food source. This arrangement proved to yield good hoarding behaviour, as long as the mice were adapted to living in the "home base" during the day and only allowed to enter the hoarding tube at night.
Neuroscience, Issue 59, Mice, murine, burrowing, nesting, hoarding, hippocampus, Alzheimer’s, prion, species-typical, welfare, 3Rs
|
<urn:uuid:b42d4581-58e8-467b-912a-b95a96966d05>
|
CC-MAIN-2016-44
|
http://www.jove.com/visualize/abstract/23555829/florida-harvester-ant-nest-architecture-nest-relocation-soil-carbon
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476990033880.51/warc/CC-MAIN-20161020190033-00345-ip-10-142-188-19.ec2.internal.warc.gz
|
en
| 0.907448 | 8,790 | 2.96875 | 3 |
Spathiphyllum Plant (Peace Lily)
Basket With Liner
* Prices shown in US Dollars, do not include delivery charge and may vary during holidays. The color or variety of some flowers, plants and containers may be substituted due to regional or seasonal availability.
More All House Plants Choices:
▼▲View Care Information
Peace Lily Plant Care
The peace lily (Spathiphyllum) is one of the most commonly known houseplants. Peace lilies are shiny green leafed plants that bloom normally spring through summer. In warmer climates some species of Spathiphyllum are suitable for humid shade borders.
Peace Lily Care: Light Requirements
Peace lilies (Spathiphyllum) prefers bright filtered natural light. However, the peace lily is tolerant of low light levels making it an excellent houseplant. It can be used outdoors in warm humid areas with filtered light or partial shade. Exposure to direct light may cause yellowing leaves with a burnt appearance.
Peace Lily Care: Water Requirements
Peace Lilies (Spathiphyllum) prefers an evenly moist environment. For plants grown in soil, drainage is important; your peace lily pot should have drain holes. Watering your peace lily once a week is usually sufficient. However, when the plant is grown in low light levels or cooler temperatures water requirements may be less. Water requirements may increase with brighter light levels or warmer temperatures and during periods of rapid growth; use tepid water when watering or misting.
Testing the soil before watering by sticking finger in soil up to first knuckle can help you determine the need for water - if soil is moist don't water. Placing the peace lily in high humidity or creating a humid environment is beneficial to the plant. Peace Lilies are good candidates for hydroponics. Peace lilies are susceptible to chlorine damage; let chlorine evaporate from tap water before using or use distilled water. Over-watering may cause leaves to turn yellow and under-watering may cause plants to wilt and the leaf edges to turn yellow or brown.
Peace Lily Care: Fertilizer Requirements
Peace Lilies (Spathiphyllum) do best if fertilized on a regular basis. Applying a well-balanced (20-20-20) liquid soluble fertilizer monthly works well for peace lilies. A diluted version of the monthly fertilizer used weekly is also acceptable. Leaves with brown spots may be the result of over-fertilization (concentration could be too high).
Peace Lily Care: Pests and Diseases
Peace Lilies (Spathiphyllum) are susceptible to a few insects such as aphids, spider mites, and mealy bugs. However, insect problems are very minimal with peace lilies. Insect problems can be taken care of with insecticides, insecticidal soap or by washing the plant. Root rot, leaf spot and bacterial soft rot do occur in peace lilies, but are usually the result of improper care. Diseases can be taken care with fungicides or proper care methods including good drainage and re-potting.
Peace Lily Care: Propagation and Potting
Peace lilies (Spathiphyllum) should be re-potted when the root growth has overfilled the container. Use a humus rich potting soil to repot the peace lily. To help the roots to retain soil and prevent the root tearing, re-pot the plant when the soil is somewhat moist. For determining pot size follow this rule of thumb; use a pot that is 1 ½ times the size of the previous pot. When placing the peace lily in it’s new pot, keep the plant level the same as it was in the old pot (fill the pot so that the top of the root-ball is at the same level as before). After re-potting, water slightly to remove any air bubbles that might have occurred and wait a couple of weeks before fertilizing.
You can create new peace lily plants by dividing them. Propagate by removing the peace lily from it’s container; then take a sharp knife and cut the plant from the roots to the top of the plant – this will ensure that each plants has an ample amount of roots. Take the divide pieces and follow the re-potting instructions – container will need to be same size as original container.
Peace Lily Care: Pruning
Peace Lilies (Spathiphyllum) require very little pruning. Unattractive leaves can be removed on an as needed basis; follow the leaf stem to the base of the plant and cut off. Once a peace lily bloom is spent remove the same way you would a leaf. Removing the bloom helps to encourage more blooms.
Interesting Peace Lily Facts
Peace lilies (Spathiphyllum) help improve air quality. A peace lily removes formaldehyde, benzine and carbon monoxide from the air.
Ingestion of any part of the peace lily may cause mild stomach upset and contact with the sap can cause skin irritation.
|
<urn:uuid:5f975098-d332-459c-adf6-7ef2823de076>
|
CC-MAIN-2019-13
|
https://www.flowershopnetwork.com/flower-pictures/pl03303/peace-lily-plant-spathiphyllum-clevelandii-/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202640.37/warc/CC-MAIN-20190322074800-20190322100800-00419.warc.gz
|
en
| 0.899656 | 1,072 | 3.015625 | 3 |
Biogas is a mixture comprising mainly of methane and carbon dioxide. It is produced when organic matter decomposes in the absence of oxygen (anaerobic digestion).
1- Reduces the greenhouse gases
2- Provides a source of energy with no net increase in atmospheric carbon which contribute to climate change.
Digester has significant capital and operational cost
|
<urn:uuid:2a11f1d7-c0fc-401e-a6bb-74e2d34dab6d>
|
CC-MAIN-2014-41
|
http://www.najah.edu/page/3216
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657138770.35/warc/CC-MAIN-20140914011218-00132-ip-10-234-18-248.ec2.internal.warc.gz
|
en
| 0.898453 | 71 | 3.578125 | 4 |
The chemical Styrene has recently been delegated as a carcinogen, which in turn could lead to more workers’ compensation cases for those who have been exposed to this substance. Styrene has recently been ruled as an ingredient in certain industrial processes to cause elevated risks of cancer and other diseases. This finding, which has been upheld by a judge, could bring the possibility of Styrene-related workers’ compensation cases.
Illinois employees may use this harmful substance in the making of certain plastics, rubber and resins. The Occupational Safety & Health Administration *(OSHA) estimates that just under 100,000 workers may be exposed to Styrene every year. Now that this chemical has been found to be so dangerous to workers, those who have become sick after being exposed to it may have grounds for financial compensation.
Plastics that contain this component are not harmful to users; since the substance is dangerous only during the fabrication process. Illinois workers that are employed in facilities that have no Styrene leak protection or proper venting could be in danger of becoming ill from exposure. Employees may have contracted cancer from this carcinogen and not realize that their sickness was directly caused by their work environment.
Now that Styrene is being recognized as a cancer-causing substance, workers may consider workers’ compensation suits if they have become ill while working in the plastics industry. While financial compensation may not cure an illness, it can lift the burden of medical expenses and could alleviate some of the residual pain and suffering. Styrene is now legally recognized as a potential serious danger and may have already made many workers sick.
Source: Bloomberg BNA, “Styrene Can Be Listed as Carcinogen On Government Report, Federal Judge Rules,” Robert Iafolla, May 20, 2013
|
<urn:uuid:73423dc1-f3f0-4d0e-8525-2e7a7c957fa4>
|
CC-MAIN-2023-23
|
https://www.illinoisworkerscomplawyer.com/blog/2013/06/chemical-styrene-may-lead-to-more-workers-compensation/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655143.72/warc/CC-MAIN-20230608204017-20230608234017-00243.warc.gz
|
en
| 0.976928 | 362 | 2.625 | 3 |
Four Shapers of Baltimore City: Disease, B&O Railroad, the Confederacy, & Race, Told Through the Graves In Greenmount Cemetery
Baltimore has long been one of the major metropolitan ports and trading centers of the U.S. It has also been a distinctively “Southern” city, which was part of the “North” before, during, and after the Civil War – contributing to its distinctive character. This presentation will take a close-up look at this unique history of the City of Baltimore, and use it as a catalyst for insight and understanding the complexities of today.
Wednesday, September 25 at 10:00am to 11:30am
Buchner Hall of the Alumnae/i House
1021 Dulaney Valley Rd, Towson, MD 21204, USA
No recent activity
|
<urn:uuid:2c8e580d-8d1c-4a0e-8f67-4b48d997dd58>
|
CC-MAIN-2019-39
|
https://events.goucher.edu/event/four_shapers_of_baltimore_city_disease_bo_railroad_the_confederacy_race_told_through_the_graves_in_greenmount_cemetery
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573476.67/warc/CC-MAIN-20190919101533-20190919123533-00032.warc.gz
|
en
| 0.950605 | 172 | 2.578125 | 3 |
I shall never forget the very first time I saw a Christmas Tree decorated from floor to ceiling in light – quite literally. Tiny little candles painstakingly attached to every single branch of a huge pine tree that filled its space, the room and the people round it with sheer delight! If I close my eyes now, I can still see that beautiful tree…
For all sorts of reasons, this has been a year when my mind has returned time and time again to pondering the whole fascinating theme of LIGHT – in all its many applications and ramifications. Perhaps it has something to do with a world spinning further and further off course, returning – in so many shapes and forms – into that state of chaos, it increasingly seems, that eons ago, prompted the Creator to declare, “Let there be Light!”
Auspiciously….. and very much in keeping with Light reflections…..this year (and next it seems), it just happens that the Jewish “Festival of Lights” known as Hanukkah, actually begins at sunset on December 24th. Tonight then, while Christians the world over are celebrating Christmas Eve, Jewish people everywhere will be lighting the first Hanukkah candle. As one esteemed Rabbi comments, “This year’s coinciding holidays serve as a reminder of the bond between Christians and Jews and our shared biblical tradition.” It is a point further emphasised in Israel Prime Minister Netanyahu’s Christmas greeting to Christians worldwide.
This “coinciding” of Christmas and Hanukkah is significant for other reasons too – reasons that have much to do with the true time frame of the momentous event Christians celebrate at this time of year.
From the clues gleaned from careful study and piecing together information in the gospel accounts and other key scriptures, it is possible to work out, almost to the day, the exact date on which Jesus Christ was born. And contrary to western tradition, it is now quite certain that Jesus was not in fact born in December but during the Jewish Feast of Tabernacles that takes place either in September or October (on the western calendar.)
If the 25th of December does not, however, represent the precise day and date when Christ was born, it is entirely possible that it might be the time of year – if not the day itself – when, as the gospel account of the apostle John describes it, “the Word was made flesh”….. when Christ in fact was conceived, miraculously, in the womb of a young virgin….. timed by Heaven, to take place during the December, Jewish celebration of Lights.
The plot thickens!! For the first day of the Festival of Lights is always – on the Jewish calendar – on the 25th of the month, a number known to the Hebrew scholar, to represent the word “Light.” How extraordinary, then, that the very date Christians all over the world have celebrated Christ’s Birth for centuries, should also happen to fall on the 25th!
Of course the kill-joys and the sceptics will persist in their old argument that we cannot possibly know the actual day that Christ was born (let alone conceived!)…. while others will reject the celebration of Christmas on the grounds of its pagan origins and traditions.
Both – to my way of thinking – overlook the unfathomable depths and immensity of God’s Love for His Creation and the fact that, quite simply, nothing is impossible with Him. Can He not easily overlay the imperfections and limited intelligence and knowledge of man with His own limitless and perfect wisdom? And be propelled by Compassion to do so, knowing all too well our feeble “frame?” And ultimately, is it not less our choice than HIS that we should celebrate the coming of LIGHT into a darkened world and creation on a date chosen by divine ordinance to signify LIGHT?
Light is indeed a wonderful image for the Saviour of mankind, especially prominent in John’s Gospel account, abounding as it does, with references equating Him with this essential life-giving force. Not simply life-giving either, but life-illuminating as its meaning in the Hebrew language infers. It is a theme beautifully explored in Holman Hunt’s (1827-1910) breathtaking masterpiece, entitled “The Light of the World.” The painting, donated to St. Paul’s in 1908, now stands above the altar in a tiny chapel within the cathedral, inviting any passer-by to spend some quiet time in contemplation. It reminds me of all I cherish and celebrate in the Christmas season…. wrapped up in that simple announcement of the prophet Isaiah, “Unto us a child is born……”
And so… as I ponder these mysteries again this Christmas season – and light a candle in honour of Hanukkah – I think of that very first heartbeat of the SON of LIGHT…. as He begins His earthly existence in Mary’s womb…. a little pinpoint of Light and Life, destined from before the beginning of time to rescue and redeem a lost and fallen world…..as only HE would be able to do.
And my prayer is ever, “LORD, Let there be Light”…….. the LIGHT that manifested itself in the most extraordinary way over 2000 years ago in a single tiny pulse of the purest, miracle-working supernatural Light… the Light that heals, transforms….brings Hope, gives Life…..the Light that comforts shattered lives and broken hearts and of which it takes only the tiniest glimmer, to compromise the deepest darkness. This is the Glad Tidings of Great Joy that fills my heart and soul with LIGHT at Christmas.
- Hanukkah is the Jewish Festival of Lights and it remembers the rededication of the second Jewish Temple in Jerusalem. This happened in the 160s BCE/BC. (Hanukkah is the Jewish word for “dedication.”)
- A good account of how scholars have used the Scriptures to work out when Christ was born can be found here:
|
<urn:uuid:eb28d514-0932-4bc5-a006-405608fa7aa4>
|
CC-MAIN-2018-05
|
https://telgroup.wordpress.com/2016/12/24/the-reason-for-the-season/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890314.60/warc/CC-MAIN-20180121060717-20180121080717-00621.warc.gz
|
en
| 0.951003 | 1,255 | 2.53125 | 3 |
Zoozoo Mundo Animal Set 1 Guided Reading Set
The Zoozoo Mundo Animal Set 1 Guided Reading Set contains 6 copies of each of the first 20 Spanish leveled readers in the Zoozoo Mundo Animal series, for a total of 120 books. All titles are nonfiction and contain teacher talking points in the back. Guided reading level range: A–D.
This series is also available in English. Click here to view the English version of this series.
- Guided Reading Levels: A–D
- Intervention Levels: 1–4
- View Teacher's Guide
|
<urn:uuid:45dd8241-d060-49d4-8695-a71cf0d342db>
|
CC-MAIN-2021-43
|
https://www.hameraypublishing.com/products/zoozoo-mundo-animal-set-1-guided-reading-set
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585045.2/warc/CC-MAIN-20211016231019-20211017021019-00047.warc.gz
|
en
| 0.875974 | 124 | 2.578125 | 3 |
Although written by Patrick Wood in 2005, nothing has changed to the historical fact of the Bank for International Settlements. It has nefarious roots and is the tap-root of modern globalization.
Today, the BIS is getting headlines again because of its direction of central banks to go cashless. It is readily apparent that it has not lost its power and influence over the decades. For anyone wanting to understand how the world really works, this is a must-read paper
Created at Bretton Woods in 1944, the World Bank has been dominated by international bankers, members of the Council on Foreign Relations and later by the Trilateral Commission. Corruption and self-interest run amok as public funds are converted into private hands by the billions.
According to The World Bank, it is,
“a vital source of financial and technical assistance to developing countries around the world. We are not a bank in the common sense. We are made up of two unique development institutions owned by 184 member countries—the International Bank for Reconstruction and Development (IBRD) and the International Development Association (IDA). Each institution plays a different but supportive role in our mission of global poverty reduction and the improvement of living standards. The IBRD focuses on middle income and creditworthy poor countries, while IDA focuses on the poorest countries in the world. Together we provide low-interest loans, interest-free credit and grants to developing countries for education, health, infrastructure, communications and many other purposes.” 1
High-minded words like “our mission of global poverty reduction and the improvement of living standards” would lead the reader to believe that the World Bank is some benevolent and global welfare organization. Why is it then, that The World Bank joins the International Monetary Fund and the World Trade Organization as organizations that people around the world just love to hate?
In reality, the World Bank carries its weight, along with the International Monetary Fund and the Bank for International Settlements, to forcibly integrate minor countries of the world into its own brand of capitalistic democracy.
|
<urn:uuid:34291613-9f0c-4ee4-8787-93bfe0277881>
|
CC-MAIN-2022-40
|
https://davidicke.com/2020/07/22/the-dark-past-of-the-bank-for-international-settlements/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335448.34/warc/CC-MAIN-20220930082656-20220930112656-00221.warc.gz
|
en
| 0.950212 | 416 | 2.78125 | 3 |
Granular Cell Tumors
Granular cell tumors are slow-growing skin tumors that originate in Schwann cells, which are a variety of the glial cells that keep peripheral nerve fibers alive. Rare and almost always benign, they consist of small, usually painless, nodules. They often occur in the tongue but can be found almost anywhere in the body. Exactly what causes them is unknown.
Granular cell tumors affect those with an average age of 50, and occur most frequently in women and African Americans. In approximately 45 percent to 65 percent of cases, granular cell tumors are located in the head and neck areas and, of those, seventy percent are found in the tongue, oral mucosa and hard palate.
Appearance Of Granular Cell Tumors
Usually slow-growing, granular cell tumors are rarely bigger than three centimeters in diameter and are generally asymptomatic. They often appear as firm, pale-white or pale-yellow, non-encapsulated, poorly to well-defined nodules that have a thickened overlying skin or mucosa. Distinguishing between benign and malignant granular cell tumors is often difficult because they have a similar tissue structure.
Treatment Of Granular Cell Tumors
Surgery is usually used to treat granular cell tumors and, in the case of benign tumors, recurrence is extremely rare. Malignant granular cell tumors are usually larger than benign ones, and may be life-threatening, making early intervention essential. Only 2 percent of granular cell tumors are diagnosed as malignant.
|
<urn:uuid:b15417de-a9e8-4232-942f-505fc44ed20d>
|
CC-MAIN-2019-04
|
https://www.cosmeticandsurgicalarts.com/skin-cancer/granular-cell-tumors/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583730728.68/warc/CC-MAIN-20190120184253-20190120210253-00575.warc.gz
|
en
| 0.951256 | 323 | 3.25 | 3 |
Below you’ll find an excerpt from Tony Horton’s new book: Bring It!
Wanna WIN A FREE COPY? All you have to do is LIKE MY FACEBOOK PAGE before January 1, 2011 and you’ll be entered in the drawing!
My Top 10 Toxic Foods
1. Soda, diet and regular
2. Sports drinks
3. Artificial sweeteners of any kind
4. White flour
5. White sugar
6. White potatoes and rice
8. Fried foods
10. Dairy, especially ice cream and cheese (both high in heart-clogging trans fatty acids)
Tips on Transitioning Away from Sugar
1. Sugar is hiding everywhere, but if you stick to the foods suggested in this plan, you should have no problem avoiding it.
2. Avoid high-fructose corn syrup (HFCS), a sweetener dumped into many foods. Two articles published in a 2004 issue of the American Journal of Clinical Nutrition suggest that HFCS and products containing it may contribute to America’s epidemic of obesity and type 2 diabetes. When scientists investigated our food consumption patterns over the past 35 years, they discovered that between 1970 and 1990, consumption of HFCS rose by 1,000 percent—a trend that parallels the rise in obesity. Another alarming piece of recent research has revealed that pancreatic tumor cells use fructose to divide and proliferate. That’s the latest word from a team of researchers at UCLA, who published their study in the journal Cancer Research.
The researchers grew pancreatic cancer cells in lab dishes and fed them both glucose and fructose, and the cells used the fructose to proliferate. Although it’s found naturally in fruits, fructose is also a component of HFCS. (See the chart on page 220 to understand the difference among these sweeteners.) All of this makes the practice of reading food labels very important. Always check labels for added fructose as well as HFCS, which lurks in many processed foods—including ketchup and other condiments, sauces, salad dressing, jams, peanut butter, meat products, and commercially produced desserts.
3. Beware of juices. Fruit juices—even unsweetened juices—contain fructose and should be consumed in moderation, if at all.
4. Ban sodas (including diet sodas) from your home. Consider switching to an alternative, such as sparkling water, herbal tea, or green tea. (Stick to home-brewed teas, since most commercially bottled tea is brimming with HFCS.)
5. If you have a sweet tooth, grab fresh fruit whenever you feel the urge for something sweet. Or eat naturally sweet vegetables, such as sweet potatoes or squash, to help curb sugar cravings.
6. Plan ahead when you dine out. When the waiter comes to take your dessert order, condition yourself to say, “I’ll just have some herbal tea.”
7. Stop eating “dead” foods: junk, fried, and fast foods, as well as processed carbs. They’re loaded with sugar and other additives. The more live foods we eat (fruits and vegetables), the more alive we feel. The more dead foods we eat…well, you get the idea.
CLICK HERE for ordering information.
|
<urn:uuid:c45abf43-ed8b-4e51-bf5a-13a812531982>
|
CC-MAIN-2018-05
|
http://www.amandakjones.com/tony-hortons-new-book-bring-it-excerpt-33.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887253.36/warc/CC-MAIN-20180118111417-20180118131417-00509.warc.gz
|
en
| 0.919371 | 685 | 2.625 | 3 |
Because Bengal cats are social animals who often don't do well as the only pet in a household, people often want to adopt two kittens at one time. It seems everyone has an opinion on what genders make the best pair - including us. We have always recommended two males or a male and a female, but not two females. But this opinion was based on anecdotal evidence - our experience - not research.
Upon looking into it a bit, it turns out that the College of Veterinary Medicine at the University of Georgia did a study on sixty pairs of spayed and neutered household pets and published the results of this study in an article titled "Gender differences in the social behavior of the neutered indoor-only domestic cat" in the July 1999 Journal of Applied Animal Behaviour Science. Before this study, all of the information gathered about the interactions of domestic cats had been done on feral cat colonies with entire cats. In cat colonies, females form groups and males roam solitarily from group to group. Males regulate their interaction with other males by avoiding them, and it was assumed that desexed cats would follow suit, but that didn't end up being the case.
The study analyzed 60 pairs of desexed cats: 20 male/male pairs, 20 male/female pairs, and 20 female/female pairs. The results were measured in three different categories: affiliative behaviors, proximity, and aggression. Affiliative behavior is cat body language that encourages harmony in the relationship. This can be approaching one another amicably, grooming one another, rubbing their head on one another, sniffing socially or blinking slowly - basically, a cat's way of saying, "I love you." Proximity is how much time the cats spend within the sight on the other cat. Aggression measured how often the cats had an aggressive encounter.
The three different groups of cats had no measurable differences in the affiliative behaviors or aggression. So, no matter the genders of the pairs, they were equally kind and equally disgruntled with one another. The one place there was a sizeable difference is proximity. Male/male pairs spend significantly more time within sight of one another than male/female pairs and female/female pairs. While we do not quite understand what causes this difference, it may relate to the fact that males do not spend much time in the proximity of another male in feral cat colonies. Therefore, male cats have more body signals to indicate to one another that they are not a threat. It is theorized that because males have more ways in which to communicate a lack of desire for aggression, this may end up benefiting them in a household situation.
So, if it isn't gender that affects these behaviors in spayed and neutered cats, what is it? It is mainly the amount of time spent together and the number of desirable territories that have the greatest impact on the harmony in a pair of cats' relationship. The number of aggressive interactions a pair of cats had with one another each day decreased with the amount of time they had lived together. As cats grow old together, they engage in fewer aggressive behaviors. When the cats did engage in aggressive interactions, it was largely based on territory. If there was one preferred resting spot, the aggressive interactions tended to happen most frequently around it. Bottom line, the more preferred resting spots you provide in your home and the longer your pair of cats is together, the more harmony there will be in the relationship.
In a nutshell, as spayed or neutered pets, gender does not affect the amount of harmony in the relationship, so you are free to choose whichever two kittens strike your fancy. Just make sure that you have enough desirable sleeping stations placed around your house to keep the peace.
Barry, Kimberly J, and Sharon L Crowell-Davis. “Gender Differences in the Social Behavior of the Neutered Indoor-Only Domestic Cat.” Applied Animal Behaviour Science, vol. 64, no. 3, 1999, pp. 193–211.
|
<urn:uuid:0b6487ad-eaa7-4f62-8ffd-8f08165155e3>
|
CC-MAIN-2018-51
|
https://quality-bengal-kittens.com/blog/blog/what-two-bengal-cats-are-best-together-two-girls-two-boys-or-one-of-each
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825098.68/warc/CC-MAIN-20181213193633-20181213215133-00085.warc.gz
|
en
| 0.964963 | 810 | 3.171875 | 3 |
U.S. National Library of Medicine
Epidermal cells which synthesize keratin and undergo characteristic changes as they move upward from the basal layers of the epidermis to the cornified (horny) layer of the skin. Successive stages of differentiation of the keratinocytes forming the epidermal layers are basal cell, spinous or prickle cell, and the granular cell.
The numerical value of keratinocytes in Chaldean Numerology is: 7
The numerical value of keratinocytes in Pythagorean Numerology is: 3
Images & Illustrations of keratinocytes
Translations for keratinocytes
From our Multilingual Translation Dictionary
Get even more translations for keratinocytes »
Find a translation for the keratinocytes definition in other languages:
Select another language:
Discuss these keratinocytes definitions with the community:
Word of the Day
Would you like us to send you a FREE new word definition delivered to your inbox daily?
Use the citation below to add this definition to your bibliography:
"keratinocytes." Definitions.net. STANDS4 LLC, 2017. Web. 23 May 2017. <http://www.definitions.net/definition/keratinocytes>.
|
<urn:uuid:a908c5ca-85b5-4619-87b5-d9b58e9ccc67>
|
CC-MAIN-2017-22
|
http://www.definitions.net/definition/keratinocytes
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607647.16/warc/CC-MAIN-20170523143045-20170523163045-00430.warc.gz
|
en
| 0.743331 | 258 | 2.609375 | 3 |
When we garden with native plants instead of non-natives, benefits abound — to ourselves, to the environment, to the ecosystem. If you’re relatively new to native gardening, you’ll feel even better about your new direction as you learn about the benefits of native gardening. If you’re an experienced native gardener, you may learn a few things, and you’ll be well prepared to chat with folks about why native gardening matters.
What's a "Native Plant"?
Let’s start by clarifying what we mean by native plant. CNPS explains it this way: “Our native plants grew here prior to European contact. California’s native plants evolved here over a very long period, and are the plants which the first Californians knew and depended on for their livelihood. These plants have co-evolved with animals, fungi and microbes, to form a complex network of relationships. They are the foundation of our native ecosystems, or natural communities.” (Read more from CNPS on What are native plants?)
Similar to the definition of native plants, locally native plants are species that grew, not just in California, but in a specific area, before European contact, as determined by historical records, such as reports by early botanists. Most commonly, locally native means local to a county, a city, or a property. Depending on location, knowledge, goal, and plant availability, people choose which geographical constraint to apply. Someone living in a suburb may be comfortable using county or city. A rural resident living next to wildland may want to use plants local to their property address or neighborhood. People in towns and the suburbs may prefer to also use some of our California named cultivars, as these have been bred to perform very well in garden conditions and (often) to be more manageable sizes.
You can use Calscape to find which native plants are local to the area you want to use for your project. You may want to start with your address, and use plants from the generated list. (See Redbud’s Calscape handout for info on how to save this list.) Or, check if a plant in which you’re interested is local to your address, or, if not, if it’s local to your town or county; do this by zooming in on the map on that plant’s page.
Benefits of Native Plants
Various reasons bring people to gardening with natives and keep them focused on this approach. Here are some of the notable advantages:
Natives Use Less Water
The majority of California natives are adapted to our summer-dry, winter-wet climate. Most become drought tolerant as they mature. So they’ll naturally do well using much less water than plants native to other climates. Mature local chaparral plants often are fine with little or no supplemental water. Riparian native plants, however, are adapted to living around water, so they want regular water.
Natives Are Often Easier
Gardening with natives is often easier, as they require less maintenance. They generally do not need soil amendments or fertilizers. (More info about this later.) And local native are already well adapted to your climate and soil, so they’re more likely to succeed. Check out Calscape for a list of “easy” natives local to your address.
Natives Need Little to No Fertilizer
Gardening with natives means significantly lower fertilizer usage, perhaps even none. Our horticulture chair consistently adds soft rock phosphate to the backfill soils of all her plants, native and non-native, as our foothills soils are deficient in this mineral. Also, if your plants are doing poorly in spite of your best management practices, have a soils test done. Some of our soils are deficient in critical minerals, nutrients, or both. If you find this is the case at your place, apply a fertilizer targeted at this specific problem
Natives slowly get needed minerals from the soil; the roots of natives develop symbiotic relationships with soil fungi (mycorrizhae). They exchange sugars that they get via photosynthesis for soil minerals. The ability of native plants to get minerals from soil saves us time, effort, and money. In return, we must refrain from giving them extra fertilizer. Excess nitrogen:
- Decreases species diversity
- Can reduce diversity and abundance of soil microbial communities
- Weakens plant-microbe interactions
Result of using nitrogen on natives is a shorter life for plants.
More Native Plants are Deer Resistant (Not Deer-Proof)
Many native plants have deer resistance when mature. When just brought from the nursery, or when young and tender, many native plants have a high level of appeal to deer that fades as they mature. So even deer-resistant plants should be protected while young. Plants with a strong-scented foliage are often deer-resistant. Redbud offers a list of deer-resistant native plants on our handout, Ideas for Gardening with California Native Plants.
Native Plants Benefit Wildlife
Gardening with natives means we’re providing four basic elements needed for wildlife habitat:
- Food. Native plants offer flower pollen, fruit, berries, seeds, nuts, insects, and foliage — offering many types of sources supports a wide variety of wildlife.
- Cover. Animals from amphibians to birds to mammals hide from predators and shelter from the elements in the cover of native plants.
- Nesting materials. Native plants provide nesting material for birds, surely, but also for other animals that prepare places for their young.
- Nesting sites. And native plants give wildlife nesting sites safe from predators, such as tree branches, a tree hollow, and brush piles.
Just add water, and wildlife have everything they need!
Birds Need Native Plants for Population Success
Gardening with natives means you’re helping birds survive and thrive. Recent ground-breaking work by Doug Tallamy and other scientists at the University of Delaware and the Smithsonian Institution, has found that the extent of non-native plants in backyard gardens endangers insect-eating birds (over 1/3 of U.S. native bird species). Tallamy’s team found that fewer insects meant reduced survival numbers for MOST bird species, which feed insects to their young, not just insect-eating species. They found that backyards need 70 percent native plants (by biomass) in order for their research species, chickadees, to sustain their population successfully.
So, on the flip side, you also know that CNPS, and research, aren’t saying you need to grow ONLY native plants, or only local natives, but now you have a target — aim for 70 percent at least, over time; of course, nature would always appreciate more.
Native Plants Help the Ecosystem
An ecosystem must include native plant species that its pollinators use, in order to provide sufficient pollinators as sustenance for its insect species, as well as for its other fauna (such as lizards). In turn, those insects and other small creatures become food for birds and other vertebrates, and the great ecosystem continues. If the native plants are lacking, the ecosystem weakens. If they flourish, the ecosystem can, too.
Many native plant species have unique roles in the ecosystems in which they grow. Many pollinators lay eggs only on host native plants with which they co-evolved. If an ecosystem does not have sufficient host native plants for the pollinators that depend on them, the larvae will die, because they will not have enough leaves to eat after they hatch. This is a strong reason to include local natives, particularly pollinator host plants, in your garden.
Gardening with natives provides additional benefits throughout the ecosystem as well, such as filtering water and stabilizing soil (via long roots of plants such as native grasses).
Though plant biodiversity can be preserved only through habitat conservation, by planting even on our own properties, we can help preserve diversity of the organisms that rely on native plants. Planting natives in your garden or yard attracts a huge variety of birds, pollinators, and other beneficial insects, drawn by the food and shelter offered by those plants.
Gain a Sense of Place
Gardening with native plants can give you a sense of place — a feeling about where you are in California, as you create with plants that have evolved to live in this place, plants that belong here. Out in your garden, surrounded by native plants, you may have a heightened connection with nature, a sense of freedom from human intervention. Look around. Slow down every once in a while. Breathe it in. Enjoy.
|
<urn:uuid:37c05dbb-0129-4fac-8c4d-6f43d643092b>
|
CC-MAIN-2023-23
|
https://chapters.cnps.org/redbud/gardening/why-garden-with-native-plants/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650201.19/warc/CC-MAIN-20230604161111-20230604191111-00067.warc.gz
|
en
| 0.947322 | 1,794 | 3.046875 | 3 |
Twice this week, teen drivers on county roads died in car accidents.
Teen drivers are involved in a disproportionate number of accidents compared to the total number of drivers. Just fewer than seven percent of drivers are teenagers, but teens are involved in 14 percent of all accidents.
Roger Rahim, a driver's education teacher at Southeast Lauderdale, sees the problem every day. He says most teens simply drive too fast.
Yearly, almost 3,000 teens die in automobile accidents, and one in five of those were drinking alcohol.
Local Mothers Against Drunk Driving President Brenda Snowden says many teens just don't understand the consequences of their actions, and that starts with parents.
One thing law enforcement officials want to make sure to remind teens about, wearing seat belts.
Sixty percent of teens involved in fatal accidents are not wearing their seat belts. That's why police say putting on a belt could be the difference between life and death.
Viewers with disabilities can get assistance accessing this station's FCC Public Inspection File by contacting the station with the information listed below. Questions or concerns relating to the accessibility of the FCC's online public file system should be directed to the FCC at 888-225-5322, 888-835-5322 (TTY), or [email protected].
|
<urn:uuid:a9ae1802-79e8-4fbe-acee-e68c7cd73989>
|
CC-MAIN-2015-35
|
http://www.wtok.com/news/headlines/76336.html?site=mobile
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645340161.79/warc/CC-MAIN-20150827031540-00078-ip-10-171-96-226.ec2.internal.warc.gz
|
en
| 0.957515 | 268 | 2.734375 | 3 |
Low Temperature Hydrothermal Vent Fluxes as Traced by Radium Isotopes
This project proposes to quantify key rates of iron (Fe) transport above a major ocean spreading center in order to evaluate the role of hydrothermal venting in supplying iron, an essential micronutrient, to the surface ocean. Iron is one of the most abundant elements in fluids emanating from mid-ocean ridges, but only recently has tantalizing evidence emerged that it can persist for long enough to play a role in global ocean biogeochemical cycling. Even more recently, a study of global hydrothermal Fe fluxes concluded that the deep ocean inputs could only be balanced with the addition of a low-temperature diffuse Fe source. Further, a significant fraction of dissolved Fe in low temperature fluids may arrive at the seafloor in a stable form that would mitigate significant removal during transport. It is therefore possible that low-temperature fluids may supply a disproportionate amount of the “transportable” dissolved Fe that has been observed in large-scale deep ocean plumes.
Assessment of process rates will be accomplished through concurrent measurements of Fe concentration and speciation and the radium “quartet” (224Ra, 223Ra, 228Ra, 226Ra) during an expedition along the southern East Pacific Rise (15°S-18°S). Autonomous underwater vehicle and towed-CTD surveys will be used to identify locations of low- and high-temperature discharge. At selected target areas, we will test the hypotheses that low-temperature hydrothermal inputs have a distinct radium isotopic ratio fingerprint, and that the relative rate of Fe scavenging removal is lower in low-temperature sources. Given their wide ranging half-lives, Ra isotopes have the unique ability to integrate over biogeochemically-relevant time scales of Fe transport in the deep ocean.
What will we learn?
The combination of concurrent Ra isotope and total dissolved Fe measurements will allow us to quantify Fe residence time for any Fe phase that is transported on large horizontal scales, as has been observed previously along the EPR.
Together, Fe loss and transport from Ra measurements will lead to improvements in the predictive capabilities of ocean circulation and biogeochemistry models that assess the importance of hydrothermal Fe in supporting primary productivity and carbon drawdown in overlying surface waters.
Scarce supply of the micronutrient Fe to surface waters limits the productivity of marine ecosystems in a large portion of the world’s oceans. While the significant contribution of hydrothermal sources to the deep ocean Fe inventory is established, this source is thought to be minor with regard to surface waters. Quantifying low- and high-temperature hydrothermal Fe inputs, losses and transport rates will allow us to assess the strength of this mechanism, and also reduce the large uncertainty in current model estimates of Fe residence time in the ocean – a key factor limiting our understanding of the sensitivity of marine systems to perturbations in the Fe cycle.
- Kipp, L., Sanial, V., Henderson, P.B., van Beek, P., Reyss, J.-L., Hammond, D.E., Moore, W.S., Charette, M.A. (2018) Radium isotopes as tracers of hydrothermal inputs and neutrally buoyant plume dynamics in the deep ocean. Marine Chemistry, 201, 51-65.
|
<urn:uuid:58527c7b-1a7d-44ab-8800-854b172ae027>
|
CC-MAIN-2021-49
|
https://www2.whoi.edu/site/groundwater/projects/hydrothermal-vents/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363465.47/warc/CC-MAIN-20211208083545-20211208113545-00272.warc.gz
|
en
| 0.891899 | 707 | 2.96875 | 3 |
For example, the visibility associated into word a€?love’ inheres both to the domains of embodied enjoy and also to the abstract domains of personal activities including marriage ceremonies
Another big advancement introduced by cognitive linguistics is the continuing growth of a resolutely a€?encyclopedica€? method of phrase definition, most useful exemplified by Frame Semantics (Fillmore 1975, 1982) and by the Theory of Domains (Langacker 1987). Approximating somewhat, an approach to phrase meaning can be identified a€?encyclopedica€? insofar as it characterizes understanding of worldly details as the primary constitutive power of word definition. While the mind spots means and Conceptual Metaphor idea regarded phrase which means generally due to the fact product of associative activities between ideas, Fillmore and Langacker switched their own attention to the regards between word definition as well as the muscles of encyclopedic understanding possessed by common speakers. Our very own power to use and interpret the verb a€?buy’, eg, is closely connected with the help of our back ground understanding of the personal nature of commercial transfer, which involves a vendor, a customer, goods, funds, the relation between the revenue therefore the items, and so forth. Here is how Frame Semantics tries to meet with the test. Very first, phrase include construed as sets of phonographic kinds with highly schematic principles which are internally planned as radial classes and work as accessibility sites to encyclopedic knowledge. Next, a free account from the representational business of encyclopedic expertise try offered. According to Fillmore, encyclopedic wisdom are displayed in long-lasting memory space in the form of frames, in other words., schematic conceptual scenarios that identify the prototypical functions and functions of a denotatum, in conjunction with its interactions because of the stuff in addition to activities generally of it. Structures provide therefore a schematic representation from the factors and entities related to a particular site of experience and communicate the details required to utilize and interpret what utilized to speak about they. Including, in accordance with Fillmore & Atkins (1992) the usage the verb a€?bet’ was governed from the danger structure, and that is as follows:
Per Langacker, word meaning was exactly an issue of a€?profile-domaina€? business: the profile represents a substructural aspect designated within another macrostructure, whereas the domain name corresponds to the macrostructure giving the background suggestions against that the visibility may be interpreted (Taylor 2002)
In the same vein as Frame Semantics (more on the parallels in Clausner & Croft 1999), Langacker’s concept of domain names contends that our knowledge of word meaning depends upon our access to big understanding frameworks also known as domain names. To demonstrate the notion of a domain, consider the keyword a€?diameter’. The meaning with this phrase are not grasped independently of a prior understanding of the idea of a circle. In the diameter/circle sample, a€?diameter’ designates a profile when you look at the group site. Equally, expressions like a€?hot’, a€?cold’, and a€?warm’ assign homes for the temperature site. Langacker contends that domain names are generally structured into hierarchies that reflect meronymic connections and offer a simple conceptual ontology for vocabulary use. Eg, this is of a€?elbow’ is comprehended with respect to the supply domain name, as the meaning of a€?arm’ can be found within the body site. Significantly, individual profiles typically inhere to various domains, and this refers to among issues responsible for the ubiquity of polysemy in natural words.
Developments associated with the method to phrase meaning fostered by intellectual linguistics put building Gram), Welcome Inferencing concept (Tr). The idea of a frame became popular in cognitive psychology to model the dynamics of ad hoc categorization (elizabeth.g., Barsalou 1983, 1992, 1999; additional in area 5.2). Standard information regarding the analysis of word meaning in cognitive linguistics are located in Talmy (2000a,b), Croft & Cruse (2004), and Evans & Green (2006).
|
<urn:uuid:bb3f8fd6-affe-4d85-bfb1-83d1896a1c97>
|
CC-MAIN-2022-33
|
https://cruisecontrolrun.com/but-insights-buildings-of-this-sorts-cannot-be/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573630.12/warc/CC-MAIN-20220819070211-20220819100211-00222.warc.gz
|
en
| 0.931007 | 878 | 2.78125 | 3 |
WORCESTER - A new study from University of Massachusetts Medical School finds that the majority of children with irritable bowel syndrome are low on vitamin D. The lead author, pediatric endocrinologist Dr. Benjamin Nwosu, an associate professor of pediatrics at the medical school, called for monitoring and supplementing vitamin D in pediatric IBS patients.
The study, published Monday in the scientific journal PLOS ONE, is the first of its kind to examine such a link in children.
IBS is not a disease but is considered a disabling functional disorder. The cluster of symptoms including cramps, bloating, diarrhea and constipation, affects as many as one in six children, according to a news release from UMass Medical School.
Vitamin D is a nutrient found in some foods, such as salmon, tuna, egg yolks and fortified foods such as milk and orange juice, that is needed for health and to maintain strong bones, according to the National Institutes of Health. It does so by helping the body absorb calcium (one of bone’s main building blocks) from food and supplements.
The body also makes vitamin D when skin is exposed directly to the sun.
Being vitamin D deficient puts individuals at risk for decreased bone mass and muscle weakness. The vitamin is needed to carry messages between the brain and other parts of the body and to help the immune system ward off bacteria and viruses.
In the present study, investigators analyzed medical records of 55 children with IBS and 116 healthy children who didn’t have IBS.
They found 93 percent of the children with IBS had vitamin D deficiency, using the clinical practice definition of deficiency, compared to 75 percent of the healthy children in the control group.
Even using a tighter definition of vitamin D deficiency used by the National Institutes of Health, more than 50 percent of children with IBS had vitamin D deficiency compared to 27 percent of control subjects.
“Vitamin D deficiency is highly prevalent in this area,” Dr. Nwosu said in an interview, pointing to the lack of sun exposure in northern latitudes as a contributing factor. But even so, children with IBS had much higher prevalence of the deficiency.
Dr. Nwosu said people with IBS frequently don't feel well, with uncomfortable gastrointestinal symptoms, so they may not get out as much to walk or play in the sun.
Also, they typically have limited dietary choices so they may not be getting sufficient vitamin D from food.
People with IBS and other digestive problems tend to avoid a range of foods, whatever provokes their symptoms. Those who avoid fish, eggs and dairy products in particular consume less vitamin D.
“In the general population, meat eaters happen to have higher vitamin D than vegans,” Dr. Nwosu said.
Dr. Nwosu said that given the high prevalence of vitamin D deficiency, the approach that made sense for clinicians would be to routinely screen children with IBS and have them take vitamin D supplements to maintain between 30 and 100 nanograms per milliliter.
He said vitamin D is generally safe at supplementation levels needed to stay within a normal range. In rare cases, constipation, headaches, disorientation and drowsiness are among the risks of heavy supplementation.
Overall, “Most clinicians tend to gravitate toward 1,000 international units per day,” Dr. Nwosu said about standard daily requirements.
The study published Monday is part of a series of studies looking at children with malabsorption syndromes, including celiac disease and lactose intolerance, to examine what happens to the vitamin D they have in their bodies. Dr. Nwosu said that children with IBS had the highest prevalence of vitamin D deficiency among these groups.
He said the same connection between IBS and vitamin D deficiency has been reported in adults.
|
<urn:uuid:48d64d07-634c-4a73-ae78-b6246630bf30>
|
CC-MAIN-2017-30
|
http://www.telegram.com/news/20170213/vitamin-d-deficiency-found-in-children-with-digestive-disorder-umass-study-finds
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425339.22/warc/CC-MAIN-20170725162520-20170725182520-00034.warc.gz
|
en
| 0.9554 | 802 | 3.046875 | 3 |
1903 - Walter Sutton shows that chromosomes carry the cell's units of inheritance.
1911 - Thomas Hunt Morgan demonstrates that genes are arranged in linear fashion on the chromosomes of the fruit fly.
1928 - Fredrick Griffith discovers that bacteria contains a molecule that can transfer genetic information from cell to cell.
1944 - Oswald Avery, Colin Macleod, and Maclyn McCarty show the substance that Griffith discovered is DNA.
1952 - Alfred Hershey and Martha Chase confirm that genetic material of viruses is DNA, not protein. Rosalind Franklin records a critical X-Ray diffraction problem, demonstrating that DNA is From of a helix.
2000 - Craig Venter and Francis Collins announce the draft DNA sequence of the human genome at the White House Ceremony in Washington, DC.
|
<urn:uuid:baced810-a59c-4615-8ba3-077030bf8bfb>
|
CC-MAIN-2018-05
|
https://spark.adobe.com/page/3bctdSXh7IcDm/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889681.68/warc/CC-MAIN-20180120182041-20180120202041-00646.warc.gz
|
en
| 0.836418 | 163 | 3.5 | 4 |
Hot corrosion of the steel SA213-T22 and SA213-TP347H in 80%V2O5-20%Na2SO4-20%Na2SO4 mixture
Keywords:Hot corrosion, Electrochemical techniques, Corrosion rate
Many hot corrosion problems in industrial and utility boilers are caused by molten salts. The corrosion processes which occur in salts are of an electrochemical nature, and so they can be studied using electrochemical test methods. In this research, electrochemical techniques in molten salt systems have been used for the measurements of molten corrosion processes. Electrochemical test methods are described here for a salt mixture of 80%V2O5-20%Na2SO4 at 540-680°C. To establish better the electrochemical corrosion rate mearurements for molten salt systems, information from electrochemical potentiodynamic polarization curves, such as polarization resistance and Tafel slopes were used in this study to generate corrosion rate data. The salt was contained in a quartz crucible inside a stainless steel retort. The atmosphere used was air. A thermocouple sheathed with quartz glass was introduced into the molten salt for temperature monitoring and control. Two materials were tested in the molten mixture: SA213-T22 and SA213-TP347H steels. The corrosion rates values obtained using electrochemical methods were around 0.58-7.14 mm/yr (22.9-281 mpy). The corrosion rate increase with time.
How to Cite
Copyright (c) 1998 Consejo Superior de Investigaciones Científicas (CSIC)
This work is licensed under a Creative Commons Attribution 4.0 International License.© CSIC. Manuscripts published in both the printed and online versions of this Journal are the property of Consejo Superior de Investigaciones Científicas, and quoting this source is a requirement for any partial or full reproduction.
All contents of this electronic edition, except where otherwise noted, are distributed under a “Creative Commons Attribution 4.0 International” (CC BY 4.0) License. You may read here the basic information and the legal text of the license. The indication of the CC BY 4.0 License must be expressly stated in this way when necessary.
Self-archiving in repositories, personal webpages or similar, of any version other than the published by the Editor, is not allowed.
|
<urn:uuid:b7262511-75c6-4b84-a77a-5fdc8ac7cb9f>
|
CC-MAIN-2023-50
|
https://revistademetalurgia.revistas.csic.es/index.php/revistademetalurgia/article/view/654
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.13/warc/CC-MAIN-20231206031946-20231206061946-00786.warc.gz
|
en
| 0.858857 | 498 | 2.671875 | 3 |
Agencies and branches at all levels of government publish a wide variety of reports, surveys, fact sheets, and other documents relating to their operation. This guide is an introduction to the scope, use, and location of these materials. Because of the relatively small size of the Goodson Law Library's print documents collection, this guide emphasizes electronic access, as well as identifying materials available at other area documents libraries.
I. U.S. Federal Documents
A. Federal Depository Library Program
The federal government publishes a vast quantity of information. Many of these publications are distributed to libraries by the U.S. Government Publishing Office (GPO) as part of the Federal Depository Library Program. Participating libraries receive depository materials for free, in exchange for providing public access to the documents collection.
The Goodson Law Library at Duke has been a selective depository since 1978, and currently receives approximately 8% of available federal documents. The Law Library’s federal documents collection is comprised of official court reporters, statutes, legislative history materials, regulations, administrative agency rulings, annual reports for selected agencies, treaty materials, and other law-related publications. In addition, the library collection includes historical documents which pre-date Duke Law’s participation in the Federal Depository Library Program, with a particularly strong collection of federal documents from the 1930s and 1940s.
In addition to Duke Law's collection, the Perkins/Bostock Library at Duke is a selective depository since 1890, receiving 80% of available materials. The Walter Davis Library at UNC-Chapel Hill is a regional depository, which receives all of the documents distributed through the federal program.
B. Understanding Government Documents Call Numbers
Federal government documents are arranged by the Superintendent of Documents ("SuDoc") Classification System, which differs significantly from the Library of Congress call number system used for the majority of the Law Library's book collection. Federal documents are grouped by the agency or department that authored the documents, rather than by the subject of the publication.
In the SuDoc classification system, each federal agency and department is assigned a unique alphabetical identifier. Subordinate offices within that department are then identified by numbers. For example, "J" is the alphabetical identifier for the Justice Department; a document whose SuDoc number begins with "J 29" was published by the Bureau of Justice Statistics. The remainder of a government documents call number contains information which will be necessary in order to locate the item on a library shelf; see Superintendent of Documents Classification System for a thorough explanation.
C. Locating Federal Government Documents
Many federal government documents have changed in recent years to an online-only publication format, and are easily accessible through a simple Internet search or through the GovInfo site. However, documents published before the mid-1990s may be more difficult to locate, even in print, because the quality of indexes has historically been poor. Contact the Law Library Reference Desk if you are unable to locate a federal government document through the methods described below.
Duke University Libraries Catalog
Nearly all of the federal government documents in the Law Library’s collection are included in the Duke University Libraries' online catalog, and can be located by searching for the title, author, keyword, and/or subject. Printed documents which are also available in full text online will be noted in the item’s catalog record with a link labeled "Online Version."
Monthly Catalog and Prior Indexes
The most comprehensive source for information about federal government documents is the official Monthly Catalog of United States Government Publications (Law Library Documents GP 3.8:; online-only since 2004), which began indexing federal documents in 1895. The title of the Monthly Catalog has varied slightly over the years. You may see references to Catalogue of Publications Issued by the Government of the United States (1895); Catalogue of the United States Public Documents (1895-1907); Monthly Catalog, United States Public Documents (1907-1939); or the United States Government Publications Monthly Catalog (1940-1950). All of these titles refer to the same publication.
The Monthly Catalog is available electronically from 1976-present through the Government Publishing Office's Catalog of Government Publications. Scans of the Monthly Catalog dating from 1895-2004 are available in HeinOnline's U.S. Federal Agency Documents, Decisions, and Appeals library.
For researching a time period which predates the Monthly Catalog, the most useful general document indexes are:
John H. Hickcox, United States Government Publications: A Monthly Catalogue (Perkins Public Documents/Maps Index Area 015.73 U58 1978)
Available through Internet Archive.
John Ames, Comprehensive Index to the Publications of the United States Government, 1881-1893 (Law Library Ref Doc. I 15.2:In 2/2).
Duke University community may search and browse this title electronically in the United States Congressional Serial Set Digital Collection with a "Publication Search" for 58-2 House Document 754.
Benjamin Perley Poore, A Descriptive Catalogue of the Government Publications of the United States, September 5, 1774-March 4, 1881 (Law Library Ref Doc. Y 4.P 93/1:G 74/1).
Searchable electronically for the Duke University community in United States Congressional Serial Set Digital Collection with a "Publication Search" for 48-2 Senate Miscellaneous Document 67.
Finding Full-Text Documents Online
Federal documents which are listed in the University Libraries' catalog may provide a link to the electronic version, where one is available. The online version of the Monthly Catalog also provides links to electronic versions.
Many recent government documents are linked from the web sites of the agency or departments which publish them. The Federal Agencies Directory at USA.gov provides links to the home pages of agencies, departments and offices from each branch of the federal government.
There are several specialized government search engines which can be useful for quickly locating a document online. USA.gov, the official web portal of the federal government, contains a good search engine. Google's "site:[.extension]" operator will return search results from only ".gov" (government) or ".mil" (military) domain names. However, most general popular search engines (such as Google or Bing) will also successfully retrieve a government document with a search for the document title in quotation marks. In addition, general search engines will retrieve documents which are archived at non-governmental sites, such as university libraries and private organizations.
II. State Documents
State governments also publish a substantial amount of documents. The Law Library receives a large number of primary state documents for all 50 states, including official court reporters, statutes, session laws, administrative codes, and Attorney General opinions. Much of this primary legal material is available online to the Duke Law community through Lexis Advance and Westlaw, and to the University community via Fastcase and LexisNexis Academic. HeinOnline, available to the Duke University community, also includes libraries of state session laws, state statutes, state reports of case law, and state Attorney General Reports and Opinions. Individual states may also make these resources available through their official web sites. Consult Cornell’s Listing by Jurisdiction for direct links to primary legal materials for all 50 states.
States also publish government documents on non-legal topics of interest, including reports, statistical surveys, and handbooks. State documents in the Duke Libraries' collection are included in the online catalog. Duke Law’s "Miscellaneous Documents" collection (Level 1, shelved after the federal Documents) includes a number of state publications.
Many states also provide their government documents in full text on their official web sites. Visit USA.gov: State Governments for direct links to state and territory home pages.
III. International Documents
International governmental organizations, such as the United Nations and the European Union, also publish many reports and documents. The Goodson Law Library and Perkins/Bostock Library receive many of these publications, which can generally be found in a search of the online catalog.
In addition, many international organizations publish these documents on their official web sites. The Northwestern University Library has compiled a comprehensive list of links to the home pages of these organizations.
More detailed strategies for locating international documents can be found in the following Goodson Law Library Research Guides:
rev. 10/2017 jlb
|
<urn:uuid:f97db246-0d6a-4317-a443-2fa7169c1cee>
|
CC-MAIN-2017-43
|
https://law.duke.edu/lib/researchguides/government/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820930.11/warc/CC-MAIN-20171017072323-20171017092323-00495.warc.gz
|
en
| 0.902384 | 1,717 | 2.71875 | 3 |
Published 1997 Revised 2011
This is the first of two articles on right-angled triangles whose sides have lengths that are whole numbers. The second article is called "Pythagorean Triples II". Both of these articles can be read in conjunction with the article "Picturing Pythagorean Triples".
The whole numbers a, b, c are a Pythagorean triple if a and b are the lengths of the two sides of a right-angled triangle with hypotenuse c, so by Pythagoras' Theorem, a ² +b ² =c ² .
In this article we shall look at a way of finding many Pythagorean triples, and we shall also see that whatever whole number n> 3 you choose, there is always a right-angled triangle with one side of length n.
Notice that there may be two (or more) right-angled triangles with the same hypotenuse ; for example:
(there are many examples of this type, but they are not easy to find).
If we are given a right-angled triangle we can always apply an enlargement to it (for example, we can double all lengths) and get another right-angled triangle. This means that from a given triple a,b,c we can produce many more Pythagorean triples na,nb,nc for any whole number n.
For example, starting with the triple 3,4,5 and taking n=5 we get the new triple 15,20,25. Sometimes we can reverse this process by starting with a triple and then reducing the lengths of the sides to get another triple.
This does not always work ; if we start with 3,4,5, for example, and halve the lengths of the sides we do not get a triple of whole numbers. However, sometimes we do ; for example, by halving lengths the triple 10,24,26 converts into the triple 5,12,13.
The most famous Pythagorean triple of all is 3,4,5, and another is 5,12,13. In these two examples, c=b+1, and there are many more examples of this type. Take any number k, and put:
then we always have a ² +b ² =c ²
(an algebraic proof of this is given at the end of this article).
For example, k=1 gives the triple 3,4,5 and k = 2 gives 5,12,13. Try this with other values of k and check that you always get a Pythagorean triple. Clearly, by taking different values of k this method will produce as many Pythagorean triples as we want.
In fact, given any odd number we can always produce a right-angled triangle with one side of this length ; for example, if the odd number is 17, we take k=8 so that a=17, b = 144 and c= 145.
There is another similar way to produce many Pythagorean triples ; this time we take any whole number m and write
Again, we always have a ² +b ² =c ²
(and again, an algebraic proof of this is given at the end of this article).
For example, if we take m=4 we get a=8, b=15 and c=17.
Notice that in this case, if we are given an even number, we can always produce a right-angled triangle with one side of this length ; for example, if the even number is 18, we take m=9 so that a=18, b=80 and c= 82.
In the methods (2) and (3) for constructing triples a,b,c, the difference between the hypothenuse and the longest side is either 1 or 2. There are many triples in which this is not so, and we now give a third method for constructing triples. This method is important because when combined with enlargements to get smaller or larger triangles, this method produces all Pythagorean triples.
We will prove this fact in the second of these two articles.
The third method of producing Pythagorean triples is to take any whole numbers p and q with p> q and write
a = 2pq, b =p ² -q ² , c = p ² +q ² , (4)
Again, we always have a ² +b ² =c ² .
For example, if we take p=4 and q=3 we get a=24, b=7 and c=25. What do we get if we take p=4 and q=1, or if we take p=5 and q=2?
It is worth noting that this last method includes both of the previous ones, for if we take p=k+1 and q=k in (4), we get (2) (with a and b interchanged), and if we take p=m and q=1 in (4), we get (3).
The values p=5 and q=2 give the Pythagorean triple a=20, b = 21 and c=29 and this triple does not arise out of (2) or (3) for any choice of k or m. This shows that (4) is much better than even (2) and (3) combined.
There are some games here that you can play with a friend. First, you must both agree on whether you are to use (2), (3) or (4) ;
let us suppose you choose to use (4). You then choose p and q, and calculate a,b,c from (4). Next, you give these values (but not the values of p and q) to your friend who then has to find the values of p and q that you started with. Playing this game will help you to understand this article.
If you are interested in computing, you might like to try to persuade your computer to find Pythagorean triples for you. For example, the following programme (written in BASIC) will produce a lot of triples, and also give many examples as in (1).
10 FOR C = 1 TO 100
20 FOR B = 1 TO C
30 FOR A = 1 TO B
40 IF A^2+B^2=C^2 PRINT A,B,C
56 NEXT A
60 NEXT B
70 NEXT C
Finally, as promised, we show that a ² +b ² =c ² in each of the cases (2), (3) and (4). In (2) we have a=2k+1, b = 2k ² +2k and c=b+1 so that in this case
c ² -b ² = (c-b)(c+b) = c+b = 2b+1 = 4k ² +4k+1 = (2k+1) ² = a ² .
In (3) we have a = 2m, b =m ² -1 and c = m ² +1 so that in this case
c ² -b ² = (c-b)(c+b) = 2(2m ² ) = (2m) ² = a ² .
Finally, in (4) we have a = 2pq, b =p ² -q ² and c = p ² + q ² so that in this case
c ² -b ² = (c-b)(c+b) = (2q ² ) (2p ² ) = (2pq) ² = a ².
See "Pythagorean Triples II" for the second part of the series.
|
<urn:uuid:ba47eb16-2740-4194-87c7-532a38e754e4>
|
CC-MAIN-2023-06
|
https://nrich.maths.org/1309
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500356.92/warc/CC-MAIN-20230206145603-20230206175603-00349.warc.gz
|
en
| 0.905493 | 1,646 | 4.0625 | 4 |
June is the sixth month of the year in the Julian and Gregorian calendars.
The second of four months to have a length of 30 days, and the third of five months to have a length of less than 31 days.
In the Northern Hemisphere, the beginning of the meteorological summer begins on 1 June and the beginning of the traditional summer is 21 June. In the Southern Hemisphere, meteorological winter begins on 1 June and traditional winter begins on 21 June.
June contains the summer solstice in the Northern Hemisphere, the day with the most daylight hours, and the winter solstice in the Southern Hemisphere, the day with the fewest daylight hours (excluding polar regions in both cases).
June in the Northern Hemisphere is the seasonal equivalent to December in the Southern Hemisphere and vice versa.
It is named after Juno, the Roman goddess of youth and protection. Her name (Latin Iūnō) comes from the root word for “young” (Iuuen) and goes back to the idea of vital energy and fertility.
Another etymology for the origin of June explains the month’s name with the Latin word for youth: June was dedicated to Iuventas, the young, while May was for the Maiores, the elders. Both explanations work equally well, as Juno is the goddess of youth.
Midsummer means the middle of summer. It is celebrated either on the summer solstice (June 20, 21, or 22) or St John’s Day on June 24. Midsummer is mainly celebrated in Norway, Sweden, Denmark, and Finland (the Nordic countries), and Estonia, Latvia, and Lithuania (the Baltic countries).
In Scandinavia, Midsummer is also called Midsommar or Sankt Hans after the Christian martyr Saint John the Baptist. The Christian Church celebrates his day on June 24, exactly six months before Christmas. St John is said to “prepare the way for Christ,” as the sunlight decreases after Midsummer and increases after Christmas.
June 1 is World Milk Day – Today’s the day to enjoy a cold glass of milk. If cow’s milk isn’t your thing, there are many dairy alternatives available to you in the grocery store, including almond milk, oat milk, cashew milk, and more. You can even upgrade your sip with a bit of chocolate syrup for a glass of classic chocolate milk.
June 3 is National Egg Day – Eggs are super versatile—whether you like them scrambled, hard-boiled, soft boiled, fried, poached, or baked, there are a slew of delicious recipes for you out there. Today, celebrate the humble egg with your favorite recipe, like breakfast tacos, egg salad, a quiche, or even your favorite brownies (hey, eggs are an ingredient!).
June 4 is National Donut Day – Everyone’s favorite breakfast treat has a dedicated day of celebration on the first Friday of June each year. There are many flavors of donuts to satisfy your sweet tooth—whether you prefer a classic glazed, a savory bacon donut, or one with sprinkles on top, today’s the day to enjoy. Pick up a dozen to share and get ready to become the most popular person in the office.
June 7 is National Chocolate Ice Cream Day – Ice cream is a quintessential warm-weather treat. To celebrate National Chocolate Ice Cream Day, grab your favorite cocoa-flavored cold treat and enjoy it outside for a mid-day break—just be sure to finish it before it melts.
June 10 is National Iced Tea Day – Nothing says summer like a big pitcher of freshly brewed iced tea that’s jam-packed with sliced lemons. Whether you prefer the classic flavor of unsweetened iced tea, an iced lemongrass tea, or every Southerner’s sugar-laden favorite, sweet tea, today’s the day to make this your beverage of choice.
June 14 is Flag Day – On June 14, 1777, the United States adopted the American flag. Since then, it has become a symbol of freedom, endurance, and patriotism recognized around the globe. Hang a flag inside or outside of your home to commemorate Flag Day.
June 21 is National Smoothie Day – On a hot day, not much can beat an ice-cold smoothie. Blend up a sip for National Smoothie Day featuring your favorite fruits and veggies (mix-ins like yogurt or peanut butter work, too), and enjoy the refreshing beverage outdoors.
June 22 is National Onion Rings Day – Covering a food in batter and deep-frying it usually ends up being a delicious hit—and that’s especially true for onions. In honor of National Onion Rings Day, try making your own onion rings at home (it’s easier than you’d think) with a classic beer batter recipe. If all else fails, you can always hit up your local pub for a deep-fried basket.
The Full Moon in June is called the Strawberry Full Moon after the fruits that grow in the Northern Hemisphere around this time of the year.
Certain meteor showers take place in June. The Arietids takes place May 22 to July 2 each year, and peaks on June 7. The Beta Taurids June 5 to July 18. The June Bootids take place roughly between 26 June and 2 July each year.
In the United States, the given name June skyrocketed in popularity in the early twentieth century. In 1925, it was the 39th most popular name for a baby girl … a place held by the name Hannah today.
June’s birthstones are pearl, alexandrite and moonstone.
The birth flowers are rose and honeysuckle.
The zodiac signs for the month of June are Gemini and Cancer.
|
<urn:uuid:ea17ccb7-886d-48bd-af2f-ddf0f65df8db>
|
CC-MAIN-2024-10
|
https://justfunfacts.com/interesting-facts-about-june/
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474853.43/warc/CC-MAIN-20240229202522-20240229232522-00094.warc.gz
|
en
| 0.946821 | 1,209 | 3.234375 | 3 |
If you’re like most people, you probably have prescription medication in your medicine cabinet that you haven’t finished. Leaving that medicine in your cabinet, even after it’s expired, is not a good practice as it could cause harm through accidental exposure or intentional misuse. But how to dispose of that medication? Conventional wisdom says to just flush that extra, unused medication down the toilet. But that’s not the best way to dispose of a lot of types of medication as it can have an adverse effect on the environment but putting trace amounts of dangerous chemicals into the water supply.
Most communities offer a drug “take-back” program where you can turn in any unused prescription medication and it will be disposed of safely. Visit the DEA’s website or call 1-800-882-9539 for information and locations. If you are in a community that does not offer a take-back program, and the drug label does not give directions for disposal, you can dispose of most medications by throwing them in the trash, assuming you follow these steps:
- Take the medication out of its original container and mix it with something undesirable like used coffee grounds, kitty litter, or dirt to make the drugs less appealing to children and pets.
- Once mixed, place in a sealable container or can to prevent leakage.
- To protect your privacy and identity, scratch out any identifying information from the medicine bottle labels.
- Throw the empty medicine container and the sealed medicine separately into your household trash.
- If you’re unsure about how to properly dispose of medication, ask your pharmacist.
Some medications have specific directions on the label for flushing down the toilet to dispose of unused medication. Usually this is for medications that contain heavy narcotics or pain relievers that are extremely toxic to children or animals if ingested. These medications are considered to be so dangerous that it is better to flush any unused portions rather than risk leaving them in your house or throwing them in the trash. The Food and Drug Administration provides a constantly updated list of medications that are recommended for flushing.
Disposing of Inhalers
Disposing of inhaler used for asthma or breathing issues can also present challenges to disposal. Exercise extreme caution when disposing of these types of products as any puncturing or exposure to fire can be dangerous. Contact your local trash and recycling facility to ask for the best way to dispose of inhalers.
Taking these precautions can help to ensure that your family never suffers a preventable tragedy in your home. Yet sometimes accidents occur as a result of the negligence of others. If you or a loved one were injured by someone else’s negligence, Alexander Law Group, LLC can help. Call us now at 888.777.1776 or click here for a private, no cost consultation regarding your rights.
|
<urn:uuid:2d8edd87-e014-4ae4-b5ae-1837c0493e07>
|
CC-MAIN-2022-21
|
https://alexanderlaw.com/articles/2017/11/how-to-safely-dispose-of-unused-medications/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662517245.1/warc/CC-MAIN-20220517095022-20220517125022-00062.warc.gz
|
en
| 0.917106 | 587 | 2.609375 | 3 |
Reno County, KS health officials are investigating an increase in pertussis, or whooping cough, prompting a call to the public to see their physician if you have a cough that has lasted 2 weeks.
Currently, more than 70 cases are being investigated. Kansas Department of Health and Environment (KDHE) reports 41 confirmed or probable cases for the county as of July 18, 2015.
Pertussis is an infection that affects the airways and is easily spread from person to person by coughing or sneezing. The severe cough, often referred to as “Whooping Cough”, can last for weeks for months, sometimes leading to coughing fits and/or vomiting.
Anyone can get pertussis, but it can be very dangerous for infants and people with weakened immune systems. Family members with pertussis, especially mothers, can spread pertussis to newborns.
The best way to prevent pertussis among infants, children, teens, and adults is to get vaccinated. Keeping infants and those at high risk for pertussis complications away from infected people is also important for prevention.
|
<urn:uuid:f38cec57-e7f1-4c2b-b27a-e9ed264ca881>
|
CC-MAIN-2018-05
|
http://outbreaknewstoday.com/kansas-reno-county-reports-increase-in-pertussis-52127/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890582.77/warc/CC-MAIN-20180121120038-20180121140038-00608.warc.gz
|
en
| 0.966194 | 229 | 2.953125 | 3 |
The earth is the home of human beings and other living organisms. The life is possible due to the presence of favourable living conditions which make up our environment. Environment refers to everything that surrounds us ,the buildings, trees, animals, rivers, lakes, the whole nature. The environment also includes human made things like buildings, towers etc. The environment is classified into two types- natural and human made the natural environment includes trees, mountains, lakes, rivers, vegetation, animals etc. The human made environment includes transport, settlements, industries, building etc. Humans develop these things to live comfortably in their environment.
|
<urn:uuid:bce7c6a2-6552-4993-9de4-928ae3ddcbd2>
|
CC-MAIN-2017-04
|
https://brainly.in/question/254505
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00345-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.948529 | 121 | 3.21875 | 3 |
The Cola Wars
Updated: Mar 11, 2020
by Sukanya Nambiar
Android v/s iOS. Mother Dairy v/s Kwality Wall’s. Marvel v/s DC.
These are just some of the debates that most of us – if not all – have had, at some point of time. But one such ‘battle’ that saw fierce competition between two big brands and truly shook up the world of business and marketing is the Cola Wars.
‘Cola Wars’ is a term that emerged in the US in the early 1980s. It refers to the series of advertising and marketing tactics of two, long-time rival soft drink companies – The Coca-Cola Company and PepsiCo – against each other. It is a classic example of a price war in an oligopoly – a market form with a few, big companies competing with each other and strong barriers to the entry and exit of firms.
Both these soft drink giants go way back. Coca-Cola was first introduced in 1886 in the US. Pepsi followed seven years later. Since then, both companies have been neck-and-neck in the soft drinks market and have made their presence felt in several countries across the globe.
At the heart of the Cola Wars are the pricing decisions made by Coca Cola and Pepsi. Their ultimate goal has always been maximizing shareholder value. In order to grab market share, Pepsi generally starts to drop prices, and shortly after, Coca Cola decides to decrease theirs slightly, but not for all products. This is an example of a price war where competitors try to adjust their prices in order to trump the other company. Coca Cola also uses a lower price point to get into new markets that are especially sensitive to price. For example, in India or Pakistan, Coca Cola is focused on reducing prices of their 200ml container (cans), in order to increase brand awareness among consumers. There is also an attempt made by the company to project itself as ‘superior’ to its competitors.
However, price is just one of the many tools used by the two companies to get ahead in their game. Pepsi-Co and Coca-Cola have also constantly used advertisements to snipe at one another over which drink has a greater mass appeal as well as a better taste. Both companies have had advertising campaigns that are radically different from each other, yet effective in their own way. Coca-Cola’s advertising has largely focused on wholesomeness and nostalgia for childhood. It is often characterized as “family friendly” and often relies on characters, which evoke adoration. Pepsi, on the other hand, tends to focus on the new, ‘in’ things, which the new generation can relate to.
The ‘Pepsi Challenge’ of 1975 was a classic marketing promotion by Pepsi in which regular people got to take part in a blind taste test with one cup filled with Pepsi and another with Coca Cola. These people were then asked to choose their preferred drink out of the two. Not surprisingly, every Pepsi Challenge concluded that more than 50% of tasters prefer Pepsi to Coke. In this way, Pepsi was hugely successful in grabbing a market space otherwise dominated by Coke. From its inception in 1975, the Challenge was hugely successful in grabbing market share away from Coke. In 1981, Pepsi also ran a “Pepsi Challenge Payoff” contest, which would hand out a large hamper to anyone who could gather Pepsi bottle caps that spelled out the words “Pepsi Challenge”. Coca Cola, on its part, countered with rebates as well as retail price cuts.
The Cola Wars spilled over into the 1990s, with both companies pushing for product diversification to reach out to more people. However, Coca-Cola and PepsiCo have witnessed a decline in market share since 2000. This could be attributed to growing awareness among people about the ill effects of soft drinks on one’s health as well as the entry of new firms that have entered the space and carved a niche for themselves, such as Snapple.
Nevertheless, Coca-Cola and PepsiCo continue to be the biggest names in the soft drink industry and the ‘feud’ between them is still the subject matter of numerous case studies and discussions revolving around competitive markets. The Cola Wars underscore the cutthroat competition in an oligopolistic market and show how advertising and marketing is often a matter of life and death.
|
<urn:uuid:814b3328-7581-40bf-b28a-a371b59836fe>
|
CC-MAIN-2023-06
|
https://www.econafterhours.com/post/the-cola-wars
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494852.95/warc/CC-MAIN-20230127001911-20230127031911-00865.warc.gz
|
en
| 0.977403 | 918 | 2.703125 | 3 |
What is Aquaponics
The combination of growing plants and fish together is called aquaponics. This procedure is used for growing soil fewer plants. Both fish and plants are grown in one integrated system so that space can be saved easily while growing plants. If plants and fishes are kept together, the fish waste is used as food for the plans and the plants don’t need other food to grow up. As the plants naturally filter the water, the fish can also survive well in the system.
Using the fish nutrients the aquaponics pa provides necessary nutrition to the plants which are required for their survival and growth. If the proper procedure can be followed in the right type of environment, the plants can be grown faster than the normal procedure of growing plants. Different types of material can be grown easily and successfully following this procedure. In this article, I am discussing few benefits of aquaponics method.
1) Requires small space
For the space management of your home, this option is one of the greatest options to check out this time. Many people don’t have much space on the outside of their home. So, they can grow plants using the aquaponics. Some plants don’t need much light to grow. You can easily grow these type of plants with this method.
2) Plants grow quickly
If you want to grow plants faster, you should go for the aquaponics fish nutrients method. In this method, the plants grow faster than the usual method. On research, it has been found that aquaponics can grow plants four times faster than the usual. So, you can get your plants mature and grown up in a very short time.
3) Grow variety of plants
If you think you will get to grow a very limited number of plants with this method, you are wrong. You will be able to grow a wide range of plants with this process. Starting from the flowers, the fruits, and vegetables, everything can be grown in an aquaponics garden. So, if you want to grow various options in your home garden, you can consider the option.
The process of aquaponics can be controlled easily. On the whole procedure, there is no soil included. So, using this method, you can easily grow different kinds of plants. As the aquaponics work in varieties of plants with less effort, so it is one of the convenient options to grow plants.
So, these are few benefits of growing plants using aquaponics. Though there are some drawbacks with this method like controlling the temperature, water low, PH balance and so on, still you can manage everything and grow different plants easily on your home garden.
|
<urn:uuid:7020ed64-547e-48b7-b2ba-9178f705830c>
|
CC-MAIN-2019-39
|
https://aquaponicssetup.wordpress.com/2018/11/02/aquaponics-benefits/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572289.5/warc/CC-MAIN-20190915195146-20190915221146-00122.warc.gz
|
en
| 0.937663 | 545 | 3.1875 | 3 |
A new lidar sensor could equip thousands of driverless cars with the sensing abilities required to drive at high speeds on the open road.
Lidar has become the primary way most driverless cars sense the world around them, bouncing laser light off nearby objects to create 3-D maps of their surroundings.
For years, the industry leader in lidar has been Velodyne, which builds some of the most expensive ultrahigh-resolution sensors available. But the rapid advance of research on self-driving vehicles prompted other firms to start building them too—among them a startup called Luminar, which was set up by Stanford dropout Austin Russell and came out of stealth last year.
Luminar’s technology is different from other lidar systems. It uses a longer wavelength of light to operate at higher power, allowing it to see darker objects over longer distances. It’s also able to zoom in on areas of specific interest.
|
<urn:uuid:5d6e6aa0-2b3d-4780-894e-6dfd9034beb6>
|
CC-MAIN-2022-40
|
https://mobility21.cmu.edu/this-new-lidar-sensor-could-equip-every-autonomous-car-in-the-world-by-the-end-of-2018/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337680.35/warc/CC-MAIN-20221005234659-20221006024659-00610.warc.gz
|
en
| 0.958003 | 195 | 2.984375 | 3 |
Florida Agriculture and Consumer Services Commissioner Charles H. Bronson has announced restrictions on the importation of animals from states affected with vesicular stomatitis following a confirmed case in Texas, the first such case reported in the United States since 2006.
Vesicular Stomatitis is a highly contagious, viral disease that affects horses, cattle, swine and occasionally sheep, goats and deer. The virus can also cause flu-like symptoms in people working with infected animals. Signs of vesicular stomatitis include blister-like lesions in the mouth, on the tongue, lips, nostrils, hooves and teats. While the virus is rarely fatal, it does result in significant weight loss and milk production loss.
It is also difficult to distinguish between this virus and foot-and-mouth disease, a devastating livestock disease found outside the United States. States and other countries often impose movement restrictions on animals from vesicular stomatitis-affected areas.
The United States Department of Agriculture, National Veterinary Services Laboratories, have confirmed the finding of a positive horse, with clinical signs on a ranch in Starr County, Texas.
Florida requires veterinary inspection of susceptible animals coming from states affected with vesicular stomatitis. Hoofed animals entering Florida from Texas will require prior permission for entry and must be accompanied by an official certificate of veterinary inspection. The certificate of veterinary inspection must state that the animals are free of clinical signs of vesicular stomatitis and have not been exposed nor located within 10 miles of a positive premises, within the previous 30 days. In addition, any hoofed livestock from states that are affected with vesicular stomatitis are required to have documentation to show they have been tested and found negative within 10 days of movement to Florida.
|
<urn:uuid:3867c807-6a07-43e6-9536-f28761a4a2ee>
|
CC-MAIN-2018-05
|
http://www.southeastfarmpress.com/florida-announces-animal-import-restrictions
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889681.68/warc/CC-MAIN-20180120182041-20180120202041-00226.warc.gz
|
en
| 0.94022 | 367 | 2.609375 | 3 |
Introduction of the Sunderbans
The name of Sunderbans is means as a Beautiful Forest or Beautiful Jungle.
The Sunderbans was established as a Tiger Reserve in the 1973 and in the 1977 as a Wildlife Sanctuary. It was established as a National Park on the 4 May, 1984. was inscribed list of the UNESCO World Heritage Site in the 1987. It was declared as a Biosphere Reserve in the 1989. Sunderbans National Park is made up of the 54 island. It is the biggest mangrove Jungle in the world and it bounded by three rivers, which is Ganga, Brahmaputra and Meghna.
What is the Threat?
The time is very fast going for Sunderbans and if action is not taken fast, the biggest delta on this planet is set to be history. In the Sunderbans most famous southern delta of the fifth already submerged.
Sunderbans has observed a regular rise in the ocean level, in the last decades. The temperature of the surface water has been rising at a rate of the 0.5 degree Celsius rate of the global warming in the past 30 years. This reason has effected to the large scale fish production and agricultural yield. The devastating cyclone AILA in the May 2009 has largest loosed of the Sunderbans.
Threat called global warming
Global warming has a serious danger to the mangrove jungle. Flora is most important resources for refrain to the global warming. Several most species in the area as well as human being are endangered.
How serious is the threat?
If the current speed of the land erosion continuous about more than 250 square kilometres area of the national park and 15 % of farm land area will be lost in about after 20 years.
Recent articles published by the scientists, this article get inform for our society increased the water in the Sunderbans, while at the melting of the Himalayan glacier. Other reason down waste water from Kolkata to Sunderbans, it is major problem for the national park and wildlife sanctuary to the nearest metro city.
Scientists have as well as warned that a surface water pH level in the Sunderbans has reduced over the last 3 decades, hence reason acidification. They have said that the depletion in dissolve oxygen reason by the growth in the temperature can affect main transition in the environmental balance of the Sunderbans National Park.
Impact and probable remedy
Even the raised banks are no assurance against the encroachments by the growing water level, mainly on the Indian part of the Sunderbans. The soaring populations of the human settlement have also lead to common deforestations in the area, thus enhancing the bad-effects of ecological degradations all the more. The main problem is that very little ears are available to lend sympathy to the cornered voices.
|
<urn:uuid:14b7379f-4555-4be3-b366-751ca90d8088>
|
CC-MAIN-2018-34
|
http://worldchefastucetriche.info/?p=961
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210408.15/warc/CC-MAIN-20180816015316-20180816035316-00172.warc.gz
|
en
| 0.95144 | 573 | 3.21875 | 3 |
|Born||1 April 1730
|Died||2 March 1788
|Known for||Painting, Poetry|
Solomon Gessner (1 April 1730 – 2 March 1788) was a Swiss painter and poet. His writing suited the taste of his time, though by some more recent standards it is “insipidly sweet and monotonously melodious.” As a painter, he represented the conventional classical landscape.
He was born in Zurich. With the exception of some time (1749-1750) spent in Berlin and Hamburg, where he came under the influence of Ramler and Hagedorn, he passed the whole of his life in his native town, where he carried on the business of a bookseller. The first of his writings that attracted attention was his Lied eines Schweizers an sein bewaffnetes Mädchen (Song of a Swiss to his armed maiden, 1751). Then followed Daphnis (1754), Idyllen (1756 and 1772), Inkel and Yariko (1756), a version of a story borrowed from The Spectator and already worked out by Gellert and Bodmer, and Der Tod Abels (1758), which Gessner called “a sort of idyllic prose pastoral.”
Encyclopædia Britannica (1911) puzzles over the reason for Gessner's universal popularity, and speculates that maybe it was the taste of the period for the conventional pastoral. Britannica notes that his writings are marked by sweetness and melody, qualities which were warmly appreciated by Lessing, Herder and Goethe. The New International Encyclopædia (1905) finds his writing “insipidly sweet and monotonously melodious,” and attributes Gessner's popularity to the taste of a generation nursed on Rousseau.
Collected editions of Gessner's works were repeatedly published (2 vols, 1777-1778, finally 2 vols., 1841, both at Zürich). They were translated into French (3 vols., Paris, 1786-1793), and versions of the Idyllen appeared in English, Dutch, Portuguese, Spanish, Swedish, Czech and Serbian (by Georgije Magarašević, 1793-1830). In 1780 Gessner founded the Zürcher Zeitung (renamed Neue Zürcher Zeitung in 1821). Gessner's life was written by Johann Jakob Hottinger (Zürich, 1796), and by Heinrich Wölfflin (Frauenfeld, 1889); see also his Briefwechsel mit seinem Sohn (Correspondence with his son, Bern and Zürich, 1801). For Gessner's literary influence, see Texte, J. J. Rousseau and Literary Cosmopolitanism (New York, 1897).
- No. 11, 13 March 1711.
- This article incorporates text from a publication now in the public domain: Chisholm, Hugh, ed. (1911). "Gessner, Solomon". Encyclopædia Britannica (11th ed.). Cambridge University Press.
- "Gessner, Salomon". New International Encyclopedia. 1905.
Media related to Salomon Gessner at Wikimedia Commons
|
<urn:uuid:b0d89bac-47a4-4170-a35d-ca5b357708ff>
|
CC-MAIN-2015-35
|
https://en.wikipedia.org/wiki/Salomon_Gessner
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645311026.75/warc/CC-MAIN-20150827031511-00104-ip-10-171-96-226.ec2.internal.warc.gz
|
en
| 0.922365 | 709 | 2.78125 | 3 |
Thomas Strawbridge Jr. (1798-1880), born in Ireland, was a prosperous saddler and harness maker in Springfield. He was a generous man: during the Civil War he regularly donated fresh food for Union soldiers and Confederate prisoners at Camp Butler, "refusing to accept a penny of pay." He left much of his estate to Springfield's Home for the Friendless, a refuge for destitute women and children. He was obviously proud of being a progressive farmer, as shown by the illustration of a new windmill in his cow pasture.
The Thomas Strawbridge homestead, built around 1845. This house still stands on the south edge of the University of Illinois at Springfield campus and is currently being restored. This and the following illustrations are from the Illustrated Atlas Map of Sangamon County, Ill. (Chicago: Brink, McCormick and Co., 1874).
Farm residence of Thomas Strawbridge...5 miles south east of Springfield, Sangamon Co., Ill." The tenant's house is shown in the upper left corner. The area was first settled in 1820 by Jesse Southwick (1770-1826), who is buried in a lost family cemetery near the campus grounds. Strawbridge purchased the land in 1841. In 1883 the farm was bought by Charles M. Shepherd, for whom Shepherd Road is named.
|
<urn:uuid:a4f1771c-4c1f-4797-bf6f-d30eb91a8445>
|
CC-MAIN-2018-17
|
https://library.uis.edu/archives/strawbridge.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945448.38/warc/CC-MAIN-20180421203546-20180421223546-00156.warc.gz
|
en
| 0.972466 | 272 | 2.625 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.