text
stringlengths 263
344k
| id
stringlengths 47
47
| dump
stringclasses 23
values | url
stringlengths 16
862
| file_path
stringlengths 125
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 57
81.9k
| score
float64 2.52
4.78
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Exam Type: One Day Take-home
This course provides an introduction to the U.S. Constitution – the government structures it establishes and contemplates, and the rights and liberties it recognizes and protects. Structural topics include the original design of the federal government and the role of slavery in that design; judicial review; federalism and the Supremacy Clause; and separation of powers. The Civil War Amendments (Thirteen, Fourteen and Fifteen) will be considered. The Fourteenth Amendment’s provisions for equal protection and due process of law provide the basis for many individual rights, including those relating to racial equality, gender equality, family life, and aspects of personal autonomy, that will be studied. Other topics may be considered as well.
|
<urn:uuid:895a6f51-70f2-4e69-aecf-2c097e34c65f>
|
CC-MAIN-2023-40
|
https://hls.harvard.edu/courses/constitutional-law-8/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.35/warc/CC-MAIN-20230923062631-20230923092631-00318.warc.gz
|
en
| 0.932309 | 153 | 4.0625 | 4 |
1. MRI stands for MAgnetic Resonance Imaging
2. It is a technique used to image the inner part of our body using magnetic fields.
3. Its working principle is based on NMR (Nuclear Magnetic Resonance). In this technique, magnetic field is imposed upon the tissues in our body. The atoms in these tissues rotate in this field and produce what we call a rotating magnetic field, which is a type of signature of a particular atom. It is its characteristic. Thus it gives detailed high resolution images of inner body parts.
4. In producing such high magnetic fields electromagnets made of high temperature superconductors are used which can show superconductivity at much higher temperatures upto boiling point of nitrogen (70 K).
For more detailed information other websites like Wikipedia or some other can be seen
|
<urn:uuid:ed44e66b-4497-43ad-9fc0-7ad3dd2281bc>
|
CC-MAIN-2017-26
|
http://www.topperlearning.com/forums/home-work-help-19/sir-can-you-please-help-me-in-my-school-project-physics-magnetic-effects-of-electric-current-57412/reply
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323889.3/warc/CC-MAIN-20170629070237-20170629090237-00254.warc.gz
|
en
| 0.89221 | 167 | 3.78125 | 4 |
The National FGM Centre (NFGMC) works with local authorities and communities to keep children and young people safe from female genital mutilation (FGM), breast flattening and child abuse linked to faith or belief.
- FGM is a hidden form of child abuse which has been illegal in the UK since 1985.
- FGM and other harmful practices such as breast flattening, forced marriage, child abuse linked to faith and belief are often interconnected safeguarding issues.
- A multi-agency approach which includes health, education, social services and law enforcement is needed to tackle FGM and other harmful practices.
- The centre’s aim is to help end FGM for girls and women by 2030 through delivering a multifaceted social care model of delivery which spans prevention to late intervention, by supporting local authorities, community engagement, training professionals and producing resources e.g. online FGM assessment tool.
- The centre is pivotal in the fight against FGM and other harmful practices; Government must act to help secure the centre’s long-term future by committing funding to the centre beyond 2020.
Download the full briefing
Briefing about the work of the National FGM Centre (NFGMC)
|
<urn:uuid:cbdfb802-cb50-45d6-bdea-6023c3b5a61f>
|
CC-MAIN-2023-50
|
https://www.local.gov.uk/parliament/briefings-and-responses/briefing-about-work-national-fgm-centre-nfgmc
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00844.warc.gz
|
en
| 0.932419 | 250 | 2.921875 | 3 |
Just under two years ago, Energy Refuge went to Ontario for a conference on water technology. At the time, we visited the site of the Niagara Tunnel Project, when a hard-rock tunnel boring machine had finally broken through the other side.
Now, the Ontario government has just finished the project, which is estimated to provide clean power for 100 years. The new tunnel is more than six miles long (10 km) and channels additional water from the Niagara River to flow to the Sir Adam Beck Generating Station at a rate of 500 cubic metres (132,086 gallons) per second. This will supply Ontario with enough clean, renewable electricity to power 160,000 homes.
The largest hydroelectric project to come into service in Ontario for the past 50 years, the Niagara Tunnel Project is a significant provincial achievement. Building a clean, reliable energy system is part of Ontario’s plan to ensure we have the electricity we need to power the province’s homes, schools, hospitals and economy.
“This project is a source of pride as an engineering feat and as a practical solution for meeting Ontario’s energy needs through clean sources. The completion of this project will provide Ontario with a source of clean energy for the next 100 years,” said Bob Chiarelli, Minister of Energy.
The height of the tunnel equals to that of a four-story building. 653,000 cubic yards of concrete were used to line it, which would be enough for building a 1,000 kilometer (600 miles) sidewalk.
Since 2003, more than 360 megawatts of new, upgraded and refurbished waterpower projects have come online in Ontario, enough to power an estimated 240,000 households.
OPG says the new project remains one of the best value renewable energy initiatives in Ontario. OPG and contractor STRABAG agreed to a revised schedule in early 2009 due to difficult rock conditions, and have stayed true to both the schedule and budget. In fact, the project cost will be $100 million lower than the revised $1.6 billion cost, and the in-service date, March 9, is nine months sooner than projected in 2009.
Hydropower is a clean source of energy when it doesn’t require damming rivers and flooding over forests, which will then release carbon as they rot underwater. This project taps into the natural topography of Niagara Falls to produce power.
Article by Antonio Pasolini, a Brazilian writer and video art curator based in London, UK. He holds a BA in journalism and an MA in film and television.
|
<urn:uuid:b245c623-0a8d-437b-91bb-48873bff7dee>
|
CC-MAIN-2020-05
|
https://cleantechies.com/2013/03/27/ontario-completes-renewable-energy-tunnel-project/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250589861.0/warc/CC-MAIN-20200117152059-20200117180059-00233.warc.gz
|
en
| 0.948494 | 525 | 2.875 | 3 |
The Splendor of Creation, a Biblical Ecology (excerpts) by Ellen Bernstein
Ellen Bernstein founded Shomrei Adamah, Keepers of the Earth, the first national Jewish environmental organization in 1988 and is author of Ecology& the Jewish Spirit, The Splendor of Creation: A Biblical Ecology and Let the Earth Teach You Torah. Used by permission of the author. For more information about Ellen Bernstein’s work, visit www.ellenbernstein.org The Splendor of Creation: A Biblical Ecology can be purchased at Amazon or through Pilgrim Press.
Introduction: The Splendor of Creation: A Biblical Ecology
At the core of the environmental crisis is a great divide between mind and body, between head and heart, between human and nature. This divide is not new. The world’s religions and mythologies have always told stories of humanity’s separation from nature. But today the split is so vast that its consequences on the environment are potentially catastrophic.
The Jewish mystics of the seventeenth century said that when Adam and Eve ate the apple from the tree of knowledge of good and evil, they set in motion the rift between humanity and nature.
In the beginning, the world was whole and the creatures knew their place. Adam and Eve lived a peaceable life in the Garden of Eden. God had invited Adam to enjoy all of the fruits of the Garden—except for the fruit of the tree of knowledge. "If you eat from it, you will surely die."
Adam and Eve ate the apple from the tree of knowledge. They let themselves be seduced into thinking that the knowledge tree would bring them superior powers; that knowing more would mean being more. They challenged the original order and goodness of the universe by taking something that was not theirs to take. The fruit of the tree of knowledge was God’s sacred property. It was not for people to eat or use.
Adam and Eve did not die a bodily death for their transgression (at least not immediately), but they did die a spiritual one. They were expelled from paradise and condemned to a life of suffering. They would be alienated from each other and the land for the rest of their lives. In taking what was not theirs, they upset the balance of nature and ruptured their own interior balance.
We choose a path that leads to spiritual death and nature’s ruin whenever we take what is not ours, whenever we believe that our portion is not enough, whenever we assume that knowledge is a thing we can consume.
Yet, just as we have the power to spoil the Creation, we also have the power to make it whole. We have the power to mend the earth and to mend ourselves, to sew the pieces back together again.
Mending the earth and our selves demands sustenance and vision. It is a life-long task. It requires life-long love. I have chosen Judaism as the path I walk and the Bible as the sacred text I contemplate along the path. I offer them up to you in The Splendor of Genesis.
As a child in New England in the 50’s and 60’s, playing in nature was my raison d’etre. My life revolved around outings of all kinds: canoe trips, mountain climbing, bike adventures and rambles through the woods. I loved the feeling of being all tuckered out from a day well spent in the fresh air.
I was grateful to have an opportunity to pursue my love of nature in high school through an innovative program in environmental science. Each week we would visit various sites along the Ashuelot River in southern New Hampshire to determine the health of the river. Like real scientists, we waded out in the water to measure dissolved oxygen and various pollution indicators with our new Hach Kits. I was hooked on this emerging field of environmental studies and followed my interests throughout college.
My love for nature grew deeper as I watched it disappear before my eyes: forest clear-cut, rivers dammed, farms gobbled up. I feared for nature. In my own life, nothing was more central, but most people seemed unmoved by this destruction. They did not see what I saw.
I was frightened that we were destroying our Earth in vain attempts to aggrandize ourselves and I wanted in some way to transmit to others my sense of the preciousness of nature. When I graduated college, I taught high school biology. But the scientific information I tried to impart was not enough to motivate my students to care. Facts and figures got in the way of love and meaning, of genuine connection.
So I abandoned the traditional textbooks and, instead, introduced my students to the great nature writers. I designed a curriculum to teach various ecological and biological concepts using the stories of Annie Dillard, Loren Eiseley, Lynn Margulies. It worked; my students were captivated. The stories were the flesh and blood experiences that could bring the dry scientific bones to life. Stories and personal experiences, I discovered, find their way into the body and the heart, into the places that "information" alone will never go; and they stick. Learning becomes effortless through stories.
While I was teaching, I was on my own spiritual quest. I understood my relationship with nature as a kind of religion and I wanted to see what wisdom I could find from sacred texts. I had left behind the lackluster Judaism of my youth and had experimented with a variety of eastern practices and paths, but thought that I should revisit the Hebrew Bible to see if perhaps I might have missed something in my childhood. Reading the Bible afresh with ecologist’s eyes, I was amazed to find the distinguished place that nature holds in the stories, poetry, celebrations, holidays, law and prayers.
I realized that ecology and the Bible were using different languages to describe the same thing. The Bible and ecology both teach humility, modesty, kindness to all beings, a reverence for life and a concern for future generations. They both teach that the earth is sacred and mysterious. They both describe an interconnected universe, bound together through invisible threads. They both speak of life flowing in spirals and cycles and hold that all actions—no matter how small—yield consequences.
I began to see churches and synagogues, which hold the Bible sacred, as natural places to raise ecological consciousness. If you consider the fact that the Bible is still the most widely read book in the world, touching the lives of millions of people every day, and that it has served humanity as a guide for living for the past 3,000 years, it becomes clear that religious institutions could take a powerful leadership role in environmental repair. If churches and synagogues could teach people to read the Bible with ecological eyes and see spirituality in ecological terms, then we’d have a built-in infrastructure for expanding environmental awareness and practice. And since religious institutions also strive to teach people to "care," I dreamed that maybe they could inspire their congregants to care for nature.
My passion for nature and religion led me, with much trepidation, to start the first national Jewish environmental organization, Shomrei Adamah, "Keepers of the Earth." I had never been involved in organizational life before, had little knowledge of Judaism, and knew nothing about the established Jewish community (indeed, I was still pretty ambivalent about my own Judaism).
For ten years I worked with rabbis, scientists, environmentalists and writers around the country to create educational materials that would bring to life the ecological dimensions of the Bible and Judaism. We developed books and curricula that rabbis and educators could use with their congregants to illuminate the "natural" side of Jewish holidays, stories, ethics, law, and practices.
Even though the work was successful, I felt it was limited in its ability to reach a wide audience. And perhaps more important, I felt I had not fully articulated my own ecological vision.
Having long before witnessed the power of stories to transform the attitudes of my students, I imagined that one of the Bible’s most popular stories, Genesis I, could have the potential to reach a broad audience and open peoples’ hearts to nature.
The Genesis narrative was so familiar that for years I would just breeze through it. But even a surface reading yields ecological significance. Genesis I recounts the seven days and seven categories of creation: light on day one, air on the second day, waters and earth on the third day. Once the elemental habitats are created, their inhabitants move in: waters give rise to swimming creatures, air gives rise to flying creatures, and earth gives rise to walking creatures. The story is beautiful. Its lyricism and poetry eloquently express a sense of wholeness and a reverence for nature. I realized that Genesis I is indeed the Western World’s first environmental epic.
As I rooted around in the text, I discovered several eco-spiritual themes embedded within: the mystery of creation, the goodness of nature, the power of limits, the importance of diversity and sustainability, the ecology of time, the balance of work and rest, the interdependence of everything, and a sense of place, order, and harmony.
I also recognized mystical and mythic dimensions of the creations: soul is created on day one, intellect on the second day, emotions and actions on the third, time on the fourth, movement on the fifth, love and work on the sixth, and rest and eternity on the seventh. Genesis speaks to our inner nature, as well as to our outer nature.
Inspired by the text I committed myself to the task of illuminating its deep ecological message for others. This book, The Splendor of Genesis is my midrash—a story about a story—on Creation. To help me with my task, I have explored the teachings of my own tradition, the writings of the rabbis, as well as the wisdom of scientists, philosophers and poets through the ages. One of the great rewards of investigating ancient texts is finding what you thought were your own original ideas, clearly articulated by people who lived hundreds or thousands of years ago. Two rabbis in particular provided special guidance for me: Nachmanides (Rabbi Moshe ben Nachman), a thirteenth-century Spanish scholar, philosopher, physician, and poet, a renaissance man who brought a kabbalistic or mystical orientation to the text, and Samson Raphael Hirsch, a nineteenth-century German Orthodox rabbi who expressed an uncanny ecological perspective.
Today, as I write, the words of Rabbi Bahya ibn Pakuda, an eleventh-century Jewish philosopher, ring in my ears: "Meditation on creation is obligatory," he said. "You should try to understand both the smallest and greatest of God’s creatures. Examine carefully those which are hidden from you."
It is the pleasure and the work of each generation to bring the Bible to life. My job is to breathe new light into the very first chapter. This book considers the mysteries of Creation and offers back a reverence for life and a Creation ethic. In the end the Earth will become whole as we become whole, when we see nature as integral to our identities, and stewardship as an extension of our everyday lives.
Viewed 28946 times.
|
<urn:uuid:433faabe-08cb-4035-b2c7-000d542f7bcb>
|
CC-MAIN-2014-15
|
http://www.religion-online.org/showchapter.asp?title=3381&C=2787
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609526102.3/warc/CC-MAIN-20140416005206-00165-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.968344 | 2,305 | 3.1875 | 3 |
Traditions around St. Roch show him as a friend of Dogs who became a third-order Trappist - a lay person who lived as a poor pilgrim. After years of caring for the sick he also contracted the plague, and a nobleman's dog attended to him, bringing him food. Eventually the dog's owner discovered St. Roch and nursed him back to health. He is known also as the patron saint of epidemics.
We acknowledge St. Roch as a way to remember that God gives us a special gift in loving and being loved by dogs. They are unique companions to human life - often regarded as expressing unconditional love in a way rarely found elsewhere. This can remind us of God's unconditional love for us.
On this day, and in this week, we give thanks for and ask God's blessings upon dogs and dog owners and caretakers.
A word about the recognition of Saints among Protestants:
Why is a Protestant church talking about saints? Isn't that a catholic or orthodox thing? Well, yes and no. The traditions of recognizing the saints do derive from the Roman Catholic and Orthodox traditions. It is also true that they originate centuries before the Protestant reformation when nearly all Christians were one or the other (except in Egypt and India where other ancient Christian traditions had developed independently from the 1st Century).
Paul reminds us that we are surrounded by "so great a cloud of witnesses" which is meant to encourage and inspire us to deeper and bolder living of our faith. There is no notion of worshipping the saints, in the way that some cultures worship ancestors. Rather, it is drawing inspiration from their lives of virtuous faith and the power of the Holy Spirit demonstrated in and through them. We might even use them as a way to focus our prayerful intentions, similar to how we ask others to remember us in prayer or put us or a particular situation on their church prayer list. If we believe that those who dwell with God are living with God, and we pray directly to Jesus and the Holy Spirit (see Romans 8) to intercede with the Father on our behalf, then it is not beyond reasonable faith that we might imagine in our prayers these others who dwell in the spirit with God to also remember us in prayer.
This is no magic. And it certainly is not needed. According to consistent teaching of the Christian faith traditions, we clearly have direct access to God in our prayers. And yet, we do consistently ask others to intercede for us, and we do pray not only to the Father but also to the Son and Spirit.
We worship the triune God - Father/Son/Spirit - Creator/Redeemer/Sustainer. We also receive a vast array of helps and aids to our worship and spiritual growth from many different cultural heritages. So long as they help us draw nearer to God as revealed in Jesus the Christ, then they are sources of blessing and can be received and appropriated as such.
(The image above can be found and purchased here) http://www.modernartisans.com/p-1947-patron-saint-retablo-plaque-st-roch.aspx
You can learn more at the following links:
|
<urn:uuid:207675c3-bfe8-4d33-9a25-f48685119897>
|
CC-MAIN-2020-16
|
http://www.centralchristiandallas.org/blog/feast-of-st-roch
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371604800.52/warc/CC-MAIN-20200405115129-20200405145629-00385.warc.gz
|
en
| 0.968927 | 666 | 2.9375 | 3 |
Roland Piquepaille writes "We all want smaller and faster computers. Of course, this increases the complexity of the work of computer designers. But now, computer scientists from the University of Virginia are coming with a radical new idea which may revolutionize computer design. They've developed Tortola, a virtual interface that enables hardware and software to communicate and to solve problems together. This approach can be applied to get a better performance from a specific system. It also can be used in the areas of security or power consumption. And it soon could be commercialized with the help of IBM and Intel."
|
<urn:uuid:84f8c996-8a78-4e1f-95c5-a0d9eea1a384>
|
CC-MAIN-2014-10
|
http://tech.slashdot.org/story/07/06/04/1811257/a-hardware-software-symbiosis
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010657774/warc/CC-MAIN-20140305091057-00059-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.93245 | 121 | 2.875 | 3 |
Infection with HIV is an independent risk
factor for lung cancer, according to the results of a large US study published
in the online edition of AIDS.
Investigators from the US Department of
Veterans Affairs found that HIV increased the relative risk of lung cancer by
70%, even after controlling for other potential risk factors.
“We found that HIV infected Veterans had a
significantly higher incidence of lung cancer than uninfected Veterans,” write
the authors. “HIV infection was an independent risk factor for lung cancer
after controlling for potential confounders including smoking.”
Although it is rare, lung cancer is an
increasingly important cause of death in patients with HIV. The exact reasons
for this are unclear. The immune damage caused by the virus may have an
important role. Moreover, it is well known that there is a high prevalence of
smoking among HIV-positive people. In addition, the intensive medical
monitoring that should form an integral part of HIV care could mean that lung cancer
is more likely to be detected in people with HIV than in uninfected
Investigators from the Department of
Veterans Affairs – a major provider of free HIV care in the US – wanted to
establish a clearer understanding of the possible association of HIV with this
They therefore studied data from 37,294
HIV-positive individuals, which was matched with the medical records of 75,750
HIV-negative people. The participants all received care after the introduction of
effective antiretroviral therapy. The investigators calculated the incidence of
lung cancer for the two groups, and also undertook a series of analyses to see
if HIV was an independent risk factor for the malignancy. These analyses took
into account other possible risk factors, such as age, gender, smoking and
history of other lung diseases.
Median duration of follow-up was 5.8 years
for the HIV-positive people and 7.3 years for the HIV-negative individuals (p
The patients had a mean age of 46 years and
98% were men. Approximately half were black.
The HIV-infected participants were more
likely to be current smokers (48 vs 46%), to misuse drugs (19 vs 13%) or
alcohol (16 vs 15%), to be co-infected with hepatitis C (35 vs 15%) and to have a
previous history of bacterial pneumonia (5 vs 1%; all comparisons, p <
A total of 457 new cases of lung cancer
were identified in the HIV-positive patients and 614 cases among the
HIV-negative individuals. The incidence of the malignancy was therefore 204
cases per 100,000 person-years for the HIV-infected patients and 119 cases per
100,000 person-years for the HIV-negative people in the control group. Incidence was therefore
some 70% higher in the HIV-positive
participants (IRR = 1.7; 95% CI, 1.5-2.0).
Next, the investigators compared the
characteristics of the HIV-positive and HIV-negative participants who developed
lung cancer. They found that those with HIV were older (51 vs 45 years),
were more likely to be white (47 vs 38%), had a higher prevalence of current
smokers (57 vs 48%), had increased rates of chronic obstructive pulmonary
disease (11 vs 4%) and were also more likely to have a been diagnosed with bacterial
pneumonia (8 vs 5%; comparisons, p < 0.001 or p = 0.01).
After taking into account other factors
associated with lung cancer risk, the investigators found that HIV remained a
significant, independent risk factor for the malignancy (IRR = 1.7; 95% CI,
1.5-1.9, p < 0.001).
Other risk factors included older age,
being a current or former smoker, having a history of chronic obstructive lung disease
(all p < 0.001), and a history of bacterial pneumonia (p = 0.007).
Sensitivity analyses, one of which
purposefully over-estimated the prevalence of HIV-positive participants who were
current smokers, confirmed the significant association between infection with
HIV and an increased risk of lung cancer (IRR = 1.2; 95% CI, 1.1-1.4).
Cancer stage at the time of diagnosis was
similar for the HIV-positive and HIV-negative participants. “The increased
incidence of lung cancer among the HIV infected patients does not appear to be
explained by more vigilant surveillance,” comment the investigators.
Although they found no significant
association between lung cancer risk and current CD4 cell count or viral load,
the researchers note that such associations have been found in other studies.
They write: “For the purposes of understanding the relationship between
immunodeficiency and lung cancer risk among HIV infected patients, we plan to
conduct more sophisticated analyses with time-updated modeling of CD4 cell
The authors believe their findings may
actually under-represent both the incidence and risk of lung cancer for
patients with HIV. They therefore conclude: “Additional investigations are
required to understand the mechanisms by which HIV infection may increase the
risk for lung cancer.”
|
<urn:uuid:8722ebf4-650e-4c2c-a4ef-03691708c6d7>
|
CC-MAIN-2014-10
|
http://www.aidsmap.com/HIV-is-an-independent-risk-factor-for-lung-cancer/page/2277271/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010893879/warc/CC-MAIN-20140305091453-00072-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.946922 | 1,113 | 2.609375 | 3 |
The latest news from academia, regulators
research labs and other things of interest
Posted: May 26, 2008
Plastic packages of enzymes upgrade human cells in lab
(Nanowerk News) Swiss researchers have found that the insertion of tiny plastic packages of enzymes in human cells may help upgrade their metabolisms, without having to alter their genes.
Researchers at University of Basel believe that their technique might open the door for advanced cancer treatments, or even upgrade a person's metabolism.
In their study report, the researchers pointed out that the cells of multi-cellular organisms and some advanced single-celled organisms have internal compartments called organelles to carry out specialised metabolic functions.
They revealed that they used artificial polymer organelles in lab experiments to upgrade live human cells.
Lead researcher Wolfgang Meier said that his team coated their polymer vesicles in a chemical, which encouraged human white blood cells called macrophages to engulf them.
He revealed that there were enzymes in the small capsules that produced fluorescent chemicals, through which they signalled that they were working without problems inside their new host.
The researcher also said that the artificial organelle's membrane could be chemically tuned to control which chemicals could pass through it, and regulate the reactions inside.
"We call it a 'nanoreactor'," New Scientist quoted him as saying.
Meier further said that the artificial organelles could also work in other human cells, and thus lead to the development of a new cancer therapy that would trick diseased cells into poisoning themselves from the inside out.
He said that such organelles could couild pave the way for a method to introduce enzymes with the ability to convert into "prodrug", used in advanced chemotherapy these days, actually inside cancer cells where it can be more effective.
"You can create, inside these cells, a little compartment that is able to convert the non-toxic prodrug into a toxic drug that kills (them). There would be no other enzyme in the human body available that can catalyse this reaction," he said.
Meier said that the artificial organelles might also be helpful in curing conditions that result from a deficit of a particular enzyme-such as administering patients with lactose intolerance organelles carrying lactose-digesting enzymes to help their digestive cells work properly.
He even envisions that introduction of non-human metabolic functions into human cells in the future.
"We could, in principle, bring in a nanoreactor that (lets) your skin do something like photosynthesis. So if you are hungry, you just lie in the Sun," Meier said.
He, however, agreed that clinical trials of the artificial organelles were still a distant prospect.
|
<urn:uuid:f4a825dc-7ad5-4193-b451-c484c772cf90>
|
CC-MAIN-2017-34
|
http://www.nanowerk.com/news/newsid=5830.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104631.25/warc/CC-MAIN-20170818082911-20170818102911-00678.warc.gz
|
en
| 0.962484 | 559 | 2.828125 | 3 |
South African officials say poachers killed 21 rhinos in January, despite new efforts to crack down on the practice.
National Parks chief David Mabunda says the government is determined to stop the poaching, which killed 333 rhinos in 2010.
In a statement Monday, authorities said park rangers have killed five suspected poachers in skirmishes since the start of the year. They have also arrested 31 suspects.
Government officials and conservation groups say sophisticated criminal networks are behind a rise in rhino poaching. They say poachers use helicopters, night-vision equipment, silencers and animal tranquilizers to kill the animals and avoid being caught.
Rhino horns are in high demand on the black market. In some Asian countries, the horns are seen as having mysterious powers and are used as aphrodisiacs or healing agents.
South Africa is home to about 21,000 rhinos, more than any other country in the world.
The government launched a wildlife crime investigation unit in October.
|
<urn:uuid:abef6b08-7d33-4758-b6fe-ac1a67a91587>
|
CC-MAIN-2017-34
|
https://www.voanews.com/a/south-africa-21-rhinos-poached-in-january-114945219/160648.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102993.24/warc/CC-MAIN-20170817073135-20170817093135-00136.warc.gz
|
en
| 0.949071 | 202 | 2.546875 | 3 |
COVID-19 is a virus caused by the same coronavirus that causes SARS. It can be especially dangerous for people over 60, people with chronic illnesses, and those with weak immune systems. The disease is not common in the majority of people, but the following are at greater risk. These are the ones you should be aware of. You should get treatment as soon as you become ill. This article will provide an overview of the virus and help you to identify if you suspect you are infected. In case you have any concerns about where by as well as the way to employ PCR test Windsor, you are able to e mail us in the web site. People with various mental or physical conditions can also use CBD oil. This article will highlight some of the best benefits of CBD for pain. Let’s explore what you need to know about this plant!
PCR tests are administered to detect whether a person is infected with COVID-19. This test is more accurate than COVID-19. Even if there are no symptoms, it can be done. The virus is detected by taking a sample of the nose and mouth of the patient. This can take a few days, so it’s important to see a doctor as soon as you notice any changes in your respiratory system.
The CDC recommends the PFIZER vaccine for people who are at high risk of getting COVID-19. However, the vaccine is not fully effective. Both COVID-19 (and SARS) vaccinations are essential to combat the pandemic. They can also prevent SARS-infected people from spreading the disease. It is important to see your doctor if you have concerns about the virus. It is important to fully understand the benefits and check risks of PCR tests and ensure that you are choosing the right test for you.
A COVID-19 vaccine campaign was launched in several countries recently. Other countries have started mass vaccination campaigns. Other methods can be used to stop the spread of the disease. These include social and physical distancing. Proper ventilation of indoor spaces is essential to avoid the transmission of the virus. Use of face masks and covers for coughing in public places is also a good idea. Treatments for the infection include primary care, supportive care, isolation, and experimental measures.
In light of the recent COVID outbreak, the CDC has revised its recommendations to the public. These guidelines are intended for check anyone who is at risk of contracting COVID-19 or has been in close contact with someone with the disease. Although they may not have any symptoms yet, this person is still infected and has a positive test. This means that they have been exposed and have developed an immune response to COVID-19.
COVID-19 can be detected using several tests. The antigen test is a less accurate method than the PCR test, but it’s still useful in some cases. It is free and available at many locations in New York City. If you are in doubt about the results, consult your physician and get the COVID-19 test done. A health professional should be consulted if you believe you might have the disease.
If you have any concerns relating to where and ways to use PCR test for travel near me, you can call us at the web page.
|
<urn:uuid:a0c270b1-46f9-49b2-b2ce-d32a833d084a>
|
CC-MAIN-2023-40
|
https://aboutsoniasotomayor.com/4631-a-brief-overview-of-covid-19-22/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510358.68/warc/CC-MAIN-20230928031105-20230928061105-00152.warc.gz
|
en
| 0.968946 | 668 | 3.46875 | 3 |
Focus on the pronunciation of negative
English definition of “negative”
/ˈneg·ə·t̬ɪv/ adj (NO)
› expressing no or not, or expressing refusal: We received a negative answer to our request. › A negative sentence or phrase is one that contains a word such as no, not, nor, never, or nothing. › A medical test that is negative shows that you do not have that disease or condition.
|
<urn:uuid:d9d42568-8ce3-4514-ab82-58f0d6409a15>
|
CC-MAIN-2013-48
|
http://dictionary.cambridge.org/dictionary/american-english/negative_1
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163065002/warc/CC-MAIN-20131204131745-00062-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.934521 | 98 | 3.34375 | 3 |
Taj Mahal (illustrative purpose only)
Google's World Wonders Project is a 360-degree online imagery of many of the world's heritage monuments. And now Google India, in partnership with the Archaeological Survey of India and the Ministry of Culture, has created a virtual walk-through tour of over 30 iconic Indian Heritage Sites.
Starting today, people anywhere in the world (armed obviously with an internet connection) will be able to tour monuments like the Taj Mahal through online Street View. Google has released the 360-degree imagery on Google Maps and the Google Cultural Institute.
Heritage monuments including the Taj Mahal, Humayun's Tomb, Red Fort, Agra Fort, Fatehpur Sikri, Amaravati Buddhist Stupas, Guntupalli Caves, Aga Khan Palace and Raigad Fort are among the 30 already completed, all of which are over 100 years old. And ASI and Google aim to take the number of Indian heritage sites viewable online to a massive 100.
Here are videos that show how Google's World Wonders Project works -
Google's World Wonders Project video
Shows the Street View Trekker device
IndiaToday.in has plenty of useful resources that can help you better understand the coronavirus pandemic and protect yourself. Read our comprehensive guide (with information on how the virus spreads, precautions and symptoms), watch an expert debunk myths, and access our dedicated coronavirus page.
Get real-time alerts and all the news
on your phone with the all-new India Today app. Download from
|
<urn:uuid:615ce833-ba3f-4d0c-a009-864f28de7456>
|
CC-MAIN-2020-29
|
https://www.indiatoday.in/india/story/google-world-wonders-project-archaeological-survey-of-india-asi-ministry-of-culture-heritage-monuments-maps-cultural-institute-181964-2014-02-20
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655898347.42/warc/CC-MAIN-20200709034306-20200709064306-00143.warc.gz
|
en
| 0.875952 | 323 | 2.65625 | 3 |
(for veterinary information only)
22.7 mg, 68 mg, and 136 mg
Until sulfa drugs came on the scene in the 1940s, our efforts to combat bacterial infection were largely ineffective. As different antibiotics were developed, different types of bacteria were conquered, yet one bbacterial species remained seemingly invincible: Pseudomonas aeruginosa. Eventually antibiotics (the aminoglycoside class) were developed that could kill Pseudomonas but they were available only as injectable products and had potential to cause significant kidney damage if used too long. With these kinds of side effects and the ability to treat Pseudomonas limited to hospitalized patients (where injections could be given regularly), the battle with Pseudomonas was far from won.
A major breakthrough was the development of the fluoroquinolone class of antibiotics (including enrofloxacin, its counterpart for human use ciprofloxacin, and several others). These medications are active against many bacterial types including Pseudomonas. They are available as tablets and are not associated with the serious side effects that plagued the aminoglycoside group.
(Photocredit: NIH Public Image Library)
Fluoroquinolones act by deactivating bacterial enzymes necessary for the transcription of DNA. DNA is very tightly coiled in order to fit inside a cell. Segments to be used must be uncoiled by an enzyme called DNA gyrase. The fluoroquinolone antibiotic deactivates DNA gyrase making the reading of DNA impossible. The bacterial cell dies. Mammalian DNA gyrase is of a completely different shape and remains unharmed.
This medication may be used in either dogs or cats to combat different types of infections, especially those involving Pseudomonas. Enrofloxacin is also active against Staphylococci, and thus is commonly used for skin infections.
At approximately ten times the recommended dose vomiting and diarrhea may be seen with this medication. At normal doses, this should not be seen. Dogs with Pseudomonas ear infections require very high doses of enrofloxacin and nausea may indeed become a problem.
In immature dogs (less than 8 months of age) damage to joint cartilage can occur. This phenomenon is only seen in growing dogs and does not seem to be a problem in cats. It is preferable not to use this medication in puppies unless the severity of the infection present warrants it.
The use of enrofloxacin can produce crystals in urine. These crystals may show up on a laboratory test thus it is important to be aware of this side effect. Enrofloxacin crystals should not be confused with more clinically relevant struvite, oxalate, or urate crystals.
See retinal damage below regarding the recently described feline retinal problem associated with enrofloxacin at higher doses.
Sucralfate (a medication used to treat stomach ulcers) may bind enrofloxacin and prevent it from entering the body. These medications should be given at least 2 hours apart if they are used together.
Theophylline (an airway dilator) blood levels may be higher than usual if this medication is used concurrently with enrofloxacin. The dose of theophylline may need to be reduced.
If enrofloxacin is used with oral cyclosporine (an immunosuppressive medication used for inflammatory bowel disease), the kidney damaging properties of cyclosporine may become worse.
Medications or supplements containing iron, zinc, magnesium or aluminum will bind enrofloxacin and prevent absorption into the body. Such medications should be separated from enrofloxacin by at least 2 hours.
Enrofloxacin tablets are enteric coated to hide the drug's naturally bitter taste. If the tablets are crushed for some reason, the bitter taste is more readily apparent. Crushing tablets to put in an animal's food is unlikely to be an effective way to administer enrofloxacin. Recently, Bayer has manufactured an alternative called a flavor-tab that is much more palatable than the purple-colored enteric coated tablets. The tan colored flavor-tabs are more easily crushed and mixed in food.
Pseudomonas infections are especially common in ears. In this location, especially high doses of enrofloxacin are needed to clear this infection. Expect to give a lot of pills and be prepared for expense.
Enrofloxacin has toxic properties in humans. It is for veterinary use only.
Enrofloxacin should not be used in pregnant, or nursing pets or in immature dogs unless the severity of the infection warrants it.
Enrofloxacin may lower the seizure threshold (meaning that it can facilitate seizures). This is not a problem for normal animals but fluoroquinolones are best not used in animals with known seizure disorders.
Retinal damage has been seen in cats when higher doses (such as might be used to treat a Pseudomonas ear infection) are used. This reaction is not common even with very high doses, but there is no way to predict which cats will react. Blindness, temporary or permanent, can result. This reaction has only been reported with enrofloxacin and not with other fluoroquinolones, as it is theorized that the biochemical structure of enrofloxacin leads to especially high concentrations in the feline eye (in other words, this reaction is theoretically possible with any fluoroquinolones but enrofloxacin is especially predisposed to causing this reaction).
Enrofloxacin can occasionally lead to the production of enrofloxacin crystals in the urine. For more information, click here.
Page last updated: 12/1/09
|
<urn:uuid:826b2715-679d-4ede-af5f-0f38dbc337e7>
|
CC-MAIN-2014-10
|
http://www.marvistavet.com/html/body_enrofloxacin.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999653106/warc/CC-MAIN-20140305060733-00082-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.931665 | 1,223 | 3.46875 | 3 |
Here’s why this day, this year, this inauguration is so exciting and special. When our first African-American President is sworn in for a second term he will acknowledge several important historic events and ideals converging. The alignment is amazing.
- President Obama will be sworn in on two Bibles: one that was once owned by Rev. Martin Luther King Jr. will sit on top of another previously owned by President Abraham Lincoln.
- This year is 150 years since the signing of the Emancipation Proclamation by President Lincoln which freed the slaves in the Confederate States and Territories (January 1, 1863).
- This year is 50 years since Rev. King led his historic March on Washington for Jobs and Freedom where he delivered the “I Have A Dream” speech (August 28, 1963).
- Today, the third Monday in January, is usually set aside to celebrate the National Holiday of Dr. King’s Birthday.
- Next month is the 100 anniversary of the birth of Rosa Parks (February 4, 1913).
- One of the marching bands participating in the parade today comes from Little Rock Central High School. In 1957, LRCHS became the focal point for enforcing the 1954 Integration Ruling by the Supreme Court. On the morning of September 23, 1957 nine African-American students were met by an angry mob of 1,000 white protesters denying them entry into the school. Once a poster child for segregation, today Little Rock’s band will feature students of African, Asian, European, Hispanic, and Native American ancestry.
Although the crowd is predicted to be less than half of what it was in 2009, that’s really the wrong way to measure the events of today. The actions of this day will be a direct link through the lives of thousands of Americans: to their blood, sweat, and sacrifice reaching all the way back to Crispus Attucks, the first martyr of the American Revolution. Today, the actions of the Great Emancipator, the seamstress who sat down to stand up and the King Who Dreamed will all be affirmed when Barack Hussein Obama takes the oath of office for a second time. We may not be a perfect country. We might be divided on many issues. However, we can all take satisfaction in the notion that, as Dr. King said, “The moral arc of the universe is long, but it bends toward justice.” That is a comforting thought.
|
<urn:uuid:a3c7d12c-19de-4665-a236-274a9734f5d8>
|
CC-MAIN-2023-40
|
https://startrekaod.net/2013/01/21/1863-1963-and-2013/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506686.80/warc/CC-MAIN-20230925051501-20230925081501-00181.warc.gz
|
en
| 0.960937 | 503 | 2.90625 | 3 |
Toll Free: 1-888-393-5663
This workbook contains ready-to-use lists of words which account for half of misspellings by high school students. Dictation sentences to follow each list are included. Recommended for students in 6th grade and above. 64 pages, 8 1/2"x11".
It's never too late to learn to spell! This one-year program reviews words which account for over half of misspellings by high school students. Spell Well includes 24 ready-to-use lists of 20 words each, with additional spaces on each list for review words. Dictation sentences to follow each list are provided, as well as suggestions for daily practice and homework. Recommended for student 12 years of age and older who have not used the Spelling Plus program.
Although you can use it to follow Spelling Plus, a lot of words are on both lists. The Spell Well list was one of several source lists for the 1000 words in Spelling Plus.
For over 30 years Nature’s Workshop Plus has been bringing quality, educational materials to families across the country. From anatomy to zoology, we have projects and books to meet the interests of you and your children.
View inside our entire store with Street View!
Copyright © 2015 - Nature's Workshop Plus!
|
<urn:uuid:e8755768-6872-46df-8a10-a876de32a81f>
|
CC-MAIN-2017-43
|
https://www.workshopplus.com/ProductCart/pc/viewPrd.asp?idproduct=464&idaffiliate=4
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823350.23/warc/CC-MAIN-20171019160040-20171019180040-00002.warc.gz
|
en
| 0.937354 | 272 | 2.546875 | 3 |
Elizabeth Blackwell Biography (1821-1910)
- Anglo, American
Elizabeth Blackwell was born into a family of social activists. The third ofnine children, Blackwell was born in Bristol, England on February 3, 1821. Her parents moved the family to New York City when Elizabeth was 12, and her father immediately became active in the abolitionist movement. Unfortunately, after an 1838 move to Cincinnati, Ohio, the family's luck turned sour. Their previously secure finances failed, and Mr. Blackwell died, leaving his familynearly destitute. His daughters opened a young ladies' boarding school in order to provide for the family.
In 1842, Elizabeth Blackwell moved to Henderson, KY to teach, but she found the climate of racism unacceptable and quickly left after only one year. She went back to Cincinnati, and then on to Asheville, NC, where she again began teaching. Here in Asheville, Blackwell began studying medicine on her own. Shecontinued her private medical studies in Charleston, SC, where she also taught at a girls' school.
Blackwell began seeking a medical school which would allow her entrance. Seventeen rejections later, she sent an application to Geneva Medical College (now Hobart and William Smith Colleges). The myth around her eventual acceptanceinto Geneva Medical College involves the faculty thinking that the idea of awoman applying to medical school was completely preposterous. In fact, theywere so convinced that no woman would ever do such a ridiculous thing, that they believed Blackwell's application to be a joke or a hoax. In the spirit ofgood humor, the faculty went along with the joke by voting "yes" unanimouslywhen her application was presented for vote. Thus was Elizabeth Blackwell'sapplication, neither a joke nor a hoax, accepted for admittance to the GenevaMedical College; the first woman in America ever to attend medical school.
Blackwell endured a lot during her medical studies. The attitudes of her malecolleagues and her male teachers ranged from cold to blatantly derisive. Shewas socially isolated from her all-male peers, and subject to any number ofcruel practical jokes. She showed incredible strength, persistence, and determination, graduating at the top of her class on January 12, 1849. She accepted her diploma from the college president, Benjamin Hale, stating: "Sir, by the help of the Most High, it shall be the effort of my life to shed honor on this diploma."
Blackwell attempted to pursue advanced training in surgery in Paris, but wasspurned by the male medical establishment. Instead, she was assigned to serveas a midwife at a large maternity hospital. During her time there, Blackwelldeveloped purulent conjunctivitis, and became blind in one eye. Due to thishandicap, Blackwell forfeited her plan to study surgery, and left for London.Here she practiced at St. Bartholomew's Hospital until 1851, when she returned to New York.
In New York City, the era's prevailing sexism again thwarted Blackwell's plans, as she was repeatedly denied employment as a physician because she was a woman. Circumventing the male medical establishment, she and her sister Emily(also a physician) worked together to create their own private practice in atenement building. This practice grew to become the New York Infirmary for Women and Children. The staff was entirely composed of women.
Blackwell established a nurses' training program at the infirmary to help supply medical help for the Union Army during the Civil War. Later, in 1868, thetwo Blackwell sisters founded Women's Medical College of the New York Infirmary, to provide medical training for women seeking to become physicians.
In 1869, Blackwell returned to London. She established and ran a large practice, and in 1875 helped to found the London School of Medicine for Women, where she served as chair of gynecology. Blackwell also spent a good deal of timewriting and lecturing on disease prevention and hygiene. Blackwell was the first woman ever listed in the British Medical Register, and was involved in founding the National Health Society. Scorned and ridiculed in the United States, Blackwell was appreciated in England. Blackwell died in Hastings, England, on May 31, 1910.
|
<urn:uuid:6c9520a4-1d8c-4818-9e01-6719b85a0363>
|
CC-MAIN-2014-35
|
http://www.faqs.org/health/bios/37/Elizabeth-Blackwell.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500835119.25/warc/CC-MAIN-20140820021355-00321-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.978186 | 864 | 2.8125 | 3 |
Beach Leaders Discuss Efforts to Clean Up the Gulf
MADEIRA BEACH — Members of the Barrier Islands Governmental Council got a lesson in how fragile Florida’s waters are and how problems can be dealt with.
At the BIG-C monthly meeting April 24, Maya Burke, science policy coordinator for the Tampa Bay Estuary Program, told the mayors of the beach communities how research and perseverance have managed to clean up the Gulf waters, which at one point had poor quality.
Back in the 1950s, the water was murky and of poor overall quality. Researchers discovered that the lack of seagrass was contributing to the problem.
They then tackled the issue of getting more seagrass to grow by managing nitrogen levels in the water, which decreased the amount of algae. That led to a clearing up of the water which let more light reach into the water which in turn let more seagrass grow.
Burke said it is suspected that the seagrass helps lower the acidification of the water, which in turn helps shellfish.
Another example of the fragile ecosystem in Florida is the situation involving mangroves and other marsh growth.
Burke said the mangroves, which are protected, have made a strong comeback, to the detriment of marsh growth.
“It is one example of change in our habitat locally,” she said. “The mangroves are taking over marsh growth. This is not a judgment, just the way it is. Climate change has meant that we don’t have as many cold snaps therefore nothing to kill some of the mangroves.”
Burke called many of these issues “wicked problems.”
“We call them that because they are complex, they are always changing and there is no definitive solution,” she said. “The best way to deal with the changes in habitat and water quality is to work together.”
She brought up the issue of incremental interventions, or dealing with environmental issues one step at a time.
“Some people say we don’t have time for incremental interventions,” she said. “They want to tackle the big picture right away, but we must do everything. Every action we take for positive improvement is important.”
“We’re still learning and we’re monitoring it bit by bit,” she said.
Burke urged the mayors to consider joining and supporting the Tampa Bay Resilience Coalition. The coalition is a group made up of most of the counties around Tampa Bay and several local municipalities.
The group plans strategies and way to combat problems such as sea level rise and water quality. The group’s website notes that by working together the region has a better chance for federal funding to deal with the problems.
Burke, as part of her presentation, has a picture of her small son. She said it serves as a reminder to her that the fight must continue.
“I grew up here in Pinellas County and he was born here,” she said. “I want him to enjoy the benefits that I enjoyed.”
“We have to consider our legacy for this place that we all love and call home,” she said.
Andy Squires of Pinellas County’s Public Works Department gave an update to the council about ongoing beach renourishment issues.
He said preparation work for renourishing Upham Beach is underway and they should actually start pumping sand on June 1.
He said the Army Corps of Engineers is now seeking the money to do renourishment in Pass-A-Grille in 2021.
Squires said the next major renourishment is due in 2023 or 2024. Work is already underway to obtain the easements needed to do the work. He said 386 more easements are needed and it will take at least a year to obtain them.
|
<urn:uuid:3d3aa140-2040-42c2-851b-6c77925aa9e0>
|
CC-MAIN-2023-23
|
https://www.slblocal.com/beach-leaders-discuss-efforts-to-clean-up-the-gulf/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648695.4/warc/CC-MAIN-20230602140602-20230602170602-00028.warc.gz
|
en
| 0.970197 | 832 | 3.015625 | 3 |
Diego Velazquez. (1599 – 1660). The Waterseller of Seville. El Aguador. (1623). Oil on Canvas. 41 in × 31 in.
This major painting of the artist and does not have an equivalent in the work of Velasquez. Moreover it illustrates the importance of the details in painting to be able to explain an allegory.
At the 10 years age Diego Velazquez enters to the workshop of Francisco de Herrera the old in Seville. Then until 1617 he works with Francisco Pacheco. Although often regarded as a painter without scale and banal Pacheco can express a very direct realism. The pupil quickly exceeds the Master and in 1617 Diego Velasquez is received Master. In 1618 he marries the girl of Pacheco and opens his workshop in 1820. In Seville, the Water carrier or Aguador (commercial of water) was a useful character of the daily life. At that time of course there is no running water. The genres scenes without religious or mythological connotations are rare in the work of Velasquez, celebrates especially for its portraits. The treatment of the light to the manner of Caravage (1571 - 1610) makes it possible to the painter to oppose in his composition the crystal of glass to the sandstone of the earthenware jar to the foreground but also the smooth skin of the young boy and the wrinkled face of the water carrier, much older. In the center and the background there is an adult drinking. Thus as the painting is a succession of 3 portraits at 3 ages different from the life much of commentators see in work an allegory of the life and time which passes. We will see that the allegory is very thorough and that it is carried out on several levels. But especially the painting is build on the large downward diagonal, clothing of the water carrier are perforated and in sorry state, the pallet of the colours is especially made up of tons which go from gilded the orange one to chestnut. They are the characteristics of works of another painter of Seville. Bartolomé Esteban Murillo (1618-1682). Technically this painting is the proof of the influence of Diego Velasquez on Murillo. When 25 years later Murillo will put at painter the children streets of Seville it is this painting which inspires it.
Except for a thing, the children of Murillo, poor wretches, in rag, always have the smile, here not. The characters are serious and melancholic persons. When water runs out the life also runs out it, time passes and leaves its marks, on the walls of the earthenware jar, clothing of the water carrier torn and on its wrinkled face. In front of the revelation of the image of his body forfeiture the man does not laugh.
The point of view of the spectator is between the 2 faces of the foreground.
The glance can either go up towards the face of the water carrier or to go down towards glass from water.
The face of the young boy is on the natural point of interest left superior.
The Earthenware jar and the hands of the characters are on the natural points of interest Inferiors.
The painting can be read on several level.
In top 3 ages of the life. 1/ the child. 2/ the adult. 3/ the old man.
On the left, the smooth wall of the jug returns to the transparency of glass then to the smooth skin of the child. On the right, the furrows on the walls of the earthenware jar are taken again by the folds of clothing and the wrinkles of the face.
The painting is built on the 2 large diagonals which are downward.
A great majority of the guiding lines plunge downwards.
The glances of the water carrier and the young boy fall to the bottom and the glance of the spectator follows the same direction.
A current interpretation declares that water glass would be the cut of knowledge that the old man would tend to the young boy. In this case considering the mine of the 2 characters this knowledge is not at all amusing.
The face of the water carrier is extremely marked. The wrinkles of the face are numerous, the wrinkles of the cheeks and of the neck are deep.
Its countenance is sad and serious. If the painting is an allegory this one is certainly not optimistic. As the glance of the two characters goes down the key of the allegory is located at the bottom of the painting.
The mine of the child is completely cut down. The expression of its face lets appear much sadness and of gravity. It would be said almost that it will cry.
Water is symbol of life, there is no objective reason to be sad when water is received and that one will drink. But if water is also an allegory of blood and tears which must run, and it is what is known as on the wall of the earthenware jar, this revelation causes a negative emotion and an awakening of the character relentless of the existence and all the sufferings which can mark a life.
Water drops run out on the edges of glass returning to the drops which run out on the wall of the earthenware jar.
The Earthenware jar: An allegory of the human condition.
Water drops run out on the wall of the earthenware jar. These drops constitute a loss and they return to the other drops, higher, slipping on the edge of glass. They evoke the tears which will have to run cheeks of the man. As Velazquez lets appear red on the wall of the earthenware jar, the same red that it uses on the cheeks of the child the drops symbolize also blood. Blood and tears here an allegory of the human condition which explains the serious and afflicted expression, completely melancholic person and bitter of the faces of the water carrier and the young boy.
The picture is enlightened of in bottom on the left. This type of lighting popularized by Caravage as if a projector lit the scene on with dimensions one tends to dramatize works which are found located between light and half-light. What has little importance is not enlightened.
Harmonize and contrasts.
Harmonize between hot colours.
Similar Paintings :
Diego Velázquez. (1599 – 1660). Old woman Making Fry eggs. 1618.
Diego Velázquez. (1599 – 1660). Lunch of Peasants. 1622.
Diego Velázquez. (1599 – 1660). The Forging mill of Vulcan. (1630, Museum of Prado, Madrid).
|
<urn:uuid:911f1b9e-546e-4e0a-8a34-6b2c06740ea5>
|
CC-MAIN-2020-10
|
http://painting-analysis.com/waterseller_velazquez.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145316.8/warc/CC-MAIN-20200220224059-20200221014059-00225.warc.gz
|
en
| 0.943541 | 1,387 | 2.859375 | 3 |
Over the last few years, the trend of vaping has exploded across the world, with countless new manufacturers of both liquids and vape kits coming to market. Indeed, vaping has become so big that even the traditional cigarette manufacturers are beginning to sit up and take note, with many now producing their own vape products.
The anti-smoking movement has been growing in both pace and popularity since the 80s and, with the risks and dangers posed by smoking now widely reported, and in the public domain, a considerable percentage of smokers are now turning to vape products to help them quit smoking while still maintaining their nicotine fix.
Vaping vs. smoking normal cigarettes – some figures
While more research is needed into the relative safety of vaping as compared to smoking, most medical practitioners are convinced of the merits of vaping being considerably safer than ingesting traditional cigarette smoke. There are approximately 600 different ingredients in cigarettes that produce more than 7,000 individual chemicals when burned. Of these, a high percentage are known to cause cancers – with many also being toxic.
By comparison, vape smoke contains mostly water vapor – though it is important to remember they still contain nicotine (often added separately to the liquid by the user) as well as flavorings, propylene glycol, vegetable glycerin, and some other chemicals.
Nonetheless, the medical industry is mostly in agreement that vaping is safer – although most also suggest more research needs to be done moving forward to evaluate the possible long-term consequences of vaping.
The information on the dangers of smoking is well-documented already
Most people are more than aware that smoking is dangerous and bad for their health – let’s face it, there’s been more than enough public information out there already to make this message unmistakable. From moves by governments around the world to reduce where smokers can have a cigarette to the extensive health/well-being advertising and even redesigned cigarette packaging showing the results of smoking, it would be very difficult not to know and understand the dangers.
The multiple levels of addiction of cigarette smoking
Nicotine is considered among the five most addictive substances in the world (alongside cocaine, heroin, alcohol, and methamphetamine), making cigarette smoking an extremely hard addiction/habit to break.
However, the addiction to smoking cigarettes goes far beyond just the drug itself. It also commonly has many other sides – namely the emotional attachment many smokers feel with the act of smoking, the physical aspect of putting a cigarette to your mouth, and even the fact that many people see smoking as a natural part of their daily routine. While it’s true that nicotine replacement therapy solutions can help with the natural cravings for the drug, these other aspects are far harder to counter.
How vaping can help smokers kick the habit
With vape kits, ex-smokers can achieve something very close to smoking’s natural sensation but with the vastly reduced dangers of the toxins included in cigarette smoke. Unlike just patches, gum, etc., ex-smokers can still enjoy the sensation of smoking. And, of course, that same vapor will have been mixed with nicotine (in most cases – some people prefer zero-nicotine liquids), so the user still gets their fix of the drug.
Recently, there has been an explosion in the number of flavors available on the market – everything from traditional cigarette-tasting smoke to fruits, gums, and drinks. In addition, vapers are now increasingly moving to making their own strength mixes, taking the base liquid and adding as much nicotine as they feel they need.
How to get started vaping
When you’re just starting out, the world of vaping can seem a very confusing place – and, unless you paid a lot of attention in physics at school, the idea of watts, ohms, resistance, etc., can also appear dizzyingly bewildering. The best advice is to check online to learn exactly how e-cigarettes work and the relationship between power and strength/the amount of vape ‘smoke’ you’ll produce.
Alternatively, most major towns and cities now have dedicated e-cigarette shops where you can go for advice on the kit you need and what will work best for you. Most retailers will begin by asking you how much you currently smoke and the strength/flavor of your favorite brand (e.g., some people prefer menthol or flavored cigarettes). Working with this information, a skilled shop owner will be able to suggest the best kit and equipment for you – and will even be able to point you in the direction of the juices (plus strength) they think will suit you.
To read more on topics like this, check out the Lifestyle category
Leave a Reply
|
<urn:uuid:d82a0108-0421-4176-adb3-53ede99ae1d3>
|
CC-MAIN-2023-14
|
https://www.planesandchoppers.com/lifestyle/how-vaping-might-be-able-to-help-you-stop-smoking/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949093.14/warc/CC-MAIN-20230330004340-20230330034340-00341.warc.gz
|
en
| 0.959092 | 954 | 2.71875 | 3 |
Monday 15 October
Shells and the hard body parts of corals and crustaceans rely on a mineral called calcium carbonate for their structure. But calcium carbonate (CaCO3) takes many forms, and a rare form was recently discovered in sea ice.
Dr Gerhard Dieckmann from the Alfred Wegener Institute for Polar and Marine Research in Germany was among those who obtained the first evidence of rare calcium carbonate crystals, known as ikaite, in Antarctic sea ice in 2001. Now Dr Dieckmann is part of the SIPEX II voyage, searching for these ‘diamonds in the sea ice’.
“These crystals appear when sea ice forms,” Dr Dieckmann says.
“The very salty brine in the sea ice undergoes physical and chemical changes that lead to the precipitation of ikaite from the briny liquid. But the distribution of these crystals in sea ice is patchy.
The significance of these crystals in sea ice is not fully understood, but scientists think they may play a role in the sea ice-driven carbon pump (the movement of carbon from the sea ice to the ocean below), through the release of carbon dioxide when the crystals form. Ikaite formation may also cause acidification of sea ice brine, triggering the release of ozone-destructive bromine from sea salt. A better understanding of the role of ikaite in the carbon cycle and its distribution in sea ice will therefore allow scientists to improve climate and ecosystem models.
To determine the quantity and distribution of ikaite in sea ice Dr Dieckmann takes ice cores back to the lab and melts 10cm segments at 4°C — any warmer than this and the crystals disappear. Once melted, the crystals appear like a sprinkling of salt in the bottom of a container. Dr Dieckmann measures their concentration by weighing dried crystals. But it’s under the microscope that their beauty becomes apparent; they truly are sea ice diamonds.
|
<urn:uuid:a782fe2a-29a9-46a5-acdf-8bcfed7bc18c>
|
CC-MAIN-2023-40
|
https://www.antarctica.gov.au/about-antarctica/history/exploration-and-expeditions/expeditioner-stories/spotlight-on-the-sea-ice/sea-ice-diamonds/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510481.79/warc/CC-MAIN-20230929022639-20230929052639-00657.warc.gz
|
en
| 0.915417 | 409 | 4.15625 | 4 |
Teams of lawyers from around the world came together in Cebu last week to discuss an ambitious new initiative to improve implementation of the Convention on Biological Diversity (CBD). The lawyers, from universities in Australia, Brazil, China, New Zealand, South Africa, the Solomon Islands and other countries, are applying scientifically rigorous methods to evaluate how principles contained in the CBD are being realized in the real world. An earlier trial evaluation of how the CBD principles are being implemented in a number of countries identified hypotheses about why the outcomes of the CBD often do not meet ambitions that existed in the 1990’s, when many countries signed onto the CBD.
Work on evaluating implementation of the CBD principles is being led by teams drawn from the membership of the IUCN Academy of Environmental Law. At the annual Academy Colloquium last week, they met to discuss initial findings and where to go next. “The CBD was meant to do more than cause member states to create new laws or protected areas, or other instrumental interventions” says Prof. Paul Martin from the Academy “Its ambition was to radically change the system of governance of the environment used by the member states. It is clear that only part of this agenda has been effectively implemented, even though many laws have been created”. The teams are preparing country-by-country reports, using an evaluation method that will identify what is needed for effective implementation of the CBD vision. This country-by-country approach is expected to inform new insights into what needs to be done to create a legal governance system that is more effective in protecting biodiversity, around the world.
The assessments build on the framework for assessing and improving law for sustainability, developed under the auspices of the IUCN Environmental Law Programme, as part of the Natural Resources Governance Framework initiative led by the IUCN Commission on Environmental Economic and Social Policy. The framework leads researchers through multiple layers of inquiry: are the principles of the Convention realized in new laws? Are the laws implemented by appropriate institutions? If the laws are implemented, do they change the behaviour of key actors, like individuals, government agencies and regulated entities? And do these changes result in outcomes in line with conservation goals: healthier species populations, more resilient ecosystems, and fairer and more sustainable use of biodiversity? To answer these questions, the legal researchers involved would welcome the collaboration of many different types of expertise, from many countries, to provide scientifically valid identification of where and how implementation of the CBD can be made more effective.
Lydia Slobodian from the IUCN Environmental Law Centre believes that this initiative is an important step in understanding what sorts of systemic innovations are needed to realize the aspirations of the founders of the CBD. “Understanding what makes law and governance effective is one of the most difficult and important challenges facing the environmental community,” she says. “The current environmental crisis demands urgent and efficient legal responses that result in fast and significant changes on the ground. The questions that these teams are asking will tell us a lot about what works and what doesn’t, and what we need to do to get the future we want.”
The teams would welcome the assistance of lawyers, scientists, and conservation practitioners, in conducting this innovative assessment of what it will take to move laws and other instruments off the page, and into reality. For more information, please contact Paul Martin.
|
<urn:uuid:124edca2-7ddc-4e78-bf6e-fe2745694df6>
|
CC-MAIN-2017-30
|
https://www.iucn.org/news/environmental-law/201706/global-collaboration-improve-biodiversity-governance-lawyers-around-world-work-improve-implementation-convention-biological-diversity
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549427766.28/warc/CC-MAIN-20170729112938-20170729132938-00112.warc.gz
|
en
| 0.938974 | 685 | 2.609375 | 3 |
But how could they have been created when all U.S. Mints were ordered to convert to the Buffalo Nickel in 1913? Who produced them, and how did they do it? Further, considering the federal government's confiscation of the 1933 Double Eagles, also not officially released, is it even legal to own them? The authors address these questions, and also include tales surrounding the known owners. Among the unlucky ones: a collector, on his way to a 1962 coin show to exhibit his prized nickel, killed by a suspected drunk driver. In his telescoped station wagon, police recovered his briefcase, not realizing until much later it contained one of the world's rarest coins.
The authors also present the history of the nickel in coinage, focusing on the shortage of all coins during the Civil War; the emphasis on fractional currency instead; the country's disgust with this paper currency (particularly after the face on one five-cent issue was not of famed explorer William Clark, as intended, but of Spencer M. Clark, an employee of the Currency Bureau); the cornering of the country's nickel supply by mining tycoon Joseph Wharton, and his successful lobbying of Congress to embrace the metal for a new nickel coin.
Rich reading, and a nice gift.
Publication Date: July 2005
|
<urn:uuid:9acb68fa-22d6-4deb-a9a2-bf66c73d890c>
|
CC-MAIN-2014-10
|
http://www.wizardcoinsupply.com/product/million-dollar-nickels.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999644032/warc/CC-MAIN-20140305060724-00055-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.974702 | 265 | 2.875 | 3 |
Common Liver Diseases
Hepatitis | Viral Hepatitis | Alcoholic liver disease | Liver Diet | Liver Cancer | Biliary disease | Other/metabolic
diseases | Acute liver failure
There are two types of Hepatitis:
- meaning the new onset of Hepatitis
- meaning the Hepatitis has been present for more than 6 months
What is acute hepatitis?
Acute Hepatitis is an inflammation of the liver
that results in liver cell damage and destruction. Acute hepatitis
is quite common: whereas one in every 4000 people develop acute
hepatitis every year in developed countries, this figure may be
5 times higher in developing countries.
Acute Hepatitis Causes
Common causes of acute hepatitis may include:
Acute Hepatitis Symptoms
- Infection with a virus (viral hepatitis A, B, C, D, or E)
- Overdose of drugs (such as acetaminophen, paracetamol)
- Chemical exposure (such as dry cleaning chemicals, and some
Acute hepatitis usually starts with flu-like symptoms. The
following are the most common symptoms of acute hepatitis. However,
each individual may experience different symptoms such as, jaundice,
nausea, vomiting, loss of appetite, fever, tenderness in the right
upper part of the tummy (abdomen), sore muscles, joint pain and
itchy red hives on skin.
The symptoms of acute hepatitis may resemble other
conditions or medical problems. A physician must be contacted for
Acute Hepatitis Diagnosis
In addition to a complete medical history and medical examination, diagnostic procedures for acute hepatitis may include
Acute Hepatitis Treatment
- Specific laboratory tests for virus detection,
- Liver function tests.
Treatment for acute hepatitis will be determined by your
physician based on the cause, severity, your underlying health and
whether there is any previous history of liver disease.
In general, most people recover without treatment. Severe acute
hepatitis may require hospitalization. People who have had acute
viral hepatitis may become chronic carriers of the disease in case
of Hepatitis B or C infection.
What is chronic hepatitis?
Some people do not recover fully from acute hepatitis and develop chronic hepatitis, as the liver continues to sustain more damage and inflammation. Hepatitis is considered chronic if symptoms persist longer than six months. Chronic hepatitis can last years.
Different forms of chronic hepatitis
Chronic Hepatitis Causes
- Alcohol-induced chronic hepatitis - continued damage throughout the liver from heavy alcohol consumption.
- Chronic active hepatitis - an aggressive inflammation and destroyer of liver cells, which may lead to cirrhosis.
- Chronic persistent hepatitis - a milder chronic inflammation of the liver, which usually does not lead to cirrhosis.
Certain viruses and drugs may cause chronic hepatitis in some people,
but not in others.
Common causes include:
Chronic Hepatitis Symptoms
- Viral hepatitis
- Heavy alcohol consumption
- Autoimmune disorder (when the body attacks its own tissues)
- Reaction to certain medications especially those given for TB.
- Metabolic disorders (such as Hemochromatosis or Wilson's Disease)
Symptoms for chronic hepatitis are usually mild. Although
the liver damage continues, its progression is usually slow.
Some individuals may experience no symptoms, while others may experience
the following: feeling ill, poor appetite, fatigue, low fever, upper
abdominal pain, jaundice, symptoms of chronic liver disease (such
as enlarged spleen, spider-like blood vessels in skin and fluid
The symptoms of chronic hepatitis may resemble other
conditions or medical problems. A physician must be consulted for
Chronic Hepatitis Diagnosis
In addition to a complete medical history and medical examination,
diagnostic procedures for chronic hepatitis may include a) laboratory
tests for specific viruses, b) liver function tests or c) liver
biopsy to determine severity of inflammation, scarring, cirrhosis
and underlying cause.
Chronic Hepatitis Treatment
Specific treatment for chronic hepatitis will be determined
by your liver physician based on the cause, severity, your underlying
health and whether there is any previous history of liver disease.
The goal of treatment is to stop damage to the liver and alleviate
Treatment may include one/more of the following:
Antiviral Agents -
When caused by Hepatitis
B or C, inflammation of the liver may be stopped with the injectable
antiviral drug interferon-alpha. In addition, in Hepatitis B, oral
anti-viral agents such as lamivudine or adefovir may be used, while
in Hepatitis C, ribavirin can be used.
Corticosteroids may be used
to treat chronic liver disease caused by an autoimmune disorder.
Inflammation is suppressed, but scarring of the liver may continue.
Discontinuation of certain drugs -
Hepatitis is caused by certain drugs, discontinuing those drugs
usually clears up any symptoms.
Discontinuance of alcohol -
While this is essential
for recovery in alcohol induced chronic liver disease, it is also
highly advisable in Hepatitis C and other chronic diseases of the
Preventing the spread of viral hepatitis:
is the key to preventing the
spread of many diseases, including Hepatitis. Other preventive measures
A Hepatitis B vaccine is routinely
given to toddlers as part of their immunization schedule. A hepatitis
A vaccine is available for people at risk for contracting the disease
while traveling. (There are no vaccines for hepatitis C, D, or E
at this time.)
Blood transfusion -
Blood products are routinely
screened for Hepatitis B and C, and HIV, to reduce the risk of infection
Antibody preparation -
If a person has
been exposed to Hepatitis B, an antibody preparation can be administered
to help protect them from contracting the disease.
The prevention of Hepatitis B and C should be aimed
at the high risk groups and situations
which are a) Unsafe
Blood transfusion, b) Hepatitis B or Hepatitis C in the family,
c) Surgical procedures or dental manipulation, d) intravenous drug
abuse, e) Unprotected sexual exposure, f) Dialysis, g) Medical or
|
<urn:uuid:f04c08ef-91a5-413b-9e5b-356597655d5c>
|
CC-MAIN-2014-10
|
http://www.livertransplantindia.com/liver-diseases.asp
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021278114/warc/CC-MAIN-20140305120758-00048-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.861627 | 1,352 | 3.453125 | 3 |
For us to pursue our multiple life goals, we will need to have financial resources, which is like our ‘financial muscle’. We will need to have muscles to do the weight-lifting, which is to turn our life goals into reality. Therefore, we need to have the know how.
This, essentially, is financial literacy.
The Organization of Economic Co-operation and Development has defined financial literacy as a combination of awareness, knowledge, skill, attitude and behaviour necessary to make sound financial decisions and ultimately achieve individual financial wellbeing.
Why Is Financial Literacy Important?
Obviously, the decision we make today has a long-term impact on our financial wellness in the future. Hence, a poorly made decision may have a very detrimental impact on our future.
If a person is not financially literate, then this person may face multiple challenges in respect to managing his or her own wealth. Potential consequences can be:
- Not protecting savings and assets adequately;
- Not prudent in borrowings and ending up with too much debt;
- Not investing to inflation-proof your purchasing power;
- Not having a will; and
- Not having financial safety net like an emergency fund and health insurance.
The list can go on and on.
When a person is in a situation as above, it’ll be rather difficult person to attain financial independence as well as pursue his or her life goals.
How Financially Literate Are We?
The following statistics from the National Strategy for Financial Literacy 2019-2023 Report gives us a picture of where we stand as a nation in terms of financial literacy.
- 43% of Malaysians understand that growth of money is compounded over time, while 22% believe money grows on linear basis;
- 75% of Malaysians understand that inflation means cost of living is rising, only 38% can relate the effect of inflation on their own purchasing power;
- 84% of Malaysians who claim to save regularly typically withdraw it at month-end to cover daily subsistence expenses;
- Three in 10 of working adults need to borrow money to buy essential goods;
- 52% have difficulty raising RM1,000 as an emergency fund;
- Only 24% are able to sustain their living expenses for at least three months if they lose their main source of income, and only 10% can sustain for more than six months;
- Six in 10 adults are self-employed and hence not covered by a social security system or any formal retirement fund; and
- About 60% of investors were found to have unrealistic expectations on potential annual return from investment in capital market products.
A Financially Responsible Person
When a person is financially literate, he or she will be more capable in understanding how his or her decision can impact their financial future, hence becoming a responsible person financially.
When we are financially responsible, we will be careful about adding financial responsibility to our finances. We will ensure that we do not spend all we make but make provision for our future, and for emergencies.
In fact, most people are aware of this but somehow, fail to take action.
What Is Missing?
Since most of us who are working adults have not been taught about financial literacy in school, we need to learn it from somewhere.
Learning is a passive thing – you can continue to read, learn, listen to podcasts or attend workshops for years. However, it is not the learning that matters but the doing that makes a difference.
To ensure that we do what is in our best interests, not only do we need financial education, we also need financial accountability. I truly think this is the key missing piece of the puzzle.
Perhaps you can read Unit Trusts, The ‘Safest’ Investments For Beginners In Malaysia?
That is why we are unable to behave rationally and stick to our plans, fail to save what we plan to save every month, all because of a lack of accountability.
I will define accountability as having a sense of ownership over your work and accepting consequences for your actions and behaviours.
Many times, we are aware that if we don’t save, it will leave us in a worse shape compared to when we save. But we spend anyway.
So to increase your financial accountability, it’s best if you work with someone interested to help you stay true to your own words, and be accountable for your own actions.
Financial Accountability Partner
An accountability partner is someone who coaches another person to keep a commitment. Getting a right accountability partner is known to be a highly effective strategy for goal-setting and achievement.
The good news is that If we want to stick with our action plan, we just need an accountability partner. The bad news is that we cannot be our own accountability partner.
And if you have selected a candidate who is not so suitable, your accountability partner may well turn into your partner in crime.
What To Look For In Your Accountability Partner?
Ideally, this person should be able to complement you in terms of knowledge, skills, expertise. Since this is a financial accountability need, your candidate should possess extensive knowledge on this subject matter. Otherwise, coaching you to do the wrong thing will eventually send you down a path that is cursed as well.
However, you should look beyond things that are measurable such as knowledge. Will this person be willing to challenge you to out-grow your limit?
Your main objective of getting an accountability partner is to outperform your own set objectives. Therefore, you need someone who has the courage and discipline to tell you what you need to hear, not what you want to hear.
Your accountability partner should also be able to make sure you follow through on your commitments, monitor and review your action plans with you so that you can find ways to improve on it.
When you are in doubt, he should also be able to provide you with independent feedback and show you the next step so that you will not be stuck at status quo.
Who Can Be Your Ideal Financial Accountability Partner?
Most of us have friends, and family members who we care a lot for. Are we their financial accountability partner?
Did any of our friends or family members volunteer to talk to us about our financial successes and planning? Has anyone have taken the time or initiative to tell us the importance of save-first, spend later, or the importance of having an emergency fund?
I guess the common answer to these questions will be a string of “no’s”.
That is also why I volunteer myself to be your financial accountability partner by devoting my lifework to be a licensed financial planner. I have a strong sense of fulfilment whenever people feedback to me that they are seeing progress and happy because they are sticking to their own plans and are seeing results.
That sense of fulfilment is even stronger when I get credit for the success my client is having.
Personally, I believe that it is important for us to work at something we love to do and are passionate about. I’m just glad I’m under this category.
I think someone who is doing what they are doing when not motivated by monetary reward alone, will be the right person to do the best work.
So, get an accountability partner to make sure you are accountable for your financial independence.
About the author
Kevin Neoh is a NextGen Money Coach who works with people to help them transform their relationship with money to improve their lives with the money they have. Kevin can be contacted at [email protected] and www.kevinneoh.my.
|
<urn:uuid:b8979f03-7236-4a51-b29f-1a6033712b96>
|
CC-MAIN-2023-40
|
https://smartinvestor.com.my/financial-literacy-financial-accountability-are-life-changing/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506479.32/warc/CC-MAIN-20230923030601-20230923060601-00713.warc.gz
|
en
| 0.958543 | 1,564 | 2.9375 | 3 |
Meet our Scholarship Awardees
Recipient of the Oceanographic Center Fishing Tournament Scholarship
Coral reefs are well-known for their remarkable biodiversity and have significant aesthetic, cultural, and economic value, particularly in relation to fisheries and tourism. Coral reefs function as a habitat for many fish species targeted for their commercial importance. Sea-grass beds and mangroves, often closely associated with reef areas also serve as essential nurseries for commercially important reef fisheries. In the United States for example, approximately half of all federally managed fisheries depend on coral reefs and their related habitats for a portion of their life cycles. Economic values for reef-based commercial and recreational fisheries are estimated to generate over $100 million each in the United States annually.
However, many reefs around the world are increasingly threatened by global climate change as well as human impacts such as overfishing and habitat destruction. These declines in reefs have led to losses in structural complexity effectively reducing the range of habitats and shelter available for reef-associated organisms, including fish. The ability of present-day coral reef systems to cope with such compounding stressors is being severely tested. Examples from the geologic record show that reefs were inherently able to cope with naturally-occurring changing climatic conditions for millennia long before human impacts. This includes evidence from tropical localities in the Caribbean and elsewhere where significant environmental and climatic changes occurred during short intervals over the last ~12,000 years.
It is therefore important to understand how coral reefs from the recent past responded to natural climate stressors (before human impacts) and if a similar situation can be expected in the future. One of the most socially relevant issues today is climate change and sea-level rise, and both phenomena can be scientifically investigated in coral reefs. Anastasios’ dissertation research aims to examine the effects of climate and sea-level change on the structure and formation of ancient coral reefs offshore Broward County, Florida. These reefs are ideally suited to answer such questions given that they were actively growing during this critical time period of changing environmental/climatic conditions. Information regarding climate and sea-level interactions will prove valuable to identifying future trajectories of coral reefs and the organisms that inhabit and depend on them, including humans.
My PhD work utilizes modern molecular genetics tools to investigate the contemporary and historical ecology of large open ocean and coral reef fishes (sharks, billfishes, groupers) that are of national management and conservation interest. Global declines of many marine apex predator fishes have occurred throughout the past few decades, and urgent management and conservation actions are required to prevent further declines and facilitate their recovery. To assist fishery managers in these actions, I am investigating a suite of biologically important questions pertaining to three commercially and recreationally exploited species: the roundscale spearfish, the Nassau Grouper, and the tiger shark. My research focuses on investigating the current stock structure of these species across their distribution, the relative size of their populations, their genetic diversity, and their contemporary and historical population demographic trajectories.
Four peer-reviewed journal publications have thus far resulted from this work (listed below), and five more planned publications are in various stages of writing. This work has also been presented at seven professional conferences to date.
Synopsis of Projects
Over the past few decades, there has been increasing concern about the population status of many billfish species as they are heavily fished in pelagic fisheries either as targets or as by-catch, and their management is made complex due to the international nature of their fisheries. Adding to this management complexity is that one billfish, the roundscale spearfish, was only recently validated in 2006 as a legitimate species by my advisor's lab. The lack of historical recognition of the roundscale spearfish is due to its strong morphological similarity to the heavily overfished and highly prized, recreationally fished white marlin. To make matters worse, it is now clear that the roundscale spearfish has frequently been misidentified as the longbill spearfish as well. To aid in the management of all billfish species, some of my PhD work has centered on using genetic tools to provide managers with information regarding the biology, distribution and stock structure of the roundscale spearfish. I developed genetic tools which have been used to (i) investigate and define the Atlantic distribution of the roundscale spearfish, (ii) assess the connectivity of North and South Atlantic populations of the roundscale spearfish for management purposes, and (iii) compare the demographic history and relative population sizes of the roundscale spearfish and the white marlin.
During my time as a PhD student, I have also had the opportunity to study the charismatic Nassau Grouper, a species of great conservation concern on coral reefs. Due to high levels of historical commercial and recreational fishing, the Nassau grouper has sustained alarming declines across its geographic distribution, resulting in an Endangered listing on the IUCN Red List and current consideration for Endangered listing under the US Endangered Species Act. In the US Virgin Islands, recognized Nassau grouper spawning aggregations have declined to very low levels; however, a remnant spawning aggregation historically numbering over 1000 individuals at Grammanik Bank, St. Thomas, has seemingly begun to recover since implementation of protective measures in 2005, and may now comprise approximately 200 individuals. The genetic consequences of such large aggregation declines and its incipient recovery are unknown. My genetic analyses of these fish is revealing several key, conservation relevant findings, including (i) the good news that high levels of genetic diversity remain in the aggregation despite overfishing, and (ii) strong indications that migrations from neighboring Caribbean spawning aggregations, rather than local replenishment, may be driving the recovery of the St. Thomas population; these neighboring populations and their conservation may therefore be essential to the continued persistence of the Nassau grouper in the USVI.
Finally, I am also investigating the biology and population connectivity of tiger sharks across their global distribution. As one of few sharks categorized as a coastal-pelagic species, the tiger shark inhabits a variety of marine habitats and often demonstrates complex patterns of migratory behavior and habitat utilization. Given its global distribution, information pertaining to the connectivity of the species is needed to help international managers and decision-makers properly conserve this large marine species. My work on the tiger shark is focusing on identifying several key factors which will aid both conservation and management of this species. Using genetic tools, I have found that (i) tiger sharks comprise at least two separate populations, one inhabiting the western Atlantic, and one within the Indo-Pacific, (ii) these animals appear to be connected on broad spatial scales within ocean basins, and (iii) tiger sharks inhabiting different geographic areas show varying levels of genetic diversity which has implications regarding how to prioritize conservation efforts for this large apex predator.
Journal Publications from this research
Bernard, A.M., M.S. Shivji, R.R. Domingues, F.H.V. Hazin, A.F. Amorim, A. Domingo, F. Arocha, E.D. Prince, J.P. Hoolihan and A.W. Hilsdorf. 2013. Broad geographic distribution of roundscale spearfish (Tetrapturus georgii) (Teleostei, Istiophoridae) in the Atlantic revealed by DNA analysis: implications for white marlin and roundscale spearfish management. Fisheries Research 139: 93-97.
Bernard, A.M., K.A. Feldheim, V.P. Richards, R.S. Nemeth and M.S. Shivji. 2012. Development and characterization of fifteen novel microsatellite loci for the Nassau grouper (Epinephelus striatus) and their utility for cross-amplification on a suite of closely related species. Conservation Genetics Resources 4: 983–986.
Bernard, A.M., K. A. Feldheim and M.S. Shivji. 2012.. Development and characterization of eleven novel microsatellite loci for the roundscale spearfishTetrapturus georgii and their cross-species amplification among other billfish species. Journal of Fish Biology 81: 1781–1786.
|
<urn:uuid:1ac47e10-b0da-4f23-a5c5-335878de03d2>
|
CC-MAIN-2014-15
|
http://www.nova.edu/fishingtournament/scholarship-awardees.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538110.1/warc/CC-MAIN-20140416005218-00465-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.936201 | 1,687 | 2.8125 | 3 |
posted by Samantha .
Camille can swim against the current at 1.5 m/s and with the current at 3.5m/s. Write an equation that expresses each fact. How fast can she swim in still water?
the upstream and downstream speeds differ by twice the current speed, or 2 m/s.
so, still-water speed is 2.5 m/s
up = s+r
down = s-r
s = (up+down)/2 = (1.5+3.5)/2 = 2.5
|
<urn:uuid:84940b8d-4a87-48d7-a7ec-7a936c67af17>
|
CC-MAIN-2017-26
|
http://www.jiskha.com/display.cgi?id=1352308670
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128322275.28/warc/CC-MAIN-20170628014207-20170628034207-00427.warc.gz
|
en
| 0.955726 | 117 | 3.3125 | 3 |
The Indochina native saola, also known as the "Asian unicorn" is facing the threat of being wiped off the face of the earth due to indirect poaching. Conservationists hope to rescue these critically endangered animals before it's too late.
The elusive forest-dwelling saola - otherwise known as the "Asian unicorn" - is in danger of becoming extinct a mere 20 years after its discovery. According to Yahoo News, the bovine saola's numbers have dwindled to only 200 on the high end; on the low end, there may be as few as just a few dozen left.
Saola - also known as the Vu Quang ox - are only found in the Annamese Mountains, which lie on the border of Vietnam and Laos. With their horns and dark brown fur, they resemble a "strange antelope hybrid" in appearance, but are genetically more so related to "a type of wild cow."
The saola were first discovered in May 1992 when Vietnamese scientists found villagers collecting alien-looking horned skulls by the animal's native range.
"It's a very beautiful forest ungulate, and really looks like nothing else in Asia," said Barney Long of the World Wildlife Fund to Our Amazing Planet last month. "It's so rare to see that it would almost be like seeing a unicorn."
The peril that is facing these majestic creatures is none other than the rampant poaching being conducted in the Annamite Range. What's more, is that saola themselves are not targeted, but instead are caught in the the crossfire of their neighbors being hunted.
"Saola are caught largely as bycatch — like the tuna and dolphin scenario," said coordinator of the Saola Working Group, William Robichaud, in a statement.
Another unfortunate aspect in all of this is that scientists have never observed saola in their natural habitat, and those brought into captivity died shortly after they were caught.
"When they're in captivity, they seem to act extremely tame, and they're very open to having people come up to them and touch them," said Long, pointing out that their warm-hearted facades were actually indicative of terrible stress. "The animal is freaking out."
However, since it is not eyed directly by poachers, scientists and conservationists remain hopeful that the saola can be rescued; even in a time of uncertainty regarding its future.
"But we still need to act," said Robichaud. "One of the rarest and most distinctive large animals in the world has been quietly slipping toward extinction through complacency."
|
<urn:uuid:2b55aa14-aa24-4c7a-b3ab-ab6b0a0b9084>
|
CC-MAIN-2013-20
|
http://www.digitaljournal.com/article/325271
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00060-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.979437 | 529 | 3.375 | 3 |
Biodiversity studies in ecology and agriculture often begin with the analysis of sampling curves. To measure the completeness of sampling, a sampling yield-effort curve can be drawn that plots the number of taxa sampled against the sample size (Colwell and Coddington 1994, Zhang and Schoenly 1999a,b). This curve is a stepfunction with a slope that should decrease as sample size increases and as fewer taxa remain to be sampled. Many models or methods were developed to fit these functions. Most of these models, however, yielded fixed errors. Neural network methods, always with any desired accuracy, were widely used to fit functions in engineering and related research (Bian and Zhang 2000, Hagan et al 1996, Zhang and Qi 2002). Therefore, we expect a better goodness of fit for sampling yield-effort curves with neural networks. The back propagation (BP) neural network and the radial basis function (RBF) neural network algorithms are introduced and tested in this study to provide an effective tool to fit the sampling yield-effort curves and to document the sampling information, based on data sets of invertebrates sampled in tropical irrigated rice fields. Some conclusions on rice invertebrates are obtained from the fitted functions of neural networks.
|
<urn:uuid:6102155a-c997-40c3-828e-0eab11ac7add>
|
CC-MAIN-2020-10
|
https://ejournals.ph/article.php?id=8644
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875141460.64/warc/CC-MAIN-20200217000519-20200217030519-00183.warc.gz
|
en
| 0.949949 | 254 | 2.8125 | 3 |
I'm confused. My solution followed the definition of frugal numbers from https://en.wikipedia.org/wiki/Frugal_number, which includes counting the number of digits in the exponents, and also checks frugality in other bases (not just base 10). But most solutions don't follow this. Can you clarify this?
Back to basics 21 - Matrix replicating
Find nearest prime number less than input number
Is this triangle right-angled?
Find MPG of Lightest Cars
Yoonir - 03
Sieve of Eratosthenes - 02
Count the days
Choose a web site to get translated content where available and see local events and offers. Based on your location, we recommend that you select: .
You can also select a web site from the following list:
Select the China site (in Chinese or English) for best site performance. Other MathWorks country sites are not optimized for visits from your location.
Contact your local office
|
<urn:uuid:1a7e0ac2-c959-4563-949c-b93740f796e6>
|
CC-MAIN-2020-34
|
https://in.mathworks.com/matlabcentral/cody/problems/45249?s_tid=prof_contriblnk
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735833.83/warc/CC-MAIN-20200803195435-20200803225435-00124.warc.gz
|
en
| 0.831272 | 203 | 3.078125 | 3 |
Community-driven multiple use water services: Lessons learned by the Rural Village Water Resources Management Project in Nepal
MetadataShow full item record
Rautanen, S.-L., van Koppen, B. and Wagle, N. 2014. Community-driven multiple use water services: Lessons learned by the Rural Village Water Resources Management Project in Nepal. Water Alternatives 7(1): 160-177.
Permanent link to this item: http://hdl.handle.net/10568/75849
This article examines community-driven multiple use water services (MUS) as pioneered by the Rural Village Water Resources Management Project (RVWRMP) in the Far and Mid-Western development regions of Nepal. These regions are characterised by poverty, remoteness, rugged terrain, food insecurity, water scarcity, and post-conflict legacy. Water provision for domestic and productive uses provides opportunities to address poverty and livelihoods in environments with highly decentralised governance. This study explores the first-hand lessons learned in the RVWRMP in Nepal since 2006. This project is embedded within the local government. Key project entry points are decentralisation, participation and empowerment. This article reflects how the community-managed systems are used for multiple uses whether they were designed for it or not. It focuses on household- and community-level changes and related institution building and participatory planning through Water Use Master Plans and a Step-by-Step approach. Recommendations are made for scaling up multiple use services
|
<urn:uuid:66b57594-2b9c-41fa-9959-e386b5088e16>
|
CC-MAIN-2017-39
|
https://cgspace.cgiar.org/handle/10568/75849
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818693940.84/warc/CC-MAIN-20170926013935-20170926033935-00032.warc.gz
|
en
| 0.841236 | 305 | 2.640625 | 3 |
Sometimes when you are editing an Excel file, you are working with sensitive information.
Since anyone with access to your computer or the Excel spreadsheet would be able to view that information, it can be helpful to apply an Excel password to the file.
But it may be necessary to later learn how to remove a password from Excel if it’s becoming troublesome.
Password-protecting an Excel workbook is a simple and effective way to make sure that the file can only be viewed by individuals with whom you have shared that password.
But if a workbook no longer requires a password, or if you are finding it too tedious to enter the password each time you want to work with the file, then you might be wondering how to remove it.
Removing a workbook password in Excel 2013 can be accomplished with just a few short steps, then the workbook can be saved so that the password is no longer required to open and view the data contained within the file.
How to Remove Password from Excel Spreadsheet
- Open your spreadsheet and enter the password.
- Click File.
- Click Protect Workbook, then Encrypt with Password.
- Delete the password, then click OK.
- Save the workbook.
Our article continues below with additional information on how to remove a password from Excel, including pictures of these steps.
If you’ve started letting Google Chrome save your login information for websites you visit, then our view saved passwords Chrome tutorial will show you how to find that information.
Removing a Password from an Excel 2013 Workbook (Guide with Pictures)
These steps are for the removal of a workbook password. This is the type of password that prevents you from viewing anything in the file without entering a password.
The steps in this article will show you how to remove a password from a spreadsheet when you know that password. It will not show you how to remove the password from an Excel spreadsheet for which you do not know the password.
Step 1: Open the spreadsheet in Excel 2013 and enter the password for the workbook.
Step 2: Click the File tab at the top-left corner of the window.
Step 3: Click the Protect Workbook button, then click the Encrypt with Password option.
Step 4: Click inside the Password field, delete the existing password, then click the OK button.
Step 5: Click the Save button to save the workbook without the password.
Do you have a Word document that you would like to password protect? Read here to learn how.
More Information on How to Remove Password from Excel File
- If you need to remove the password from an Excel file, you will need to have the current password in order to complete that action. You won’t be able to recover the password from Excel itself, so you will need to contact the person who originally create the password the Excel file.
- Some people have had success with Excel password recovery by using Google Docs. If you sign into Google Drive and upload the Excel spreadsheet for which you want to remove the password you may be able to view it in Google Sheets, then convert the Sheets file version to an excel file type. This doesn’t work all the time, but it can work occasionally.
Matthew Burleigh has been writing tech tutorials since 2008. His writing has appeared on dozens of different websites and been read over 50 million times.
After receiving his Bachelor’s and Master’s degrees in Computer Science he spent several years working in IT management for small businesses. However, he now works full time writing content online and creating websites.
His main writing topics include iPhones, Microsoft Office, Google Apps, Android, and Photoshop, but he has also written about many other tech topics as well.
|
<urn:uuid:149c0a7d-3b76-4cba-bf54-d6a331f9128e>
|
CC-MAIN-2023-40
|
https://www.solveyourtech.com/remove-password-excel-2013/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510888.64/warc/CC-MAIN-20231001105617-20231001135617-00661.warc.gz
|
en
| 0.922817 | 774 | 2.90625 | 3 |
Author: Bohan, Eddie
Report by: Oona Roycroft
The paper covers the part that wireless played in proclaiming the new Republic of Ireland. Led by Joseph Plunkett, one of the Signatories of the Easter Proclamation of 1916, a wireless communications section was set up to counter the propaganda being broadcast by the British Government.
A Marine Station had been set up in Skerries, and this paper gives an overview of the use of wireless by the British, as well as details of the counter efforts of the rebels. The author provides, from various sources, an account of a purported attempt by the Irish Volunteers to capture the Marine Station, and of the preparations made by the Unionist members of the Skerries community to give medical help in the event of an actual attack.
|
<urn:uuid:9213535d-4b63-41fb-86ea-ade31ff52526>
|
CC-MAIN-2017-30
|
http://oldskerries.ie/the-use-of-wireless-in-the-rising-including-skerries/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423774.37/warc/CC-MAIN-20170721122327-20170721142327-00282.warc.gz
|
en
| 0.960692 | 161 | 2.734375 | 3 |
The character for this week's lesson is Jeremiah. Create a word picture of him for your notebook.
Jeremiah was a melancholy man whom God used to prophesy.
What qualifications did Jeremiah have to be a prophet? What qualifications did Jeremiah think he had?
Did Jeremiah think he was capable of doing what God wanted him to do? Describe how God can use a person who thinks he is small. Do you know of anyone like this?
Jeremiah was known as “the weeping prophet.” How can a sorrowful person like that be used by God?
Leave A Comment
|
<urn:uuid:bf158234-e356-41b0-b2a7-16c1f573414b>
|
CC-MAIN-2023-23
|
https://heraldandbanner.com/a-melancholy-man/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647409.17/warc/CC-MAIN-20230531182033-20230531212033-00019.warc.gz
|
en
| 0.985683 | 122 | 3.21875 | 3 |
In Dante’s Inferno, Dante takes an allegorical journey through the nine levels of Hell. With Virgil as his guide, he ventures through nine concentric circles, each level inhabited by successively worse sinners. Dante works his way through limbo, lust, gluttony, avarice, wrath and sloth, heresy, violence, and fraud, before finally making it the center of the earth and the lowest circle of Hell. Here reside the worst sinners in history, those guilty of treason and betrayal. These traitors are doomed to spend eternity encased in ice, with the very worst of the bunch-Brutus, Cassius, and Judas-being perpetually chewed on by Satan.
With so many varieties of sinners, why did Dante mark traitors as the worst of the worst? For that matter, why do those who remember little about the Revolutionary War still know exactly who Benedict Arnold was? And why is being called a “fairweather fan” such a derisive insult? In short, why is betraying one’s loyalty so unforgivable an act?
While the fabric that has held society together has worn thinner in our modern age, it is still loyalty that lends the cloth its strength. It is loyalty that keeps the world functioning. We could not conduct business transactions or personal relationship without it. Loyalty is the idea that we are who we say we are and we will do what we say we will do. It is the hope that the integrity with which we initially encountered someone will endure indefinitely.
It’s also what keeps us unified. We live out our lives as part of agreed upon norms that allow us to operate from day to day. We need to know who we can count on. We all understand that ideally, friends will have your back, lovers will remain true, and businesses will not cheat you out of your money. When someone is disloyal, they break from these expectations and weaken the trust that holds us together.
Yet modern society is understandably weary of the virtue of loyalty. Every virtue has its true manifestation and its false counterpart. Frugality can become stinginess; resolution can become stubbornness; humility can become passiveness. And loyalty can become blind obedience. Critics of loyalty point to Germany under Hitler or China under Mao and ask, “Weren’t the evil deeds committed by ordinary people done out of a sense of loyalty?”
But the loyalty demanded by such regimes, by conquerors and oppressors, is not true loyalty. Loyalty can never be demanded, only chosen, as we shall see. And while loyalty can be used for both ill and good, this does not negate its great and honorable power when used for the latter.
What is Loyalty?
Like, courage, integrity, and personal responsibility, loyalty is one of the essential manly virtues. But like other lofty attributes, it is often easier to describe with examples than words. We know it in the soldier who will not leave a wounded comrade behind and dodges withering fire to bring the man to safety. We see it embodied in the prominent man who has women throw themselves at him when away from home, but who never strays from his wife, and in the religious martyr who chooses death over the disavowal of faith. And it is the bond that befuddles girlfriends who cannot understand why their beau is still friends with a childhood chum with whom he now seemingly shares little in common.
Josiah Royce, author of the 1920 book, The Philosophy of Loyalty, said loyalty was “the willing and practical and thoroughgoing devotion of a person to a cause.” Let’s unpack this definition:
Willing. Loyalty must born from your own choice and free will. It cannot be forced upon you by another person or organization. Loyalty must be chosen.
Practical and thoroughgoing devotion. Loyalty is not some pie in the sky abstraction. It must be coupled with action. Feeling and emotion can be part of loyalty, but action must always constitute the core.
To a cause. We often imagine loyalty as a bond between ourselves and individuals or organizations-with a friend, with a wife, with a church. Thus, when that individual entity changes and stops interesting us, we feel justified in breaking off our loyalty to it.
True loyalty must take as its cause something bigger than the individual; it must be rooted in principles, not people. Be not loyal to your buddy Eddie, but loyal to the idea of brotherhood and friendship. Be not loyal to your wife, but loyal to the idea of love and fidelity. Be not loyal to your sister but loyal to the sacred nature of familial bonds. Be not loyal to a church but loyal to the gospel.
Such unchanging principles must serve as the foundation of your loyalty. Thus, when people and organizations shift and change, your loyalty, anchored to immovable values, will remain steadfast.
To What Should We Be Loyal?
“Whenever, I say, such a cause so arouses your interest that it appears to you worthy to be served with all your might, with all your soul, with all your strength, then this cause awakens in you the spirit of loyalty. If you act out this spirit, you become, in fact, loyal.” -Josiah Royce
While we often think of loyalty as a somber duty, the causes which arouse your loyalty must be ones that fascinate and possess you, ones that reverberate in your being and invigorate your spirit.
The causes to which you choose to be loyal need not be dictated to you by your position or by tradition and can be entirely of your own creation. Choose causes which mirror your will and align with your core values and ideals, causes that so engross and engage both your heart and mind that you feel willing to make whatever sacrifices will be necessary to remain loyal and true.
The Decline of Loyalty
In time where individuality and personal freedom are the values du jour, loyalty is not celebrated with much frequency or gusto. Our intensely consumerist society has made us a nation of shoppers, not just for actual commercial goods, but in all aspects of our lives. With the myriad of choices available-from shampoos to professions-we are taught that happiness is a result of keeping one’s options open to the greatest possible degree. We are always on the hunt for a better deal, for an upgrade. Thus modern loyalty is a pale version of its ancient form. Sure we’re loyal……until something better comes along. We’re loyal…until we are given an excuse to bail. Of course this is not true loyalty at all. A loyal man commits to something with the idea that he is casting his lot with that cause in perpetuity.
Loyalty has also been weakened by our age of cynicism. As we have mentioned, loyalty requires a cause that invigorates and enlivens both heart and mind. Thus, idealizing your cause to a certain extent is necessary for loyalty. When we decide to be loyal, we are loyal to the very best in something, to the potential of something. We are fully aware of the warts of the cause, but these are not the things that animate our loyalty.
But our cynical age wishes to dwell only on the warts, to the eclipsing of anything good and virtuous about the cause. Cynicism crushes loyalty before it even has a chance to sprout up. When you speak of marriage, divorcees are waiting to intone about how outdated the institution is and how pointless the endeavor When you speak of country, naysayers immediately rattle off the latest news of government scandals. You cannot talk about a great man without someone jumping in to list their faults. There seems to be no room these days for someone who sees things as he hopes them to be, without being called naive and moronic. A cause needs some profundity and dignity for loyalty to thrive, and such space is currently hard to come by. But loyalty deserves a place even in our “sophisticated” modern age, as it offers a myriad of benefits to both the individual man and to society as a whole.
The Benefits of Loyalty
“Loyalty for the loyal man is not only a good, but for him chief amongst all the moral goods of his life, because it furnishes to him a personal solution of the hardest of human practical problems, the problem: “For what do I live? Why am I here? For what am I good? Why am I needed?” -Josiah Royce
We admire loyal men because they are filled with confidence, aim, direction, and purpose. We know what they are about and what we can expect from them. We know where they stand.
But loyalty may seem to be an archaic approach to life, one that will be detrimental to your personal happiness and fulfillment. Isn’t it good to always be willing to move on to something better and not be tied down to any one thing?
On the surface this makes sense, but it has been my experience that true happiness comes from committing to a cause bigger than yourself. And committing to that cause for the long haul. While society says that such absolute commitment is stifling, it’s really the endless shopping around mentality that’s leaving us unsatisfied. Here’s why:
Loyalty breeds satisfaction and happiness. Studies have shown that being able back out of our decisions makes us less happy than making “irreversible” decisions. For example, in one study students were told that they could pick one fine art print to take home with them. One group was told that the decision was final. The other group was told that they could return and exchange the print later if they so desired. While almost everyone in the second group said they were happy to have the option to return their print, almost none did. However, the second group ended up far less satisfied with their choice than the group that was not allowed to make exchanges. Why? Because with the option to reverse their decision always in the back of their minds, they could not move forward and put in the important psychological work to accept and enjoy their decision.
Thus, while it may seem risky to commit our loyalty to something for the long haul, it can be quite psychologically rewarding. In trading quantity for quality, you will come to know the rich satisfactions available only to those who are willing to go in-depth with something, sticking with it through thick and thin.
Loyalty lessens the amount of uncertainty in your life. In a previous article, we talked about the way in which having too many choices can paralyze us into unhappiness and inaction. One of the ways to mitigate this effect is to purposely limit our choices. There are some choices in life we can make once and never have to make again. Once you know where you stand in life, you don’t have to reinvent the wheel every time you are faced with certain choices.
Loyalty breeds loyalty. Of course living a life of loyalty does not garner merely personal benefits. It can positively transform society as a whole. Loyalty is contagious. As we lives of loyalty we encourage other men to do likewise. As Royce argues, we should act “as to further the general confidence of man in man.”
Loyal men can change the world. When good men bail out of organizations that they feel have gotten off-track, it simply becomes a self-fulfilling prophecy. There are no shortage of problems with everything from family to politics, but if loyal men don’t stick around and work from within to be a force of positive change, these institutions will never improve. Loyal men transform causes from the inside out.
Individualism, Free Will, and Loyalty
Perhaps the greatest impediment to our embrace of loyalty is the worry that we will lose some of our free will in the pursuit of it. After all, once you are dedicated to a cause, you are committed to acting in a certain way. But loyalty and individuality need not be at odds. Rather than submerge one’s individuality, loyalty can elevate and exalt the self.
The greatest and most difficult of philosophical tasks is it to discover and understand our own will. We first look inside of ourselves, but it is hard to find answers from gazing within. So we then look to conform with the rest of society. But doing so only highlights our differences with others and our desire to rebel from certain social norms. We then return to looking within ourselves for answers, and the cycle continues.
Loyalty can unify this conflict between individuality and social conformity, between our inner and outer worlds. Loyalty gives to man an external cause, an external purpose and course of action. But the decision to serve that cause is created from inner reasons, which glorify and inspire the self. In manifesting our inner values in an external way, we intensely feel the self, which is now imbued with power, value, and dignity. Royce argued:
“Thus loyalty. . . solves the paradox of our ordinary existence, by showing us outside of ourselves the cause which is to be served, and inside of ourselves the will which delights to do this service, and which is not thwarted but enriched and expressed in such service.”
When Are We Justified in Being Disloyal?
Perhaps the most difficult question to grapple with concerning loyalty is answering the question of when a man is justified in breaking his loyalty. Is a loyalty that has loopholes even loyalty at all?
Many men misunderstand loyalty as dependent on a tit for tat relationship. They see their relationships as a scale; as long as both sides remain balanced, they remain loyal. But as soon as the scale tips unfavorably to where they are sacrificing more than they are getting in return, they feel justifed in breaking their loyalty. But true loyalty is not a function of reciprocity.
You should strive to stay loyal until all the work you can do for your cause is finished, which may not come until the end of your life. Of course in between now and then your cause may change , and you be tempted to be bail and say, “I’m not going to let this cause tell me what to do!” But remember, you chose the cause. You proposed, you got baptized, you joined the army. In so choosing, you also chose to accept whatever crap would later come down the line. You knew the risks in pledging your loyalty, and you willing accepted those risks. What good is a loyalty that swells in the midst of pomp and ceremony only to shrink in the trenches?
On the other hand, a cause should never become your conscience. And what does a man do when his cause violates that conscience, when it violates his core values? The first time it happens are you justified in being disloyal? After 7 times 70 times? Never? Is there any honor in taking great abuse from your wayward cause or is to remain in an offensive situation a disavowal of your manliness?
Here is where I’d like readers to pick up the discussion. What role does loyalty have to play in a man’s life and in modern society? And when is a man justified in being disloyal?
Source: The Philosophy of Loyalty by Josiah Royce, 1920
|
<urn:uuid:8ab3520c-fb7a-4e5b-929e-d982d5c86abb>
|
CC-MAIN-2013-20
|
http://www.artofmanliness.com/2009/10/25/on-manly-loyalty/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699977678/warc/CC-MAIN-20130516102617-00041-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.962924 | 3,182 | 3.09375 | 3 |
Why smarter homes?
A smart home is one that's good for its occupants and for the environment.
Being smart includes being energy efficient and using less water. It means designing and building homes which are healthy and comfortable, and cost you less to run. It means choosing sustainable materials and using resources wisely.
|
<urn:uuid:2cb5c36b-595b-4c35-ae0d-c3f556581fbe>
|
CC-MAIN-2014-23
|
http://www.smarterhomes.org.nz/why-smarter-homes/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997857714.64/warc/CC-MAIN-20140722025737-00116-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.970791 | 62 | 2.5625 | 3 |
WHAT IS OSTEOPOROSIS?
What causes osteoporosis?
Our bones are living tissue and constantly changing. From the moment of birth until young adulthood, bones are developing and strengthening. Our bones are at their most dense in our early 20s – called peak bone mass. See more detailed information about Bone Biology.
As we age some of our bone cells begin to dissolve bone matrix (resorption), while new bone cells deposit osteoid (formation). This process is known as remodeling.
For people with osteoporosis, bone loss outpaces the growth of new bone. Bones become porous, brittle and prone to fracture. For more detailed information see Pathophysiology: Biological Causes of Osteoporosis.
Around the world, 1 in 3 women and 1 in 5 men are at risk of an osteoporotic fracture. In fact, an osteoporotic fracture is estimated to occur every 3 seconds. The most common fractures associated with osteoporosis occur at the hip, spine and wrist. The likelihood of these fractures occurring, particularly at the hip and spine, increases with age in both women and men.
Of particular concern are vertebral (spinal) and hip fractures. Vertebral fractures can result in serious consequences, including loss of height, intense back pain and deformity (sometimes called Dowager’s Hump). A hip fracture often requires surgery and may result in loss of independence or death.
Prevention, diagnosis and treatment
The good news is there are many steps that can be taken to prevent and diagnosis osteoporosis. It’s now a largely treatable condition and, with a combination of lifestyle changes and appropriate medical treatment, many fractures can be avoided.
|
<urn:uuid:4f9d9dde-357c-4fdd-8ccc-f3deb5d0896b>
|
CC-MAIN-2017-26
|
https://sontal.co.za/osteoporose
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320323.17/warc/CC-MAIN-20170624184733-20170624204733-00625.warc.gz
|
en
| 0.926721 | 357 | 3.890625 | 4 |
PE with Joe Wicks
Phonics - au 'Launch the astronaut.'
Write down two or three facts you already know about animals on a scrap bit of paper. Then read through the following powerpoint.
Write one or two interesting new facts you have learnt and draw a picture to go with it. Don't forget to email me a picture through the office email to share them with me, Miss Willis :)
Complete the step by step drawing of a lion using the video below. Then colour or paint your drawing.
|
<urn:uuid:78aa9dba-3020-4bff-b6b9-023206565ed1>
|
CC-MAIN-2020-29
|
https://www.holyoakes.worcs.sch.uk/monday-3/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655902377.71/warc/CC-MAIN-20200709224746-20200710014746-00036.warc.gz
|
en
| 0.928693 | 105 | 3.046875 | 3 |
The BIOS is the Basic Input/Output System that gets your computer up and running before Windows, Linux, or macOS even starts. That is, it’s the firmware on your motherboard that makes everything happen. The BIOS settings can be changed to tweak low-level system hardware settings, enable or disable boot devices, add password protection to your computer, and apply other settings.
Like any configurable part of your computer, the BIOS can get corrupted. You can make inadvertent changes that destabilize your system, fall victim to malware or a botched BIOS upgrade or power outage, or just plain forget your BIOS password. In these cases, resetting your BIOS to its default settings can get you up and running again.
If you are experiencing problems attempting to installing Windows 10 from a USB or DVD, resetting the BIOS might also help. In this article, we’ll take a look at a couple ways you can reset your BIOS back to its original factory state, also known as clearing the CMOS cache.
Clear CMOS Cache on a PC or NVRAM on a Mac
Due to the variety of makes and models, this guide is far from comprehensive, but the basic principles for accessing the BIOS or UEFI firmware interface can be found in our BIOS setup guide.
Finding the setting to reset your BIOS will vary depending on your computer. On my HP desktop and laptop, the reset feature is under the File -> Default Setup menu and is called Restore Factory Settings as default. Users should look for wording relating to Restore Defaults or Factory Default. Usually, you will need to press the F10 to confirm changes before exiting.
Physically Clearing the CMOS Cache
Another way users can reset their BIOS defaults is by manually resetting a jumper on the motherboard. When I just started working as a system administrator at a local high school, students would enter the BIOS and setup a password locking out other students. Resetting the jumper on the motherboard then applying a standard BIOS password to access prevent access resolved this issue.
Before you begin, ensure your computer is powered down, the power cord is disconnected from the outlet then wait about 30 minutes for your system to be cooled down. Reason why? Some electrical charge might still be present even when powered down and disconnected. You don’t want to risk any chance of electrical shock or damage to components.
Proceed to open the system unit then look for a small jumper—there might be two: one for resetting the BIOS and one for just the BIOS password. Remove both, reconnect the system unit to AC power, boot the system then wait about 10 minutes. Once your BIOS has been reset, reconnect the jumpers, then close the system unit, reconnect external devices, then power on the system.
On my HP desktop, the CMOS jumper is actually a button, which I simply press and hold for about 5 seconds. So, this process varies depending on the make and model of your computer.
Another method users can attempt is to simply remove the CMOS battery itself. The CMOS battery looks like a small silver coin.
What about the Mac?
Macintosh computers have a similar setting called the NVRAM (nonvolatile random-access memory). It keeps some information about your Mac such as volume, screen resolution, startup disk, time zone, and recent kernel panic information. Macs are very proprietary, so, any default settings are done externally. Thankfully, it’s very easy to reset them. First, power down your Mac, turn it on then immediately press the following keys at the same time: Option, Command, P, and R. You can release the keys after you hear the startup chime. Apple says you might need to readjust settings for volume, screen resolution, startup disk selection, and time zone afterward.
That’s a quick look at resetting your BIOS defaults. Let us know in the comments if this something you have done before.
|
<urn:uuid:2cb3822e-53be-4c6b-be13-5ece68fb3bfd>
|
CC-MAIN-2017-47
|
https://www.groovypost.com/howto/reset-pc-bios-defaults-nvram-mac
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804125.49/warc/CC-MAIN-20171118002717-20171118022717-00142.warc.gz
|
en
| 0.905635 | 806 | 2.53125 | 3 |
Spotlight on statistics - A fact file on health workforce statistics
Issue No. 2 - February 2008
Gender and health workforce statistics
Women make up about 42% of the estimated global paid working population. Within the health sector, in many countries women comprise over 75% of the workforce, making them indispensable as contributors to the delivery of health care services.
However, in many countries, women still tend to be concentrated in the lower-status health occupations, and to be a minority among more highly trained professionals. In particular, the distribution of women by occupational category tends to be skewed in favour of nursing and midwifery personnel and other ‘caring’ cadres such as community health workers. Women are often poorly represented in other categories, e.g. physicians, dentists, pharmacists and managers.
The under-representation of women in managerial and decision making positions may lead to less attention to and poorer understanding of both the particular features of working conditions that characterize much of women’s employment, and the health care needs specific to women. In many contexts, access to female providers is an important determinant of women’s health service utilization patterns. Omission of gender considerations may also lead to inadequate health system responsiveness to the needs of men: for example, reproductive health services are often not set up so as to encourage male involvement.
Gender analysis of the health workforce may reveal that health systems themselves can reflect or even exacerbate many of the social inequalities they are meant to address and be immune from. Participatory approaches in health workforce planning, development and management should be ensured, where both women and men health workers are given an active role to ensure that research being undertaken is relevant to their needs and interests. Research, policy and programme efforts to address gender equality in the health workforce should lead to strengthened health systems more broadly.
Gender analysis of the health workforce
The collection, processing, dissemination and use of sex-disaggregated data can help to plan, monitor and evaluate successful gender-sensitive interventions in the work place, bringing attention to the ways in which social and behavioural differences between women and men may lead to inequities in working conditions in the health sector and, ultimately, in inequities between women’s and men’s access to health care services and health outcomes. Access to reliable, timely information on gender and the health workforce can inform the steps needed to achieve gender equity.
A strategy for gender analysis of the health workforce should include four key components:
- Building capacity at the international, national and sub-national levels for gender analysis in workforce policy and planning;
- Reflection of gender in national health workforce development budgets;
- Promoting the use of sex-disaggregated data in monitoring and evaluation activities at all levels; and
- Establishing accountability.
Existing tools, methods and approaches for health workforce analysis, originally developed in relation to predominantly male employment sectors, should be validated and extended for analyses of women’s jobs. Analyses of working conditions should consider factors more specifically affecting women workers, such as physical work loads, reconciling work and family, relations with clients and sexual harassment. For example, some incentives for addressing worker productivity and retention may be more favourable to female than to male workers, such as flexible leave arrangements and career-break schemes. Monitoring, assessing and reporting country experiences of these indicators should be improved.
At the same time, caution should be taken to avoid over-emphasizing gender differences, in relation to other characteristics relevant to health workforce studies. Education and training, access to resources, client volume, supervision and age are among the many other explanatory variables involved in processes that characterize health worker productivity and retention.
Three main employment dimensions have been identified as the starting point for the study of gender equality in the labour force: occupation, working time and earnings. Occupational segregation by gender can correspond to either vertical clustering (differentials in the sex ratio according to relative job status) or horizontal clustering (sex differentials according to specialization). Working time can affect workers’ economic position, especially when it results in lower monetary and non-monetary compensation among part-time workers compared to their full-time counterparts, as well as less job security and fewer opportunities for promotion. Because the labour conditions and opportunities vary markedly across occupations and countries, gender equity can be referred to as the absence of observed gender differences.
Presented here are some statistics relevant to gender analysis of the health workforce for selected countries with developed market economies and economies in transition, as compiled drawing on data from national labour force and employment surveys archived by the Luxemburg Income Study. Labour force surveys offer an advantage for conducting analyses on gender and work because they provide nationally representative data on a number of labour market variables that can be disaggregated by sex.
In general among the selected countries, health occupations were found to be subject to both vertical and horizontal gender imbalances. The proportion of women was considerably higher for occupations at the associate professional level compared to the professional level, and also for nursing and midwifery professionals compared to physicians and other health professionals. In some countries, women represented over 90% of nursing and midwifery personnel.
Important gender differences were observed in some countries in working time, measured as the usual number of hours worked per week, including overtime and second jobs. Women tended to average fewer hours than men.
Marked differences were found in average wages by gender. Women of all cadres tended to earn significantly less than their male counterparts. Exceptions were found for certain occupations in the Russian Federation. Given the longer history of high female labour force participation in transitional countries, along with social policies emphasizing equality and supporting working women and their families, gender imbalances may be expected to be less pronounced compared to countries with developed market economies.
References and suggested readings
- Sen G, Ostlin P, George A, Gender Inequity in Health: Why it exits and how we can change it. Report prepared for the WHO Commission on the Social Determinants of Health, September 2007.
- George A, Human Resources for Health: A Gender Analysis. Review paper prepared for the WHO Commission on the Social Determinants of Health, July 2007.
- World Health Organization, Gender Equality, Work and Health: A Review of the Evidence. Geneva, World Health Organization, 2006.
- Gupta N, Diallo K, Zurn P, Dal Poz MR, Assessing human resources for health: what can be learned from labour force surveys? Human Resources for Health 2003, 1:5.
- Standing H, Gender - A Missing Dimension in Human Resource Policy and Planning for Health Reforms. Human Resources Development Journa,l2000, 4:1.
Please contact us with your questions and comments: [email protected]
|
<urn:uuid:7a2ff2c5-7e15-4929-84fc-306d289432d8>
|
CC-MAIN-2014-15
|
http://www.who.int/hrh/statistics/spotlight2/en/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609535095.7/warc/CC-MAIN-20140416005215-00240-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.950476 | 1,392 | 3.1875 | 3 |
Tesla is actively striving to develop an Autopilot that will fully and independently drive a car without human intervention. In general, autopilot is much safer than a human-pilot, so the company's desire is reasonable and justified.
Tesla’s new patent 'System and methods for training machine models with augmented data' generally relates to systems and methods for training data in a machine learning environment and, in particular, to increasing training data by including additional data, such as sensor characteristics, in the training data set.
This patent describes a system that teaches a computer model of images that have been enlarged to support the camera properties of the originally captured images. These camera properties may include internal or external camera properties. They can affect the camera’s appearance with respect to objects and other aspects captured on the image, while adding augmented images to the training data. The extension can provide a generalization and greater reliability of forecasting the model, especially when the images are foggy, closed or otherwise do not provide a clear idea of the detected objects. These approaches can be especially useful for detecting objects in autonomous vehicles.
As an additional example, images can be supplemented with a “cut” function that removes part of the original image. Then, the deleted part of the image can be replaced with other image content, such as the specified color, blur, noise or other image.
Thus, a computer model can be trained with images and augmented images and distributed to a device having the characteristics of a camera of captured images to use the model in the analysis of sensors. In particular, this data addition and model training can be used for models trained to detect objects or bounding boxes in images.
Tesla seeks to launch the Robotaxi fleet by the end of 2020, but for this the company's cars must have Full Self-Driving and be able to drive without human intervention. That is why the company's cars collect data all the time and transmit it to Tesla, who, using various methods, and trains its cars completely independent driving. Patents show that the company is very successful in achieving its goals.
About the Author
Eva Fox joined Tesmanian in 2019 to cover breaking news as an automotive journalist. The main topics that she covers are clean energy and electric vehicles. As a journalist, Eva is specialized in Tesla and topics related to the work and development of the company.
|
<urn:uuid:09c6d216-6a93-420a-a15c-7769d752d9e8>
|
CC-MAIN-2023-14
|
https://www.tesmanian.com/blogs/tesmanian-blog/tesla-new-patent-systems-and-methods-for-training-machine-models-with-augmented-data?_pos=16&_sid=d92440ae2&_ss=r
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944996.49/warc/CC-MAIN-20230323034459-20230323064459-00116.warc.gz
|
en
| 0.938379 | 492 | 2.796875 | 3 |
Pilot's Handbook of aeronautical Knowledge, created by the Federal Aviation Administration, is the official reference manual for pilots at all levels. An indispensable and invaluable encyclopedia, it deals with all aspects of aeronautical information. Each chapter focuses on a different area that pilots are tested on in flight school and must need to know before they fly a plane on of their own. These topics include: aircraft structure principles of aerodynamics flight controls aircraft systems flight instruments and more Flight manuals and documentation are also covered, as is specialized information on such matters as weight and balance, aircraft performance, weather, navigation, airport operations, aeromedical factors, and decision-making while flying. An updated appendix, detailed index, and full glossary make this book easy to navigate and useful in quick reference situations.
Click the Download button to download a copy of the MARC file.
Enter your FTP details below to send the MARC export file via FTP.
by Federal Aviation Administration
Sign up for our email newsletter
|
<urn:uuid:65aa893e-3e20-4ac3-883b-3bd352f1ae16>
|
CC-MAIN-2020-05
|
https://www.recordedbooks.com/title-details/9781629141497
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250592261.1/warc/CC-MAIN-20200118052321-20200118080321-00063.warc.gz
|
en
| 0.893731 | 201 | 3.375 | 3 |
The latest news from academia, regulators
research labs and other things of interest
Posted: Sep 30, 2013
The world's sharpest X-ray beam shines at DESY
(Nanowerk News) The world's sharpest X-ray beam shines at DESY. At the X-ray light source PETRA III, scientists from Göttingen generated a beam with a diameter of barely 5 nanometres – this is ten thousand times thinner than a human hair. This fine beam of X-ray light allows focusing on smallest details. The research groups of Professor Tim Salditt from the Institute of X-ray Physics and of Professor Hans-Ulrich Krebs from the Institute of Materials Physics of the University of Göttingen published their work in the research journal Optics Express ("Sub-5 nm hard x-ray point focusing by a combined Kirkpatrick-Baez mirror and multilayer zone plate").
This is an electron micrograph of the micro lens on the tip of a needle. The lens has a diameter of just two microns.
High-energy (hard) X-ray light cannot be focused as easily as visible light by using a burning glass. "Instead of a common lens, we use a so-called Fresnel lens which consists of several layers," explains co-author Dr. Markus Osterhoff. The central support is a fine tungsten wire with the thickness of only a thousandth of a millimetre. Around the wire, nanometre-thin silicon and tungsten layers are applied in an alternating way. The physicists then cut a thin slice from the coated wire. "This slice has 50 to 60 silicon and tungsten layers, comparable to growth rings of a tree," explains team member Florian Döring. "And the layer thicknesses have to be extremely precise," adds Christian Eberl. The two PhD students have optimized the different fabrication steps.
The wire slice with a size of only about two thousandths of a millimetre is used as a lens. However, it does not diffract light like a glass lens but scatters it like an optical grid generating a pattern of bright and dark patches. In this case, the thickness of the layers is selected in such a way that the bright areas of the diffraction pattern coincide at the same spot. The more precise the lens is fabricated, the sharper becomes the X-ray focus. With this method, the physicists obtained an X-ray beam of 4.3 nanometres (millionth of a millimetre) diameter in horizontal direction and 4.7 nanometres diameter in vertical direction. Until recently it was even debated whether fundamental limits of X-ray optics would stand against such small focal widths. The outstanding brilliance of DESY's X-ray light source PETRA III helped to make a usable nano focus possible.
This is the reconstruction of the two-dimensional focus field. The intensity is color coded.
The fine X-ray beam opens up new possibilities for materials science, e.g. the investigation of nano wires to be used in solar cells. "Usually, when investigating the chemical composition of a sample, the beam size limits the sharpness of the image. Before this experiment, this limit was at about 20 nanometers", said DESY researcher Dr. Michael Sprung, responsible scientist for the PETRA measuring station P10, where the experiments are carried out.
As a next step, the scientists want to improve the performance by depositing the layers on ultrathin and extremely uniform glass fibres. Moreover, they plan to scan first nanoscopic structures with their novel ultra-sharp beam. In the future, such a lens should help to create foci of ultimate flux density with free-electron laser (FEL) radiation.
If you liked this article, please give it a quick review on reddit or StumbleUpon. Thanks!
Check out these other trending stories on Nanowerk:
|
<urn:uuid:d0028d09-2fe1-485a-977a-cf6ca0df9576>
|
CC-MAIN-2014-15
|
http://www.nanowerk.com/news2/newsid=32530.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538787.31/warc/CC-MAIN-20140416005218-00167-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.912467 | 810 | 2.984375 | 3 |
Words: Dave Smith, photography: various, as credited
A great British car maker, born in a factory making sheep shearing machines, and raised by a man who would go on to be the company’s staunchest rival.
Frederick Wolseley was born in Dún Laoghaire, just south of Dublin, in 1837, to a military family. Army life wasn’t for him, though, and in 1854, at the age of just 17, he set sail for the new world, joining his sister and her family on a huge New South Wales sheep farm.
Frederick proved to be pretty handy, and had been slowly developing an automated sheep-shearing machine; in 1869, he set up the Wolseley Sheep Shearing Machine Co, and in 1872 he finished his working prototype. With help from various other engineers, including Melbourne’s Richard Park & Co, he developed his machine, eventually patenting it in 1877. It would be a further 10 years before the machine was ready for general sale and use, but when it was, it proved to be a giant leap forward, and revolutionised the wool industry.
On the strength of this, Wolseley travelled to England in 1889 and set up a new Wolseley Sheep Shearing Machine Company in Birmingham, with massive financial backing, which operated alongside the Melbourne business. Sadly, around the same time, Frederick was diagnosed with cancer, and died early in 1899. You’ll notice that there’s been no mention of motor vehicles so far, meaning that Wolseley must be one of the few eponymous makes in the world where the chap whose name was above the door had little or nothing to do with the cars that bore his name…
So where did the cars come from? They came from another ex-pat, a young man and aspiring engineer who had left England in 1884 to join his uncle, the general manager at a Melbourne engineering firm. By 1887, he was himself a general manager of a part of Richard Park & Co, supplying parts to Wolseley, and when Wolseley went to England in 1889, he put this chap in charge of his Australian workshops. This gentleman was none other than Herbert Austin.
In 1893, Wolseley was suffering from sub-standard parts being supplied by English companies, and sent for Austin to join him in Birmingham. They sorted their supply problems and moved to a larger factory in Aston, but, because sheep shearing was seasonal, they looked for other ventures to take up the slack. One of these was making bicycles; the other was the new hot ticket in engineering: the motor car.
Austin had been to Paris in 1895 and seen a new-fangled motor car, designed by Léon Bollée, and thought of building something similar. Unfortunately, another British company had beat him to it, so he set about building his own. The result was a Wolseley tricycle, with seats for two passengers back-to-back. His next attempt was the 1897 Wolseley Autocar, another tricycle, followed by the four-wheeled Wolseley Voiturette in 1899. There were further developments on this theme over the next couple of years, but the directors of the Wolseley Sheep Shearing Machine Co had lost interest by now in what they saw as Austin’s vanity project.
Not everyone was quite so short-sighted, though. During the last years of the 1800s, Hiram Maxim, of the huge Vickers, Sons and Maxim Armaments Company and inventor of the machine-gun that bore his name, had employed Austin as a consultant on an aircraft design he was planning to produce. When he heard that the Wolseley board had decided that the automobile market would never be profitable, his company seized the moment and stepped in. They bought up all of WSSM Co’s automotive interests – including Herbert Austin – and moved them to a large factory in nearby Adderley Park under the name Wolseley Tool And Motor Car Company.
The new company was formed in March 1901, and within two months, they’d published their first catalogue of motor vehicles. The first Wolseley cars they offered were 5hp and 10hp models, still based on the Voiturette. By spring 1902, they’d added a 20hp model, followed quickly by a 7.5hp and a 6hp. Austin was also building Wolseleys for competition, including a 96hp Gordon-Bennett racer in 1904.
Within its first four years, Wolseley had turned out 1,500 cars, making them Britain’s largest motor manufacturer, and making Herbert Austin a captain of the industry. All was not rosy, though. Up until 1905, Austin had built all Wolseleys with low-revving horizontal single-cylinder or horizontally opposed twin engines, citing their improved lubrication. Technology had move on, though, and the rest of the world was going with newer, higher-revving vertical engines. When the directors suggested that Wolseley follow the herd, Austin resolutely disagreed and, in the summer of 1905, with a year left of his five-year contract, Herbert Austin left Wolseley. He took a number of senior staff and set up shop a few miles down the road in Longbridge… and therein lies a whole other story.
That same year, Wolseley had purchased the Siddeley Motor Company and made John Davenport Siddeley their London-based sales manager. When Austin cleared his desk, Wolseley offered Siddeley the general manager’s position, which he took, and began some major changes. At the Olympia Motor Show in November 1905, there were the little 6hp and 8hp horizontal engined cars, but also a new range of 15, 18 and 32hp cars with new vertical engines, all under the banner of Wolseley-Siddeley.
The new Siddeley engines gave the Wolseley brand a new lease of life and the range went upmarket, with the smaller models being phased out and new, bigger models being brought in. By 1909, the smallest car in the range was the 12/16hp, the largest the 60hp, plus various racing models, but the joint venture was struggling under the increased overheads. In a 1908 streamlining, the board closed Siddeley’s Kent factory and moved production up to Birmingham, then closed Siddeley’s London office. This didn’t sit well with Mr Siddeley, who handed in his notice and moved to Deasy Motors in Coventry, and would eventually become half of Armstrong-Siddeley.
The streamlining effort worked, Wolseley-Siddeley returned to profitability, and the Adderley Park factory was expanded. The cars reverted to Wolseley badges in 1911, and the company was renamed Wolseley Motors Ltd just in time for the outbreak of World War I. As they were still Britain’s largest car manufacturers – as well as making everything else including trucks, double-decker buses, aero engines, taxis, locomotives, boats and so on – they were well equipped to deal with the demands of the War Office.
During this period, Wolseley also spread into the Commonwealth, opening a Canadian office in 1914, followed by appointing other factory representatives in Australia, New Zealand, South Africa and South America to deal with exports. In 1918, the snappily-named Ishikawajiama Ship Building and Engineering Co Ltd in Tokyo bought exclusive rights to build Wolseleys under licence in Japan; that operation eventually became Isuzu Motors after WWII, and became part of General Motors.
During the war years, the elderly Vickers brothers, Thomas and Albert, had died, and after the war, the Vickers board took Wolseley in two directions at once. By adding a Vickers munitions site at Ward End to Wolseley’s production space, they could use their huge capability to build small cars relatively cheaply. They built a two/three-seat 10hp Tourer based on the old Stellite, a 15hp four-seat Tourer, and a 20hp six-cylinder chassis for coachbuilders, and demand was strong. At the same time, they opened an expensive and ostentatious showroom in Piccadilly, next door to the Ritz, called Wolseley House, to show off their upmarket models.
The demand for the posh cars wasn’t as strong as expected, thanks to a general depression in 1920 coupled with the expiration (and subsequent taxation) of lucrative government wartime contracts, and suddenly Wolseley were well into the red. Further motor racing efforts were causing a huge financial drain, and then, in 1922, Morris pulled a masterstroke by slashing the prices of their cars, undercutting all competition. It was crisis time. First to go was the palatial Wolseley House, which had cost £250,000 (£11 million in today’s money) to build, sold to Barclays Bank.
It was too late; the mighty had well and truly fallen. By October 1926, the company was £2 million in the red (£123 million in 2020), bankrupt, and the receivers were called in in what was described as “one of the most spectacular failures in the early motor industry.”
It’s an ill wind, as they say, and when the receivers sent Wolseley to auction in February 1927, bidders included Herbert Austin, William Morris and General Motors. Determined to foil GM, Morris emerged victorious, using £750,000 of his own money, though Austin was supposedly very upset that he missed out and GM went off in a huff and bought Vauxhall. Morris brought all Wolseley production to Ward End, selling off much of Adderley Park and moving Morris Commercial Vehicles into the remainder.
Morris pointed Wolseley back upmarket rather than have them compete with his own products, and Wolseley prospered. New models were introduced, such as the Hornet, the Viper and the Wasp, and a new, overhead-cam six-cylinder engine launched in 1930 proved very popular. In 1935, Wolseley became a Morris Motors subsidiary, but this led in a whole new direction… the new concept of badge engineering. In the years leading up to WWII, Wolseleys slowly became fancified Morrises.
After the seven-year skirmish with Herr Hitler and associated war production, Morris (now Viscount Nuffield) moved Wolseley out of war-ravaged Birmingham and consolidated production at his Cowley plant in 1948. Wolseley was now part of the Nuffield Organisation, which also included Morris cars and commercials, Riley, MG and SU Carburettors. Wolseley’s post-war range was the 4/50 and 6/80, basically a Morris Oxford MO and Six MS respectively, but with the lovely OHC engine and fancy grille. These are most often seen as police cars in almost every post-war period drama on TV.
At the same time, in 1948, there was a proposed amalgamation between Nuffield companies and Austin, joining forces to share information and R&D. It never happened, possibly because Morris was so fragmented and Austin so concentrated, and possibly because Viscount Nuffield and Austin’s chairman (and William Morris’s right-hand man throughout the Thirties until an acrimonious parting of the ways), Leonard Lord, couldn’t stand the damn sight of each other.
It must have come as a surprise, then, that Austin and the Nuffield Organisation companies announced a merger in late 1951, leading to the incorporation of the British Motor Corporation Ltd in early 1952 with Nuffield as president. Nuffield retired just before Christmas 1952, aged 75, though was made honorary president instead; he was succeeded as president by… Leonard Lord.
BMC meant even more badge engineering for Wolseley, the new 1952 4/44 being based on the MG Magnette and the 1954 6/90 on the Riley Pathfinder. The big news for 1957 was the new Wolseley 1500 and its close relative the Riley One-Point-Five, both based on Moggy Minor underpinnings. Then, in late 1958, Wolseley debuted the 15/60 saloon, the new Farina design that would be BMC’s first proper range-wide model; a true mixed grille. Within months, the same body would also be an Austin Cambridge, MG Magnette, Morris Oxford, Riley 4/68 and Princess/Vanden Plas. The 1959 6/99, later the 6/110, was a big saloon based on the Austin Westminster, and in 1961, the Wolseley Hornet and Riley Elf arrived, basically Minis with a boot.
BMC brought out the famous ADO16 design in 1962 with the little front-drive Morris 1100, but it would be 1965 before Wolseley and Riley got their versions. Similarly, the big Austin 1800 ‘Landcrab’ was launched in 1964, but it was 1967 before Wolseley got their 18/85 model.
It was around this time that pressure was being applied from Harold Wilson downwards for British industry to merge and consolidate, and the car industry pack was about to get a mighty shuffle. In 1966, Jaguar had joined the BMC fold to form British Motor Holdings; in early 1968, BMH merged with Leyland Motors, who already owned Standard-Triumph and Rover, to form the ill-starred British Leyland Motor Corporation. The first victim of the union was Riley who, it was felt, was competing in the same market niche as Wolseley, even though they were little more than different trim levels of the same cars.
When the big 6/110 saloon was discontinued in 1968, the dilution of the Wolseley name was complete, and no new models came forth. The Hornet wound up in 1969, the Farina 16/60 in 1971 and the 1100/1300 in 1974. Oddly, the four-cylinder 18/85 Landcrab turned into the six-cylinder Wolseley Six in 1972… just in time for the first oil crisis.
In early 1975, British Leyland debuted the new wedge-shaped Austin/Morris 1800/2200. At the top of the range was a Wolseley version, only available with the 2.2-litre six-cylinder engine, and just called ‘Wolseley’ – no model name. It was short-lived. By September 1975, the Austin and Morris versions had been merged into one, just called Princess, and the Wolseley version was quietly dropped. That was the end of Wolseley.
The name hasn’t quite disappeared, though. The Wolseley Sheep Shearing Machine Co evolved into other areas, and still exists as Wolseley building, plumbing and heating suppliers, though the giant international parent company changed its name from Wolseley PLC to Ferguson PLC in 2017. Their old Aston factory was demolished to make way for housing many years ago. Wolseley’s Ward End Works was last used to build Freight Rover, later LDV vans, until 2009, but was demolished in 2018; the site will supposedly become a servicing and maintenance site for the new HS2 rail link. The Wolseley House showroom remained Barclays’ Piccadilly branch until the end of the millennium, when it became a Chinese restaurant for a while. It is now a restaurant called… Wolseley House.
So the name lives on, in a roundabout way, though it’s unlikely that there’ll ever be another car wearing the lovely Wolseley illuminated grille badge. The name and rights went to the SAIC Motor Corporation Ltd of China during the sell-off of MG Rover earlier this century, but it seems they have no plans to revive the name… possibly because it’s so difficult to pronounce.
|
<urn:uuid:b5694acb-b19b-4a24-af73-b6c4a2717e85>
|
CC-MAIN-2020-34
|
http://www.mogmag.co.uk/wolseley/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740848.39/warc/CC-MAIN-20200815124541-20200815154541-00038.warc.gz
|
en
| 0.97514 | 3,352 | 2.578125 | 3 |
In a previous blog post I outlined the contribution made by these sectors to the UK’s economy and discussed how the loss of passporting rights, access to the single market, and free movement of workers from EU member states could negatively impact these sectors and lead to an economically ruinous exit from the European Union.
This post considers the data protection implications of Brexit for the UK’s economy as many businesses and organisations generate and rely upon huge volumes of personal data in their operations (e.g. in the form of customer records, behavioural, profile and transactional data). The personal data generated, and analysed is a hugely valuable economic asset – European Citizens’ data is predicted to be worth €1 trillion annually by 2020 by
the European Commission.’ Much of this personal data is transferred across national boundaries for processing and storage on servers in data centres, and, as a result, the UK hosts the largest data centre market in Europe, and the third largest in the world.
History of UK Data Protection laws
The UK first introduced data protection legislation in 1984 in response to claims by the business community that the UK was losing cross border trade in personal data because it was a ‘data haven.’ For instance, in 1974, the Swedish Data Inspection Board blocked the export of personal data to the UK for the preparation of embossed health identity cards, citing the UK’s lack of legal protection as justification for the restrictions. (M. Adams, ‘Sweden prohibits sending data to UK,’ New Scientist, 17 April 1975, 133.) The politics and economic impact of such personal data transfer disputes led to calls for a supra-national data protection law to facilitate and manage cross-border data flows, and eventually led to the introduction of Directive 95/46/EC (hereafter ‘the Directive’). Each Member state has implemented the Directive’s provisions through the domestic implementing laws. In the UK, the Directive was implemented through the Data Protection Act 1998 (DPA 1998). However, although each member state transposed the Directive’s provisions into national laws, they did not do so uniformly, and this led to fragmented application and enforcement. Indeed, the failure of member states to properly transpose the Directive was a key factor in the decision to replace it with a Regulation (as well as a concern that it was no longer fit for purpose due to changes in personal data processing technologies).
The GDPR 2016/679
Regulation (EU) 2016/679 (hereafter ‘the GDPR 2016/679’) is scheduled to come into effect on 25th May 2018. It will repeal and replace Directive 95/46/EC and will be directly applicable in the UK without the need for implementing domestic UK legislation. Since it is highly likely that the UK will not have completed the ‘exit process’ by 25th May 2018, the UK Government will initially be obligated to amend the DPA 1998 to bring UK law in line with the requirements in the GDPR 2016/679.
However, withdrawal from the EU will afford the UK an opportunity to pause and reflect on the implications of seeking a trading relationship in which the UK would either be obliged to continue to give effect to the GDPR 2016/679, choose to do so voluntarily, or opt to
devise and implement their own data protection law.
If the UK were to withdraw from the EU but join the European Free Trade Association (EFTA) whose current members, Iceland, Liechtenstein and Norway, and trade with the EU via the European Economic Area (EEA), then it would be obliged to continue to give effect to the GDPR 2016/679 as data protection has been harmonized within the internal market and is part of the EEA agreement (for further discussion see blog post by Olivia Tambou: Brexit or not Brexit: how the GDPR will apply to the UK). However, the Government indicated in its White Paper that: “We will not be seeking membership of the Single Market, but will pursue instead a new strategic partnership with the EU, including an ambitious and comprehensive Free Trade Agreement and a new customs agreement,” so, at first glance, it appears that the UK will not be obliged to continue to give effect to the GDPR 2016/679
once it withdraws from the EU.
Continuing compliance with the GDPR 2016/679?
Some (Including the Federation of Small Businesses) have suggested that the UK Government might introduce a data protection law that is less burdensome for small businesses,
and is more business-friendly in general. Indeed, the Government has indicated an intention to “look later at how best we might be able to help British business with data protection while maintaining high levels of protection for members of the public,” suggesting that it might depart from the provisions in the GDPR 2016/679 in the future. One might think that the introduction of less stringent data protection rules would make the UK more
attractive as a trading partner. However, that would not necessarily be the case for the reasons set out below.
(1) Territorial reach of GDPR 2016/679
Firstly, irrespective of the trade deal negotiated, Article 3(1) of the GDPR 2016/679 will apply to the processing of personal data in the context of the activities of an establishment of a controller or a processor in the Union, regardless of whether the processing takes place in the Union or not. Furthermore, Art 3 (2) stipulates that it will apply to the processing of personal data by controllers and processors established outside the EU ‘if their processing is related to offering goods or services, including those provided free of charge, to EU individuals or to the monitoring of individuals’ behaviour within the EU/EEA countries.’ Given the extra-territorial reach of the GDPR 2016/679, having to comply with a separate UK data protection framework would represent an additional legal compliance burden for businesses operating on a transnational basis – one that would add to the cost of doing business in the UK and put UK businesses at an economic disadvantage.
(2) Minimisation of compliance costs
Secondly, the EU data protection framework (both Directive 95/46/EC and the forthcoming GDPR 2016/679) is regarded as “gold standard.” Indeed, ‘over half the countries in the world now have a data protection and/or privacy law, and most are strongly influenced by the European approach.’
Consequently, although the UK could adopt a different (lower) standard of data protection for internal UK and non-EU established business it is likely that the UK business
community would exert pressure on the UK government to implement data protection laws in the UK that provide an equivalent level of protection since complying with a separate, different, UK data protection framework would present an unwelcome additional compliance burden for businesses operating on a transnational basis. A failure to do so could result in data transfers to the UK being blocked due to privacy and data protection
concerns (e.g. the Swedish health ID cards). Indeed, countries such as Canada, Switzerland, have actively sought to implement ‘equivalent’ level of data protection law in their jurisdictions to facilitate personal data transfers and processing.
The Investigatory Powers Act 2016 – bar on an adequacy determination?
This prompts the question whether, if the UK withdraws from the EU and EEA, but voluntarily chooses to align its data protection laws with those of the EU e.g. by retaining the provisions enacted in compliance with the GDPR 2016/679 prior to withdrawal, it will be successful in obtaining an ‘adequacy’ determination from the European Commission, thereby allowing it to process the personal data of EU and EEA citizens?
A positive adequacy determination cannot be predicted with certainty at this stage, as when assessing adequacy, the European Commission will no doubt consider provisions in the recently enacted Investigatory Powers Act 2016. This legislation requires internet service providers to retain 12 months of subscriber and users browsing data and make it available to numerous Government bodies including the Food Standards Agency and Her Majesty’s Revenue & Customs (HMRC) for the purpose of fighting crime, with few opportunities for judicial oversight. However, the preliminary reference ruling in the Joined cases cases Tele2 Sverige AB v Post-och telestyrelsen and Secretary of State for the Home Department v Tom Watson, Peter Brice, Geoffrey Lewis (hereafter Tele 2 & Watson) determined that national legislation (in the UK, the Data Retention and Investigatory Powers Act (DRIPA) 2014) that contained substantially similar powers was illegal because EU law precludes ‘national
legislation governing the protection and security of traffic and location data and, in particular, access of the competent national authorities to the retained data, where the objective pursued by that access, in the context of fighting crime, is not restricted solely to fighting serious crime, where access is not subject to prior review by a court or an independent
administrative authority’ (para 134).
Although the Tele 2 & Watson decision was issued too late to influence the passage into law of the Investigatory Powers Act (IPA) 2016 – the successor to DRIPA 2014 (which lapsed at
the end of December 2016), it is clear from this ruling that aspects of the Investigatory Powers Act 2016 (such as the extension of data retention powers to internet connection records (i.e. site-level web browsing histories), the absence of a requirement to inform affected individuals of any orders made, and the absence of a requirement to keep the retained data within the European Union are likely to be challenged. Civil Liberties campaign groups, Liberty and Open Right Group (ORG) have both indicated an intention to bring legal
proceedings. Pending revision (e.g. confining access to retained personal data to what is ‘strictly necessary’ for the purposes of combatting ‘serious crime’ and subject to appropriate privacy safeguards, including prior authorisation by a judge or other independent body), could bar the granting of an adequacy decision.
If an adequacy finding was not forthcoming, it would likely prejudice the UK from receiving
business from EU member states as UK established businesses would have to put arrangements in place in order to send personal data to the UK as a ‘third country’ such as reliance upon unambiguous consent, model clauses or binding corporate rules to effect data transfers (for more information see blog post by Olivia Tambou: How the GDPR rules will apply to the UK after the Brexit, part. 2). This would increase the regulatory burden and costs
of UK established businesses that process personal data of EU citizens since these approved mechanisms for lawfully transferring data add an additional administrative layer and vary between jurisdictions.
Irrespective of the trade deal the UK Government negotiates upon exit of the European Union, personal data is, and will remain, a key economic asset, and cross-border transfers of personal data will continue to underpin the UK’s economy. So, if the UK is to avoid
an economically ruinous Brexit strategy it will have to ensure that adequate data protection measures are in place to protect the personal data of European citizens.
The easiest way to achieve this is to ensure that UK data protection law is fully compliant with provisions in the GDPR 2016/679. Also, the UK Government should revise provisions in the Investigatory Powers Act 2016 to ensure compliance with the preliminary reference ruling in Tele 2 & Watson, since the absence of an adequate or equivalent level of data protection would impede cross-border personal data transfers, cause global business established in the UK to relocate and prompt them to reconsider future investment in the country; the antithesis of the White Paper’s objectives.
Note: This blog post is adapted from a roundtable presentation “Data protection after Brexit” by Dr Karen Mc Cullagh at the Computers, Privacy and Data Protection Conference 2017. For an in-depth critical evaluation of the various types of trade deals the UK might negotiate upon exit (with a particular focus on financial, digital and Fintech services) and the data protection implications of each trade model, see: Mc Cullagh, K. “Brexit: Potential Implications for Digital and ‘Fintech’ industries,” International Data Privacy Law, (2017) Vol 7, Iss.1.
Following the outcome of the historic ‘Brexit’ referendum on 23rd June 2016 in which a majority of eligible voters in the UK voted to ‘Leave’ the European Union and the passage by both House of Parliament on 13th March 2017 of the EU (Notification of Withdrawal) Bill giving prime minister Theresa May the authority to trigger Article 50 of the Treaty of Lisbon, the United Kingdom is potentially on course to leave the European Union.
This blog post considers aspects of the Government’s White Paper with a particular focus on the potential implications for the financial services, digital technology, and Fintech sectors of the UK economy, and sets out factors that must be borne in mind if the Government is to avoid implementing an economically ruinous Brexit strategy.
Contribution of Financial Services, Digital and Fintech industries to the UK economy
The UK will undoubtedly want to maintain a trading relationship with the European Union upon exit as the European Union is the world’s largest trading bloc and the world’s largest trader of manufactured goods and services - in 2015, the UK exported £223 billion of goods and services to other EU member states, compared to £95.1 billion to the US
and £15.9 billion to China. Indeed, the service industries account for approximately 78% of the UK’s Gross Domestic Product (GDP), and within the services sector, financial services are key - accounting for circa 8% of the UK’s economic output and approximately
3.5% of employment, said Mark Carney, Governor of the Bank of England in a speech. Relatedly, half of the world’s largest financial firms have their European headquarters in the UK and more foreign banks operate in the UK than any other country.
The financial services sector is supported by ‘Fintech’ industries, that is, companies that use technology to disrupt or make financial services more efficient. The Fintech industries are a subsector of digital technology businesses which represent a further 10% of the UK’s services sector, the highest percentage of any G20 member; and employs 1.56million people. The sector had a turnover of £161bn in 2014 and is continuing to grow, with more than a third of European ‘unicorns,’ that is, privately owned ‘start-up’ technology firms worth over $1bn (including Asos, Hoopla, and Fintechs such as Transferwise and Funding Circle) currently based in the UK. London is home to 18 unicorns – more than double the number of the next closest country, Sweden, which is home to seven.
The UK’s ability to develop and sustain economic growth in the financial and digital technology sectors of the economy and allied Fintech industries will hinge on a number of inter-related factors outlined below.
Factors to consider: loss of access to the single market and highly skilled workers
The first factor is access to the internal (aka single) market in services. At present, once a UK-based financial services provider such as a bank or insurance company is capitalised and regulated in the UK in accordance with EU-wide ‘passporting’ rules they can provide their services in any other EU or EEA country directly or through a branch without setting up a further capitalised and regulated subsidiary, allowing them to offer their services to
a population circa 500m instead of being limited to the UK population of circa 68m. On a positive note, the White paper contains a commitment by the Government to “prioritise securing the freest and most frictionless trade possible in goods and services between the UK and the EU.” Passporting rights will be lost upon exit of the single market, so if the UK does not secure ‘mutual recognition’ or ‘extended equivalency’ rights during exit negotiations then it will be classed as a ‘third country’ with the effect that UK financial services
providers will have to set up a capitalised subsidiary within an EU or EEA country (as is the case with Swiss financial service providers) in order to provide services directly or through branches in the whole of the EU. If that happens then banks and financial service providers might choose to move their place of establishment and associated jobs outside the UK (between 10,000 and 232,000 are reportedly under threat), thereby negatively impacting on the UK’s economy.
Another statement in the White paper that will undoubtedly concern the Digital and Fintech industries is: “We will not be seeking membership of the Single Market, but will pursue instead a new strategic partnership with the EU, including an ambitious and comprehensive Free Trade Agreement and a new customs agreement.” Opting for a ‘hard Brexit’ i.e. foregoing access to the single market will create uncertainty for the Digital and Fintech sectors – it will take time to negotiate the terms of a Free Trade Agreement and a customs union agreement. It remains to be seen whether transitional arrangements will be agreed. It is likely that digital and Fintech industries will find it difficult to secure investment if they are unable to advise potential investors of the size of the market they will be permitted operate in. If these industries find that their ability to ‘scale up’ i.e. expand their customer base in other European member states is impeded or uncertain they may decide to relocate to other EU member states, removing jobs (approximately 60,000) and a growth revenue stream from the UK’s economy – indeed many are already exploring relocation opportunities.
A second factor is the ability of these industries to continue to recruit suitably skilled personnel as the UK suffers from a digital skills shortage - over 30% of the UK’s Fintech human capital drawn is from EU countries and beyond. At present, most (20.7%) are drawn from EU countries (with fewer (13.3%) being recruited from non-EU countries) because of the free movement of people within EU member states. However, in the White Paper, the Government outlined an intention to curb immigration, and in particular, to end free movement of European Union nationals, opting instead to “…design our immigration system to ensure that we are able to control the numbers of people who come here from the EU.”(p 25) Significantly, the government has not proposed a total ban on EU migration, pledging to “…understand the impacts on the different sectors of the economy and the labour market”(p.27). It remains to be seen what steps the UK government will take to ‘control’ immigration from EU countries. Evidently, if overly burdensome (i.e. costly and time consuming) visa requirements are imposed in respect of workers from EU member states it could negatively impact on firms’ ability to recruit suitably skilled workers. If so, they may opt to relocate from the UK to EU member states where they would have greater freedom to grow their workforce to meet their agile expansion business models.
To sum up: Given their economic importance, avoiding major disruption of and job losses in the financial services, digital technology and Fintech industries should be a high priority in the Government’s negotiations on leaving the European Union. Pursuing a ‘hard Brexit’ strategy that sacrifices access to the single market and freedom of movement of workers undoubtedly carries considerable economic risk. The Government will have to tread a careful path to ensure that delivering the will of the people does not lead to an economically ruinous outcome, as the electorate will be quick to complain if it does.
Note: This blog post originally appeared in Blogdroiteuropeen. It has been updated and reproduced by permission. This blog post is adapted from a roundtable presentation “Data
protection after Brexit” by Dr Karen Mc Cullagh at the Computers, Privacy and Data Protection Conference 2017. Karen is a Lecturer in IT/IP/Media Law at UEA Law School. For an in-depth critical evaluation of the various types of trade deals the UK might negotiate upon exit (with a particular focus on financial, digital and Fintech services) see: Mc Cullagh, K. “Brexit: Potential Implications for Digital and ‘Fintech’ industries,” International Data Privacy Law, (2017) Vol 7, Iss.1.
The House of Lords EU Home Affairs Sub-Committee published its report: Brexit: the EU data protection package on 18th July 2017, having heard evidence from the Rt Hon. Matt Hancock MP (Minister of State for Digital and Culture, Department for Culture, Media and Sport at the time of giving evidence), Elizabeth Denham, UK Information Commissioner, and experts from academia, representatives from the Home Office and representatives from the digital technology sector and legal practice.
The committee heard evidence on four legislative measures, namely the General Data Protection Regulation (GDPR), the Police and Criminal Justice Directive (PCJ), the EU-US
Privacy Shield and the EU-US Umbrella Agreement, in order to advise on the options available to the Government for securing uninterrupted data flows between the UK and EU
after the UK leaves the EU.
The Government had already indicated in its White Paper on The United Kingdom’s exit from and new partnership with the European Union that it would “seek to maintain the stability
of data transfers between the EU, Member States and the UK” and the committee fleshed out a two-fold rationale for ensuring unhindered and uninterrupted cross-border data flows
between the UK and EU after the UK leaves the EU. The first is economic - trade in services accounts for 44% of the UK’s total global exports, and three quarters of the UK’s cross-border data flows are with EU Member States, so any arrangement that resulted in greater friction could present a non-tariff trade barrier that would put the UK at a competitive disadvantage. The second is policing/security - continued access to information and intelligence via cross-border flows of data is vital for UK law enforcement agencies.
In his evidence, Mr Hancock, MP, testified that the UK will implement the GDPR in full
because the Government considers it a good piece of legislation and also because “we are keen to “secure the unhindered flow of data between the UK and the EU post-Brexit.” However, the committee was critical of the lack of detail as to how the Government plans to deliver that outcome: “The Government must not only signal its commitment to unhindered and uninterrupted flows of data, but set out clearly, and as soon as possible, how it plans to deliver that outcome. We were struck by the lack of detail in the Government’s assurances thus far.”
The best way forward – an adequacy decision
The committee heard evidence on the merits of two ways in which unhindered data flows could be facilitated, namely: (1) Requiring individual data controllers and processors adopt their own compliant safeguards in the form of model clauses or binding corporate rules, or (2) Seeking an adequacy decision from the European Commission under Article 45 of the General Data Protection Regulation and Article 36 of the Police and Criminal Justice Directive that the UK provides an essentially equivalent standard of protection. The committee determined that the government should seek an adequacy decision from the EU because it would be the most comprehensive and “least burdensome” option for businesses and, in particular, it would offer more stability and certainty for smaller businesses who could not easily absorb the legal costs associated with drafting and obtaining approval for model clauses.
Adequacy hurdle: Investigatory Powers Act 2016
Given that the UK will have implemented the GDPR prior to exit one might expect data to flow unimpeded and uninterrupted post exit. However, the UK will face a number of hurdles:
(1) Upon exit the UK will become a ‘third country’ for data protection purposes and it will have to seek an adequacy decision from the European Commission. This will not be immediately forthcoming since it will require a review of the UK’s legal framework by the European Commission – which is a time consuming process. It has taken other countries e.g. Canada & New Zealand years to obtain an adequacy decision. Even if an adequacy decision could be issued quickly e.g. within a matter of months, the UK would face a ‘cliff edge’ on the day of exit unless a transitional arrangement is put in place as part of the withdrawal arrangements.
(2) When considering an adequacy decision, the European Commission will look at the UK’s data protection framework in the round, including national security legislation. The UK will no longer be able to rely on the national security exemption in the Treaty on the Functioning of the European Union that is currently engaged when the UK’s data retention and surveillance regime is tested before the Court of Justice of the European Union (CJEU). Thus, the UK could find itself held to a higher standard as a third country than as a Member
State. The UK is likely to struggle to obtain an adequacy decision because of provisions in the Investigatory Powers Act 2016 that permit bulk personal data collection and bulk retention of meta data, as in a judgment regarding the UK’s Data Retention and Investigatory Powers Act 2014, (which contained similar provisions to those in its successor, the Investigatory Powers Act), the CJEU ruled that these measures were disproportionate and contravened individuals’ rights to privacy and data protection. Indeed, the UK Information Commissioner expressed concern that “it seems likely that the UK’s surveillance and data retention regime would be a risk for a positive adequacy finding.”
(3) Upon exit, the UK will no longer be party to Privacy Shield, which allows for the transfer of data between companies in the EU and US, or to a similar arrangement for law enforcement called the Umbrella Agreement. The UK will have to secure a fresh agreement with US authorities, and the committee warned that any suggestions that the UK would take “a lax approach” to onward data transfers to the US or elsewhere “would put [an] adequacy decision at risk”.
Overall effect: subject to continuing influence
whilst losing ability to influence
Despite prime minister Theresa May’s pronouncements that European courts will cease to
have influence after Brexit, the UK’s data protection laws will have to stay up to date with, and possibly change in response to developments at the EU level in order to ensure dynamic and ongoing adequacy. The European Court of Justice (CJEU) is therefore going to continue to have an indirect effect on the way the UK’s data protection rules evolve. Some have speculated that the UK might want, over time, to forge it’s own data protection
path. The committee speculated that, “In the longer term, it is conceivable that an international treaty on data protection could emerge as the end product of greater coordination between data protection authorities in the world’s largest markets.” However, industry representatives such as Antony Walker of TechUK were quick to point out that digital technology businesses (and any business that processes personal data) operating on a cross-border basis will want legal frameworks to be as harmonized as possible to reduce compliance burdens. He stressed that in the short-to-medium term the UK government would
do well to “remember the size of the UK market versus the size of the European market”, and the importance of the UK’s trading relationship with the EU to the UK’s economy, and the fact that non-EU countries often establish themselves in the UK for the purpose of trading with EU member states, so that “we will have to do [data protection] very much in partnership with the European Union, rather than simply boldly striking out by ourselves and hoping others will follow.”
Indeed, all those giving evidence to the committee stressed the importance of maintaining a good relationship with the EU and expressed concern that the UK might lose its ability to influence data protection law and policy in the EU when it becomes a third country and ceases to have a place on the European Data Protection Board. To this end, the committee recommended that the UK government consider how best to replace those structures and platforms that have allowed it to influence EU rules on data protection and retention, and
suggested that “It should start by seeking to secure a continuing role for the Information Commissioner’s Office on the European Data Protection Board,” as part of the withdrawal agreement negotiated.
Conclusions: no clean break
Whilst it is not yet clear what the UK’s trading relationship with the EU will look like after exit, it is evident that there is no prospect of a clean break regarding data protection: the
extra-territorial reach of the GDPR means that the legal controls placed by the EU on transfers of personal data outside its territory will continue to apply post-exit when data is transferred from the EU to the UK, affecting UK businesses that process EU data. The UK will have to ensure that its data protection laws closely mirror those of the EU to ensure uninterrupted and unhindered data flows. Undoubtedly, the need for essentially equivalent data protection and indirect influence by the CJEU will be a difficult and unpopular message for ardent Brexiteers [and Theresa May] to hear given their vociferous calls to restore legislative and judicial sovereignty. However, it is abundantly clear that to do otherwise would result in interrupted data flows and serious harm to the UK’s economy – a cost it simply could not bear.
This post was also published on the blog: INTERNATIONAL LAW @ UEA: VIEWS FROM THE BROADS
|
<urn:uuid:1270057e-b962-485d-99ca-edc75857930e>
|
CC-MAIN-2020-29
|
http://www.karenmccullagh.co.uk/brexit-the-gdpr-uk-data-protection
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655879532.0/warc/CC-MAIN-20200702142549-20200702172549-00544.warc.gz
|
en
| 0.941118 | 6,198 | 2.71875 | 3 |
Prafulla Chandra Ray
|Acharya Prafulla Chandra Ray|
|Born||Prafulla Chandra Ray
August 2, 1861
Raruli, Khulna, Bengal Presidency (Present day Bangladesh) British Raj
|Died||June 16, 1944
|Alma mater||Metropolitan Institution
University of Calcutta
The Royal Society of Chemistry honoured his life and work with the first ever Chemical Landmark Plaque outside Europe. He was the founder of Bengal Chemicals & Pharmaceuticals, India's first pharmaceutical company. He is the author of A History of Hindu Chemistry from the Earliest Times to the Middle of Sixteenth Century (1902).
Ray was born in Raruli-Katipara, a village in the Khulna District of present day Bangladesh. His father Harish Chandra Ray was a land proprietor. Up to the age of nine, Prafulla Chandra studied in a school in his village. In 1870 his family migrated to Calcutta and Ray and his elder brother were admitted to Hare School. in 1874, while Ray was in the fourth standard, he suffered from a severe attack of dysentery, which hampered his health throughout his life. Due to the severity of the attack, Ray had to postpone his studies for couple of years and return to his ancestral home in the village. However Ray himself considered this disruption in his studies as a blessing in disguise as it allowed him to read much more widely than what would have been possible within the constraints of school curricula. Amongst others, he read Lethbridge's 'Selections from Modern English Literature' and Goldsmith's Vicar of Wakefield. After recovering from his illness Ray returned to Calcutta and took admission in Albert School.
In 1879 he passed the Entrance Examination and took admission into the Metropolitan Institution (later Vidyasagar College) which was established by Pandit Ishwar Chandra Vidyasagar. At that time the Metropolitan Institution had no science classes or laboratories and Ray attended lectures on Physics and Chemistry in the Presidency College as an external student. Here he was specially attracted by the chemistry courses of professor Alexander Pedler. While studying for his BA examination, he applied for and was awarded in 1882 one of the two Gilchrist Prize Scholarships after an all-India competitive examination. Without completing the course for his degree, Prafulla Chandra proceeded to Britain and enrolled in the BSc programme of Edinburgh University where he studied Physics, Chemistry and Biology amongst other subjects. But Ray did not confine his studies to only natural sciences. He also developed a strong interest in history and read books like Rousselet's 'L'Inde des Rajas', Lanoye's 'L'Inde contemporaine', 'Revenue dex deux moneds'.[clarification needed] He also read Fawcett's book on political economy and 'Essays on Indian Finance'. After obtaining his BSc degree from Edinburgh University, Ray embarked on his doctoral thesis (DSc) in the same university and completed his doctorate in 1887. He was awarded the Hope Prize which allowed him to work on his research for a further period of one year after completion of his doctorate. His thesis title was "Conjugated Sulphates of the Copper-magnesium Group: A Study of Isomorphous Mixtures and Molecular Combinations". While a student he was elected Vice-President of Edinburgh University Chemical Society in 1888.
Prafulla Chandra returned to India in the first week of August 1888 and subsequently joined Presidency College, Calcutta as temporary Assistant Professor of Chemistry in 1889. Ray who had a doctorate in science from Edinburgh University felt deeply aggrieved when even with his excellent educational credentials he was not able to secure a position within the Imperial service (his academic position was within the 'provincial service') and attributed this to the discriminatory attitude of the ruling government towards native intelligentsia. He complained to the top officials of the government but with no effect.
In 1896, he published a paper on preparation of a new stable chemical compound: mercurous nitrite. This work made way for a large number of investigative papers on nitrites and hyponitrites of different metals, and on nitrites of ammonia and organic amines. He started a new Indian School of Chemistry in 1924.
Prafulla Chandra retired from the Presidency College in 1916, and joined the Calcutta University College of Science (also known as Rajabazar Science College) as its first "Palit Professor of Chemistry", a chair named after Taraknath Palit. Here also he got a dedicated team and he started working on compounds of gold, platinum, iridium etc. with mercaptyl radicals and organic sulphides. A number of papers were published on this work in the Journal of the Indian Chemical Society.
In 1936, at the age of 75, he retired from active service and became Professor Emeritus. Long before that, on the completion of his 60th year in 1921, he made a free gift of his entire salary to the Calcutta University from that date onward, to be spent for the furtherance of chemical research, and the development of the Department of Chemistry in the University College of Science.
He had written 107 papers in all branches of Chemistry by 1920.
Literary works and interests
He contributed articles in Bengali to many monthly magazines, particularly on scientific topics. He published the first volume of his autobiography Life and Experience of a Bengali Chemist in 1932, and dedicated it to the youth of India. The second volume of this work was issued in 1935.
In 1902, he published the first volume of A History of Hindu Chemistry from the Earliest Times to the Middle of Sixteenth Century. The second volume was published in 1908. The work was result of many years' search through ancient Sanskrit manuscripts and through works of orientalists.
In 1923, Northern Bengal suffered a flood which made millions of people homeless and hungry. Prafulla Chandra organized Bengal Relief Committee, which collected nearly 2.5 million rupees in cash and kind and distributed it in the affected area in an organized manner.
He donated money regularly towards welfare of Sadharan Brahmo Samaj, Brahmo Girls' School and Indian Chemical Society. In 1922, he donated money to establish Nagarjuna Prize to be awarded for the best work in chemistry. In 1937, another award, named after Ashutosh Mukherjee, to be awarded for the best work in zoology or botany, was established from his donation.
He earned his D.Sc at Edinburgh University in 1887. In 1908 the University of Calcutta awarded him an honorary Doctor of Philosophy degree. He received an honorary D.Sc. degree from Durham University in 1912, and another from Dacca University (now Dhaka University) in 1936. He was made a Companion of the Order of the Indian Empire in 1911. He was an honorary fellow of the Chemical Society and Deutsche Akademie, Munich. He was awarded a knighthood in 1917. He was president of the 1920 session of the Indian Science Congress. The Royal Society of Chemistry (RSC) honoured his life and work with the first ever Chemical Landmark Plaque outside Europe.
He remained a bachelor throughout his life who took active participation in politics. His family, in particular, his father Harish Chandra Ray, was strongly associated with Brahmo Samaj. Prafulla Chandra developed direct connections with the Samaj as he grew up; he used to attend Sunday evening sermons of Keshub Chandra Sen and was deeply influenced by Sen's Sulabha Samachar. Later he was closely associated with Sadharan Brahmo Samaj and occupied various administrative posts during his lifetime and finally elected as the President and Trustee of Sadharan Brahmo Samaj.
Tagore, when presiding over his seventieth birthday celebration, said:
It is stated in the Upanishads that The One said, 'I shall be Many'. The beginning of Creation is a move towards self-immolation. Prafulla Chandra has become many in his pupils and made his heart alive in the hearts of many. And that would not have been at all possible had he not unreservedly made a gift of himself. The glory of this power in Prafulla Chandra as teacher will never be worn out by decrepitude. It will extend further in time through the ever-growing intelligence of youthful hearts ; by steady perseverance they will win new treasures of knowledge.
This summarizes the effect and influence that Prafulla Chandra had on his followers and countrymen.
Acharya Prafulla Chandra College, Prafulla Chandra College, Acharya Prafulla Chandra High School For Boys, and Acharya Prafulla Chandra Ray Polytechnic in Kolkata commemorate his name, as does the Bagerhat P.C College in Horinkhana, Bagerhat, Bangladesh.
- "P C Roy and Modern Science". Frontier Weekly. Retrieved 10 October 2012.
- Uma Dasgupta (2011). Science and Modern India: An Institutional History, C. 1784-1947. Pearson Education India. p. 137. ISBN 978-81-317-2818-5.
- Patrick Petitjean; Catherine Jami; Anne Marie Moulin (1992). Science and Empires: Historical Studies about Scientific Development and European Expansion. Springer. pp. 66–. ISBN 978-0-7923-1518-6. Retrieved 30 September 2013.
- J. Lourdusamy (1 January 2004). Science and National Consciousness in Bengal: 1870-1930. Orient Blackswan. pp. 145–. ISBN 978-81-250-2674-7. Retrieved 30 September 2013.
- "Annual Convocation". University of Calcutta.
- Banga Shilpa Sammelan
|Find more about Prafulla Chandra Ray at Wikipedia's sister projects|
|Source texts from Wikisource|
|Database entry Q3351086 on Wikidata|
- Publications of Prafulla Chandra Ray
- A Biography (Calcuttaweb.com)
- Article from Vigayanprsar website
|
<urn:uuid:29a5a2b3-02b6-49da-a53a-bb1868ea59d5>
|
CC-MAIN-2014-35
|
http://en.wikipedia.org/wiki/Prafulla_Chandra_Roy
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500830903.34/warc/CC-MAIN-20140820021350-00255-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.96199 | 2,104 | 2.625 | 3 |
Why Choose Solar Thermal
Reduce Your Water Heating Costs.
Free Hot Water Throughout The Year
Using commercial and industrial solar thermal panels for hot water production is a long established energy saving system.
Commercial solar thermal systems work alongside existing heating systems and are particularly well suited to integration with heat pumps.
Although solar thermal panels work all year round, heating around 80-90% of your hot water in summer, a conventional boiler or immersion heater can be required to make the water hotter during the winter months.
“Solar water heating systems reduce
energy consumption and cut costs.”
Reduced Carbon Footprint
A typical Solar water system may save up to 350kg of CO2 per year compared to water heated by gas or electricity.
Earn As You Save
You will also be able to receive payments for the heat you generate from a solar water heating system through the government’s Renewable Heat Incentive.
For example, a typical dairy farm:
Most dairy farms have a high hot water demand and use electricity as their main source of fuel, making them particularly suitable for a large-scale solar thermal panels system.
Systems size = 21m² (8 x flat plate solar thermal panels, 1 x 1,000 litre buffer store)
Approximate cost = £10,000 (+VAT)
For a typical dairy farm the payback calculations for a solar thermal system would look like this:
RHI Payback Calculations:
Figures given are per year, and (in brackets) over a 20-year lifetime of RHI payments:
Estimated energy generation: 6,858.1 kWh* (137,162 kWh*)
Estimated income from the RHI @ current rate of 8.9p per unit, index linked: £610.37 (£12,207.42)
Estimated minimum savings on electricity bill (likely to rise as energy costs rise): £960.13 (£19,202.60)
Income + savings: £1,570.50 (£31,410.00) Estimated payback time = 6.4 years
(Calculated using Polysun simulation software)
You may also be able to get help with the installation costs of solar thermal panels through the Renewable Heat Premium Payment scheme.
Is My Property Suitable For Solar Thermal Panels?
Getting the site right.
The first important thing to remember is that solar thermal systems are site specific. They are only suitable where there is a heat or hot water demand.
Unlike solar PV, if there is no on-site demand then there is nowhere for the energy to go and you will not get any benefit from the system. The bigger the demand, the bigger the potential benefits from a solar thermal system.
Phase one of the RHI (for non-domestic properties) requires the use of heat metering to determine the amount of energy units generated and where the energy is used. Ensuring systems are designed and working efficiently will be key to ensuring a good return on investment and a long lifespan.
If you can get the site and the design of a system correct, then the potential returns can be very attractive.
Typical sites that could benefit from a solar thermal system would include sports clubs, swimming pools, care homes, hospitals, dairy farms and or camp sites.
If you answer yes to the following questions your home could be suitable for a solar thermal installation.
“Most roofs are more than capable
of supporting a solar thermal system”
Does Your Roof Face The Sun?
It is best if your roof is South facing, but East and West facing properties can also benefit from our split systems which makes the most of the sun from either direction. You will need around five square meters of roof space.
Is The Chosen Area Shaded?
If other buildings, trees or chimneystacks cast shadows on your roof, it may not be appropriate to install solar panels on your roof. However, solar thermal panels can be installed directly on property walls, so your building may still be suitable for a solar thermal installation.
Does Your Roof Have The Right Pitch?
Most properties in the UK have a roof pitch of around 30-50˚. If your roof fall above or below this figure you may still be able to install a solar thermal panel to your wall or a flat roof.
Is The Roof Structurally Sound?
During our site survey, we will inspect your roof to ensure it is structurally capable of holding the load of the solar panels safely and securely. Most roofs have more than ample capability.
Are There Any Obstructions?
If you have roof windows, vents, or chimneys in the area that your solar thermal panels need fitting, these may need relocating if possible, otherwise they may prevent the install from going ahead.
You will need to replace your existing cylinder or add a dedicated cylinder with a solar heating unit
Is Your Current Boiler Compatible With Solar Water Heating?
Most conventional boiler and hot water cylinder systems are compatible with solar water heating. However, if you have a combination boiler (combi) and you currently don’t have a hot water tank a solar hot water system may not be compatible.
We can of course provide advice on the most suitable boilers. and install them.
How Does Solar Thermal Work?
Solar water heating systems, also called solar thermal systems, use the power of the sun to heat your home’s water.
Solar water heating systems use solar panels fitted to your roof to collect heat from the sun to heat up water stored in a hot water cylinder. This is done by passing a fluid through the panels and pipework, which heats up and is then pumped through a coil within your water cylinder, which heats water in the cylinder to the desired temperature
“Panels collect heat from the sun,
which heats water in a cylinder.”
Solar heating systems tend to work much better in summer months, heating around 80 – 90% of your hot water, but can still provide significant benefits during winter months too. The solar fluid never touches the water itself, but merely heats the cylinder to the desired temperature through heat transfer.
Frequently Asked Questions
Is There Enough Sun In The UK For Solar Panels To Work?
Believe it or not there is. The UK actually receives the same amount of sunlight as parts of France and Spain. Solar panels are powered by light – not heat or direct sunlight. So even when it is raining solar PV panels are still absorbing more than enough energy.
“Solar thermal installation is fast, with
minimum disruption to your business.”
Are There Different Types Of Solar Thermal Panels?
There are two types of panels that can be used:
Flat-plate collectors represent very good value for money, and last for many years with minimal maintenance. These systems are usually large glazed panels, which sit flat to the roof. Their format better lends themselves to new builds and buildings requiring a complete re-roof.
Evacuated-tube collectors are a great solution if you only have a small amount of roof space available, as they are known to be more efficient than flat-plate collectors. These systems are also very flexible and versatile, as they can be fitted in any orientation to a pitched or flat roof, as well as being fixed directly onto walls should space be at a premium.
Do You Need Planning Permission For Solar Panels?
Planning permission regulations were altered in 2008 to make the installation of renewable technologies a more straightforward process. This has meant that most commercial solar panel installations in the UK do not require planning permission. We will of course advise on your particular circumstances as part of our initial site survey.
How Long Does Installation Take?
The average solar thermal installation only takes around 5 days. but can vary depending on system size. During this time disruption to your business will be minimal.
What is the Non-Domestic Renewable Heat Incentive?
The Non-Domestic Renewable Heat Incentive (RHI) is a Government environmental programme that provides financial incentives to increase the uptake of renewable heat. For the non-domestic sector broadly speaking it provides a subsidy, payable for 20 years, to eligible, non-domestic renewable heat generators.
Of course this is subject to the detailed scheme rules. Ofgem is responsible for implementing and administering the scheme on behalf of the Department of Energy and Climate Change.
Who Is The Scheme For?
The Non-Domestic RHI is open to the non-domestic sector including industrial, commercial, public sector and not-for-profit organisations with eligible installations, and to producers of biomethane. In the context of the scheme, a non-domestic installation is a renewable heat unit that supplies large-scale industrial heating to small community heating projects.
This includes for example small businesses, hospitals and schools as well as district heating schemes such as where one boiler serves multiple homes. All applications are subject to the detailed scheme rules.
How Do I Claim the Renewable Heat Incentive?
Once you have installed your Solar Thermal system Energy Gain UK will provide you with a certificate to confirm your installation meets with the Microgeneration Certification Scheme (MCS) standards. We will then assist you through the process to complete your claim.
Can I Get Finance?
We have a range of very competitive finance options that we can offer, ensuring we find the best deal for you.
Solar Thermal Installation
Energy Gain has many years experience in the installation and maintenance of solar thermal units. Our teams are carefully selected professionals ranging from project managers, installers and electricians, all of which have now fitted hundreds of solar thermal systems to domestic and commercial premises throughout the UK. Commercial installations can usually be complete in around 5 days.
“Commercial installations can usually be
completed in around 5 days”
|
<urn:uuid:3153d064-6d70-4396-875f-00195a6e6f58>
|
CC-MAIN-2017-43
|
http://energygain.co.uk/energy-sectors/commercial/business/solar-thermal-commercial/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824293.62/warc/CC-MAIN-20171020173404-20171020193404-00799.warc.gz
|
en
| 0.916604 | 2,032 | 2.625 | 3 |
The concept of objective storage is a way of storing and grouping information, which is formed on the representation in the form of objects. Objective storage divides all objects into 3 main components and gives each its identifier. In this article, we will learn the basic information about S3 objective storage and understand its strengths and weaknesses.
Is s3 an object storage?
S3 data storage (Simple Storage Service) falls into the category of object storage because it separates all information into different objects. Each object in S3 consists of a unique key, metadata, and content. This method of information distribution distinguishes S3 from more conventional file systems that organize all data into directories and subdirectories.
Because of this approach to storing information, objective storage has many strengths. This list includes:
- Flexibility: thanks to object storage capabilities, any data can be organized in a matter of minutes into understandable directories, or even nested one inside the other. At the same time, this type of storage allows you to apply a flat structure, in which all objects exist and do not depend on the organization in categories.
- Scalability: object storage provides horizontal scalability. In other words, horizontal scalability allows you to add multiple servers for storing information.
- Availability: failures and failures in storage do not affect the integrity of data, because each object can be replicated to any server and allocated to different physical locations. Thus, we can say that object storage has a high level of information availability.
If s3 is global then why do we need to select a region while launching it?
Although S3 is considered a global storage project, it is required to specify a region when starting it. This requirement is based on several factors. For example, selecting a region will move the data as close as possible to the end user, which will significantly reduce access delays and increase productivity.
Don't forget that each S3 region has a unique tariff price for storing information. In this way, AWS optimizes the cost of data transfer and storage. In general, selecting a region allows better optimization of information storage by distributing the load, which reduces the risk of disruptions to a minimum.
How do I write an S3 Object to a file?
Writing an object from S3 to a file is done with different programs and programming languages. Everyone can choose the best option for themselves, as they differ in the method of recording and other subtleties. For example, the most common programming languages for writing an object from S3 to a file, are:
The mentioned programming languages are only a small part of all possible languages for writing objects. However, it is these 7 languages that are equipped with the corresponding libraries and SDKs that will allow you to easily interact with S3 to write objects to files.
Is it possible to find all S3 buckets given a prefix?
To find all buckets in S3 with a prefix, you can use the AWS CLI or SKD. In this case, the prefix is the common part of the object keys used to filter all buckets. Here is a command to search for all S3 buckets with the desired prefix, you must enter it in the AWS CLI:
aws s3api list-buckets --query "Buckets[?starts_with(Name, "prefix")].Name"
If you want to use the SDK for programming languages to search for buckets, you should first study the SDK's documentation and apply the methods and filters specified there. In this way, you can find a list of buckets from S3 under the desired prefix.
|
<urn:uuid:e4834309-53bc-4dd9-84a0-7fd2ea7c9020>
|
CC-MAIN-2023-40
|
https://3hcloud.com/blog/products/what-is-object-storage/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.30/warc/CC-MAIN-20230924191454-20230924221454-00830.warc.gz
|
en
| 0.902985 | 746 | 2.890625 | 3 |
COASTAL DRAINAGE MORPHOMETRY ANALYSIS OF BHITARKANIKA MARINE NATIONAL PARK REGION, KENDRAPARA, ODISHA, INDIA BY USING GIS AND REMOTE SENSING TECHNIQUES
Journal of Applied Physical Science International,
Morphometric analysis is significantly important in any hydrological investigation and it is inevitable in development and management of drainage basin. A critical evaluation and assessment of morphometric parameters of Bhitarkanika Marine National Park (BNP) region have been achieved through measurement of linear, aerial and relief aspects of basins by using remote sensing and GIS techniques, and it necessitates the preparation of a detailed drainage map. The quantitative analysis of morphometric parameters is proved to be of immense utility in the study of coastal watershed management, water conservation and natural resources management at micro level. The present work is an attempt to carry out a detailed study of linear, relief and areal morphometric parameters along with a drainage vulnerability map based on the drainage density. For planning and management activity, a detailed present land use/land cover (LULC) map is needed, thus an attempt has been made to generate the LULC of the study area. Besides these, the vegetation index and elevation distribution map have been prepared. BNP region has an area of 1085.72 km2 and lies in the administrative unit of Kendrapara district of Odisha, India. ASTER Digital Elevation Model (DEM) from United States Geological Survey (USGS) website were utilized to delineate the drainage system, thus to identify precisely water divides using Geographic Information System (GIS).It has been found that in BNP region, the total number of streams is 1430 belonging to different stream orders with the highest order of 5. The findings will be useful for the coastal managers, decision makers in the sustainable management of the fragile coastal environment.
- remote sensing
How to Cite
Abstract View: 1277 times
PDF Download: 9 times
|
<urn:uuid:4aad0e28-cb06-47f0-b3aa-24cfa91ebf31>
|
CC-MAIN-2023-14
|
https://ikppress.org/index.php/JAPSI/article/view/4545
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948976.45/warc/CC-MAIN-20230329120545-20230329150545-00460.warc.gz
|
en
| 0.866782 | 445 | 2.65625 | 3 |
There’s a reason we often use the phrase “It ain’t Rocket Science”. Because real rocket science IS difficult. It is dangerous and complicated, and a lot of things can and do go wrong, often with disastrous consequences. It is imperative that the lessons learned from past failures must be documented and disseminated to prevent future mishaps. This is much easier said than done. There’s a large number of agencies and laboratories working on multiple projects over long periods of time. Which is why NASA has set up NASA Lessons Learned — a central, online database of issues documented by contributors from within NASA as well as other organizations.
The system is managed by a steering committee consisting of members from all NASA centers. Public access is limited to a summary of the original driving event, lessons learned and recommendations. But even this information can be quite useful for common folks. For example, this lesson on Guidance for NASA Selection & Application of DC-DC Converters contains several bits of useful wisdom. Or this one about IC’s being damaged due to capacitor residual discharge during assembly. If you ever need to add a conformal coating to your hardware, check how Glass Cased Components Fractured as a Result of Shrinkage in Coating/Bonding Materials Applied in Excessive Amounts. Finally, something we have all experienced when working with polarized components — Reverse Polarity Concerns With Tantalum Capacitors. Here is a more specific Technical Note on polarized capacitors (pdf): Preventing Incorrect Installation of Polarized Capacitors.
Unfortunately, all of this body of past knowledge is sometimes still not enough to prevent problems. Case in point is a recently discovered issue on the ISS — a completely avoidable power supply mistake. Science payloads attach to the ISS via holders called the ExPRESS logistics carriers. These provide mechanical anchoring, electrical power and data links. Inside the carriers, the power supply meant to supply 28V to the payloads was found to have a few capacitors mounted the other way around. This has forced the payloads to use the 120V supply instead, requiring them to have an additional 120V to 28V converter retrofit. This means modifying the existing hardware and factoring in additional weight, volume, heat, cost and other issues when adding the extra converter. If you’d like to dig into the details, check out this article about NASA’s power supply fail.
Thanks to [Jarek] for tipping us about this.
|
<urn:uuid:24a00e2a-b35f-4933-9e03-2b863fc46759>
|
CC-MAIN-2017-39
|
https://hackaday.com/2017/01/11/fail-of-the-week-nasa-edition/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689874.50/warc/CC-MAIN-20170924044206-20170924064206-00691.warc.gz
|
en
| 0.930449 | 512 | 2.859375 | 3 |
Every one wishes to have long Healthy Life. Scientists are searching for the ways to have long lasting youth and disease free old age. Sages were able to live Healthy Life with normal abilities by use of herb and yoga. Here are some scientifically proven ways that can add years to your life and can make your Healthier. Just follow the following Health Tips and Health Facts.
Sufficient sound sleep can increase your performance and add years in life. Greek scientists have proven that people who took daily siesta suffered fewer heart attacks. While other researchers have shown that people with long term sleep problems have higher chances of heart attack while those who sleep soundly for 6 to 8 hours a night suffer fewer illnesses.
Regular cold bath can have refreshing and may be the secrets of long, Healthier Life is believe of many naturopaths researchers have proved that the progressively cold baths improves cardio-vascular efficiency improves immunity and fertility and decreases chances of heart attacks. In Russia people take ice cold bath to boost their potency.
Keep a Pet
It has been shown that the pet owner lives longer as pets like cats or dogs help in relaxing a person and chances of illness decrease.
Married person on average have longer life span than singles/window/widower. Marriage is more beneficial to life. Marriage is more beneficial to life. Single men don’t have any one to care and are more likely to suffer from chronic disease. More over a stable happy life keeps people young. Divorced people suffer from chronic debilitating disease.
Eat Less Than Your Appetite
In animals calorie restriction can slow ageing process and can prolong the life. Scientists believe that restricting the diet in human can increase their life span to 150 years. It has been shown that restricting the calories leads to decrease in blood pressure and increases immunity.
Laughter keeps us young and happy. Studies have proved that people who laughs more live long Healthy Life. If ill people laugh, their recovery is faster. Try to enjoy every movement of life. Now many laughter clubs have been established to relieve tension.
Men and women who play or do exercise regularly can live longer. Regular exercise protects from many disease like high blood pressure, diabetes, angina, joint diseases etc. regular exercise delays the aging changes.
I hope that these Health Tips and Health Facts on How To live a long Healthy Life will surely benefit you.
|
<urn:uuid:63be3b7a-69a2-4f93-bd55-a8bb2262b98c>
|
CC-MAIN-2014-10
|
http://techiebros.com/best-health-tips-and-health-facts-on-living-a-long-healthy-life/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010352519/warc/CC-MAIN-20140305090552-00001-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.947895 | 481 | 2.640625 | 3 |
High Plains farmers, stung by a combination of high energy costs and low prices, will take any good news they can get. And soil moisture levels high enough to preclude pre-watering to get crops out of the ground qualifies as some of the best news they've heard lately.
“We don't recommend pre-watering this year,” says Gerald Crenwelge, soil scientist with the High Plains Underground Water Conservation District No. 1. “We've had good soaking rains, especially up in the Amarillo area, that put most producers in pretty good shape, if they haven't plowed out the moisture.”
Crenwelge says if the rainfall pattern holds through planting farmers “will be in great shape compared to a year ago. And with the price of natural gas, they can't afford to pump if they have decent moisture levels.”
He says farmers still need to conserve as much water as possible by maintaining furrow dikes and following other conservation practices. “Keep those pumps off as long as possible,” he says.
He noted that recent soil moisture evaluations indicate the High Plains area has received from two-and-a-half to four inches of rain since the first of the year. “And that does not include snow.
Most of the High Plains has recorded more than 100 percent of the normal rainfall for the past few months. Most precipitation came slow, so if farms were set up correctly, most of the moisture soaked into the soil.
“Unfortunately, some farms are not properly set up, and they lost most of the moisture. If the land is flat and the soil is not fluffed up properly, farmers can lose virtually all the rainfall,” Crenwelge says.
He noted that contour farming, furrow dikes, residue and shallow tillage all help save soil moisture.
“Contour farming, even on sloping land, will conserve moisture. And residue helps prevent wind erosion, improves soil tilth and reduces evaporation losses.”
He says cotton provides little residue and that makes “rotation with corn or grain sorghum an important consideration.”
Crenwelge says farmers should plow as little as possible as they prepare land for planting. “Shallow tillage will be better than deep. And avoid turn plows that invert the soil and bring wet soil to the surface to dry out.”
LaTisha Keller, an engineer technician with the conservation district, says furrow dikes are critical for soil moisture management. “Farmers need to maintain these dikes in the winter to capture all the rainfall they can,” she says. “Furrow dikes capture moisture and allows it to soak into the soil surface.”
Even with a good start, Crenwelge says farmers still face challenges to preserve as much moisture as possible. “Precipitation from April through June typically comes as hard, driving rain,” he says. “Farmers need to till shallowly to fluff up the soil to hold as much of that moisture as possible and continue to maintain those furrow dikes.”
He says as cotton planting time nears, soils remain wet. “That means farmers will be pressed to get a crop in quickly. Rapid land preparation tends to dry the soil out and cause compaction. Farmers should do as little tillage as possible. The shallower they go, the more residue they hold and the more moisture they save. Some surface roughness also helps hold subsequent rain.”
He says cotton land will lose moisture as growers prepare seedbeds. “Make certain to lose as little as possible.”
In season, farmers will need to be aware of moisture needs and conservation, Keller says.
“Continue to maintain furrow dikes and be as efficient with irrigation as possible. Pumping water will cost a lot of money this year.”
She says scheduling irrigation to meet crop demands will be critical. “Continue to loosen the soil to capture hard, driving rains. And irrigate with the proper amount of water at the proper time and with the correct nozzles to improve efficiency,” she says.
Pump efficiency also will save water, she says.
“Farmers have to hope for adequate rainfall during the season,” Crenwelge says, “but they also have to prepare their soil to hold it.”
|
<urn:uuid:05a44a0d-7784-4081-a8b2-31b766c92ce6>
|
CC-MAIN-2014-23
|
http://southwestfarmpress.com/pre-plant-soil-moisture-adequate
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510273676.54/warc/CC-MAIN-20140728011753-00439-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.965324 | 939 | 2.546875 | 3 |
Do you ever think about the fact that, if you ate differently, you might be better able to handle the stress in your life? Do you ever wonder how stress might affect what you eat? No matter which way you look at it, stress and food are related. There are many things that you can do to help deal with your stress without resorting to food as your crutch.
How Your Diet🍽️ and Stress 💦Are Related
1. When you're stressed out you're more likely to either over-eat or under eat. When you do either of these things you are negatively impacting your blood glucose levels and your moods may swing violently, which will only create conflict and intensify your stress. Unfortunately, most of us don't realize how we can sabotage ourselves with food! Once you become aware of your stress response, you can make the choice to change it. 👍
2. Food cannot cure stress,😞 but it can help. When you eat nutritious foods you are giving your body what it needs to deal with your daily demands. In other words, when you eat the proper foods you are giving your body the fuel it needs to make it through common stressful situations. When you predominantly eat sugars 🍬and fats 🍟in your diet, your body doesn't have all of the nutrients and energy supplies needed to deal with stress, so instead, you're more likely to feel grouchy, tired, 🥱or anxious.
3. Stress breaks down the immune system,🧬 while the right foods can help support it. Time and time again, studies have proven that stress makes our immune system weaker, leaving us exposed to dangerous viruses,🧫 bacteria🦠, and illnesses.🤒 It has also been proven that when you eat the right foods 🍏you're helping your body build and maintain a healthy immune system. The key here is simple: Eat right, feel great!🤩
Your Stress and Your Diet
When you look at all of the ways that stress and diet are interwoven, it's hard to deny the fact that the foods you eat affect how you think, 🤔feel, and react. After all, an unhealthy diet not only stresses your body, but your mind as well. A good starting point is to evaluate your daily diet and make one change at a time to create that healthy lifestyle you deserve.
Not Just the Diet
A healthy and balanced diet can help you manage stress much more effectively, but simply eating right is not enough to help you deal with stress. There are many different things you can do to help control and manage your stress such as:
1. Getting 7-8 hours of sleep at night
2. Making time to relax🌴
3. Having a support system 🤝
4. Knowing your limits 📏
5. Proactively planning and organizing 📝
6. Being able to say no 🙊
These are just a few stress solutions that, in addition to healthy eating, will help you limit and control the stress in your life. When you incorporate even just a few of these healthy living strategies into your life, you'll find that overwhelming stress is a thing of the past; and the weight will be lifted off your shoulders (and thighs!)😂😂😂
If you're concerned about insurmountable stress in your day to day living, look into a natural
approach to reducing your stress with Cat's Claw* Herbal Supplement. It's a South American herb traditionally used for a wide variety of problems. It is also considered an adaptogen, which helps the body regulate and adapt to stress. Why not give Cat's Claw a try sooner rather than later.
Cat's Claw (aka Una De Gato) Unicaria guianensis Unicaria tormentosa
💲hop Now on our website at: www.naturallivingbydesign.com
|
<urn:uuid:b1507c79-ddde-4938-80a8-44a4d1a7548e>
|
CC-MAIN-2023-40
|
https://www.naturallivingbydesign.com/post/the-link-between-diet-and-stress
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510781.66/warc/CC-MAIN-20231001041719-20231001071719-00374.warc.gz
|
en
| 0.955276 | 810 | 2.546875 | 3 |
These kinds of tests should never be taken too seriously!
But on the flip side – there are also others who when they find themselves under severe stress, become extremely creative and innovative. You might not do well on one day but excel on another.
The cool thing about these tests, games and exercises is that they stimulate you to think in ways you wouldn’t normally try. So go ahead…give it a bash!
Try completing the Guilford Alternative Uses Task
- Choose one of the following:
- Tin can
2. List as many possible uses as you can for the item.
Originality – Best scored in a group context or by an experienced assessor comparing you to their previous participants.
Responses that were given by only 5% of your group are unusual 1 point, Responses that were given by only 1% of your group are unique – 2 points.
Fluency – Number of ideas. Just add up all the responses.
Elaboration – The amount of detail in the responses (for Example “a doorstop” = 0 whereas “a door stop to prevent a door slamming shut in a strong wind” = 2 (one for explanation of door slamming, two for further detail about the wind).
Total points=? Higher scores indicate creativity*
- Flow and Tapping into Creativity (leoniehallatinnovationiq.wordpress.com)
- ‘Teaming’ with Ideas (leoniehallatinnovationiq.wordpress.com)
|
<urn:uuid:8b63411c-7a9f-4faa-9c46-474dcde732f0>
|
CC-MAIN-2017-26
|
https://leoniehallatinnovationiq.wordpress.com/2010/11/05/how-creative-are-you/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320215.92/warc/CC-MAIN-20170624031945-20170624051945-00113.warc.gz
|
en
| 0.935115 | 315 | 2.8125 | 3 |
How to hide files using the Attrib command
Attrib is a DOS command that sets or displays various file attributes. One of those attributes is the Hidden attribute, which determines whether or not a file can be viewed in a directory under normal circumstances. With the Attrib command, you are able to hide or show any non-system file, as well as view any file's current attributes.
To use Attrib, you must be at the DOS command prompt. In Windows XP, Vista, and 7, you can open a command prompt window by either typing "cmd" into the Run bar or by browsing to the Command Prompt (Start menu > All Programs > Accessories > Command Prompt). In Vista or 7, you can also type "cmd" into the Search bar.
The syntax for using Attrib to hide a file is as follows:
attrib <path><filename> +h
If you are currently in the directory where the file is located, you can omit typing the path. And since DOS is not case sensitive, you can use either upper or lowercase letters, or both.
If you later want to make that same file visible again, just type:
attrib <path><filename> -h
To view the attributes of all of the files in the current directory (even hidden files), type "attrib" by itself. Keep in mind that hiding a file will make it harder to find, but it does not by any means make it impossible. If you have sensitive or confidential data that should not be viewed by other users, protect it using encryption, permissions, and a strong user account password.
on May 30, 2010 | Computers & Internet
|
<urn:uuid:16ded43d-521f-4faf-8864-197a11f3bd78>
|
CC-MAIN-2017-43
|
http://www.fixya.com/support/t20827230-citizen_cl_s621_whether_takes_dos
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825154.68/warc/CC-MAIN-20171022075310-20171022095310-00689.warc.gz
|
en
| 0.895197 | 342 | 2.75 | 3 |
'Text-days' are for delving into the words and theory of Advaita Vedanta.
[You are reminded that reviewing the previous week's posts will become essential as the meanings of the Sanskrit terms may not be repeated. There may come additional or alternative meanings, but all should be noted. As study progresses, the technical terms must necessarily become 'second nature' to the student. When the Sanskrit is used, the translation will fall easily into place - or likewise, if the English is used, the Sanskrit term must easily come forwards.]
Please revisit THIS post and chant the mangala-charana. Please use the TattvabodhaH label to access all posts relevant to this text.
The final section under the evolution of the tamo-guna, elaborates on the relationship of pindanda to brahmanda; jiiva to Iisvara; man to God. Again you are reminded that the whole is not explored at length here. Rather a summary of the subject, you may say.
स्थूलशरीराभिमानि जीवनामकं ब्रह्मप्रतिबिम्बं भवति।
स एव जीवः प्रकृत्या स्वस्मात् ईश्वरं भिन्नत्वेन जानाति।
अविद्योपाधिः सन् ईस्वरः इत्युच्यते। एवमुपाधिभेदात्
जीवेश्वरभेददृष्टिः यावत् पर्यन्तं तिष्ठति तावत् पर्यन्तं
जन्ममरणादिरूपसंसारो न् निवर्तते। तस्मात्कारणात् न
sa eva jiivaH prakR^ityaa svasmaat iishvaraM bhinnatvena jaanaati.
avidyopaadhiH san iisvaraH ityucyate. evamupaadhibhedaat
jiiveshvarabhedadR^iSTiH yaavat paryantaM tiSThati taavat paryantaM
janmamaraNaadiruupasaMsaaro n nivartate. tasmaatkaaraNaat na
"The reflection of Brahman, which identifies itself with the gross body, is called the jiiva. This jiiva by nature takes Iisvara to be different from himself or herself. The Self conditioned by avidyaa is called jiiva and when conditioned by Maya is called Iisvara. So long as the notion that the jiiva and Iisvara are different, which is due to the difference in the conditionings, remains there is no redemption from samsaara which is of the form of repeated birth, death and so on. Due to that reason, the notion of the jiiva is different from Iisvara should not be accepted."
The very pith of Vedantic understanding. Brahman is the Infinite Truth. It wields inherent creative power as a conditioning called as Maya. Due to this conditioning, the appearance of being a different entity is there and it is called as Iisvara. He is the creator, sustainer and destroyer of 'the world'. All Powerful, all Knowing and All Pervading. He is both the material and the efficient cause of the universe. Iisvara knows His Truth and does not get overpowered by Maya. He remains in full control. His Maya is predominantly sattvic and therefore does not bind, thus by taking refuge in Him - and by implication, sattva - one gets freed from the lower bondages created by Maya in the rajasic and, more specifically, that tamasic realms.
The Truth, when under the influence of avidya (ignorance), the Self becomes conditioned into individual parts called as the jiiva. This is predominantly tamasic and is therefore binding. True Nature is forgotten is the external distracts and confuses.
The sun reflects in a bucket of water and assumes a small identity as its own reflection. That reflected sun is conditioned by the water in which it now 'resides'. If the reflection were to forget it is nothing but a beam and begin to think of the water as itself it would think its whole world revolved around and within the bucket. If it realises that it is nothing but the light shining in the sky, it has its play for the day and remains always part of the sun. The illumination which is pure consciousness is brahmanda (sun), Iisvara is the rays of the sun out to play, Maya provides the bucket… Only we forget we are the light…
Man desires to be complete, happy and eternal. He therefore runs after that which he thinks will make him happy. Actions give results which result in suffering, retained impressions and ongoing desires. Thus the cycle of keeps happening, birth, life, death; on and on. If only we would realise that we are what we seek.
It should be noted, further, that the two different conditionings mentioned in the stanza (Iisvara reflected and Jiiva forgetful) relate to vadas (theories) known respectively as pratibimba vada and avaccheda vada. These will be referred to again and are only mentioned as an introduction here. Advaita actually subscribes to neither, for ultimately there is not Iisvara and there is no jiiva; there is only Brahman. Therefore, the admonition of the Guru at the close of the suutra, that we must not accept our conditioned ignorance born out of thinking ourselves different from The Truth, the Almighty. This is explained through the very famous and astounding mahaavaakya (great statement)… tat tvam asi.
|
<urn:uuid:2fb2983e-93d7-4dfa-b45b-43508a42c3bb>
|
CC-MAIN-2017-30
|
https://yamsadhana.blogspot.com/2015/11/me-and-thee-we-and-he.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549436330.31/warc/CC-MAIN-20170728042439-20170728062439-00366.warc.gz
|
en
| 0.923438 | 1,530 | 2.75 | 3 |
Developed by Wattway and deployed on the streets of Tourouvre-au-Perche, a 1,000-meter-long solar-paneled roadway in France is the first stretch of a 1,000-kilometer endeavor.
The technology along this initial pathway is designed to generate enough energy to light up the streets of a 3,400-person town, and it is just the first step in a five-year plan.
France ultimately aims to pave 1,000 kilometers of solar roads over the next half-decade, supplying renewable energy to 5 million people (close to 10% of the population).
The flat and smooth surfaces of existing streets are perfect places to serve a double function and harvest clean energy as long as the issue of durability is taken into account.
The solar brick-like sheets are covered in multiple layers of silicon resign designed to allow light to pass through while protecting the panels from damage. The panels are engineered to withstand the weight of six-axle trucks and to stick directly onto existing road surfaces.
The goal for this first phase is to produce 280 megwatt hours of power per year and to test the durability of the tech under real-world experimental conditions. Under controlled conditions, the panels survive a “cycle of one million vehicles, or 20 years of normal traffic a road, and the surface does not move.”
“We are still on an experimental phase,” says the company. “Building a trial site of this scale is a real opportunity for our innovation. This trial site has enabled us to improve our photovoltaic panel installing process as well as their manufacturing, in order to keep on optimizing our innovation.”
|
<urn:uuid:7d1544c4-b1f4-4797-b927-e0d34e8be5db>
|
CC-MAIN-2017-26
|
http://weburbanist.com/2017/01/17/public-wattway-france-activates-worlds-first-solar-paneled-roadway/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323808.56/warc/CC-MAIN-20170629000723-20170629020723-00087.warc.gz
|
en
| 0.943952 | 347 | 3.109375 | 3 |
Liver is the second largest organ in our body and its area of function is so wide that it contributes a major part in keeping a body fit and healthy. Mainly a digestive organ, it helps in carbohydrate and fat metabolism. It also improves the immunity system of the body and stores some vitamins and minerals. Care should be taken to maintain a healthy liver as a damaged liver can endanger the life.
Symptoms of liver diseases
1. Pain and tenderness in the abdomen
2. Severe itching on the skin where there is no infection
3. Diseases like jaundice, cholestatis followed by dark urine, pale colored stools, bone loss
4. Pain in the pancreas and the enlargement of the gall bladder
5. Loss of appetite, nausea and sometimes mild fever may result due to malfunctioning of the liver.
Cause: The most common reasons for the liver diseases are due to unhealthy life style and faulty eating habits. Infections by the Hepatitis virus A, B and C can cause serious types of liver diseases. Prolonged intake of drugs, alcohol and other toxic substances damage the liver cells leading to liver problems. Low immune system of the body can trigger certain liver diseases.
Liver diseases are alarming and life threatening if not controlled at the early stage or not treated properly. Treatments of liver diseases are generally done through natural processes as these are much more effective than the synthetic drugs.
1. Protein intake should be minimized in case of liver problems as the liver has to work more in digesting protein.
2. More carbohydrates must be included in the daily diet. Rice is ideal in this case. The diet should be balanced with respect to the calorie intake including fat soluble minerals and fatty acids.
3. Low sodium intake is advised in liver problems to prevent fluid retention.
4. Pomegranate is a rich source of vitamins and minerals. A glass of its juice every morning boosts the body immunity system.
5. Taking sugarcane juice in liver diseases is an excellent tonic as it strengthens the liver. The alkaline nature of the juice keeps the acid levels of the body low.
6. A concoction of pipal leaves (3-4 leaves) and sugar in a cup of water if taken twice daily helps in treating the liver disease.
7. Taking twice daily a mixture of papaya seeds with 10 drops of lemon juice is effective in liver diseases.
8. Chewing fennel seeds after the meals regularly is good for liver problems.
Liver being one of the most important organs of our body, it is always advisable to protect it by eating healthy and doing moderate exercises regularly. Consuming too much alcohol and eating spicy and junk foods produce toxins that affect the liver to a great extent.
|
<urn:uuid:3ce64340-c64e-4ad6-a0c4-8fbd847e42e3>
|
CC-MAIN-2020-05
|
https://mediv.dp.ua/liver-diseases-causes-symptoms-and-natural-remedies.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250609478.50/warc/CC-MAIN-20200123071220-20200123100220-00024.warc.gz
|
en
| 0.92953 | 569 | 3.296875 | 3 |
The Power of Linux “History Command” in Bash Shell
We use history command frequently in our daily routine jobs to check history of command or to get info about command executed by user. In this post, we will see how we can use history command effectively to extract the command which was executed by users in Bash shell. This may be useful for audit purpose or to find out what command is executed at what date and time.
By default date and timestamp won’t be seen while executing history command. However, bash shell provides CLI tools for editing user’s command history. Let’s see some handy tips and tricks and power of history command.
1. List Last/All Executed Commands in Linux
Executing simple history command from terminal will show you a complete list of last executed commands with line numbers.
[[email protected] ~]$ history 1 PS1='\e[1;35m[\[email protected]\h \w]\$ \e[m ' 2 PS1="\e[0;32m[\[email protected]\h \W]\$ \e[m " 3 PS1="\[email protected]\h:\w [\j]\$ " 4 ping google.com 5 echo $PS1 6 tail -f /var/log/messages 7 tail -f /var/log/messages 8 exit 9 clear 10 history 11 clear 12 history
2. List All Commands with Date and Timestamp
How to find date and timestamp against command? With ‘export’ command with variable will display history command with corresponding timestamp when the command was executed.
[[email protected] ~]$ export HISTTIMEFORMAT='%F %T ' 1 2013-06-09 10:40:12 cat /etc/issue 2 2013-06-09 10:40:12 clear 3 2013-06-09 10:40:12 find /etc -name *.conf 4 2013-06-09 10:40:12 clear 5 2013-06-09 10:40:12 history 6 2013-06-09 10:40:12 PS1='\e[1;35m[\[email protected]\h \w]\$ \e[m ' 7 2013-06-09 10:40:12 PS1="\e[0;32m[\[email protected]\h \W]\$ \e[m " 8 2013-06-09 10:40:12 PS1="\[email protected]\h:\w [\j]\$ " 9 2013-06-09 10:40:12 ping google.com 10 2013-06-09 10:40:12 echo $PS1
Meaning of HISTTIMEFORMAT variables
%F Equivalent to %Y - %m - %d %T Replaced by the time ( %H : %M : %S )
3. Filter Commands in History
As we can see same command is being repeated number of times in above output. How to filter simple or non destructive commands in history?. Use the following ‘export‘ command by specifying command in HISTIGNORE=’ls -l:pwd:date:’ will not saved by system and not be shown in history command.
[[email protected] ~]$ export HISTIGNORE='ls -l:pwd:date:'
4. Ignore Duplicate Commands in History
With the below command will help us to ignore duplicate commands entry made by user. Only single entry will be shown in history, if a user execute a same command multiple times in a Bash Prompt.
[[email protected] ~]$ export HISTCONTROL=ignoredups
5. Unset export Command
Unset export command on the fly. Execute unset export command with variable one by one whatever commands have been exported by export command.
[[email protected] ~]$ unset export HISTCONTROL
6. Save export Command Permanently
Make an entry as follows in .bash_profile to save export command permanently.
[[email protected] ~]$ vi .bash_profile # .bash_profile # Get the aliases and functions if [ -f ~/.bashrc ]; then . ~/.bashrc fi # User specific environment and startup programs export HISTCONTROL=ignoredups PATH=$PATH:$HOME/bin export PATH
7. List Specific User’s Executed Commands
How to see command history executed by a specific user. Bash keeps records of history in a ‘~/.bash_history’ file. We can view or open file to see the command history.
[[email protected] ~]$ vi .bash_history cd /tmp/ cd logstalgia-1.0.3/ ./configure sudo passwd root apt-get install libsdl1.2-dev libsdl-image1.2-dev libpcre3-dev libftgl-dev libpng12-dev libjpeg62-dev make gcc ./configure make apt-get install libsdl1.2-dev libsdl-image1.2-dev libpcre3-dev libftgl-dev libpng12-dev libjpeg62-dev make gcc++ apt-get install libsdl1.2-dev libsdl-image1.2-dev libpcre3-dev libftgl-dev libpng12-dev libjpeg62-dev make gcc apt-get install make mysql -u root -p apt-get install grsync apt-get install unison unison
8. Disable Storing History of Commands
Some organization do not keep history of commands because of security policy of the organization. In this case, we can edit .bash_profile file (It’s hidden file) of user’s and make an entry as below.
[[email protected] ~]$ vi .bash_profile # .bash_profile # Get the aliases and functions if [ -f ~/.bashrc ]; then . ~/.bashrc fi # User specific environment and startup programs PATH=$PATH:$HOME/bin HISTSIZE=0 export PATH .bash_profile (END)
Save file and load changes with below command.
[[email protected] ~]$ source .bash_profile
Note: If you don’t want system to remember the commands that you have typed, simply execute below command which will disable or stop recording history on the fly.
[[email protected] ~]$ export HISTSIZE=0
Tips: Search ‘HISTSIZE‘ and edit in ‘/etc/profile’ file with superuser. The change in file will effect globally.
9. Delete or Clear History of Commands
With up and down arrow, we can see previously used command which may be helpful or may irate you. Deleting or clearing all the entries from bash history list with ‘-c‘ options.
[[email protected] ~]$ history -c
10. Search Commands in History Using Grep Command
Search command through ‘.bash_history‘ by piping your history file into ‘grep‘ as below. For example, the below command will search and find ‘pwd‘ command from the history list.
[[email protected] ~]$ history | grep pwd 113 2013-06-09 10:40:12 pwd 141 2013-06-09 10:40:12 pwd 198 2013-06-09 15:46:23 history | grep pwd 202 2013-06-09 15:47:39 history | grep pwd
11. Search Lastly Executed Command
Search previously executed command with ‘Ctrl+r’ command. Once you’ve found the command you’re looking for, press ‘Enter‘ to execute the same else press ‘esc‘ to cancel it.
(reverse-i-search)`source ': source .bash_profile
12. Recall Last Executed Command
Recall a previously used specific command. Combination of Bang and 8 (!8) command will recall number 8 command which you have executed.
[[email protected] ~]$ !8
13. Recall Lastly Executed Specific Command
Recall previously used command (netstat -np | grep 22) with ‘!‘ and followed by some letters of that particular command.
[[email protected] ~]$ !net netstat -np | grep 22 (No info could be read for "-p": geteuid()=501 but you should be root.) tcp 0 68 192.168.50.2:22 192.168.50.1:1857 ESTABLISHED - tcp 0 0 192.168.50.2:22 192.168.50.1:2516 ESTABLISHED - unix 2 [ ] DGRAM 12284 - @/org/freedesktop/hal/udev_event unix 3 [ ] STREAM CONNECTED 14522 - unix 2 [ ] DGRAM 13622 - unix 3 [ ] STREAM CONNECTED 12250 - @/var/run/hald/dbus-ujAjOMNa0g unix 3 [ ] STREAM CONNECTED 12249 - unix 3 [ ] STREAM CONNECTED 12228 - /var/run/dbus/system_bus_socket unix 3 [ ] STREAM CONNECTED 12227 -
We have tried to highlight power of history command. However, this is not end of it. Please share your experience of history command with us through our comment box below.
|
<urn:uuid:447bb4f5-c580-4ce1-ba26-e254dca47d73>
|
CC-MAIN-2017-47
|
https://www.tecmint.com/history-command-examples/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804881.4/warc/CC-MAIN-20171118113721-20171118133721-00092.warc.gz
|
en
| 0.765647 | 2,034 | 2.515625 | 3 |
What can be considered one of the longest running, single experiments finally has some closure after 69 years. The exiting moment that brought it to a close? A drop of “pitch-tar” finally fell — and someone saw it.
That’s right, the experiment at Trinity College Dublin was set up in 1944 to show the high viscosity of pitch/bituman/asphalt (the substance goes by many names), according to the college’s website.
The substance might appear solid at room temperature, but it is actually moving very, very slowly. According to the institution, it didn’t take nearly seven decades for a tar droplet to form and drip from the funnel, but no one had ever witnessed it happen since the experiment was running. A drop happens about once a every 10 years.
This spring when it looked like a drop was getting close to falling, Professor Shane Bergin wasn’t going to let anyone miss it, putting a webcam on it. Last week on July 11, the drop finally fell.
“People love this experiment because it gets to the heart of what good science is all about – curiosity,” Bergin said in a statement. Over these past few months, there has been constant chat about when the drip would drop. I watched the time lapse video of the pitch drop falling over and over again. I was amazed. This was the first time this phenomenon was ever witnessed!”
Here’s a time-lapsed video of the momentous occasion:
Having video evidence of the droplet and knowing how long it took to fall since the last drop, physicists estimate the substance is 2 million times the viscosity of honey.
The University of Queensland holds the Guinness World Record for longest experiment for a similar set up that has been running since 1927, but no one has yet witnessed it.
|
<urn:uuid:f0f7d0d7-333e-4523-aafe-eb5a493c3d42>
|
CC-MAIN-2014-23
|
http://www.theblaze.com/stories/2013/07/19/finally-after-69-years-someone-finally-sees-the-worlds-slowest-moving-droplet-wait-for-it-drop/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997892806.35/warc/CC-MAIN-20140722025812-00073-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.973168 | 386 | 2.5625 | 3 |
DEVINE, THOMAS, surveyor and cartographer; b. in County Westmeath (Republic of Ireland), probably in 1818; m. Jane Molloy, probably in 1866, and they had two sons, including James Arthur, a prominent physician and playwright in Winnipeg, Man.; d. 14 Nov. 1888 in Montreal, Que.
Thomas Devine was to state that he had acquired practical knowledge of his profession on the Ordnance Survey of Ireland under the Royal Engineers, and he may have attended an engineers’ academy. After immigrating to Canada, he was appointed a provincial land surveyor on 11 June 1846, becoming a surveyor and draftsman in the Crown Lands Department, Upper Canada surveys branch, on 7 July 1846. However, he made only one field survey, of the York branch of the Madawaska River in 1847. Afterwards he was employed in the office which, as part of the peripatetic government, relocated six times during the union period. By 1857 he had succeeded Andrew Russell in charge of the branch although his position as head of surveys, Upper Canada, was not confirmed until 22 July 1859. His duties, which remained substantially unchanged until his retirement, required him to project surveys of crown lands, to supervise the work and reports of the surveyors, to copy and compile plans for district agents, municipal councils, and the public, and to see to the preservation of original plans, field books, and reports.
From 1857 Devine was responsible for the compilation and publication of an important group of maps. His Map of the north west part of Canada, Indian territories & Hudson’s Bay (1857) was the first map of the west compiled and printed in Canada and has been described as “an outstanding consolidation of cartographic material on the West.” Portraying the topography, geology, and climatic zones as then known, the map stressed the capacity of the land for agriculture and settlement. It accompanied the annual report of the Crown Lands Department for 1856 by Joseph-Édouard Cauchon and was intended to support claims for Canadian expansion into the prairies. Devine’s Government map of Canada, from Red River to the Gulf of St. Lawrence (1859), the first official map of the province, has been shown to be the first reasonably accurate map of the area, and more accurate than those that followed in the 1860s. Three other important maps, Topographical plan of the north shore of Lake Huron (1858), Plan of the north shore of Lake Superior . . . (Toronto, 1860), and the Government map of part of the Huron and Ottawa territory . . . (New York, 1861), each went into several editions and were designed to provide information for intending settlers, lumbermen, and emigration agents.
Devine did not ignore the surveying side of his responsibilities. In 1859 he submitted a new form of field notebook for surveyors employing the “split-line method” in which the important distance measurements were placed clearly between the lines and more space was provided for pictographic and written representations of landmarks, the intention being to provide a clear, standardized system of describing a surveyed line. He noted in his report for 1861 that much surveying was of a low calibre and recommended various improvements, including examination of surveyors’ work in the field. To speed up the publication of maps he had recommended in 1860 that a lithograph press be installed in his office, but the department rejected his suggestion. In 1864 he was called before the committee examining the suitability of the region between the Ottawa River and Georgian Bay for settlement and lumbering; he provided the first land classification map of the area which he compiled from surveyors’ reports on timber and soil. Though he admitted that these reports were inclined to be more accurate in estimating timber, he indicated that the value of the land for settlement had always been underrated and that “in numerous instances the lands condemned by the surveyors as unfit for settlement have since been settled with a thriving population.”
Devine continued with the Ontario Crown Lands Department after confederation and in 1872 he became deputy surveyor general of Ontario. In 1877 he produced his last major map, covering North America and designed to show all historical boundaries that would have a bearing upon the impending decision on Ontario’s northern and western boundaries. This map, compiled from the analysis of 186 earlier maps acquired by the federal and provincial governments, was referred to by representatives of both during the arbitration proceedings of 1878. Although the matter was finally decided in Ontario’s favour, it was not resolved until 1889 [see James Andrews Miller].
Before poor health forced him to retire in 1879 Devine had also given of his time to provincial and local matters. After 1858 he was a member of the board of examiners of land surveyors for the Province of Canada and was chairman of the Ontario board at his retirement. He also became a member of the Toronto Separate School Board in 1867 and was its chairman in 1877 at the height of the struggle for control of school property between the board, consisting of laymen, and Archbishop John Joseph Lynch.
Devine returned to Ireland on retirement but came back to Canada in 1884, settling in Montreal where he remained until his death. During the union period the government had rewarded his efforts by paying him, at times, less than his predecessor and his counterpart in Canada East, despite his accomplishments. In 1860 these were acknowledged when he was elected a member of the Royal Geographical Society; he was also a corresponding member of the Geographical Society of Berlin and the American Geographical and Statistical Society.
Thomas Devine was the author of “Description of a new Trilobite from the Quebec group,” Canadian Naturalist and Geologist, 8 (1863): 210–11, and the compiler of Government map of Canada, from Red River to the Gulf of St. Lawrence (Quebec and Toronto, 1859); Map of the north west part of Canada, Indian territories & Hudson’s Bay (Toronto, 1857); Official documents relating to the early survey & settlement of Ontario [U.C.] from the Treaty of Peace in 1783 to the separation of Ontario (UC) from the province of Quebec in 1792 (n.p., [1873?]) (copy at AO); Ont., Ministry of Natural Resources, Survey Records Branch (Toronto), “Map of part of North America, designed to illustrate the reports and discussions relating to the boundaries of the province of Ontario . . . , 1877”; Topographical plan of the north shore of Lake Huron shewing P.L.S. Albert P. Salter’s recent survey (Toronto, 1858).
AO, RG 1, A-I-2, 49: 118; 50: 28, 375–76, 399–400; A-I-4, 34; A-II-2, 5; A-II-6, 3, 12–14; A-VII, 49. Ont., Ministry of Natural Resources, Survey Records Office, Instructions to land surveyors, 5: 58–60, 397–98 (mfm. at AO). PAC, RG 31, A1, 1871, Toronto, St George’s Ward (mfm. at AO). “Biographical sketch of the late Thomas Devine, F.R.G.S.,” Assoc. of Provincial Land Surveyors of Ontario, Proc. (Toronto), 1889: 129–30. Can., Prov. of, Legislative Assembly, App. to the journals, 1857–59, Reports of the commissioner of crown lands of Canada; 1859, III: app.19; Journals, 1860, app.4; 1861, app.1; 1862, app.l; February–May 1863, app. 3; August–October 1863, app.1; 1864, apps.7, 8; August–September 1865, app.6; Parl., Sessional papers, 1860–66, Reports of the commissioner of crown lands of Canada; 1862, III: no.11, app.26. Ont., Legislature, Sessional papers, 1879, V, no.31: 133–40, 417. Report of proceedings before the arbitrators, in the matter of the boundaries of the province of Ontario (Toronto, 1880). Gazette (Montreal), 16 Nov. 1888. Globe, 16 Nov. 1888. Toronto Daily Mail, 16 Nov. 1888. Manitoba historical atlas: a selection of facsimile maps, plans, and sketches from 1612 to 1969, ed. J. [H.] Warkentin and R. I. Ruggles (Winnipeg, 1970). Morgan, Sketches of celebrated Canadians. R. S. Lambert and Paul Pross, Renewing nature’s wealth; a centennial history of the public management of lands, forests & wildlife in Ontario, 1763–1967 ([Toronto], 1967), 61–149. M. B. MacK. Olsen, “Aspects of the mapping of southern Ontario, 1783–1867” (mphil thesis, Univ. of London, 1968). W. F. Weaver, Crown surveys in Ontario ([Toronto], 1962), 15.
|
<urn:uuid:9c6ea34a-89e7-4001-9953-54aa736b0450>
|
CC-MAIN-2017-43
|
http://www.biographi.ca/en/bio.php?id_nbr=5476
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825057.91/warc/CC-MAIN-20171022022540-20171022042540-00604.warc.gz
|
en
| 0.962497 | 1,933 | 2.890625 | 3 |
The Bloodhound is a delightful animal with a nose that is second to none. It follows its quarry but does not kill. Indeed, it is loved by children, who can accompany it on the lead, and is often kept as a family pet. Bloodhounds are popular show dogs, but individuals are still often called in by police for tracking purposes; a number have appeared in films.
Origin and history
The Bloodhound is said to have been brought to England by William the Conqueror in 1066 and to be one of the oldest and purest of hound breeds. Bloodhounds in the United Kingdom are popular show ring contenders.
- Charming to look at
- Good with children
- Great tracker and trailer
- Ideal family pet if you have room
- No drawbacks known
Height dog 25-27in (63.5-68.5cm); bitch 23-25in (58.5-63.5cm). Weight: dog 90lb (41 kg); bitch 80lb (36kg).
Needs plenty. These dogs have to gallop. Best to join a Bloodhound club if you become an owner, and take part in organized events.
The expression is noble and dignified and characterized by solemnity, wisdom and power. The gait is elastic, swinging and free, the stern being carried high, scimitar fashion
The colours are black and tan, liver and tan (red and tan) and red. The darker colours are sometimes interspersed with lighter or badger-coloured hair and sometimes flecked with white.
Head and skull
The head is narrow in proportion to its length and long in proportiofl to the body, tapering only slightly from the temples to the muzzle. Thus (when viewed from above and in front) it has the appearance of being flattened at the sides and of being nearly equal in width throughout its length. In profile the upper outline of the skull is in nearly the same plane as that of the foreface. The length from the end of the nose to the stop (mid-way between the eyes) should not be less than that from the stop to the occipital protuberance (peak). The brows are not prominent, although owing to the deep-set eyes, they may have that appearance. The foreface is long, deep and of even width throughout with a square outline when seen in profile. The head is furnished with an amount of loose skin, which in nearly every position appears superabundant. More particularly, when the head is carried low, the skin falls into loose pendulous ridges and folds, especially over the forehead and sides of the face. The nostrils are large and open. In front, the lips fall squarely, making a right angle with the upper line of the foreface; behind they form deep, hanging flews, and, being continued into the pendant folds of loose skin about the neck, constitute the dewlap, which is very pronounced.
The neck is long, and the shoulders are muscular. The back and loins are strong, the latter being deep and slightly arched. The ribs are well sprung, and the chest is well let down between the forelegs. The legs are straight and large in bone. The feet are strong and well knuckled up. The hocks are well bent and let down and squarely set. The gait is elastic, swinging and free.
The stern is long and thick, tapering to a point, set on high with a moderate amount of hair underneath. It should be carried scimitar fashion but not curled over the back or corkscrew at any time.
Should be strong and well knuckled up.
Bloodhound Feeding & Grooming
Regular grooming with a hound glove. Frequent ear inspection is advocated.
Recommended would be 20-330z(587-936g) of a branded, meaty product with biscuit added, or 3-5 cupfuls of a dry food, complete diet, mixed in the proportion of 1 cup of feed to V2 cup of hot or cold water.
|
<urn:uuid:e40cca32-8e24-4c67-bd63-4c3d14127409>
|
CC-MAIN-2020-29
|
http://www.dogs-care.com/bloodhound/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655895944.36/warc/CC-MAIN-20200707204918-20200707234918-00096.warc.gz
|
en
| 0.957173 | 846 | 2.65625 | 3 |
Smoking and Skin Health
It is clear that smoking leads to lung and other types of cancer and contributes to one’s risk of suffering a heart attack. In the United States alone it causes more than 1 in 5 deaths each year. This is greater than the combined number of deaths caused by illegal drug and alcohol use, motor vehicle injuries, human immunodeficiency virus (HIV), and firearm incidents. Along with the dangerous effects of smoking, there is a negative impact on the skin as well.
Reduced Strength and Elasticity of Skin
We often think of skin damage occurring on the faces of smokers, but it occurs throughout the body. The chemicals in tobacco smoke cause collagen and elastin to be destroyed. Since these are responsible for keeping skin strong and elastic, this destruction leads to a deepening of wrinkles and the overall sagging of skin. The inner arms and breasts are an area where this is particularly evident. Damage on the face does tend to be more visible, however, with the skin under the eyes being most susceptible. This area of the face is made up of highly delicate tissue that can bag and become wrinkled from repeated exposure to smoke.
Encouragement of Expressions that Lead to Wrinkles
The actual act of smoking contributes to wrinkles. Burning cigarettes create a great deal of heat that can negatively impact the texture and smoothness of skin, eliminating its natural glow. Additionally, the expressions that are involved in the act can cause new lines or deepen existing ones. As they inhale, smokers purse their lips, and many get premature wrinkles in this area. They also tend to squint to avoid getting smoke in their eyes, which can cause crow’s feet that become quite deep over time.
Reduced Oxygen and Nutrients to Skin Cells
Due to the nicotine in tobacco, smokers experience a narrowing of their blood vessels, which results in decreased blood flow to the skin. The reduction in oxygen and other nutrients that are able to reach skin cells leads to premature skin aging. Signs of poor skin tone from smoking can include a pale or grayish appearance or uneven coloring.
Staining Effect on Fingers and Fingernails
When it comes to the color of skin, smoking also has a staining effect. The yellowed teeth that are commonly associated with smokers aren’t the only area this is evident. Once they have been smoking for several months to years, people also develop yellow stains on their fingernails and the skin surrounding the nail bed on their fingers. The tar and nicotine in cigarettes is responsible for the combination of physical staining and oxygen deprivation that leads to this yellow staining.
While the major health effects of smoking include increased risk of stroke, heart disease, respiratory ailments, bone health, eye conditions, diabetes, and rheumatoid arthritis, among others, there also is a negative impact on the health and appearance of the skin. The combination of internal damage to cells and blood vessels, increased inflammation throughout the body, and external damage to the skin is a major factor in premature aging.
|
<urn:uuid:80e7cc37-399d-4eb5-be25-c3db7b65906a>
|
CC-MAIN-2023-23
|
https://shorthillsderm.com/blog/skin-care/smoking-and-skin-health/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644683.18/warc/CC-MAIN-20230529042138-20230529072138-00347.warc.gz
|
en
| 0.959926 | 622 | 2.953125 | 3 |
for Nuclear Research
pour la recherche nucléaire
|Formation||29 September 1954|
|Membership||21 member states and 7 observers|
|Director General||Rolf-Dieter Heuer|
The European Organization for Nuclear Research (French: Organisation européenne pour la recherche nucléaire), known as CERN (//; French pronunciation: [sɛʁn]; see History) is a European research organization whose purpose is to operate the world's largest particle physics laboratory. Established in 1954, the organization is based in the northwest suburbs of Geneva on the Franco–Swiss border, ( ) and has twenty European member states. Israel is the first (and currently only) non-European country granted full membership.
The term CERN is also used to refer to the laboratory, which employs just under 2,400 full-time employees and 1,500 part-time employees, and hosts some 10,000 visiting scientists and engineers, representing 608 universities and research facilities and 113 nationalities.
CERN's main function is to provide the particle accelerators and other infrastructure needed for high-energy physics research – as a result, numerous experiments have been constructed at CERN following international collaborations. It is also the birthplace of the World Wide Web. The main site at Meyrin has a large computer centre containing powerful data-processing facilities, primarily for experimental-data analysis; because of the need to make these facilities available to researchers elsewhere, it has historically been a major wide area networking hub.
- 1 History
- 2 Particle accelerators
- 3 Sites
- 4 Participation and funding
- 5 Public exhibits
- 6 In popular culture
- 7 Associated institutions
- 8 See also
- 9 References
- 10 External links
The convention establishing CERN was ratified on 29 September 1954 by 12 countries in Western Europe. The acronym CERN originally stood in French for Conseil Européen pour la Recherche Nucléaire (European Council for Nuclear Research), which was a provisional council for setting up the laboratory, established by 12 European governments in 1952. The acronym was retained for the new laboratory after the provisional council was dissolved, even though the name changed to the current Organisation Européenne pour la Recherche Nucléaire (European Organization for Nuclear Research) in 1954. According to Lew Kowarski, a former director of CERN, when the name was changed, the acronym could have become the awkward OERN, and Heisenberg said that the acronym could "still be CERN even if the name is [not]".
Soon after the laboratory's establishment, its work went beyond the study of the atomic nucleus into higher-energy physics, which is concerned mainly with the study of interactions between particles. Therefore the laboratory operated by CERN is commonly referred to as the European laboratory for particle physics (Laboratoire européen pour la physique des particules) which better describes the research being performed at CERN.
Several important achievements in particle physics have been made during experiments at CERN. They include:
- 1973: The discovery of neutral currents in the Gargamelle bubble chamber;
- 1983: The discovery of W and Z bosons in the UA1 and UA2 experiments;
- 1989: The determination of the number of light neutrino families at the Large Electron–Positron Collider (LEP) operating on the Z boson peak;
- 1995: The first creation of antihydrogen atoms in the PS210 experiment;
- 1999: The discovery of direct CP violation in the NA48 experiment;
- 2010: The isolation of 38 atoms of antihydrogen;
- 2011: Maintaining antihydrogen for over 15 minutes;
- 2012: A boson with mass around 125 GeV/c2 consistent with long-sought Higgs boson.
The 1984 Nobel Prize in physics was awarded to Carlo Rubbia and Simon van der Meer for the developments that led to the discoveries of the W and Z bosons. The 1992 Nobel Prize in physics was awarded to CERN staff researcher Georges Charpak "for his invention and development of particle detectors, in particular the multiwire proportional chamber."
The World Wide Web began as a CERN project called ENQUIRE, initiated by Tim Berners-Lee in 1989 and Robert Cailliau in 1990. Berners-Lee and Cailliau were jointly honoured by the Association for Computing Machinery in 1995 for their contributions to the development of the World Wide Web.
Based on the concept of hypertext, the project was aimed at facilitating sharing information among researchers. The first website went on-line in 1991. On 30 April 1993, CERN announced that the World Wide Web would be free to anyone. A copy of the original first webpage, created by Berners-Lee, is still published on the World Wide Web Consortium's website as a historical document.
Prior to the Web's development, CERN had been a pioneer in the introduction of Internet technology, beginning in the early 1980s. A short history of this period can be found at CERN.ch.
More recently, CERN has become a centre for the development of grid computing, hosting projects including the Enabling Grids for E-sciencE (EGEE) and LHC Computing Grid. It also hosts the CERN Internet Exchange Point (CIXP), one of the two main internet exchange points in Switzerland.
Faster-than-light neutrino anomaly
On 22 September 2011, the OPERA Collaboration reported the detection of 17-GeV and 28-GeV muon neutrinos, sent 730 kilometers (450 miles) from CERN near Geneva, Switzerland to the Gran Sasso National Laboratory in Italy, traveling apparently faster than light by a factor of 2.48×10−5 (approximately 1 in 40,000), a statistic with 6.0-sigma significance. However, in March 2012 it was reported by a new team of scientists for CERN, Icarus, that the previous experiment was most likely flawed and will be retested by scientists of both the Opera and Icarus teams; on 16 March, CERN stated in a press release that the results were flawed due to an incorrectly connected GPS-synchronization cable.
CERN operates a network of six accelerators and a decelerator. Each machine in the chain increases the energy of particle beams before delivering them to experiments or to the next more powerful accelerator. Currently active machines are:
- Two linear accelerators generate low energy particles. Linac2 accelerates protons to 50 MeV for injection into the Proton Synchrotron Booster (PSB), and Linac3 provides heavy ions at 4.2 MeV/u for injection into the Low Energy Ion Ring (LEIR).
- The Proton Synchrotron Booster increases the energy of particles generated by the proton linear accelerator before they are transferred to the other accelerators.
- The Low Energy Ion Ring (LEIR) accelerates the ions from the ion linear accelerator, before transferring them to the Proton Synchrotron (PS). This accelerator was commissioned in 2005, after having been reconfigured from the previous Low Energy Antiproton Ring (LEAR).
- The 28 GeV Proton Synchrotron (PS), built in 1959 and still operating as a feeder to the more powerful SPS.
- The Super Proton Synchrotron (SPS), a circular accelerator with a diameter of 2 kilometres built in a tunnel, which started operation in 1976. It was designed to deliver an energy of 300 GeV and was gradually upgraded to 450 GeV. As well as having its own beamlines for fixed-target experiments (currently COMPASS and NA62), it has been operated as a proton–antiproton collider (the SppS collider), and for accelerating high energy electrons and positrons which were injected into the Large Electron–Positron Collider (LEP). Since 2008, it has been used to inject protons and heavy ions into the Large Hadron Collider (LHC).
- The On-Line Isotope Mass Separator (ISOLDE), which is used to study unstable nuclei. The radioactive ions are produced by the impact of protons at an energy of 1.0–1.4 GeV from the Proton Synchrotron Booster. It was first commissioned in 1967 and was rebuilt with major upgrades in 1974 and 1992.
- REX-ISOLDE increases the charge states of ions coming from the ISOLDE targets, and accelerates them to a maximum energy of 3 MeV/u.
- The Antiproton Decelerator (AD), which reduces the velocity of antiprotons to about 10% of the speed of light for research into antimatter.
- The Compact Linear Collider Test Facility, which studies feasibility issues for the future normal conducting linear collider project.
Large Hadron Collider
Most of the activities at CERN are currently directed towards operating the new Large Hadron Collider (LHC), and the experiments for it. The LHC represents a large-scale, worldwide scientific cooperation project.
The LHC tunnel is located 100 metres underground, in the region between the Geneva International Airport and the nearby Jura mountains. It uses the 27 km circumference circular tunnel previously occupied by LEP which was closed down in November 2000. CERN's existing PS/SPS accelerator complexes will be used to pre-accelerate protons which will then be injected into the LHC.
Seven experiments (CMS, ATLAS, LHCb, MoEDAL, TOTEM, LHC-forward and ALICE) will run on the collider; each of them will study particle collisions from a different point of view, and with different technologies. Construction for these experiments required an extraordinary engineering effort. Just as an example, a special crane had to be rented from Belgium in order to lower pieces of the CMS detector into its underground cavern, since each piece weighed nearly 2,000 tons. The first of the approximately 5,000 magnets necessary for construction was lowered down a special shaft at 13:00 GMT on 7 March 2005.
This accelerator has begun to generate vast quantities of data, which CERN streams to laboratories around the world for distributed processing (making use of a specialised grid infrastructure, the LHC Computing Grid). In April 2005, a trial successfully streamed 600 MB/s to seven different sites across the world. If all the data generated by the LHC is to be analysed, then scientists must achieve 1,800 MB/s before 2008.
The initial particle beams were injected into the LHC August 2008. The first attempt to circulate a beam through the entire LHC was at 8:28 GMT on 10 September 2008, but the system failed because of a faulty magnet connection, and it was stopped for repairs on 19 September 2008.
The LHC resumed operation on Friday 20 November 2009 by successfully circulating two beams, each with an energy of 3.5 trillion electron volts. The challenge that the engineers then faced was to try to line up the two beams so that they smashed into each other. This is like "firing two needles across the Atlantic and getting them to hit each other" according to the LHC's main engineer Steve Myers, director for accelerators and technology at the Swiss laboratory.
At 1200 BST on Tuesday 30 March 2010 the LHC successfully smashed two proton particle beams travelling with 3.5 TeV (trillion electron volts) of energy, resulting in a 7 TeV event. However, this was just the start of the road toward the expected discovery of the Higgs boson. When the 7 TeV experimental period ended, the LHC revved up to 8 TeV (4 TeV acceleration in both directions) in March 2012, and soon began particle collisions at that rate. In early 2013 the LHC was shut down for a two-year maintenance period, to strengthen the huge magnets inside the accelerator. Eventually it will attempt to create 14 TeV events. In July 2012, CERN scientists announced the discovery of a new sub-atomic particle that could be the much sought after Higgs boson believed to be essential for formation of the Universe.
- The original linear accelerator (LINAC 1).
- The 600 MeV Synchrocyclotron (SC) which started operation in 1957 and was shut down in 1991.
- The Intersecting Storage Rings (ISR), an early collider built from 1966 to 1971 and operated until 1984.
- The Large Electron–Positron Collider (LEP), which operated from 1989 to 2000 and was the largest machine of its kind, housed in a 27 km-long circular tunnel which now houses the Large Hadron Collider.
- The Low Energy Antiproton Ring (LEAR), commissioned in 1982, which assembled the first pieces of true antimatter, in 1995, consisting of nine atoms of antihydrogen. It was closed in 1996, and superseded by the Antiproton Decelerator.
The smaller accelerators are on the main Meyrin site (also known as the West Area), which was originally built in Switzerland alongside the French border, but has been extended to span the border since 1965. The French side is under Swiss jurisdiction and there is no obvious border within the site, apart from a line of marker stones. There are six entrances to the Meyrin site:
- A, in Switzerland, for all CERN personnel at specific times.
- B, in Switzerland, for all CERN personnel at all times. Often referred to as the main entrance.
- C, in Switzerland, for all CERN personnel at specific times.
- D, in Switzerland, for goods reception at specific times.
- E, in France, for French-resident CERN personnel at specific times. Controlled by customs personnel. Named "Porte Charles de Gaulle" in recognition of his role in the creation of CERN.
- Tunnel entrance, in France, for equipment transfer to and from CERN sites in France by personnel with a specific permit. This is the only permitted route for such transfers. Under the CERN treaty, no taxes are payable when such transfers are made. Controlled by customs personnel.
The SPS and LEP/LHC tunnels are almost entirely outside the main site, and are mostly buried under French farmland and invisible from the surface. However, they have surface sites at various points around them, either as the location of buildings associated with experiments or other facilities needed to operate the colliders such as cryogenic plants and access shafts. The experiments are located at the same underground level as the tunnels at these sites.
Three of these experimental sites are in France, with ATLAS in Switzerland, although some of the ancillary cryogenic and access sites are in Switzerland. The largest of the experimental sites is the Prévessin site, also known as the North Area, which is the target station for non-collider experiments on the SPS accelerator. Other sites are the ones which were used for the UA1, UA2 and the LEP experiments (the latter which will be used for LHC experiments).
Outside of the LEP and LHC experiments, most are officially named and numbered after the site where they were located. For example, NA32 was an experiment looking at the production of charmed particles and located at the Prévessin (North Area) site while WA22 used the Big European Bubble Chamber (BEBC) at the Meyrin (West Area) site to examine neutrino interactions. The UA1 and UA2 experiments were considered to be in the Underground Area, i.e. situated underground at sites on the SPS accelerator.
Most of the roads on the CERN campus are named after famous physicists, e.g.- Richard Feynman, Niels Bohr, Albert Einstein.
Participation and funding
Member states and budget
Since its foundation by 12 members in 1954, CERN regularly accepted new members. All new members have remained in the organisation continuously since their accession, except Spain and Yugoslavia. Spain first joined CERN in 1961, withdrew in 1969, and rejoined in 1983. Yugoslavia was a founding member of CERN but left in 1961. Initially only West Germany was a (founding) member of CERN. Of the twenty members, 18 are European Union member states. Switzerland and Norway are not. CERN voted on 12 December 2013 to allow Israel to join its membership, becoming the first (and currently only) non-European member.
|Member state||Status since||Contr.
(mill.CHF for 2012)
(% for 2012)
|Belgium[note 1]||29 September 1954||30.83||2.62%|
|Denmark[note 1]||29 September 1954||19.86||1.69%|
|France[note 1]||29 September 1954||169.82||14.46%|
|Germany[note 1]||29 September 1954||219.10||18.65%|
|Greece[note 1]||29 September 1954||17.75||1.51%|
|Italy[note 1]||29 September 1954||120.62||10.27%|
|Netherlands[note 1]||29 September 1954||49.71||4.23%|
|Norway[note 1]||29 September 1954||26.85||2.29%|
|Sweden[note 1]||29 September 1954||29.81||2.54%|
|Switzerland[note 1]||29 September 1954||55.70||4.74%|
|United Kingdom[note 1]||29 September 1954||146.96||12.51%|
|Austria[note 2]||1 June 1959||23.70||2.02%|
|Spain[note 2]||1 January 1983||87.73||7.47%|
|Portugal[note 2]||1 January 1986||14.49||1.23%|
|Finland[note 2]||1 January 1991||15.01||1.28%|
|Poland[note 2]||1 July 1991||31.36||2.67%|
|Hungary[note 2]||1 July 1992||6.85||0.58%|
|Czech Republic[note 2]||1 July 1993||10.60||0.90%|
|Slovakia[note 2]||1 July 1993||5.20||0.44%|
|Bulgaria[note 2]||11 March 1999||3.08||0.26%|
|Israel[note 2]||12 December 2013||3.63||0.31%|
|Candidate, Associate Members|
|zaTotal Members, Candidates and Associates||1,092.68||93.01%|
|zb European Union||1 July 1985||17.3||1.47%|
- 12 founding members drafted the Convention for the Establishment of a European Organization for Nuclear Research which entered into force on 29 September 1954.
- Acceded members became CERN member states upon signing an accession agreement.
- Additional contribution from Candidates for Accession and Associate Member States.
|Maps of the history of CERN membership|
Associate Members, Candidates (note that dates are initial signature, not of ratification):
- Romania became a candidate for accession to CERN in 2010 and will become a member in 2015.
- Serbia became a candidate for accession to CERN on 19 December 2011, associate member on 10 January 2012.
- Israel became an associate member in 2011, They became a full member on 12 December 2013.
- Pakistan's name has been unanimously approved by CERN council for the process of achieving associate membership, at a meeting on 17 September 2013, which could potentially lead to Pakistan’s associate membership by the end of 2014.
- Cyprus became an associate member in 2012.
- Ukraine became an associate member on 3 October 2013.
- Brazil became an associate member on 18 December 2013.
Four countries applying for membership have all formally confirmed their wish to become members.
- Slovenia since 7 January 1991, Non-Member State status
- Turkey since 1961, Observer State status
Five countries have observer status:
- Turkey – since 1961
- Russia – since 1993
- Japan – since 1995
- United States – since 1997
- India – since 2002
Also observers are the following international organizations:
Non-Member States (with dates of Co-operation Agreements) currently involved in CERN programmes are:
- Argentina – 11 March 1992
- Armenia – 25 March 1994
- Australia – 1 November 1991
- Azerbaijan – 3 December 1997
- Belarus – 28 June 1994
- Brazil – 19 February 1990 & October 2006
- Canada – 11 October 1996
- Chile – 10 October 1991
- China – 12 July 1991, 14 August 1997 & 17 February 2004
- Colombia – 15 May 1993
- Croatia – 18 July 1991
- Cyprus – 14 February 2006
- Egypt – 16 January 2006
- Estonia – 23 April 1996
- Georgia – 11 October 1996
- Iceland – 11 September 1996
- Iran – 5 July 2001
- Jordan - 12 June 2003. MoU with Jordan and SESAME, in preparation of a cooperation agreement signed in 2004.
- Lithuania – 9 November 2004
- Macedonia – 27 April 2009
- Mexico – 20 February 1998
- Montenegro – 12 October 1990
- Morocco – 14 April 1997
- New Zealand – 4 December 2003
- Pakistan – 1 November 1994.
- Peru – 23 February 1993
- Romania – 1 October 1991. Since 12 December 2008 it has the Status of Candidate for Accession to Membership.
- Saudi Arabia – 21 January 2006
- Slovenia – 7 January 1991
- South Africa – 4 July 1992
- South Korea – 25 October 2006.
- Republic of China (Taiwan)
- United Arab Emirates – 18 January 2006
- Ukraine – 2 April 1993
International research institutions, such as CERN, can aid in science diplomacy.
Facilities at CERN open to the public include:
- The Globe of Science and Innovation, which opened in late 2005 and is used four times a week for special exhibits.
- The Microcosm museum on particle physics and CERN history.
- The Hindu deity, Shiva, a 2 metre statue styled on Chola bronzes of the deity engaging in the Nataraja dance of Chidambaram, parallelling the movements or "dance" of subatomic particles.
In popular culture
- CERN's Large Hadron Collider is the subject of a (scientifically accurate) rap video starring Katherine McAlpine with some of the facility's staff.
- CERN is depicted in an episode of South Park (Season 13, Episode 6) called "Pinewood Derby". Randy Marsh, the father of one of the main characters, breaks into the "Hadron Particle Super Collider in Switzerland" and steals a "superconducting bending magnet created for use in tests with particle acceleration" to use in his son Stan's Pinewood Derby racer. Randy breaks into CERN dressed in disguise as Princess Leia from the Star Wars saga. The break-in is captured on surveillance tape which is then broadcast on the news.
- John Titor,from the anime Steins;Gate, an online bulletin board poster claiming to be a time traveler, referenced CERN in his predictions, claiming it would create miniature black holes and discover time travel.
- CERN is depicted in the visual novel (later adapted into an anime series) Steins;Gate under the name SERN. In the video game and anime series, SERN is a shadowy organization that has been researching time travel and attempts to use it to restructure and control the world in the dystopian near future. The game references the John Titor legend mentioned above.
- In Dan Brown's mystery-thriller novel Angels & Demons, a canister of antimatter is stolen from CERN.
- In the popular children's series The 39 Clues, CERN is said to be an Ekaterina stronghold hiding the clue hydrogen.
- In Robert J. Sawyer's science fiction novel Flashforward, at CERN, the Large Hadron Collider accelerator is performing a run to search for the Higgs boson when the entire human race sees themselves twenty-one years and six months in the future.
- In season 3 episode 15 of the popular TV sitcom The Big Bang Theory titled "The Large Hadron Collision", Leonard and Rajesh travel to CERN to attend a conference and see the LHC.
- The 2012 student film Decay, which centers around the idea of the Large Hadron Collider transforming people into zombies, was filmed on location in CERN's maintenance tunnels.
- The Compact Muon Solenoid at CERN was used as the basis for the Megadeth's Super Collider album cover.
- In Denpa Kyoushi, the main character is scouted by CERN
- In Super Lovers, Haruko (Ren's mother) worked at CERN, and Ren was taught by CERN professors
|This section requires expansion. (October 2013)|
- CERN Openlab
- Nederlandse Organisatie voor Wetenschappelijk Onderzoek
- Science and technology in Switzerland
- Scientific Linux
- SLAC National Accelerator Laboratory
- World Wide Web
- Large Hadron Collider at Wikipedia books
- "CERN.ch". Public.web.cern.ch. Retrieved 20 November 2010.
- The boycott movement is losing the battle - for now
- "The Name CERN". CERN. 30 September 2011. Retrieved 16 August 2012.
- "CERN.ch". Public.web.cern.ch. Retrieved 20 November 2010.
- "CERN.ch La". Public.web.cern.ch. Retrieved 20 November 2010.
- "CERN.ch". Public.web.cern.ch. Retrieved 20 November 2010.
- Fanti, V. et al. (1998). "A new measurement of direct CP violation in two pion decays of the neutral kaon". Physics Letters B 465: 335. arXiv:hep-ex/9909022. Bibcode:1999PhLB..465..335F. doi:10.1016/S0370-2693(99)01030-8.
- "Antihydrogen isolation". CNN. 18 November 2010.
- Jonathan Amos [6 June 2011]BBC © 2011 Retrieved 2011-06-06
- CERN experiments observe particle consistent with long-sought Higgs boson | CERN press office. Press.web.cern.ch (2012-07-04). Retrieved on 2013-07-17.
- "CERN.ch". Public.web.cern.ch. Retrieved 20 November 2010.
- "W3.org". W3.org. Retrieved 20 November 2010.
- "CERN.ch". CERN.ch. Retrieved 20 November 2010.
- Adrian Cho, Neutrinos Travel Faster Than Light, According to One Experiment, Science NOW, 22 September 2011.
- The Associated Press, "Einstein Proved Right in Retest of Neutrinos' Speed", The Associated Press, 17 March 2012.
- "CERN Press Release". Press.web.cern.ch. Retrieved 4 July 2012.
- "CERN Website – LINAC". Linac2.home.cern.ch. Retrieved 20 November 2010.
- CERN Courier, "MoEDAL becomes the LHC's magnificent seventh", 5 May 2010
- Overbye, Dennis (29 July 2008). "Let the Proton Smashing Begin. (The Rap Is Already Written.)". The New York Times.
- "CERN press release, 7 August 2008". Press.web.cern.ch. 7 August 2008. Retrieved 20 November 2010.
- "'God particle': New particle found, could be the Higgs boson, CERN scientists say". The Times Of India. 4 July 2012.
- <Please add first missing authors to populate metadata.> (November 2004). "Red Carpet for CERN's 50th". CERN bulletin.
- ESA Convention (6th ed.). European Space Agency. September 2005. ISBN 92-9092-397-0.
- "CONVENTION FOR THE ESTABLISHMENT OF A EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH". CERN Council website. CERN. Retrieved 16 July 2012.
- "Member States". CERN Council website. CERN. Retrieved 16 July 2012.
- The Republic of Cyprus Becomes a CERN Associate Member State. Newswise.com (2012-10-05). Retrieved on 2013-07-17.
- Thumbs up: Pakistan meets criteria for CERN.
- Thumbs up: Pakistan meets criteria for CERN. Newswise.com (2012-10-05). Retrieved on 2013-07-17.
- "Member States Contributions - 2012". CERN website. CERN. Retrieved 16 July 2012.
- "Final Budget of the Organization for the fifty-eighth financial year 2012". CERN. 30 November 2011. Retrieved 16 July 2012.
- "Observers". CERN Council website. CERN. Retrieved 16 July 2012.
- Andresen, G. B. et al. (2010). "Trapped antihydrogen". Nature 468 (7324): 673–6. Bibcode:2010Natur.468..673A. doi:10.1038/nature09610. PMID 21085118.
- "Vesti - Srbija zvanično postala član CERN-a". B92. Retrieved 4 July 2012.
- "CERN Press Release". Public.web.cern.ch. 16 September 2011. Retrieved 7 December 2011.
- "Israel becomes full member of Cern". Yahoo.co.uk. 12 December 2013. Retrieved 12 December 2013.
- "The Republic of Cyprus becomes a CERN Associate Member State". CERN press release. CERN. Retrieved 5 October 2012.
- "CERN Press Release". home.web.cern.ch. 3 October 2013. Retrieved 3 October 2013.
- "Brasil fará parte do maior laboratório de física do Mundo". www.estadao.com.br. 21 December 2013. Retrieved 3 December 2013.
- "24 June 2011: CERN - CERN Council looks forward to summer conferences and new members". Interactions.org. 24 June 2011. Retrieved 7 December 2011.
- "ISAAR relationship data at CERN library". Retrieved 14 December 2009.
- "CERN International Relations - Jordan". International-relations.web.cern.ch. Retrieved 4 July 2012.
- "CERN International Relations - SESAME". International-relations.web.cern.ch. 17 October 2011. Retrieved 4 July 2012.
- "''Macedonia joins CERN (SUP)''". Mia.com.mk. Retrieved 20 November 2010.
- Quevedo, Fernando (July 2013). "The Importance of International Research Institutions for Science Diplomacy". Science & Diplomacy 2 (3).
- "Shiva's Cosmic Dance at CERN". Fritjof Capra. 18 June 2004. Retrieved 7 December 2011.
- Ramachandran, Nirmala (2000). Hindu heritage. Pannipitiya : Stamford Lake Publication, 2000-2002. pp. 41–42. ISBN 978-955-8156-43-8.
- Smith, David. The Dance of Siva: Religion, Art and Poetry in South India. Cambridge University Press. ISBN 978-0-521-52865-8.
- "Youtube.com". Youtube. Retrieved 20 November 2010.
- "Large Hadron Collider Rap Video Is a Hit", National Geographic News. 10 September 2008. Retrieved 13 August 2010.
- "Southparkstudios.com". South Park Studios. Retrieved 25 May 2011.
- "Angels and Demons". CERN. Retrieved 31 January 2012.
- Boyle, Rebecca (31 October 2012). "Large Hadron Collider Unleashes Rampaging Zombies". Retrieved 22 November 2012.
|Wikimedia Commons has media related to CERN.|
- Official website of CERN: CERN Accelerating science
- CERN at 50
- CERN Courier – International journal of high-energy physics
- Israel may become first non-European member of nuclear research group CERN
|
<urn:uuid:f62478dc-a66b-4ef8-9c53-ef6eb9225590>
|
CC-MAIN-2014-15
|
http://en.wikipedia.org/wiki/CERN
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609521558.37/warc/CC-MAIN-20140416005201-00487-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.903589 | 6,860 | 2.953125 | 3 |
Habitat Monitoring Protocols
- Salt Marsh - Anadromous
Monitoring involves systematic data collection that
provides information on the progress of restoration projects and
allows restoration practitioners to determine if project goals have
been met. Monitoring involves the measurement of a number of attributes
or parameters at regular intervals to record changes. A salt marsh
restoration site should be monitored until it appears mature and
self-sustaining, which could take years to decades. Salt marsh restoration
sites should be paired with "undisturbed" reference wetlands
for monitoring. Ideally, reference sites should be used for collection
of baseline data as well. Reference sites should be similar to
restoration sites in terms of geomorphology, tidal range, and elevation.
Suggested parameters to be monitored at salt marsh restoration
and reference sites include:
Currently, Save The Bay is involved in the development of standardized
monitoring protocols for salt marsh restoration projects throughout
Rhode Island. Two monitoring programs and approaches for salt marsh
restoration projects are detailed online below.
Neckles, H.A. and M. Dionne, Editors. 1999. Regional
Standards to Identify and Evaluate Tidal Wetlands Restoration in
the Gulf of Maine. Wells National Estuarine Research Reserve
Technical Report, Wells, Maine.
View report (PDF)
Niedowski, N. L. 2000. New
York State Salt Marsh Restoration and Monitoring Guidelines.
New York Department of State, Albany, N.Y. and the New York Department
of Environmental Conservation, East Setauket, N.Y.
View report (PDF)
Duration of Monitoring
Availability of funds and resources often limits the duration that
salt marsh restoration projects can be monitored, however the duration
and frequency of monitoring must be sufficient for a determination
of functional equivalency with reference sites. Neckles and Dionne
(1999) recommend monitoring salt marsh restoration projects at one year,
two years, and three to five years post-restoration.
The principles of Adaptive Management have been incorporated into
the administration of habitat restoration projects within a variety
of governmental funding authorities and programs (Thom
1997). Comprehensive, long-term monitoring is a component of adaptive
management, which relies on the accumulation of evidence (via long-term
monitoring) to support a decision that demands action. If established early in the project planning phase
and implemented during successive monitoring and management phases,
adaptive management can be a powerful method to systematically assess
and improve the performance of restored ecosystems (Thom 2000).
A well-designed restoration monitoring program will allow project
managers to detect deviation from projected results months, years,
or decades following construction. For example, yearly monitoring
of a restored salt marsh might reveal encroachment by Phragmites
or other invasive plant species. Hydrologic monitoring may reveal
deficiencies in the design of a culvert or water control structure,
which may result in insufficient drainage. Manual harvesting or
chemical control may be periodically required to control the spread
of invasive plants. The specific design features of a culvert or
water control structure may require enhancement or modification
during successive years to optimize tidal flow patterns
Monitoring data can be used by project managers to demonstrate
the ability of the project to meet stated goals and objectives.
This is especially important in promoting the benefits of salt marsh
restoration to funding agencies, potential partners or sponsors for
future restoration projects, and the general public. Finally, long-term
monitoring data allows managers to learn from early projects, and
avoid potential pitfalls in successive restoration efforts (Thom
and Wellman 1997).
Return to Top
Neckles, H. and M. Dionne. 1999. Regional standards to identify
and evaluate tidal wetland restoration in the Gulf of Maine. A GPAC
Worksop, June 2-3, 1999. Wells National Estuarine Research Reserve,
Thom, R.M. 1997. System-development matrix for adaptive management
of coastal ecosystem restoration projects. Ecological Engineering
Thom, R.M. 2000. Adaptive management of coastal ecosystem restoration
projects. Ecological Engineering 15:365-372.
Thom, R.M. and K.F. Wellman. 1997. Planning aquatic ecosystem restoration
monitoring programs. Evaluation of Environmental Investments Research
Program, U.S. Army Corps of Engineers Institute for Water Resources,
IWR Report 96-R-23, Alexandria, Virginia.
Return to Top
This site was created through
a partnership of the:
Coastal Resources Management Council
Narragansett Bay Estuary Program
Save The Bay®
|
<urn:uuid:c43a0c53-5556-4c25-8e58-0914e720dfbe>
|
CC-MAIN-2017-47
|
http://www.edc.uri.edu/restoration/html/tech_sci/habsalt.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807089.35/warc/CC-MAIN-20171124051000-20171124071000-00761.warc.gz
|
en
| 0.833544 | 969 | 3.03125 | 3 |
Spam may be a global problem but it's hurting users in developing countries more than their counterparts in industrialized nations, according to a new report by the Organization for Economic Cooperation and Development (OECD) in Paris.
Numerous underdeveloped countries, especially in Africa and Asia, lack the knowledge, technology and money to effectively combat the growing flow of junk e-mail over their domestic communication networks. As a result, users in these regions suffer from more outages and less reliable service, and are often distrustful of the Internet -- all factors that threaten to widen the global digital divide.
"Spam is a much more serious issue in developing countries than in OECD countries, as it is a heavy drain on resources that are scarcer and costlier in developing countries than elsewhere," the report states.
The report, prepared by Suresh Ramasubramanian, a consultant to the OECD, reflects many of the concerns voiced at a meeting on spam held last year with representatives of developing countries in preparation for the second phase of the World Summit on the Information Society (WSIS) in December.
High volumes of incoming and outgoing spam are a severe drain on the meager available bandwidth in developing countries, according to the report. ISPs (Internet service providers) in developing countries face huge costs for receiving, storing and forwarding spam over their networks, and for hiring administrators to do spam filtering when their skills could be devoted to other tasks, it said.
Moreover, ISPs with lax antispam and security policies are likely to find their networks overrun by spammers. Spam will increasingly form more of their incoming mail streams, thus making e-mail practically unusable for their customers. Open relays, open proxies and machines infected with viruses or Trojan horses on their networks will become major spam sources.
Spam also digs deeply into the shallow pockets of users in developing countries. Users in these countries typically rely on dialup Internet access at home or share access at cyber cafes with connections that are often slow and expensive as they have to pay for each byte of data they download.
Telephone infrastructure in developing countries is largely antiquated, adding to users' costs. After making a few attempts to log onto the network and finally get a connection, users are often disconnected and have to make several calls to establish a new connection.
"All this effort and expense is completely wasted when the users finds that the downloaded e-mails are to a large extent random spam or viruses," the report states.
Not only that, users in developing countries are particularly vulnerable to malicious spam and viruses because they often avoid purchasing expensive licenses for operating systems and antivirus programs -- worth a month's salary in many cases, according to the report. Consequently, they purchase cheaper -- and most likely pirated -- copies of software that is not only difficult to keep updated because it lacks proper licenses but is also a source of viruses.
To help curb spam and encourage people in developing countries to communicate via e-mail, authors of the OECD spam report listed several recommendations in its report. For a start, they urge governments to adopt legislation against spam and ISPs to invest in spam-filter technology or outsource their spam filtering to third-party providers.
The authors also recommend establishing computer security and incident response teams (CSIRTs) or computer emergency response teams (CERTs) to organize an effective response to major incidents, and call on ISPs around the globe to help each other fight the spread of spam.
And the ball doesn't stop there. The OECD spam experts also urge governments and ISPs in developing countries to launch widespread public education awareness campaigns in a move to reduce security risks from spam carrying viruses.
The 32-page OECD report is in available at: http://www.oecd.org/dataoecd/5/47/34935342.pdf.
|
<urn:uuid:ad29126b-124a-44e7-9687-6ed72fbcf032>
|
CC-MAIN-2014-35
|
http://www.pcworld.idg.com.au/article/132837/spam_hurts_developing_countries_most_oecd_says/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500815991.16/warc/CC-MAIN-20140820021335-00382-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.954419 | 776 | 2.875 | 3 |
It is widely recognized that environmental factors often play a key role in violent conflicts, and that conflicts involving natural resources have a higher chance of relapsing back into violence. Over the past 15 years however, the literature started moving beyond natural resources scarcity as a source of conflict to envision environmental cooperation as a potential peacebuilding tool.
This approach, coined environmental peacemaking or peacebuilding, argues that shared natural resources and environmental problems can serve as a basis to promote dialogue and trust between conflict parties, leading to mutually beneficial arrangements and considerable cost reduction for both parties. However, this approach refers to a broad variety of mechanisms which are still poorly defined in the literature, and authors point out a lack of systematic empirical research on this issue.
This research project is interdisciplinary and investigates the potential and effectiveness of environmental peacebuilding. The central question of this research is whether shared natural resources can indeed contribute to building sustainable peace and, if so, how. A particular attention will be given to the following questions within the scope of this research project: What is understood as environmental peacebuilding; when, how and by whom is the environmental peacebuilding argument raised; what are the conditions under which environmental collaboration can contribute to peacebuilding; which paths exist for environmental peacebuilding, and which ones are the most and least promising.
To answer these questions, the research will focus on selected case studies. Through participant observation and exchanges with a wide range of stakeholders in the field – from local actors to international organisations and decision-makers, the concepts of natural resource scarcity, environmental cooperation and peacebuilding will be developed and applied to the case of protracted conflicts.
|
<urn:uuid:cce7360c-ce76-435f-bdf4-434613d94102>
|
CC-MAIN-2023-14
|
https://www.iri-thesys.org/research/research-projects/moving-beyond-natural-resources-as-a-source-of-conflict/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943637.3/warc/CC-MAIN-20230321064400-20230321094400-00235.warc.gz
|
en
| 0.944181 | 331 | 2.765625 | 3 |
Comparing: Caernarvon vs. Tiger II vs. 110
Development of this infantry support tank started in 1944. The first prototype was ready for trials in 1952. A total of 21 tanks were manufactured but never entered service. Some of the vehicles were later converted into the Conqueror heavy tanks.
The most heavily armored tank carrying the most powerful anti-tank gun. The vehicle's drawbacks included an overloaded suspension and engine-transmission group, as well as excessive general mass. When engaging enemy vehicles at long range, the Tiger II had an upper hand over any other vehicle in terms of the gun and armor protection. However, due to the excessive mass of the vehicle, relatively low durability of the engine and transmission, and small total number of vehicles built, the Tiger II did not have any significant impact on the course of war.
From the mid-1940s to the 1950s, Soviet engineers attempted to modernize the IS-2 tank. The IS-2U variant, developed in November 1944, was conceived to have a reinforced frontal hull with a plate configuration resembling that of the IS-3. In the mid-1950s the design project was passed to China and became the basis for further Chinese tank development.
|Tank data page||Tank data page||Tank data page||Tank data page|
|Battle Tiers||8 9 10||8 9 10||8 9 10|
|Speed Limit||34.3 km/h||38 km/h||40 km/h|
|Speed Limit Back||12 km/h||12 km/h||15 km/h|
|Horse power / weight|
|Max Climb Angle|
|Hard terrain resistance|
|Medium terrain resistance|
|Soft terrain resistance|
|Damage (Explosion radius)|
|Damage / min|
|Rate of Fire|
|Stationary||6.00 %||%||6.85 %|
|In motion||1.50 %||%||3.47 %|
|When Firing||1.45 %||%||1.07 %|
|Accuracy||72.6384 %||%||74.7933 %|
|Neto Credits Income||-4495.68||-5414.49|
|Winrate||48.8284 %||%||49.5991 %|
|Kills per Battle||0.545338||0.742719|
|More stats @ vbaddict.net||More stats||More stats||More stats|
|
<urn:uuid:944ea874-8629-4506-8865-ce14e3722f7f>
|
CC-MAIN-2017-30
|
http://tank-compare.com/en/compare/caernarvon/tiger-ii/110
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426050.2/warc/CC-MAIN-20170726062224-20170726082224-00038.warc.gz
|
en
| 0.792087 | 529 | 2.765625 | 3 |
MBL scientist investigates role of environmental toxin in shell disease
Contact: Diana Kenney
Marine Biological Laboratory
MBL, WOODS HOLE, MA—The search for what causes a debilitating shell disease affecting lobsters from Long Island Sound to Maine has led one Marine Biological Laboratory (MBL) visiting scientist to suspect environmental alkyphenols, formed primarily by the breakdown of hard transparent plastics.
Preliminary evidence from the lab of Hans Laufer suggests that certain concentrations of alkyphenols may be interfering with the ability of lobsters to develop tough shells. Instead, the shells are weakened, leaving affected lobsters susceptible to the microbial invasions characteristic of the illness.
"Lobsters 'know' when their shell is damaged, and that's probably the reason when they have shell disease, why they molt more quickly," says Laufer, a visiting investigator at the MBL for over 20 years and professor emeritus of molecular and cell biology at the University of Connecticut. "But ultimately, they still come down with the disease. And we think the presence of alkyphenols contributes to that."
Like any crustacean, lobsters shed their shells multiple times in one lifetime. After molting, the outer skin of the soft and exposed lobster will begin to harden. It is here that Laufer thinks the alkyphenols are doing their damage. At this point, a derivative of the amino acid tyrosine, whose function is to harden the developing shell, is incorporated. It is known that alkyphenols and tyrosine are similarly shaped and Laufer suspects that the toxin may be blocking tyrosine from its normal functions. He is at MBL this summer to measure the amount of competition between the two molecules. Alkyphenols are also known to act as endocrine disruptors.
Laufer discovered the presence of alkyphenols in lobsters serendipitously while investigating a tremendous lobster die off at Long Island Sound in 1999, when shell disease, first observed in the mid-1990s, was noted to be on the rise. Although an unusually hot summer, it was also the first time New York City sprayed mosquito populations to prevent the spread of West Nile virus. Laufer, who began his career as an insect endocrinologist, suspected the toxins from the sprayings may have contributed to the lobster die off. In 2001, while searching for the mosquito toxins in lobsters, he instead found alkyphenols.
"It's a real problem," Laufer says. "Plastics last a long time, but breakdown products last even longer. Perhaps shell disease is only the tip of the iceberg of a more basic problem of endocrine disrupting chemicals in marine environments."
|
<urn:uuid:c432567f-e08b-4a26-b0ab-10a32ffd7574>
|
CC-MAIN-2017-43
|
http://adaywithoutplastic.blogspot.com/2008/08/plastics-suspect-in-lobster-illness.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826049.46/warc/CC-MAIN-20171023130351-20171023150351-00153.warc.gz
|
en
| 0.945876 | 559 | 2.71875 | 3 |
December 8, 2011
How Sustainable Is Nuclear Power For The UK?
The research into the sustainability of nuclear and other electricity options in the UK shows that nuclear power could make a significant contribution to reducing greenhouse gas emissions by 2035. However, that would require a huge expansion of nuclear, constituting 35% of the electricity mix by 2035, almost double the current contribution.
Given that most current nuclear power stations are due to close in this period, this scenario seems unfeasible, the authors claim.At the same time, expansion of nuclear power would worsen other sustainability aspects, including depletion of natural resources, ozone layer depletion, toxicity and health impacts from radiation.
These are some of the findings by the SPRIng research consortium led by Professor Adisa Azapagic at The University of Manchester. SPRIng looks at the techno-economic, environmental, social and ethical sustainability of nuclear power in the UK.
SPRIng found that meeting UK carbon emissions targets would only be possible with a huge expansion of both renewables and nuclear electricity. By 2020, renewables would have to contribute 55% to the UK electricity mix by 2020 and nuclear 35% by 2035.
The SPRIng report, which is released today, also shows that if energy consumption can be reduced significantly, nuclear power is not essential for meeting the UK climate change targets.
If, however, the consumption of energy continues to grow as it has in the past, the role of nuclear power becomes much more important in meeting climate change targets.
Expansion of nuclear power will depend on many factors, including availability of uranium, fuel used in today's nuclear reactors. Uranium shortages could within a few decades constrain any significant global expansion of uranium nuclear plants, unless major new uranium reserves can be identified and exploited economically.
The findings suggests that carbon taxation could play a significant role in promoting low-carbon electricity options, including nuclear. For example, a carbon price of £100 per ton of carbon dioxide would be sufficient to make nuclear plants of current designs highly profitable.
The research also shows that even when the radiological consequences of a large accident are taken into account, nuclear power remains one of the safest sources of electricity.
However, the research claims, nuclear power poses complex ethical questions regarding its intergenerational impacts as future generations, who will not benefit from today's nuclear electricity, will have to bear both the risks and costs of nuclear decommissioning and waste management.
Professor Azapagic said: "Our research shows that there is no 'best' electricity option overall but the choice of sustainable options will depend on individual preferences of stakeholders, including the public and decision makers.
"For example, our findings suggest that solar, hydro and wind are the most favorable electricity options for the UK public. Nuclear power is favorable for 42% of the UK public while electricity from coal, oil and gas is least favored.
"The Government should ensure that decisions on the future of nuclear power and other electricity options in the UK take into account a range of sustainability criteria rather than be based solely on a market-led approach dominated purely by economics.
"However, a market-led approach could play a role should it prove politically possible to set tight enough carbon targets with high enough penalties for non-compliance.
"Whether such leadership is possible is highly questionable. Even more doubtful is whether various stakeholders, including the UK public, would accept it.
On the Net:
|
<urn:uuid:4ffbdb81-8855-4e9e-af36-20b75871346f>
|
CC-MAIN-2017-47
|
http://www.redorbit.com/news/science/1112436904/how-sustainable-is-nuclear-power-for-the-uk/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934808935.79/warc/CC-MAIN-20171124195442-20171124215442-00272.warc.gz
|
en
| 0.943497 | 694 | 3.578125 | 4 |
Bracciano is a small town in the Italian region of Lazio, 30 km northwest of Rome. The town is famous for its volcanic lake (Lago di Bracciano or "Sabatino", the eighth largest lake in Italy) and for a particularly well-preserved medieval castle. The lake is widely used for sailing and is popular with tourists; the castle has hosted a number of events, especially weddings of actors and singers.
The town is served by an urban railway (Line FR3) which connects it with Rome (stations of Ostiense and Valle Aurelia) in about 55 minutes. Close to it lie the two medieval towns of Anguillara Sabazia and Trevignano Romano.
is no certain information about the origins of Bracciano, on the Via Claudia overlooking the lake. It probably rose from one of the numerous towers built in the tenth century as a defence against the Saracen attacks, as implied by the ancient name of Castrum Brachiani. In the eleventh century the neighbouring territory was acquired by the Prefetti di Vico family, who turned the tower into a castle. Ferdinand Gregorovius dated the possession of Bracciano by the Orsini to 1234. The area was later acquired by the Roman hospital of Santo Spirito in Sassia and, from 1375, was a Papal possession.
In 1419 the Colonna Pope Martin V confirmed the fief of Bracciano in the Orsini family branch of Tagliacozzo. Under this powerful family the city developed into a flourishing town, famous in the whole of Italy for its castle, which was enlarged, starting from 1470, by Napoleone Orsini and his son Virginio. In 1481 it housed Pope Sixtus IV, who had fled from the plague in Rome; the Sala Papalina in one of the corner towers commemorates the event. Four years later, however, the city and the castle were ravaged by Papal troops under Prospero Colonna, and subsequently a new line of walls was built.
In 1494 Charles VIII of France and his troops marching against Rome stopped at Bracciano. This act led to the excommunication of the Orsini, and in 1496 the city was besieged by a papal army headed by Giovanni di Candia, son of Pope Alexander VI Borgia, though it resisted successfully. Cesare Borgia, another of Alexander's natural sons, was unsuccessful in his attempt to take the Orsini stronghold a few years later. The sixteenth century was a period of splendour for Bracciano. In 1558 the notorious Paolo Giordano I Orsini, marrying Isabella de' Medici, daughter of Cosimo I, Grand Duke of Tuscany, received the title of duke of Bracciano. The economy was boosted by the exploitation of sulphur and iron, the production of tapestries and paper. The latter was favoured by the construction of an aqueduct whose ruins can be still seen in the city. Bracciano in this period had some 4,500 inhabitants.
However, the expensive tenor of life of the Orsini eventually damaged the economic conditions of the city. The last great ruler was probably Paolo Giordano II, a patron of arts and literature which made Bracciano a center of culture in Italy. The decline culminated in 1696 when the castle was sold to Livio Odescalchi, nephew of Pope Innocent XI; the Odescalchi family still retain the castle.
In the castle, richly frescoed friezes and ceilings now contrast with blank walls, which were hung with richly-coloured tapestries when the lords of Bracciano were in residence. Fortunately, the important late 15th century frieze showing the labours of Hercules is still visible.
Actors Tom Cruise and Katie Holmes had their wedding in the castle on 18 November 2006.
The main economic activities are tourism, services and agriculture. Until the twentieth century the region was notoriously unhealthy for its malaria, now eradicated; as a result, none of the fine villas were built at the water's edge, but all stood on healthier rises of ground.
The main monument of Bracciano is its castle, Castello Orsini-Odescalchi, one of the most noteworthy examples of Renaissance military architecture in Italy.
3 km outside the city, alongside the road leading to Trevignano Romano, is the ancient church of San Liberato (ninth century). It occupies what was once the Roman settlement of Forum Clodii, now surrounded by an herb garden, part of the complex of English-style gardens at the adjoining Villa San Librato, designed by Russell Page in 1965 for the art historian conte Donato Sanminatelli and his contessa, Maria Odescalchi, and carried out over the following decade.
On the same road are the ruins of the Aquae Apollinaris, a complex of baths famous in the Roman age.
At Vigna di Valle, facing the lake, an ancient hydroplane base houses today the museum of the Aeronautica Militare Italiana. The museum's four hangars include most of the historical Italian military aircraft, including famous planes such as the MC. 202, the Supermarine Spitfire, the Savoia Marchetti S.79, the F-104 Starfighter, the Caproni Ca.100 and the Panavia Tornado. The museum stages an annual 'Giornata Azzura' airshow at Pratica di Mare airport.
|
<urn:uuid:40391a46-9b1f-4528-99ff-510a50e8363d>
|
CC-MAIN-2020-24
|
https://en.advisor.travel/poi/Bracciano-207
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347391309.4/warc/CC-MAIN-20200526191453-20200526221453-00135.warc.gz
|
en
| 0.962757 | 1,159 | 2.6875 | 3 |
There are several reasons.
Recognizing the urgent danger that now exists that an increase in the number of States possessing nuclear weapons may occur, aggravating international tension and the difficulty of maintaining world peace, and thus rendering more difficult the attainment of general disarmament ... Calls upon all Governments to make every effort to achieve permanent agreement on the prevention of the wider dissemination of nuclear weapons.
-- United Nations General Assembly Resolution 1576 (XV)
First, because non-proliferation was seen as a positive step towards nuclear disarmament. Nuclear war does not just affect involved combatant; the nuclear fallout from a sizeable exchange would be a global ecological disaster. At the height of the Cold War, the threat of nuclear holocaust was a very real concern. This meant most smaller states had a compelling interest in stemming/reversing the the tide of nuclear arming.
The least advanced countries of the Third World, which were in favour of the aim pursued,
hoped that [the nuclear powers] would provide them with genuine assistance for advancement in the domain of the peaceful applications of nuclear energy.
The industrialized countries ... were basically afraid of being handicapped in world nuclear competition vis-a-vis the powers which had entirely maintained their freedom of action and were likely to benefit from the impact of their military operations on the civil domain. They were also anxious to gain from the peaceful applications of nuclear explosions.
-- Goldschmidt, Bertrand. "The Negotiation of the Non-Proliferation Treaty (NPT)." IAEA Bulletin 22.3/4 (1980): 77.
Second, because those countries was not really losing anything from it. Keep in mind that most of the world's countries are not Great Powers. While the terms of the treaty can be seen as unfair, it was not in truth a real disadvantage for these smaller nations. Most of them, and some Great Powers, did not have the political will or technical expertise to develop nuclear arms in the first place (West Germany being a notable exception). Nuclear arms are not a major concern for a country trying to feed its population and raise their economy above agriculture. Such developing nations had nothing to lose by renunciating nuclear weapons; but they could gain (even if meagre) security assurances from doing so.
Nothing in this Treaty shall be interpreted as affecting the inalienable right of all the Parties to the Treaty to develop research, production and use of nuclear energy for peaceful purposes without discrimination ... All the Parties to the Treaty undertake to facilitate, and have the right to participate in the fullest possible exchange of equipment, materials and scientific and technological information for the peaceful uses of nuclear energy.
-- Article IV, Nuclear Non-Proliferation Treaty
Thirdly, and going hand in hand with the second point, because many countries felt they had something to gain. Most of them sought civilian/economic benefits from nuclear technology. During the negotiations for the NPT, these countries - as a condition of their acceptance - extracted concessions in this regard. The security concerns of the non-nuclear states also resulted in promises by nuclear states that they would not use them on non-nuclear states.
Although such a provision failed to be formally incorporated into the treaty, the Great Powers did make formal promises to that effect. Britain, the United States, France and the Soviet Union all made some variation of an assurance to not attack non-nuclear states. Although there are loopholes, this helped confirm the growing consensus that nuclear weapons are not regular bombs and shouldn't be used lightly.
|
<urn:uuid:b0b0b95a-acbd-412a-96f1-32879ab45684>
|
CC-MAIN-2020-34
|
https://history.stackexchange.com/questions/14334/why-did-so-many-countries-agree-to-the-non-proliferation-treaty
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740733.1/warc/CC-MAIN-20200815065105-20200815095105-00177.warc.gz
|
en
| 0.962312 | 716 | 3.0625 | 3 |
The Bahá’í Faith is the youngest of the world’s independent monotheistic religions. Founded in Iran in 1844, it now has more than five million adherents in 236 countries and territories. Bahá’ís come from nearly every national, ethnic and religious background, making the Bahá’í Faith the second-most-widespread religion in the world.
Bahá’ís view the world’s major religions as a part of a single, progressive process through which God reveals His will to humanity. Bahá’u’lláh (1817-1892), the Founder of the Bahá’í Faith, is recognized as the most recent in a line of Divine Messengers that includes Abraham, Krishna, Moses, Buddha, Zoroaster, Christ and Muhammad.
The central theme of Bahá’u’lláh’s message is that humanity is one single race and that the day has come for humanity’s unification into one global society. While reaffirming the core ethical principles common to all religions, Bahá’u’lláh also revealed new laws and teachings to lay the foundations of a global civilization. “A new life,” Bahá’u’lláh declared, “is, in this age, stirring within all the peoples of the earth.”
The worldwide Bahá’í community, composed of people from virtually every racial, ethnic and religious background, is working to give practical expression to Bahá’u’lláh’s vision of world unity. We invite you to learn more about the Bahá’í Faith and benefit from the spiritual and practical insights found in the Revelation of Bahá’u’lláh, God’s Messenger for humanity in this day.
|
<urn:uuid:a3907214-4c7e-4673-bcff-69475fd78856>
|
CC-MAIN-2020-10
|
https://www.londonbahai.ca/welcome-to-the-london-bahai-community/history-of-the-bahai-faith
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143079.30/warc/CC-MAIN-20200217175826-20200217205826-00406.warc.gz
|
en
| 0.912958 | 374 | 3.0625 | 3 |
An initial chiropractic exam for pain will typically have three parts: a consultation, case history, and physical examination. An X-ray examination may be performed.
. The patient meets with the chiropractor and provides a brief synopsis of his or her lower pain, such as:
- Duration and frequency of symptoms
- Description of the symptoms (e.g. burning, throbbing)
- Areas of pain
- What makes the pain feel better (e.g. sitting, stretching)
- What makes the pain feel worse (e.g. standing, lifting).
- Range of motion of the affected part
- Muscle strength
. The chiropractor identifies the area(s) of complaint and the nature of the pain by asking questions and learning more about different areas of the patient's history, including:
- Family history
- Dietary habits
- Past history of other treatments (chiropractic, osteopathic, medical and other)
- Occupational history
- Psychosocial history
- Other areas to probe, often based on responses to above questions.
. A chiropractor may utilize a variety of methods to determine the spinal segments that require chiropractic treatments, including but not limited to static and motion palpation techniques determining spinal segments that are hypo mobile (restricted in their movement) or fixated. Depending on the results of the above examination, a chiropractor may use additional diagnostic tests, such as:
- X-ray to locate subluxations (the altered position of the vertebra)
|
<urn:uuid:bf7600ab-e966-44f0-b98a-9c76c0db3308>
|
CC-MAIN-2023-23
|
http://www.lorchiropracticclinic.com/chiropractic-screening-exam
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645595.10/warc/CC-MAIN-20230530095645-20230530125645-00630.warc.gz
|
en
| 0.909926 | 330 | 2.875 | 3 |
The Galena Bridge was build south of Reno on highway 395. The undertaking was massive. The valley below the bridge was first filled in with 1,000’s of cubic yards of dirt which covered a concrete pipe to evacuate any water from rain and snow melting. This was done so they would have a level surface to work from and on instead of the angled valley walls. The forms were erected to support the concrete forms as the bridge was cast in place.
Once the bridge was constructed the forms had to be lowered for the bridge to become self-supporting. CC Myers of Rancho Cordova worked with C. H. Bull Company to design a system which could simultaneously and slowly lower the forms so the bridge could become self-supporting. As the falsework structure was lowered, the arch of the bridge started to see a load and a change at about 3” and between 5” and 6” the falsework was no longer supporting the cast in place arch and it was now fully self-supporting the arch and bridge structure. Due to the size and weight of the bridge a forty jack; 7400 ton (14, 800,000 pound) jacking system was supplied by C. H. Bull made up of 100,200 & 300 ton jacks.
The system was used twice, once for each section of the bridge. Stan Sheppard, C. H. Bull’s high tonnage jacking specialist, was onsite for both lowering’s as a hands on consultant working with the crew.
|
<urn:uuid:93201ca2-605d-433c-b137-83452bb7ffc4>
|
CC-MAIN-2023-23
|
https://chbulljackingsolutions.com/galena-bridge/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643462.13/warc/CC-MAIN-20230528015553-20230528045553-00220.warc.gz
|
en
| 0.987837 | 319 | 2.53125 | 3 |
Why kids should be taught personal finance in school – and at home
A handful of schools already teach personal finance, but it’s far from the norm
Every year, a Manitoba high school teacher asks his graduating students to create a budget for the next year. They write down their income and anticipated expenses, but they don’t see how it adds up — and whether they’re in the red — until the very end.
“Every single time I’ve done this … they see that they’re $15,000 in the hole for the year,” says Kyle Prevost, a high school teacher and co-author of More Money for Beer and Textbooks.
Perhaps the most troubling thing is that his students believe they’re filling out “reasonable” amounts for their expected expenses.
“Many of them thought they were already taking a hit spending $2,000 or $3,000 a year on clothing, because that was less than they were spending now,” he says.
Many youth are graduating unprepared for the financial realities of adulthood because they don’t tend to learn financial savvy either at home or school.
Students need personal finance classes, according to Prevost and other personal finance experts, to prevent them from spiraling into a life of debt and financial insecurity.
Parents struggle with financial literacy too
“Canadians don’t understand the basics,” says Laurie Campbell, CEO of Credit Canada Debt Solutions.
Many adults, she says, struggle with simple concepts like spending less than they earn.
I believe that we can realize and recognize that parents haven’t done a very good job of teaching their children.– Laurie Campbell, Credit Canada Debt Solutions CEO
Canadians’ rising debt levels help prove her point.
Canadians collectively owe $1.568 trillion, including mortgages, according to a recent study from credit firm Equifax. That works out to roughly $21,000 per person.
Put another way, Canadian households owe nearly $1.65 for every dollar of disposable income.
This growing consumer debt reflects a laissez-faire attitude to borrowing, and with many adults failing to manage their money well, it’s hardly surprising that most kids don’t grasp the fundamentals of spending, saving and sharing, financial experts say.
“I believe that we can realize and recognize that parents haven’t done a very good job of teaching their children,” Campbell says.
She’s a firm believer that schools ought to pick up the slack.
“It should be a priority,” says Prevost.
Mandatory personal finance course?
Last year, Manitoba’s ministry of education approved a personal finance course Prevost created, and he taught it for the first time to Grade 11 and 12 students at Birtle Collegiate Institute, about 300 km northwest of Winnipeg.
He grabs students’ attention by kicking off the semester-long class with an investing unit.
“My first lesson is: you could be a millionaire by 50 by investing the equivalent of a pack of cigarettes every day,” he says. “That gets them thinking.”
The course, Prevost says, covers “everything.” Kids earn their class credit after learning about tax-free savings, taxes, insurance and other essentials.
The kids enjoyed the course, he says, and he’s teaching it again this year. Ideally, he’d like every school in Canada to offer something similar.
“I have no idea why it’s not getting done,” he says. “I have no idea why it wasn’t done 30 years ago.”
Prevost, along with a small group of teachers in his province and Saskatchewan, have banded together to pressure their education ministries to standardize a personal finance curriculum.
Ontario requires teachers to insert financial literacy lessons into other core subjects, like math or history. But that falls far short of a required personal finance course, Prevost says, and he’s unimpressed by examples of when teachers could include such lessons. For example, an English class reading Shakespeare’s Hamlet could debrief on credit when they come across the line, “neither a borrower or a lender be.”
To those kinds of suggestions, Prevost says, “no.” He finds it frustrating that teachers would be encouraged to layer personal finance into other core subjects when “that’s code for stuff that’s tacked onto the end of my course that I’ll never get to.”
Kids want parents’ help
Schools shouldn’t be solely responsible for a child’s financial education, according to Kelley Keehn, a personal finance author. She says kids want to learn the ins and outs of finances from their parents.
Parents should take advantage of teachable moments that crop up in their finances, she advises.
- Millennials should move back home to prosper, say financial experts
- Youngsters learn about cash and credit
- Students run their own bank
“You have to look to your life every day and say, ‘Where can I teach my kids about what I’m going through?'” she says.
At mortgage renewal time, for example, parents could explain how borrowing for home ownership works. When a credit card statement arrives, they could explain interest and annual card fees.
Keehn and Campbell both sit on the national steering committee on financial literacy, which helps to implement Canada’s national financial literacy strategy. Keehn recognizes that the strategy needs to better equip parents to be able to provide those teachable moments for their kids.
While Credit Canada’s Campbell agrees that, in an ideal world, parents and teachers would share the task, it’s clear schools need to prioritize teaching financial literacy.
“Let’s face it, they’re not going to necessarily use calculus when they come out of school,” she says. “I’m not sure why we’re not doing more in the area of money management.”
|
<urn:uuid:f42fc893-3926-4bc0-a6ef-7a6a61689f74>
|
CC-MAIN-2020-16
|
http://www.robertdouglasferguson.com/personal-finance-and-youth-in-the-news/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370494064.21/warc/CC-MAIN-20200329074745-20200329104745-00132.warc.gz
|
en
| 0.948944 | 1,296 | 3.078125 | 3 |
The Man Who Was Almost a Man Essays
3 samples in this category
The primary concern of the writer of this paper is to evaluate the similar theme “Respect by Others” towards the protagonists of the two stories “The Horse Dealer’s Daughter” written by D.H. Laurence and “The Man Who Was Almost a Man” by Richard Wright first and second respectively. The similarities of the both stories in respect to the theme “Respect by Others” are analyzed by using various story devices like plot, setting, character, irony, tone. The essay discusses different aspects...
“The Man Who Was Almost a Man” is a short story that chronicles the misfortunes of a teenage boy named Dave, and, unlike some of Wright’s darker stories, this text is a humorous satire. The texts welcomes its audience to come and laugh at Dave, who can easily be seen as a foolish character both by his actions and the literary elements of the story. Of course, this text is comical, but not without purpose. “The Man Who Was Almost...
The Minister’s Black Veil: Without a doubt, the most important symbol in this story is the Black Veil. To all the people of the town, Hooper’s veil is a sign that he is trying to hide away from a sin that he has committed. Yet Hooper makes it known that he intends the veil to be a symbol of everyone’s general sinfulness. These two could mean the same thing. In other words, the people only focus on the sins of...
|
<urn:uuid:cf2eb716-fa5a-4aa9-8e0b-b25704da5ca2>
|
CC-MAIN-2023-40
|
https://edubirdie.com/examples/the-man-who-was-almost-a-man/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506658.2/warc/CC-MAIN-20230924155422-20230924185422-00785.warc.gz
|
en
| 0.931929 | 362 | 2.6875 | 3 |
The robot mimics the animal by recovering energy while in the air, preparing for its next jump. Since energy conservation is key in robotics, this could affect robotics across the board (even if all robots don't become kangaroos.
The Navy says you shouldn't risk human lives when you can instead order a robot to its fiery doom. We agree entirely.
At the University of Washington, there exists a classroom where both the professors and students are robots.
The ESA is sending a wearable joystick to the International Space Station to help astronauts control robots in microgravity.
SociBot-Mini is a new social robot that can not only wear your best friend’s face, but it can also detect your emotions.
Europe is sending a robot to Mars in 2018 to pick up some rocks and bring them back to us, which is a lot harder than it sounds.
Meet the iRobot Ava 500 telepresence system, which knows its way around your office, even if you don't.
A recent study has found that you're nearly as likely to listen to a robot as you are a human boss.
Sorry, humans. Your days of colorful puzzle cube domination are over.
The HyQ quadruped robot returns with new improvements that allow it to run, squat, jump, and traverse rough terrain.
|
<urn:uuid:0b88acee-85c0-49a2-8fb0-58df173f2291>
|
CC-MAIN-2014-23
|
http://www.dvice.com/tags/robots?page=2
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997893859.88/warc/CC-MAIN-20140722025813-00243-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.949112 | 272 | 2.609375 | 3 |
Breakthrough: Doctors Can Freeze And Thaw People Keeping Them Alive!
A modern medical breakthrough. The idea of freezing and thawing people has been the stuff of Hollywood movies for years.
You may recall, the 1984 movies Iceman in which an anthropologist Stanley Shephard thawed the body of an iceman who supposedly had been frozen for 40,000 years or the 2016 space drama Passenger; in which two people who are awakened ninety years too early from an induced frozen state of hibernation on a spaceship traveling 60 light-years from Earth.
Both were too unreal to be taken seriously. However, doctors have recently been able to save many lives by employing this technique of lowering the body temperature of their patients. It’s called”suspended animation.” The way suspended animation would work is that a person in critical condition, such as a victim of a stab or gunshot wound, can effectively “pause” their bodily functions while doctors repair their injuries.
We interrupt life, but we don’t like to call it disabled animation because it sounds like science fiction. Samuel Tisherman told New Scientist, “We’re trying to buy more time to save lives.”The studies are conducted at the University of Maryland Medical Center on patients with acute trauma. The non-sci-fi name for the suspended animation technology is EPR: Emergency Preservation and Resuscitation. This is how the stopped animation works, The EPR technique works as follows: The patient’s blood is replaced with ice-cold saline. This cools the patient’s body so quickly that the heart stops beating and brain activity stops. That may sound scary – maybe even fatal – but there is actually nothing to fear.
When the body is at a normal temperature, the cells need constant oxygen to stay alive. But the ice-cold salt solution slows down the chemical reactions in the cells so much that they no longer need as much oxygen. The person does not die, but their vital functions are briefly interrupted so that they do not bleed out before the doctors can help them. Acute trauma patients usually have a chance of survival of less than 5%. Technology hopes to raise that percentage much, much higher. The future of suspended animation The human brain can only survive for about five minutes without oxygen. But with EPR, doctors and surgeons have two hours to repair patients’ wounds before their bodies are warmed up and their hearts restarted. Thorough results of the EPR trials should be announced by the end of 2020. In the meantime, there are still questions that need to be answered: How long can a person stay in a paused animation without side effects? What would these side effects be? How quickly could this be implemented in other emergency rooms across the country?
While the truth about EPR is that it is just a technique designed to prolong life, the real question that begs to be answered is where will you spend eternity? Do you know where you will spend eternity? Have you found peace with God, or do you fear death? If you fear death and need the assurance that you will live forever, then ask God to forgive you of your sins, and invite his Son Jesus Christ into your life to be your Lord and Savior. He died a cruel death on the cross for your sins and then God raised him up for your justification. His death gives you the right to live forever. With Jesus, we can know that we will live forever. Ask him to be your savior today.
|
<urn:uuid:cf920826-553d-40aa-ab47-8ae41f43412c>
|
CC-MAIN-2020-05
|
https://truthsetfreetv.com/2019/12/breakthrough-doctors-can-freeze-and-thaw-people-keeping-them-alive/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601040.47/warc/CC-MAIN-20200120224950-20200121013950-00285.warc.gz
|
en
| 0.957315 | 716 | 3.203125 | 3 |
In a recent Open Book Blog entitled Compare and Contrast with the Common Core in Kindergarten, http://networkedblogs.com/TcvVz Jill Eisenberg compares the 8 page level A reader MEAT PIES by Celenia Chevere and Patricia M. Hubert (about a boy who makes Empanadas with his grandmother) with the 8 page level C reader TIME FOR TACOS by Carla Golembe (about a boy who makes tacos with his dad.) Eisenberg describes how to dissect these two stories in order to meet the common core curriculum of comparing and contrasting. Can I make another suggestion?
Story time is an excellent opportunity to compare and contrast text. There are tons of terrific picture books just begging to be used in a ‘compare and contrast’ manner!
Have you shared HOW COLD WAS IT? by Jan Barclay, yet? http://books.google.ca/books/about/How_Cold_Was_It.html?id=jy2XbiWp5cEC&redir_esc=y
Imagine the fun of comparing the scenes with such extreme weather contrast, when you then share her story, HOW HOT WAS IT? http://www.amazon.ca/How-Hot-Was-Jane-Barclay/dp/1894222709
I guarantee you’ll not only cover your common core literacy comparison and contrast, these two picture books will spark conversation, exploration and inquiry into temperature that will cover many math and science strands as well.
I love to compare and contrast different versions of folk and fairy tales. I’ve started with the classic Little Golden Book, LITTLE RED HEN by Diane Mudrow, http://www.amazon.com/The-Little-Red-Golden-Book/dp/0307960307
and then introduced another version of the story
I’ve invited children to look through their fairy tale collections at home and bring in a version if they have one. We’ve charted the differences in the versions told (ie, sometimes the little red hen has chicks, sometimes she doesn’t. Sometimes her friends are a dog, cat and rat, sometimes they are a duck, pig and dog etc.) And with all this talk about bread- we just had to bake bread one day! So not only are you covering your common core comparison and contrasting of the key ideas and details of each story, the structure, and the relationship between illustration and print in each story, you are adding the language, math and science exploration of reading the recipe and baking the bread.
We were going to town, comparing the ingredients of these two items. (and the pizzas we ended up making were delicious!)
Introduce some felt pieces to your felt board, some puppets to your theatre, and suddenly children are telling (and eventually writing) their own creative version of the Little Red Hen.
http://www.amazon.ca/I-Want-My-Hat-Back/dp/0763655988 which has the same visual dead-pan humor but is told through the eyes of the ‘victim’, as apposed to the ‘perpetrator’.
Part of our job, as educators, is to be greats story tellers. We need to guide children through stimulating conversation regarding the stories they hear. (Think of yourself as the leader of your very young book club.) When we invite children to make connections and identify comparisons in a picture book, we provide an opportunity for each child to make a deeper connection with the book. This does so much more than cover curriculum; this plants the seed for a lifelong love of reading.
|
<urn:uuid:02ab3fd1-e0ef-4e7e-89e9-d7bf139773c9>
|
CC-MAIN-2017-26
|
https://lanabutton.wordpress.com/2014/01/28/common-core-meet-inquiry-based-story-time/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320823.40/warc/CC-MAIN-20170626152050-20170626172050-00322.warc.gz
|
en
| 0.940022 | 762 | 3.484375 | 3 |
The thesis statement is a very important part of any argumentative essay. It needs to showcase your argument in a manner that is direct and gives people some sort of explanation of where your paper is going to go. Writing a 3-point Thesis Statement - slideshare.net The Thesis Sentence/ Statement o Every essay should have a thesis statement. o It is a single declarative sentence that states the main idea of an essay. o It answers a question or a writing prompt. 4. Basic Thesis Sentence Examples Writing prompt: o What is your favorite time of year? Thesis statement: o Spring is definitely the best time of year. Thesis Statement Maker | Help with Thesis Statement Writing good thesis statements is easy with the thesis statement maker at the top of this page. All you need is to formulate your main argument and a couple of arguments supporting it. Add one counterargument, click the button and get a couple of good thesis statements in a couple of seconds. Argumentative Essay: The Basics | PrivateWriting Thesis statement. When making a thesis statement for your argumentative essay, you clearly state your position on the topic and a reason for taking that stance. For example, "A diet of insects can provide solutions to issues of starvation, obesity and climate change thus Americans should embrace and learn to rely on insects over beef, chicken ...
Writing a Thesis Statement in 3 Steps | Interactive Example
Argumentative (Outline and Thesis Statement) Topic: Animal Testing Thesis Statement: Although animal testing brings more medical advancement and less human-based experiments, it is an expensive way of researching imprecise outputs and at the same time, it is a practice of animal cruelty. Tips on Writing Your Thesis Statement Guide to Writing Thesis Statements Back to Helpful Handouts o Writing Center Home Page. Your thesis statement is the central argument of your essay. It must be concise and well-written. Your thesis goes in the introductory paragraph. Don't hide it; make it clearly asserted at the beginning of your paper. Your thesis must make an argument. Writing A Thesis Statement For A Cause And Effect Essay: Tips ... Writing a thesis statement for a cause and effect essay can be a difficult task. However, it can be made easier if you follow the right advice and use examples. So, spend some time reading these useful tips and examples for writing a thesis statement for a cause and effect essay, and you'll find the task a breeze.
Creating Argument Outlines - Mesa Community College
Creating a Thesis Statement, Thesis Statement Tips // Purdue ...
What is a good thesis statement for an essay about obesity ...
Instead of implying your thesis or main idea, in an argumentative essay, you'll most likely be required to write out your thesis statement for your audience. A thesis statement is a one- to two-sentence statement that presents the main idea and makes an assertion about your issue. You may have a longer thesis for much longer essays, but one to two sentences is a good general guideline. Thesis Generator for Argumentative Essay - studentshare.org The thesis statement is an essential part of the introductory paragraph of the essay. Usually, it is placed in the middle or at the end of the paragraph. This sentence is meant to summarize the primary idea of the whole essay, help you organize and develop the body of the essay and create a straight line of the narrative. Argumentative Thesis Statements | Writing Skills Lab An argumentative thesis must make a claim about which reasonable people can disagree. Statements of fact or areas of general agreement cannot be argumentative theses because few people disagree about them. Junk food is bad for your health is not a debatable thesis. Most people would agree that junk food is bad for your health.
Writing a Thesis Statement | Ashford Writing Center
Remember that the thesis statement is a kind of "mapping tool" that helps you organize your ideas, and it helps your reader follow your argument. In this body paragraph, after the Assertion, include any evidence-a quotation, statistic, data-that supports this first point. Learn How To Write a Thesis Statement for an Argumentative Essay
essay topics type my essay crime punishment essay cheap persuasive essay writer for hire for college thesis against designer babies essay 100 years of solitude reading guide questions top university essay ghostwriter site gb The Next Millennium of Graphic Design cv essayeur turbine united nations... A comparative essay thesis is a statement of your main argument... A thesis statement sets the tone of an essay, so writing a thesis statement that is clear and focused will make your essay the best it can be. Thesis statement | About academic argument Writing arguments in essay form can be difficult if you don’t sort out your thesis statement (the position you intend to take about the topic) before you begin to write. About academic argument. Most university essay and assignment tasks require you to take a stance and argue for that viewpoint. Thesis Statement Examples for Essays
|
<urn:uuid:0f5f5387-a57e-460b-8b5b-0a1434e38ab4>
|
CC-MAIN-2023-40
|
https://coursezbbv.firebaseapp.com/dagrella29117dawe/argument-essay-thesis-statement-365.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510219.5/warc/CC-MAIN-20230926175325-20230926205325-00003.warc.gz
|
en
| 0.89779 | 1,017 | 2.859375 | 3 |
Credit hours: 4
GEC categories: Natural Science: Physical Sciences
|GEOL 2||R. Wicander and J. Monroe||Brooks/Cole - Cengage Learning||1-133-10874-1|
Course Objectives: This course provides a basic introduction to the principles and methods of Earth Science, and its relevance to daily life and the problems of the contemporary world. It fulfills the learning objectives of the GEC Natural Science requirement and provides a laboratory experience for students.
Learning Objective 1: Students explain and recall the basic facts, principles, theories and methods of modern earth science, including: the formation and structure of the earth; principles of plate tectonics; composition of and interrelationship among earth materials; geologic time; hazards such as earthquakes, tsunamis, volcanic eruptions, and floods; the hydrologic cycle; controls on global climate; and human sustainability.
Learning Objective 2: Students describe and explain the significance of key events in the history of earth science, especially the development of plate tectonic theory. Students should also learn key events in the geological, hydrological, atmospheric and biological history of the earth.
Learning Objective 3: Students will be able to discuss the inter-dependence of scientific and technological developments in measuring and modeling physical and chemical aspects of the earth and environment.
Learning Objective 4: Students will explain the ways in which aspects of earth science impact society. Students should be able to describe the relationship between science and societal decision-making pertaining to natural hazards, natural resources, global climate and human sustainability.
Course Content: “Planet Earth: How it Works” is an introductory course describing the fundamental concepts of Geology for Science and non-Science majors. It contains 24 lessons grouped in 7 modules. Module I (Origin and Evolution of Earth) discusses the formation of the universe, the solar system, and our planet’s internal structure. Module II (Plate Tectonics and the Dynamic Earth) introduces the theory of plate tectonics, a unifying idea that explains the Earth’s processes. Module III (Earth Materials: Minerals and Rocks) discusses the materials from which Earth is made, as well as their structure and classification. Module IV (Tectonic Activity of a Dynamic Planet) will discuss how Earth’s internal and external processes interact to produce volcanoes, earthquakes and mountain chains. Module V (Geologic Time and the Age of Earth) deals with the geologic time and how geologists calculate the age of rocks and other Earth materials. It also discusses the evolution of life on the planet from a geological perspective. Module VI (Earth’s Resources) describes the energy and mineral resources that the Earth provides us. Finally, Module VII (Landscape Geomorphology) discusses how water (and the lack thereof) shapes the face of our planet and help creates a multitude of landforms, from fertile river floodplains to inhospitable deserts of sand and ice.
Method of Presentation: PowerPoint lectures, lab exercises, reading and video quizzes online on Carmen.
Method of Evaluation: The following are the course assignments and their contribution to your final grade:
1. Weekly lab reports (theoretical and practical exercises) = 20% of final grade 2. Weekly reading quizzes = 15% of the final grade 3. Weekly video quizzes = 15% of the final grade 4. Mid-term exam = 20% of final grade 5. Final exam = 30% of final grade
|
<urn:uuid:4baa07ea-728a-4e8a-86aa-32efca56cf32>
|
CC-MAIN-2013-20
|
http://mansfield.osu.edu/HTML/courses/view.cfm?id=104&term=s
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699856050/warc/CC-MAIN-20130516102416-00090-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.855765 | 720 | 3.609375 | 4 |
I think the post in regard to “Working Biomimcry” and the act of creating a structure such as this is fascinating. Not only am I extremely interested in this concept of a “Treepod” for the sake of our future, but also the concept of biomimicry as a whole. Mark Schwackhamer’s presentation sparked my interest and I have found myself on http://www.asknature.org a few times this week already. The proposal for the Treepod is a rare idea that incorporates the structure of a tree while maintaining a healthy awareness of the environment.
On the Ask Nature website, I found a plethora of studies involving different habits that have been transcribed into studies of all sorts. The ones that intrigued me the most were those relating back to architecture insulation. One study in particular was that of goose feather structure. This relates back to the Treepod in the aspect of structure of nature being recreated by man to benefit society. The title of the study reads “Feather Structure Insulates: Canada Goose.” As if I wasn’t already aware of how cold it gets in Minnesota, this reminded me that there are countries further north of the equator than us who need insulation just as much, if not more, as we do. The study showed that these feathers insulate through “special architecture” (asknature).
The structure is set up as follows: feather keratin occurs in a ‘b-sheet’ configuration which differs from the a-helices that occur in mammal keratins (asknature). These properties, the study found, are similar to the man-made polymers used in artificial insulation fibers. The results of this study is that the “architecture of down feathers is probably more important than material properties in determining their advantages over synthetic materials” (asknature).
A few years ago, they began exploring the toughness of feather keratin as a whole by using instrumented clippers and scissors. Last week I wrote my blog post on polypropylene plastic and how it is used as a form of insulation. To further this post, I am curious about the ability of that polymer to be constructed in a ‘b-sheet’ to provide optimal insulation for a building.
|
<urn:uuid:e1573792-2b8c-492a-ab7a-d4551e7f11ac>
|
CC-MAIN-2017-26
|
https://arch3150.wordpress.com/2012/11/16/re-working-biomimicry-2/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320489.26/warc/CC-MAIN-20170625101427-20170625121427-00163.warc.gz
|
en
| 0.960478 | 474 | 2.59375 | 3 |
The Price of Survival What Would It Cost to Save Nature?
Part 2: "A Sixth Global Mass Exctinction Has Begun"
To make matters worse, the rate of decline is formidable. A current UNEP estimate concludes that species are becoming extinct 100 times faster today than would normally occur as a result of evolution.
"A sixth global mass extinction has begun," says UNEP Executive Director Steiner. The diversity of species has already been severely compromised five times in the past in the wake of meteorite collisions, volcanic eruptions and rising sea levels. But today it is the more than 6.6 billion people that are destroying nature at an unprecedented pace. They hunt and fish at uncontrolled rates. They transform more and more land into farmland to fill their bellies. They chop down the last virgin forests to produce biofuel for their automobiles. They pollute the water, the soil and the air with toxic substances. And they drag species from one part of the earth to another -- with sometimes devastating consequences.
Ascribing a Monetary Value to Nature
Man's footprint on the globe is growing inexorably. And Homo sapiens, the supposedly perceptive human race, have failed miserably to secure the Earth's biological diversity. But now a revolution is taking shape in the way we think, as environmentalists and economists discover the marketplace of nature. They are putting their heads together to translate the achievements of mangroves and nightshade, whales, moors and rainforests into monetary value. Under this new mindset, destroying nature will no longer be profitable while protecting it will. Pavan Sukhdev, the director of the joint German-EU study on biodiversity, considers this the obvious solution. It is now or never, says Sukhdev, that "the economic weapon must shoot in the right direction."
On a recent spring morning, the 48-year-old Indian pointed to the concrete wasteland of Berlin's Alexanderplatz square. "That's how desolate the entire earth will be if we don't succeed," says Sukhdev, who also heads the global markets division at Deutsche Bank's Indian office in Mumbai. Ten years ago, he says, a friend asked him the following question: "You're a banker. So tell me, why are some things worth something while others are not?" While searching for an answer to her question, he hit upon the idea of calculating prices for forests, wetlands and the courses of rivers.
Sukhdev's calculations, ridiculed at first, have since become the driving force behind the conservation revolution. Economists now perform detailed calculations to reflect what diversity does for people. Bees, for instance, are worth $2 to $8 billion (1.3 to 5.2 billion) a year, because they pollinate important crop plants worldwide. Reeds growing along riverbanks are also considered valuable. Along the central part of Germany's Elbe River, for example, they are responsible for 7.7 million ($11.9 million) in annual savings, because they filter the water, thereby eliminating the need to build additional sewage treatment plants.
On the coast of Pakistan's Beluchistan Province, one hectare (2.47 acres) of intact mangrove forest produces the equivalent of about $2,200 (1,420) in annual income. The ecosystem is a breeding ground for economically attractive fish species, as well as acting as a protective wall against flooding. Salt marshes in Scotland are worth about 1,000 ($1,555) per hectare to the region's mussel industry.
Tourists visiting Germany's Müritz National Park to marvel at sea eagles, ospreys, cranes and red deer contribute 13 million ($20 million) in annual revenue. In Britain, a team of researchers working with conservation biologist Andrew Balmford has calculated that a global network of protected areas could produce about $5 billion (3.2 billion) in annual revenue. The group's calculations reflected the reserves' economic benefits for tourism, climate protection, nutrient cycles and the water supply.
If the destruction of natural habitats continues unabated, even the key to the earth's future energy supply could go undiscovered. US geneticist Craig Venter has collected thousands of samples of microorganisms living in seawater during voyages on his yacht, the Sorcerer II. Venter hopes that the samples will contain genetic sequences that could be used to produce fuels for cars and airplanes in the future.
In 1997, American ecological economist Robert Costanza estimated the annual value of the services nature provides for mankind at $33 trillion, a figure that was 1.8 times the world GNP at the time.
A Shift in Thinking
Despite their enormity, these numbers have been of little use to species and ecosystems in the past, because few have been willing to pay money for nature's assets. Indeed, the world's powerful corporations continue to treat animals, plants, forests, rivers and wetlands as a free resource. But at least some industries seem to be approaching an important watershed moment.
For instance, companies already earn $43 billion (28 billion) in annual revenues with plant-based natural remedies. The active agents in 10 of the world's 25 most successful drugs were originally derived from fungi, bacteria, plants and animals living in the wild. The precursors of aspirin came from willow bark and meadowsweet. The purple foxglove plant is the source of the agent in the heart drug digitoxin.
Companies spend billions searching for the next mega-drugs derived from nature's diverse sources. But does nature get anything out of the bargain? Initial models show that it can. In Costa Rica, for example, there is already a tradition to the search for miracle drugs from the jungle. The Instituto Nacional de Biodiversidad (INBio) was founded in the capital San José in 1989. In the 1990s the pharmaceutical company Merck invested $4 million (2.6 million) in the research institute, which has since acquired a global reputation. Merck executives pledged to donate 10 percent of the profits of potential discoveries to the country, with part of the proceeds to be earmarked for conservation.
Do Costa Rica's butterflies, forest plants and slime molds hold the key to new drugs to fight malaria and cancer, or can they at least provide the ingredients for new skin creams and anti-dandruff shampoos? World-renowned researchers at INBio continue to seek answers to these questions, constantly hunting for useful natural substances.
On a recent morning, for example, fungus specialist Jorge Blanco was carefully scrutinizing the leaves of Monimiaceae siparuna, a plant that resembles the laurel family. Using a scalpel, he cut apart the precious green leaves and placed the pieces into dishes of culture medium. Soon fungi that previously thrived only inside the leaves would sprout. To get the plant Diego Vargas, a biologist working at INBio, spent two hours on the previous day in an SUV, driving the winding roads in the Parque Nacional Braulio Carrillo along the slopes of the Barva volcano.
Vargas, wearing a baseball cap, a white T-shirt and blue rubber gloves, photographs plants in the virgin forest, then uses garden shears to snip off the seed heads of various plants and carefully places them in bags. Peering into the undergrowth, he finds Monimiaceae siparuna, a plant with tiny yellowish blossoms. He twirls his garden shears like a cowboy wielding his Colt, then deftly cuts off the seed heads: a small snip for Vargas, but could it be a giant snip for mankind?
"Many of the fungi that live in the leaves of this plant have never been studied, because they are so hard to isolate," says Vargas. "They may very well produce many interesting substances with which we aren't even familiar yet."
Since INBio was established in the late 1980s, its scientists have examined thousands of insects in their quest for useful natural substances. Nowadays, the high-tech equipment at the institute's special laboratory in Heredia, a San José suburb, is used mainly to analyze plant extracts, microbes and fungi.
The great bio-boom has not materialized yet, prompting Merck and a few other major investors to withdraw their funding. "The pharmaceutical companies no longer want to pay for the long process that is needed to find promising substances in nature," says Giselle Tamayo, technical coordinator of INBios biodiversity prospecting division.
- Part 1: What Would It Cost to Save Nature?
- Part 2: "A Sixth Global Mass Exctinction Has Begun"
- Part 3: Sharing the Blessings, While Protecting Biodiversity
- Part 4: Connecting Countries that are Biodiversity Rich with those with Deep Pockets
- Part 5: The Pricetag of Curtainling Exctinction: 30 billion
|
<urn:uuid:eaa578a3-943f-4d78-8270-7285ce7541da>
|
CC-MAIN-2017-43
|
http://www.spiegel.de/international/world/the-price-of-survival-what-would-it-cost-to-save-nature-a-554982-2.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187828134.97/warc/CC-MAIN-20171024033919-20171024053919-00324.warc.gz
|
en
| 0.940937 | 1,833 | 2.6875 | 3 |
Any natural occurrence that results in significant property damage or fatalities is a natural disaster. There are various types of natural disasters such as they can Geophysical (Earthquakes, Volcanoes), Biological (Infectious Diseases), Meteorological (Tornadoes), Hydrological (Flood, Hailstorm), and Climatological (Heat Wave, Cold Wave, Drought, Forest Fire), which interrupt supply chains, devastate infrastructure and also cause loss of lives.
If we talk about natural disasters in recent times, we find that Pakistan faced a flood catastrophe recently, it was a natural hydrological catastrophe that caused havoc in the country, and 33 million people got affected by it, out of which 8 million are facing a severe health crisis. Nearly 1740 lost their lives. The most substantial losses were in the housing, agriculture, livestock, transportation, and communications sectors, at USD 5.6 billion, USD 3.7 billion, and USD 3.3 billion, respectively. Balochistan, Khyber Pakhtunkhwa, and Punjab are the following worst-affected provinces, accounting for close to 70% of all damages and losses. Sindh is the worst-affected province overall.
It is anticipated that the floods would have a direct negative impact on GDP loss of about 2.2 percent of FY22 GDP. At 0.9 percent of GDP, the agriculture sector is predicted to experience the greatest decline. The industrial, foreign commerce, and services sectors would all be impacted by the harm and losses in agriculture. The PDNA (Post-Disaster-Needs-Assessment) lays the foundation for a plan for rehabilitation and reconstruction that aims to give Pakistan’s most vulnerable citizens a better future. The study projects that total economic losses would be close to USD 15.2 billion and that total damages would exceed USD 14.9 billion. At least USD 16.3 billion is estimated to be required for restoration and reconstruction in a resilient manner in this regard. The government is working to guarantee macroeconomic stability and fiscal sustainability while providing immediate help to the affected communities and fostering an early recovery.
Like the flood, there was another disaster, a global pandemic (Covid-19) it was a biological disaster that damaged property, and the economy and has also taken 6.71 million lives till 11 January around the globe respectively. The numbers of losses in sectors differ from the flood but the damage is to great extent. The impacts are the same such as loss of infrastructure and capital assets. Losses in life, the exodus of skilled laborers, and the disruption of education caused by the destruction of educational infrastructure all reduce human capital.
To mitigate the economic effects of natural catastrophes, investing in risk reduction and disaster preparedness initiatives is essential. This can be achieved by building infrastructure that is more resilient to natural disasters, such as flood-prevention sea walls or earthquake-resistant structures. Governments and groups from the business sector can also spend money on early warning and emergency response systems to decrease the effects of natural catastrophes
Because after a natural disaster, it is essential to provide financial and logistical support to help businesses and communities recover. This may entail repairing damaged infrastructure, assisting with the company and home relocation, and providing temporary housing, food, and medical attention to those impacted. Governments may also implement initiatives like tax incentives or grants to help businesses and communities recover.
To reduce the economic effects of natural disasters, it is essential to engage in prevention and preparedness measures as well as provide aid to those affected after a disaster so that any country thus faces less economic consequences and the economy of the country stand firm.
Mirza Muhammad Abubakar Naeem is a university student.
|
<urn:uuid:92d138bc-b9c4-42fc-b76b-537a47d0bb77>
|
CC-MAIN-2023-40
|
https://thewallet.com.pk/impact-of-natural-disasters-on-the-economy-9164
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510284.49/warc/CC-MAIN-20230927071345-20230927101345-00106.warc.gz
|
en
| 0.947006 | 754 | 3.59375 | 4 |
This long-awaited volume, written specifically for petroleum workers, explores the fundamental concepts of rock mechanics along with various petroleum-related applications. Emphasis is placed on the weak sedimentary rocks which normally fall between traditional rock mechanics and soil mechanics. Elasticity, failure mechanics, acoustic wave propagation, and geological aspects of rock materials are all detailed. Application areas discussed include: stability during drilling, sand production, fracturing and reservoir compaction. Methods for acquisition of data from field and laboratory analyses are also described.
Engineers and geologists in the petroleum industry will find this book a powerful resource in providing a basis of rock mechanical knowledge - a knowledge which can greatly assist in the understanding of field behaviour, design of test programmes and the design of field operations.
- No. of pages:
- © Elsevier Science 1992
- 3rd January 1992
- Elsevier Science
- eBook ISBN:
@qu:...a welcome and valuable contribution to applied Rock Mechanics and Petroleum Technology literature. @source:International Journal of Rock Mechanics @qu:Written in lucid language and practically exhaustive in the scope of phenomena and practical problems, this book is a concise combination of a textbook and a handbook of petroleum related rock mechanics for geologists and engineers. @source:Journal of Petroleum Science and Engineering @qu:Engineers and geologists in the petroleum industry will find this book a powerful resource in providing a basis of rock mechanical knowledge - knowledge which can greatly assist in the understanding of field behaviour, design of test programmes and the design of field operations. @source:Rock Mechanics and Rock Engineering
IKU, Trondheim, Norway
Rogaland University Centre, Stavanger, Norway
Norwegian University of Science & Technology and SINTEF Petroleum Research, Trondheim, Norway
|
<urn:uuid:b2131fa5-04c5-4e13-8eca-3b35ab4384b6>
|
CC-MAIN-2017-43
|
https://www.elsevier.com/books/petroleum-related-rock-mechanics/fjr/978-0-444-88913-3
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187821189.10/warc/CC-MAIN-20171017125144-20171017145144-00166.warc.gz
|
en
| 0.888031 | 358 | 2.5625 | 3 |
Ray rode four miles less than Carole. Pre-algebra and algebra lessons, from negative numbers through pre-calculus. An algebraic expression may contain numbers, operations, and one. MATH WORKSHEETS FOR SIXTH 7 th GRADE - PDF. Multiplying and Dividing Rational Expressions A bag contains 5 more red marbles than blue marbles. Write mathematical expressions 1. Example - 5x, 2/9, and 3 are Monomials. Data Management Unit. Then write each phrase as an algebraic expression. Solutions and detailed explanations are also included. −x 2 − 4y · 16 y 2 − 3x − 4xy 3 24. 6 times the difference of z and 19 6(z 19) 6. com and study graphing linear inequalities, variables and various other math subjects. Lesson 6: Linear Equations: Real World Applications In this lesson, we investigate real world problems that can be modeled by and solved using algebraic equations. Intermediate Algebra Problems With Answers - Sample 11 - Simplify Algebraic Expressions by Removing Brackets. It’s a really long one having almost 30 questions and it covers topics such as holt algebra 1 lesson 5-7 practice point-slope form, holt algebra 1 lesson 5-7 practice point-slope form and holt algebra 1 lesson 5-7 practice point-slope form. 7 gal/h = c/min 1. six more than a. Variables and Expressions. 4 Practice B 1. Arrange the terms so that equations are the same form 1. Write yes or. a fter reading through the lesson, try writing the expressions without looking at the answers. Students then write what each variable represents and complete two test prep questions using expressions. 3 Graphing General Rational Functions 9. Attend to Precision Students should use precision in translating between contexts and abstract. 7 Algebraic. Learn algebra with free interactive flashcards. Expressions Do pages 4 through 6. Lesson 11 Variables and Expressions with answers. This video is unavailable. Then write each phrase as an algebraic expression. The different elements of an algebraic expression are given special names to make it easier to refer to each part. They contain equations to be solved, expressions to factorise and simplify, some quick questions as well as practise for basic skills and other important algebra concepts. Chapter 3 A1 Glencoe Algebra 2 Answers 4 x y y 2 2 Write each equation in slope-intercept form. Assist your child with algebra and review the order of operations: division and multiplication before addition and subtraction, always going left to right. Write mathematical expressions 1. Once you write the variable, evaluate the. Welcome to MathHomeworkAnswers. Write an expression and find the total shaded area in each square. 4 16 9 x 3 1 6 d 6 3 7 0 a 1 4 9 x 7 1 2 y 2 11 1 n 5 2 5 x 1 1 8 5 w 2 7 x 84. So 9 + x is an algebraic expression. Write only one answer for each question. Twenty subtracted from 15 23 b 3. 8 + 6t - 3t + t 3. Let that sink in. three more pancakes than his brother ate 4. 9 Unit A Homework Helper Answer Key. Then evaluate the expression. Watch Queue. Special attention is given to writing operations in the correct order. Part Part 2 Whole 10 3. The product of 5 r and 7 divided by 15 4. Show your work. Legault, Minnesota Literacy Council, 2014 8 Mathematical Reasoning Writing Expressions from a Menu Use the menu from this restaurant to write an algebraic expression for each question. The answers to these worksheets are available at the end of each Chapter Resource Masters booklet. Lesson 11 Variables and Expressions with answers. Write an expression for the number of students in 3 equal groups. The area of the right-angled triangle is equal to the area of the rectangle. Write the expression using only numbers and a symbol for. 3 answers, otto bretscher linear algebra solutions, ratio simplify calculator, ks2 algebra. Lesson 4 Homework Practice Linear Functions. For example, the area of a rectangle is length times width. Expressions Do pages 1, 2 and 3. However, we also know that raising any number (positive or negative) to an even power will be positive. If you like this Page, please click that +1 button, too. of t 2 Simplify. These Algebraic Expressions Worksheets will create algebraic statements for the student to simplify. , when the two expressions name the same number regardless of which value is substituted into them). Write and simplify an expression for the perimeter of the figure to the right. In this interactive math lesson, students will accomplish the following tasks: * Choose the phrase that matches the algebraic expression. 300A Students analyze patterns and relationships. 1: Writing Equations. Common Core Algebra II is eMathInstruction's third offering. They determine whether number sentences containing parentheses are true or false, and they insert parentheses to make true number. Combining like terms is one way to simplify an expression. the Of a t and 7. Concept Cheat Sheet Adding Integers 1 Subtracting Integers 2 Multiplying Integers 3 Dividing Integers 4 Absolute Value 5 Combining Like Terms 6 Distributive Property I 7 Adding Expressions 8 Subtracting Expressions 9 Writing Expressions 10. Arrange the terms so that equations are the same form 1. nine times w 19. Homework Practice Workbook -07-660291-5 978--07-660291-9 Spanish Version Homework Practice Workbook -07-660294-X 978--07-660294- Answers For Workbooks The answers for Chapter 1 of these workbooks can be found in the back of this Chapter Resource Masters booklet. Remember, in teaching Boolean algebra, you are supposed to be preparing students to perform manipulations of electronic circuits, not just equations. Improve your math knowledge with free questions in "Write variable expressions" and thousands of other math skills. How many cubes? 5. Write an algebraic expression that represents each word expression. ie: 2x, 3y-7, 5 x y + 1. Once you write the variable, evaluate the. Common Core Algebra I Answer Keys quantity. Come to Algebra-equation. Concept Cheat Sheet Adding Integers 1 Subtracting Integers 2 Multiplying Integers 3 Dividing Integers 4 Absolute Value 5 Combining Like Terms 6 Distributive Property I 7 Adding Expressions 8 Subtracting Expressions 9 Writing Expressions 10. Course 1 • Chapter 6 Expressions 93 Lesson 4 Homework Practice Algebra: Write Expressions Define a variable. 1 Write variable expressions D7K. 4 Name _____ Write each logarithmic expression as a single logarithm. 9 minutes less than Frances' time 6. eHelp c Practice Use pennies to subtract. * Choose the algebraic expression that represents the situation in a word problem. Percent -- parts of 100%. Now is the time to redefine your true self using Slader's free Algebra 1 (Volume 1) answers. Highlight your final answers and show your work. 208 Unit 3 Multiplication and Division; Number Sentences and Algebra Teaching the Lesson materials Key Activities Students review the use of parentheses in number sentences that involve more than one operation. Issuu company logo Lesson 5 Homework Practice Algebra Properties Answer. terminating math definition. In addition to writing and solving linear equations, we will also work with problems involving proportions and percents. Write the number. Since John is 5 years older than Leah, we may also write the equation, j = l + 5. To support English language learners, explain that even though one expression is in simpler form, the expressions are equivalent. Removing parentheses is another way. 6 Writing Algebraic Expressions Translate each verbal description into an algebraic expression. 81 write; b 3 homework: fluently rewrite algebraic proof exam practice, and the question evaluating expressions containing variables. Twelve less than seven times a number is 16. Felicia evaluated the algebraic expression 5x for x 5 and gave an answer of 10. dear Aunt Sally). Primary SOL. 4t 3 s 2 s 3 for t 2 and s 3 4. In this lesson, we'll practice simplifying a variety of algebraic expressions. N(0, 1); KP 5 4 and KN 5 6 therefore KP 5 2} 3 KN. This video is unavailable. Written practice. twice the number of exercises e = the number of exercises; 2e. 1 4p ˚ 1 ˜ 1 3p b. Get the exact online tutoring and homework help you need. 3 5__ 8 2 6. Your mathematician will practice combining like terms and use the order of operations to complete some algebraic expressions. For Exercise 60, think about what the numerator and the denominator each represent in the fraction. These pre algebra worksheets have the answers on the 2nd page of the PDF. Lesson 4 Homework Practice Linear Functions. If x is 2, then the expression 9 + x has a value of 11. If you need assistance on negative exponents or perhaps introductory algebra, Polymathlove. simplify any algebraic expression. − 4+6 Differentsigns, subtract6 − 4. The variable will represent the number in an expression or an equation. An algebraic proof uses algebraic properties, including the Distributive Property and the properties of equality. Primary SOL. 6 Solving Rational Equations. Lesson 5 Absolute Value Equations and Inequalities. The following table will help us to learn some of the words (phrases) that can be used to indicate mathematical operations: Algebraic expression word problems examples with answers. In addition to writing and solving linear equations, we will also work with problems involving proportions and percents. (3 8) 2 (4) 3 97 4. Write each answer in simplest form. Printable in convenient PDF format. The core idea in algebra is using letters to represent relationships between numbers without specifying what those numbers are! Learn for free about math, art, computer programming, economics, physics, chemistry, biology, medicine, finance, history, and more. In the main program, all problems are. Pdf Pass Homework Practice and Problem-Solving Practice Workbook 000i_0iv_CAG5FM_111966. The taxi charges an initial fee of $4 and then $2 per mile. A quiz and full answer keys are also provided. Chapter 6 Lesson 4 - Algebra: Write Expressions. Twenty subtracted from 15 23 b 3. Common Core Algebra I Answer Keys quantity. Lesson 6: The Distributive Property/Lesson 6 Answer Key. 318 #1-11 Tuesday 12/5 5. three times as many DVDs d = the number of DVDs; 3d. Welcome to the Algebra 1 Polynomials Unit! This unit is a brief introduction to the world of Polynomials. Standardized Test Practice The carrying capacity of an environment is the number of individuals the natural ecosystem of an area is able to support. Go back and write down questions and. Thanks! I'll try my best to reply within a day. The different elements of an algebraic expression are given special names to make it easier to refer to each part. The algebra section allows you to expand, factor or simplify virtually any expression you choose. Algebra 2 M. Being able to write expressions or equations algebraically is a pre algebra concept that is required prior to taking algebra. 1} 64 Simplify the expression. 2 r · 3 r− − 6 r 2 Evaluate each expression if a= - 5−, 6 b = -3 3−, and 8 c = −7. Define a variable and write each phrase as an algebraic expression. three more pancakes than his brother ate 4. five times the number of books in the library 3. Multiply 1st equation by 2 2. pre algebra course outline. Lesson 5 Homework Practice. 475 KB (Last Modified on July 8, 2016) Comments (-1). To send feedback: Please click the button at the bottom-right of the page (you should see a question-mark '?' bubble). Also, Check out this lesson on Evaluation. The variable will represent the number in an expression or an equation. If you are stuck, try. Evaluate throughout the lesson. six more than a. Write your. *Plot Points and Count Slope *Slope Formula Tis the Season Wkst. Lesson 5 Homework Practice Simplify Algebraic Expressions Identify the terms, like terms, coefficients, and constants in each expression. It is far too easy for students to lose sight of this fact, learning all the abstract rules and laws of Boolean algebra. For every week that she walks the dog, she earns $10. Example 2: Write each phrase as an algebraic expression. Algebraic Expressions Lesson 1: Integers then the answer is _____. If you like this Site about Solving Math Problems, please let Google know by clicking the +1 button. Welcome to the Algebra worksheets page at Math-Drills. algebra 2 honors help. rhyming words worksheet. Answer Key Lesson 5. three times as many DVDs i^d=44a number^ iv^-s 4. Students learn through discovery and application, developing the skills they need to break down complex challenges and demonstrate their knowledge in new situations. Practice translating verbal expressions into algebraic expressions. Answers may vary slightly. Multiply 1st equation by 2 2. Match each statement on the left with the correct answer by typing the letter of the answer in the box. 4 16 9 x 3 1 6 d 6 3 7 0 a 1 4 9 x 7 1 2 y 2 11 1 n 5 2 5 x 1 1 8 5 w 2 7 x 84. 3 answers, otto bretscher linear algebra solutions, ratio simplify calculator, ks2 algebra. 1} 64 Simplify the expression. Use x for the unknown. Grade 9 ratio algebra questions with answers are presented. Then write an algebraic expression to represent the situation. ½ (x + y) 18. If the expression cannot be. 4 1-1 Practice (continued) Form G Variables and Expressions 20. In this interactive math lesson, students will accomplish the following tasks: * Choose the phrase that matches the algebraic expression. What is the total cost for both customers? 14. a number squared. 3 Writing Algebraic Expressions Homework Name _____ Period _____ Work through each of the problems below to practice the concepts from today's lesson and review concepts from previous lessons. Which expression shows how much Cassie has A 12 —b C 12b 10. Read the topic text (#4 in the list). Answer Keys View Answer Keys- All the answer keys in one file. Answers may vary slightly. Use the Distributive Property to write each expression as an. (Example 2) At 6 p. Write the subtraction problems. For every week that she walks the dog, she earns $10. Smith charged Jill $32 for parts and $15 per hour for labor to repair her bicycle. Ask learners to watch a particular video lesson for homework (in the school library or on the website, depending on how the material is available) as preparation for the next days lesson; if desired, learners can be given specific questions to answer in preparation for the next day’s lesson The Basics of Algebraic Expressions 1. 6 7 = 7 6 Commutative Property of Multiplication 3. It is sometimes called an algebraic expression. 4 algebraic expression, p. If you need assistance on negative exponents or perhaps introductory algebra, Polymathlove. Lesson 7 Write Equations Practice Algebra Write an equation to represent each sentence. Write this expression in. 18 m/min = cm/s 30 2. The answers to these. These Algebraic Expressions Worksheets will create algebraic statements for the student to simplify. 27cd, 72cde 9cd 12. Lesson Resources: 9. 3 The fundamental counting principle. Algebra: Variables and Expressions: Practice Variables and expressions worksheet are explored by using algebra tiles to model each algebraic expression. Lesson 8 Homework Practice Factor Linear Expressions If the expression cannot be factored, write cannot be factored. I like to call the two of them the "Math Avengers". More complicated equations can usually be solved the same way, by splitting the absolute value into two cases. Welcome to Introductory Algebra help from MathHelp. Students will practice writing algebraic expressions. - [Voiceover] Let's do some examples of the writing expressions with variables exercise. terminating math definition. PD Designed to Change Practice. Eleven spoons minus s equals 9 spoons. HW: Slope WS 11/1. Watch Queue. Online tutoring available for math help. a mathematical phrase that includes a. ac-− 7 12 27. Evaluate each expression. Lesson 5 Absolute Value Equations and Inequalities. 4) Write an equation in slope-intercept form for. We finish of by critiquing Suzanne's math skills. Evaluate 18 ÷ y for y = 2. 3 Writing Algebraic Expressions 299 Complete each statement below with an algebraic expression, using the suggested variable. Lesson Resources: 9. Algebra Readiness :: Unit 1 Lesson 4: Writing Expressions Tutorial | Sophia Learning. sample math word problems. Use x for the unknown. (3 8) 2 (4) 3 97 4. lesson 5 homework practice algebra properties answer. This free printable algebra worksheet simplifies the subject and makes it easier to understand. Listed in the order in which they are typically studied. the order of the factors to write another multiplication sentence, 6x3= 18. Lesson 4 Homework Practice Linear Functions. Go back and write down questions and. Then write each phrase as an algebraic expression. 2 __ 3 Simplify each expression. Hotmath explains math textbook homework problems with step-by-step math answers for algebra, geometry, and calculus. Removing parentheses is another way. Answers may vary slightly. multiplication of radicals worksheet. rational expressions. These 4 pages are the last with their main emphais on algebra. Properties of Equality Symbols Examples Addition If a b, then a c b c. Lesson 4: Algebra: Write Expressions/Lesson 4 Answer Key. ac-− 7 12 27. Polynomials. one hundred less than g Lesson 7. 120% of the sum of w and one-twelfth u 5. 17 Lesson Plan. Writing Algebraic Expressions. the product of 8 and z plus the product of 6. References to complexity and mode refer to the overall difficulty of the problems as they appear in the main program. Multiplying and Dividing Rational Expressions A bag contains 5 more red marbles than blue marbles. nine less than a number 2. Homework Practice and Problem-Solving 798,054 = 700,000 = + 8,000 + + 4 Write the value of each underlined digit. 3k 7k 5k 8. 3 Practice B 7. Lesson 7: Equivalent Expressions/Lesson 7 Answer Key. 4 more than 2 times a number 11. How many dots? 4. An algebraic expression is a mathematical expression that will have variables, numbers and operations. Model with Mathematics. then check your work with what is shown in the book. three more pancakes than his brother ate 4. If you have time you should plug your answers back into the original equation to check for. Both of them would be 11 more than a. Let z represent the number of students in a class. Measuring Innovation This Project is about researching and preparing a four-part presentation in order to succinctly describe and evaluate four contemporary managerial accounting theories or models that are commonly applied in business settings. 10k 3k 5h 6. Listed in the order in which they are typically studied. If x is 6, then the expression has a value of 15. Simplifying Algebraic Expressions - Practice Problems. Some of the worksheets displayed are Variable and verbal expressions, Work 1 write the expression or equation algebraically, Writing basic algebraic expressions, Translating verbal phrases to algebraic expressions, Algebra simplifying algebraic expressions expanding, Numbers and expressions. NAME _____ DATE _____ PERIOD _____ Lesson 4 Homework Practice Converting Rates Convert each rate using dimensional analysis. Hotmath explains math textbook homework problems with step-by-step math answers for algebra, geometry, and calculus. The range is all the y values. Welcome to Introductory Algebra help from MathHelp. So it says "Write an expression to represent 11 more than a. ) but is not meant to be shared. 64 ounces in 8 cups 5. Writing Practice The writing portion of the Practice Book includes one page of practice for every writing lesson. These pre algebra worksheets have the answers on the 2nd page of the PDF. Write your answer in. A television production company charges a basic fee of $4000 and then a. What will be your constant? your variable? 55 will be the constant, and the number of hours will be the variable. 236 and 237 in Math in Focus. log 7 + log 2 2. This homework is due on Friday, January 16. 216w 1 7w 2 5w Simplify each expression. 5t 2 12t 1 17t 4. People, I need some help with my math homework. Duplication and/or distribution of this material is prohibited without written consent from Common Core, Inc. thirty-four more than a number, h 16. rhyming words worksheet. Solutions to homework for linear algebra, Variables and patterns introducing algedbra 2. You may work problems in your test booklet or on scratch paper, but you must mark your answer on your answer sheet. Honors Algebra 2 Worksheets Do homework on separate paper Homework: odds, 13-15 all Practice Relations and (4. Write an expression and find the total shaded area in each square. Write Algebraic Expressions. 3 The fundamental counting principle. Let that sink in. Joshua will receive 4 points for each question he answers correctly, and x represents the number of questions. Answers Chapter 2 A3 Glencoe Algebra 1 Answers (Lesson 2-1). Answer Keys View Answer Keys- All the answer keys in one file. If there is a Brain Pop Video, Khan Academy video or any other type of resource for that skill, I will link it under each lesson title as well. On your mini-whiteboards, show me an algebraic expression that means: Multiply n by 4 and then add 3 to your answer. Translating from verbal to algebraic and algebraic to verbal expressions Answer questions in a quest for fame and fortune. 5wp 2w _____ for 3wp. Read the sentences and determine how to write the algebraic expression or equations. Ch 3 Algebraic Expressions and Properties You can view your book online and also watch tutorial videos for each example to view how to do the homework problems. Algebra-answer. half of p 3. rhyming words worksheet. Choose from 500 different sets of algebra flashcards on Quizlet. Homework Practice Workbook, Algebra 1. -5x + 4 - x-1 4. SUNDAES Carmine bought 5 ice cream sundaes for his friends.
|
<urn:uuid:6e89bc3b-36c6-4a41-981c-7a461a91cb17>
|
CC-MAIN-2020-16
|
http://ighi.aavt.pw/lesson-4-homework-practice-algebra-write-expressions-answers.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370508367.57/warc/CC-MAIN-20200402204908-20200402234908-00438.warc.gz
|
en
| 0.877145 | 4,881 | 3.984375 | 4 |
Part 1: Introduction of SSD
Types of SSD:
The storage media of SSD could be divided into 2 different types: one uses Flash memory as storage media while the other uses DRAM as storage media.
a. Flash Memory: SSD like IDEFLASHS DISK, Serial ATA Flash Disk are uses Flash memory chip to be the storage media. It can be in different shapes and size. Like hard disk in laptop, micro hard disk, memory card, USB stick. These kinds of SSD are portable and convenience. Besides, it can provide data inside with a better security because even power shortage happens, data inside will be safe. It can suitable for home and business users.
b.DRAM Memory:SSD with DRAM memory is not so popular among users. Its design is similar to traditional hard disk. Users can even set the volume settings and mange the SSD which is with DRAM memory on most computer system. Such SSD provides industrial standard PCI and FC connector to users connect the server or PC.
After getting some basic information of SSD, we will get more about the life span of SSD and how to test and expand its life span.
Part 2: How to Extend the Life Span of SSD
1. The Type and Life Span of the Flash Memory in SSD
Three types of SSD flash storages are available: Single Level Cell (SLC), Multi Level Cell (MLC) and Triple Level Cell (TLC). We will introduce their difference below.
① SLC = Single-Level Cell which stores one bit in each cell. And it has a best transmission speed and longest life span. The write cycle of SLC could be expected to be about 100000. However, it is the most expensive type of NAND storage, which could be 3 times of the price of MLC.
② MLC = Multi-Level Cell which stores two bit in each cell. And it has a lower production cost with a lower useful life and decreased reliability. The write cycle of MLC is about 3000 to 10000 times.
③ TLC = Triple Level Cell which stores three bits per cell. TLC flash is the least expensive of the bunch with comparatively lowest performance and less read/write cycles which is just about 500 times.
2. How to Calculate the Life Span of SSD and SSHD
3. How to Extend the Life Span of SSD
TRIM command can improve the write and read performance of SSD. As a result, the life span of SSD will be extended. Generally, Windows 7 or later version will enable the Trim function in default. But how can we check it?
If it is 1, the TRIM function is not activated. Please update the driver and system patch.
Defragmentation will relocating and optimizing the noncontiguous fragments of data inside the hard disk to reduce the data access time. However, SSD does not have moving parts. As a result, it can access to target data regardless of where data is stored on the drive. And defragmentation will make the SSD reads and writes frequently and shorten its life span. So, please do to process the defragmentation in SSD.
These two services are suitable for HDD. They will make some prepare works before we search or run the software for better performance. However, it is totally not necessary for SSD. It will increase the read/write time rather than getting a better performance. So, it’d better to turn it off.
Part 3: What will Happen when the SSD Come to End
HDD will get bad sectors when it comes to end while SSD will have bad blocks. Once SSD gets bad blocks, it will take longer time to read or save some files. And finally, you may receive the error message that the operation fails.
Common error messages you may receive if SSD gets bad blocks:
“Can not read/write files to SSD correctly”, “System files need to be repair”, software get freeze or corrupted when you want to get access to large files or run slowly, etc.
2 serious problems we will encounter are:
① Data written in will be denied if system find bad blocks in SSD
② Data saved in bad blocks will be denied to access.
If you receive the notification like the following image, it could be caused by the bad blocks in SSD or the connector.
If your system keeps crash in boot process even you press the reset button, the hard disk could come to end.
If you find your disk turns to be read-only without setting, and deny any written in operation, it could means that the life span of your SSD come to end. But you can still get access to the saved files under such situation.
Part 4: How to Choose a Better Second-hand SSD
More and more problems like corruption or connection failures may happen over time. So, it is necessary to pay attention to the warranty of SSD. The warranty of most SSD we purchased are 3 years while some are 5 or 10 years.
2. Whether the second-hand SSD is with purchasing voucher
The start time of the warranty will start on the date that the SSD sold if you have a purchasing voucher. If you do not get the purchasing voucher, the warranty date will start on the basis of the production date on the label.
3. The status of the SSD
It is necessary to get detailed information about the SSD if you want to purchase. Especially for SSD with limited lifespan, it is necessary to check the Information like writing cycles, power-on hours, power cycle count. We can ask the seller to provide these information and check it after receiving the SSD. Such information could be found with CrystalDiskInfo.
4.The appearance of SSD
The appearance of SSD could influence the warranty of the SSD. Manufacturers may not provide after-sales service to SSD with damaged appearance. Some even will not provide services to SSD if the tag on SSD gets damaged. Detailed requirement could be get on the official website of the SSD.
Part 5: Migrate System to New SSD with Everything Reserved
This software can help you migrate entire Windows system to SSD. Software and system configuration will be migrated to SSD at the same time. Besides, automatic 4K alignment can help you get the best performance of the SSD.
Relate Links :
Amanda J. Brook : Many Windows 10 users have reported that Windows 10 runs so slow after a period of time. Generally,...
Ashley S. Miller : Want to format the USB flash drive but receive the notification that Windows can not format the disk?...
|
<urn:uuid:3b03ecf0-259c-4c7a-b8cd-fec402e5a151>
|
CC-MAIN-2023-50
|
https://www.reneelab.com/ssd-lifespan.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102637.84/warc/CC-MAIN-20231210190744-20231210220744-00267.warc.gz
|
en
| 0.903337 | 1,361 | 3.265625 | 3 |
As the leading cause of death in the U.S., heart disease also occupies the minds of great researchers, who continue to develop breakthroughs to advance treatments and science.
That includes University of Houston professor of biomedical engineering Kirill Larin who has developed what he describes as a “frontier technology” that can immediately assess if heart medicine is working and scar tissue healing following a heart attack.
No biopsies needed, no invasive measures taken. Larin simply peers into the heart using high-resolution optical coherence tomography (OCT), a noninvasive imaging test that uses light waves to take cross-section pictures, usually of the retina. Larin has focused the machine on the heart, a method called optical coherence elastography (OCE), to deduce mechanical properties of tissue. It’s a new field he helped usher in over the past few years.
With Larin at the controls, OCT captures detailed biomechanical properties of heart tissue to determine if the organ is responding to therapies. It could eventually be used to develop and test new treatments for healing the damage after a heart attack. The work was described in the Optical Society journal Biomedical Optics Express.
“For the first time ever, without touching the heart, now we can measure its properties and scar tissue,” said Larin. The National Institutes of Health gave Larin and colleague James F. Martin from Baylor College of Medicine and the Texas Heart Institute more than $2 million to continue exploring the science.
Most prominent under the OCE lens is a heart’s scar tissue, marking the first application of OCE for high-resolution mapping of mechanical properties of the heart muscle.
After the heart attack
Usually due to a blocked blood supply, a myocardial infarction, or heart attack, either damages or kills a part of the heart muscle, the myocardium.
While there is currently no cure for the scar tissue that occurs following a heart attack, Martin’s group is working on ways to stimulate adult heart tissue to repair itself. But when it came to the mechanics of examining the heart, the group turned to Larin.
“Through our method to measure the heart’s mechanical properties, we hope to develop ways to regenerate heart tissue,” said Larin.
The OCE also delivers clues to refining the current state of treatment.
“We can see immediately if we should be applying treatment once or twice a day, or once a week. Our results are that immediate,” said Larin.
Cover photo: GettyImages
|
<urn:uuid:91d60607-893f-4c54-83eb-849fc7e47eba>
|
CC-MAIN-2020-34
|
https://www.uh.edu/news-events/stories/2018/february-2018/02-19-18.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740838.3/warc/CC-MAIN-20200815094903-20200815124903-00423.warc.gz
|
en
| 0.919256 | 534 | 3.40625 | 3 |
Bobwhites Hanging on in Southern Illinois
Photos courtesy of the authors.
The charismatic “bob-white” whistle of a male bobwhite used to be a tell-tale sign of spring in southern Illinois, but their numbers have been declining to the point where some people may only remember hearing them in “the good ol’ days.”
Northern bobwhite (Colinus virginianus) populations have continued to experience steady declines since the 1930s. The bobwhite is a popular game bird throughout its range of the southeastern United States, and bobwhites are one of the most studied and intensely managed game bird species in the United States. Yet, across their range bobwhites have experienced declines of 4.2 percent per year. In Illinois specifically, bobwhites have been declining at a rate of 3.3 percent per year based on the North American Breeding Bird Survey. Why are bobwhite populations so imperiled? Habitat loss, degradation and fragmentation across the landscape are commonly accepted as the factors causing the observed declines in bobwhite populations. In Illinois, changes in land use due to more intensive agricultural practices have reduced the amount of bobwhite habitat across the landscape.
As a result of bobwhites’ decline, Illinois has joined the National Bobwhite Conservation Initiative (NBCI) to increase the amount of useable habitat for bobwhites in southern Illinois. The Illinois Department of Natural Resources (IDNR) has designated Burning Star State Fish and Wildlife Area (northeast Jackson County) as the first Quail Focal Area in the state, joining 24 other states in a unified effort for bobwhite conservation. IDNR has enlisted the help of researchers at Southern Illinois University who will study how bobwhite populations respond to active quail management and grassland restoration.
The main goal of the Focal Area at Burning Star State Fish and Wildlife Area is to show that quail populations will respond to the right management actions on large blocks of habitat. Researchers will document the status of quail on the site as well as the habitat conditions before management begins. The, managers will selectively restore land that is being farmed, enhance existing grasslands and implement management practices that increase habitat quality and quantity for bobwhites inhabiting the site. Researchers will then monitor the quail response to the changes in land use and management to help highlight what works to produce more quail on the site. Spring whistling male call counts, fall covey call counts, habitat monitoring, and habitat management data are all collected to monitor the bobwhite population and habitat changes in response to the planned quail management and habitat restoration proposed for the site.
Additionally, researchers will study the movements, habitat selection, home range, nest success and survival of bobwhites by attaching radio-transmitters to wild caught bobwhites. Radio-transmitters allow researchers to observe what a day in the life of a bobwhite is like from where they roost to where they feed and loaf. The data currently being collected at Burning Star State Fish and Wildlife Area will be used to establish baseline data as a reference to estimate the influence of quail management and grassland habitat restoration across this multi-year study. Studying how quail management and restoration efforts influence bobwhite populations on this site will help provide insight into the best management actions to promote bobwhite population growth on other state sites and on private lands across Illinois.
An additional bonus realized on Focal Areas in Kentucky and Missouri has been an increase in wild turkey and deer harvest on their Focal Areas. The management practices implemented for quail also provide big benefits to other populations of game species.
Bobwhites are not the only species dependent on grassland habitats. Other grassland dependent songbirds have experienced the same decline in numbers as bobwhites. Numerous grassland/shrubland songbird species can be observed at Burning Star State Fish and Wildlife Area, including dickcissel, field sparrow, eastern kingbird, common yellowthroat, indigo bunting, yellow-breasted chat, eastern towhee and brown thrasher. Bobwhite focused management and restorations are bound to have positive influences on other grassland songbird populations as well. Our research will gauge the response of the entire grassland community in response to bobwhite management and provide useful information into how management for a single game bird species can possibly benefit a grassland community.
Research investigating the possible management and restoration activities for bobwhites and how it benefits other grassland bird species is a step towards preventing future declines in grassland bird populations. We hope to not only identify the best techniques to improve grassland habitat for bobwhites and other grassland bird populations but provide useful information on how to manage habitat to help save grassland birds across Illinois.
Michael Eichholz is an avian ecologist in the Cooperative Wildlife Research Laboratory and Associate Professor in the Department of Zoology at Southern Illinois University.
Caleb Crawford is a graduate research assistant in the Cooperative Wildlife Research Laboratory at Southern Illinois University advised by Michael Eichholz. He obtained an undergraduate degree in Zoology from Southern Illinois University in 2018.
|
<urn:uuid:a00a2515-554e-4748-b33b-f078380224db>
|
CC-MAIN-2023-50
|
https://outdoor.wildlifeillinois.org/articles/bobwhites-hanging-on-in-southern-illinois/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100769.54/warc/CC-MAIN-20231208180539-20231208210539-00688.warc.gz
|
en
| 0.917641 | 1,048 | 3.515625 | 4 |
Wheat Germ and a Healthy Twist to Recipes
The goldmine of nutrients – Wheat Germ is a boon to all those looking out for good health and nutrition in their diet. These are some of the most nutritious foods discovered and being popularized in the modern times. Foods, which were unheard of a few decades, back.
My mom started blinking when I informed her that I mix Wheat Germs to the regular wheat flour to make chapattis and other recipes. But was delighted with the fact she was getting extra nutrients without sacrificing the taste and texture change in her daily bread (chapattis).
This inexpensive yet highly nutritious food gives a nutty flavor and crispy texture when roasted on slow heat.
Bran, Endosperm and the Germ.
Wheat Germ is a very small part of the wheat kernel, and is the reproductive part of the grain, which germinates into the wheat grass. Most of the nutrients are present in this part of a grain.
- Wheat germs are a good source of the mineral Folic acid, good for pregnant women and for preventing some of the neural defects in newborn babies.
- Vitamin E is the other important nutrient present in wheat germ, which is good for skin and anti aging properties.
- Wheat germ has Omega 3 in it, a kind of essential fats our body cannot make, and is outsourced from external food. Omega 3 helps against heart ailments and reducing cholesterol.
- Presence of fibers in wheat germ makes it help reduce obesity and diabetes.
- It is a good source of Vitamin B12, B6 and amino acid.
- The other minerals present in Wheat Germ are iron, magnesium, manganese, potassium, thiamin, zinc, calcium, folate, selenium and phosphorous.
Prudent ways to use Wheat Germs;
- The best and the healthiest way to use wheat germ is to roast it on slow fire and sprinkle it on yogurt, porridge or milkshakes.
- Use it in pancake batter for a healthy breakfast recipes.
- Cakes, muffins and cookies could be made baked using wheat germ and wheat flour.
- Granola for kids could be made more nutritious by adding wheat germs in it.
- Mix it in your dips, spreads and chutney recipes.
- You can add the roasted wheat germ to any curry or casserole dishes.
- Add it in your regular whole-wheat flour and make chapattis.
- Since the presence of oil in wheat germs makes it prone to go rancid very quick, always store it in refrigerator. It stays good for 8-9 months when refrigerated.
- Roast the wheat germs after opening the pack and store it in a zip lock bag and refrigerate it.
- Always buy a good branded product and store it.
More about Wheat Germ here;
|
<urn:uuid:830a1ce3-b250-4fcd-ba76-8bc21b943c9a>
|
CC-MAIN-2014-23
|
http://litebite.in/wheat-germ/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510268734.38/warc/CC-MAIN-20140728011748-00347-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.927809 | 596 | 2.59375 | 3 |
The Great Lakes and Blue Flag Beaches
Annette Street Public Library 145 Annette Street Toronto M6P 1P3
The Great Lakes hold 20 per cent of the world's available surface freshwater and provide drinking water to 45 million Canadians and Americans. They are a place for connection and recreation, and are the centre of the world's third largest regional economy.
But the lakes are under threat. Overdevelopment, poor shoreline management, and pollution from agricultural and urban areas compromise the health of our lakes. Four out of five Great Lakes are in a state of decline, and climate change will only intensify the problems we?re seeing now.
The good news is, there are actions governments and individuals can take to protect and restore the health of our lakes.
Join Environmental Defence to learn more about the Great Lakes, the threats they face, and possible solutions. Together we can keep the Great Lakes great for future generations.
Presented as part of Toronto Public Library's Fragile Planet program series.
Contact the branch for more information at 416-393-7692.
|
<urn:uuid:7f10b681-d26d-49c0-b638-7a51d72e66d6>
|
CC-MAIN-2017-47
|
http://green13toronto.org/event/great-lakes-and-blue-flag-beaches
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804724.3/warc/CC-MAIN-20171118094746-20171118114746-00403.warc.gz
|
en
| 0.895716 | 218 | 2.9375 | 3 |
by Justice Matters with support from DataCenter
In an era of high-stakes testing, there are policies and practices in West Contra Costa Unified School District that result in a narrow, unresponsive, and superficial education for thousands of low-income students of color. Behind the Test Scores: Teaching and Learning Under Arrest reports on a survey of West Contra Costa teachers. The survey results reveal discriminatory practices that shape which students receive extra attention and which do not; classrooms stripped of science, history, art, and P.E.; and schools that fail to prepare students to be critical thinkers and problem solvers. This teaching and learning crisis students are facing is due to a climate that emphasizes test scores over high quality learning that prepares students for their futures.
full report 21 pages, PDF, requires free Adobe Acrobat®Reader.
|
<urn:uuid:e3ab3f3f-3c61-4d41-a6df-098e986045a6>
|
CC-MAIN-2020-29
|
http://www.datacenter.org/behind-the-test-scores-teaching-and-learning-under-arrest/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655902496.52/warc/CC-MAIN-20200710015901-20200710045901-00094.warc.gz
|
en
| 0.934726 | 164 | 2.890625 | 3 |
A brain tumor is an abnormal mass or growth of tissue in the brain. There are many different types of brain tumors, and they are mainly categorized as benign, malignant, primary or metastatic tumors. Depending on the nature and location of the brain tumor, the growth rate can affect the function of one’s nervous system.
Signs and symptoms
- Issues with vision
- Recurring headaches
- Difficulty in speech or comprehending
- Short-term memory loss
- Poor coordination
- Unexplained vomiting or nausea
- Hearing issues
- Gradual loss of sensation or movement in limbs on one side of the body
Note: these are just a few signs and symptoms provided for informational purposes. Do not attempt self-diagnosis based on this list.
The treatment varies depending on the location, size and type of brain tumor as well as your overall health condition. Medical professionals may encourage surgery, radiation therapy, radiosurgery, chemotherapy or targeted drug therapy depending on the condition and nature of the tumor. As brain tumors can develop in parts of the brain that controls motor skills, speech, vision and thinking, rehabilitation is necessary as a part of recovery. Rehabilitation such as physical therapy, occupational therapy or speech therapy might be introduced to help with after treatment care.
Northern Neurology Specialties, Dr. Jill Bressler and Brain Tumor Treatment
A brain tumor lies in a vital part of a human body making rapid and accurate diagnosis followed by a precise treatment plan necessary for recovery. Here again, once diagnosed, our vertical approach to maintaining neurological stability, referring your case to subspecialties, facilitating and being part of your multi-disciplinary treatment plan assure our patients and family members the guidance of an individualized, tailored plan.
Contact our office today, make an appointment so that Dr. Jill and Northern Neurology can begin our process of diagnosis to treatment plan.
|
<urn:uuid:5574f451-c81f-48df-8228-70f07aaaac38>
|
CC-MAIN-2020-24
|
https://www.neurologyspecialties.com/conditions/brain-tumors/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348511950.89/warc/CC-MAIN-20200606062649-20200606092649-00430.warc.gz
|
en
| 0.918122 | 386 | 2.90625 | 3 |
Old Testament: The main Hebrew words for rain are matar and geshem. There were two parts to the rainy season, so the early rain (autumn) gets its own name, yoreh, as does the late (spring) rain, called malqosh. Less frequently used terms describe varieties of rain, such as gentle showers versus heavy rains.
New Testament: The words for rain are broche (pronounced broh-khey) and huetos.
The Old Testament world was primarily agricultural; yet the geographical area in which many Bible stories take place tends towards dryness, even drought. Therefore, rain was the lifeblood of sustenance. The early rain began the growth of the crop; the late rain brought that growth to fruition.
The Bible has much to say about “rain” and related terms.
The primary positive references to rain point to one of the chief blessings God promised to bestow, first, as a conditional blessing for obedience, but also as part of God’s “common grace.” But there are numerous other references to rain.
- In Leviticus 26:4, God promises if Israel will obey Him: “Then I will give you rain in its season, the land shall yield its produce, and the trees of the field shall yield their fruit.”
- Exodus 16:4 says how God “rains” manna from heaven to provide for Israel in the wilderness, using the same word is the one that describes regular rain.
- Moses’ teaching, as given to him by God, is compared to life-giving rain in Deuteronomy 32:2: “Let my teaching drop as the rain, my speech distill as the dew.”
- In Proverbs 16:15, the favor of a human ruler, a king, is compared to rain.
- In Psalm 147:8, rain demonstrates the creative and sustaining power of God.
- Isaiah 45:8 compares salvation and righteousness to rain.
- Hosea 6:3 compares the knowledge of God and His personal presence to rain.
- In Zechariah 14:17, God promises rain in exchange for the nations offering their worship to Him in Jerusalem at the Feast of Tabernacles.
- In Matthew 5:45 and Acts 14:17 we see that rain is not only a covenant blessing for obedience; God graciously sends His rain to all.
- In the Feast of Tabernacles scenario in John 7, the final day of the feast included a magnificent “water show” at the Temple. This dramatic ceremony was a prayer acted out as a pageant, recognizing God’s gift of rain, and petitioning Him to continue to send the rains. Jesus took the occasion to connect with that hope for rain as He declared in v. 38, “He who believes in Me, as the Scripture has said, out of his heart will flow rivers of living water.” John explains that He spoke of the Holy Spirit, Who certainly brings us life and blessing as we allow Him to fill us.
- In Acts 14:15-17, Paul uses the universality of rainfall as a means of proclaiming the reality of the true God to the people of Lystra.
The primary negative references to rain are the reverse side of the primary positive references: judgment for disobedience. But as with the positive references, there are various nuances.
- Genesis 7:4 speaks of Noah’s flood as a means of judgment: “For after seven more days I will cause it to rain on the earth forty days and forty nights, and I will destroy from the face of the earth all living things that I have made.”
- Deut. 11:17 and 1 Kings 8:35 show God will withhold rain from Israel for their disobedience to the covenant.
- The Lord “rains” down judgment as well as blessing: brimstone and fire on Sodom and Gomorrah (Gen. 19:24); hail on Egypt (Exod. 9:23); coals on the wicked (Ps. 11:6).
- Proverbs 25:14 compares false promises or empty boasts about being generous to clouds without rain. Jude 12 makes a similar comment about unethical teachers who seem to promise life but, like clouds without rain, are merely phantasms full of empty promises.
- Zechariah 14:17 records God’s warning that He will withhold rain from the nations that fail to offer worship to Him in Jerusalem at the Feast of Tabernacles.
- In contrast to God, idols cannot produce rain (Jer. 14:22).
- Rain represents the difficulties of life in Matt. 7:27, which can be navigated by following the teachings of Jesus.
Without rain life is mere existence, a struggle to survive, both physically and, by extension, spiritually.
We need to remember the agricultural and arid context in which the Bible was given in order to appreciate the power of rain imagery. When we do, even those of us who have an abundance of water and live in an industrial rather than an agricultural society can readily see these applications:
- Obedience to God produces blessing in our lives; disobedience produces the opposite.
Because the conditional promise of rain as a blessing was given to particular people in a particular place,1 we can’t expect literal rain as an automatic exchange for obeying God. But we can expect obedience to bring spiritual blessings, refreshment and growth.
- Waiting for God’s blessings, including the return of Jesus, is an opportunity to exercise patience (James 5:7) and prayerfulness (James 5:18); both verses use rain imagery.
- In His common grace, God also blesses the entire human race with His goodness, including rain. God is continually giving sustaining gifts to those who honor Him as well as those who don’t. We can point to this as we share our faith.
- God’s Word is compared to rain because it is life-giving. If we neglect it, we are sure to experience spiritual drought. We who have free access to Scriptures have every reason to appreciate and take advantage of this blessing. And just as we pray for literal rain for drought-affected areas, or support various agencies that dig wells, etc., we can pray and support efforts to bring God’s Word to those who are spiritually dry and thirsty.
- We can be thankful for good teachers, and even political rulers who do what is right, as the Bible says that they too are like rain. They are blessings from God to enhance our lives and provide what we need to survive and flourish.
- Even the threat of unwanted rain, a metaphor for the storms of life, can help us examine our spiritual foundation. Yeshua is our solid Rock, but now and then we might need to weather a storm to make sure that we have built our lives on Him.
- A “thought project” for a rainy day might be to watch and listen to the rain and meditate on some of the Scriptures that compare righteousness, God’s presence, and salvation2 to rain. A rainy day might also be a good time to reflect on the scene in John 7, with its acted prayer for rain and Jesus’ words to the people. How can you pray for God’s salvation for others and blessing for yourself? Can you thank God for His gift of the Holy Spirit? How have you experienced the living water Jesus promised?
1. Excepting the promise to “the nations,” which is an apocalyptic end times prophecy.
2. The comparison between rain and salvation is unlike the promise of rain for obedience as there is nothing we can do to earn the blessing of salvation, and it is unlike common grace in that salvation has to be received on God’s terms.
|
<urn:uuid:5225da1c-d7ef-4968-b002-e451e527fa2e>
|
CC-MAIN-2023-14
|
https://jewsforjesus.org/blog/all-about-rain
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945440.67/warc/CC-MAIN-20230326075911-20230326105911-00232.warc.gz
|
en
| 0.942581 | 1,664 | 3.75 | 4 |
Water and soil pollution are serious issues in Tajikistan. Many surface water bodies are polluted by human activity, particularly from industrial wastewater. Hazardous waste management issues are also prominent in Tajikistan. Currently, there is no reliable information on the volumes and types of waste, including toxic waste (such as pesticides). Wastewater treatment in the country does not follow the international rules of transfer, and storage of toxic goods and chemicals intended for use in agriculture and industrial facilities is often inadequate to prevent the spread and contamination of toxic materials.
Since 2012, Pure Earth has been working in Tajikistan to identify and assess toxic sites as part of our TSIP initiative. Over 370 toxic sites have been assessed. Several of these sites identified pose a serious threat to human health. Pure Earth has implemented remediation projects, where crumbling or abandoned pesticide warehouses were cleaned up.
As a result of our project in Tajikistan to mitigate exposure to radionuclides, 5 radioactive hotspots in residential areas were removed. The results of the sociological surveys conducted in 2014 were used to design and implement an education and awareness program. 400 people who live close to the tailings were educated about radiation safety and provided printed materials. This has significantly decreased the most immediate risks of radioactive contamination to people. The awareness activities inspired local residents to demand actions from the regional government to address the issue of contamination from tailings. The governor responded by ordering the covering up of tailings with a layer of clean soil. By the end of 2015 more than 30% of the tailings were covered.
Lancet Commission on Pollution and Health-Tajikistan Summary
Pollution is responsible for 19.6% of deaths in Tajikistan. Learn more about how pollution affects health and the economy in Tajikistan by reading the Tajikistan Summary Report, based on the Lancet Commission on Pollution and Health.
Country and Project Reports
- Tajikistan Country Report 2018
- Saidov Pesticide Cleanup Report
- Preliminary Site Assessment: Former Warehouses of Pesticides in the Tajikistan Republic
Tajikistan Project Pages
- Projects in Progress:
- Completed Projects:
Read more about our work in Tajikistan in The Pollution Blog:
- Two pesticide cleanups and a wedding in Tajikistan, near the Afghan border (June 2019)
- In Tajikistan, Coalition of Local Groups Unite Against Abandoned Pesticide Problem (Sept 2018)
- Pollution Warrior Profile: Umed in Tajikistan Saves Families from Toxic Landowner (May 2017)
- At the Roof of the World in Tajikistan (Feb 2014)
|
<urn:uuid:c7e81bd3-c884-421b-bd50-9256f0085371>
|
CC-MAIN-2020-34
|
https://www.pureearth.org/projects/tajikistan/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738913.60/warc/CC-MAIN-20200812171125-20200812201125-00264.warc.gz
|
en
| 0.940776 | 544 | 3.25 | 3 |
Behind the buzz and beyond the hype:
Our Nanowerk-exclusive feature articles
Posted: Sep 21, 2007
Nanotechnology crop circles appear in Southern California!
(Nanowerk Spotlight) Just kidding - I always wanted to write a tabloid headline like that! In case you are expecting a story on the mysteries of crop circles caused by alien nanotechnology - stop reading right here; but the analogy is just too striking when you look at the amazing images coming out of the labs at the University of Southern California, where they developed a new technique to create three-dimensional carbon nanotube structures. While carbon nanotubes possess many exceptional properties which far exceed most known bulk materials, creating controlled nanotube (CNT) microstructures has always been a challenge. Overcoming this challenge is going to be key in developing useful and commercially viable CNT devices. Existing techniques for patterning three-dimensional CNT structures are based on the bottom-up growth of multiwalled CNTs (MWCNTs) from a patterned catalyst, which is limited to 2D-like geometries. Other, complex 3D microstructures have been fabricated with polymer-based resin materials but not with CNTs. The new technique developed by researchers in California uses a focused laser beam to selectively burn local regions of a dense forest of MWCNTs. This technique enables chemically sensitive fields to take advantage of nanotubes' exceptional properties and expand their possible applications into new areas.
"We created three-dimensional microstructures using a focused laser beam to selectively burn local regions of a dense forest of multiwalled carbon nanotubes" Dr. Stephen B. Cronin tells Nanowerk. "Raman spectroscopy is used to systematically quantify this process in a controlled fashion to determine the laser power threshold for burning carbon nanotubes and, also, the depth of burnout at different laser powers."
a) Concentric cylindrical structures patterned using the laser burnout
method. b) Close-up image showing a slight undercut profile. (Reprinted with permission from American Institute of Physics)
The researchers grew CNT forests by chemical vapor deposition by passing ethylene over a predeposited iron catalyst on silicon wafers. The nanotube growth takes place in a heated tube furnace at 650°C.
"We determined the minimum threshold laser power for burning carbon nanotubes in air by observing changes in the intensity of nanotube Raman
spectra before and after laser exposure" says Cronin.
CNTs were exposed at laser powers between 50 and 9000 microwatts for 1 second and the scientists found that the threshold for laser burnout occurs at 300 µW, which corresponds to a power density of 244 µW/µm2 for a 1.25 µm spot size.
"The initial burnout we observed came as quite a surprise and appeared very striking in our microscope images" says Cronin. "Typically, carbon nanotubes lying on a silicon wafer are very difficult to heat with a laser. So, in fact, this burnout effect was discovered serendipitously."
3D staircase structure fabricated in the MWNT surface. (Reprinted with permission from American Institute of Physics)
Cronin notes that they observed several interesting phenomena on the surface of the MWCNT forests after laser treatment. "SEM images revealed white spots ranging from 100 to 200 nm on top of the burned MWCNT surface. At higher magnification, these white spots can be resolved as nanotube bundles that aggregate
during the exothermic burnout process. This aggregation demonstrates the dynamic nature of the burnout process of these MWCNTs."
Potential applications that could benefit from this technique – since it doesn't involve chemicals and the resolution is limited primarily by the spot size of the objective lens – are on-chip DNA manipulation, chemical and protein identification, templates for directed stem cell growth, and gas mixture separation.
The next step for the researchers is to work closely with scientists from other fields, such as biological and micro-fluidics, to determine how this method compares to the current state-of-the-art techniques and to quantify any additional advantages provided by this method.
|
<urn:uuid:450d24ce-a8d0-4927-a1be-32758a8d974c>
|
CC-MAIN-2017-43
|
https://www.nanowerk.com/spotlight/spotid=2663.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823214.37/warc/CC-MAIN-20171019012514-20171019032514-00422.warc.gz
|
en
| 0.916166 | 877 | 3.15625 | 3 |
Multimedia processing demands efficient programming in order to optimize functionality. Data, image, audio, and video processing, some or all of which are present in all electronic devices today, are complex programming environments. Optimized algorithms (step-by-step directions) are difficult to create but can make all the difference when developing a new application.
This book discusses the most current algorithms available that will maximize your programming keeping in mind the memory and real-time constraints of the architecture with which you are working. A wide range of algorithms is covered detailing basic and advanced multimedia implementations, along with, cryptography, compression, and data error correction. The general implementation concepts can be integrated into many architectures that you find yourself working with on a specific project. Analog Devices' BlackFin technology is used for examples throughout the book.
Discusses how to decrease algorithm development times to streamline your programming
Covers all the latest algorithms needed for contrained systems
Includes case studies on WiMAX, GPS, and portable media players
|
<urn:uuid:dfa426cf-4733-4e77-aee1-2d44f0e23092>
|
CC-MAIN-2017-34
|
http://shop.oreilly.com/product/9781856176781.do?sortby=publicationDate
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886112682.87/warc/CC-MAIN-20170822201124-20170822221124-00585.warc.gz
|
en
| 0.91397 | 201 | 2.609375 | 3 |
1 APPLICATION ARCHITECTURE
"Some things are always the same, particularly the business problems facing IT organizations. Corporate management always pushes for better IT utilization, greater ROI, integration of historically separate systems, and faster implementation of new systems; but some things are different now. .... Legacy systems must be reused rather than replaced, because with even more constrained budgets, replacement is cost-prohibitive. You find that cheap, ubiquitous access to the Internet has created the possibility of entirely new business models, which must at least be evaluated since the competition is already doing it. …. Systems must be developed where heterogeneity is fundamental to the environment, because they must accommodate an endless variety of hardware, operating systems, middleware, languages, and data stores. .... Within a business environment, a pure architectural definition of a SOA might be something like "an application architecture within which all functions are defined as independent services with well-defined invokable interfaces which can be called in defined sequences to form business processes." – Migrating to a Service Oriented ArchitectureOver my last three articles, I have laid a foundation for a Service Oriented Architecture (SOA) as the enterprise architecture of the globally integrated enterprise and focused on how to define and establish the business side of the enterprise through a well defined business architecture . In this article, I continue our journey into the IT architecture side and start by focusing on the application architecture (in later articles I will cover the other aspects of the IT architecture including the information and infrastructure architectures.) To reiterate, as shown in Figure 1, the application architecture is a key component of aligning IT with business. In particular, the application architecture elaborates services required to implement the defined business model and process. The services required to implement the business model and process are defined as applications that can be realized using existing legacy, packaged and remote applications and services. The application architecture also elaborates the way that consumers of the business services interact with the process and applications – as defined by the user interface and interaction mechanisms (e.g. via portals, browsers, and mobile devices.)
Figure 1: Aligning IT with Business
In the context of SOA, the application architecture focuses on reuse of existing assets, and is primarily concerned with the following:
In the following sections, we explore key patterns supporting application architecture in SOA, including application reuse patterns and the main connectivity architectural pattern – the Enterprise Service Bus.
2 APPLICATION INTEGRATION PATTERNS
Figure 2 shows the main application integration patterns established as part of IBM's Patterns for e-business . The direct connection application pattern represents the simplest 1-to-1 interaction between applications. It allows a pair of applications within the organization to directly communicate with each other. Interactions between a source and a target application can be arbitrarily complex, and this complexity can be addressed by breaking down the interactions into more elementary components. More complex point to point connections will have modeled connection rules that control the mode of operation of a connector depending on external factors as shown in Figure 2. Examples include business data mapping rules, autonomic rules, security rules, capacity and availability rules. The indirect or broker application pattern, shown in the figure, separates distribution rules from the applications using a 1-to-N topology. It allows a single interaction from the source application to be distributed to multiple target applications concurrently thereby reducing the proliferation of point-to-point connections. The indirect or broker application pattern applies to solutions where the source application starts an interaction that is distributed to multiple target applications. It separates the application logic from the distribution logic based on broker rules which manages the decomposition/ recomposition of the interaction. The broker pattern reuses the direct connection pattern to provide connectivity between the tiers.
Figure 2: Application Integration Patterns
In the context of SOA, the direct pattern allows a defined service to be provided directly by an existing asset or external service provider since it is capable of being accessed via a service interface. The indirect pattern makes the existing asset or external provider a service through a broker or service component. The indirect pattern has many sub-patterns based on the existing asset type. The adapter or gateway sub-pattern is best suited for external service providers, and provides a proxy-based access to the asset by mapping standards-based interface to the asset interface. The application server sub-pattern provides a generalized capability for interacting with multiple target assets, and provides an environment for augmenting an asset's capabilities. It is best suited for reusing packaged applications as service providers. The terminal "emulation" sub-pattern targets mainframe applications. It provides a mechanism to encapsulate a sequence of screen interactions as a "macro" and then to expose these "macros" as a service. These patterns have their own pros and cons – and these should be taken into consideration when making the architectural decisions for a given solution.
The direct pattern has a shorter deployment cycle especially compared to the indirect pattern. Since the service interface is defined by the asset, no further analysis is required to determine the interface. Furthermore no knowledge of other runtimes (Java, messaging middleware, etc.) is necessary when building the service. On the other hand, consumers become coupled to the asset environment, and therefore it becomes difficult to substitute an alternate asset to provide the service. The direct pattern also places a burden on the asset runtime environment, requiring it to have support for service invocation, be able to match the service requirements, and handle the additional XML processing burden.
The indirect pattern is more suited to support the IT alignment with business by ensuring that the service interface aligns with the business view rather than with existing assets. The service component is used to map between the two worlds, and this facilitates a substitution of the asset as the service provider without impacting the consumer. This service component can allow the business service to be implemented using behavior from more than one asset – the service component aggregates the behavior to realize the service, and can also enable additional capability. The main issues associated with the indirect pattern include longer deployment cycles and more complexity in developing the service component. Generally, the indirect pattern involves the use of connector/adapter technology between the service component and the backend systems – and usually introduces a middle tier.
The above pros/cons of the patterns provides the basis for the architectural decisions. Choose the direct pattern when the existing asset platform is strategic, expediency is a key business driver, and the development team has skills only on the existing asset. Choose the indirect pattern when several assets need to be aggregated to provide the needed functionality and in some cases a subset of the functionality of an existing asset is required. This pattern is also useful to put a façade on an asset that needs to be replaced or modernized.
3 THE ENTERPRISE SERVICE BUS ARCHITECTURAL PATTERN
The Enterprise Service Bus (ESB), shown in Figure 3, is an architectural pattern that supports connectivity between service requestors and service providers, and forms the backbone of any SOA realization. The ESB supports this requestor/provider connectivity by handling multiple communication protocols supporting pre-defined interaction patterns. The ESB enables these interactions through defined mediation flows to process request messages and correlated results using defined patterns. The ESB should be flexible in supporting multiple message content models usually based on meta-models.In an SOA-based implementation, the ESB facilitates a "virtualization" of the services' identity, protocol and interfaces. Through its capabilities to route service requests, the ESB can virtualize a services' identity. It also facilitates conversion between different protocols and transformation between various interfaces. Furthermore, the ESB pattern also enables a spect-oriented connectivity to handle security, management, logging, auditing, etc.
Figure 3: The Enterprise Service Bus Patterns
ESB mediation flows leverage several mediation patterns. Mediation patterns are well-defined types of processing the ESB uses to manipulate the messages during an exchange. Mediation patterns take many forms and many levels of granularity. We have already identified two important mediation patterns – the conversion processing needed to support virtualization of communication protocol and interaction pattern, and the transformation processing needed to support virtualization of interface.
A family of mediation patterns provide virtualization of identity via routing. Routing allows the ESB to send messages from a service requester to a service provider chosen dynamically, based on the conditions at the time of the request. The ESB can provide routing mediation patterns that range from very simple to very complex. The most useful routing mediation patterns are driven via service metadata derived from the service registry. In addition, different routing patterns can contribute to differing qualities of service, for example offering request retry and failover. An ESB may support more complex routing patterns such as distribution of a request and correlated aggregation of responses.
Other mediation patterns support additional message manipulation – examples include message enrichment and message filtering. Still other mediation patterns contribute directly to aspect-oriented connectivity, such as monitoring and logging and access to the services registry, the security and management policy definition points, and other parts of the solution infrastructure. Finally, more complex mediation patterns include capabilities such as complex event processing.
The key ESB patterns are also shown in Figure 3. In the direct pattern, typically we see peer domains connected, generally with little distinction between them, though sometimes interactions tend to remain within a domain, especially in the case of geographic distribution. In the brokered ESB pattern, we typically see peers connected, but where generally the majority of traffic is within a domain. In the federated pattern, the key difference is that the common interaction is within a domain, but a 'backbone' e.g. a retail headquarters supplies some services, and may offer peer to peer routing.In summary, the application architecture is key to aligning IT to business which is in turn an integral part of ensuring succesful SOA adoption in the enterprise. We have discussed the key patterns that can be used to make appropriate architectural decisions when designing solutions. In the next article, we continue our journey into the IT side with a focus on the Information Architecture.
About the author
Mahesh Dodani: "Applications At Your Service", in Journal of Object Technology, vol. 7. no. 7, September-October 2008 pp. 33-38 http://www.jot.fm/issues/issue_2008_09/column3/
|
<urn:uuid:d3ed82df-213e-45e7-9d81-a6392dc27e5e>
|
CC-MAIN-2017-47
|
http://www.jot.fm/issues/issue_2008_09/column3/index.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805466.25/warc/CC-MAIN-20171119080836-20171119100836-00320.warc.gz
|
en
| 0.9175 | 2,109 | 2.546875 | 3 |
NASA rovers to lose comms this week as Mars moves behind Sun
Opportunity to blast rock with cobalt rays while it waits
NASA has announced that its surviving Mars rover will be unable to receive commands from Earth for much of the week, as the red planet is about to pass behind the Sun. The plan is for rover Opportunity to spend the blackout period sitting stationary, (gently) blasting a rock with a cobalt-powered radiation beam.
Mineralogically different from anywhere yet surveyed. Full image here.
According to a statement issued by NASA's Jet Propulsion Laboratory (JPL) in California, from which the rover is directed:
During the days surrounding such an alignment, called a solar conjunction, the sun can disrupt radio transmissions between Earth and Mars. To avoid the chance of a command being corrupted by the sun and harming a spacecraft, NASA temporarily refrains from sending commands from Earth to Mars spacecraft in orbit and on the surface. This year, the commanding moratorium will be Jan 27 to Feb 11 for Opportunity, with similar periods for the Mars Reconnaissance Orbiter and Mars Odyssey orbiter.
It will still be possible to receive transmissions from the rovers and spacecraft on or in orbit around Mars, as there is no risk from a corrupted signal in this case – though bandwidth is decreased. NASA's Mars Reconnaissance Orbiter will be compelled to reduce the amount of data it gathers during the conjunction; its onboard storage isn't enough to make up for the cut in download speeds to Earth.
Meanwhile, down on the Martian surface, rover Opportunity has now crawled across the haematite steppes of the Meridiani Planum to reach the "Santa Maria" crater. The plucky robot is now parked up next to a rock formation dubbed "Luis de Torres", preparatory to spending the conjunction period zapping it using an instrument known as a Moessbauer spectrometer. This shines radiation at the rock and observes the spectrum of the resulting emissions, thus determining the material's exact makeup.
The necessary radiation comes from a small piece of cobalt-57, steadily decaying. As cobalt-57's half-life is less than a year, the source's radioactivity has dwindled by 99 per cent during Opportunity's seven-year sojourn on Mars, meaning that it nowadays takes a long time to get a decent reading with the Moessbauer spectrometer. JPL boffins consider the task a suitable one for the rover to carry out unsupervised while the solar conjunction passes.
Apparently the area in which "Luis de Torres" is located shows up from space as having a different makeup from any area yet surveyed by rover.
"The goal [of the spectrometry readings] is to characterize the materials in an area that shows up with a mineralogical signal, as seen from orbit, that's different from anywhere else Opportunity has been," says JPL's Bruce Banerdt.
Opportunity's companion rover, Spirit, was landed in the Gusev crater on the other side of Mars. It too continued operating for years after its initial planned mission duration of three months, but in 2009 the plucky robot became bogged in a sandpit and all efforts to free it proved unsuccessful. Unfortunately, the mired rover's solar cells were left tilted southwards, and the Gusev lies in Mars' southern hemisphere. The onset of southern-hemisphere Martian winter last (Earth) year meant that Spirit was almost totally unable to generate any power – normally it would have driven onto a north-facing slope. As NASA's boffins had feared, the machine appears not to have awakened from low-power hibernation with the coming of local spring; it will probably not be heard from again, though a listening watch is still being maintained.
Opportunity seems in good nick, however. After the solar conjunction is over and the Santa Maria crater has given up its secrets, the JPL mission team plan to drive the rover onwards toward the Endurance crater, some 6km away. There seems to be every prospect that Opportunity will still be operational when NASA's next Mars rover, dubbed "Curiosity", arrives at the red planet in 2012.
The larger, Humvee-sized Curiosity will use nuclear power rather than solar cells as seen on Spirit and Opportunity. This will mean that the new machine is much faster and more capable (Opportunity has taken seven years to cover just 26.7km in the weak sunlight of Mars), and will be able to survey much more territory. However, in time Curiosity's radioisotope fuel will be exhausted and it will cease operations – under current NASA plans this is expected in 2014. There has to be some chance, barring mishaps or mechanical breakdown, that the veteran Opportunity may yet be going at that point. ®
|
<urn:uuid:a7b01f0c-d528-4855-8740-09f293c3da24>
|
CC-MAIN-2017-43
|
https://www.theregister.co.uk/Print/2011/01/24/mars_solar_conjunction/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824733.32/warc/CC-MAIN-20171021095939-20171021115939-00315.warc.gz
|
en
| 0.952892 | 987 | 3.265625 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.