text
stringlengths
263
344k
id
stringlengths
47
47
dump
stringclasses
23 values
url
stringlengths
16
862
file_path
stringlengths
125
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
81.9k
score
float64
2.52
4.78
int_score
int64
3
5
The wreck of the steamer ' St. Denis ' on the shore of Vancouver Island has called forth many protests against the tendency toward overloading, and many demands for stringent laws such as are associated in Britain with the name of the late Mr. Plimsoll. The Plim-soll line on a British vessel determines her summer load, her winter load, and her winter load in the North Atlantic, and no captain is allowed to clear if the iiae which designates his vessel's carrying capacity is submerged. On the Great Lakes there^ are frequent demands for load-line regulations, and it is notorious that many vessel owners take serious risks by overloading every season. Occasionally there is a disaster, and the matter after a brief discussion is forgotten. But there is a growing reaction against the indifference that risks and sometimes sacrifices lives for the gathering of profits. According to the Victoria ' Times/ the captain of the * St. Denis/ a young and ambitious officer, was eager to take a record cargo from the Vancouver mines to Central America. In spite of protests from experienced officers and seamen more cargo was crammed into the vessel's hold than she sould carry with safety through the storms of the Pacific. In the shelter of the straits of Georgia or Puget Sound such a load could have been taken with comparative safety. But in the storms of the open sea the vessel was helpless. Just how she foundered will never be known. Her twenty-one men are lost, and only the wreckage on shore gives any indication of where the disaster occurred. It is safe to conclude that with a proper load-liue regulation strictly enforced the vessel would have been prepared for all emergencies, and she and her crew would now he safe. It is onlv when disaster occurs that the evil of overloading can effectively be attacked. Scores of instances occur in which risks are taken and by fortunate accidents the trips are finished in safety. The profit and prestige of such achievements are temptations to repeat them. When the inevitable happens there is an outcry. This lamentable experience should not he wasted, hut should he held before the public until more efficient means are devised to prevent the sailing of unseaworthy I take it for granted that these facts are correct, coming from papers of such standing as these. There are many more instances which should cause this House to put on the statute-books _ of this country an Act covering the loading of vessels, especially in the winter. It is now. 35 years since Plimsoll passed his Shipping Act It took him eight years to accomplish that. This Bill has now been before this House for five years. I trust that this parliament will not require eight years to pass a Bill. Motion agreed to, and Bill read the first time. business of the house.
<urn:uuid:c39b3bf6-b919-4dd6-84db-607a024cc1bf>
CC-MAIN-2020-29
https://www.lipad.ca/full/1911/01/20/1/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657142589.93/warc/CC-MAIN-20200713033803-20200713063803-00250.warc.gz
en
0.975327
568
2.625
3
Hugh Pickens writes: "For years, the computer industry has made steady progress by following Moore's law, derived from an observation made in 1965 by Gordon Moore that the amount of computing power available at a particular price doubles every 18 months. The Economist reports however that in the midst of a recession, many companies would now prefer that computers get cheaper rather than more powerful or by applying the flip side of Moore's law do the same for less. A good example of this is virtualisation: using software to divide up a single server computer so that it can do the work of several, and is cheaper to run. Another example of "good enough" computing is supplying "software as a service," via the web, as done by Salesforce.com, NetSuite and Google, sacrificing the bells and whistles that are offered by conventional software that hardly anyone uses anyway. Even Microsoft is jumping on the bandwagon: the next version of Windows is intended to do the same as the last version, Vista, but to run faster and use fewer resources. If so, it will be the first version of Windows that makes computers run faster than the previous version. That could be bad news for computer-makers, since users will be less inclined to upgrade only proving that Moore's law has not been repealed, but that more people are taking the dividend it provides in cash, rather than processor cycles." DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's now on IFTTT. Check it out! Check out the new SourceForge HTML5 Internet speed test! ×
<urn:uuid:243a7095-f7c1-458c-9f1c-7e3a36d2043f>
CC-MAIN-2017-30
https://hardware.slashdot.org/submission/934957/less-is-moore?sdsrc=rel
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424756.92/warc/CC-MAIN-20170724062304-20170724082304-00079.warc.gz
en
0.948713
336
2.546875
3
Driver-less car raises concern in sector American vehicles manufacturer Ford Motor recently announced that it plans to produce fully self-sufficient cars by 2021. These vehicles will be manufactured in high-volume production and will be tailored for ride-hailing and ride-sharing operations, which means they will not have steering wheels, brake pedals, or other controls for human occupants. The development will throw up what has been described as “a new world for insurers,” with the Chief Executive Officer of Quadrant Information Services, Michael Macauley, saying: “The industry will need a whole new set of data tools to deal with this.” Macauley noted that currently, auto insurance rates are based on what an insurer knows about the driver, the driver’s residential area, and the car. “The combination of a teenage driver, a new Corvette Stingray and a high-crime neighborhood, for example, would yield one rate. A middle-aged driver with a perfect record, a quiet home town and a five-year-old Honda would yield quite another.” However, with the Ford invention, the industry is confronting a situation wherein there will be no driver, in which case, the owner’s age and driving record would be largely irrelevant. Coverage and rate decisions would be based on a wide range of variables, among them traffic patterns, prevailing climatic conditions (there is some question as to how well driverless cars manage in rain and snow) and, above all, the track record of the various technologies involved. “These vehicles,” Macauley said, “will be the work not so much of a single manufacturer, but of a consortium.” He said Ford’s driverless cars partners with Velodyne (LIDAR sensors that capture high-resolution images of the area around the vehicles), SAIPS (an Israel-based computer vision and machine learning company which Ford acquired in August). It also has Civil Maps (a California-based company that develops high-resolution 3D maps), and Nirenberg Neuroscience (a machine-vision company that specialises in object recognition and bringing human-like levels of intelligence to machine modules). Prospective competitors are making similar arrangements; BMW, Mobileye and Intel, for example, recently announced that they are partnering on fully-autonomous vehicle technology to apply in a shared environment by 2021/3 Questions have been raised about the safety of self-driving vehicles, particularly since a driver in a Tesla Model S in self-driving mode was killed when the car drove itself into the side of a semitrailer in Florida last May. In a statement on the incident, Tesla did not delineate the driver’s level of engagement at the time of the crash, but it did note that “neither the autopilot nor the driver noticed the white side of the semitrailer against a brightly lit sky, so the brake was not applied.” Some manufacturers including Ford are pursuing a path towards a fully computer-managed, no-human-driver car, because they feel that hybrid approaches which allow for some degree of human control, such as Tesla’s, contain an unacceptable level of built-in risk. Google, for example, which has its own driverless car programme, decided on the no-wheel, no-pedals approach after allowing its employees to drive the company’s test cars. “There was a brief period when people would be a little nervous and monitor the car very carefully,” Google engineer, Nathanial Fairfield said: “and then they would start to relax and trust the system, and then they would over-trust the system and start to get distracted.” After watching a driver rummaging around in his back seat in search of a phone-charging cord, Google engineers decided it would be too risky to create a system wherein a driver would be expected to take control of the car at a critical moment. Quadrant’s Macauley said: “it’s not going to be up to the property and casualty insurance industry to determine when driverless cars take to the road, how they operate, and what kinds of technology they use. It is, however, going to be up to insurance carriers to understand the situation and evaluate the risks posed by different operators if that’s even the right word in different cars on different roads and in different weather, using a variety of technologies. No Comments yet
<urn:uuid:487fcf88-9864-49b4-86b2-580f754e97a8>
CC-MAIN-2017-43
http://guardian.ng/business-services/driver-less-car-raises-concern-in-sector/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187828411.81/warc/CC-MAIN-20171024105736-20171024125736-00378.warc.gz
en
0.959574
931
2.515625
3
The MessageThe Renaissance was a period of discovery and rebirth, specifically, the rebirth of culture. A significant aspect of this period of rebirth were the changes in attitude towards science and religion. The two topics are often considered polar opposites, with science typically being used to find fault in the teachings of religion, although it has also been said that science and religion can coexist, contributing to Mankind in different, but completely valid, ways. The diagram above explains that in regards to the existence of Man, both science and religion have merit. It is this idea of harmony between the two sides that we will be addressing in our animation. The Basic Plot Two characters represent Science and Religion as separate entities. The two characters awake to find themselves stranded on an island after the ship they were travelling on capsizes. At first, the characters are weary of one another, considering their hugely contrasting backgrounds, but they soon realise that in order to reach the other survivors on the island, they will have to put their differences aside and work together. For example, the characters reach a body of water that they cannot cross. The scientific character constructs a boat in order to cross the water, but without any wind, they won't be going anywhere. The religious character puts their faith and spirituality to good use, asking a greater power for the gust of wind that they desperately need to get moving. Without the scientific character's knowledge of carpentry and buoyancy, the religious character would be stranded, but that knowledge is useless without the religious character's connection with spirituality.
<urn:uuid:f992ec37-6b70-4fd4-a223-f15491ca28e4>
CC-MAIN-2017-43
http://harlequin-productions.blogspot.com/2012/09/developing-story-message.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825497.18/warc/CC-MAIN-20171023001732-20171023021732-00435.warc.gz
en
0.968263
312
3.40625
3
Spectrum management is the process of regulating the use of radio frequencies to promote efficient use and gain a net social benefit. The term radio spectrum typically refers to the full frequency range from 3 kHz to 300 GHz that may be used for wireless communication. Increasing demand for services such as mobile telephones and many others has required changes in the philosophy of spectrum management. Demand for wireless broadband has soared due to technological innovation, such as 3G and 4G mobile services, and the rapid expansion of wireless internet services. Since the 1930s, spectrum was assigned through administrative licensing. Limited by technology, signal interference was once considered as a major problem of spectrum use. Therefore, exclusive licensing was established to protect licensees' signals. This former practice of discrete bands licensed to groups of similar services is giving way, in many countries, to a "spectrum auction" model that is intended to speed technological innovation and improve the efficiency of spectrum use. During the experimental process of spectrum assignment, other approaches have also been carried out, namely, lotteries, unlicensed access and privatization of spectrum. - 1 Governments and spectrum management - 2 Spectrum use - 3 Status quo: the command and control approach - 4 Alternative Spectrum Governance Regimes and the Spectrum Debate - 5 U.S. regulatory agencies - 6 International spectrum management - 7 See also - 8 References Governments and spectrum management Most countries consider RF spectrum as an exclusive property of the state. The RF spectrum is a national resource, much like water, land, gas and minerals. Unlike these, however, RF is reusable. The purpose of spectrum management is to mitigate radio spectrum pollution and maximize the benefit of usable radio spectrum. The first sentence of the International Telecommunication Union (ITU) constitution fully recognises “the sovereign right of each State to regulate its telecommunication”. Effective spectrum management requires regulation at national, regional and global levels. Goals of spectrum management include: rationalize and optimize the use of the RF spectrum; avoid and solve interference; design short and long range frequency allocations; advance the introduction of new wireless technologies; coordinate wireless communications with neighbours and other administrations. Radio spectrum items which need to be nationally regulated: frequency allocation for various radio services, assignment of license and RF to transmitting stations, type approval of equipment (for countries out of the European Union), fee collection, notifying ITU for the Master International Frequency Register (MIFR), coordination with neighbour countries (as there are no borders to the radio waves), external relations toward regional commissions (such as CEPT in Europe, CITEL in America) and toward ITU. RF spectrum management is treated as a natural monopoly (to be compared to the concept of Jeremy Bentham and John Stuart Mill), as there is generally one regulator for any RF band. Discussions on central-planning versus market-based spectrum management are found at the 2008 PhD thesis . Spectrum management is a growing problem due to the growing number of spectrum uses. - Over the air broadcasting, which started in 1920. - Government and Research which include defense, public safety (maritime, air, police), resource management, transport, radio astronomy, ... - Commercial services to the public (voice, data, home networking) - Industrial, scientific and medical services which include Telemedicine, remote control, ... In the ’80s, the only concern was about radio and television broadcasting; but today mobile phones and wireless computer networks are more and more important as fewer than 15% of US households rely on over-the-air Broadcasting to receive their TV signals. The spectrum is divided into different frequency bands, each having a specific application. For instance, the frequency band that covers 300 kHz to 535 kHz is reserved for aeronautical and maritime communications and the spectrum from 535 kHz and 1605 kHz for AM radio. This process is called Allocation. The next step is to assign frequencies to specific users or classes of users. Each frequency band has a specific assignment that depends on the nature of the application and the numbers of users. Indeed, some applications require a wider band than others (AM radio uses blocks of 10 kHz where FM radio uses blocks of 200 kHz). In addition, "guard bands" are needed to keep the interference between applications to a minimum. Status quo: the command and control approach The Command and Control management approach is the one currently employed by most regulators around the globe. This approach advocates that the regulators be the centralized authorities for spectrum allocation and usage decisions. In the US example, the regulator (FCC) determines the use cases for specified spectrum portions, as well as the parties who will have access to them. The Federal Communications Commission (FCC) also regulates the physical layer technologies to be employed. The allocation decisions are often static in temporal and spatial dimensions, meaning that they are valid for extended periods of time (usually decades) and for large geographical regions (country wide). The usage is often set to be exclusive; each band is dedicated to a single provider, thus maintaining interference free communication. The command and control management model dates back to initial days of wireless communications, when the technologies employed required interference-free mediums for achieving acceptable quality. Thus, it is often argued that the exclusive nature of the command and control approach is an artifact of outdated technologies. The apparent advantages of this model is that services related to public interest could be sustained. In terms of profitability, public interest programs, for example, over-the-air television, may not be as attractive as commercial ones in the provider perspective, but they are nevertheless beneficial for the society. Therefore, these services are often implicitly enforced by the regulator through the license agreements. Another advantage is the standardization that results from such a centralized approach. Such standardization is critical in networked industries, for which the telecommunication industry is a text-book example. One scholar has published a paper that shows how the development of new technologies promises to bring considerably more spectrum to the public, but would require that society embrace a new paradigm of spectrum use. GAO Report on Spectrum Management (2004) The current structure and management of spectrum use in the United States does not encourage the development and use of some spectrum efficient technologies. Because the spectrum allocation framework largely compartmentalizes spectrum by types of services (such as aeronautical radio navigation) and users (federal, non-federal, and shared), the capability of emerging technologies designed to use spectrum in different ways is often diminished. For example, software-defined cognitive radios — radios that adapt their use of the spectrum to the real-time conditions of their operating environments — could be used to sense unused frequencies, or “white spaces,” and automatically make use of those frequencies. It may also be possible to use software-defined cognitive radios to exploit “gray spaces” in the spectrum — areas where emissions exist yet could still accommodate additional users without creating a level of interference that is unacceptable to incumbent users — to increase spectrum efficiency. Currently, however, the spectrum allocation system may not provide the freedom needed for these technologies to operate across existing spectrum designations, and defining new rules requires knowledge about spectrum that spectrum leaders do not have. At the same time, there are few federal regulatory requirements and incentives to use spectrum more efficiently. While the National Telecommunications and Information Administration (NTIA) is responsible for managing the federal government’s use of spectrum and ensuring spectrum efficiency, NTIA primarily relies on individual agencies to ensure that the systems they develop are as spectrum efficient as possible. Agencies’ guidance and policies, however, do not require systematic consideration of spectrum efficiency in their acquisitions. The lack of economic consequence associated with the manner in which spectrum is used has also provided little incentive to agencies to pursue opportunities proactively to develop and use technologies that would improve spectrum efficiency government-wide. Alternative Spectrum Governance Regimes and the Spectrum Debate With the digital transition, spectrum management has entered to a new age. Full conversion to digital TV by 2/17/2009 (Digital Transition and Public Safety Act of 2005) allows broadcasters to use spectrum more efficiently and save space for the possibility of sharing spectrum. Nowadays, spectrum sharing is under heated discussion. Exponential growth of commercial wireless calls for additional spectrum to accommodate more traffic flows. As a regulator, FCC responded to these needs by making more spectrum available. Secondary market is allowed to emerge and licensees are encouraged to lease use of spectrum to third parties temporarily. Making license transferable is an important attempt made by FCC to create incentives for broadcasters to share unused spectrum. More alternatives are underway. Spectrum scarcity has emerged as a primary problem encountered when trying to launch new wireless services. The effects of this scarcity is most noticeable in the spectrum auctions where the operators often need to invest billions of dollars to secure access to specified bands in the available spectrum. In spite of this scarcity problem, recent spectrum utilization measurements have shown that the available spectrum opportunities are severely underutilized, i.e. left unused. This artificial "access limitation" based scarcity is often considered to result from the static and rigid nature of the command and control governance regime. Interested parties have now started to consider possible improvements in the governance regime by relaxing the constraints on spectrum access. Two prevailing models are the "spectrum commons" and the "spectrum property rights" approaches. Spectrum commons theory Under US law, the spectrum is not considered to be the property of the private sector nor of the government except insofar as the term "government" is used to be synonymous with "the people". The original use of the term "the commons" was the practice by which the public at large had a limited access to a bundle of rights regarding use of the commons; each person then had an interest in his own usage rights but the commons themselves were not property, nor were the rights "property" since they could not be traded. The term "tragedy of the commons" was popularized by Garrett Hardin in a 1968 article which appeared in "Science Magazine". The tragedy of the commons illustrates the philosophy that destructive use of public reservations ("the commons") by private interests can result when the best strategy for individuals conflicts with the "common good". In such a scenario, it asserts that even though the contribution of each "bad actor" may be minute, if summed over all bad actors the resource could be degraded to the point of uselessness. This concern has led to the regulation of the spectrum. Spectrum property rights model The spectrum property rights model advocates that the spectrum resources should be treated like land, i.e. private ownership of spectrum portions should be permitted. The allocation of these portions should be implemented by means of market forces. The spectrum owners should be able to trade these portions in secondary markets. Alternatively, the spectrum owners would be able to use their bands in any way they want through any technology they prefer (service and technology neutrality). Although the spectrum property rights model advocates exclusive allocation of transmission rights, it is not the same as a licensed regime. The main difference is the service and technology neutrality advocated in the spectrum property rights approach, as opposed to strict requirements on services and communications technologies inherent in licensed governance regimes. The basic idea of spectrum property rights was first proposed by Leo Herzel in 1951, who was a law student at the time preparing a critique of the US FCC policies in spectrum management. Ronald Coase, a Nobel Prize winning economist, championed the idea of auctioning off spectrum rights as a superior alternative to the status quo in 1959. Coase argued that, though initial distributions may affect matters, property rights in a frequency will lead to the most efficient usage thereof. When he first presented his vision to the FCC, he was asked whether he was making a joke. The supporters of the spectrum property rights model argue that such a management scheme would potentially promote innovation and more efficient use of spectrum resources, as the spectrum owners would potentially want to economize on their resources. The spectrum property rights model is often critiqued for potentially leading to artificial scarcity and the hold-up problem. The hold-up problem refers to the difficulty in aggregation of the spectrum resources (which would be required for high bandwidth applications), as the individual spectrum owners could ask for very high compensation in return of their contribution. Since spectrum is a scarce finite good, there is a perverse incentive to not use it at all. Participants and existing spectrum owners in the spectrum market can preemptively buy spectrum, then warehouse it to prevent existing or newcomer competitors from utilizing it. The existing spectrum owner's official plans for this warehoused spectrum would be save it for an unknown future use, and therefore not utilize it at all for the foreseeable future. In a partial or incomplete "spectrum as property" regulatory regime, incumbent and grandfathered owners who obtained spectrum under the old cause and merit policy, can obtain windfalls in selling the spectrum they obtained for no cost under the earlier regulatory regime. When a regulatory regime changed to the property model, the original merit and cause guidelines for incumbent and grandfathered users are often removed, and no regulatory review mechanism exists to check if the merit guidelines are still being followed, and if not, revoke the spectrum license from the incumbent spectrum owner and reissue the spectrum to a new user under old merit guidelines or sell the spectrum inline with the new "spectrum as property" policy. U.S. regulatory agencies The Communications Act of 1934 grants authority for spectrum management to the President for all federal use (47 USC 305). The National Telecommunications and Information Administration (NTIA) manages the spectrum for the Federal Government. Its rules are found in the NTIA Manual of Regulations and Procedures for Federal Radio Frequency Management". The Federal Communications Commission (FCC) manages and regulates all domestic non-federal spectrum use (47 USC 301). Its rules can be found here: http://wireless.fcc.gov/index.htm?job=rules_and_regulations - Radio Act of 1927 - Communications Act of 1934 - Administrative Procedures Act of 1947 - Communications Satellite Act of 1962 - National Telecommunications and Information Administration – 1978 - Negotiated Rulemaking Act of 1990 - Cable TV Consumer Protection & Competition Act of 1992 - Omnibus Budget Reconciliation Act of 1993 - Telecommunications Act of 1996 International spectrum management The International Telecommunication Union (ITU) is the part of the United Nations (UN) that manages the use of both the RF Spectrum and space satellites among nation states. The Plenipotentiary Conference is the top policy-making body of the ITU, meeting every four years in order to set the Union's general policies. The ITU is divided into three Sectors: the Radiocommunication Sector (ITU-R) determines the technical characteristics and operational procedures for wireless services, and plays a vital role in the Spectrum Management of the radio-frequency; ITU-R Study Group 1 is the Spectrum Management study group; the Telecommunication Standardization Sector (ITU-T) develops internationally-agreed technical and operating standards; and the Telecommunication Development Sector (ITU-D) fosters the expansion of telecommunications infrastructure in developing nations throughout the world, that make up two-thirds of the ITU’s 191 Member States. The ITU Radio Regulations set a binding international treaty governing the use of the radio spectrum by some 40 different services. - Federal Communications Commission - Frequency assignment - Military spectrum management - Broadcast license - Martin Cave, Chris Doyle, William Webb, Modern Spectrum Management, Cambridge University Press, 2007 ISBN 0-521-87669-9 - Radio spectrum as natural resource - Application of the Public-Trust Doctrine and Principles of Natural Resource Management to Electromagnetic Spectrum - FCC tenth annual report - 2004 - annual assessment of the satus of competition in the market for the delivery of video programming - http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-04-5A1.pdf - Digital Crossroads - American Telecommunications Policy in the Internet Age - J. Nuechterlein & P. Weiser - S. Galicia, M. Sirbu, and J. Peha, "A narrowband approach to efficient pcs spectrum sharing through decentralized DCA access policies," IEEE Personal Communications Magazine, pp. 24-34, February 1997. - J. Peha, "Spectrum management policy options," 1998. - [SSRN: http://ssrn.com/abstract=732483 Wireless Communications and Computing at a Crossroads: New Paradigms and Their Impact on Theories Governing the Public's Right to Spectrum Access], Patrick S. Ryan, Journal on Telecommunications & High Technology Law, Vol. 3, No. 2, p. 239, 2005. - L. Herzel, ""public interest" and the market in color television regulation", University of Chicago Law Review - R.H. Coase, "The federal communications commission", Journal of Law and Economics, vol. 2., pp. 1-40, Oct. 1959 - G. R. Faulhaber and D. Farber, "Spectrum management: Property rights, markets, and the commons," in Telecommunications Policy Research Con- ference Proceedings, 2003. - J. Peha, \Spectrum management policy options," 1998 - G. R. Faulhaber, \The question of spectrum: Technology, management and regime change," in The Conference on the Economics, Technology and Policy of Unlicensed Spectrum, East Lansing, MI, 2005. - Study Group 1 # Recent incident of spectrum management conflict: Analysis of LightSquared New Proposal
<urn:uuid:a1309a3f-a993-4c41-b859-53603c71c940>
CC-MAIN-2014-15
http://en.wikipedia.org/wiki/Unlicensed_spectrum
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539230.18/warc/CC-MAIN-20140416005219-00091-ip-10-147-4-33.ec2.internal.warc.gz
en
0.92148
3,628
3.859375
4
Shrubs, along with trees, form the backbone structure of the garden design. They provide huge variation in their form, adaptability, tolerance and usage. They are selected for the colour of flower or foliage and for the shapes that they create, either naturally or by pruning. Shrubs lend themselves well to the formation of Topiary and Hedges. Although some people regard shrubs as miniature trees, they have completely different growth habits. Some can sucker themselves and send creeping underground stems which root and thereby propagate themselves, whilst others renew themselves after hard pruning. CLICK HERE FOR MORE INFORMATION From broadleaf evergreens to deciduous shrubs, from flowering shrubs to those valued chiefly for their foliage or twigs, the diversity amongst this group of plants is infinite. When considering creating a feature or focal point with a shrub, take into consideration its habits – if you want it to retain its emphasis in the design, make sure it is an evergreen. If you want a shrub to make a splash of colour that is ongoing, check the length of the flowering period. Some shrubs are best planted in groups for bold effect. Plant in groups of odd numbers – 3, 5, 7. There is a wide range of shrubs that are quick and dense growing and that are therefore ideal for use as hedges. The native species particularly, lend themselves to this purpose. Try Corokia, Griselinia, Pittosporum varieties. Small, low-growing shrubs such as lavender and thyme are often termed sub-shrubs; a natural plant community dominated by shrubs is called a shrubland. An area of cultivated shrubs in a park or garden is known as a shrubbery. There is an ideal shrub for every purpos: for acting as a screen, for privacy, for softening the lines of the house, for releasing fantastic fragrance or simply for looking beautiful. Come into the Nursery and consult with Harry, Lloyd or Sol – they have heaps of fabulous ideas. A deliciously fragrant Rhododendron with elegant white blooms that open from pale pink buds. A real delight for a semi-shaded, sheltered spot in the garden or equally lovely in a container. Needs protection from harsh frost and acid soil to do really well. Evergreen. Flower Colour: Pink / White Habit: Upright Mature Size 7-10 yrs (HxW): 1.5m x 1m Compact and sturdy with glowing violet purple blooms that have a hint of bronze-green in the throat. Flowers in spring and is much admired. Plant in semi-shade with acid soil for best results. Mulch annually to keep the roots cool Evergreen. Flower Colour: Purple / Red Habit: Compact Mature Size 7-10 yrs (HxW): 1.5m x 1m Splendid indeed with royal purple frilled florets that form large decorative trusses towards late spring. The blooms are highlighted with almost black markings in the throat. A strong erect grower that will perform best in a semi-shaded spot. Prefers acid soil. Evergreen. Flower Colour: Purple / Black Habit: Upright Mature Size 7-10 yrs (HxW): 2m x 1.5m Well the name of this Rhododendron is a bit off putting but what it means is that the beautiful large blooms of reddish purple have an attractive central red zone. Nice compact grower and of course handsome green foliage. Plant in semi-shade in acid soil for best results. Evergreen. Your Rhododendron will appreciate a nice layer of mulch around the surface roots in summer to keep them cool. Flower Colour: Red / Purple Habit: Upright Mature Size 7-10 yrs (HxW): 1.5m x 1m A stunning red Rhododendron with large trusses of up to 18 flowers in cardinal red and a spotted black throat. An excellent shrub for semi shade and prefers moist peat soils. Enjoys a top dressing of peat. Evergreen Flower Colour: Red Habit: Upright Mature Size 7-10 yrs (HxW): 1.5m x 1.5m Small trumpet shaped flowers of soft saffron yellow are ideal to bring light into a shady corner. The leaves are long, narrow and quite glossy. Generous with bloom in mid spring. Happiest in semi-shade with acid soil. Mulch annually to keep the roots cool. Evergreen. Narrow foliage in tones of olive green and an open habit. In spring striking blooms of white, blotched with purple-black appear in nice round trusses. Plant in semi-shade with acid soil for best results. Mulch annually to keep the roots cool. Evergreen. Flower Colour: White / Red Habit: Upright Mature Size 7-10 yrs (HxW): 2m x 1.8m Yes a Rhododendron with variegated foliage in tones of silver and green - very striking and eye-catching. A strong upright grower that blooms mid spring with pretty light mauve-purple flowers. Plant in semi-shade with acid soil. Evergreen. If you like Rhododendrons then it would be criminal not to include this hardy and vigorous cultivar in your collection. Tight trusses of bright carmine pink will put on a wonderful display in early spring. Plant in semi-shade with acid soil for best results. Evergreen. Sir Robert Peel was the founder of the modern day Police Force hence the common names used in the UK for the police:- "Bobbies" and/or "Peelers". Flower Colour: Red Habit: Upright Mature Size 7-10 yrs (HxW): 4.5m x 2m With a name like 'Sneezy' you will not be surprised to learn that this is a dwarf Rhododendron with a low compact habit. The mid spring blooms are soft pink edged with deep pink. Ideal for a semi-shaded spot in the garden or perhaps a container. Prefers acid soil. Evergreen. Flower Colour: Pink / Red Habit: Compact Mature Size 7-10 yrs (HxW): 100cm x 100cm
<urn:uuid:f813cb82-bb1a-4867-bda0-019fc8c99113>
CC-MAIN-2023-40
https://www.wairere.nz/Shrubs/All?show=10&skiprow=750
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510219.5/warc/CC-MAIN-20230926175325-20230926205325-00704.warc.gz
en
0.924457
1,346
2.625
3
- The museum - Online tickets Constantin Meunier (1831 -1905) H. 54.5 cm ; W. 18.3 cm ; D. 14.2 cm Cast by J. Petermann, Bruxelles < Back to collection Meunier was one of the leading Belgian artists of his day. He turned to sculpture after trying his hand at painting. His work focused mainly on the depiction of working people. Like Aimé-Jules Dalou (1838-1902), in particuliar, he was sensitive to the emotion, dignity and sombre beauty that emanated from the figures of manual workers whom he portrayed on several occasions. Compared to Michelangelo because of the power exuding from his sculptures, he infused these subjects with a force echoed in literature by Zola, whose characters also had an innate sense of tragic dignity and strength. As was customary, especially where Rodin was concerned, the work was given by the artist to the French sculptor, after the first Salon de la Société Nationale des Beaux-Arts, in 1890, in exchange for a small group called Women Embracing. In France, Rodin’s support was important for Meunier’s career. They both readily used exaggerated proportions to better indicate the strength of manual workers’ hands or ploughmen’s “colossal” backs, or the attitudes shaped by labourers’ tasks. Portrayed here is a glassblower, a skilled craftsman, an aristocrat among ordinary working men.
<urn:uuid:0631977d-fad1-4618-ad5b-59a05c56e65d>
CC-MAIN-2014-35
http://www.musee-rodin.fr/en/collections/sculptures/glassbower
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500801235.4/warc/CC-MAIN-20140820021321-00247-ip-10-180-136-8.ec2.internal.warc.gz
en
0.964537
331
2.734375
3
30 million tires in Mexico are discarded per year and this volume is expected to grow to 50 million by 2020. But lucky for us there is an environmentally positive solution! The team from HM Energy found and developed a process to convert those pollutant waste tires into valuable commodities like cleaner diesel fuel and carbon black char. They have been chosen as one of the Accelerate finalists and will be in Geneva during the Accelerate 2030 SDG week. We had the opportunity to speak with Israel Magana about his future goals and journey within HM Energy. We have a small lab with three people in Monterrey who are scientists and work in terms of innovation to see what kind of possibilities there are to convert waste into raw materials. By asking ourselves in what ways we could convert industrial output into raw material usable by other industries, we came across waste tires. This issue is out of control. The volume of tires that are globally being thrown away is astonishing. Worldwide, 1.35 Billion scrap tires are generated but only nine per cent 9% of them are being recycled. Basically 91% of them are just lying around, dumped on landfills or in some cases burnt by cement companies, which is very bad for the environment due to the toxic gasses. We looked into the issue and discovered we could convert the waste material into three different products: low carbon emitting diesel substitute (cleaner form of diesel), carbon black char and steel of tire. Some of the products can even be sold back to the tire production industry and therefore creating a sustainable cycle by contributing to the circular economy. We started our project by building a pilot plant. Our two reactors now have the capacity to convert 375.000 tires a year into these three products. Of course there were challenges along the way. The permit application process to be able to start with the hydro carbon process pilot plant turned out to be long and bureaucratic. Getting funding to scale the production as soon as possible is difficult as well. We have no more time to lose in solving this waste issue, but also to tackle the climate change issues that comes a long with this waste stream. Our company is based on constant innovation, however, innovation doesn’t always feel like a milestone. You do little steps every day and then look back after 6 months, realizing the amazing achievements and difference you have made. At the moment our competition are not really waste recycling companies, but traditional non-green product producing ones such as the conventional fuel industry. I would say that our biggest challenge is our non-stop production. Our raw material plant has to produce 24/7, which is quite a challenge for a small company as ours, but we are up for it! We are super proud of the team of people we have put together. They are very passionate about the process and have a strong interest in clean energy. Most of all: they are always willing to go the extra mile which I think is the reason we can differentiate from others who are doing similar things in terms of recycling. To date 50,000 tires have been converted to more than 190,000 litres of diesel substitute. We are planning to scale in Mexico at the moment, our two main goals to have a bigger impact are to shift the recycling rate in Mexico from 9 to 22 % and produce clean and affordable energy for everyone, the Seventh Sustainable Development Goal set by the UN. We are serious about energy cleaning. We want to achieve 15 million litres of green fuel a year and avoid 38.000 ton of CO2 equivalent emissions every year. Right now we are one tenth of that, but we are planning to get to the next level with 10 ten more plants. Our project is scalable to other countries but it depends on finding the right partners. We believe that by structuring this project correctly, we should be able to get the funding we are looking for. We are very much looking forward to the Accelerate week! We are hoping it will help us with structuring our growth plan, and give us a chance to meet other entrepreneurs that face the same issues and challenges and hopefully get in touch with investment funds that want to put capital into a venture that is green and very scalable. This article is one in a series in which we get to know the International Finalists of our Accelerate2030 program a little bit better. Accelerate2030 is a 9-month program co-initiated by Impact Hub Geneva and the UNDP with a mission to scale the impact of ventures that contribute towards the Sustainable Development Goals internationally. All nine finalists will be present at the Impact Hub Geneva from the 6th until the 13th of October during the Scaling week.
<urn:uuid:8c420b0f-9323-4d15-b10f-d9d8d538a6fa>
CC-MAIN-2023-50
https://geneva.impacthub.net/hm-energy-mexico-converting-pollution-into-a-solution/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.13/warc/CC-MAIN-20231206031946-20231206061946-00866.warc.gz
en
0.968455
938
2.59375
3
Users can connect to a Linksys router manually by attaching an Ethernet cable from the router to a computer and typing 192.168.1.1 (the default IP address) in the web browser. This kind of connection is used to setup a router for the first time or troubleshoot problems when a wireless connection is not available. By default, the username and password are “admin” and “password” respectively, but can be changed once the user is logged into the Linksys interface. How to Wirelessly Connect to a Linksys Router Under normal circumstances, you can wirelessly connect to a Linksys router by simply using the 192.168.1.1 IP address in a browser, assuming that the router is plugged in and turned on, of course. For this kind of connection, you do not even need Internet access in order to connect to the router and it is the most common method of connecting to a Linksys router. Keep in mind that any computer used to wirelessly connect to a Linksys router needs a working wireless adapter. The Setup tab on the Linksys router interface contains all of the information necessary for setting up a basic Internet connection. This includes the Host Name, Domain Name, Mac Address, LAN IP Address, WAN IP Address, username and password, and settings for how the router should maintain the network. Most of these default settings can be left on, but an experienced user can change them in order to alter the network. The Wireless tab can be used to setup multiple layers of encryption via encryption keys in order to block third party connections and improve overall network security. The Wireless tab allows the user to choose a Security Mode, an encryption type, a passphrase, and up to four different encryption keys. The user can then even toggle between these different encryption keys by selecting the corresponding number rather than typing in the entire key. The Linksys router interface’s Access Restrictions tab allows users to set standards on what each computer or device is allowed to access over the network. Access Restrictions can be used to block applications and specific types of webpages based on keywords. Access Restrictions can also be used to set up to ten different access policies for each computer or device on the network and can even block a specific computer’s Internet access altogether. DHCP (Dynamic Host Configuration Protocol) is a system that Linksys routers use to randomly assign different IP addresses to all computers in the network so that there is no confusion about which computer is sending or receiving data from the modem. DHCP also allows the router to keep track of all of the network’s devices and makes it easier to setup new devices such as wireless adapters and laptops. The DHCP tab on the Linksys router interface allows users to enable or disable the DHCP server, assign a starting IP address, and set the number of DHCP users on the network. The Advanced tab in the Linksys Router interface is designed to provide the users with sophisticated tools and functions that allow them to setup and modify a range of features that are not otherwise found in Linksys. For example, the user can set up filters for individual IP addresses to prevent some devices from connecting to the Internet through the Linksys router. The user also has complete control over port forwarding, dynamic routing, static routing, and a DMZ Host.
<urn:uuid:ef3b8742-dde0-415f-8287-d0ec51dfa3b8>
CC-MAIN-2020-34
https://www.tech-faq.com/how-to-access-linksys-router.html?replytocom=36478
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735833.83/warc/CC-MAIN-20200803195435-20200803225435-00164.warc.gz
en
0.896757
676
2.84375
3
It’s been record-setting hot lately. Just ask the National Oceanic and Atmospheric Administration (NOAA), which recently released data showing that this was the warmest winter in the continental United States in 121 years of record keeping. Those of us in the know are familiar with the correlation between hotter temperatures and rising greenhouse gas emissions. This is pretty much the foundation of global warming. New data from the oldest carbon dioxide tracker on the planet—located in Mauna Loa, Hawaii—shows that carbon dioxide levels are also elevating to new, unprecedented heights. According to preliminary figures from the station, which is managed by NOAA, the average carbon dioxide level recorded during February 2016 was 404.02 parts per million—3.76 ppm higher than the average for February 2015. If this data holds, it will represent the biggest ever increase over a 12-month period since the station started taking measurements in 1958. The previous 12-month record at Mauna Loa was 3.70 ppm, from September 1997 to September 1998. Both 2014-2015 and 1997-1998 were El Niño years, a warming in the Pacific Ocean sea surface temperatures that not only contributes to elevated atmospheric temperatures but also to increased carbon dioxide levels due to an increase in wildfires. For example, throughout much of the autumn of 2015, massive wildfires engulfed large tracts of Indonesia’s tropical forests, spreading air pollution across wide swaths of the globe. Not only does the new data point to the largest ever 12-month increase in carbon dioxide levels, but it also establishes the biggest rise ever over a calendar year. According to NOAA, in 2015 global carbon dioxide levels rose by 3.09 ppm, significantly beating the previous record of 2.82, set in 1998. Crossing the 400 ppm threshold for a sustained period of time is significant in itself, as many scientists viewed this concentration as a level at which atmospheric carbon dioxide should be stabilized in order to avoid the worst impacts of climate change. Before the start of the industrial revolution in the mid-19th century, carbon dioxide concentrations were around 280 ppm. Carbon dioxide has increased by about 24% at the Hawaii station since 1958. Upon reaching the 400 ppm milestone, Dr. Erika Podest, a carbon and water researcher with NASA, said: Carbon dioxide concentrations haven’t been this high in millions of years. Even more alarming is the rate of increase in the last five decades and the fact that carbon dioxide stays in the atmosphere for hundreds or thousands of years. This milestone is a wake up call that our actions in response to climate change need to match the persistent rise in carbon dioxide. Climate change is a threat to life on Earth and we can no longer afford to be spectators. The Mauna Loa Observatory is more than just a leading carbon-tracking station, it is also one of the most famous symbols of humankind’s impact on Earth. Charles David Keeling, who worked with scientists from the U.S. Weather Bureau and NOAA to set up the station in the middle of the last century, is the namesake of the Keeling Curve, a well-known graph plotting the ongoing change in the concentration of carbon dioxide in Earth’s atmosphere since 1958. The Observatory is located almost 14,000 feet above sea level, reducing any disruption atmospheric readings might experience due to air pollution. Hawaii is also located in the middle of the Pacific Ocean, far removed from many other potential disturbances.
<urn:uuid:d466fbe3-2cfe-4a1a-a963-c90bb72cbfbf>
CC-MAIN-2017-26
http://fusion.net/story/278539/unprecedented-carbon-levels-from-hawaiian-observatory/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320077.32/warc/CC-MAIN-20170623170148-20170623190148-00058.warc.gz
en
0.949029
703
3.96875
4
For today's Geo Quiz we're looking for the land bridge that links southwest Asia with Africa. This triangular peninsula is bounded by Israel's Negev Desert and the Gulf of Aqaba to the east. The Mediterranean lies to the north. The Gulf of Suez and the Suez Canal are to its west. And the Red Sea is to the south. Moses was its most famous explorer. This is where he led the Israelites after they escaped bondage in Egypt. And it's on a mountain top here that Moses is said to have received the Ten Commandments. It's been a strategic battleground throughout the ages. Romans, Byzantines, Arabs, and Turks have all fought to control this peninsula. Centuries later Lawrence of Arabia marched across the sands here. And in the decades that followed World War II, the Egyptians and Israelis battled here many times We were looking for the land bridge that links southwest Asia with Africa. Are you still wandering in the desert? Well ... time is up. The answer to today's Geo-Quiz is: the Sinai Peninsula.
<urn:uuid:e076fe55-adc6-4140-8e03-e1a0239b25e0>
CC-MAIN-2013-48
http://www.pri.org/stories/2008-12-24/geo-quiz-and-answer?qt-latest_content=2
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163055862/warc/CC-MAIN-20131204131735-00071-ip-10-33-133-15.ec2.internal.warc.gz
en
0.966211
226
2.6875
3
There is a lot of interest in recovering waste heat. Combined Heat and Power (CHP) is at the heart of a large part of the distributed generation business. The heat can be used to heat water, provide process heat, and even cooling. Converting waste heat to electric power is getting attention as well. On the bleeding edge, there are a number of efforts underway to do it without moving parts–solid state conversion (of course not limited to waste heat). There are programs, for example to put thermoelectric converters on the exhaust manifold of diesel trucks, with the goal of replacing the alternator. Thermoelectrics, thermionics, thermophotovoltaics — all are being pursued with renewed vigor, in the hope that new physics can overcome the longstanding problem of high cost and very low efficiency…a subject for another day. Waste heat gets wasted only because it tends to be hard to use. A diesel engine converts about 1/3 of the fuel energy to useful work (electric power, in the case of a genset) — the rest goes off as waste heat in cooling water and exhaust — unless a cost-effective means can be found to use it, as in CHP. Making more electric power with the waste heat is another matter. The age-old Rankine cycle, the basis of all steam power plants, can be made to work at lower temperatures by using something other than water as the working fluid ("refrigerant"), typically an organic compound, thus the term "organic rankine cycle" (ORC). In effect, this is a heat pump or refrigerator running backwards. Instead of using mechanical energy to create a temperature difference, mechanical energy is produced by a temperature difference. The main challenge isn’t the theory, it’s the practical difficulty of doing it. Factors such as temperatures (inlet and outlet), flow rates, size and type of heat exchangers, type of expander, materials, controls, etc. must be considered in the trade-offs of cost, performance, reliability and longevity. It’s a lot harder than it looks. Despite many attempts, and the obviousness of the basic idea, there are actually not very many commercial providers of such systems, particularly in smaller sizes which can operate effectively at lower waste heat temperatures. UTC, for example, announced it’s new "PureCycle" 200 kW unit only last Fall. It requires inlet temperatures above 500 deg F. Ormat, (ORA-NYSE) long established ORC maker for geothermal plants, is moving into the industrial waste heat market. They too need relatively high temperature, for units in the 250kw – MW range. They also sell small standalone ORC-based generators which burn a fuel as the external heat source. In Europe, one can find Turboden (Italy), Triogen (Netherlands) and FreePower (UK). All require high temperature, with the possible exception of FreePower, who say they can operate as low as 230 deg F. High temperature means industrial processes that put out high temperature waste heat. Ormat, for example, has a 1.5 MW showcase unit that takes air at 520 deg F from a cement plant in Germany. The water jacket of the lowly diesel engine, however, can only be allowed to go to around 230 deg F (and the water must be returned no cooler than around 215 deg F). While such temperatures can be readily adapted to CHP uses, power conversion is more difficult. Cooler Power, Inc, a startup in California, has successfully built units that work in this range. The engine’s cooling water is taken (before it goes to the engine’s own radiator), and is fed to a heat exchanger where it is heated further by the engine exhaust. In another heat exchanger, the hot water heats and vaporizes the organic working fluid, which then drives the expander which turns the generator. The expander is key. In principle, any compressor technology can work backwards to act as an expander: scroll, screw, turbine, or piston. All have been used at one time or another. Cooler Power initially used a scroll, but then developed its own proprietary modification to a commercially available screw compressor, as the heart of the system. They have a patent in final review stages covering the modification and use of the screw expander, as well as the control system and choice of working fluid. Cooler Power has proprietary software to develop process flow diagrams to size and specify components or installations. The proprietary Program Logic Control (PLC) circuits are designed for optimal failsafe performance and contain algorithms that are protected from reverse engineering. Each of the key components (heat exchangers, expanders, condensers, generators) are designed to last 20+ years and come from one or more sub-sectors of the existing industrial equipment industry. The system can be scaled to fit applications ranging from 50 kW – 1 MW. Installed costs are in the range of $1500-1800/kW. Depending on the sales price for power, payback can happen in 2 years or less. It’s important to emphasize that this is green power, which usually enjoys premium pricing. There is no fuel cost; operating costs are very low; and there are also (monetizable) environmental benefits. A showcase 50 KW beta unit was installed in 1992 at the Newby Island landfill site in Milpitas, CA, on a 1 MW engine. A new 150 kW system will come on line in March. The company anticipates installing 10 units in 2005, with rapid growth thereafter based on already-established customer and marketing relationships, selling both systems and power. They raising an equity investment round currently, and welcome both investor and customer interest. Ray Smith, COO Cooler Power Inc, Redwood City, CA
<urn:uuid:25584fc9-7da5-47a9-922f-557d809b36e3>
CC-MAIN-2017-39
http://www.cleantech.org/2005/01/31/waste-heat-to-power/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690268.19/warc/CC-MAIN-20170925002843-20170925022843-00351.warc.gz
en
0.932428
1,212
3.453125
3
First some background: According to the World Health Organization, more than 220 million people worldwide are living with diabetes. Within the United States, the National Diabetes Fact Sheet cites 23.6 million people, or 7.6% of the population, as currently living with diabetes; and an additional 1.6 million as diagnosed each year. There are two common forms of diabetes: type I and type II. Type I diabetes usually affects an individual at birth, as they are unable to produce insulin in sufficient quantity. Type II diabetes typically occurs later in an individual's life and reflects a decreased ability of cells to utilize insulin. Insulin is a hormone secreted from Beta cells of the pancreas mainly in response to increased glucose levels in the blood. Insulin acts to allow glucose to be taken up by cells in muscle, liver, and fat, and subsequently being converted into stored forms of energy. With the accompanying lack of insulin or its function in diabetes, glucose, the simplest form of sugar, accumulates in the bloodstream, leading to a multitude of pathologies including neuropathic pain. Hyperglycemia (elevated blood glucose) causes small blood vessels to uptake higher levels of glucose, leading to thicker as well as weaker blood vessel membranes. With these thicker blood vessels comes a reciprocal decrease in blood flow, leading to decreased oxygen levels in many organs, including the brain. The decreased oxygen levels in the brain decreases the conduction velocity of neurons and may cause structural changes in brain cells. Additionally, Hyperglycemia causes the upregulation of oxygen radicals as well as the activation of microglia, both of which can damage nerve cells. Microglia are a type of brain cell that act as immune cells of the brain, they respond to infections of the brain and spinal cord. However, their activation in diabetes causes them to release cytotoxic chemicals in absence of infection, which can damage nerve cells. This damage and structural change in nerve cells is thought to be responsible for the phenomenon of diabetic peripheral neuropathy. It has been previously shown that inhibiting microglial activation leads to a dissipation of neuropathic pain in mouse models of diabetes.* It is also well known that both neurons and microglial cells express cannabinoid receptors. The new information: This experiment involved inducing diabetes in mice in the presence and absence of cannabinoid agonists and observing the mice over a course of 8 months. There were six main experimental groups, one of which diabetes was induced without cannabinoid treatment, serving as a control. In a second group, diabetes was induced in conjunction with cannabidiol treatment. It was found that in this second group, neuropathic pain did not develop over the course of 8 months and the levels of activated microglia in the spinal cord were greatly reduced compared to the control. Additionally, when cannabidiol treatment was stopped, the mice continued to show reduced microglia as well as no signs of neuropathic pain. A third and fourth group involved the induction of diabetes and treatment with both CB1 and CB2 cannabinoid receptor agonists once symptoms of neuropathic pain started. The results indicated that both CB1 and CB2 agonists inhibited the symptoms of neuropathic pain, but the pain returned after treatment was stopped. The last two groups involved treatment with CB1 and CB2 cannabinoid receptor antagonists, which block the effect of cannabinoids, and no change was seen in the levels of pain compared to the control group. What this means: This experiment provided more evidence that cannabinoids may be used in the treatment of neuropathic pain. However, the novel information obtained is much more surprising. When treated with cannabidiol at the onset of diabetes, the diabetic mice did not have any symptoms of neuropathic pain even when treatment was stopped. This suggests that treatment with cannabidiol at the onset of diabetes may produce permanent protective changes for nerve cells. Therefore, cannabis could hypothetically be used short-term at the onset of type II diabetes in adults for lifetime or long-term prevention of diabetic peripheral neuropathy. *Tsuda, M., et al. “Activation of Dorsal Horn Microglia Contributes to Diabetes-induced Tactile Allodynia via Extracellular Signal-regulated Protein Kinase Signaling.” Glia. 56.4(2008): 378-86. Toth, C., et al. “Cannabinoid-mediated Modulation of Neuropathic Pain and Microglial Accumulation in a Model of Murine Type I Diabetic Peripheral Neuropathic Pain.” Molecular Pain. 6.16(2010).
<urn:uuid:eb7585ed-58b5-4f90-8ef0-47f0b11732ca>
CC-MAIN-2020-24
http://medigardens.blogspot.com/2010/04/march-2010-cannabinoids-inhibit-and-may.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413406.70/warc/CC-MAIN-20200531120339-20200531150339-00373.warc.gz
en
0.953954
930
3.421875
3
Turkmenistan is a Central Asian state bordering the Caspian Sea between Iran and Kazakhstan. Despite large natural gas reserves, 30 percent of the population lives below the poverty line. The country is the most ethnically homogeneous of the Central Asian republics and, in contrast to other former Soviet states, has been largely free of inter-ethnic violence. Since 2006 the government has taken steps to increase engagement with the rest of the world but Turkmenistan’s human rights record remains poor, and the authorities have yet to clarify the fate of a large number of missing persons. Hundreds of people have been subject to enforced disappearance in Turkmenistan since the early 2000s, according to a campaign called Prove They Are Alive! that seeks to end enforced disappearances and uncover the truth about those people currently missing. In one case in 2002 at least 59 people, including former members of the regime, were charged with conspiracy to assassinate then President Saparmurat Niyazov and sentenced to lengthy prison terms. Families have had no official information about their fate, whereabouts, or health since their arrest and trial. On the International Day of the Disappeared 2014 the Prove They Are Alive! campaign and Human Rights Watch called on the government of Turkmenistan to inform the relatives of the disappeared about the fate and whereabouts of their loved ones and to allow full and ongoing access to those who have been imprisoned.
<urn:uuid:55d3eb1d-869c-44bd-9d04-478856f6bd0b>
CC-MAIN-2020-16
https://www.icmp.int/the-missing/where-are-the-missing/turkmenistan/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370525223.55/warc/CC-MAIN-20200404200523-20200404230523-00337.warc.gz
en
0.966952
287
2.90625
3
TEACHERS-ONLY SPECIAL • FREE SHIPPING ON CREDIT CARD ORDERS SHIPPED TO YOUR HOME ADDRESS • Promo code TEACHER What risks did African Americans take to escape the horrors of slavery? Twenty projects supported with easy-to-read text, timelines, maps, images, sidebars, vocab, and web resources show students what life was like for the thousands of people who risked their lives to gain their freedom. ©2017. Middle school. Reproducible. 8 x 10 inches. Softcover, 122 pages.
<urn:uuid:e2c9623f-56cc-42d1-9e3a-f8e211ea1857>
CC-MAIN-2020-16
https://www.teachersdiscovery.com/product/build-it-yourself-the-underground-railroad-book/social-studies
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496901.28/warc/CC-MAIN-20200330085157-20200330115157-00043.warc.gz
en
0.804648
117
2.875
3
20 Evaluation Essay Topics on Affordable Care Act In the last guide 10 facts on low-cost Care Act for an assessment essay, we discussed interesting facts your could employ to publish a exemplary assessment essay. Now, let’s talk topics. There are lots of names this statutory legislation passes including the Patient Protection and low-cost Care Act (PPACA), low-cost Care Act (ACA) and Obamacare. Its regarded as a law that is significant to reform America’s medical care system because the Medicare and Medicaid legislation that has been passed away in 1965. This legislation aims to help hospitals and basic doctors create dramatically greater results at reduced expenses with better and simpler ways of circulation. This might be founded through the change of current practices with regards to funds, technology and practice that is clinical. Listed here are 20 topics for an assessment essay regarding the low-cost Care Act: - Low-cost Care Act’s effect on the quantity of Uninsured Citizens to have Insurance. - Exactly How Will People In America Get Treatment in Emergency Circumstances Beneath The ACA Initiative? - Just Just Just How Will the ACA Help Patients With Diseases That Insurance Companies Consider Undesirable - Could be the ACA Generating Insurance Less Expensive? - Exactly Just How Will the ACA Law Assistance Small Businesses? - Underlying ACA Mechanism to cut back Premium and Out-of-Pocket expenses of health care? - Solutions the ACA Law proposes to people that are struggling to Afford Coverage. - Identify exactly just How Competitive the web medical health insurance market Established underneath the ACA Law has reached Coverage Plan Comparison - Reviewing Claims of ACA Law on decreasing the Deficit by $100 Billion in a decade and $1 Trillion when you look at the 2nd Decade. - How Will Cash Be Raised Beneath The ACA Law? - Will the ACA Law put an End effectively to Overspending, Fraud and Abuse into the Insurance Industry? - Exactly just How may be the Quality of Health Insurance Being Upheld Under ACA Law? - Exactly Just How Are Arbitrary Life Limits Being Handled Through the ACA Law? - Brand New Accountability Measures of Insurance Vendors Beneath The ACA Law? - Measures for People with Long-Term Care Needs Underneath The ACA Law. - Which are the Advantages for older persons underneath the ACA Law? - Understanding Initiatives when it comes to Improvement Of Public wellness underneath the ACA legislation - Measures Taken when it comes to Rural Areas underneath the ACA legislation - Incentives For pupils to battle Healthcare associated occupations after which Jobs underneath the ACA legislation - Taxation of Insurance Firms Beneath The ACA Act The following is an essay that is sample one of many subjects mentioned above: Evaluation Essay: low-cost Care Act’s effect on the Number of Uninsured Citizens to have insurance coverage The ACA is known as to be probably one of the most laws that are significant in US history. What the law states had been passed away in March 23, 2010 by president Obama, and because been a significant an element of the populace having an insurance protection coverage plan. The ACA has accomplished this through expanding the eligibility requirements of Medicaid in order for citizens under 138% associated with poverty line may be added. ACA has additionally introduced state-sponsored insurance coverage where people and small enterprises could be in a position to purchase insurance policies because of the added advantageous asset of subsidies for many whose earnings lies between 100% and 400% below federal poverty amounts. In https://essaywritersite.com accordance with the commonwealth fund reported on July 2014, around 10 million individuals arbitrarily aged between 19-64 had opted for to choose a medical insurance plan, which amounts to 5% for the working-age populace. Based on Gallup’s report on April 2015, the uninsured price of people aged 18 and over through 2013 to 2015, has drastically fallen from 18per cent to 11.9percent. Likewise the Rand Corporation’s formal report claims that there’s been a extreme aftereffect of ACA on companies providing health care insurance protection plans, because they have actually increased by significantly more than 8 million. Likewise people trying to get Medicaid have actually increased into the quantity by 6 million. Around 4 million folks are increasingly being covered through the federal and state marketplaces and just a little lower than a million individuals opted in order to become uninsured, due to third-party insurance policy plans. While specialists are uncertain in regards to a million individuals opting from the aforementioned insurance policy, it is still an extremely few because it simply represents just one % regarding the working populace. It may be determined that only a little lower than 7.5 million people have opted to decide on market plans and now have effortlessly made re re payments to their premiums. Relating to a study on ACA legislation data, teenagers have actually plumped for to remain to their parent’s protection plan until these are typically 26. Exactly the same study in addition has brought forth welcoming news that following the acceptance for this legislation, your body mass index in teenagers has paid down by the rate that is impressive. Again, evidence that the ACA law has helped enhance total well being additionally the wellness of residents. The ACA legislature in addition has paid off the quantity of medical bankruptcies which can be certainly one of country’s highest-level of bankruptcy declarations. It’s become obvious that deciding on an ACA-issued medical protection plan is helping lessen the general expenses and option of much more affordable plans, even though the amount of people getting insurance coverage is increasing exponentially. Further you will obtain our guide for composing an assessment paper on affordable care act. http://www.tingweb.it/essay-writers-2/20-evaluation-essay-topics-on-affordable-care-act.phpEssay Writers20 Evaluation Essay Topics on Affordable Care Act In the last guide 10 facts on low-cost Care Act for an assessment essay, we discussed interesting facts your could employ to publish a exemplary assessment essay. Now, let’s talk topics. There are lots of names this statutory legislation passes including...AndreaAndrea [email protected]
<urn:uuid:9590250d-7a58-4d11-9f9e-cad58d20d073>
CC-MAIN-2020-10
http://www.tingweb.it/essay-writers-2/20-evaluation-essay-topics-on-affordable-care-act.php
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143079.30/warc/CC-MAIN-20200217175826-20200217205826-00094.warc.gz
en
0.937167
1,293
2.578125
3
Medieval England experienced a surprisingly few number of revolts, especially given the constant threat of war and the rising taxes pushed on peasants to fund the feuds. However, one of the most serious and most notable revolts was the Peasants’ Revolt which occurred during June 1381. Before the Peasants’ Revolt in 1381 a feudal system existed that kept both peasant and landlord relatively happy. England’s strict laws and harsh punishments ensured that peasants adhered to the laws, and peasants were forbidden to travel to different parts of the country to look for new opportunities and higher wages unless they had their lord’s expressed permission. However, there was a series of circumstances that contributed to the uprising that is now known as the Peasants’ Revolt. Causes of the Peasants’ Revolt – Emboldened by the Black Death The peasants who survived the Black Death that ravaged through Europe between 1348 and 1350 believed that there was something special about them. Many felt that they had been protected, possibly by the Almighty, for a purpose. Their survival against one of the most horrifying plagues of all time emboldened them. Their new sense of worth and value gave the peasants the confidence to seek out new opportunities. Peasants felt it was their right to ask for better conditions and higher pay. They were no longer as afraid of the authority that ruled them. The Black Death had also wiped out a large portion of the population, leaving many lords in a position where they had lots of work but a small workforce. The desperate need for labour forced the lords to offer higher than usual wages to peasants to encourage them to leave their villages. However, once they had completed their work, the new lord often refused to allow the peasant to return back home to their original village. The Black Death had given rise to an increase in workers’ rights, despite the attempts by the Government to control the rights of the peasants. These included the Statute of Labourers in 1351 which tried to limit the liberties peasants had as well as cap the wages that they could earn. However, many lords had given their peasants more freedom and higher pay. 35 years after the Black Death peasants were concerned that the lords and Government would revoke their rights and their pay, and this is something that the peasants were more than prepared to fight for to defend. Causes of the Peasants’ Revolt – The War with France By 1381, England had spent a long time at war with France as part of the Hundred Years War. By the time the revolt had started England had been at war with France for more than forty years. Wars inevitably cost money (weapons need to be purchased, troops need to be hired, fed and adequately clothed, etc) and more often than not it was the peasants that were expected to help cover these costs through the form of taxes. In 1380, Richard II introduced a new tax, known as the Poll Tax. The legislation behind this tax said that every registered taxpayer would be expected to pay an additional 5p. This was the third time in four years that a tax of this kind had been enforced on the people. By 1381, the peasants had quite simply had enough of paying high taxes for wars. Causes of the Peasants’ Revolt – Restrictions by the Church Many peasants were made to work on land owned by the church without pay. Some peasants would be forced to give up two days a week to provide free labour in this way. This enforced labour, so close to slavery, meant that the peasants could not find the time to work on their own land. This made it even more difficult for the peasants to provide enough food for their growing families. This scheme served the church but not the people that provided the labour. The peasants were desperate to be free of this burden, and this particular cause was supported by a priest called John Ball from Kent. The combination of these three major factors eventually led to a distinct rise in the unhappiness of the peasant, and before long these signs of strain began to show. Early Uprising in Essex In May 1381, a tax collector arrived at Fobbing, a village in Essex. He was charged with the task of finding out why the people living there had not paid their poll tax. Rather than finding out and returning with the owed monies, the tax collector was thrown out of the village. Later, in June, soldiers arrived to enforce the tax law and establish a sense of order, but they too met the same fate as the tax collector. The villagers of Fobbing had organised themselves since the tax collectors visit, and people from many other local villages in Essex had travelled to Fobbing to join the villagers in their stance. After successfully withstanding the reprisal of the soldiers the villagers decided to head to London to plead with King Richard II, who was just fourteen years old at the time of the revolt. A Marching Army An army of approximately 60,000 peasants marched from Kent and Essex to London. While en-route to London the peasants had destroyed a number of tax records and tax registers. The buildings which housed government records were burned down. When the peasants arrived at London they did something that had never been done before or has never been done since; the peasants successfully captured the Tower of London. Wat Tyler, Jack Straw and John Ball stood out as the leaders of the revolt, and together they petitioned for the abolition of the poll tax, and the abolition of serfdom as well as the right to freely use the forests. The peasants also demanded that the poll tax be abolished. King Richard bravely agreed to face the peasants despite his young age. Waning Discipline and the King’s Ear Despite the fervour of the initial revolt, it was clear to the leaders that by the middle of June the discipline of the peasants was starting to wane. Many peasants took to drinking and looting, and violence began to increase. Wat Tyler and his mean appealed to the peasants for discipline and patience, but the appeals fell on deaf ears. The peasants did however get the King’s ear, and on June 14th King Richard II met the leaders of the peasants at an agreed location, Mile End. At this meeting, Richard II agreed to meet the demands of the peasants and requested that they retire back home in peace. Some did, yet many did not. Instead, they returned to the city and murdered both the Archbishop and Treasurer. The next day King Richard II met the rebels again, this time outside of the city walls. It’s unclear how or why, but at this meeting it seems the Lord Mayor killed Wat Tyler. King Richard II reiterated his promises, and the peasants agreed to end their revolt.
<urn:uuid:255b4c05-71a6-4cf1-97c5-3dc09ebe3439>
CC-MAIN-2023-40
https://www.thefinertimes.com/the-peasants-revolt
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511000.99/warc/CC-MAIN-20231002132844-20231002162844-00598.warc.gz
en
0.984485
1,406
4.3125
4
Hydraulic Press Machine for Deep Drawing A deep drawing hydraulic press operates based on Pascal’s law, which states that pressure applied at one point in a confined fluid is transmitted equally in all directions. The press consists of two main components: a hydraulic cylinder and a punch. The hydraulic system exerts high pressure on a small amount of oil, causing it to move the piston in the hydraulic cylinder, which, in turn, moves the punch. When the metal sheet is placed on the die, the punch moves downward, applying pressure to the metal and forcing it into the die’s shape. The hydraulic press maintains this pressure until the metal has been fully formed. One of the key features of hydraulic deep drawing press is their ability to apply a precise and consistent amount of force to the metal sheet. This is essential for achieving accurate and repeatable results, particularly when manufacturing complex shapes and products. Another important feature of hydraulic deep drawing press is their versatility. These machines can be used to form a wide range of materials, including stainless steel, aluminum, copper, and brass. They can also be used to manufacture products of varying sizes and shapes, from small components to large containers. Another benefit of deep drawing hydraulic press is their efficiency. These machines can form parts at a high rate of speed, which is important for high-volume production environments. They also require minimal operator intervention, which reduces labor costs and improves safety. Deep drawing hydraulic press is used in a wide range of industries and applications. They are commonly used to manufacture automotive parts, such as fuel tanks, exhaust systems, and engine components. They are also used in the aerospace industry to manufacture structural components, such as wing skins and fuselage panels. In addition, deep drawing hydraulic press is used in the production of household appliances, such as kitchen sinks and cookware. They are also used in the manufacturing of industrial containers, such as drums and tanks.
<urn:uuid:4acb5717-6655-4e4c-831a-6dfd7187fcde>
CC-MAIN-2023-50
https://www.blyHydraulicpress.com/hydraulic-press-machine-for-stretch-draw-forming/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100399.81/warc/CC-MAIN-20231202105028-20231202135028-00184.warc.gz
en
0.949901
392
3.03125
3
The Swedish Ombudsman against Discrimination on Grounds of Sexual Orientation (Ombudsmannen mot diskriminering på grund av sexuell läggning), normally referred to as HomO, is the Swedish office of the ombudsman against discrimination on grounds of sexual orientation. HomO is the most recently instituted Swedish ombudsman, in the sense of a government official who addresses the complaints of individual citizens. HomO has the status of a government agency. In 2005 it received around 8 million SEK in government funding. The term HomO is used both to refer to the office, currently with a staff of seven, and as the title of its government-appointed acting head, at present HomO Hans Ytterberg. HomO is the officially mandated short form, but is not a true acronym or abbreviation. Instead the word alludes to both homo = homosexual and to traditional Swedish ombudsman abbreviations which do expand into descriptive terms, such as JämO = JämställdhetsOmbudsmannen (Equal Opportunities Ombudsman). HomO investigates the grievances of individuals and files class action suits on their behalf, for example a recently successful action against a restaurant owner in Stockholm who had harassed a lesbian couple. The HomO office also takes a number of initiatives of its own and submits parliamentary proposals, most recently for a gender neutral marriage act. - Official site for HomO (English) |This page uses content from Wikipedia. The original article was at Swedish Ombudsman against Discrimination on Grounds of Sexual Orientation. The list of authors can be seen in the . As with LGBT Info, the text of Wikipedia is available under the Creative Commons Attribution-ShareAlike 3.0.|
<urn:uuid:a9ec777f-b763-4d4d-8e19-eec378c15db8>
CC-MAIN-2017-26
http://lgbt.wikia.com/wiki/Swedish_Ombudsman_against_Discrimination_on_Grounds_of_Sexual_Orientation
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320695.49/warc/CC-MAIN-20170626083037-20170626103037-00597.warc.gz
en
0.924336
358
2.75
3
9 Fire Ant Facts You Don’t Want Miss Think the common house ant is a pain? Wait until you meet the fire ant. Known for their fiery bites and being nearly immortal, these ants are the last pests you want in your yard or home. Before you start a war with one of the feistiest ants in town, you need learn everything you can about them. - What Are Fire Ants? Fire ants are ants that fall under the Solenopsis genus. They represent just a small fraction of the genus, which includes more than 200 species across the world. Solenopsis are a type of stinging ants, and their stings can be exceptionally painful. Fire ant colonies may contain a single queen or multiple queens. In just a few short months, colonies can expand into the thousands. Queens are the reproductive females in the colony, and tend to be the largest in size. They can live up to seven years, and their only purpose is reproduction. A single fire ant queen can produce 1,600 eggs per day. Some colonies have as many as 250,000 workers. Worker fire ants live about 180 days. On average, it takes 30 days for a fire ant to mature to adulthood. - What Do Fire Ants Look Like? A mature red imported fire ant is brownish-red in color, hence their name. They have three sections: the head, the abdomen and the thorax. They have six legs and a pair of antennae just like any other ant. Black fire ants are worker ants. The average fire ant size is between 2 mm and 6 mm. To get a better idea of what they look like, we recommend searching for pictures of fire ants online. - Red Ant Vs Fire Ant – What’s the Difference? There is no difference between a red ant and a fire ant. Both are common names for ants in the Solenopsis genus. Red ants get their name from their red appearance. Read the rest: http://bit.ly/2vHpn0s
<urn:uuid:91fc7ed1-c101-489c-852c-8fd185d12918>
CC-MAIN-2017-47
http://tejaspestcontrol.com/2017/08/18/9-fire-ant-facts-you-dont-want-miss/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806509.31/warc/CC-MAIN-20171122065449-20171122085449-00018.warc.gz
en
0.938456
430
3.03125
3
Results of a study of birds breeding in forest habitat near Moruya N.S.W, for four seasons from 1975 to 1978 are presented. The breeding season of birds studied is rather short and sharply defined, and occurs between early August and late December. A systematic account of birds observed on wetlands of the Hunter and Richmond Rivers between 1970 and 1977 is given. Numbers of migratory waders and terns on the estuaries were highest between December and early March, and were lowest between late June to early August. Marked annual and seasonal variation in waterbird numbers were observed. […]
<urn:uuid:bb4c1508-632e-49a9-9374-02a15037c7e2>
CC-MAIN-2020-05
https://absa.asn.au/pub/corella/volume-5/issue-1-volume-5/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601628.36/warc/CC-MAIN-20200121074002-20200121103002-00537.warc.gz
en
0.98899
120
2.609375
3
Earthwatch offers environment projects for Volunteers’ Week 01 June 2004 Oxford: Earthwatch, an international environmental non-profit organization, is appealing to the public to mark UK's Volunteers' Week by signing up for a life changing experience on one of its field research projects in 50 countries. Some 4,000 volunteers join Earthwatch annually to work alongside dedicated scientists on established projects and play a role in collecting the research needed to conserve the planet. Volunteer opportunities vary, from gathering data on leatherback turtles in Costa Rica to conserving butterflies and orchids in Spain or monitoring river otters in Chile. The Volunteers' Week is a national celebration of volunteers and volunteering, taking place annually from 1-7 June. The week aims to promote innovative ways to thank, recruit, and involve volunteers while raising the profiles of UK's 22 million volunteers. Know more about UK's Volunteers' Week
<urn:uuid:0b9597a8-9f3f-49b4-86ee-5bc67c30d5fc>
CC-MAIN-2013-48
http://www.worldvolunteerweb.org/nc/take-action/get-involved/doc/earthwatch-offers-environment-projects/print.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164026971/warc/CC-MAIN-20131204133346-00057-ip-10-33-133-15.ec2.internal.warc.gz
en
0.93563
185
2.703125
3
Levy’s research shows that even under the stable temperature conditions of the Dry Valleys, recent increases in sunlight are leading to Arctic-like slump conditions. If Antarctica warms as predicted during the coming century, the melting and slumping could become that much more dramatic as warmer air temperatures combine with sunlight-driven melting to thaw ground ice even more quickly. Ground ice is not the major component of Antarctica’s vast reserves of frozen water, but there are major expanses of ground ice in the Dry Valleys, the Antarctic Peninsula and the continent’s ice-free islands. Garwood Valley could tell the story of what will happen in these “coastal thaw zones”, says Levy. “There’s a lot of buried ice in these low-elevation coastal regions, and it is primed to melt.” Co-authors on the paper were Andrew Fountain of Portland State University, James Dickson and James Head of Brown University, Marianne Okal of UNAVCO, David Marchant of Boston University and Jaclyn Watters of The University of Texas at Austin. The research was supported by a grant from the National Science Foundation (NSF). Check the following link to read/download the Full Study – “Accelerated Thermokarst Formation in the McMurdo Dry Valleys, Antarctica”: Source: The University of Texas at Austin.
<urn:uuid:58d36813-595c-4c5d-9342-92dbcac90955>
CC-MAIN-2020-05
https://thinktosustain.com/2013/08/coastal-antarctic-permafrost-melting-faster-than-expected/2/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251672440.80/warc/CC-MAIN-20200125101544-20200125130544-00107.warc.gz
en
0.923794
299
3.90625
4
How to Help If Someone You Know Has Been Raped or Sexually Assaulted It is not always easy to know what to say or do when someone tells you they have been sexually assaulted, especially when that person is a family member, friend, or loved one. Here are some ways you can help: - Listen without criticism, judgment, or condemnation. Be there as support, and let them tell you what they are willing to share. Understand the survivor may be feeling many emotions, and emotional reactions are a natural response to trauma. Do not minimalize their feelings. - Believe the survivor. Even if they sometimes doubt themselves, even if their memories are vague, even if what they tell is upsetting, you need to be willing to enter those difficult places with them and to receive their words with respect. - Give support and resources. Share resources like The Center for Women and Families hotline 844-BE-SAFE-1 or websites like www.rainn.org or www.thecenteronline.org, but realize that only they can make the decision to get help. Ask them what you can do to help. Encourage them to practice good self-care during this difficult experience. - Offer to go with them. Accompany them to get medical care and a forensic exam. - Educate yourself. If you have a basic idea of what the survivor is going through, it will help you to be supportive. - Never blame the victim or yourself. Victims often blame themselves. Many partners and family members also insist on blaming themselves. In fact, sexual assault is no one’s fault except the offender. - Be Patient. Remember, there is no timetable for recovering from trauma. Avoid putting pressure on them to engage in activities they are not ready to do yet. - Get help if the survivor is suicidal. Most survivors are not suicidal, but sometimes the pain of the abuse or rape is so devastating that the survivor may contemplate suicide. Mentions of a desire to cause oneself harm should always be taken seriously. If your loved one speaks of suicide or self-harm, get help immediately. You can contact the National Suicide Hotline for support and resources at 1-800-273-8255. If Someone You Know Is in an Abusive Relationship If a friend or family member is in an abusive relationship, be aware that they may have a very different point of view than you. They may have heard the abuse was their fault and feel responsible. Even if they know it is an abusive relationship, they may choose to stay in the relationship. As a loved one, try to be there for them because although they may not show it, they need you more than ever. Here are some ways you can help: - Acknowledge that they are in a very difficult and scary situation. Be supportive and listen. Let them know that the abuse is not their fault. Reassure them that they are not alone and that there is help and support out there. It may be difficult for them to talk about the abuse. Let them know that you are available to help whenever they may need it. What they need most is someone who will believe and listen. - Be non-judgmental. Respect your friend or family member’s decisions. There are many reasons why victims stay in abusive relationships. They may leave and return to the relationship many times. Do not criticize their decisions or use guilt or shame to get them to leave their abusive partner. They will need your support even more during those times. - Help them develop a safety plan. Check out our information on safety planning or visit www.thehotline.org for tips for wherever they are in their relationship. - Encourage them to participate in activities outside of the relationship with friends and family. Support is critical. The more they feel supported by people who care for them, the easier it will be for them to reach safety and stay away from their abusive partner. Remember that you can call our crisis and information line 1-844-BE-SAFE-1 to find local support groups and information on staying safe. - Encourage them to talk to people who can provide help and guidance. The Center provides counseling, support, and other resources for those in abusive relationships. Call us at 1-844-BE-SAFE-1 to talk to a trained advocate. Offer to go with them when they get help. If they have to go to the police, to the courthouse or to a lawyer, offer to go along for moral support. - If they end the relationship, continue to be supportive of them. Even though the relationship was abusive, your friend or family member may still feel sad and lonely once it is over. They will need time to mourn the loss of the relationship and will especially need your support at that time. - Remember that you cannot “rescue” them. Although it is difficult to see someone you care about get hurt, ultimately they are the one who has to make the decisions about what they want to do. It is important for you to support them no matter what they decide, and help them find a way to safety and peace. The Center is here to help. If you have other questions about what you can do to help or just need support for yourself call us anytime, day or night, at 1-844-BE-SAFE-1.
<urn:uuid:7de47300-cbf3-40f0-9eb7-16f21280a2c6>
CC-MAIN-2017-26
https://www.thecenteronline.org/get-help/friends-family/help/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320023.23/warc/CC-MAIN-20170623063716-20170623083716-00395.warc.gz
en
0.972198
1,106
2.546875
3
What are you looking for? Learn To Format Your Essay A List Of Compare And Contrast Essay Topics On Religion Religion is the core of existence for many people. The belief system includes the values by which an individual orders his or her life. Being asked to write an essay on religion opens a world of learning to you. It is the opportunity to review another belief system and evaluate it objectively. You are able to compare the values shared and note the differences two religions have. The following is a list of compare and contrast ideas from which you can choose an interesting title. - The Role of Women in Islam and Christianity. - Rites of Passage of the Buddhists and Hindus. - Does the afterlife differ between animists and Jews? - The Role of Parents in Roman Catholic and Eastern Orthodox Families. - The Southern Baptist and Pentecostal Views of Salvation. - What Images and Religious Art mean in the Buddhist and Roma Catholic experience. - Marriage customs in the Islamic and Hindu traditions. - Zen Monks and Benedictine Monks. - War in the Koran and the Bible. - The Sermon on the Mount and the teachings of Buddha. - Moslem Angels and Christian Angels. - The role of God in everyday Moslem and Jewish Lives. - Heaven in the eyes of Christians and Jews. - Reincarnation among Hindus and Buddhists. - Christ and the Buddha. Similarity and Difference. - Reverence shown to Christian and Moslem shrines. - Christian and Buddhist Shrines: what is the same and what is not. - Christian monotheism and Hindu polytheism: what are the values? - Jewish Passover and Protestant Easter. - The concept of death between Jews and Moslems. - Roman Catholic Views on Science: Past and Present. - Religion in Southeast Asia. - The Beliefs of African tribesmen of Kenya. - Politics and Buddhists. - Reactions to Anti-Semitism among Christian denominations. - Moslem and Christian neighborhoods. - Social justice and Moslem sects. - Ritual sacrifice among American tribes. - Impact of modernity on Islam. - Children in the Buddhist and Jewish traditions. You need to be careful as you construct the essay. This is not an opportunity to condemn or judge harshly some other religion. You are instead being asked to look at the evidence and see where there are contrasts or similarities. The assignment challenges your ability to be objective. It furthermore provides an opportunity for you to look at other beliefs and find out more about them. The paper opens a window to other religions you were not able to look through before. By doing the research you come to know more about some other culture’s values. You will likewise develop a better understanding of your own.
<urn:uuid:e87c883e-840b-4c37-8348-9f8e7cc1767b>
CC-MAIN-2017-34
http://www.artonline4u.com/thirty-strong-compare-contrast-essay-topics-on-religion
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104160.96/warc/CC-MAIN-20170817210535-20170817230535-00529.warc.gz
en
0.896874
583
3.15625
3
A practical guide for coastal resource managers to reduce damage from Catchment areas based on best practice case studiesResource Type: Tools / Applications The Critical Site Network (CSN) Tool is a new online resource for the conservation of 294 species of waterbirds and the important sites upon which they depend in Africa and Western Eurasia. Leading global conservation organisations working for the protection of waterbirds and their habitats have joined forces to develop this tool, strengthening the implementation of the African-Eurasian Migratory Waterbird Agreement (AEWA) and the Ramsar Convention on Wetlands.Resource Type: Tools / Applications One third of the world’s population lives in coastal areas and rapid development of these areas has meant increased construction of coastal infrastruc- ture (e.g. ports, navigation channels, coastal de- fence) and related activities (e.g. land reclamation, beach nourishment), which has inevitably led to conflicting priorities between coral reef conservation and economic growth. The key impacts of these ac- tivities, if not managed, include: • Direct loss of coral reef caused by the removal or burial of reefs • Lethal or sub-lethal stress to corals caused by elevated turbidity and sedimentation rates Dredging and port construction activities potentially affect not only the site itself, but also surrounding ar- eas, through a large number of impact vectors (e.g. turbid plumes, sedimentation, release of contami- nants, bathymetric changes). Effects may be imme- diate or develop over a longer timeframe and may be temporary or permanent in nature, depending on a large number of factors. ©2014 UNEP All rights reserved
<urn:uuid:27f7027a-0077-42d3-8a3b-f0d3ccda0d96>
CC-MAIN-2014-10
http://www.unep-wcmc.org/datasets-tools--reports_15.html?%0A%09%0A%09%09&types=Website,Tool&q=%0A%09%0A%09%09%0A%09%0A%09%09%0A%09%0A%09%09%0A%09%0A%09%09%0A%09%0A%09%09%0A%09%0A%09%09%0A%09%0A%09%09&ctops=Coastal,Poverty%20Reduction,Marine%20PAs,Impacts,Marine%20PAs,Habitats
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678699570/warc/CC-MAIN-20140313024459-00063-ip-10-183-142-35.ec2.internal.warc.gz
en
0.903836
349
3.078125
3
Age-related macular degeneration (AMD) is the leading cause of blindness in Americans over the age of 65. The disease results from damage to the center part of the light-sensitive retina, the place where light rays come to a focus in the eye. This yellow-colored center is called the macula or macula lutea, and it is the place where our most detailed vision occurs. It is an extremely metabolically active area. The cone cells are packed tightly together in the macula, and each cone cell has a nerve fiber that communicates with the visual areas of the brain. Destruction of the macula imperils central vision, and once it has deteriorated sufficiently, there is no known treatment that can restore vision. There are two forms of macular degeneration. The common “dry” form occurs in 90% of cases. It develops slowly, and while it does not cause complete blindness, patients experience a significant loss of vision. About 10% of patients develop the “wet” form of macular degeneration. Blood vessels under the retinal begin to grow offshoots that exude and bleed into the retina, causing scarring and blockage. These new blood vessel offshoots are abnormal, and they easily become leaky. The resultant blinding can be rapid and severe. Only regular eye examinations can detect these problems before there is vision loss. See more graphics here. To understand causation and treatment, it is important to know that the macula has a very high concentration of yellow pigments, derived primarily from two carotenoids, lutein and zeaxanthin and one of its stereoisomers meso-zeaxinthin that work together for maximum antioxidant result. This pigment layer under the retina, the RPE or retinal pigment epithelium, nourishes the macula and removes waste from the photoreceptor cells (the cones). Lack of proper nutrition can thus hasten macular destruction. Good oxygen supply has a preventive effect by stimulating RPE cells, but poor blood flow diminishes this effect. Supplementation with these two carotenoids and Omega-3 fatty acids (DHA and EPA) is essential and can acturally thicken a degenerated RPE. (reference 1, reference 2, reference 3) Important Causative Factors of Macular Degeneration • Free radical damage that occurs when ultraviolet blue light from the sun passes through the eye lens. Smoking, poor nutrition and weakened immunity all increase free radical activity. • Deficient supply of nutrients including lutein, zeaxanthin, zinc, taurine, B vitamins, and essential fatty acids. This can be attributed to either insufficient intake or poor digestion. Multiple studies indicate the protective effect of spinach and lutein. Zeaxananthin can be made from lutein. • Oxidized fatty waste products have also been implicated as causal factors (Spaide et al., 1999). Tiny waste products called drusen accumulate in and behind the retina and may stimulate macrophages to produce damaging inflammation. Moreover, a large epidemiological study (Beaver Dam Eye Study and Nutritional Factors in Eye Disease Study) showed that a high intake of saturated fat and cholesterol was associated with increased risk for early age-related macular disease (Mares-Perlman et al., 1995). • Oxygen or nutrient starvation, which triggers chemical signals that initiate abnormal blood vessel growth. Examinations show that elderly patients often have less than 2/3 the blood flow to back of the eye that occurs in younger people (Abel, 1999). Natural medicine treatment centers on improving both blood flow and macular nutrition. Patients should examine digestion and general health (see webiste discussion of digestion), take an eye vitamin rich is basic nutrients, as well as a tonic herbal supplement of sufficient potency. Important herbs include tien chi root to remove blood congestion (high doses in wet form), dang gui root to nourish the blood, triphala an antioxidant eye tonic, salvia root to improve circulation and reduce inflammation, blueberry or bilberry to provide nutrients, hawthorn to open blood vessels, lycium fruit (also called wolfberry) to nourish, ginkgo leaf to increase microcirculation and improve oxygen tranport across nerve cell membranes (use with caution in wet form), ginseng root to strengthen digestion, and the following nourishing tonics good for the eye: American ginseng root, cooked and raw rehmannia, wild asparagus root, shilajatu, and elderberry. Note – Chrysalis Herbal Medicine Clinic in Delaware has developed several specialized combinations such as iHeal and iFolia with these herbs, and advisor ophthalmologist Robert Abel Jr, MD has developed a formula for the macula which has key advantages over AREDS II )
<urn:uuid:71ebcc91-66bc-482f-bd13-3fa0a273d2d4>
CC-MAIN-2017-39
http://www.chrysalisnaturalmedicine.com/macular-degeneration/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690112.3/warc/CC-MAIN-20170924171658-20170924191658-00531.warc.gz
en
0.911112
1,003
3.546875
4
The Japan Aerospace Exploration Agency (JAXA) and NHK (Japan Broadcasting Corporation) have successfully performed the world’s first high-definition image taking by the lunar explorer “KAGUYA” (SELENE,) which was injected into a lunar orbit at an altitude of about 100 km on October 18, 2007, (Japan Standard Time. Following times and dates are all JST.) The image shooting was carried out by the onboard high definition television (HDTV) of the KAGUYA, and it is the world’s first high definition image data acquisition of the Moon from an altitude about 100 kilometers away from the Moon. The image taking was performed twice on October 31. Both were eight-fold speed intermittent shooting (eight minutes is converged to one minute.) The first shooting covered from the northern area of the “Oceanus Procellarum” toward the center of the North Pole, then the second one was from the south to the north on the western side of the “Oceanus Procellarum.” The moving image data acquired by the KAGUYA was received at the JAXA Usuda Deep Space Center, and processed by NHK. The satellite was confirmed to be in good health through telemetry data received at the Usuda station. View JAXA’s movie here.
<urn:uuid:48107767-361a-4087-8286-076984017d67>
CC-MAIN-2023-23
https://www.astronomy.com/science/seeing-the-moon-in-hd/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643784.62/warc/CC-MAIN-20230528114832-20230528144832-00543.warc.gz
en
0.969212
282
2.859375
3
Quiz 170: General Knowledge for SSC-CGL Examination Watch Video Here 1. Which among the following is true about Total Internal Reflection? 2. When light from some sources enters to the earth’s atmosphere, it gets scattered. Which among the following is a reason behind scattering? 3. Which among the following is true about latent heat ? 4. Which among the following is a property of Insulator? 5. Equal volumes of all gases contain equal number of molecules under similar conditions of temperature and pressure. Which law says this ? 6. Ohm is a unit of measuring _________? 7. Under article 368 the Indian Constitution provide methods of Amendment of different portions of the constitution? 8. Which among the following is true regarding the resignation of the speaker and deputy speaker ? 9. The railings of the Sanchi Stupa were made during ? 10. Kharvela who constructed caves in the Udaigri for jain Monks was a ruler belonging to which dynasty ?
<urn:uuid:4dee6b76-2471-4d2c-82a9-a254d3c94658>
CC-MAIN-2020-16
https://www.gktoday.in/quiz-170-general-knowledge-for-ssc-cgl-examination/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371656216.67/warc/CC-MAIN-20200406164846-20200406195346-00318.warc.gz
en
0.942651
215
3.046875
3
SMART stands for Self-Monitoring, Analysis, and Reporting Technology. It's a tool that is included in hard drives to alert users to a potential hard drive failure. Recently, cloud service provider Backblaze released data showing exactly how the data produced by SMART can be used to predict a failing hard drive. SMART monitors 70 metrics to keep track of the health of a hard drive. Data from Backblaze showed that five of these metrics are highly effective at predicting hard drive failure. The most useful SMART metrics, according to Backblaze, are SMART 5, 187, 188, 197 and 198. These correspond to the following errors: Reallocated_Sector_Count, Reported_Uncorrectable_Errors, Command_Timeout, Current_Pending_Sector_Count, and Offline_Uncorrectable. If your SMART software reports large numbers of these errors, then you might want to back up your data and prepare for hard drive failure. SMART 187 is a particularly good indicator of a pending hard drive failure. According to Glen Budman, the CEO of Backblaze, hard drives with a SMART 187 statistic of zero hardly ever fail, but the company schedules drives for replacement as soon as this metric starts registering errors. Other SMART metrics that one would expect to be connected with hard drive failure actually showed no correlation at all, which surprised the Backblaze analysts. For example, SMART 12, which measures how many times a drive is powered up, might be expected to correlate with hard drive failure. However, the evidence actually reveals that SMART 12 alerts don't show a clear linear correlation with hard drive failure. These findings are very useful for IT admins, as they could help predict hard drive failure, which occurs when a drive won't power up, fails to respond to commands, or cannot be read or written. Once this failure has occurred, retrieving important files and data from the drive could be difficult or impossible. Predicting hard drive failure reminds administrators and other users of the importance of backing up vital information before it is lost for good. Cloud storage is an alternative option for storing data, and it eliminates some of the risks of hard drive failure. Using cloud storage means handing the responsibility for keeping your data safe over to cloud service providers such as Backblaze, who are experts in monitoring their data centers and keeping customers' data safe. Cloud computing is also a secure way to store your important personal or business data, as encryption technology is used to keep hackers out. Although SMART monitors an overwhelming 70 metrics to assess the health of a hard drive, only five of these metrics were strongly correlated with hard drive failure. Looking at these five metrics could help users work out when their hard drives are approaching the ends of their lives. Photo courtesy of Sorapop at FreeDigitalPhotos.net Become a member to take advantage of more features, like commenting and voting. Register or sign in today!
<urn:uuid:e0c25bb7-7200-4aed-9dce-1584e6930944>
CC-MAIN-2023-23
https://www.salesheads.com/articles/SMART-can-Predict-When-Hard-Drive-Dies-16172-article.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657144.94/warc/CC-MAIN-20230610062920-20230610092920-00152.warc.gz
en
0.946977
606
2.765625
3
Early in my mother's pregnancy, she became aware her father had a terminal illness. He died two months before I was born. I'm almost 70 years old but have always wondered: What do we know, if anything, about the long-term impact of a traumatic event on human development? Illustration by Slug Signorino First let’s define trauma. Back in the days when medical insight consisted largely of old wives’ tales, it was regularly claimed a pregnant woman shouldn’t spend too much time around fish lest her child be born scaly. Cut to the present: nobody doubts there are some things a pregnant woman can experience or do — alcohol or drug use, smoking — that can mess up the eventual kid. The question is about traumas that fall between these two poles. Combing through the scientific literature — we didn’t go trolling on the crackpot sites for this stuff — we find the following remarkable assertions: - The prevalence of autism among children in Louisiana increased with the severity of prenatal exposure to hurricanes. - A higher-than-expected number of craniofacial malformations and heart defects were found in babies born to women whose older child died unexpectedly during the pregnancy. - Being a crime victim or experiencing the death of a relative was associated with increased risk of — get ready for this, LoDub — spontaneous abortion. OK, you seem to have dodged that particular bullet. But you did say you wondered about the long term. Does your columnist sound skeptical? It’s a little more complicated than that. To be clear: maternal stress can be bad for a fetus. When life gets rough, what are collectively known as stress hormones circulate in the bloodstream. In a pregnant woman, these can be shared with the fetus, possibly affecting brain and body development. Three areas of the developing brain seem especially sensitive to stress hormones: the hippocampus, which plays a role in memory; the amygdalae, involved in mood and emotional responses; and the frontal cortex, implicated in decision-making and attention. Sure enough, most gestational stress-related problems reported to date involve intellectual and emotional development. One study found a link between maternal stress during the first trimester and poor attention span and concentration in the resultant offspring. Another found children of highly stressed mothers exhibited more crying, irritability, and temper tantrums as well as ADHD, schizophrenia, and depression. Some claims are harder to swallow. Several researchers have looked into the consequences of maternal stress due to weather disasters and other unpredictable events, on the theory that these “natural experiments” offer a more objective demonstration of stress. I listed a few such findings above; here are a couple more: - One study of children of mothers who had experienced high stress while pregnant during a 1998 Quebec ice storm found they had lower IQs and language scores than kids of low-stress moms. - Another study found children of women who’d lived through a major earthquake during pregnancy had a higher incidence of depression. At first glance the problems attributed to prenatal stress in these cases seem implausibly diverse: Hurricanes produce autism. Earthquakes lead to depression. Ice storms reduce intelligence. Conceivably each type of natural disaster has a signature outcome, but a simpler explanation is that the results are happenstance and non-confirming findings weren’t written up. One research team (Kinney et al, 2008) suggests the bad things supposedly produced by stress aren’t as random as they seem. Rather, they argue, reduced intelligence, poor language skills, depression, and so on are part of a cluster of conditions associated with autism. Among other things, they point to that Louisiana hurricane research, conducted by another Kinney-led team, which found autism diagnoses were significantly higher among children whose mothers had had the severest exposure to storms during several critical months of pregnancy. But the number of autism cases was tiny — 167 children out of more than 300,000 born during hurricanes. (The research focused on storms from 1980 to 1995, before relaxed criteria created a boom in autism diagnoses.) Sure, maybe natural disasters triggered autism in a handful of vulnerable babies, but that just meant a then-rare condition got slightly less so. This points to a larger problem. Even if all the claimed effects of stress are genuine, so what? No one disputes the general proposition that prenatal trauma can be harmful. Most expectant women already know they shouldn’t expose their babies to avoidable everyday stress, and natural disasters and such are usually unpredictable. Even if we acknowledge that calamities merely highlight the dangers of lesser traumas, telling pregnant women they should avoid having anything go wrong in their lives during gestational months 5, 6, 9, and 10 would surely take the prize for stupid advice. Most children exposed during such times develop normally; any intimation to the contrary would create maternal stress galore, magnifying the problem you were trying to reduce. We thus find ourselves toying with an odd suggestion for the world of science: By all means find out what you can about the impact of prenatal stress on postnatal development. But if you establish what it looks like you’re going to establish, please keep it to yourself. Send questions to Cecil via [email protected].
<urn:uuid:1d13f3aa-5abf-424a-b097-e18249c252b6>
CC-MAIN-2020-24
https://www.straightdope.com/columns/read/3176/does-prenatal-trauma-affect-development/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347392057.6/warc/CC-MAIN-20200527013445-20200527043445-00459.warc.gz
en
0.961733
1,092
2.6875
3
Last updated on September 5th, 2022 at 08:22 am When the right person has a Pomeranian, it can be a very sweet and loving puppy. There is often a question about when Pomeranian puppies stop growing since these dogs are very small. Dogs grow at different rates. Dogs of the same breed can grow at different rates due to genetics. It typically takes a Pomeranian about 18 months to reach adulthood. Here are When do Pomeranians stop Growing When Does A Pomeranian Puppy Grow Up Pomeranian puppies usually reach full adult size by one year of age. The first year of a Pomeranian’s life is equal to 15 years of a human’s life. Pomeranians can continue growing and filling out up to 18 months of age. A Pomeranian puppy is usually fully grown by the time it is one year old, but there are some variations within the breed. Some Pomeranians continue to grow. A Pomeranian weighs between three and seven pounds, making it a small dog breed. A variety of colors are available in their fluffy coats. With an average lifespan of 12 to 16 years, Pomeranians are known for being relatively long-lived for a small breed of dog. The Pomeranian breed is considered a small dog, but some continue to grow throughout their lives. Most likely, this is due to Pomeranians blending German Spitz, Samoyed, and Keeshond breeds. Pomeranians may inherit the genes that cause them to keep growing throughout their lives. Some Pomeranians will reach their full size in one or two years, but this is not always the case. What Are The Signs Of A Full-Grown Pomeranian? At full maturity, a Pomeranian weighs between 3 and 7 pounds. They will have a thick, double coat that may be straight or slightly wavy. There are many coat colors, including orange, black, white, cream, brown, and sable. A thick ruff of fur also covers the necks of Pomeranians. The average lifespan of a fully grown Pomeranian is 12 to 16 years. Are some Pomeranians bigger than others? Yes, some Pomeranians are bigger than others. It is common for Pomeranians to weigh up to 7 pounds, while others may weigh only 3 pounds. Pomeranians weigh about 4 pounds on average. Several factors can affect the size of a Pomeranian, including its parents, diet, and activity level. When do Pomeranians stop growing Pomeranians are tiny dogs, but they are not toy breeds. A healthy diet and regular exercise are still necessary for them. Three to four feedings a day are recommended for puppies. High-quality puppy food should be given to them. It is possible to switch them to adult food after six months. It’s time to start using a training crate when your puppy is 4-5 months old. After six months of age, Pomeranians should be fed twice a day. It is also important for Pomeranians to exercise properly. The dog should be walked several times daily if you don’t have a yard. It is well known that Pomeranians are very active dogs. This breed should weigh between 3 and 7 pounds. Your veterinarian should be consulted if your Pomeranian is overweight. The teeth of your Pomeranian should also be checked. Flavored toothpaste should be used daily to brush their teeth. It is also possible to see the results at the vet or groomer. How Do I Know What Size My Pomeranian Will Be? Pomeranian puppies can vary widely in size, even within the same litter. If you keep these things in mind, you’ll be able to get a better idea of what size your Pomeranian will be as an adult. - The size of the parents is an important first step – typically, a Pomeranian will be somewhere between the size of the mother and the size of the father. - It would help if you also considered the weight and height of the Pomeranian puppies at birth – those that are larger at birth will typically be the biggest adults. - Also, remember that Pomeranians are generally larger than their female counterparts. As a result, you should have a better idea of what size your Pomeranian will be as an adult, though there is still some element of guesswork. How a Pomeranian’s growth affects him Pomeranians undergo several changes as they grow, impacting their overall health and well-being. A thicker coat and stronger bones are some of the benefits he can expect. The weight that he will gain, as well as the muscle mass that he will gain, will also increase. Likely, any of these changes can affect a Pomeranian’s energy levels, mood, and overall health. Pomeranian’s growth must be monitored to ensure that he grows at a healthy rate and gets the right nutrition and exercise. At what age do Pomeranians calm down? The teething stage is winding down in the 7-9 month period. Poms are just about reaching their adult weight at 10 months old. It is just about time for the adult coat to arrive. The 1-year-old Pomeranian is an adult (the human equivalent of a 15-year-old teen). What does a full-grown Pomeranian look like? Pomeranians are true “toy” dogs, with an ideal height of eight to 11 inches and three to seven pounds (1 to 3 kilograms). By the time they are seven to ten months old, they are often at their mature size. The luxuriant double coat of Pomeranians is easily distinguished from their foxy faces and alert, prickly ears. How can I tell if my Pomeranian is purebred? Suppose a Pomeranian dog is purchased from a reputable, licensed breeder that supplies dogs to dog shows. In that case, it is 99% of the time to assume it to be a purebred Pomeranian (unless the breeder has forged papers). Are Pomeranians one-person dogs? It is possible to describe Pomeranians as affectionate without going overboard. Their human family quickly becomes extremely important, and they often choose one person to be their special human. Any reason for separating a Pomeranian from its owner is unacceptable to them. How do I know if my Pomeranian is happy? Your dog will show you some really clear signs that they are happy: 1. Tails that are high and waggy. Your dog is probably the happiest when it displays this behavior. 2. Ears that flop. 3. Their bodies are relaxed. 4. It’s a playful relationship. 5. You feel them leaning in. Pomeranian dogs are small but won’t stay that way forever. Between the ages of 1 and 3 years, depending on their breed and their parents’ genetics, they will reach their adult size when a Pomeranian puppy reaches its full adult size. This is a question many owners ask when they are looking to buy a Pomeranian puppy. The last thing you want is to buy a dog that will outgrow your home. You must log in to post a comment.
<urn:uuid:378de6f1-462b-47c4-adb0-54015958d190>
CC-MAIN-2023-14
https://dogsocat.com/pets-animals/when-do-pomeranians-stop-growing/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949097.61/warc/CC-MAIN-20230330035241-20230330065241-00177.warc.gz
en
0.962945
1,584
2.671875
3
According to new research published in the journal PLOS ONE, researchers from the Charles C. Gates Center for Regenerative Medicine and Cell Biology at the University of Colorado School of Medicine in Denver, Colorado, and Taiga Biotechnologies, Inc. have discovered a new method to increase the production of stem cells used to treat patients with cancer undergoing bone marrow transplants. The team of researchers designed proteins that can be directly administered to blood stem cells to increase multiplication. Dennis Roop, PhD, director of the Gates Stem Cell Center, says that researchers have long tried to increase the number of stem cells in vitro with minimal success, until now. Researchers have successfully studied this new method with blood stem cells from cord blood, adult bone marrow, and adult peripheral blood. The researchers hope to start human clinical trials soon to test the new method. Taiga Biotechnologies, Inc. is already in the process of doing just that, and hope to study the method in patients with leukemia, lymphoma, myeloma, and certain solid tumors, as well as patients with autoimmune diseases, inborn immunodeficiency, and metabolic conditions. A team of scientists from the University of Colorado School of Medicine has reported the breakthrough discovery of a process to expand production of stem cells used to treat cancer patients. These findings could have implications that extend beyond cancer, including treatments for inborn immunodeficiency and metabolic conditions and autoimmune diseases. In an article published in PLOS ONE, researchers from the Charles C. Gates Center for Regenerative Medicine and Stem Cell Biology and Taiga Biotechnologies, Inc. said they have uncovered the keys to the molecular code that appear to regulate the ability of blood stem cells to reproduce and retain their stem-like characteristics.
<urn:uuid:74e54546-b5d1-49ce-b270-7985ac0b6626>
CC-MAIN-2023-14
https://www.cancertherapyadvisor.com/home/cancer-topics/general-oncology/new-method-to-increase-stem-cells-may-help-patients-with-cancer/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948965.80/warc/CC-MAIN-20230329085436-20230329115436-00069.warc.gz
en
0.924383
359
2.921875
3
ROME (AFP) – The UN food agency on Thursday warned climate change will restrict the availability of water for farming in decades to come, including in the Mediterranean region, and urged governments to take action. A report by the Food and Agriculture Organisation (FAO) said climate change will reduce river runoff and aquifer recharges, adding that the loss of glaciers "will eventually impact the amount of surface water available." The report said that in Asia "large areas of irrigated land that rely on snowmelt and mountain glaciers for water will also be affected." "Heavily populated river deltas are at risk from a combination of reduced water flows, increased sanity and rising sea levels," it added. FAO also found that while increased temperatures will lengthen the growing season in northern temperate zones they will reduce it almost everywhere else, leading the yield potential and water productivity of crops to decline. It said governments should improve the ability of countries to measure their water resources, as well as encourage farmers to change their cropping patterns to allow earlier or later planting and reduce their water use. "Farm size and access to capital set the limits for the scope and extent of adaptation and change at farm level," the report said.
<urn:uuid:3b8f4a26-b1c5-40a7-8f79-90db0e712f56>
CC-MAIN-2017-43
http://shaybo-therisingtide.blogspot.com/2011/06/climate-change-will-cut-water-for.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825812.89/warc/CC-MAIN-20171023073607-20171023093607-00156.warc.gz
en
0.962624
252
3.1875
3
Ok the question is: A resistor (resistance=R) is connected first in parallel and then in series with a 2.00 ohm resistor. A battery delivers five times as much current to the parallel combination as it does the series combination. Determine the two possible values for R. So let's see: I can use I=V/R For series it's I=V/(R+2) For parallel it's 5I=V/(1/R+1/2ohm) Ok, now I equate the Currents (I) and I get V/(R+2)=V/5(1/R+1/2). I can cancel out the V's and I'll have: Now I solve for R? Am I on the right track?
<urn:uuid:3c789f17-dbd7-4446-8896-60e283f62cab>
CC-MAIN-2017-26
https://www.physicsforums.com/threads/help-resistors-parallel-series.66077/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320261.6/warc/CC-MAIN-20170624115542-20170624135542-00451.warc.gz
en
0.939503
159
3.015625
3
Definition - What does Secondary Phloem mean? In plant biology, the secondary phloem is a part the cambium vascular growth of a tree or woody plant. It is the food-conducting tissue and is sometimes referred to as the tree’s inner bark, which is where it is located. The secondary phloem lies towards the outside of the cambium layer and is actually produced by the tree’s cambium. As the tree grows, it produces yearly layers of secondary phloem and secondary xylem that are visually distinguishable if the tree’s trunk is cut in half. MaximumYield explains Secondary Phloem The vascular cambium growth is what forms the secondary xylem and the secondary phloem. Both are what compose the telltale rings of a tree and can be used to tell the tree’s age because each ring represents a year of the tree’s life. The vascular cambium’s secondary xylem is located inwards toward the tree’s pith and the secondary phloem is situated beside the bark. The main function of secondary phloem is to transport nutrients throughout the tree or woody plant. As the vascular cambium produces more secondary xylem, the older, more exterior portions of the secondary phloem are crushed. They die, and are sloughed off as part of the bark. Phloem, in all vascular plants, is the living tissue that transports the soluble organic compounds made during photosynthesis to various parts of the plant. It consists of conducting cells, parenchyma cells, and supportive cells, such as fibers and sclereids. The secondary phloem of angiosperms consists of: - sieve-tube members - companion cells - scattered parenchyma - ray parenchyma - fibers (usually occurring in clusters alternating with the sieve tubes and parenchyma cells)
<urn:uuid:42fd0c4f-011b-4d33-8872-c5e2ec066420>
CC-MAIN-2020-05
https://www.maximumyield.com/definition/1874/secondary-phloem
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250607407.48/warc/CC-MAIN-20200122191620-20200122220620-00275.warc.gz
en
0.937647
415
3.828125
4
Pansies are one of the prettiest, most appealing bedding flowers you can plant in any garden. Their unmistakable, face-like leaf patterns endear them to just about everyone. Closely related to the viola, they were first cultivated in Europe, but are now grown worldwide. But the question is, When should we plant pansies? This depends on whether you plant pansy seeds or seedlings that are already established. In many areas, seeds will need to be started indoors. Whether you have germinated your plants or bought established plants from a nursery, plant these in spring. Planting Pansies in Different Climates We usually plant pansies early in spring or in the fall. It depends, though, on ground conditions because pansies will grow best when soil temperatures are between 45°F (7°C) and 65°F (18°C). Soil temperature can have a huge impact on germination. Also, if there is frost this can impact negatively on germination. Pansies don’t mind very light frost, but they won’t germinate if the ground reaches below freezing at night. At the same time, pansies prefer cool weather and they tend to get leggy in the summer heat. For this reason, most people treat them like annual flowers. But, in areas that experience cool summers, short freezes, and moderate temperatures, you can successfully treat them as perennial plants. The United States Department of Agriculture (USDA) has divided the country into 12 zones based on annual minimum temperatures. Many horticulturists and garden experts use these to guide us when to plant just about anything. Their plant hardiness zone map is the standard for determining which plants will thrive in a particular location. However, hardiness to cold weather conditions is only one factor we need to consider. Summer temperatures, rainfall, humidity, and the length of the growing season are also essential factors. Knowing what kind of climate you live in will help you gauge when you should plant your pansies. We base climate types on categories that were devised by a German climate scientist, Wladimir Köppen in the early 20th century. Best USDA Zones for Pansies Most pansy varieties will do well in USDA plant hardiness zones 7-10. Broadly, annual minimum winter temperatures range from 0°F (-17.8°C) in zone 7a to 40°F (4.4°C) in zone 10b. Anything colder will kill the plants in winter. If it’s hotter than this, they will flower for a short while only. Some hardy pansy varieties will survive in zone 4-6, where the minimum average winter temperature ranges from a minimum -30°F (-34.4°C) in zone 4a to 0°F (-17.8°C) in zone 6b. Just remember that these are minimum winter temperatures. The USDA data doesn’t specify summer or maximum temperatures. Whether you’re guided by information relating to climate types or USDA zones, it can be very confusing. For instance, as the University of Georgia Extension points out in an online publication, Success with Pansies in the Winter Landscape: A Guide for Landscape Professionals, zones 6b-8b feature in the state. It’s hotter in the south of Georgia than in the north, and this will affect when you plant. The same applies to other states. The USDA’s Forest Service has a useful interactive map where you can key in your address to find out which zone you live in. Heat, humidity, and lots of rain typify tropical climates. Temperatures are high, ranging from 64°F (18°C) to 85°F (30°C). There are more than 59 inches of rain every year. The tropics stretch along and on either side of the equator. The southern tip of Florida is the only true tropical region in the U.S. Dry climate zones may be as hot as tropical climates, but the weather is very dry and there is not a lot of rain. Generally, average temperatures don’t dip below 50°F (10°C). In desert regions, you may experience summer highs of 104°F (40°C) and in winter it can drop below freezing. Most of the dry-climate regions in the U.S. are in the west of the country. A temperate climate is warm. Winters are mild and summers are humid with thunderstorms bringing rain. Most of the U.S. temperate regions are in the east, south of Minnesota, Illinois, Indiana, and Ohio. The coldest temperatures range from about 50°F (10°C) to 27°F (10°C). Continental regions experience very cold winters and warm to cool summers. Strong winds, snowstorms, and very cold temperatures, sometimes below -22°F (-30°C) are typical in winter. Generally, temperatures will average between 32°F (0°C) and 50°F (10°C). These regions are mostly in the far north, from North Dakota eastwards to New York and Maine. But there are some small continental areas scattered throughout eastern regions, as far south as Arizona and New Mexico. This is the climate you’ll experience if you go to the north pole, which is north of the Arctic Circle. It’s freezing cold! Even in summer, the temperatures don’t go above 50°F (10°C). That’s the coldest it might get in dry-climate and some temperate areas. In the U.S. you’ll experience a polar climate if you live in the extreme north of Alaska. Choosing Pansies Seeds When you choose your pansy seeds, be guided by information on the packaging. There are dozens of cultivars that differ in terms of plant size, heat tolerance, and flower color. So what do you choose to plant? The common garden pansy, Viola x wittrockiana, is descended from the viola. For generations, selective breeding has produced larger flowers, bolder colors, and made them more heat tolerant and cold hardy. There are more than 250 cultivars, some of which have the same form and markings but vary in color. Colors range from purple white and yellow to pink and blue. The true viola is a lot smaller than pansies, as are Johnny jump-ups, Viola cornuta, and Viola tricolor. But Johnny jump-ups are considerably more heat tolerant than pansies and they look very similar. How to Plant Pansies Seeds Pansies grow very easily from seed, but they do take a long time to mature. If you live in a cold climate, it’s best to start seeds indoors about 10-12 weeks before the last expected frost date. You can plant the seeds in pots or seed trays. Simply fill with good quality potting soil or a seed-starting mix, which you can buy from a garden center, and press the pansy seeds into the soil. Make sure they are properly covered, because they need to be in darkness to germinate. Once the seeds have germinated and are established seedlings, plant them in your garden. If you have planted your pansy seeds in pots or plastic seed trays, you will need to remove them from the container before transplanting. A great eco-friendly solution is to plant your seeds in biodegradable containers that you plant in the ground. Whether in biodegradable containers or not, plant the seedlings 6-8 inches apart. Also, make sure that the soil contains lots of organic matter, but avoid fertilizers with high ammoniacal nitrogen content. Check the pH. It should be between 5.4 and 5.8. Also, ensure that the soil drains well. How to Water Pansies Once you have planted your pansy seeds, water frequently to keep the soil moist. You also want to eliminate any air pockets that may have formed around the roots. Once they are growing, they need about an inch of water every week. If rain provides sufficient irrigation, stop watering. It’s very easy to give pansies too much water. And the problem is that they can develop edema, which is abnormal water retention in plants. Edema causes plants to discolor and leaves to die. The growth of the plants may be stunted and they will die back. If you water by hand, do so in the morning so that the foliage has the rest of the day to dry in the sun. To avoid fungal diseases, direct the water onto the soil rather than spraying the foliage of the plants. How to Grow Pansies Growing pansies isn’t difficult. You need good soil, consistent moisture, and sunshine. They like partial or full sun but aren’t humidity or heat tolerant. This is why they do best in the spring and fall. If they are exposed to too much heat, they tend to get leggy. You will also find there are fewer flowers. Pansies tend to form clumps rather than spread. They work well in borders but don’t generally form a solid ground over. A good way to keep pansies flowering is to dead-head them regularly. When you spot a dead flower head, simply pinch it off together with small green seed capsules, if these are forming. How long do pansies take to grow? If you plant seeds, it will take 1-3 weeks for them to germinate, depending on the temperature of the soil. If you start seeds indoors, the seedlings will be ready to plant outdoors within about 10 weeks. They are fairly slow growers. But if you plant cold-hardy winter pansies at the end of winter and early spring, pansies will flower for 5-7 months. Fall planted pansies will begin blooming in spring and may continue well into the following fall. From our informative planting guide, you will see that the time to plant pansies depends primarily on your climate conditions and the USDA plant hardiness zone where you live. If you want to learn more, keep an eye out for seed companies that have regular email newsletters, like Pennington, Baker Creek Heirloom Seed Company, and Hudson Valley Seed Company. All you do is sign up for their newsletter, provide your email address, and you’ll receive lots of regular news about pansy and other seeds.
<urn:uuid:5bf838bf-b1b8-475c-a625-64662b3678d4>
CC-MAIN-2023-23
https://northernnester.com/when-to-plant-pansies/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656869.87/warc/CC-MAIN-20230609233952-20230610023952-00314.warc.gz
en
0.919155
2,267
3.109375
3
Crispy crunchy cucumbers are a favorite of mine. Whether eating them straight off the vine, in a salad or as yummy dill pickles, these are always a part of my garden. My Mom made the best pickles ever using fresh cucumbers from our yearly garden. Here’s five tips for growing great cucumbers that will make them a welcome addition to your garden too. 1. Plant after the last frost. Cucumbers are a warm weather crop. Cucumber seeds will not sprout in cold soil. Plant cucumbers well after the last frost. The soil must be higher than fifty degrees Fahrenheit for them to sprout. They also grow better in warmer weather, so be sure to plant in a sunny location. Give them room to grow up as well. 2. Keep them off the ground. Cucumbers are highly susceptible to fungus. One of the best ways to keep them from growing fungus is to keep them off the ground. You can do this by using a trellis, cage or teepee for them to climb up. You can also plant them next to a chicken wire garden fence to avoid added expense. Fencing must allow light to come in. 3. Use sandy soil or cornmeal. Another way to keep fungus at bay is to mix your soil half and half with cornmeal or sand. You can also use a spray made from vinegar and water. Apply the spray weekly just before a watering. Dry molasses added to soil will discourage fungus as well. Be sure soil is well aerated for good drainage. Water only when soil is dry. 4. Avoid used soil. It’s not a good idea to plant cucumber in the same soil previously used by other vining plants. Vining plants take a lot of nutrition from the soil. They can also leave behind undetected fungus. Always use fresh soil when planting cucumbers and other vines. Make sure pots are sterile if you are a container gardener. 5. Watch for yellowing. When cucumbers begin turning yellow, it’s not always a sign of fungus. They could just need to be fertilized. Cucumbers need a lot of food to grow properly. Use a good nitrogen based fertilizer or compost tea on a weekly basis to keep them happy. If plants turn yellow despite being well fed, they could have a fungus. Fungus infected plants should be disposed of immediately to prevent fungus from spreading.
<urn:uuid:577bc661-1f5b-40d4-8cd6-3f2460591ad7>
CC-MAIN-2017-34
https://bogbit.com/how-to-grow-great-cucumbers/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103316.46/warc/CC-MAIN-20170817131910-20170817151910-00448.warc.gz
en
0.953809
502
2.875
3
When I started my career in software testing, I was a biologist without business experience, but I knew how to crunch data through statistics, Python and machine learning. Over the past 11 years, software testing has been my main profession. With technological changes, more and more companies are into Big Data (as a part of data science), and as a biologist, trained in crunching lots of data (genetics, bioinformatics), I became curious. I thought, “Is there a way to combine my knowledge of statistics and crunching Big Data and software testing in today’s business?” There is. Several methods (statistics, data mining, web scraping) and programming languages (R, python) used in data science can also be used in software testing. Both software testing and data science are empirical studies trying to answer a specific question. The answer to this question can be derived by using tools or methods on the available data. This is important—Don’t let the tool or method determine how the answering process proceeds. Let the question be the determinant. Be open-minded! Remember that a fool with a tool is just a fool. Data science and software testing Data science is not just statistics. It is an interdisciplinary field like bioinformatics, combining mathematics, statistics, computer science, information science, etc. Just like Big Data, it’s a buzzword, but a data scientist, according to Coursera, has one goal: Ask the right questions, manipulate data sets, and create visualizations to communicate results. It’s the same in software testing. Without the correct question, data set and visualization (report), a software tester can’t inform the stakeholder about the state of quality of the object under test. I know testers have tools like Jira, Microsoft Excel and Selenium to help them. Why should we have knowledge of data science, then? As I said before, a fool with a tool is just a fool. You may know how to use multiple test tools, but the most important thing a tester does is ask the right questions. This triggers the other stakeholders to answer, and through those questions and answers, possible issues are found. Data science is all about asking the right questions. It can help the tester with creating questions and deriving the test set, even when the test set has missing data. The process can educate the tester on how to visualize findings. Test tools can also do these things, but, in my opinion, a tester should be able to work with data himself. Data science can help the tester to stay critical of tools, processes and information. (Espeooking for a place to start in the realm of data science, you can find data science courses online from sites like Coursera, DataCamp or Udacity. Try a course. It won’t be easy, but the challenge is part of learning. Software testers will find that data science helps them in their daily work in the following ways: - Asking open-minded, critical questions - Test data development and processing - Test tool selection - Visualizing the quality of the object under test For me, using data science has increased my ability to ask the right questions and has diminished the fear of going too deep into data. A software tester should never be afraid to ask the right questions (to anyone!), go deep if necessary, and report his or her findings.
<urn:uuid:ea2ead8a-11cb-4165-a787-457a0d140f9d>
CC-MAIN-2017-39
https://sweetcode.io/data-science-from-a-software-testers-perspective/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690340.48/warc/CC-MAIN-20170925055211-20170925075211-00231.warc.gz
en
0.920611
728
2.59375
3
Can eating a low-calorie yet nutritionally balanced diet extend human life? Preliminary research suggests it might, so researchers at Washington University School of Medicine in St. Louis are launching a long-term study to find out. In an editorial in Journal of the American Medical Association, Luigi Fontana, M.D., Ph.D., assistant professor of medicine at Washington University and an investigator at the Istituto Superiore di Sanita in Rome, Italy, says calorie-restricted diets point to possible mechanisms of aging and suggest ways to intervene and modify its effects. In January, Fontana and colleagues found that after an average of six years on calorie restriction, people's hearts functioned like the hearts of much younger people. And a team from the Pennington Biomedical Research Center at Louisiana State University in Baton Rouge is reporting that six months of calorie restriction reduces two key markers of aging: fasting insulin levels and body temperature. More than a decade ago several researchers, including John O. Holloszy, M.D., professor of medicine at Washington University, demonstrated that stringent and consistent caloric restriction increased the maximum lifespan in mice and rats by about 30 percent and protected them against atherosclerosis and cancer. Human study has been difficult because calorie restriction requires a very strict diet regimen, both to keep the total number of calories low and to insure that people consume the proper balance of nutrients. Some people from a group called the Calorie Restriction Society are devoted to limiting their caloric intake in hopes of improving their health and extending their lives. Society members, who call themselves CRONies (Calorie Restriction with Optimal Nutrition), have developed ways to eat low calorie/high nutrition diets. Fontana has done extensive research with CRONies, most recently reporting in the Jan. 17 issue of the Journal of the American College of Cardiology that the hearts of people on calorie restriction appeared more elastic than those of age- and gender-matched control subjects. Their hearts were able to relax between beats in a way similar to the hearts of younger people. The team from the Pennington Biomedical Research Center reports in the April 5 issue of the Journal of the American Medical Association on a six-month study of men and women between 25 and 50 who were placed on a calorie restriction diet that lowered their daily caloric intake by about 25 percent. The researchers compared those on calorie restriction to subjects who either had not been on a diet, had cut calories by about 12.5 percent and increased the energy they burned through exercise by a like amount, or had spent six months on a standard low-calorie diet of about 1,800 to 2,000 calories per day until they had lost 15 percent of their body weight. The study, called the Comprehensive Assessment of the Long Term effects of Reducing Intake of Energy (CALERIE), found that all subjects who dieted or increased their exercise lost weight and body fat. But those on a calorie restriction diet ended the study with lower fasting insulin levels and lower core body temperatures. They also had less oxidative damage to their DNA, thought to be a marker of aging at the biochemical and cellular level. "This study has laid the groundwork for future research into the long-term effects of calorie restriction in humans to see whether it really can extend lifespan," Holloszy says. "It's becoming clear from studies with the CRONies -- and from this brief, prospective study -- that calorie restriction does change some of the markers we associate with aging." Holloszy and Fontana are getting ready to launch a second phase of the CALERIE study, to look at the effects of calorie restriction over the course of two years. "We know people on calorie restriction will lose weight," says Fontana. "But this study isn't a weight-loss study. We're hoping to learn more about whether calorie restriction can alter the aging process. Fontana says, for example, that low-grade, chronic inflammation seems to mediate aging. Overweight and obese people tend to have higher levels of inflammation than lean people, so it makes sense that losing weight might increase average lifespan by lowering the risks of some age-related diseases, such as diabetes and atherosclerosis. But in animal studies not only did more of the animals live longer, the maximum length of a rat's or mouse's life also increased. The CALERIE study hopes to get some clues about whether calorie restriction might do the same thing for humans. "We want to learn whether calorie restriction can reverse some of these markers of aging in healthy young people," Holloszy says. "It's going to be many years before we know whether calorie restriction really lengthens life, but if we can demonstrate that it changes these markers of aging, such as DNA damage and inflammation, we'll have a pretty good idea that it's somehow influencing the aging process at the cellular level." Fontana L. Excessive adiposity, calorie restriction and aging in humans. Journal of the American Medical Association, vol. 293:13, April 5, 2006. Heilbron LK, de Jonge L, Frisard MI, DeLany JP, Enette D, Meyer L, Rood J, Nguyen T, Martin CK, Volaufova J, Most MM, Greenway FL, Smith SR, Williamson DA, Deutsch WA, Ravussin E. Effect of 6-month calorie restriction on biomarkers of aging, metabolic adaptation and oxidative stress in overweight subjects. Journal of the American Medical Association, vol. 293:13, April 5, 2006. Meyer TE, Kovacs SJ, Ehsani AA, Klein S, Holloszy JO, Fontana L. Long-term caloric restriction ameliorates the decline in diastolic function in humans. Journal of the American College of Cardiology, vol. 47:2, pp. 398-402, Jan. 17, 2006. Cite This Page:
<urn:uuid:a106a88b-7dde-46c6-8aca-0fcdb95870cc>
CC-MAIN-2014-15
http://www.sciencedaily.com/releases/2006/04/060405022759.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539230.18/warc/CC-MAIN-20140416005219-00193-ip-10-147-4-33.ec2.internal.warc.gz
en
0.938386
1,218
3.015625
3
Week 2 Overview We have an itch. We want to scratch it started us off in week one – our first insight! The second is insight; the research framework upon which we base the fundamentals of the innovation. From an online groupscommunities/networks perspective, this implies we have a sense of how to match need to form. This week we are slipping back to the past for a moment to understand how we got to the range of options we have for online interaction today, then we’ll begin to differentiate what those forms and tools can do for our research framework. Technology has changed what it means to be together. We are no longer confined to geography. With the first networked interaction platform like PLATO in 1973 at the University of Illinois, to today’s wide range of social networking sites, we can “be” together across time and distance. This has impacted our human group formation practices as well. While the term “online community” is used to describe a very diverse set of configurations, it might be helpful to explore more closely the variety this term encompasses. Or even start using more precise language. To prepare for our conversations, please listen to the 11 minute talk by Howard Rheingold on networks and Nancy White’s short talks with Matt Moore on this issue. If you want something longer, see “Me, We, the Network” from an IBM presentation (1 hour). Then scan our resources and look for items tagged week2 to see if there are other readings/watchings that might be helpful to you. We did not emphasize these readings in week one, so you might also want to peek at the week 1 resources. Drive your own learning! Pick the readings that resonate with the research and learning agendas you drafted in your blogs last week. Then join our online conversation about how we use these online forms for open and innovative design. Below is a graphic recording of a talk Nancy did on this subject a while back. We’re sharing the visual because some of you have already noted the value of using different modalities. Some of you have been sharing your art! (Terrific!) Discussion # 2: Individuals, Groups and Networks The rise of “online communities” is not new — for many of you online communities have been around as long as you have been alive. Yet we go through cycles of re invention and discovery based on new perspectives and applications. New technologies give us new ways of “being together.” This diversity presents us with both an opportunity and a challenge. How do we usefully utilize these opportunities for innovation and open design? What forms of online groups serve the “four i’s?” In this discussion we’ll start by differentiating and analyzing different online social networks. Where is the online empowerment of the individual (me?) most useful? Where is the bounded group or team best utilized? Where is the open network, the sweet spot across the four ‘i’s’ ? How do you strategically choose where to engage for which phase of the innovation cycle? Consider some of the comments about Facebook in week one (social, distraction) And Make sure you watched the videos listed above to start discerning the difference between individual, group/community and network! Teamwork Activity #2 – Your Group’s Research Framework In week one you were asked to articulate and define the scope of your group project and post a link for your instructors. This week, your task is to more explicitly state your project research questions and understand where you can gain insights into those questions. - With your group, you will decide who will do what in your research process. By the end of next week you should have: - Identified how the “me, we, network” continuum is present in your research area. How are individuals empowered in your area? How are groups and networks contributing? Give examples and if possible, tap your team’s connections and networks and get some first hand accounts. Document this online somewhere and share the URL with your instructors. - Narrow down to 2 online spaces you want to explore within the context of your group’s theme and our context of international development. Note the URL of the the group/community/network(s) you will join or observe, or your proposal to start a new group for your community project. - Identify who will do what on your team and demonstrate any insights you had in making those selections. How are you (or not) tapping into individual’s connections and networks? How are you defining project roles in groups and initial tasks and responsibilities? Document this online somewhere and share the URL with your instructors in the comment section of this page. Again, please pay attention to and make notes on both process and content. Personal Blog Reflection Prompt #2 – A personal research experiment Think about your own network(s). Do you use online spaces primarily as an individual, which implies you find and harvest information, but perhaps don’t interact much with others online? Are you a member of defined and bounded groups? Or do you interact along the way as you intersect with others in the wider network? Which is most valuable to you? Which is most comfortable? Explain. If you use Facebook you might enjoy looking at the TouchGraph Facebbook browser tool. Finally, what new area or type of use might you experiment with in your online networks? Create an experiment and begin! Post your reflection on your Tumblr blog and tag it #week2reflection Resources to share - Howard Rheingold’s Technology of Cooperation (PDF) and A Mini Course on Network and Social Network Literacy (11 minute video) See more related videos by Rheingold - Review Wenger-Trayner’s Communities versus Networks and How are Communities of Practice Different from More Familiar Structures Like Teams or Task Forces looking at these different forms from a communities of practice perspective.
<urn:uuid:93e0eef4-88b1-4776-86e0-4e5d59442442>
CC-MAIN-2017-47
http://2012.projectcommunity.info/syllabus/week2/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806327.92/warc/CC-MAIN-20171121074123-20171121094123-00346.warc.gz
en
0.930481
1,230
2.53125
3
Pulling the Post is a magazine story. One freezing cold morning, Thomas sets about his journey with his snowplough. Shortly, he meets Terence who has been fitted with a snowplough, too; he is busy clearing the main road into Wellsworth. At the station, he sees children playing on sleds, a man pulling his shopping on a sled, and some people using skis. Thomas' trucks are full of sleds, too. He has to deliver them to people along his line. As he waits at a signal, Thomas sees Tom Tipper, the postman, skidding by on the icy roads into a snowdrift. That night, Thomas cannot sleep; more snow is falling and all he can think about is how hard it would be for Tom Tipper to do his rounds. Next morning, Thomas has an idea. He asks the Fat Controller to arrange for the post van to go to the works. The engineers make special skis for the mail van's wheels and Terence comes to pull it along, much to Mr. Tipper's delight! - One of the boys sliding down the hill on a sled appears to be missing one of his feet.
<urn:uuid:91daa248-855f-4d58-b814-e3491f3a2929>
CC-MAIN-2014-35
http://ttte.wikia.com/wiki/Pulling_the_Post
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500833715.76/warc/CC-MAIN-20140820021353-00458-ip-10-180-136-8.ec2.internal.warc.gz
en
0.980965
245
2.765625
3
Animals For Kids - Learn , Practice & Play With All Animals, Birds & Insects. This application contains big collections of pet animals, wild animals, noisy animals, helpful animals, Birds & Insects real images in HD Format. Kids now learn & play with big collection of Animals, Birds & Insects flashcard in their papa or mamma's smart phone. With this application you combine education with entertainment. Using this application kids grow their animals knowledge in easier and an interesting way. hearing animals name and watching real picture of animals and also able to check his or her memory power using Test and Game option. Each word of animal name is pronounced clearly and distinctly. The younger a child, the more easily he or she can absorb new knowledge. Every child who is learning in Jr.KG or Sr.KG or any other kid [children of all ages, babies, preschoolers, school children and pre-teens] who wants to learn animal’s names, they can easily learn. Parents can also spend time with their children, know English word for fruits name and also keep your baby busy with education and entertainment. In this application, four parts are there, 1. Animals Flashcard: -In this part, kids know about the animals [Like- using watching animal pictures and listening animal names] 2. Identify Animal's Flashcard -In this part, kids can check his memory power and take a fun quiz to see how many of the words he or she knows [Like - select correct question Animal name among the four animals] 3. Spelling Test -In this part, kids have to find right spelling from four options. 4. Writing Test - In this part kids have to organize animal spelling in correct order to make correct spellings of each & every animal. End of the game and test, kids can achieve score points of correct answer, high score and also earn chocolates. - Easy to grow knowledge about Animals. - Flashcards of Animals for Kids and proper pronunciation of animals names. - Fun with game and test. - Easy and fun navigation. - Animals Test for to test the memory skills as well. - Animals Game for enjoy and learn. - Education with entertainment. 線上24小時玩Animals Learning APP免費 下載教育APP-在線上免費玩Animals Learning APP
<urn:uuid:2b035426-fe8c-4502-a022-ffbb6ad8ffa3>
CC-MAIN-2017-47
https://searchapp.soft4fun.net/article/information/Animals%20Learning/8967233
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805417.47/warc/CC-MAIN-20171119061756-20171119081756-00557.warc.gz
en
0.860033
523
2.859375
3
Look: Mars’ patchy and chaotic aurora may herald extreme space weather events Today’s weather: Windy with a chance of radiation. In a joint effort between NASA’s MAVEN spacecraft and the United Arab Emirates’ Emirates Mars Mission (EMM), scientists have observed an uncommonly chaotic interaction between the solar wind and Mars’ upper atmosphere, creating a unique ultraviolet aurora. The phenomenon represents an unusual occurrence in Martian space weather, and scientists are excited to take advantage of future collaborations between spacecraft to keep an eye out for repeat events. Mars’ UV aurora The odd, patchy aurora created by the solar wind was observed twice, on August 11 and August 30 this year. A similar aurora has been observed regularly since 2018, but usually, it occurs in a smooth, even band that covers the planet. Last month’s aurora was patchy, variable, and locally occurring by contrast. It’s a specific type of aurora called a proton aurora and occurs on the day side of the planet when hydrogen atoms from the Sun, stripped of their electron, blast toward the red planet and penetrate the “bow shock,” a magnetic barrier that naturally shields Mars’ atmosphere. Some of the protons can bypass the bow shock by stealing electrons back from the busy region of space around Mars, becoming neutral and breaking through to hit the upper atmosphere. The result is an ultraviolet aurora that, until now, always seemed to occur as a coherent whole across the face of Mars but has now been seen in distinct patches. Proton auroras occur on Earth too, but they can’t be seen by human eyes and are rarer due to Earth’s stronger magnetic field. It took observations from both MAVEN and EMM to understand what was going on. EMM’s Emirates Mars Ultraviolet Spectrograph (EMUS) instrument is constantly scanning the upper atmosphere of the planet, watching for evidence of atmospheric escape into space and changes in composition. Its detector is perfect for catching the ultraviolet light caused by the proton aurora. MAVEN, meanwhile, captures in-situ data, “feeling” the plasma of the solar wind as it passes by with a magnetometer and ion analyzers. When EMM’s data was compared with MAVEN’s, it was clear that the patchy proton aurora resulted from a highly disturbing plasma environment at the time of the events. Mike Chaffin of the University of Colorado, Boulder, explained that “EMM’s observations suggested that the aurora was so widespread and disorganized that the plasma environment around Mars must have been truly disturbed, to the point that the solar wind was directly impacting the upper atmosphere wherever we observed auroral emission. … By combining EMM auroral observations with MAVEN measurements of the auroral plasma environment, we can confirm this hypothesis and determine that what we were seeing was essentially a map of where the solar wind was raining down onto the planet.” Essentially, it was a temporary breakdown of Mars’ natural defenses against solar radiation when particles were able to take advantage of the chaotic space weather to find a way down to the planet’s atmosphere. MAVEN arrived at Mars in 2014 and was joined by EMM in 2021. There are more than half a dozen probes in Martian orbit, each with different specialties and capabilities. Working together, they can help us understand Mars in a way that they cannot do on their own, including studying its unique auroras.
<urn:uuid:6cfae74b-1246-4ea9-aa53-440c896b4b72>
CC-MAIN-2023-40
https://www.inverse.com/science/mars-space-weather
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.7/warc/CC-MAIN-20230923094750-20230923124750-00007.warc.gz
en
0.955779
744
3.46875
3
- a person who pays. - the person named in a bill or note who has to pay the holder. verb (used with object), paid or ( Obsolete except for def 12 ) payed, pay·ing. - to settle (a debt, obligation, etc.), as by transferring money or goods, or by doing something: Please pay your bill. - to give over (a certain amount of money) in exchange for something: He paid twenty dollars for the shirt. - to transfer money as compensation or recompense for work done or services rendered; to satisfy the claims of (a person, organization, etc.), as by giving money due: He paid me for my work. - to defray (cost or expense). - to give compensation for. - to yield a recompense or return to; be profitable to: Your training will pay you well in the future. - to yield as a return: The stock paid six percent last year. - to requite, as for good, harm, or an offense: How can I pay her for her kindness and generosity? - to give or render (attention, respects, compliments, etc.), as if due or fitting. - to make (a call, visit, etc.). - to suffer in retribution; undergo: You’ll pay the penalty for your stubbornness! - Nautical. to let (a ship) fall off to leeward. verb (used without object), paid, pay·ing. - to transfer money, goods, etc., as in making a purchase or settling a debt. - to discharge a debt or obligation. - to yield a return, profit, or advantage; be worthwhile: It pays to be courteous. - to give compensation, as for damage or loss sustained. - to suffer or be punished for something: The murderer paid with his life. - the act of paying or being paid; payment. - wages, salary, or a stipend. - a person with reference to solvency or reputation for meeting obligations: The bank regards him as good pay. - paid employment: in the pay of the enemy. - reward or punishment; requital. - a rock stratum from which petroleum is obtained. - requiring subscribed or monthly payment for use or service: pay television. - operable or accessible on deposit of a coin or coins: a pay toilet. - of or relating to payment. Verb Phrases past and past participle paid or ( Obsolete except for def 30c ) payed, present participle pay·ing. - pay down, - to pay (part of the total price) at the time of purchase, with the promise to pay the balance in installments: On this plan you pay only ten percent down. - to pay off or back; amortize: The company’s debt is being paid down rapidly. - pay for, to suffer or be punished for: to pay for one’s sins. - pay off, - to pay (someone) everything that is due that person, especially to do so and discharge from one’s employ. - to pay (a debt) in full. - Informal.to bribe. - to retaliate upon or punish. - Nautical.to fall off to leeward. - to result in success or failure: The risk paid off handsomely. - pay out, - to distribute (money, wages, etc.); disburse. - to get revenge upon for an injury; punish. - to let out (a rope) by slackening. - pay up, - to pay fully. - to pay on demand: The gangsters used threats of violence to force the shopkeepers to pay up. - pay as you go, - to pay for (goods, services, etc.) at the time of purchase, as opposed to buying on credit. - to spend no more than income permits; keep out of debt. - to pay income tax by regular deductions from one’s salary or wages. - pay back, - to repay or return: to pay back a loan. - to retaliate against or punish: She paid us back by refusing the invitation. - to requite. - pay one’s/its way, - to pay one’s portion of shared expenses. - to yield a return on one’s investment sufficient to repay one’s expenses: It will take time for the restaurant to begin paying its way. - a person who pays - the person named in a commercial paper as responsible for its payment on redemption verb pays, paying or paid - to discharge (a debt, obligation, etc) by giving or doing somethinghe paid his creditors - (when intr, often foll by for) to give (money) to (a person) in return for goods or servicesthey pay their workers well; they pay by the hour - to give or afford (a person) a profit or benefitit pays one to be honest - (tr) to give or bestow (a compliment, regards, attention, etc) - (tr) to make (a visit or call) - (intr often foll by for) to give compensation or make amends - (tr) to yield a return ofthe shares pay 15 per cent - to give or do (something equivalent) in return; pay backhe paid for the insult with a blow - (tr; past tense and past participle paid or payed) nautical to allow (a vessel) to make leeway - Australian informal to acknowledge or accept (something) as true, just, etc - pay one’s way - to contribute one’s share of expenses - to remain solvent without outside help - money given in return for work or services; a salary or wage - (as modifier)a pay slip; pay claim - paid employment (esp in the phrase in the pay of) - (modifier) requiring the insertion of money or discs before or during usea pay phone; a pay toilet - (modifier) rich enough in minerals to be profitably mined or workedpay gravel verb pays, paying or payed - (tr) nautical to caulk (the seams of a wooden vessel) with pitch or tar n.“person who pays” (originally wages, late 14c., later taxes, early 15c.), from Old French paiere (13c.), agent noun from paier (see pay (v.)). v.c.1200, “to appease, pacify, satisfy,” from Old French paier “to pay, pay up” (12c., Modern French payer), from Latin pacare “to please, pacify, satisfy” (in Medieval Latin especially “satisfy a creditor”), literally “make peaceful,” from pax (genitive pacis) “peace” (see peace). Meaning “to give what is due for goods or services” arose in Medieval Latin and was attested in English by early 13c.; sense of “please, pacify” died out in English by 1500. Sense of “suffer, endure” (a punishment, etc.) is first recorded late 14c. Related: Paid; paying. n.c.1300, “satisfaction, liking, reward,” from pay (v.), or else from Old French paie “payment, recompense,” from paier. Meaning “money given for labor or services, wages” is from late 14c. In addition to the idioms beginning with pay
<urn:uuid:6650febb-4029-4778-8243-195782a5a63b>
CC-MAIN-2023-23
https://www.tekportal.net/payer/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644571.22/warc/CC-MAIN-20230528214404-20230529004404-00603.warc.gz
en
0.93141
1,670
3.125
3
In light of recent news here in London, this past week, when more than 6 young men were stabbed at Hackney central station and in the capital, I want to lend my professional perspective on the subject, raise awareness to the conditions, stigmas, and suggest possible resolutions to help decrease the bloodshed. the shock of this largely preventable condition. Here are just a few staggering statistics, keeping in mind that behind every statistic is a human being. Most parts of the world are safer than ever before, and at the same time, others record the most violence that human history has ever seen. - Violence causes more than 1.6 million deaths worldwide every year - 2% of all human deaths have been the result of us killing each other, while many are inured by the presence of violence. - Homicide is the 5th most common cause of death in all age brackets between 1 to 44 years old. - 9 out of 10 people in prison for violent crimes are men. - Men die from homicide 3X the rate of women. Defining Violence and Abuse Violence and other forms of abuse are most commonly understood as patterns of behaviour intended to establish and maintain control over family, household members, intimate partners, colleagues, individuals, communities or groups. While violent offenders are most often know their victims (intimate or estranged partners and spouses, family members, relatives, peers, colleagues, etc.), acts of violence and abuse may also be committed by strangers. - 35% of women worldwide reported experiencing violence in their lifetime, whether physical, sexual, or both. - 1 in 10 girls under the age of 18 was forced to have sex. - 38% of women who are murdered are killed by their partners. Violence and abuse may occur only once, can involve various tactics of subtle manipulation or may occur frequently while escalating over a period of months or years. Violence and abuse are used to establish and maintain power and control over another person, and often reflect an imbalance of power between the victim and the abuser. Fear and the struggle for control and power being at the root of most forms of violence. General Forms of Violence and Abuse: - Verbal Abuse - Financial Abuse We are left to ask Why? We cannot hope to control violence if we are bewildered by it. Mixing together all forms of violence in an attempt to find a common denominator has created the struggle to comprehend a school shooting, or worshipers slaughtered inside a church, or violence committed in a robbery, or the everyday violence of drunken brawls, domestic violence, or deadly road rage. Each of these violent acts can be understood as specific behaviors that are controlled, as are all behaviors. Patients who are violent are not a ‘homogenous group’, and their violence reflects various biologic, psychodynamic, and social factors. Most researchers and clinicians agree that a combination of factors plays a role in violence and aggression, although there are differing opinions regarding the importance of individual factors. Like most primates, humans evolved to be violent to one another. The biology of anger and aggression is the root cause of most violent behavior. While lethal violence may be part of our individual genetic disposition, it can be said it’s mostly governed by the evolution of our societies and the groups within them. We are on the brink of a new understanding of the neuroscience of violence. “We cannot change the biology of our brain, but if we choose to, we can comprehend it at the same level of detail that we comprehend the biology of a human heartbeat.” Most of the time the neural circuits of aggression are life-saving, as when a mother instantly reacts aggressively to protect her child in danger, but sometimes they misfire and violence explodes inappropriately. Triggers of Rage. The pressures of modern life. High-speed transportation and communication increase opportunities for conflict among different groups of people, while access to ‘weapons of violence amplify the lethal effects of even one enraged mind.’ Hackney mayoral candidate Pauline Pearce said the recent stabbings and shootings were partly a result the children feeling disenfranchised. “They don’t feel they belong, they haven’t really got a meaning – they don’t feel that they have that connection to society, so a lot of things go wrong for them and sadly this is the sort of retaliation that comes.” This observation lends to the notion that the root of most forms of violence are founded in the many types of inequality which continue to exist and grow in society. The rates of violence have been seen to increase with lower education, less social stability, and in regions with high rates of unemployment. Others view the incidents of violence as a learned behavior associated with social norms and external factors, an example in the music which glorifies the behavior. Whether you view the incidents of violence as genetic or socio factors, the evidence is there that the human brain is struggling to cope with an environment it was never designed to confront. What about violence and mental health? Violence in the context of mental illness has been sensationalized, increasing the stigma around the mental health community. The perception brings dire consequences for many mentally challenged patients, increasing discrimination and causing isolation from society, aiding in homelessness. Violence has serious implications for society and the mental health community. We as a society need to view these incidents on a broader scale and conclude from information provided by ample research that individuals with mental illness, when appropriately treated and cared for, do not pose any increased risk of violence over the general population. That being said, I stress the need for appropriate treatment of such individuals. We can no longer let the mentally ill fall through the cracks or remain in this cycle of treatment-relapse-treatment and being inappropriately cared for. Mental Health Factors. - Threatened Security - History of Abuse - Perceived Inequities What can be done about it? It can be said that violence is not driven by reason, it is driven by rage, yet violence is a choice, and therefore can be preventable. So where do we turn our attention? As we look to protect our communities by decreasing homicides by shootings and beyond, we need to increase education to amplify awareness for all communities to support their neighbors by helping to achieve a higher quality of life as protection from feeling vulnerable and disenfranchised by their environments, including the mentally ill. Who has the Answers? Is the answer in educating protest organizers like G.A.N.G.? The protest organisers: Guiding a New Generation (G.A.N.G.) shared their stories and pleaded with residence for an end to the killings experienced last month in London. Lead organiser said, “We are trying to guide these children to let them know that their life is not going in the right direction. I want to say to them this is not the life… they are being sold a false narrative – and we are here to change that narrative for them.” Fortunately, the financial evidence exists, where research has indicated that investing early to prevent conflicts from escalating into violent crises is 60X more cost effective than intervening after violence erupts. Therefore allocating funding toward prevention measures, programs and trainings can yield positive results toward making a change in the global violence statistics. Examples of Studies in Schools. Life Skills Training showed a 42% reduction in physical and verbal youth violence as well as a witnessed 40% reduction in psychological distress, including stress, anxiety and depression. Mindfulness Practices. With the implementation of a meditation/ mindfulness practice called “Quiet Time,” some of the toughest schools are reporting suspensions decreased by 79%, attendance increased to over 98%, and academic performance noticeably increasing. I encourage you to stay connected and deepen your community care connections. Find out your viable resources. Reach out to me. Sign up for our monthly newsletter, to be notified of our upcoming bogs, events and more. Know you are surrounded by caring professionals and neighbors who want to come to your aid and the betterment of your surrounding communities and beyond. It is my hope that this blog aids in the recognition and management of dangerous behaviors and minimize risk to communities across generations to come. In good mental health, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2686644/ https://www.standard.co.uk/news/london/protesters-call-for-end-to-londons- surge-in-bloodshed-as-six-more-young-men-stabbed-within-90- a3807106.html
<urn:uuid:cfec04d0-0f8a-42b7-879f-190f9f6bec5c>
CC-MAIN-2020-05
https://www.noelmcdermott.net/violence-safer-together/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250626449.79/warc/CC-MAIN-20200124221147-20200125010147-00093.warc.gz
en
0.944976
1,784
3
3
Quick review. The hypothalamus in our brains secretes CRH, a hormone that tells our pituitary gland to secrete ACTH, which then travels down through the blood to the adrenal glands (which sit on top of the kidneys). When stimulated by ACTH, the adrenal glands spit out adrenaline and cortisol. Pow! You are ready to fight, or run, or do whatever it is you need to do with your jacked-up stress hormones. Eventually, cortisol itself can tell the hippocampus to tell the hypothalamus cool it - stop producing CRH, and the cycle shuts down. Or that's how it is supposed to work. In depression, anxiety, and obesity, the cycle is broken. Cortisol stays high. The brain and adrenal glands try to compensate by downregulating some of the receptors, but it doesn't seem to work, at least not long term. Once you have an out of whack hormonal system, all the elements of the hormonal system seem to get out of whack at the same time. I've only introduced the main characters so far - the HPA axis itself - the supporting cast is many-fold and regulates sleep, appetite, and mood. Some of the members will be familiar to you - leptin, orexin, and serotonin among others (1). Let's discuss the supporting cast in more depth, starting with an anecdote about the hormonal system in general: Cushing's disease results when the adrenal glands produce too much cortisol. Symptoms of Cushing's disease are weight gain, sleep disruption, hypertension, insulin resistance, depression (even psychosis) - and the depressed mood is often the first sign of the illness. Removal of an adrenal tumor producing the cortisol or adding medications that suppress the function of the adrenal gland will improve all the symptoms, including the depressed mood. Simply giving someone tons of cortisol (or glucocorticoids) will cause the same symptoms - removing the excess cortisol will resolve the symptoms. Elevated CRH has been found in the brains of suicide victims, in the cerebrospinal fluid of living depressed people, and people with major depressive disorder seem to have an increased response (increased ACTH and cortisol production) in response to CRH stimulation in the dexamethasone suppression test compared to people without major depression. Interestingly, family members of people with major depression show similar increased hormonal activation. Depressed "comfort food" overeaters actually have lower cerebrospinal CRH levels - suggesting that the comfort food somehow soothes the savage HPA axis beast but leads to obesity. Successful antidepressant treatment seems to resolve these hormonal abnormalities in humans (the ones that are easily tested) and the brain abnormalities in rats. In rats, administration of antidepressants seems to down regulate the expression of the CRH gene both in stressed rats AND in rats who are just hanging out and having a good old time (right up until their brains are examined microscopically, that is). This finding would suggest that antidepressants have an ability to directly affect the hormonal axis, decreasing response to stress. Newer studies of people with different CRH receptor gene types seem to show differential response to antidepressant treatment - for some people it will work well, for others with a different CRH receptor gene, the antidepressant won't work. (In the Future Envisioned by Big Pharma and Big Medicine, once you show up at my office with symptoms of major depressive disorder or anxiety, I'll send you for genetic testing, and once the results come back, I'll be able to pick a medicine regimen fit for your genetic profile. Eventually doctors would hardly be needed - we're expensive, after all - and you'll just take a depression quiz at the insurance company website and then show up to the processing center for the genetic testing and appropriate pill. Maybe I'm being too post-industrial. Or maybe I can just see what goes on in the gleeful and industrious minds of businesspeople in health care. Heaven forbid we all eat well and take enough vacation and exercise in a guerrilla prevention campaign.) Leptin is perhaps familiar to you. It is a hormone that regulates appetite. In general, the higher the leptin, the more your appetite should be suppressed. Obese people usually have high leptin, however, showing that this primary regulation mechanism is broken in the development of obesity. Leptin tends to have a diurnal variation - an evening rise in leptin is normal, but in obesity, this rise doesn't seem to happen (resulting in night munching?). Also, leptin has the ability to suppress cortisol production at the adrenal gland, but for some reason in obesity this suppression doesn't work well either. There are some rare leptin-deficient individuals who end up obese - they tend to be obese, anxious, and depressed, and the administration of leptin alone seems to solve all those issues. Orexin is a brain chemical that stimulates appetite. Nom nom. It is also related to sleep disorders (most famously narcolepsy). In depression, orexin neurons seem to be less numerous (perhaps one reason why depressed individuals classically lost weight, whereas in the Land of Vegetable Oil and HCFS, when we get depressed, we generally gain weight). Orexin seems to activate catecholamines (like norepinephrine and dopamine) and our internal cannabis system (yeah, the chemicals we make in our brains that are rather like the major active ingredient in marijuana - munch munch). Serotonin seems to tell orexin to cool it. Drugs that activate system-wide serotonin (such as phentermine and the recently withdrawn meridia) are used as appetite suppressants to treat obesity. (My discussion of serotonin and heart valves and why 5-HTP skeeves me out is in this post - be sure to read the comments too.) Drugs that block serotonin cause weight gain. SSRIs (which ostensibly increase the amount of serotonin hanging out in the synapse) are used to treat emotional eating and often result in weight loss. (And yes, antidepressants often cause weight gain as well - this is likely due to the antihistamine effect of these agents rather than so much a direct serotonin effect, though I will go into this issue more fully in a subsequent post if there is interest). And, last but not least, IL-6. IL-6 is an inflammatory cytokine that is elevated in obesity and depression. This little bugger is found in abundance in fat cells, suggesting it may have to do with metabolism itself. IL-6 is supposed to be low during the day - in depressed individuals, the levels are especially high during the day, even in depressed individuals who don't have measurable deranged HPA axis issues yet. IL-6 is an immune system activator - Inflammation - and is common to depression, anxiety, and metabolic syndrome. All right then. Nifty! All these players do similar things in depression, anxiety and obesity, and those conditions are commonly found together. But then there is the skinny depressed person, and the happy overweight person. Rather similar to the obese person without diabetes, and the slender type II diabetic. The review papers that discuss the generalities of these conditions tend to explain these differences with; "It's complicated. More studies are being done. Genetics! Big genetics studies! Answers are at hand!" So I'll finish today with... it's complicated. Don't get stressed! Protect your HPA axis with good food and friends and relaxation. Depression and anxiety are just as real as obesity, just not quite as visible.
<urn:uuid:bb801a2a-7276-4d83-bb29-30c0967e8870>
CC-MAIN-2017-39
http://evolutionarypsychiatry.blogspot.com/2010/10/depression-anxiety-and-obesity-2.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687834.17/warc/CC-MAIN-20170921172227-20170921192227-00343.warc.gz
en
0.945512
1,546
2.65625
3
This post is also available in: Svenska Facts about the baby immune system, antibodies and breastfeeding. Written by Professor of Clinical Immunology and Microbiology. Do newborn babies have a functioning immune system or not? What good is the antibodies in breast milk? Agnes Wold is a Professor of Clinical Immunology and Microbiology and one of Sweden’s foremost experts in the immune system and breastfeeding immunology for young children. A healthy newborn baby has a functioning immune system A newborn has a fully functioning immune system. A child has the full capacity to form immune responses to virtually all types of infections (exception: capsulated bacteria). BUT since the child has not had any infections, it lacks immunological memory. When you first encounter a virus, you get sick. At the same time, the immune system is activated and after the infection the immune system remembers exactly what this virus looks like. If you encounter this particular virus again, your immune system may eliminate the virus before you even have time to show any symptoms. Read more about how vaccines work on the immune system Now, unfortunately, there are hundreds of different viruses. If you have not encountered a particular virus before, you also have no immunological memory to it and will get sick. Since a newborn has no immunological memory, they simply have to go through all the viral diseases in order to develop an immunity. Unless there’s a vaccine. This is the simple explanation for the fact that toddlers “are sick all the time”. Preschoolers have an average of 6-8 viral infections per year, compared to adults who “only” have 2-4 per year. The good news is, if you have many infections as a child, for example because you are in a kindergarten, you will get fewer infections when you start school. All because of the immunological memory! Read more about recurrent fever and infection in children Mom gives baby antibody protection To compensate the newborn for the lack of immunological memory, the baby receives ready-made antibodies from the mother during pregnancy. IgG antibodies are actively pumped through the placenta to the baby. Therefore at birth, a baby will have higher IgG levels in the blood than the mother! These degrade gradually, while the child begins to form their own IgG antibodies. Calves and pigs, for example, lack this excellent system and have no ready-made antibodies like newborns. They die if they do not get breast milk immediately after birth, because that’s when they take up IgG in the blood. Breast milk gives baby IgA antibodies that provide extra infection protection The newborn is thus pumped with antibodies from the mother. As additional protection, the newborn receives large amounts of pre-produced IgA antibodies via breast milk. This IgA is not taken up, but is kept out on the mucous membranes where they prevent bacteria and viruses from entering the body. Therefore, breastfeeding protects against infections, especially sepsis (“blood poisoning”, i.e. bacteria in the blood) and bacterial diarrhea diseases. This is vital in poor countries. But in Sweden, blood poisoning is rare in healthy full-term infants and we can generally treat it with antibiotics. Virtually no infants in Sweden become ill with bacterial diarrhea diseases (Salmonella, Shigella and others). The most common bacterial infection in Sweden is ear infections, where breastfeeding provides some protection. IgA antibodies protect immune system from viruses and bacteria While IgA in breast milk protects against intrusion from viruses and bacteria, they also prevent them from coming into contact with the child’s immune system and thus allows time to build-up an immunologic memory. Nature prioritizes a child’s growth so that they will be better equipped when the infections strike. They do this as soon as breastfeeding ends. Then the child must make his own antibodies. In countries with a lot of infections and a lack of clean water, this is a dangerous time as children often experience severe diarrhea, so-called “weaning diarrhea”. Weaning diarrhea does not exist in a country with high hygienic standards like Sweden. The fact that the child received IgG from the mother (via the placenta) and IgA (via breast milk) does not mean that the child’s own production is sped up, quite the opposite. Full breastfeeding is an important protection against diarrhea when water is contaminated WHO recommends exclusive breastfeeding (full breastfeeding) for four to six months. The aim is to reduce the risk of infections and malnutrition in countries with high infant mortality and lack of clean water. The main reason for full breastfeeding in high risk areas, is that the water, bottles and breast milk alternatives are pre-populated with bacteria, often dangerous ones. In addition, children are often malnourished when feeding formula in poor countries with poor hygiene, both because of the diarrhea and because mothers cannot afford to buy enough replacement powder and/or the powder has been diluted too much. In countries with clean water and safe food, there are really no strong medical reasons for full time breastfeeding. Replacement mixed according to the instructions on the package is good enough for the child here, even if it does not contain IgA antibodies at all. Just as you say, since ancient times humans have chewed food and put it in the baby’s mouth. Many studies show that children from all over the world, at any time, even now, have been tasting one thing or another in parallel with breastfeeding. Get started with breastfeeding a newborn Formula-feeding your newborn – how much and how often? How vaccines provide immunity by stimulating the immune system How long should you breastfeed? Professor Anges Wold gives advice to new parents More about strengthening your baby’s immune system by sucking on their pacifiers can be found here.
<urn:uuid:951958c7-795d-412c-a4d7-0c67f8dbcf3b>
CC-MAIN-2023-14
https://www.barnakuten.nu/en/how-a-babys-immune-system-works-about-breastfeeding-and-antibodies/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948620.60/warc/CC-MAIN-20230327092225-20230327122225-00465.warc.gz
en
0.946253
1,217
3.09375
3
What Is the Map? What Is Your Zone? The US Department of Agriculture produces a map for gardeners based on the average of low temperature readings taken from weather stations throughout the United States. The idea is to give the garden industry a way to communicate the cold hardiness of landscape plants. That is why the tag of a holly or any other landscape plant often says “hardy to zone __.” Of course, the map also provides vegetable and herb gardeners like you with a rough guide to the extent of cold where you live. Many of our perennial flowers and herbs are hardy as far north as zones 3 or 4. Cool-season vegetables, most of which tolerate or even like a little frost, will grow well in zones 7 and southward in the fall. This is roughly where we distribute transplants to your local garden center at the proper time for planting. |USDA Hardiness Zones and Average Annual Minimum Temperature Range 1976-2005|
<urn:uuid:a804667a-78a6-42bd-bac2-429ddabbce11>
CC-MAIN-2014-23
http://bonnieplants.com/library/find-your-gardening-zone/
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510268734.38/warc/CC-MAIN-20140728011748-00186-ip-10-146-231-18.ec2.internal.warc.gz
en
0.931688
199
3.25
3
19 February 2020 Replacing the batteries from today’s smartphones is no lesser than a herculean task as it requires extra effort and some specialized types of equipment to get it done right. And, in some scenarios, it is not even possible to take out the old batteries and replace them with a new one. Having a non-removable battery in a smartphone has its own advantages as it offers manufacturers the flexibility to bring more features to their smartphones. For instance, the move allows them to make their phones water and dust resistant, which is also crucial and a requirement. But, replacement is very challenging and it must be easier to maintain the balance. So, the EU has proposed a plan which urges manufacturers to make the batteries easily replaceable. According to a recent report from Dutch financial publication Het Financieele Dagblad (FD), the EU wants manufacturers to facilitate easier battery replacements. The core idea behind this proposal is to bring durability and generate lesser electronic waste. According to the leaked draft procured by FD, the vice-president of the ‘Green Deal’ at the European Commission will be presenting it in mid-March. The EU is reportedly adding the finishing touches to the proposal, which will enforce wider product recycling, re-use raw material, more sustainable production. As per the proposal, the manufacturers would need to ensure that their devices are easy to repair. Reportedly, the proposal also reveals that the EU wants to focus on more extensive recycling of packaging materials and limit the use of microplastics in products and packaging. This will bring sustainability as users will be able to stick with their phones for a longer period of time. It is believed that the EU is also pushing for manufacturers to offer longer guarantee periods and easier to repair information. Battery degradation is one of the main issues with old phones and an easier replacement or a better case would improve the condition of phones.
<urn:uuid:c567af3a-ee43-482e-9db5-ab3133f1e003>
CC-MAIN-2020-24
https://www.mobilescout.com/smartphone/news/n115228/leaked-proposal-eu-battery-replacement-easier/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413406.70/warc/CC-MAIN-20200531120339-20200531150339-00327.warc.gz
en
0.957015
389
2.796875
3
All That You Need To Know About Halitosis Halitosis or bad breath is a common condition encountered by many adults as well as children across the globe. It is a serious problem that has plagued mankind for centuries. Most of the time, the person is even not aware that he has bad breath and is often told by others about it. It is an embarrassing condition because we human beings are social animals. Having bad odor creates an impression of bad hygiene on others. It also imparts the feeling of low self-esteem, and the affected person experiences discomfort while speaking when someone is close to him. Thus, it is not just a physical condition but also impacts the person psychologically. This has led to another problem called halitophobia – fear of bad breath. Individuals suffering from halitosis are quite conscious about their mouth odor, even when they have none. These people will practice extreme dental hygiene and would insist on the dentists to treat them for bad breath, even when they won’t have one. We treat patients from the USA, UK, Canada, Australia, UAE & 180 more countries. Get an expert opinion on your ailment, click here to ask Dr. Shah’s team directly. Causes of Halitosis: Here are some common causes of bad breath or halitosis. - Bad oral hygiene: This is one of the most common reasons for halitosis. Our mouth is a host to a large number of bacteria. They flourish on the back of our tongue, between the teeth, and at the junction between the cheeks and jaw. When we eat, tiny bits of food particles remain in these areas and get decomposed by bacteria, thereby releasing Sulphur compounds that cause bad odor from mouth. Also, if one wears dentures or braces, food gets stuck in it causing bad breath. - Dry mouth: Saliva helps to keep our mouth moist and washes the food particles stuck in the mouth. Also, it has certain chemicals that damage the bacterial walls, thus controls their overgrowth. Due to conditions, such as sleeping, long hours of fasting, and Dry Mouth Syndrome, and certain disorders of salivary glands, the secretion of saliva is reduced resulting in the overgrowth of bacteria, thereby leading to bad breath. - Certain foods: The volatile oils in certain types of foods, such as raw onion, garlic, and vegetables like Horseradish, diffuse in the bloodstream and travel to the lungs causing bad breath. Cheese also causes bad breath. - Dental conditions: Dental cavities, plaque, pyorrhea pus from gums, oral thrush, and tonsillar stones cause bad breath. - Respiratory conditions: Respiratory conditions, such as coryza, sinusitis, continuous postnasal drip, throat infection, and some more, can cause bad breath. The odor can be more like cheese with patients having a history of having thick mucus discharge from the nose. Children and adults who breathe through their mouth could have bad breath. Also, the patients with lung infections who constantly cough and spit mucus may suffer from it. - Diseases of the digestive tract: Diseases of food pipe and acid reflux can cause bad breath. - Metabolic disorders: There are a few metabolic disorders that can make the person suffer from bad breath. These include diabetes, where the breath smells like acetone, kidney failure, liver failure, and Trimethylaminuria, which results in fish odor in the breath. - Smoking and alcohol intake: Smoking and excessive alcohol consumption reduce the flow of saliva resulting in bad breath. - Certain medications: Medications, such as certain antiallergics, anti-diuretics, high blood pressure medications, steroids, antidepressants, and some more, reduce the flow of saliva and cause dry mouth, thereby leading to the development of bad breath. How Can One Correct Bad Breath? In ancient times, various herbs were used to get rid of the bad breath. In modern times, we use mint gums, lozenges, mouth fresheners, and mouth wash to keep our breath fresh. However, these are only temporary solutions to mask the bad odor. For long-lasting results, one has to identify the underlying cause of bad breath and correct it. Here are some basic oral hygiene tips to follow to keep bad breath at bay. - Brushing the teeth properly twice a day, flossing once a day, and scraping the back of your tongue gently with a toothbrush or tongue scraper can help you keep breath fresh. - Rinse mouth properly after eating to remove the particles stuck between the teeth. - Gargling with warm water and salt can prevent bacterial overgrowth. - Sip water often. - Avoid eating strong-smelling foods. - Avoid eating junk and processed foods, which easily stick to the teeth. - Have regular dental checkups. - Visit the doctor to diagnose and treat the underlying health issues. Certain homeopathic medicines, such as Merc Sol, Pulsatilla, Kali Mur, Kreosote, Baptisia, Arnica, China, Chelidonium, and Antim Tart are commonly prescribed for bad breath. These medicines act best when prescribed according to their symptom similarity. To know more about how we can help you for your bad breath click here (link for chat with Dr on website) - Written by Dr. Yafta Saiyad, Associate doctor to Dr. Rajesh Shah + There are no commentsAdd yours
<urn:uuid:5fa7577c-9cf5-4b58-8ac2-70a0c44ff7bb>
CC-MAIN-2023-14
https://www.askdrshah.com/blog/need-know-halitosis/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945333.53/warc/CC-MAIN-20230325130029-20230325160029-00795.warc.gz
en
0.935637
1,138
3.078125
3
This assignment will engage students (individually or in groups) in a decision making process using Claim, Evidence and Reasoning strategies. They will analyze data, make a claim, use evidence and reasoning to support their claim and complete a visual representation of their data. Teachers can require graphs, charts or leave the visual representation ideas open for student interpretation. Excellent for building critical thinking. Can be used as sub plans. ***Similar products are included in: -BUNDLE-Using Data Analysis to Make a Decision-Claim/Evidence/Reasoning-CER-#1-5: https://www.teacherspayteachers.com/Product/BUNDLE-Using-Data-Analysis-to-Make-a-Decision-ClaimEvidenceReasoning-CER-1-5-2812876 - BUNDLE-Using Data Analysis to Make a Decision-Claim/Evidence/Reasoning-CER-#6-10: https://www.teacherspayteachers.com/Product/BUNDLE-Using-Data-Analysis-to-Make-a-Decision-ClaimEvidenceReasoning-CER-6-10-2928549 - BUNDLE-Using Data Analysis to Make a Decision-Claim/Evidence/Reasoning-CER-#1-10: https://www.teacherspayteachers.com/Product/BUNDLE-Using-Data-Analysis-to-Make-a-Decision-ClaimEvidenceReasoning-CER-1-10-2928557 -BUNDLE-Using Data Analysis to Make a Decision-Claim/Evidence/Reasoning-CER-#11-15: https://www.teacherspayteachers.com/Product/BUNDLE-Using-Data-Analysis-to-Make-a-Decision-ClaimEvidenceReasoning-CER-11-15-3188951 #s 16, 17, 18 and 19 available individually. Each bundled product is sold individually as well.
<urn:uuid:dda93f2c-abe3-40ff-92f4-02947ad160a1>
CC-MAIN-2020-29
https://www.teacherspayteachers.com/Product/Using-Data-Analysis-to-Make-a-Decision-Based-on-Claim-Evidence-Reasoning-CER-20-3954140
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655884012.26/warc/CC-MAIN-20200704042252-20200704072252-00428.warc.gz
en
0.712109
433
3.171875
3
Are there more twins in the world? It has been widely assumed that there has been an increase in twins over the years, largely attributed to fertility treatments. It seems like there are twins everywhere you turn; perhaps you notice more and more families with double strollers out and about in the mall or more frequent announcements in the media from celebrity parents celebrating the birth of twins. Television shows like "Kate Plus Eight" (formerly "Jon and Kate Plus Eight") or "Texas Multi Mamas" shine a spotlight on multiple birth. Schools report record registration of twins and multiples and educators wrestle with the issue of classroom placement . The increasing incidence of twins has even generated legislation to ensure that twins' rights are protected in school. The Increase in Twins A 2012 study takes a more specific look at the data and establishes some trends about the increase in the twin birth rate in the United States between 1980 and 2009. A National Center for Health Statistics (NCHS) brief from January 2012 provides the following information: • In 1980, 1 in 53 babies was a twin. • In 2009, 1 in 30 babies was a twin. This represents a 76% increase in the twin birth rate in the thirty years from 1980 - 2009. The study estimated that an additional 865,000 more twins were born during this thirty years than if the twin birth rate had not increased during those decades. To put this in other terms: • In 1980, the twin birth rate was 18.9/1,000 • In 2009, the twin birth rate was 33.3/1,000 In those terms, it is evident that the twin birth rate increased from less than 2 percent of babies born in 1980 to over 3 percent of babies born in 2009. Twin Birth Rates Across the States All areas of the United States experienced a rise in the twin birth rate, but rates continue to differ among the states. This chart shows the twin birth rate in each state of the United States, comparing the rates in 1980 and in 2009 and the percent change over the years. Rates rose by at least 50 percent in 43 states and the District of Columbia, and five states (Connecticut, Hawaii, Massachusetts, New Jersey, and Rhode Island) saw the rate rise by more than 100 percent. The states with the highest twin birth rate in 2009 • Connecticut (45.9/1,000) • Massachusetts (45.2/1,000) • New Jersey (44.2/1,000) • New Hampshire (40.3/1,000) • New York (38.3/1,000) The states with the lowest twin birth rate in 2009 • New Mexico (22.3/1,000) • South Dakota (24.6/1,000) • Arizona (26.6/1,000) • Nevada (27.4/1,000) • Vermont (27.5/1,000) Reasons for the Increase in Twins So what explains the increase in the number of twins? Many assume that it is simply an increased utilization of reproductive technology. However the study identified another significant influence.Several factors have been identified as contributing to increased twinning. One study identified consumption of dairy products as a factor. (Cattle are given growth hormone to increase their production of milk and beef. When women ingest the milk from these animals, their own hormones react, stimulating ovulation.) Another associated rising obesity rates with increases in twinning, citing that overweight or tall women are more likely to have twins. The 2012 study of twin birth rates identifies maternal age as a leading factor contributing to the increase in twins. The largest increase in twin birth rates was realized among women over the age of thirty. It says "Historically, twin birth rates have risen with advancing age, peaking at 35–39 years and declining thereafter (4). Since 1997, however, rates have been highest among women in their 40s." The study illustrates the difference in twin birth rates according to age. In 2009: • Women aged 40 or over: 7 percent of all births were a twin delivery • Women 35-49: 5 percent of births were a twin delivery • Women under age 25: 2 percent of births were a twin delivery. This increase correlates to a shift in the age distribution of women giving birth during the thirty years of the study. Where only 20 percent of women giving birth in 1980 were over age thirty, the same population accounted for 35 percent of births after 2000. "The increasingly older age of mothers over the decades would be expected to influence twin birth rates because of the higher spontaneous (i.e., without the use of fertility therapies) twinning rates of women in their 30s." The study estimates that one-third of the increase in the twin birth rate can be attributed to this elevation in maternal age. Fertility Treatments and the Twin Birth Rate Fertility treatments are largely assumed to the cause behind the increase in twins, and this study supports that theory. The study cites infertility treatments as being responsible for about two-thirds of the increase in the twin birth rate from 1980 to 2009. Fertility therapies include the taking of fertility stimulating drugs or procedures to assist conception, such as in-vitro fertilization. The influence of fertility treatments is somewhat associated with the issue of advanced maternal age as women over the age of thirty are more likely to seek fertility assistance, the study acknowledges. In the three decades during which twin birth rate data was studied, medical technology made fertility therapies more successful and more accessible. The use of reproductive assistance became more prevalent in the 1980's and 1990's. However, the processes have been refined in recent years to restrict the number of multiple births that result as an outcome of fertility therapy, recognizing that multiple birth is associated with elevated health risks and accompanied by greater health care costs. Source: Martin JA, Hamilton BE, Osterman MJK. Three decades of twin births in the United States, 1980–2009. NCHS data brief, no 80. Hyattsville, MD: National Center for Health Statistics. 2012.
<urn:uuid:bfc09b78-f357-4b14-8ad6-32f7c05d3d4f>
CC-MAIN-2020-16
https://howwebecameafamily.com/blogs/how-we-became-a-family/tagged/twins
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371576284.74/warc/CC-MAIN-20200405084121-20200405114121-00329.warc.gz
en
0.957096
1,264
3.234375
3
King Kalākaua's "Secret" Society Originally Appearing in "Hawaii Intrigue" (Abstract 4) Words by Jason K. Ellinwood // Image by J. J. Williams, Hawai'i State Archives Collections While the Freemasons are often spoken of today in conspiracy theories that link them to the Illuminati, this "secret" society had an active and visible role in 19th century Honolulu, with a prominent membership that included three kings: Kamehameha IV, Kamehameha V and Kalākaua. Kalākaua, though, wanted to create a uniquely Hawaiian society, so he founded Hale Nauā in 1886. Hale Nauā, given the English names "House of Wisdom” and "Temple of Science," was dedicated to preserving traditional Hawaiian knowledge, while also seeking connections to modern Western science. Unlike the fraternal organizations imported from the West, both women and men were welcome to join Hale Nauā, although membership was limited to those of Hawaiian ancestry. Perhaps it was this genealogical requirement that caused the Missionary Party (descendants of American missionaries who had grown wealthy with the rise of the sugar industry) to oppose Hale Nauā, accusing the society of promoting paganism and lewd practices. This was one of the many critiques leveled at Kalākaua by this group of white businessmen who felt that their voice in government was not proportional to the taxes they paid. In 1887 they forced Kalākaua to sign what became known as the Bayonet Constitution, which disenfranchised Asian immigrants and poor Hawaiians and diminished the power of the monarchy. Despite the accusations of clandestine immorality, Hale Nauā operated with a remarkable amount of transparency for a "secret" society. An article that appeared in the Nov. 15, 1890 issue of the Hawaiian-language newspaper Ka Nupepa Elele gave details about the finances of the organization, as well as describing current projects, such as a Hawaiian calendar. The article also reported that all members of Hale Nauā received "Crosses of Honor" from a "Renowned French Scientific Society." With the death of Kalākaua in 1891, Hale Nauā ceased to be active but continued to be attacked by members of the Missionary Party. In the years following their overthrow of Queen Liliʻuokalani in 1893, the rulers of the "Republic of Hawaiʻi" attempted to sway American public opinion in favor of annexation and the supposed paganism of Hale Nauā was used as a justification of their actions. Evidence of their influence is found in an article, printed in Ke Aloha Aina on Dec. 14, 1895, about a Baptist minister in New York sermonizing about "pagan" Hawaiians, with the "worst of the paganism" being Kalākaua's activities with Hale Nauā. Supporters of the monarchy replied in an editorial in the Dec. 16, 1895 issue of Ka Makaainana that, "These missionary descendants who have grown fat off of Hawaiʻi are shameless in spreading falsehoods such as this [...] This society [Hale Nauā] was no different from the other secret societies of the foreigners." Despite these rebuttals and other efforts by the royalists, the Missionary Party was ultimately successful in their goal of annexation. However, the legacy of King Kalākaua and Hale Nauā survives to this day in the form of the traditional Hawaiian knowledge that they helped to preserve.
<urn:uuid:ff9399ed-99ae-4af8-be11-3bcbec75b203>
CC-MAIN-2017-47
http://www.abstracthawaii.com/journal/xoi3dsplwbzwka2pe1rhqf838cyvhi
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806447.28/warc/CC-MAIN-20171122012409-20171122032409-00746.warc.gz
en
0.967454
720
3.09375
3
We can through the following three ways to conduct the first identification. 1. Industrial gelatin products generally poor quality, more impurities, viscosity and toughness is relatively small, so particularly fragile, if found in the products found in these, basically can be judged to be added industrial gelatin. 2. Industrial gelatin products, generally have a bright color. Because the consumption of gelatin is transparent, white, very clean, and industrial gelatin impurities. If you use the industrial gelatin, manufacturers will add more flavor, coloring agent, coloring agent to cover up impurities, so the more bright colors may be made of industrial gelatin. 3. Industrial gelatin to do things, because it is to reduce costs, often when the quality, materials, technology, the environment is poor, so the product is not refined
<urn:uuid:e421bdf2-b392-4d6d-985d-d36c83691290>
CC-MAIN-2017-39
http://ttcollagen.com/ViewInfo.asp?id=84
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689471.25/warc/CC-MAIN-20170923033313-20170923053313-00178.warc.gz
en
0.917503
163
2.546875
3
Although the Jews had been allowed to return from exile, they were not in charge of their land. Some of the Jews were ready to accept that situation as inevitable and suggested that they seek some kind of accommodation with the Gentiles surrounding them. So, they approached the king who allowed them to construct a gymnasium (a Gentile kind of place, so Gentile, that in order to use it, they uncircumcised themselves). Meanwhile, the king, Antiochus IV, decided to overtake Egypt. Having that success (198 BCE), he led a strong army into Jerusalem and looted the sanctuary. How much accommodation to civic life is appropriate?
<urn:uuid:430a220d-ce52-4e1a-9cf4-ae39b36ea2ce>
CC-MAIN-2017-30
http://suewhitt.blogspot.com/2015/06/onset-of-persecution-reflection-on-1.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549428257.45/warc/CC-MAIN-20170727122407-20170727142407-00524.warc.gz
en
0.985707
134
3.21875
3
Trigger finger (stenosing flexor tenosynovitis) is a condition in which the finger or thumb click or lock when in flexion, preventing a return to extension. It can affect one or more tendons of the hand, with most cases occurring spontaneously in otherwise healthy individuals. It has a prevalence of approximately 2 in 100 people and can be associated with other conditions, including rheumatoid arthritis, amyloidosis, and diabetes mellitus. In this article, we shall look at the pathophysiology, clinical features and management of trigger finger. Most cases of trigger finger are preceded by flexor tenosynovitis, often from repetitive movements, leading to inflammation of the tendon and sheath. Superficial and deep flexor tendons with local tenosynovitis at the metacarpal head subsequently develop localised nodal formation on the tendon, distal to the pulley. The A1 pulley is the most frequently involved ligament in trigger finger. When the fingers are flexed, the node moves proximal to the pulley, however when the patient attempts to extend the digit this node fails to pass back under the pulley. Consequently, the digit becomes locked in a flexed position. The Flexor Sheath and Pulley System The flexor sheath and pulley system of the digits ensures the flexor tendons remain in the joint’s axis of motion and prevents bowstringing. There are three types of pulleys involved: - Palmar aponeurosis – arises from the palmar aponeurosis and is made up of transverse fascicular bands. - Annular ligaments (5 in total) – A2 and A4 prevent bowstringing; A1, A3, A5 overlie the Metacarpophalangeal (MP), Proximal Interphalangeal (PIP) and Distal Interphalangeal (DIP) joints respectively. - Cruciate ligamenets (3 in total) – prevent collapsing and expansion of the sheath during movement of the digits. The main risk factor for developing trigger finger is having an occupation or hobby that involves prolonged gripping and use of the hand. Other risk factors include rheumatoid arthritis, diabetes mellitus, female gender, and increasing age. Patients with a trigger finger will often initially report a painless clicking/snapping/catching when trying to extend their finger (most commonly middle or ring finger). More than one finger can be involved at a time and it may be bilateral. Over time, this may become painful, especially over the volar aspect of the metacarpophalangeal joint, and the digit starts to lock in flexion. On examination, the proximal aspect of the phalanx should be palpated to assess for any clicking, pain associated with movement, and any lumps or masses. - Dupuytren’s contracture – this differs in that the flexion is painless, fixed and cannot be passively corrected. - Acromegaly – excessive growth hormone results in swelling of flexor synovium within tendon sheath due to increased extracellular volume, limiting both flexion and extension in the affected digit. - Infection (within tendon sheath) – usually preceded with trauma and the finger becomes swollen, erythematous, and tender, with passive movement of the digit causes marked pain. - Ganglion – involving a tendon sheath. The diagnosis of trigger finger is clinical, however blood tests or imaging may be warranted if any of the above differentials are suspected. Mild cases of trigger finger can be managed conservatively. Advice regarding activities that cause pain should be given and a small splint can also be used to hold the finger in the extension position at night (this keeps the roughened portion of the tendon in the tunnel which makes it smoother) For those that do no response to conservative management or are severe, steroid injections can be trialled, which can show improvement over a few days. A percutaneous trigger finger release via a needle can be attempted in most cases, involving the release of the tunnel using a needle, performed under local anaesthetic. For severe cases, surgical decompression of tendon tunnel can be trialled, whereby the roof of the tunnel is slit, in turn widening its mouth to release the tendon, performed under either a local or general anaesthetic. Recurrence of triggering following surgery is uncommon, however adhesions can form if the patient does not begin immediate motion following surgery. - Trigger finger is caused by a localised nodal formation on the tendon, often following cases of tenosynovitis - It presents with a painless clicking/snapping/catching of the affected digit when attempting extension - Management is conservative initially, however may require surgical management if there is no improvement or a significant impact on quality of life
<urn:uuid:249121fd-9950-4b4f-a4fa-f8f8feb08354>
CC-MAIN-2020-05
https://teachmesurgery.com/orthopaedic/wrist-and-hand/trigger-finger/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250592565.2/warc/CC-MAIN-20200118110141-20200118134141-00438.warc.gz
en
0.90164
1,024
3.40625
3
Recently, there has been a lot of buzz around WEB APIs and developer versions of popular social networking companies like Twitter and Facebook. There was a time when the industry was obsessed with SOA and you had to be doing SOA to do it right. Reusability and Loose coupling were the much needed aspects. While this is still the case, the use of Web Services to implement the service-oriented architecture is giving way to REST-based services which are much faster – to implement as well as to understand. Also more and more individuals are interested in creating their own mobile apps with the advent of platforms like Android SDK, IBM Worklight, Phone Gap and trigger.io REST is Representational State Transfer. It’s a protocol based on HTTP which defines everything on the internet with a unique identifier (state). So for example your Facebook profile picture is also a resource on the internet which is uniquely identified. You can GET it using a URL, you can POST a new picture of yourself, PUT (edit) the existing picture or DELETE the picture. The catch is that you are not doing all this using the Facebook page, but using URLs (or more specifically – Facebook Graph API); the advantage – you can plug this functionality in a custom app you write. So how does this all fit in together? Let’s put together the pieces of this jigsaw puzzle and look at the primary actors/stake holders in this space. The Provider Story The providers are the companies (or individuals) who have built some custom functionality which is unique to them. They now want to make it open for anyone to use. So they come up with their APIs (Application programming Interfaces) which are on the WEB, hence called WEB APIs. Simple, isn’t it? Take a look at some of these to get better idea. Facebook Graph API - https://developers.facebook.com/docs/reference/api/ Twitter Web API - https://dev.twitter.com/docs/api/1.1 The Consumer Story The simplest to understand, consumers are simply put the people who use the WEB APIs. So this is you and me. The consumers can also be enterprises. We need the APIs. How else would we know how to get that much desired resource which is lying in some corner of the Internet? As already discussed you and I can plug-in the functionality provided by someone else in our own app – something like a mashup. A very common example is companies using Facebook/Gmail credentials to let you log in to their websites and then posting content on your timeline. You can use Facebook Graph API for this purpose. The primary tenet is reusability- why build something which someone has already built and is making publically available. WEB APIs or REST based services open the gateway for cross-company collaboration. This post might help in integrating Facebook login into your website. The Middle Managers You need a cab in a city which is new to you, what do you do? Yellow Pages... The Middle Managers are the yellow pages (intermediaries) which collect information about multiple providers and make them available to the consumers. Not all companies have a wide social appeal, most are more specific and domain-oriented. The central managers come to build the bridge between producers and consumers which would otherwise not know each other at all. In addition to acting like a directory of provider WEB APIs, middle managers may choose to provide certain value-adds to the providers – like providing API Analytics, which help the provider improve their services, or help know who is their primary customer base, when was the API accessed the most, which geography this is most popular. This is indeed an upcoming trend. This is where IBM Cast Iron Live for Web APIs comes into picture. Other examples include the likes of Apigee and Mashery. WEB API is an emerging and hot trend, but it is quite simple to understand, isn’t it? I would be happy to receive any questions/comments on this topic.
<urn:uuid:aec3657f-7af9-4095-be2c-fa17458d7b4e>
CC-MAIN-2017-34
https://www.ibm.com/developerworks/community/blogs/706a5f30-025f-4dc3-b162-01e918fe489e/tags/iron?sortby=3&maxresults=15&lang=en
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106996.2/warc/CC-MAIN-20170820223702-20170821003702-00411.warc.gz
en
0.955633
850
2.609375
3
The Roman Catholic faith Vatican facts & history in brief he Vatican Hill Map of the Vatican Excerpted from Wikipedia, the free encyclopaedia. Since long before the founding of Christianity, one of the hills on the side of the Tiber opposite the traditional seven hills of Rome has been called the Vatican Hill (in Latin, Vaticanus Mons). It may have been the site of an Etruscan town called Vaticum. It has, for some centuries been the headquarters of the Holy See and, since 1929, that of the State of the Vatican City. All text is available under the terms of the GNU Free Documentation Back to Top Thanks for coming, I hope you have enjoyed it, will recommend it to your friends, and will come back later to see my site developing I'm trying to make my pages enjoyable and trouble free for everyone, please let me know of any mistakes or trouble with links, so I can fix any problem as soon as possible. These pages are best viewed with monitor resolution set at 640x480 and kept simple on purpose so everyone can enjoy them across all media and platforms. You can e-mail me at
<urn:uuid:72872e65-eb81-4b95-b8e1-6ed424b2ddf0>
CC-MAIN-2023-23
http://erwin.bernhardt.net.nz/europe/vaticanhill.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655143.72/warc/CC-MAIN-20230608204017-20230608234017-00311.warc.gz
en
0.884596
305
3.078125
3
Dives Akuru is a script that was once used in the Maldive Islands. It developed from the Grantha script and the earliest known inscription, found on Landhū Island in Southern Miladhunmadulhu Atoll, dates back to the 8th century AD. The script is thought to have been in use before then, however evidence of this has yet to be found. The early Madivian scripts were divided into two variants, Dives Akuru, "island letters", and Evēla Akuru, "ancient letters", by H. C. P. Bell, who studied the Maldivian linguistics after retiring from the British colonial service in Ceylon (Sri Lanka) in the early 20th century. Dives Akuru developed from Evēla Akuru and was used mainly on tombstones, grants and on some monuments until about the 18th century, when it was replaced by the Thaana script. However in some of the southern Maldive islands, Dives Akuru continued to be used until the early 20th century. Today only scholars and hobbyists stil use the script. Dives Akuru is also known as Dhives Akuru, Divehi Akuru or Dhivehi Akuru. Adapted from: http://en.wikipedia.org/wiki/Dhives_Akuru from images drawn by Xavier Romero-Frias Information about Evēla Akuru and Dives Akuru
<urn:uuid:0eff1711-71c9-41f9-a524-051c55abdb8d>
CC-MAIN-2017-26
http://www.omniglot.com/writing/dhivesakuru.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319943.55/warc/CC-MAIN-20170623012730-20170623032730-00350.warc.gz
en
0.925869
299
2.578125
3
Experts in genome-wide association studies Improve your trait selection method for plant breeding Marker assisted selection (MAS) allows the breeder to obtain results in a more efficient way compared to conventional selection methods. Among the various approaches available, selection by detection of candidate genes or markers through association studies (genome-wide association studies, GWAS) is one of the most widely used. GWAS has the advantage over other methods that it does not require targeted crosses, which for some production species is crucial because it saves much time. Among the variety of GWAS approaches applied in breeding programs, AllGenetics can offer the following: Case-control association testing Genetic association testing with quantitative trait, including: - Genome wide scanning or genome wide association mapping. - General linear model (GLM). - Mixed linear model (MLM). - Single trait GWAS (stGWAS). We isolate DNA from your samples. We have adapted different DNA isolation protocols, depending on the starting biological material. We prepare genomic libraries using the kits recommended by Illumina. We sequence the libraries using the Illumina NovaSeq technology. We analyse the high-throughput sequencing data to identify and genotype the selected SNPs in each of the samples analysed. Then we proceed with the genome-wide association studies. What you receive - A table with the alleles called at each locus in each individual. - A list of gene-associated SNPs. - The results of genotype likelihood tests for diversity estimations. - The preliminary quality control analyses for MAF, population structure (Bayesian approaches and principal component analysis - PCA), kinship, and linkage disequilibrium. - The GWAS interpretation results include p-value, R2 value, QQ-plots, Manhattan plots, and GWAS power. - Post GWAS (pGWAS) analyses for Identification of candidate genes, primer design for MTAs, and genotyping in populations of interest.
<urn:uuid:cc43cda7-c188-4917-b5e6-6112e5aee5da>
CC-MAIN-2023-23
https://www.allgenetics.eu/services/genomic-solutions-for-your-company/agriculture-and-farming/genome-wide-association-studies/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646181.29/warc/CC-MAIN-20230530230622-20230531020622-00721.warc.gz
en
0.84341
426
2.609375
3
In the design literature, the term design concept is often used de facto, or with only a brief definition provided. Despite the cursory definition for concept, the design process rests heavily on concepts, e.g., brainstorming and generating multiple design concepts, and subsequently identifying design concepts for concept selection, evaluation and development, etc. Concepts and concept formation are of particular interest in psychology, as concepts play a central role in human cognition. Concepts and concept identification are also of interest in other fields such as archaeology, bioinformatics and education. In this paper, we explore the process of design concept identification and address the issue of identifying design concepts in free-form text. Our exploratory experiment uses text transcripts of verbal concept generation sessions to first investigate agreeability between human concept identifiers. Next, we perform a language analysis on the transcripts to uncover language patterns that may differentiate between text segments containing concepts and text segments not containing concepts. Our results show that humans are adept at identifying and agreeing upon concepts (average agreeability > 0.70), and that there are significant language differences that may distinguish concept segments from non-concept segments (i.e., non-concept segments have significantly more verbs and borderline significantly more self-references than concept segments). In general, automated concept identification may lead to better integration of early conceptual design with more detailed and computable downstream processes, resulting in a unified design workflow. I. Chiu and F.A. Salustri. 2012. Understanding the Design Concept Identification Process. Design Computing & Cognition. College Station, Texas.
<urn:uuid:e984c984-7f43-4412-a9e3-2ef1bc1fff96>
CC-MAIN-2013-20
http://digitalcommons.ryerson.ca/me/16/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698207393/warc/CC-MAIN-20130516095647-00039-ip-10-60-113-184.ec2.internal.warc.gz
en
0.90417
316
2.640625
3
PUBLIC INFORMATION OFFICE JET PROPULSION LABORATORY CALIFORNIA INSTITUTE OF TECHNOLOGY NATIONAL AERONAUTICS AND SPACE ADMINISTRATION PASADENA, CALIF. 91109. TELEPHONE (818) 354-5011 Contact: Diane Ainsworth FOR IMMEDIATE RELEASE December 3, 1991 Astronomers at Jet Propulsion Laboratory are tracking a small object, probably no larger than 10 yards, that is hurtling through space and will pass near the Earth at a distance of about 288,000 miles on Dec. 5. "Although the object, identified as Object 1991 VG, is probably a tiny asteroid whose orbit is very Earth-like, we initially considered the possibility that it had been an aging spacecraft returning to Earth," said JPL astronomer Dr. Donald Yeomans, who is part of a new center at the Laboratory designated as NASA's International Center for Near-Earth Objects. "A recent reconstruction of its orbital history suggests the object was never launched from Earth and, hence, is a natural solar system object," Yeomans said. Astronomers from the Steward Observatory on Kitt Peak near Tucson, Ariz., have been watching the object since it was discovered by the Spacewatch Telescope on Nov. 6. The JPL team of astronomers will spend the next week trying to improve predictions of where the object will be in mid-December, when an attempt will be made to bounce radar off the object. If they are provided with enough observations from astronomers in the Southern Hemisphere by then, the team will be able to use radar facilities at NASA's Goldstone Deep Space Network complex in Mojave, Calif., and the Arecibo radar antenna in Puerto Rico, for the experiment. The radar-bounce experiment will help them determine the object's physical nature, as well as its origin and future orbital path. The radar experiment would be led by JPL astronomer Dr. Steven J. Ostro, who determined that the asteroid 1989 PB (now numbered and named 4769 Castalia) had a strange, double-lobed shape. "This newly discovered object is probably a tiny asteroid orbiting the sun in a period just over one year," Yeomans said. "A close Earth approach of this type is not an unusual event. On average, an object of this size passes closer than the lunar distance to Earth once every few days. Only recently has the optical technology been used to spot these small asteroids." The mysterious object poses no threat to Earth, Yeomans said. Closest approach will occur at 1:45 a.m. Pacific Standard Time just outside the lunar distance of 464,000 kilometers (288,000 miles). Even if the object was found to be on a collision course with Earth sometime in the distant future, it probably would not be expected to survive its entry into Earth's atmosphere. JPL has been active in the discovery and physical characterization of near-Earth-approaching objects. A program of discovery, the Palomar Planet-Crossing Asteroid Survey, directed by JPL astronomer Eleanor Helin, has been responsible for nearly half the discoveries of near-Earth asteroids to date. The Laboratory is currently establishing a new Near-Earth Object Watch to coordinate observations of these objects, including their closest approaches to Earth. This coordinated effort will alert observers to new discoveries and provide them with enough information to plan the most effective follow-up observations. "There has been an emerging realization that there are hundreds of thousands of these small objects, at least 10 yards in size, circling the sun and passing close to Earth," Yeomans said. "These near-Earth objects are the building blocks from which the planets formed. They also represent the source of relatively large objects that could one day strike the Earth and directly influence the evolution of Earth's atmosphere and biosphere. "Because of their low surface gravity and proximity to Earth," he added, "these scientifically important objects also offer us the most accessible source of raw materials for future structures built in space." Observing campaigns will be encouraged through the new Near-Earth Object Watch at JPL to monitor these objects during their closest approaches to Earth. Coordinated observing campaigns will also be encouraged for those asteroids singled out as attractive future mission targets. The new Near-Earth Object Watch will be managed by the Jet Propulsion Laboratory for NASA's Office of Space Science and Applications.
<urn:uuid:75bac8af-03fa-4143-8620-5a8d890e8af0>
CC-MAIN-2014-10
http://www.jpl.nasa.gov/news/releases/91/release_1991_1406.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999651825/warc/CC-MAIN-20140305060731-00011-ip-10-183-142-35.ec2.internal.warc.gz
en
0.943574
922
3.4375
3
"Toxicity or overdose: In alcohol-naive people, a BAC of 300 to 400 mg/dL often causes unconsciousness, and a BAC ? 400 mg/dL may be fatal. Sudden death due to respiratory depression or arrhythmias may occur, especially when large quantities are drunk rapidly. This problem is emerging in US colleges but has been known in other countries where it is more common. Other common effects include hypotension and hypoglycemia. "The effect of a particular BAC varies widely; some chronic drinkers seem unaffected and appear to function normally with a BAC in the 300 to 400 mg/dL range, whereas nondrinkers and social drinkers are impaired at a BAC that is inconsequential in chronic drinkers." "Alcohol," The Merck Manual for Health Care Professionals, Special Subjects: Drug Use and Dependence, Alcohol (Merck & Co. Inc., last revised July 2008), last accessed August 28, 2013.
<urn:uuid:45d35ecb-73fc-42fa-99d6-6330e68833b7>
CC-MAIN-2017-39
http://www.drugwarfacts.org/node/3454
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686034.31/warc/CC-MAIN-20170919202211-20170919222211-00027.warc.gz
en
0.901004
200
2.5625
3
Due to Hurricane Daniel, the two dams surrounding the city of Derna in northern Libya collapsed, raising several questions about the reasons that resulted in this unprecedented disaster in the country. Derna is a port city in eastern Libya with a population of around 90,000. The city is the administrative capital of Derna District, which has a unique location and physical environment as it lies between Jebel Akhdar (also known as Green Mountain), the Mediterranean Sea, and the desert. The city is also home to people of many different backgrounds. In 2014, parts of the city were taken over by Islamic State (IS) militants, who controlled the eastern city of Derna and terrorized residents through summary executions. In June 2015, the Shura Council of Mujahideen in Derna defeated ISIS and took control of the town. However, they were eventually expelled by the Libyan National Army in the Battle of Derna (2018–2019). The abuses are taking place in the absence of state authorities and the rule of law. Among the groups perpetrating these abuses are some that are affiliated with the extremist group Islamic State, which is destroying the country. What were the two dams built for? Historically, the city of Derna had been exposed to a series of floods in 1941, 1959, and 1968. The most severe flood occurred in 1959, prompting the Libyan government to take action. The government contracted with a Yugoslav company to build two dams in the 1970s. The upper dam was called the Al-Bilad Dam, with a storage capacity of 1.5 million cubic meters of water, and the lower dam, the Abu Mansour Dam, had a storage capacity of 22.5 million cubic meters. Both dams were built with a core of compressed clay surrounded by a shield of stone and rocks. The dams were successful in managing the water during a flood in 1986, preventing serious damage to the city. After the civil war and the entry of armed groups, the maintenance of the two dams was neglected for a long time, and it appears that the structures of the two dams, which were built 50 years ago, were dilapidated. Also, there are no efficient drainage systems or protective infrastructure, making the surrounding areas more vulnerable to flooding. Storm Daniel, the ‘medicane’, battered Greece before moving across the Sahara and developing into a storm in the Mediterranean with tropical cyclones. The warm Mediterranean water helped to strengthen Daniel as it approached Libya, bringing winds of 70–80 mph, according to Libya’s National Meteorological Centre. The devastation then came from the extreme rainfall, with 24-hour totals of 150–240 mm. These rains caused two dams to collapse, resulting in devastating flash flooding that has killed thousands of people. International aid arrives as authorities open an investigation. International aid is arriving in Libya from the UN, Europe, and Middle Eastern countries with an announced 29 metric tons. The World Health Organization said “the bodies of 3,958 people have been recovered and identified”, with 9,000 more still missing. While the Ministry of the Interior of Libya’s eastern government said a total of 5,300 people had been confirmed dead in the floods so far, aid groups and officials said that 10,000 people are missing, feared dead either beneath the wreckage of homes or lying somewhere in the floodwaters. The staggering statistics only go so far in conveying the tragedy. Libyan authorities have opened an investigation into the collapse of two dams that caused a devastating flood. To investigate the collapse of the dams and the government’s allocation of maintenance funds, the city has disappeared and been submerged by waves. 7 meters (23 feet), many buildings have collapsed, The call for the inquiry came separately to both governments of a country divided between rival eastern and western administrations: Mohamed al-Menfi, in the east as Libya’s presidential council chair, and Abdel Hamid Dabaiba, as the interim prime minister of the Tripoli-based government. The government warned of the potential collapse of the Gazza Dam, located in the town of Bersis, northeastern Libya, in the Zaza Valley. It is situated 60 kilometers east of the city of Benghazi and about 10 kilometers south of the village of Al-Mubna, near the villages of Al-Hamda and Al-Militania. The valley extends for more than 100 kilometers, and the dam stands at a height of more than 200 feet. Damage to the water pumps caused by Storm Daniel has caused malfunctions. The dam works to retain water, which helps provide agriculture in the area. The Wadi Zaza Basin covers 889 km2, with a water flow speed of 6.8 m3/hour. When the rains intensified, the dam’s water overflowed into residential areas, leading to the destruction of buildings.
<urn:uuid:00cfb220-429e-43aa-8a55-7aace210b5b3>
CC-MAIN-2023-40
https://www.eurasiareview.com/18092023-hurricane-daniel-the-failed-dams-in-wadi-derna-libya-oped/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.3/warc/CC-MAIN-20230923194908-20230923224908-00011.warc.gz
en
0.969666
1,002
3.171875
3
After a crazy week of snow, blizzard and school closure, we finally took on The Cardboard Challenge on March 10th. The "before " pictures below show the great support we received from our community in collecting material for the activity! Mrs. Milliken heard about the idea at a PD session and we were able to find lots of online examples to share with the Kindergarten - Grade Four classes to get them started thinking. The idea seems to have originated with a boy named Caine in Los Angeles in 2012 and you can watch his story here. https://www.youtube.com/watch?v=faIFNkdq96U The first step was planning as a group - being sure everyone's ideas were taken into the discussion and looking over the pile of supplies for material to use. Then Mrs. Milliken said, "Go!". We had several goals for our students with this experience. We wanted an opportunity for them to work together across grade levels as well as negotiate and cooperate to make a unique creation using everyday items often thought of as "junk". Older students were asked to be sure to involve the younger students and take on the leadership role in their group. We were amazed at what we saw! The adults did the difficult cutting as needed but other than that, we stood back and watched their ideas come to life. We hope it encourages students to try these skills at home to exercise their imaginations.
<urn:uuid:8117dff8-6b8f-42d5-b091-549bea6482ab>
CC-MAIN-2017-26
http://room21simms.blogspot.ca/2017/03/the-cardboard-challenge.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321426.45/warc/CC-MAIN-20170627134151-20170627154151-00093.warc.gz
en
0.989224
291
2.984375
3
The Social Security Number, A Biography: Part 2 Social Security office in Baltimore, Maryland. Photo courtesy of the Library of Congress. Last time, we looked at the birth of the Social Security Number, why it was needed and how it was structured. Once the form and function of the number was settled, the Social Security Administration tackled the job of getting their creation assigned to people. Who got the first Social Security Number? Without their own field offices, the SSA relied on the Postal Service to be their boots on the ground. Forty-five thousand post offices helped assign and distribute the first batch of SSNs; 1074 of those offices even tasked employees with typing up the Social Security cards that went with the numbers. In November 1936, the post offices started contacting local employers to find out how many employees they had and then distributed SSN applications accordingly. Once these forms were returned, the post offices assigned an SSN to each person, made up a card for them, and copied the assignment to the SSA in Baltimore for the master files. This was supposed to be done on Tuesday the 24th. Because the completed applications could be brought to a post office in person or returned in the mail, and the numbers and cards distributed at the offices or by letter, and because hundreds of thousands of SSNs were issued on that same day (or earlier, if a post office didn’t follow its instructions), it’s difficult to say who the first person to actually get their number was. Meanwhile, at the SSA headquarters in Baltimore, the number assignments were being broken down into groups of 1000 for processing into the master files. When the first group was done, the head of the operation pulled the top record off the stack and opened it. It might not have been the first number assigned to a person—though some newspapers reported it as such the next day—or the first card typed, but as far as the SSA was concerned, it was the first official Social Security record, and it was symbolic enough. The number was 055-09-0001, and it belonged to 23-year-old John D. Sweeney, Jr., of New Rochelle, New York. Sweeney unfortunately did not live long enough to ever receive his Social Security benefits, dying of a heart attack at the age of 61. Who got the lowest Social Security Number? The SSA had some control over where numbers were issued because of the early geographic distribution of the area number. The lowest numbers went to the northeast states, and while Maine, the most northeasterly of them, should have gotten the block of numbers starting in 001, that group number actually went to New Hampshire. This was done so that the lowest possible SSN, 001-01-0001, could be given to Social Security Board Chairman and former New Hampshire governor John G. Winant. He passed on the number, so the SSA then offered it to John Campbell, a Regional Representative of the Federal Bureau of Old Age Benefits. He didn’t want it either. The SSA finally decided to just assign it to the first New Hampshire applicant, Grace D. Owen of Concord. Who got the first Social Security payment? In the first few years of Social Security’s existence, benefits were paid out as a single lump sum. The first of these payments went to Ernest Ackerman of Cleveland, Ohio, who had excellent timing and retired just one day after the program was put into action. He had five cents withheld from his last paycheck as a Social Security payment and, upon retiring, received 17 cents in benefits. In 1940, the program switched to monthly payments, and the first check was sent to Ida May Fuller of Ludlow, Vermont, for the amount of $22.54. That doesn't seem like much, but Ida made out like a bandit on Social Security over her lifetime. She worked for 3 years under the program and contributed $24.75 before retiring, but lived to age 100 and collected almost $22,000 in benefits. Tomorrow: How the Social Security Number became a major tool in recordkeeping and identification.
<urn:uuid:4bba8428-9779-4fe0-abf7-319c64153ef0>
CC-MAIN-2014-41
http://mentalfloss.com/article/12616/social-security-number-biography-part-2
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657129407.88/warc/CC-MAIN-20140914011209-00237-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
en
0.977627
850
3.28125
3
Caffeine neuropathy is uncommon, though caffeine does induce other side effects, such as dizziness, nausea, insomnia and more. Tingling hands and feet caused by neuropathy, is often associated with other substances, conditions and diseases. Too Much Caffeine Multitudes of people take in caffeine every day: to improve concentration, keep awake, heighten focus. But how much caffeine is too much and what are the side effects of high doses? According to Mayo Clinic, you should have no more than 400 milligrams of caffeine per day. That amounts to about four cups of coffee, ten cans of Coca-Cola and around two energy shot drinks. If you're drinking too much coffee every day, you may experience side effects, such as an upset stomach, restlessness and irritability, insomnia, a migraine headache, rapid heartbeat, muscle tremors and more, says Mayo Clinic. What's more, caffeine should be avoided by children, women who are pregnant or breastfeeding or those taking certain medications. A May 2017 review in Frontiers in Psychiatry, concludes that though caffeine is safe in normal doses, it can be harmful when consumed in high doses, with alcoholic beverages or for certain individuals, such as those with a mental illness. Read more: Long-Term Effects of Caffeine Caffeine, Nerve Damage, Link? Tingling of the extremities is not considered to be one of the many side effects of drinking caffeine. However, according to MedlinePlus, other substances, such as alcohol and certain medications, can lead to peripheral neuropathy, which may then trigger a tingling sensation. Long-term heavy alcohol use, for example, can ultimately lead to nerve damage. Moreover, drugs that treat cancer, infections, seizures and high blood pressure, as well as glue, lead and mercury, could increase your risk of neuropathy. In short, caffeine neuropathy is unlikely. The tingling and numbness may be due to other factors, or you may be experiencing similar side effects to tingling, such as dizziness or muscle tremors. Hands tingling after an energy drink? Perhaps you're simply experiencing the jitters or have induced the sensation through other means, such as staying in the same position for too long. If the feeling of numbness or tingling persists, you should consult your doctor. Numbness and Tingling: Other Causes Another article by MedlinePlus details the many causes of numbness and tingling in your fingers, hands, feet, arms and legs. Among them: - Animal bites, as well as insect, tick, mite and spider bites. - Abnormal calcium, potassium or sodium levels or lack of vitamin B12. - Pressure on the peripheral nerves. - Sitting or standing in the same position for too long. - Nerve injury — according to MedlinePlus, a neck injury may cause numbness in the hand or arm, while a back injury could cause numbness or tingling the back of your leg. - Nerve damage caused by chemotherapy, alcohol or tobacco. - Certain medication. - Lack of blood supply to a certain area. - Medical conditions, such as diabetes, seizures, migraines, multiple sclerosis, stroke, underactive thyroid and carpal tunnel syndrome. Causes of numbness, according to Mayo Clinic, include damage, compression and irritation of nerves. There are several conditions, diseases and injuries that can trigger numbness. Be sure to consult your doctor to get to the root of your discomfort.
<urn:uuid:80c11d79-9cf8-45d6-9c97-39021b046a83>
CC-MAIN-2020-10
https://www.livestrong.com/article/545282-tingling-hands-and-feet-from-too-much-caffeine/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146485.15/warc/CC-MAIN-20200226181001-20200226211001-00223.warc.gz
en
0.934154
736
2.6875
3
I assume many of you have noted the significance of words used by the politicians in describing the impeachment proceedings that has continuously been in the news. My friend, Rhode Island attorney Mark Mandell has written and lectured on the subject of the importance of words we use or “framing” in communicating with people about issues. How we describe something has great significance on the impression and reaction of our listeners. This is a very important principle in trial communications. Recently the New York Times wrote an article about the vocabulary used by House Democrats regarding the impeachment issue that illustrates this point. From the beginning, the choice of “quid pro quo” to describe the claimed unlawful acts of President Trump and his dealings with the leader of Ukraine has been confusing in its apparent significance. How many Americans had ever even heard the term before the news media began continuously using the phrase in their reporting? Even lawyers,who would have an understanding of the term, would likely find that description less than dramatic or shocking. After all, “this for that” is hardly a well-known description of obvious wrongdoing. Apparently, after days of continuous use of the innocuous Latin phrase, House Democrats recognized this truth. They have now decided to substitute “extortion and bribery” to replace the phrase. Responding to Republican claims that there was no wrongdoing because Mr. Trump eventually released most of the military aid, Speaker Nancy Pelosi referred to the action as “extortion.” She said: “The fact is, the aid was only released after the whistle-blower exposed the truth of presidents extortion and bribery,” she wrote in a letter to her Democratic colleagues,. Clearly, these words are totally more sinister then to argue “there was a quid pro quo.” The newspaper article reports that focus groups were conducted by House Democrats and they revealed that the obscure Latin phrase wasn’t communicating any serious wrongdoing to voters. As a result they are trying to change their language and the framing of the issue. The other issue has been the description of what is going on and why it’s going on. To start with there has been a failure on the part of the Democrats to accurately describe what they say happened. The reports of the events have described a demand by Mr. Trump to the president of Ukraine to launch an investigation of his political rival Joe Biden and his son in exchange for the release of military aid that Congress had approved as well as to arrange a visit to the White House. In fact, the evidence is not that the demand was for an actual investigation, but rather that the president simply publicly announce that such an investigation would be launched with no obligation to actually do it. It was the publicity about it that was the goal and not an actual investigation. Furthermore, the impeachment process itself has been confused in the reporting. The process actually involves first an inquiry, then the decision to file articles of impeachment to remove him from office if justified, and then the hearing or trial itself to decide if it should be done. Yet, the entire series of events has been loosely described as “impeachment.” The focus group studies and other investigation by Democrats revealed that voters were much more comfortable with the word “inquiry” then with “impeachment” or “removal.” Framing counts. The investigation also revealed that phrases like” for political gain,” “abuse of power” and “no one is above the law” and real significance for voters. Democratic leaders have urged their colleagues to “keep the language simple, direct and value-based.” Not only is that accurate advice for politicians, it is excellent advice for trial lawyers as well. The recommendation was that phrases like “abused his power and put himself above the law” when talking about Mr. Trump should be used. It was also suggested that Democrats should should describe Republicans who oppose the inquiry as “failing to fulfill their oath of office.” The goal is to “emphasize the core value that no one is above the law.” These phrases communicate a clear meaning of wrongful conduct. After weeks of media attention to the issue Democrats have finally realized that they should abandon the Latin quid pro quo for words that mean something to people. We are in a profession that calls for clear and understandable communication in the persuasion of our causes. Understanding the power and significance of framing is an essential part of this process. We must remember it’s not what we say but how we say it that counts.
<urn:uuid:aa732434-f1c9-4b16-a4b7-6db53cd0d546>
CC-MAIN-2020-24
https://plaintifftriallawyertips.com/its-not-what-you-say-but-how-you-say-it-that-counts
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413551.52/warc/CC-MAIN-20200531151414-20200531181414-00458.warc.gz
en
0.981057
941
2.671875
3
America’s Strange Relationship with North Korea The news has been frightening lately. North Korea is threatening to launch missiles at Guam, where we have a major military presence. They are angry at our joint military exercises with South Korea in the region, and at the economic sanctions we have placed on them for their missile tests. President Trump vowed to retaliate with “fire and fury and frankly, power, the likes of which this world has never seen before.” You don’t have to be an expert to interpret that as a threat of nuclear war. This could end badly for several countries. All it takes is for one side to make a mistake. Retaliating against a perceived but unreal threat or forcing an unhinged dictator into a corner could result in real, deadly consequences. Where does it end? Where did it start? The short answer is that the Korean War never really ended. Korean War on Pause The Korean War lasted three years. Millions of people from several countries were killed in the fighting. It ended in an armistice, a cease fire. The Korean peninsula was changed forever. Technically, the North and South are still at war. North Korea suffered merciless bombing from U.S. forces and lost an estimated 1.3 million of its 9.6 million population. South Korea lost 3.25 million of its 20 million people. The United States lost 33,000 service members and the Chinese, who entered the war to protect their fellow communists in the North, lost hundreds of thousands of soldiers. The North Koreans were left a country ravished by war and destruction. The United States dropped around 635,000 tons of bombs, napalm and explosives on North Korea in the three years of fighting. This wasn’t easily forgotten by the North Korean government or its people. Their suffering of our attacks during the war is used as fear mongering and propaganda so that North Koreans hate us. The government keeps its people in constant fear that the United States will attack and bomb them just as it did in the Korean War. Most Historians agree that the Korean War started because Kim Il-sung, Kim Jong Un’s grandfather, invaded the South. North Korea tells its people that the United States attacked the North and started the war. They have convinced the people that the Kim family must stay in power in order to protect and preserve North Korea. These reasons are used by North Korea to justify its nuclear program. They have tested many times, resulting in several failures. But they appear to have the technology to produce a handful of nuclear weapons which could reach United States territories if not the mainland. They feel their nuclear program will discourage an American attack. So they hate us, and their people are taught to hate us. There have been several tense moments between the U.S. and North Korea and between North and South over the years. The current crisis stems from joint military operations conducted by the United States and South Korea, which the North sees as plans for an invasion. North Korea threatened the United States with a missile strike, and President Trump threatened in return. Supporters claim that Mr. Trumps needs to “speak their language” when dealing with North Korea. In other words, don’t respond to threats with seemingly weak economic sanctions and the like. Threaten them in a manner they will respect. Detractors see this as reckless and immature behavior. Threatening a young, ruthless dictator with nuclear weapons may produce unintended, disastrous results. You don’t want Kim Jon-Un to feel he is trapped in a corner and has to attack to save his regime or save face politically. As the tension rises, mistakes and mishaps could result in the deaths of many people. North Korea may not attack us but may decide to launch devastating missile strikes into South Korea or Japan. It may not have the capability to hurt us directly, but it certainly has the military might to lay waste to its unfriendly neighbors. Risk of War All that considered, the possibility of war still remains low. The fact is, if we attack North Korea, they will attack South Korea and Japan, especially if they can’t hit us. If they strike first — at us or at our allies in the region, they will face certain destruction and an end to their regime. Kim Jong Un may seem crazy, but he’s not suicidal. He wants what he has, and he wants to remain in power. North Korea’s threats are generally prefaced with “If the United States attacks us…” They have been making them many times over the years. We can’t ignore North Korea’s threats, but we can take them at face value. The biggest risks come from misunderstandings and overreactions. Hyperbole and tough talk have been traded in both directions, making many of us wish both of these leaders would just keep quiet for a while. It’s a good idea to make it clear to North Korea that an attack on us will result in certain destruction. But trading barbs with an enemy who is already aware of that seems pointless and reckless. It’s imperative you give your enemy a way out and don’t force him to respond.
<urn:uuid:8d694293-0f97-4cd5-a18f-534cbd98e646>
CC-MAIN-2020-29
https://intpolicydigest.org/2017/08/24/america-s-strange-relationship-north-korea/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655880665.3/warc/CC-MAIN-20200714114524-20200714144524-00003.warc.gz
en
0.971554
1,085
2.5625
3
At Sawtry Infant School, we believe that educating children is the joint responsibility of the school and the parents. We recognise parents as their child’s first educator and believe that they play an important role in supporting their child through their schooling. Our homework is directly linked to what is going on in the classroom. The majority will be based on things learnt that week but occasionally children may be asked to find out information for a forthcoming topic. *1 adult chosen reading book per week. *Later in the year, children can take home a ‘free choice’ book, which they can change as often as they like. *Key words to read and spell will come home later in the year. *1-2 adult chosen reading books per week. *’Free choice’ reading book, which can be changed as often as they like. *1 weekly Learning Log task Reading is an important lifelong skill. Studies have shown that children who read regularly at home often read at a higher level than those who don’t. At school, we teach the children reading skills and home is a good opportunity for the children to put them into practice. Reading aloud gives the children the opportunity to develop fluency, expression and intonation. Children should read regularly at home, little and often is best. Spellings sent home are linked to the spelling patterns and/or common exception words the children have been learning in school that week. New spellings come home on a Friday and are tested the following Friday. Learning Logs– KS1 Learning logs are open ended tasks that give the children the opportunity to demonstrate their understanding of an objective taught in class that week. Occasionally, the task might be to find out about an forthcoming topic. The children can present their work in any way they choose and time spent on tasks may vary, but shouldn’t be longer than 30 minutes per task, on average. Learning Logs come home on a Thursday and are handed in the following Tuesday. If you have any questions regarding homework, please speak to your child's class teacher.
<urn:uuid:f33cc59e-58ce-4870-81e4-b4801c269a03>
CC-MAIN-2020-05
https://www.sawtry-inf.cambs.sch.uk/homework/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250626449.79/warc/CC-MAIN-20200124221147-20200125010147-00427.warc.gz
en
0.974563
431
2.859375
3
This video explains the very basics of consumer’s preferences, and how to successfully build and understand a utility function. We start with basic rationality axioms, then we draw a utility function, and lastly we introduce the concept of indifference curves. Utility is the ‘satisfaction’ we get from using, owning, or doing something. It is what allows us to choose between options. A preference function therefore assigns values to the ranking of a set of choices. This is useful as it allows us to see consumer behaviour as a maximisation problem: faced with a set of options and a budget constraint, we will choose what satisfies us most. Utility functions follow the same code of conduct, the same axioms, as preferences, because they are simply numerical representations of them. That is, they are transitive, complete, continuous, and convex, for the same reasons. The most important thing to point out is perhaps the fact that utility functions do not assign a numerical value to our preferences. They simply indicate order and magnitude of preference, that is, what we like more and by how much. Learn more by reading the dictionary entry.
<urn:uuid:4d297ad7-f60d-43e2-8f4e-3e68e260cfea>
CC-MAIN-2020-05
https://policonomics.com/video-a1-utility-function/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251689924.62/warc/CC-MAIN-20200126135207-20200126165207-00434.warc.gz
en
0.920025
241
3.71875
4
Forward to Sumter Beginning of War Between StatesStreaming Video - 2009 Since the penning of the Declaration of Independence, America had been steadily evolving into two distinctly different societies-and by 1861, sectional differences had reached the flashpoint. This program addresses abolitionist fervor in the industrialized North; the rising clamor for secession in the antebellum South, an agrarian economy transfigured by the cotton gin; and the political emergence of Abraham Lincoln-intertwined strands of history that, like a burning fuse, ignited the War Between the States. Commentary by Eric Foner, John Hope Franklin, Henry Steele Commager, David Donald, William Cooper, and Grady McWhiney is featured. Publisher: New York, N.Y. : Films Media Group, , c1987 Characteristics: 1 streaming video file (52 min.) : sd., col., digital file Uniform Title: Beginning of war between states
<urn:uuid:7c5a45b3-aaaa-483e-9557-b3c901c2e717>
CC-MAIN-2017-39
https://newmanlibrary.bibliocommons.com/item/show/4297107075
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689615.28/warc/CC-MAIN-20170923085617-20170923105617-00592.warc.gz
en
0.869186
193
2.96875
3
Road construction in India is a major task with stages and meticulous planning. Here, in this article, you will go through all of the steps that are important for constructing a road in India. So, at first we’ll start with the planning stage. It consists of various steps like designing, planning and purchasing. After this is where the construction process starts. In the construction phase many factors are kept in mind as it is an important part which creates the road from paper diagram into reality. Factors like site preparation, grading, and pavement comes in this phase, to ensure that every inch of the road is completely built. This phase involves the deployment of a huge quantity of high-quality construction equipment. The , for example, is suitable for land preparation. During the construction phase, it is vital to ensure that safety safeguards are in place and that environmental concerns are addressed. A quality control examination after construction ensures that the road meets quality standards. The road is then opened to the public, with regular maintenance to ensure its safety and functionality. Following these steps can help you understand road construction in India better. Nonetheless, the purpose of this essay is to provide a comprehensive overview. The actual process of road construction may vary depending on the unique project needs. Factors to keep in Mind During Phases of Road Construction Many operations are performed during this stage of road building, including planning, design, and site acquisition. As a result, all of these actions are performed to ensure the success of the project. The planning process includes determining the route’s location, assessing the geography, and estimating the budget. Following that, the design process begins, which includes the production of road layouts, cross-sections, and building material specifications. It is also vital to obtain all necessary licences and permits, as well as to ensure that the project follows all applicable rules and regulations. The pre-construction phase is important to the project’s success. At last, the most important part of any road construction is the land acquisition process. This requires a lot of work as it is a really tough process which comes with many perks like communication gap with land owners and many more. The initial step in the construction phase is site preparation. This entails clearing the area by demolishing and removing any impediments in the way. Following that is the grading phase, which involves altering the terrain to meet the road criteria. After the grading is finished, the foundation is laid. This entails laying down materials like gravel, crushed stone, and sand. Again, the is the ideal machine for finishing your foundation laying operation. This is followed by paving, which is the process of applying asphalt or concrete to produce the road surface. Throughout the construction period, safety precautions must be taken to safeguard the safety of workers and the general public. To reduce the danger of accidents and injuries, proper equipment, signage, and barriers are required. Environmental considerations must also be addressed during the development period. To reduce the environmental impact of construction activities, measures such as erosion control and sedimentation control are adopted. Road builders can ensure that the road fulfils the appropriate criteria after a well planned building phase. As a result, it ensures public safety and will serve the community for many years. Safety measures during road construction This stage is critical for ensuring that safety precautions are in place to reduce the chance of accidents and injuries. As we can see, safety is of the utmost importance throughout the road construction phase. Heavy equipment, open excavations, and construction materials are all possible hazards at this era. Hard helmets, safety glasses, and reflective vests are examples of proper safety equipment. Workers should also be instructed on how to utilise this equipment and must wear it at all times. Together with this, all necessary signage and barriers should be in place to protect the public’s safety during construction. It’s also critical to keep all construction equipment and vehicles in good working order and properly maintained. Frequent safety inspections and maintenance are required to avoid accidents and guarantee that equipment runs efficiently. Quality control checks Following road construction, a quality control check is performed as a postoperative step to ensure the quality of the construction. It is critical because it guarantees that all building materials satisfy the appropriate requirements. Asphalt, concrete, and aggregate are examples of such materials. To assure the condition of the road, testers put samples of these materials through rigorous testing. Throughout the construction phase, the construction team performs regular quality control checks. This way, they can assure that the road’s construction proceeds as planned. These assessments include measuring the thickness of the asphalt or concrete, inspecting the road’s slope and alignment, and confirming that drainage systems are operational. A quality checker team conducts a last examination to confirm that the construction satisfies all criteria. This includes inspecting the smoothness of the road surface, ensuring that road markings are visible, and ensuring that all safety elements, such as guardrails and signage, are in place. Road builders in India can ensure that the road is built to the needed standards by undertaking quality control inspections throughout the construction process. This ensures the public’s trust and safety for many years to come. Maintenance of road Maintenance of the roads is a necessity as it helps the road to regain its life for a longer period of the time. To make this happen, engineers carry out a routine check of the road to see, if there’s any kind of damage. There are several process like filling for cracks, potholes, etc. After the problem are found, the repairing process starts to avoid further harm. To keep the road in good shape, it must be cleaned on a regular basis. Key responsibilities include regular trash disposal and keeping drainage systems clean. Finally, frequent resurfacing aids in the maintenance of the road’s surface. A new layer of asphalt or concrete is applied to the road surface to give a smooth and even driving surface. Road builders in India can ensure that the road remains in good shape and delivers reliable transportation for many years by implementing regular maintenance measures. In conclusion, building roads in India is an important and complex task. It requires careful planning, skilled labour, and strict quality control measures. Each step in the road-building process is crucial, from the initial survey to the final inspection. After all, this ensures the road is safe, reliable, and built to the required standards. In addition, regular maintenance is also essential to keep the street in good condition and to extend its lifespan. With proper planning and execution, India’s road infrastructure can improve and provide safe and reliable transportation for its citizens. Also Check: https://foxdenlane.com/ “This article originally appeared in https://www.clicktohow.com/building-roads-in-india-key-factors-to-consider/”
<urn:uuid:d813919a-6eae-43d3-b5dc-857bf74ddc96>
CC-MAIN-2023-40
https://foxdenlane.com/building-roads-in-india-key-factors-to-consider/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511106.1/warc/CC-MAIN-20231003124522-20231003154522-00896.warc.gz
en
0.948962
1,419
3.109375
3
I like to engage in lateral thinking exercises when I need inspiration. Lateral thinking is defined by Apple’s Dictionary.app as: Phonetics (of a consonant, especially the English clear l) pronounced with partial closure of the air passage by the tongue, which is so placed as to allow the breath to flow on one or both sides of the point of contact. Today’s lateral thinking exercise is: name as many reasons you can for using a sponge. Here we go: - As a sponge. 🧽
<urn:uuid:9d237321-9a63-4a26-8246-ea9056d830fe>
CC-MAIN-2020-16
https://rubenerd.com/lateral-thinking-sponges/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371893683.94/warc/CC-MAIN-20200410075105-20200410105605-00096.warc.gz
en
0.933248
112
2.796875
3
Featured guest blog post by Crystal S, author at LATRO Cellular Forensics Lab Recently I read an article on Psychology Today that triggered some thoughts about kids, teens, and cell phones. Being a millennial, I identified with many things I read in this particular article. It also pointed out that kids and teens use their cell phones eight or more hours a day which was mind-blowing. According to PT, “kids are using their cell phones way too much and putting their mental health at terrible risk. National surveys are showing that kids today are more anxious than ever before, with spiking rates of depression and suicide.” But Why Are Kids and Teens Reaching for their Cell Phones More Than Ever?Is it because of boredom, addiction, or for social interaction? I’ll be the first to admit that when my cell phone dings, I immediately reach for it. It is a crutch when it comes to a long day of working to space out on social media during my lunch hour. Kids and teens do the exact same thing. When you give a child a cell phone without any restriction, they treat it like candy. Kids love candy so they will eat and eat until they get sick and the same analogy can be said for their cell phones. Also, addiction can be a scary word. I knew I was addicted when myself and our team experimented and put parental controls on our phones. To read the full experiment, check it out here. I reached the parental control limit before lunch so unfortunately cell phone addiction is real and alive and not just in our kids and teens. But it seems our youth seems to be reaching for their cell phones more than ever because it stimulates their pleasure centers and sends waves of excitement throughout their bodies. Getting a cell phone notification whether its a text, DM, like, or comment makes kids and teens feel wanted, needed, liked, and accepted. This has been happening since social media skyrocketed back in the Myspace days. Millennials would race home to check their Myspaces to see their new notifications. Now its even easier because we all carry little computers in our pockets and get instant notifications and instant gratifications. What’s Happening with their Social Skills? It also seems that the younger generation is petrified of picking up their phones and calling family and friends. Its as if phone calls are only made when there is an emergency and instead of saying “hello” we say “what’s wrong, who died?” It is easier to send a text and get an instant answer but we see it more than ever with Gen X kids. They need to mentally prepare themselves to call people on the phone especially when its someone they don’t know or if they are asking for help. They will use technology such as email and instant chats before they ever pick the phone and call. Even full on discussions and even arguments happen via text instead of sitting face-to-face and communicating. “Rage texting” is also another form of fighting over cell phones: inessentially sending vicious texts to one individual over and over again with no resolution. The problem with this is that the recipient isn’t able to retaliate their feelings or their answers go unread. Another problem is that the sender cannot see the recipient’s reaction so they send extremely hurtful texts that they might regret later. Social skills are also hindered when kids and teens are in public. They tend to bury themselves in their phones instead of interacting with others around them. They could be missing out on normal social cues that help mature them. What’s the Solution? There are solutions for the world of social skills in our kids and teens: limit the cell phone use, add in other forms of excitement and pleasure inducing activities, and lead by example. Limiting the cell phone use will challenge your kids and teens to fill their time with other activities but it can be hard especially if the cell phone was given without any restrictions. Putting on parental controls is an option but there’s ways around the locks so be cautious with that approach. If you believe your child is missing out on life and too plugged in, then take the steps necessary to help them which might include taking away their cell phones or even making them pay for it. Adding in other forms of pleasure inducing activities is also another route to take. Replace the cell phone use with sports, after school clubs, new hobbies, family nights, game nights, and all without any cell phone use. Let your kids and teens show off their skills and talent through new sports and hobbies. This will also ensure constant human interaction and face-to-face connections for your kids so they don’t lose out on those key social skills. Challenge yourself to regulate your cell phone use too. Pick a set time for no cell phones like dinner time, family activities, and an hour before bed. If you find it difficult to not check your phone every few minutes or to even put it down once you’re on it, then setting a routine might be the answer. You are leading by example for your kids so lead in the direction that will allow them to excel at life.
<urn:uuid:d5869cf9-343d-4288-a44e-79238e516f0a>
CC-MAIN-2023-40
https://www.lehighvalleychamber.org/blog/is-your-teens-cell-phone-use-toxic-to-their-social-skills
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510967.73/warc/CC-MAIN-20231002033129-20231002063129-00855.warc.gz
en
0.959534
1,083
2.515625
3
Portland, Ore. A transmission electron-microscope procedure from IBM Corp. lets researchers create real-time videos of liquid deposition processes to explore their mechanisms at work. The experimental technique allows researchers to quantify electrodeposition fine-tuning instead of depending on trial and error. Before the IBM breakthrough, nucleation, growth and coalescence in electrodeposition processes could only be observed indirectly, by measuring the current transient and analyzing with electrochemical models. But orders of magnitude of difference were found between the parameters obtained from models of current-transient analysis and those confirmed by post-growth microscopy, IBM said. "There are a lot of reactions which take place in a liquid environment," said Frances Ross, a researcher at the Thomas J. Watson Research Center (Yorktown Heights, N.Y.) and winner of this year's Burton Medal for contributions to microscopy. "For instance, our technique will be useful for engineers who want to make videos of materials being deposited on the electrodes of rechargeable batteries." Much to their frustration, semiconductor engineers perfecting copper-on-silicon processes have had to rely on slow imaging techniques, such as atomic-force microscopy, which takes as long as 30 seconds per still image. Fast acquisition methods that work only at step edges have been developed, but they run at only a few frames per second, too slow for electrodeposition, which occurs in milliseconds. In addition, they do not work for the three-dimensional growth of copper on silicon, IBM said. Now, using Ross' imaging technique, chip engineers can make 30-frame-per-second movies of the three-dimensional growth of copper on silicon using a conventional transmission electron microscope. When chip makers went from aluminum to copper interconnects, they found the best way to deposit copper was not sputtering or evaporation but electrodepositiona liquid process in which an entire wafer is immersed in a bath of copper sulfate and sulfuric acid and voltage is applied. The copper grows in both the trenches and on the surface of the wafer. Later, a mechanical polishing step removes all copper except for that in the trenches. "Engineers have discovered many ways to optimize copper growth, using various chemical additives to the copper sulfate and sulfuric acid bath, but even now it's not clear how they work. . . . That's what gave us the motivation to do our experiment," said Ross. By directly observing additives under various conditions and parameter settings, Ross hopes to come up with confirmed rules that tell engineers what it is about the surface that causes copper to begin growing there. "With that knowledge we may be able to design surfaces that have nucleation sites in the places where we want them, so that we have perfect control of the film that gets grown," said Ross.
<urn:uuid:f7725327-20bb-4f57-a278-f89e76b91415>
CC-MAIN-2017-39
http://www.eetimes.com/document.asp?doc_id=1146644
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689661.35/warc/CC-MAIN-20170923123156-20170923143156-00671.warc.gz
en
0.947038
574
3.3125
3
Peltier Channel (The name as it would appear in a gazetteer) Peltier Channel (The name as it would appear on a map) If this information is incorrect, please e-mail [email protected] Feature type: Channel (9) This name originates from United States of America. It is part of the United States Gazetteer and the SCAR Composite Gazetteer of Antarctica. Names that other countries have for this feature: Channel 6 mi long, in a NE-SW direction, separating Doumer and Wiencke Islands to the S of Port Lockroy, in the Palmer Archipelago. Discovered by the FrAE, 1903-05, and named by Charcot for Jean Peltier, noted French physicist. No images of this place could be found.
<urn:uuid:75c507b8-2d45-41b2-8552-ae669c60b3a2>
CC-MAIN-2020-24
https://data.aad.gov.au/aadc/gaz/display_name.cfm?gaz_id=129976
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347394756.31/warc/CC-MAIN-20200527141855-20200527171855-00250.warc.gz
en
0.70719
174
2.90625
3
Nicodemus was founded in 1877 as an unincorporated community in Graham County, Kansas, United States. A group of 30 Black settlers from Kentucky established the town of Nicodemus in western Kansas. Two theories explain the choice of the name Nicodemus. One is thought to be named after the Biblical figure Nicodemus, the other thought to be inspired by the legendary account of an African prince taken into slavery who later purchased his freedom. This settlement was part of a greater movement westward during the latter half of the 19th century encouraging Black people living in the post-Civil War South to seek economic opportunities and a sense of freedom. The area, including Township Hall, African Methodist Episcopal Church, First Baptist Church, St. Francis Hotel, and Nicodemus School District #1 Schoolhouse, is now known as the Nicodemus National Historic Site. - Daniel, S. Chu., & Shaw, Bill. 1994. Going home to Nicodemus: the story of an African American frontier town and the pioneers who settled it. Morristown, N.J.: J. Messner. pp. 18. ISBN 978-0671887223. - Athearn, G. Robert. 1978. In search of Canaan: Black migration to Kansas, 1879–80. Lawrence: Regents Press of Kansas. p. 6. ISBN 978-0700601714. - National Park Service 1986. Promised land on the Solomon: Black settlement at Nicodemus, Kansas. United States. National Park Service. Rocky Mountain Regional Office. - Historic American Buildings Survey, Creator, Nicodemus Town Company, Benjamin “Pap” Singleton, W R Hill, Richard Wagner, Robert Richmond, Deteel Patterson Tiller, et al., Fraser, Clayton B, and William T Belleau, photographer. Nicodemus Historic District, Nicodemus, Graham County, KS. Kansas Nicodemus Graham County, 1933.
<urn:uuid:b25462a7-8141-49c2-b5e1-f7dcccfc5e07>
CC-MAIN-2023-23
https://historyofblacktravel.com/timeline/nicodemus-kansas/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652149.61/warc/CC-MAIN-20230605153700-20230605183700-00328.warc.gz
en
0.880117
420
3.328125
3
I know that, at this time of year especially, thinking about your state’s assessment may evoke some intense emotions. While I don’t expect you to ever love assessment season, I’d like to try to help you feel more comfortable with summative assessments, at least in regard to their overall quality and the thoughtfulness behind them. You might be surprised by how big a role educators play in assessment development. Teachers are involved in every step of the process! Before a state or consortium can even begin to think about the development of test questions, they have to make sure several important features are in place, including things like: - A clear set of academic standards that outline the expectations for students to prepare them for college and careers. - Thoughtful test design to ensure that the test is a fair, reliable, and valid measure of students’ skills. This step is usually referred to as “creating a blueprint.” The blueprint provides guidance on the number of items or points on the assessment, which standards are covered, what constructs that will be reported on, etc. - Explanatory documents detailing what test items that are aligned to their standards look like. These documents are typically referred to as “item specifications” and help get the item writers grounded in the expectations of the standards. They also provide guidance on how to effectively use item types to access the standards in deep and meaningful ways. That list seems pretty simple but getting all that pulled together can take a year or more. Why? Because there are so many people involved in the process, including educators! Teachers play a large role in their state and/or consortium assessments, and their value cannot be overstated. The goal of summative assessments is to provide high-level information about student performance toward mastery of the state’s academic standards, and the only way to do that is to accurately measure what students have learned. Teacher involvement helps test developers ensure the right material is tested in ways that represent what is happening in the classrooms. Teachers also have input at a much more granular level, which is equally important. What follows is a description of the life cycle of an item and where in the cycle teachers exert influence. - For literacy, the passage selection process is key to the future success of the assessment. Students should be provided with texts worthy of their time and attention while still being grade-level appropriate. After vendors have chosen potential texts and have put them through a thorough review for both quality and appropriate complexity, teachers review the texts at passage review meetings. If there are objections, that text won’t find a home on an assessment. - For math, programs differ in approach regarding stimuli, with some programs having educators review the stimuli before an item is developed and others reviewing the stimuli at the same time they review the item. But either way, teachers weigh in on clarity, accuracy, and quality for each stimulus that may get used on an assessment. Item creation is typically handled by testing vendors, although some states or consortia use in-state teachers to write items. The people hired by the testing vendors are usually seasoned writers with teaching experience at the grade level. Having classroom experience when writing items allows the writer to not only better address the standard (They designed their instruction around them!) but also to know what kids at that grade level can do (They taught them!). They also know what language kids are familiar with and the appropriate vocabulary to use (They interacted with them!). The items are sent from item writers back to the vendor, with security being a top priority. All people involved in assessment sign a non-disclosure agreement to keep the material secure. Once the vendor receives the items, the questions go through a rigorous internal review process. Content specialists, who are very often former teachers, review the materials for alignment to standards, clarity, clear correct answers, etc., to make sure the questions are worth asking and will yield valuable information about student mastery of a skill. Then the item receives an editorial review. At this point, the state or consortium client (usually made up of former teachers) reviews the items to prepare to present them to teachers. There tends to be a lot of back and forth at this stage in a collaborative effort to get the items as close to perfect as possible. - Once the items have been revised to incorporate the feedback collected, they are sent to committee review. That committee is composed of teachers from the state. Imagine a room full of teachers examining every item and commenting! Having participated on both the test developer side and as a teacher reviewer, I can tell you the process is both exhilarating and exhausting. It’s no small task to read questions that will end up on an assessment that is used for important decision making. It’s helpful, though, that the reviewers are trained on what to look for in each item, making sure the question is fair and worth asking. - After item review, the materials are edited based on teacher feedback. Then back through editorial they go! At that point, they are considered ready for possible selection as a field-test item. - After items have been field tested, meaning they’ve been “tried out” with students in an authentic setting so data can be gathered without counting against student scores, educators again have a role: they review the data looking for anything that sends up a red flag about the item. For example, did more students pick a single incorrect answer over what was indicated as the correct answer? That may mean either the item was miskeyed or all along the way reviewers were thinking differently about the item. It doesn’t necessarily always indicate there is something wrong with the question, as sometimes it may be just a hard item or testing a skill students struggle with. But it does require a close analysis by educators to make sure the item is valid. Reviewers also focus on whether the item favored or disadvantaged a particular subgroup (e.g., males vs. females, White vs. African American). If an item is shown to favor or disfavor any particular group, the item is not used. This step of the process is referred to as “data review.” If the item is found to be valid, it is then eligible to go on an operational form and becomes part of the item bank from which future test administrations are pulled. Test developers then create operational forms using the items that have survived the various rounds of educator reviews. Test developers have to match the testing blueprint created much earlier in the process. Teachers weigh in on whether the form works as a whole: does it meet the statistical parameters for difficulty, the requirements for standard coverage, and other technical aspects, but also does it hold together as a whole, thus providing useful, valid information to educators, parents, and students? One thing teachers watch out for at this stage is “clueing,” where the answer to one item give away the answer to another. They also pay attention to item order to ensure not all the difficult items clump together to make the testing experience unbearable. For ELA, teachers look to ensure that the passages represent a nice balance of genres and topics to keep the students engaged. Based on the feedback of the educators, the forms are revised and then sent through the publications process, whether that is paper-and-pencil or computer delivery. Depending on the state or consortium, there may be even more places in the cycle where teachers are involved. I hope that knowing that your fellow educators have a part in every step of the process will offer you peace of mind that not only are the tests carefully scrutinized before being put in front of students, but also they are scrutinized by people who know kids, know the standards, and know classroom best practice. If you are interested in becoming part of the process, reach out to your state education agency about possible opportunities for involvement.
<urn:uuid:74a24a00-1845-47a0-89dd-cff48a1f191b>
CC-MAIN-2020-29
https://achievethecore.org/aligned/role-educators-summative-assessment-life-cycle-question/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655896374.33/warc/CC-MAIN-20200708031342-20200708061342-00395.warc.gz
en
0.96023
1,615
3.703125
4
A Top Agriculture Commodity: Data For decades, companies have been collecting data to improve their brand and connect better with consumers. Computers and the internet have blazed a trail for what is being called “the Digital Age” or “Information Age.” Humanity’s ability to collect and store data continues to expand exponentially. The consumer’s desire and competitive advantage’s reliance on new information both advance this data growth. This has transformed data from a passive learning tool to an active currency and commodity. The agriculture industry is very familiar with commodities. Raw agricultural products are harvested and sold to be processed into a value-added products, an end-consumer desire. With agricultural data, the roles are reversed. Raw data is collected and analyzed into value-added information for a producer to use. The agriculture industry is already familiar with the importance of the commodity that is data. Futures, commodity prices, the U.S. Farm Report, yields and genetics have been shaping agriculture for decades — even centuries. The digital age has created an urgency for producers to become more agile to consumer demand. Sustainability, changes in diet, medical research and population growth are a few of the millions of data points that consumers can learn with a quick tap on their phone screen. The information is at our fingertips. The data trend has required innovation and the creation of companies providing services that our grandparents never imagined. Soil and acreage are finite, but the demand for agriculture products will continue to grow. Technology and innovation will facilitate our capability, but use of the data collected will nurture future tech and innovation. Because technology gets the spotlight (drones, AI/automated grain carts, vertical urban farms), here are some highlights of data collection and application in agriculture: - Soil monitoring: Probes and beacons can transmit data to information management systems. This provides real-time soil quality, moisture content and information that can determine the right time to plant, fertilize and harvest to ensure healthy soil and ultimately, sustainability. - Geospatial data: This technology goes beyond guiding an automated grain cart. Farmers can measure plant height, mass and count. They can identify and treat problem areas because of weeds or disease. Grazing livestock can be tracked, and flood prevention opportunities can even be identified based on a detailed analysis of the terrain. - Predictive genetic outcome modeling: Using data points within an algorithm or AI-driven process, a cattle farmer can see which animals have the best genetic traits and improve the quality of calves. Predictions can be made on how adjustments to seeds and soil will affect a crop’s yield. Past interactions could predict future improvements. Data utilization is only a dot on the map to the future of agriculture. Given the importance of agriculture to Missouri, the U.S. and the rest of the world, the Missouri Small Business Development Center (SBDC) is building partnerships in state and federal agencies. The SBDC is developing new curriculum and resources to support the today and tomorrow of agriculture. From producer to supply chain and value-added products, the SBDC supports the small businesses of Missouri Ag.
<urn:uuid:8a5ffc67-2e47-4682-ab5e-7aa4f456e895>
CC-MAIN-2020-16
https://mobizmagazine.com/2019/09/18/a-top-agriculture-commodity-data/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370493818.32/warc/CC-MAIN-20200329045008-20200329075008-00401.warc.gz
en
0.915148
648
2.765625
3
Between a Social Strategy and a Scholarly Quest: The Norman Notables and the Making of Normandy in the 19th Century In the history of the process of the making of regional representations in France in the 19th century, the Norman example is very different from Brittany studied by Catherine Bertho. The Revolution did not only mean reforms which ended the notion of the province as a juridical and institutional entity, but it also entailed social transformations for the elites of the province, modifying their relations to the Norman “homeland” and shifting it now towards the past. The exile suffered by some of them (an essential break in the life of a number of noblemen and priests) accompanied a renewal and a widening which sustained the development of an erudite sociability. The latter from the 1800s would explore what from then on constituted “a referential memory.” This scholarly quest was an instrument of social domination for the notables whose regionalism was based on a very thick network of scholarly societies. This erudite quest aimed at showing the natural and historical foundations of the province and was at the origin of a school of medieval archeology whose importance is highlighted by the influence of Arcisse de Caumont. This intellectual construction which fed the works of French and English romantic writers and artists spread among a growing audience. Norman antiquarians answered by writing travel guides.
<urn:uuid:b2a8b463-df67-4366-be96-0f1c5ced211e>
CC-MAIN-2023-23
http://www.lemouvementsocial.net/en/post/?article=E_LMS_203_0089
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655027.51/warc/CC-MAIN-20230608135911-20230608165911-00507.warc.gz
en
0.956069
281
3.21875
3
This Tutorial contains following Attachments: - SCI 228 - Week 1 - Quiz.docx SCI 228 Week 1 Quiz TCO 1) Which statement is FALSE concerning the field of nutrition? (TCO 1) On average, Americans eat ________ commercially prepared meals each week. (TCO 1) Including fiber in your diet is beneficial to your GI tract, but consuming excess amounts of fiber can result in the loss of nutrients. This statement is an example of which of the factors to consider in planning diets? (TCO 1) What element makes protein different from carbohydrates and fat? (TCO 3) Collectively, the nerves of the gastrointestinal tract are referred to as: (TCO 3) Barbara has just been diagnosed with celiac disease. Which of the following foods would be most dangerous for her to consume? (TCO 3) An estimated ________ of all chicken eggs in the U.S. are contaminated with Salmonella. (TCO 3) A cyclic food allergy is one that: (TCO 3) The easiest and most effective way to prevent food-borne illnesses is to: (TCO 3) Why is rBGH given to many U.S. dairy cows? Write a reviewYour Name: Your Review: Note: HTML is not translated! A B C D F Enter the code in the box below:
<urn:uuid:6d7ac164-d8ce-4dcb-8e6e-dc88a8c788f3>
CC-MAIN-2017-34
http://www.assignmentclick.com/sci-228-week-1-quiz
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103891.56/warc/CC-MAIN-20170817170613-20170817190613-00344.warc.gz
en
0.92798
295
2.890625
3
Surgeons Without Borders: A Brief History of Surgery at Médecins Sans Frontières. AffiliationMédecins Sans Frontières, 49 Jorrisen St., Braamfontein 2017, Johannesburg, South Africa, [email protected]. MetadataShow full item record JournalWorld journal of surgery AbstractMédecins Sans Frontières (MSF) is a humanitarian organization that performs emergency and elective surgical services in both conflict and non-conflict settings in over 70 countries. In 2006 MSF surgeons departed on approximately 125 missions, and over 64,000 surgical interventions were carried out in some 20 countries worldwide. Historically, the majority of MSF surgical projects began in response to conflicts or natural disasters. During an emergency response, MSF has resources to set up major operating facilities within 48 h in remote areas. One of MSF strengths is its supply chain. Large pre-packaged surgical kits, veritable "operating theatres to go," can be readied in enormous crates and quickly loaded onto planes. In more stable contexts, MSF has also strengthened the delivery of surgical services within a country's public health system. The MSF surgeon is the generalist in the broadest sense and performs vascular, obstetrical, orthopaedic, and other specialized surgical procedures. The organization aims to provide surgical services only temporarily. When there is a decrease in acute needs a program will be closed, or more importantly, turned over to the Ministry of Health or another non-governmental organization. The long-term solution to alleviating the global burden of surgical disease lies in building up a domestic surgical workforce capable of responding to the major causes of surgery-related morbidity and mortality. However, given that even countries with the resources of the United States suffer from an insufficiency of surgeons, the need for international emergency organizations to provide surgical assistance during acute emergencies will remain for the foreseeable future. - Care of surgical infections by Médecins Sans Frontières Operations Centre Brussels in 2008-14. - Authors: Sharma D, Hayman K, Stewart BT, Dominguez L, Trelles M, Saqeb S, Kasonga C, Hangi TK, Mupenda J, Naseer A, Wong E, Kushner AL - Issue date: 2015 Apr 27 - Amputation in emergency situations: indications, techniques and Médecins Sans Frontières France's experience in Haiti. - Authors: Herard P, Boillot F - Issue date: 2012 Oct - Non-governmental organizations in international health: past successes, future challenges. - Authors: Gellert GA - Issue date: 1996 Jan-Mar - Ethical dilemmas in medical humanitarian practice: cases for reflection from Médecins Sans Frontières. - Authors: Sheather J, Shah T - Issue date: 2011 Mar - Operative trauma in low-resource settings: The experience of Médecins Sans Frontières in environments of conflict, postconflict, and disaster. - Authors: Wong EG, Dominguez L, Trelles M, Ayobi S, Hazraty KR, Kasonga C, Basimuoneye JP, Santiague L, Kamal M, Rahmoun A, Kushner AL - Issue date: 2015 May
<urn:uuid:e29ff604-2ded-4984-a27e-dad435493989>
CC-MAIN-2020-05
https://fieldresearch.msf.org/handle/10144/83734
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251802249.87/warc/CC-MAIN-20200129194333-20200129223333-00043.warc.gz
en
0.87614
704
2.59375
3
Technology & Combat Characteristics The Turn A (∀) Gundam was originally designed for interstellar warfare. Unlike mobile suits from previous timelines, the Turn A is powered by a DHGCP power plant (Discontinuous Hyperoscillation Gauge Collapsing Pile) which is essentially an artificial black hole. The power plant leaves the chest cavity of Turn A empty, allowing various equipment to be placed inside, as evidenced by the Turn A holding nuclear warheads within the cavity. The Turn A's main propulsion is provided by an I-Field Beam Drive System, which left the mobile suit completely hollow and allows it to be filled with extra armaments and rocket thrusters. Moreover, the Turn A is also equipped with an I-Field Barrier which could protect it from various sorts of attacks with power output lower than the system requires, such attacks include nuclear explosions. The Turn A features a standard set of armaments consisting of a beam rifle and two beam sabers, for heavier firepower the unit mounts two beam cannons on its abdomen area. In addition to these weapons, the Turn A is equipped with a basic shield for defense. To further enhance its combat power, the Turn A has large support units called DOC Bases (Device Operation Control) which hold various armaments for the Turn A. These DOC bases allow the Turn A to adapt according to the situation at hand. One of these DOC Bases was discovered in C.C. (Correct Century) 2345 by Loran Cehack. However, the discovered base was more or less rendered unusable by the Moonlight Butterfly, with the only surviving and usable weapon being the Gundam Hammer which was heavily coated with nanomachines. The Turn A's on-board nanomachines are capable of a devastating attack known as the "Moonlight Butterfly" (named after the visual appearance of the attack when active). At its full power, the Moonlight Butterfly can cover a wide range (from Earth to Jupiter). The Turn A's nanomachines have the ability to convert most if not all matter to silicon dioxide (sand) on an molecular basis, allowing it to turn objects into sand during the use of the Moonlight Butterfly. It is said that the Moonlight Butterfly has three requirements, the nanomachines, the energy to use them, and finally the program to activate it. However, in C.C. 2345, the Turn A only had the nanomachines and the program. The Turn A did not possess sufficient amount of energy to activate the Moonlight Butterfly on its own and required energy from an outside source, namely the CONCEPT-X 6-1-2 Turn X. Contrarily, Turn X only had the sufficient amount of energy for the usage of Moonlight Butterfly, but lacked the nanomachines and program. The Turn A is also capable of total regeneration of both itself and its pilot, by using the same nanomachines that the Moonlight Butterfly uses. However, this ability is not instantaneous and it requires a considerable amount of time. Although not fully confirmed, this ability is speculated to be a technology adoption of the DG cells of the JDG-00X Devil Gundam. Furthermore, the Turn A possesses the non-canon ability to warp beam shots directly into enemy cockpits with unspecified limitations. However, it is confirmed that beam shots with outputs exceeding the beam warping system's power consumption are not able to be warped by the Turn A. Also, teleportation is noted as another one of the Turn A's non-canon abilities (the teleportation of the Turn A only occurs in the novel version of the dark history and is never shown in the ∀ Gundam series itself). Additionally, the Turn A is capable of bending light through an unknown method and cloaking itself from the sensors of most mobile suits. This stealth ability allows the Turn A to create an illusion of teleportation. - Beam Cannon - The Turn A mounts two beam cannons on its abdomen, these beam cannons can scatter their beam particle shot to cover a large radius. - Beam Saber - The Turn A is armed with two beam sabers, these beam sabers are stored on the Turn A's shoulders. Moreover, it has been shown that the Turn A's beam sabers have a adjustable power output and range. One can be used as a reserve weapon, or both can be used simultaneously in a twin sword fashion. The Turn A's beam sabers can also be turned into a defensive armament by the Turn A by rotating its manipulators in a 360 degree motion while holding beam sabers to create make-shift beam shields. - It is notable that the Turn A's main pilot, Loran Cehack has a habit of using these as his preferred weapon because of his a pacifist outlook. Generally, Loran uses them to cut around the cockpit and as to not cause collateral damage by using the Turn A's beam rifle. - Additionally, the Turn A's beam saber is noticeably thinner when compared to the standard beam saber of other mobile suits. - Multi-Purpose Silo - The Turn A's Multi-Purpose Silos were originally used to store missiles of an unknown origin or type. Two of these silos were used to store nuclear warheads in C.C. 2345 for a short period of time. - Beam Rifle - The Turn A features a beam rifle, like many conventional mobile suits. The Turn A's beam rifle's power output is notably much greater than the output of a conventional beam weapons, however its exact power is unknown. - Gundam Hammer - The Gundam Hammer was essentially a large spiked ball attached to a chain. It is a ranged melee weapon. The Turn A could either throw or swing the hammer around itself in order to impact and damage its target through the sheer mass of the hammer. The Turn A's Gundam Hammer is similar to the one used by the RX-78-2 Gundam. - Minchi Drill - The Minchi Drill is a unique mace-like close combat weapon that is first seen used on the TAF-M9 Eagail. It is based on a shield machine (tunnel boring machine) used for excavations. This weapon can pulverize or even cut through mobile suits. - The Turn A mounts a basic shield for defensive purposes, this shield is used to block both beam and physical attacks. Special Equipment and Features - Core Block System - The Turn A features a Core Block System like some other Gundam type mobile suits. The Core Block System allows the Turn A's Core Fighter (which is also its cockpit and front skirts) to detach from the main body of the mobile suit for whatever reason. - VR Head - Installed in the Turn A's cockpit was a retractable virtual reality helmet which connects to the mobile suit's camera sensors. - I-Field Barrier - The I-Field forms an invisible barrier around the Turn A, protecting it from incoming beam attacks. It can be assumed that the Turn A has one of the most powerful I-Fields, thus the Turn A's I-Field probably protects it from most physical attacks as well. It has been shown in C.C. 2345 that the Turn A's I-Field can protect it from the explosion of a nuclear warhead. - Moonlight Butterfly System - Both the Turn A's and Turn X's nanomachines are capable of an devastating attack called the "Moonlight Butterfly," named after the strange butterfly wings that emits from the Turn units when the attack is active. It is said that the attack has three requirements, the nanomachines, the energy to use them, and finally the program to activate it. At full power, the Moonlight Butterfly can cover a wide range (from Earth to Jupiter), while turning most if not all technologies into silicon dioxide (sand). Lastly, the Moonlight Butterfly can be used as a defense of sorts as it can easily defend against both beam and physical attacks. - Nanomachine Regeneration System - The Turn A's Nanomachine Regeneration System allows it to "regenerate" any damaged areas on the mobile suit. It is said that with its full capabilities the Turn A can also regenerate its pilot. However, it is notable that this feature is impractical in battle as the Nanomachine Regeneration System requires a considerable amount of time. - Teleportation System - Despite not being explicitly shown in its deployments in C.C. 2345, it is said that the Turn A can teleport itself and its beam weapons through an unknown method. This ability is not firmly held in canon and is not seen used in the animated series. The Turn A (∀) Gundam is first found by Loran Cehack and Sochie Heim in C.C. 2345 during their coming of age ritual, outside the city of Nocis, the capital city of Inglessa. The Turn A was called the "White Doll" (most of the characters referred to it as the White Doll). At first the White Doll appeared to be a statue of sorts and was used in the coming of age ritual by teenagers. However the Turn A became active and revealed itself to be an operational mobile suit when the forces of Dianna Counter attacked Nocis. The Turn A would take the side of the Inglessa Militia in their struggle against the invading Moonrace in C.C. 2345, piloted primarily by Loran. It would serve as the Inglessa Militia's trump card against the more advanced mobile suit forces of the Moonrace. Eventually, after accompanying the Willgem to the Moon, Loran finally learned the dark truth about the Turn A's past. It was revealed by the data of the "Black History" that the Turn A was responsible for the destruction of Earth's civilizations by unleashing its "Moonlight Butterfly" attack, spreading nanomachines across the Earth's surface (and through space, to Jupiter, with the exception of the Moon) and turning all of mankind's technology into sand. After learning of this truth Loran also discovered several features of the Turn A that he was unaware of, most notably that the cockpit was a Core Fighter capable of separating from the Turn A; also Loran discovered the ability to make the Turn A vanish from sight through bending lightwaves. It is revealed that the Turn A is a reversed engineered Turn X. The Turn A was created due to the discovery of the Turn X, which was found before the Correct Century started, drifting in space. The Turn X outclassed all other mobile weapons at the time of its discovery. The Earthlings at that time were horrified by the fact that such advance technology existed and far surpassed their own capabilities. The Earthlings figured that if such a technologically advanced civilization were to attack them, they would stand no chance. Thus the Turn A was created. However after the creation of the Turn A, the Earth was divided into 2 factions, one possessing the Turn X and one possessing the Turn A Gundam, and a war between both sides began. Eventually, the full power of the two Turn units were released, and the ensuing conflict and a series of political decisions related to it led to all traces of technology between the Earth and Jupiter (save the civilizations on the Moon) being completely wiped out. At some point during this great conflict the Turn X was defeated in battle by the Turn A and received the X shaped mark that it continued to bear on its chest throughout the rest of its history. These events are assumed to have led to the beginning of C.C. 0001. During the Turn A's second and final battle with the Turn X, both machines unleashed their Moonlight Butterflys and engaged in single combat. Both Turn units fought each other to a stalemate until both units managed to heavily damage each other in close combat. Both pilots, Loran Cehack and Gym Ghingham, escaped unharmed and subsequently engaged in a short sword duel. However, both machines were encased in a large cocoon as the Moonlight Butterfly from both machines were of equal strength and thus both suits were unable destroy each other. Eventually, both the Turn units and Gym Ghingham were encased in the cocoon created by the two Moonlight Butterflys for an unknown amount of time (presumably for a long time). - Turn A Gundam TAKU Custom - A customized Turn A Gundam unit built and operated by TAKU, the leader of the popular rock group SGOCK Third Generation. This unit features a black color scheme and retains all of the Turn A Gundam's standard armaments. When fighting near water surfaces, TAKU uses the shield as a makeshift surfboard. Notes & Trivia - The ∀ Gundam was chosen to be the 100th Master Grade model of Gunpla (abbreviation of Gundam Plastic Model) and at an earlier time, the first release of the ∀ Gundam DVD box set was announced. - The Hajime Katoki Version of the suit sports a different design as well as redesigned mouth-piece, which more closely resembles that of a normal Gundam. - Although Katoki did a different design for his own version of the ∀, he did design the Master Grade of the ∀ Gundam, which is the same as the anime version. - Kunio Okarawa also drew his own version of the ∀ Gundam. The latter also sports a mouth piece similar to the original Gundam. - The chest of the ∀ Gundam has sometimes been depicted as bearing a white cross instead of being completely blue. - The Master Grade of the ∀ Gundam has the option of swapping the blue cross-shaped piece of the chest with a white one. - The ∀ Gundam is the first Gundam to not be powered by an Ultracompact Fusion Reactor, instead relying on a power source unique to its timeline. Future Gundams would continue this trend. - ↑ Cite error: Invalid <ref>tag; no text was provided for refs named - ↑ Hobby Japan, June, 2007 issue, Gunpla LOVE - ↑ Dengeki Hobby, May, 2007 issue, 20th anniversary of Turn A |∀ Gundam Mechanics| AMX-109 Kapool | AMX-109 Kapool Corin Nander Custom | Armadillo | High Heel | MS-05 Borjarnon Gavane Goonny Custom | MS-06 Borjarnon | NRS-P701R Godwin | OZ-10VMSX Gundam Aesculapius | SYSTEM ∀-99 ∀ Gundam Armored Car | Gun Emplacement Truck Bull-One | Hipheavy |Cruiser / Mother Ship| CONCEPT-X 6-1-2 Turn X | FLAT-L06D FLAT | G-838 Mahiroo | G-M1F Bandit | G-M2F Zssan | JMA-0530 Walking Dome | MRC-F20 SUMO | MRC-F31 Muttowooo | MRC-U11D Walking Dumpling | NRS-P701 Gozzo | SPA-51 Cannon Illefuto | SYSTEM ∀-99 ∀ Gundam | TAF-M9 Eagail MR-SPI05Ω"Jet Stream" | MRC-C03 Bellona |Cruiser / Mother Ship| Almaiya class | Aspite | Gendarme | Soleil
<urn:uuid:95bb753c-a38d-407e-be11-cc0a9cda53f4>
CC-MAIN-2017-43
http://gundam.wikia.com/wiki/SYSTEM_%E2%88%80-99_%E2%88%80_Gundam
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824775.99/warc/CC-MAIN-20171021114851-20171021134851-00088.warc.gz
en
0.948939
3,157
2.734375
3
A half-test reliability measurement can be performed by splitting the test questions into two groups, such as odd-numbered questions and even-numbered questions, and then comparing the results. The scores obtained from the two groups are correlated, and if the scores obtained from both halves demonstrate a high positive reliability coefficient, or correlation, it can generally be assumed that the test is reliable.Continue Reading Reliability in a testing procedure refers to the degree of consistency that can be expected when the test is administered under varying circumstances. In addition to the split-half reliability method of measuring test consistency, other measurement procedures include the inter-observer, test-retest and parallel-forms methods. Before relying upon a test to asses important research hypotheses and questions, researchers will subject their tests to one or more reliability measurement methods to help ensure the accuracy and consistency of the results.Learn more about Statistics
<urn:uuid:6f594f79-4ea5-4359-9a96-0a076cbecb8b>
CC-MAIN-2017-43
https://www.reference.com/math/split-half-reliability-measurement-performed-b4ee97338bb6e0d1
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822739.16/warc/CC-MAIN-20171018032625-20171018052625-00311.warc.gz
en
0.933742
178
3.609375
4
What was before Microservices ??? So before digging into the Microservices Architecture, we need to understand what was before Microservices and what are problems with that architecture. So before Microservices, there was Monolithic Architecture. Monolithic Architecture is like a big container where all the software components of an application are assembled and deployed together. That means your client-side user interface, the server-side application that handles HTTP requests and database, is deployed as a single executable component. Therefore the components are tightly coupled with each other in the application. For a lightweight application, a monolithic architecture suits better. But for complex, evolving applications, it will be a nightmare. What is Microservices ??? In simple terms, Microservices is an architectural style that structures the application as a collection of small autonomous services modeled around a business domain. Each service is self-contained and implements a single business capability. Apart from that, Martin Flower, the founder of this architectural style, describes Microservices as below. Microservice architectural style is an approach to developing a single application as a suite of small services, each running in its process and communicating with lightweight mechanisms, often an HTTP resource API. These services are built around business capabilities and independently deployable by fully automated deployment machinery. There is a bare minimum of centralized management of these services, which may be written in different programming languages and use different data storage technologies. - - Martin Fowler, James Lewis - - Why Microservices Better than Monolithic Architecture Monolithic: Let assume a use case of an online shopping application. Where users can order and search for items. In the shopping season, the searching component of the application will have more traffic. But the developers cannot scale the search component of the application only because all the components of the application are deployed as one instance. Therefore new instances of the tightly coupled application have to be created every time to scale. Therefore, it will lead to the waste of resources in the server. Microservice: Since Microservice is a domain-driven architecture, components are divided into a well-defined scope and a dedicated purpose with a single business capability. So in a use case like an online shopping application, components like listing items, order items, searching items will be deployed separately. Therefore when the developers need to scale the searching component during shopping seasons, they can perform Granular Scaling on that needed component. Monolithic: Assume that developers want to make small changes in the application in the item listing component. Since all the modules are developed and deployed as one instance, the problem here is that the developers have to rebuild the code for every small change. Microservices: Since each module is developed and deployed independently and if developers need to do any change in a single module or component don't need to redeploy the entire application just redeploy the module with the changes. Monolithic: Imagine developers need to adopt new technologies like NestJS and GraphQL to fetch the item details from the backend, but since the whole application is developed and deployed as one big container, we have to stick to fixed technology stack when developing and can not use different technologies for each component. Microservice: But in Microservice, we can develop each component like listing items, order items, searching items using different technology stacks since all the components are loosely coupled and independently deployable. Then they can communicate with lightweight mechanisms, often an HTTP resource API. Another advantage is that depending on the need of each component can utilize different technology stacks. Because some components might be CPU-intensive, and some components might be Resource-intensive. Fault Tolerance (Reliability) Monolithic: Let’s imagine the order item feature is not working in the application. Since the application is deployed as one compact module, the complete system goes down. To handle this, the application has to be re-built, re-tested, and also re-deployed. Microservice: Since the application is deployed and developed as a set of small autonomous components, there are failover mechanisms and design patterns to use when developing the microservices to avoid defaults or bugs in one component bring down the entire application. (We will discuss how we can perform failover mechanisms in future articles). The main difference between Monolithic and Microservice 🔸 The monolithic application put all their functionality in a single process and scales by replicating the monolithic on multiple servers 🔸 The microservice application puts each element of functionality into separate services and scales by distributing these services across servers replicating as need. Some Characteristics of Microservices Componentization via Services Services as components rather than libraries. Services avoid tight coupling by using explicit remote call mechanisms. Services are independently deployable and scalable Organized around Business Capabilities Microservices are not organized around the technical capabilities of a particular product but rather business capabilities. Microservices are not divided into UI teams, database teams, and so on. There are cross-functional teams that work towards the fulfillment of one single functionality. Products not Projects The standard project model is to deliver pieces of software that are then considered to be completed. After that, hand over to a maintenance organization and disband the project team. The Microservices style is that a team should own a product over its full lifetime. For example, Amazon: You build, You run it. Decentralized Data Management Each Microservice component will have a separate database for its operation. When using decentralized storage Polyglot Persistence is frequent in microservices architectures. It manages inconsistencies via the business practices in place throughout the organization by using a common design such as reversal processes versus 2PC distributed transactions. Design for Failure (Fault Tolerance) A consequence of using services as components is that applications need to be designed so that they can tolerate the failure of services. Any service call can fail due to the unavailability of the supplier. Therefore can use design patterns like the circuit breaker to smoothly handle those failover incidents. Best Practices of Microservices 🔸 When moving to microservices, you should have a fresh domain-driven design. 🔸 Don’t use hardcoded values for configuration parameters. Instead, use a service discovery mechanism to like Service Registry. 🔸 Logging: Logging is a vital part of microservices because it will help us to track the flow of requests as well as to track bugs or errors that will occur in microservices applications. When logging, we have to be mindful about logging at the correct level and position. Otherwise, it will be a mess. We should only log once for a particular error at the initial layer that will call multiple-layer like Service, Repository, DAO, etc. Therefore, log in to the place where we initiated the process, and we must log the stack trace or some information to understand where the error exactly happens on multiple service call layers. 🔸 Versioning: Use Semantic Versioning to maintain application versions. When our microservice application version is updated to 3.0.0 from 2.0.0, it is considered a breaking change. Therefore consumers using our services have to adjust their services depend on our new version. We can maintain both those versions parallelly and direct traffic to both of those versions. Then it will give some time to the consumer to update their service to consume our new service. 🔸 Dependency: Each service should be independently deployable. Therefore avoid any tight coupling between any services. Therefore we must maintain independence among services when developing as a best practice. 🔸 Executable Contracts: We should always make some test cases or scripts for services we develop. Therefore whenever we build any of our services CI tools will execute those tests. Then if those tests are passed we know that we haven’t broken our consumers. 🔸 Documentation: For documentation, we can use a tool like Swagger. It will allow us to write technical terms, and the swagger toolset will convert the technical terms we wrote into a proper documentation. The above figure shows how different components of the microservices architecture work together. A brief functionality of each component is listed below. - Clients: Different users from various devices send requests. - Identity Providers: Authenticates user or client identities and issues OAuth Tokens using an identity provider service. - API Gateway: Handles client requests. - Static Content: holds static all the content of the system. - Management: Balances load on services and identifies failures. - Service Discovery: Helps in finding the way to communicate with other microservices. - Content Delivery Networks: A distributed network of proxy servers and their data centers. - Remote Service: Enables remote access to information that resides on a network. Some Disadvantages of Microservices - The monitoring of the microservices application will be difficult. - Hard to test because services are isolated. If we need to run the integration testing, it would be a bit difficult since it depends on various other services. - The debugging of microservices applications can be difficult. For further more clarification check these resources;
<urn:uuid:d97ac1ff-96b5-4fd4-80ad-12fa71d53a59>
CC-MAIN-2023-40
https://ranmal-b-dewage.medium.com/microservices-part-1-overview-about-microservices-d10091599cd?source=user_profile---------1----------------------------
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510454.60/warc/CC-MAIN-20230928194838-20230928224838-00532.warc.gz
en
0.920987
1,878
3.375
3
Alexander "Sandy" Purcell, professor of entomology at UC Berkeley's College of Natural Resources, retired July 1 after 35 years of research and teaching. Purcell was instrumental in first culturing Xylella fastidiosa and demonstrating the bacteria as the cause of Pierce's disease, whose devastating effects on grapevines gravely threaten California's vineyards. Much of Purcell's work has focused on the understanding and mitigating the impacts of the glassy-winged sharpshooter, X. fastidiosa's most dangerous vector. "Sandy wrote the book on understanding the process by which many important agricultural diseases operate," said UC Berkeley collaborator and microbial biology professor Steve Lindow. "His work has been unique and incredibly important because it looks at both the process of plant pathology via insect vectors, and also the epidemiology of disease, understanding how a disease moves around." Purcell earned his Bachelor of Science degree from the U.S. Air Force Academy in Colorado and his Ph.D. in Entomology at UC Davis, in 1974. He began teaching at UC Berkeley in 1974 and served as chair of the department of Environmental Science, Policy and Management from 1993 to 1994 and as head of the Environmental Biology division the following year. Rodrigo Almeida, an assistant professor of insect biology at UC Berkeley and Purcell's former graduate student, said that in addition to his research contributions, Purcell was also a great mentor. "Members of the lab group could always try their own ideas. He never said 'this is a bad idea,' but instead subtly directed people to where they would find their own success," Almeida said. Most importantly, Almeida said, "Sandy always emphasized the importance of field work, and of linking basic research to real-world problems." Purcell, who was granted emeritus status, plans to continue some of his research over the next two to three years.
<urn:uuid:4d3ad4d9-b0b6-4969-8e83-b541c4ac101e>
CC-MAIN-2014-10
http://westernfarmpress.com/alexander-purcell-world-renowned-pierces-disease-expert-retires
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011011190/warc/CC-MAIN-20140305091651-00067-ip-10-183-142-35.ec2.internal.warc.gz
en
0.977912
399
2.625
3
Please note: This course will be taught online only. In person study is not available for this course. Iulia Cioroianu is a Lecturer in the Department of Politics, Languages and International Studies at University of Bath, and an affiliate of the Institute for Policy Research and the ART-AI Centre for Doctoral Training. Iulia is a computational social scientist who studies the effects of social media and online information exposure on political competition and polarization using natural language processing and quantitative text analysis, machine learning and survey experiments. She holds a Ph.D. in Political Science from New York University and an M.A. from Central European University. Before joining the University of Bath, she was a research fellow in the Q-Step Centre for Quantitative Social Sciences at the University of Exeter, and a teaching fellow in the LSE Department of Methodology. Our world is increasingly being recorded as digital text, capturing human knowledge and interactions to an unprecedented level and providing a rich source of data for researchers across different academic disciplines and subjects. Consequently, computational text analysis methods and tools are becoming increasingly popular and starting to make their way into the core research methods curriculum. This course is designed to provide social science researchers an entry point to computational text analysis. Participants will gain hands-on experience designing and implementing a quantitative text analysis research project and will learn to discuss, evaluate and interpret the results. Each class consists of a 2-hours lecture followed by a 1.5 hours lab in which participants apply the methods covered in the lecture in R. We will start with an overview of computational text analysis methods and discuss examples of their application across multiple disciplines and research fields. We will then survey the main ways in which text data can be acquired and present several major online text data sources. The first steps in a text analysis research project – covering imputing, importing, manipulating and storing text data under different formats, as well as cleaning and processing it – often prove to be the most challenging for beginners. After addressing this initial set of issues we will study: the main ways in which text data can be turned into numbers; descriptive methods such as frequency tables and word clouds; automated dictionary methods (such as those developed to extract different emotions from text); text comparison methods (which are often used to study the diffusion and evolution of laws, policies and ideas); and text scaling methods (such as those used by political scientists to map the positions of political actors in the ideological space). Finally, the course provides an introduction to machine learning applied to text data: supervised classification (routinely used in multiple disciplines to label large volumes of text documents based on a small subset of coded data) and unsupervised learning methods (as a very light introduction to topic modelling). At the end of the course, participants will have an understanding of the current quantitative text analysis research landscape, the ways in which computational text analysis can be applied to their area of interest and the main data sources, tools and methods available for further exploration. Participants will also gain hands-on experience designing and implementing a quantitative text analysis research project in R and will be able to discuss and interpret the results and acknowledge the limitations of the methods used. Essential texts – (this text will be provided by ESS): Grimmer, J., Roberts, M. E., & Stewart, B. M.: Text as Data: A New Framework for Machine Learning and the Social Sciences, Princeton University Press, 2022. ISBN: 978-0691207551 Students are expected to have working knowledge of R, and be familiar with basic (undergraduate level) research design and statistical analysis notions. Background knowledge required Linear regression – elementary OLS – elementary Software / Programming R – moderate 2F: Quantitative Text Analysis The course is delivered in ten sessions. Each session consists of a lecture and a lab. During the lab students will work through sets of examples that involve collecting different forms of online text data and analysing it using the text analysis methods introduced in the course. Textbook: Grimmer, J., Roberts, M. E., & Stewart, B. M. (2022). Text as Data: A New Framework for Machine Learning and the Social Sciences. Princeton University Press. Overview of computational text analysis methods and their application across multiple disciplines. Preview of used software and packages. - Benoit, K. 2020. “Text as Data: An Overview.” In Curini, Luigi and Robert Franzese, eds. Handbook of Research Methods in Political Science and International Relations. Thousand Oaks: Sage. - Textbook Chapter 2. - Gilardi and Wuest (2018). Text-as-Data Methods for Comparative Policy Analysis Working paper. Available at: https://www.fabriziogilardi.org/resources/papers/Gilardi-Wueest-TextAsData-Policy-Analysis.pdf What is digital text? Acquiring text data. Collecting data from different sources and in different formats – intro to Application Programming Interfaces and web scraping. - Textbook Chapters 3 and 4. - McCormick, T. H., Lee, H., Cesare, N., Shojaie, A., & Spiro, E. S. (2017). Using Twitter for Demographic and Social Science Research: Tools for Data Collection and Processing. Sociological Methods & Research, 46(3), 390–421. https://doi.org/10.1177/0049124115605339 - Glez-Peña, D., Lourenço, A., López-Fernández, H., Reboiro-Jato, M., & Fdez-Riverola, F. (2014). Web scraping technologies in an API world. Briefings in Bioinformatics, 15(5), 788–797. https://doi.org/10.1093/bib/bbt026 Manipulating and storing text data. Formatting and working with text files in different formats. File formats, storage options, indexing and meta-data. - Batrinca, B., & Treleaven, P. C. (2015). Social media analytics: A survey of techniques, tools and platforms. AI & SOCIETY, 30(1), 89–116. https://doi.org/10.1007/s00146-014-0549-4 Text cleaning and pre-processing. Introduction to regular expressions and natural language processing. - Denny, M. J., & Spirling, A. (2018). Text Preprocessing For Unsupervised Learning: Why It Matters, When It Misleads, And What To Do About It. Political Analysis, 26(2), 168–189. https://doi.org/10.1017/pan.2017.44 - Welbers, K., Atteveldt, W. V., & Benoit, K. (2017). Text Analysis in R. Communication Methods and Measures, 11(4), 245–265. https://doi.org/10.1080/19312458.2017.1387238 - Textbook Chapters 5 and 9. - Regular Expressions as used in R, https://stat.ethz.ch/R-manual/R-devel/library/base/html/regex.html Text to numbers. Descriptive text methods. Comparing texts and computing text similarity measures. - Textbook Chapters 7 and 8. - Erk, K. (2012). Vector Space Models of Word Meaning and Phrase Meaning: A Survey. Language and Linguistics Compass, 6(10), 635–653. https://doi.org/10.1002/lnco.362 - Jansa, J. M., Hansen, E. R., & Gray, V. H. (2018). Copy and Paste Lawmaking: Legislative Professionalism and Policy Reinvention in the States: American Politics Research. https://doi.org/10.1177/1532673X18776628 - Linder, F., Desmarais, B., Burgess, M., & Giraudy, E. (2020). Text as Policy: Measuring Policy Similarity through Bill Text Reuse. Policy Studies Journal. https://doi.org/10.1111/psj.12257 Automated dictionary methods. - Textbook Chapters 15 and 16. - Tausczik, Y. R., & Pennebaker, J. W. (2010). The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods. Journal of Language and Social Psychology, 29(1), 24–54. https://doi.org/10.1177/0261927X09351676 - Loughran, T., & Mcdonald, B. (2011). When Is a Liability Not a Liability? Textual Analysis, Dictionaries, and 10-Ks. The Journal of Finance, 66(1), 35–65. https://doi.org/10.1111/j.1540-6261.2010.01625.x Introduction to machine learning applied to text data. Supervised classification. - Textbook Chapters 17-20. - James, G., Witten, D., Hastie, T., & Tibshirani, R. (2013). An Introduction to Statistical Learning: With Applications in R. Springer. Chapter 2. - Yu, B., Kaufmann, S., & Diermeier, D. (2008). Classifying Party Affiliation from Political Speech. Journal of Information Technology & Politics, 5(1), 33–48. https://doi.org/10.1080/19331680802149608 Unsupervised learning. Principal component analysis, clustering methods and introduction to topic models. - Textbook Chapters 12 and 13. - Wilkerson, J., & Casas, A. (2017). Large-Scale Computerized Text Analysis in Political Science: Opportunities and Challenges. Annual Review of Political Science, 20(1), 529–544. https://doi.org/10.1146/annurev-polisci-052615-025542 - Quinn, K. M., Monroe, B. L., Colaresi, M., Crespin, M. H., & Radev, D. R. (2010). How to Analyze Political Attention with Minimal Assumptions and Costs. American Journal of Political Science, 54(1), 209–228. https://doi.org/10.1111/j.1540-5907.2009.00427.x - Laver, M., Benoit, K., & Garry, J. (2003). Extracting Policy Positions from Political Texts Using Words as Data. American Political Science Review, 97(2), 311–331. https://doi.org/10.1017/S0003055403000698 - Slapin, J. B., & Proksch, S.-O. (2008). A Scaling Model for Estimating Time-Series Party Positions from Texts. American Journal of Political Science, 52(3), 705–722. https://doi.org/10.1111/j.1540-5907.2008.00338.x - Perry, P. O., & Benoit, K. (2017). Scaling Text with the Class Affinity Model. ArXiv: http://arxiv.org/abs/1710.08963 Further topics and applications. The final lecture and lab will expand upon the previous topics in response to student interests.
<urn:uuid:89399e18-8434-4d7f-bd4a-36769bfac927>
CC-MAIN-2023-14
https://essexsummerschool.com/summer-school-facts/courses/ess-2023-course-list/2f/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948871.42/warc/CC-MAIN-20230328201715-20230328231715-00673.warc.gz
en
0.777611
2,526
2.5625
3
Even though exposure to the sun can help your body make sufficient amounts of vitamin D needed for health, about 42 percent of Americans do not get adequate amounts of this essential nutrient, according to a “Nutrition Research” article published in 2011. The impact of vitamin D deficiency results in poor bone health and may increase your risk of diseases such as cancer and cardiovascular diseases, reports a 2004 review article in the “American Journal of Clinical Nutrition.” Vitamin D and Bone Health Your body needs vitamin D to absorb calcium from the intestines. If you lack vitamin D, you absorb only 10 to 15 percent of the dietary calcium consumed. This is about half of what you would normally absorb if you are not vitamin D deficient, according to an article published in the “American Journal of Clinical Nutrition.” The resulting weak, soft and achy bones from lack of calcium deposition during vitamin D deficiency cause rickets in children and osteomalacia in adults. Another effect of vitamin D deficiency is a loss in bone density, which increases the risk of osteoporosis and fractures. Diseases and Vitamin D Deficiency A lack of vitamin D may increase your risk of falling because it causes muscle weakness and pain, according to the Linus Pauling Institute. Low vitamin D levels also increase risk of several diseases such as hypertension, heart failure, stroke, multiple sclerosis, rheumatoid arthritis, diabetes and prostate, colon and breast cancers. In contrast, high vitamin D levels reduce risk of arthritis, increase lung function and boost the immune system, states a publication from the Harvard Medical School. Diagnosing Vitamin D Deficiency The only way of finding if you lack vitamin D is through a test that measures the level of 25-hydroxyvitamin D in blood. While levels of 25-hydroxyvitamin D below 20 nanograms per milliliter signify vitamin D deficiency, levels in the borderline range of 20 to 30 nanograms per milliliter indicate that you are at risk of developing vitamin D deficiency. However, you have a sufficient amount of vitamin D if your blood levels of 25-hydroxyvitamin D fall between 30 to 74 nanograms per milliliter, according to MedlinePlus.com. Getting Vitamin D Simply walking, working or reading in the sun for 5 to 10 minutes every day allows your body to make sufficient amounts of vitamin D. However, do not cover your arms or legs with clothing or sunscreen, as both prevent synthesis of vitamin D from the sun. Additionally, make natural and fortified food sources of vitamin D such as salmon, mackerel, herring, fish liver oils, eggs, milk, cheese and breakfast cereals a regular part of your diet. Although vitamin D supplements are also available, only use them after consulting your physician because excess vitamin D can cause toxicity. Articles For Your Diet - Nutrition Research: Prevalence and Correlates of Vitamin D Deficiency in US Adults - American Journal of Clinical Nutrition: Sunlight and Vitamin D For Bone Health and Prevention of Autoimmune Diseases, Cancers and Cardiovascular Disease - Harvard Health Publications: Vitamin D and Your Health: Breaking Old Rules, Raising New Hopes - American Journal of Clinical Nutrition: Vitamin D Deficiency: A Worldwide Problem With Health Consequences - Linus Pauling Institute: Vitamin D - MedlinePlus: 25-Hydroxy Vitamin D Test - man on the beach taking sunbath image by rgbspace from Fotolia.com
<urn:uuid:2510be10-466f-4609-a7d0-f65a565e56de>
CC-MAIN-2014-23
http://healthyeating.sfgate.com/lack-vitamin-d-you-6375.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510280868.21/warc/CC-MAIN-20140728011800-00110-ip-10-146-231-18.ec2.internal.warc.gz
en
0.874688
717
3.65625
4
During product development, prototypes help assess the functionality and reliability of a product before investing considerable resources into full-scale production. But what options are available for manufacturers to provide customers with cost-efficient, wear-resistant prototypes and products in short lead times? Injection molding: High repeatability, low efficiency During the process of injection molding, a polymeric material is injected into a mold. As seals are usually made of softer materials, injection molding might sound like an ideal method for producing flexible seal prototypes. However, as injection molding requires a mold to be produced, initial costs can be high. While this might not be a problem for where mass numbers of the same item are needed, it is not as cost-efficient in cases where small batch numbers are required. Time is also an issue, especially as the method often demands multiple molds to be created before a design is perfected and finalized. For this reason, it is not well-suited to producing one-offs such as prototypes. Rapid prototyping—3D printing an option? 3D printing, or additive manufacturing, has transformed product design, and offers a much faster option for creating prototypes. 3D printers create an item by building layers of a material on top of each other. For this reason, intricate and accurate designs are possible—while also minimizing wastage. As opposed to injection molding, initial costs are not as high with 3D printing. The technology opens up possibilities for relatively affordable one-off prototypes or bespoke parts in small numbers. However, some argue that accuracy in repeatability could be an issue. 3D-printed prototypes may demonstrate how a part will fit, but cannot necessarily withstand extreme temperatures or pressure during field testing. In its current state, 3D printing is a long way from producing prototypes with the functional and mechanical properties that will allow them to be used as operational seals. A revolution in machining Machining is a common method for creating parts and prototypes from metals and harder materials. However, many seals are made of softer materials which were previously difficult to machine. A softer material requires an increased level of pressure control and accuracy from a cutting tool as not to disrupt design precision. Creating a flexible seal from rubber or flexible thermoplastic elastomers therefore requires coordination between the machining process and extraction as well as tools that are optimized for elastomers. An important factor is also the material for the semi-finished product: this needs to be stiff enough to be machined yet flexible enough to function well as a seal when finished. Machining tools such as SKF SEAL JET can produce custom-made prototypes in very short production times. Computer numeric control (CNC) production systems ensure that an accurate amount of steady pressure is applied to softer materials to shape the seal prototype and a suction unit clears waste material from the work area. Depending on the availability of the right semi-finished product, a prototype can be produced in just a few minutes. SKF operates more than 90 machining centers worldwide, serving customers in multiple industries. The innovative machining system SKF SEAL JET minimizes manufacturing and dispatch time. It supports companies with a production method that is customizable, affordable, and capable of producing seals within minutes. In addition, materials specially developed for the machining process enable optimized quality in the seal’s physical properties. Material properties and sealing behavior are also simulated using finite element analysis (FEA) software. SKF performs an extensive range of tests on both its materials and seals to maximize standards of quality and reliability. Saving costs, shortening production time Advanced machining designed to work with flexible but wear-resistant materials provides a solution to producing durable, customized seal prototypes. It is also precise and cost-efficient. With shorter lead times, increased quality and accuracy, and lowered cost outlay, no batch size is too small and customers receive the ideal product or prototype for their equipment. In this way, testing and implementing the right seal is much more efficient for all parties.
<urn:uuid:e9c15f04-0f31-479d-bad8-7f8a6564ddc3>
CC-MAIN-2023-23
https://industrialsealsexpert.skf.com/progress-and-development/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644309.7/warc/CC-MAIN-20230528150639-20230528180639-00485.warc.gz
en
0.951652
819
3.109375
3
When you think about it, a conveyor belt system is a pretty simple piece of equipment. As one of the primary methods for moving goods from one place to another, this system has been around for a long time. A belt conveyor is an inclined plane moving materials from point A to point B. But with so many different types of belt conveyors on the market and various configurations and sizes available for each type, it can be challenging to know where to begin when making your purchase. There are many different models and brands out there. Still, by arming yourself with the correct information before you commit to purchasing one, you can reduce the risk of ending up with something that isn’t right for your operation. Before buying a belt conveyor, consider what you need to know. Defining your requirements The first thing you need to do is get a clear understanding of the requirements for the belt conveyor you want to buy. This includes not only what the conveyor needs to do but also where it needs to be located. You also need to determine the volume of material to be conveyed and the required travel speed. Additionally, you must also take into account factors such as belt length, width, and curvature. If you don’t understand these measurements, don’t worry — we’ll look at each in more detail in the following few sections. But first, let’s look at a couple of other things you need to consider: Determine the type of conveyor belt you need The first step in buying a belt conveyor is determining the type of belt conveyors you need. This is important because it will impact the rest of your buying process. For example, you’ll need to decide between a roller-type conveyor and a gravity-type conveyor. Roller-type conveyors are powered, whereas gravity-type conveyors are not. There are many different conveyors, each with unique characteristics, so research well and decide on one that fits your needs and budget. Size of your facility and the volume of material to move All other things being equal, smaller conveyors are cheaper per ton than larger ones. So, if you are moving heavy material, you may need a more extensive conveyor than if you are moving lightweight materials. It also often makes sense to put two smaller conveyors in parallel to get the capacity of one larger conveyor. When buying a belt conveyor, it’s essential to ask about the capacity of the existing belts and the maximum capacity of the existing equipment. If you plan to expand, you must ask about the expansion capacity. The distance the material needs to be moved. Belt conveyors are often used to move material from one floor to another. While this is a widespread application, it’s essential to know that belt conveyors have high internal frictional losses and don’t move material long distances very efficiently. That’s why you often see belt conveyors in factories that are only a few hundred feet long. When buying a belt conveyor, it’s essential to ask about the maximum distance the conveyor can travel. A long conveyor has a much higher total investment cost. How fast do you need the material to move Belt conveyors are often used in applications where the material needs to be moved relatively slowly and steadily. But many belt conveyors can move material at much higher speeds than required. If you are buying a new belt conveyor and need to move material at a certain speed, you should ensure the conveyor can do so. The type of material you will be moving. Different belt conveyor types are more suitable for various materials than others. When buying a belt conveyor, asking about the maximum allowable belt load is essential. This maximum weight can be carried on the belts without damaging them. And it’s crucial to select a conveyor that can handle the particular type of load you will be moving. The cost of the belt conveyor Different belt conveyor systems have different total investment costs. The main things determining the investment cost are the type of system (parallel or series), the belts’ length, width, and the speed at which the belts are moving. Parallel belt conveyors are often more expensive than series belt conveyors, but they can sometimes be more efficient because they have fewer frictional losses than series conveyors. Parallel belt conveyors are more flexible and easier to expand than series conveyors. Identifying the right manufacturer Once you know what type of belt conveyor you need, you must focus more on the specific manufacturer and brand. This is important because it will help narrow down your choices and give you a better idea of what to expect from each manufacturer. For example, let’s say you’re looking for a roller-type belt conveyor with a 24-inch wide conveyor belt. You’ve determined that you need a belt conveyor with a roller-type design, and the conveyor belt width should be between 20 and 30 inches wide. If you know which manufacturers produce this belt conveyor, you can start narrowing down your choices based on other factors. For example, you can decide which manufacturer offers the best warranty or has the best customer service. Whatever you do, don’t just go with the first manufacturer you find. Be sure to research several manufacturers to make an informed decision. A belt conveyor is a simple piece of equipment — but it’s also critical to many businesses. Fortunately, buying a belt conveyor doesn’t have to be overwhelming or burdensome. When choosing a belt conveyor system, there are various factors you need to consider. Not all belt conveyors are the same, and each has its benefits and drawbacks. The potential cost savings and possible performance enhancements from specific conveyors can also vary widely. You can narrow your choices and make a better buying decision by following the few simple steps mentioned above.
<urn:uuid:72e29bf3-6618-4df4-af98-7c4460ae8cf4>
CC-MAIN-2023-23
https://techtecno.com/how-to-buy-a-belt-conveyor-a-guide/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650201.19/warc/CC-MAIN-20230604161111-20230604191111-00600.warc.gz
en
0.95257
1,237
2.578125
3
In the spring of 1846, the United States was still battling England over boundaries. At issue was the northern boundary of Oregon. The more radical of the Democrats were adament that the boundary extend up to Alaska, at 54 degrees, 40'. Other democrats such as John C. Calhoun, were satisfied with the expansion through the Texas annexation. The Whigs, for the most part, were concerned with avoiding war with England, and refrained from demanding all of Oregon. In the end, the boundary was set at the forty-ninth parallel during a closed session of the Senate in June.
<urn:uuid:518e4043-6793-485d-b559-80eaf44da0de>
CC-MAIN-2013-48
http://xroads.virginia.edu/~CAP/smithson/territory.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163816314/warc/CC-MAIN-20131204133016-00048-ip-10-33-133-15.ec2.internal.warc.gz
en
0.98468
122
3.375
3
Mangrove forests around the Indo-Pacific region could be submerged by 2070, international research published today says. Even with relatively low sea-level rises, many mangrove forests had a poor outlook said Professor Catherine Lovelock, a University of Queensland ecologist. "Mangrove forests are particularly vulnerable," she said. "Mangroves are predicted to be submerged in parts of Thailand, Sumatra, Java, Papua New Guinea and the Solomon Islands." However the outlook in other parts of the world was more positive. "Our modelling shows mangroves are likely to persist in east Africa, the Bay of Bengal, eastern Borneo and north-western Australia - areas where there are relatively large tidal ranges and/or higher sediment supply," said Professor Lovelock, who works in UQ's School of Biological Sciences and the Global Change Institute. "Even in other areas though, the good news is that through accretion of sediment and maintenance of wetland soils, mangrove forests do have the capacity to avoid inundation and keep pace with sea-level rise." Professor Lovelock said this was why there was an urgent need to plan for the maintenance of sediment supply in river systems that were likely to be dammed or heavily modified in future. "The Indo-Pacific region holds most of the world's mangrove forests, but sediment delivery in this region is declining, due to activities such as dam construction," she said. "This is of particular concern as this region is expected to have variable but high rates of future sea-level rise." Forest degradation had to be reversed because it reduced organic inputs to soils that was vital for mangrove survival, Professor Lovelock said. Plans should be made for the landward migration of vulnerable mangrove forests to higher elevations. "Intertidal mangrove forests occur on tropical and subtropical shorelines, and provide a wide range of ecosystem services - to fisheries, in coastal protection and in carbon sequestration - with an estimated value of $USD194,000 per hectare per year," she said. "Sea-level rise could threaten the long-term sustainability of coastal communities and of valuable ecosystems such as coral reefs, salt marshes and mangroves. Professor Lovelock said the researchers analysed trends based on data from an international network of 27 sites. UQ's Global Change Institute and the Australian Research Council funded the project. The vulnerability of Indo-Pacific mangrove forests to sea-level rise is published today in Nature. Co-authors are from the US Geological Survey; National University of Singapore; Cambridge University; University of Wollongong; Ministry of Marine Affairs and Fisheries, Indonesia; National Institute of Water and Atmospheric Research, New Zealand; Macquarie University; Vietnam National University; and the International Crane Foundation, US.
<urn:uuid:2971727f-f060-4811-bb19-1016f8a4f7a4>
CC-MAIN-2020-05
https://www.eurekalert.org/pub_releases/2015-10/uoq-rsw101315.php
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250591431.4/warc/CC-MAIN-20200117234621-20200118022621-00215.warc.gz
en
0.949906
593
3.296875
3
Welcome to South America, the fourth largest continent on Earth. South America has 14 different countries in it and over 355 million people! The South Americans are famous for their parties, their music, their dances, and their food. The two major languages spoken in South America are Portuguese and Spanish, although French, English and Dutch are also spoken, as well as a variety of indigenous languages. If there are any words in this book you don't understand you can look them up in the glossary. To the north of South America lies the Caribbean and Central America, to the east lies the Atlantic Ocean, and past that Africa, to the south lies the coldest continent, Antarctica, and to the west lies the Pacific ocean, and past that Australia, Oceania, and Asia.
<urn:uuid:5f5e8496-7dd4-45c0-bf5a-3208a8c0f0c8>
CC-MAIN-2013-48
http://en.wikibooks.org/wiki/Wikijunior:South_America/South_America
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164004837/warc/CC-MAIN-20131204133324-00044-ip-10-33-133-15.ec2.internal.warc.gz
en
0.96814
158
3.15625
3
A design student's graduation project proposal: a flag to unite the world as humans. When we send our cosmonauts up into space, they bear proud emblem of their home countries: a flag on the sleeve of their space suits as they travel far beyond all terrestrial borders. As we extend our presence farther into the solar system (NASA plans to have humans on Mars sometime in the 2030s) perhaps it would be more appropriate to unite under a common banner. At least, that's the belief of Oskar Pernefeldt, a graduate of Beckmans College of Design in Stockholm, Sweden. For his graduate project unveiled earlier this week, Pernefeldt designed a flag to represent Earth as a whole. "Current expeditions in outer space use different national flags depending on which country is funding the voyage. The space travelers, however, are more than just representatives of their own countries. They are representatives of planet Earth," he wrote on the project's website. The flag might look simple, but the design elements disguise a symbolic complexity. The seven interlocked circles of silver on a field of azure blue were chosen according to the principles, rules and customs of vexillography (the art of designing flags). "Centered in the flag, seven rings form a flower -- a symbol of the life on Earth. The rings are linked to each other, which represents how everything on our planet, directly or indirectly, are linked," Pernefeldt wrote. "The blue field represents water which is essential for life -- also as the oceans cover most of our planet's surface. The flower's outer rings form a circle which could be seen as a symbol of Earth as a planet and the blue surface could represent the universe." Its purpose is not, however, limited to space travel. Pernefeldt believes it could also be used here on Earth, to remind us that we are all of this one planet. This is a feeling with which many astronauts are already familiar, thanks to a phenomenon known as the overview effect: upon observing the Earth from space, some astronauts report a profound feeling of global community, that all humans are connected. Pernefeldt's project is just that, a project, but that's not to say that the Earth won't have its own united flag someday. What do you think of Pernefeldt's efforts? What kind of flag would you design? Take a look at the flag design principles and let us know in the comments below.
<urn:uuid:ac5ab271-9155-483b-901a-e2815d7c6526>
CC-MAIN-2023-23
https://www.cnet.com/culture/is-this-the-flag-that-could-represent-earth-to-the-stars/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00511.warc.gz
en
0.96234
509
3.03125
3
Reading Homework (Tarea) Reading homework is for students to read 20 minutes a night. The purpose of this homework is: - to foster a love of reading - to build stamina, fluency and vocabulary in an authentic way The following are acceptable formats: - reading independently - reading with a friend - listening to an audiobook in the car - listening to an adult read out loud - any other way books can enter brains Students may read: - books of any genre - Graphic novels/comics/manga - song lyrics - raz-kids ebooks - tumblebooks online - kindle books At this time, I will not require a reading log. Instead, a time will be set aside each Friday for "home reading challenge", during which time, students may earn challenge points/extra credit if they share evidence of having enjoyed and engaged in reading at home during the week. Evidence might be something like: - verbally telling the class about their reading - create a drawing depicting a scene or character in a book they are currently reading or have read - write a book recommendation (or disrecommendation) to post in the classroom - a list of questions they asked about the book, before, during or after their reading. - a list of interesting/challenging words they found while reading. - make a book trailer or youtube type video discussing the book they are reading. - picture of them reading - attendance at any reading/book related event (library events, book signings, author/speaker events) - etc (kids and parents may have other great ideas)
<urn:uuid:042784e3-6ece-4c61-816c-152b465ce73a>
CC-MAIN-2017-47
http://missroach.yolasite.com/homework.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804518.38/warc/CC-MAIN-20171118021803-20171118041803-00754.warc.gz
en
0.94277
346
3.375
3
[ skip site navigation ] Missouri Digital Heritage :: Divided Loyalties Opening Exhibit :: Divided Loyalties Audio Tour :: Panel 15 - Martial Law - (Loyalty, Vigilante Justice) Both the Confederate and Union troops tried to impose their views on the people. The Union-backed provisional government declared martial law in effect. This meant, among other things, that Missourians had to have a military pass in order to travel. In order to get a pass, you had to take an oath of loyalty to the Union. Martial law remained in effect for most of the war. During this time, many Missourians lived in constant fear. Choosing a side in this conflict was more than just a private decision, and was based on more than personal political views. NOTE: If you are experiencing problems opening PDFs using IE8, please place the mouse over the selected PDF, right-click then select Open in New Tab or Open in New Window.
<urn:uuid:4dde08e4-3f26-4000-b13d-596d4be122d1>
CC-MAIN-2023-50
https://www.sos.mo.gov/mdh/DividedLoyalties/dl_atour_media/p15
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100172.28/warc/CC-MAIN-20231130062948-20231130092948-00649.warc.gz
en
0.954802
198
3.03125
3
Thursday, December 30, 2010 The 2010 Census: A Proud Moment for our Nation US Census Bureau: The 2010 Census: A Proud Moment for our Nation The census is a historical milestone that we encounter every ten years. The reveal of the total population count brings with it not only the numbers that help determine the amount of representation for your state but also the amount of federal funding your state will receive over the next ten years. As we come to the end of the 2010 Census, we can take pride in the huge accomplishment we achieved as a nation.
<urn:uuid:1b302e7b-4001-487b-b7d9-dfc2c70c24e3>
CC-MAIN-2017-26
http://www.uscitizenpod.com/2010/12/2010-census-proud-moment-for-our-nation.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319992.22/warc/CC-MAIN-20170623031127-20170623051127-00686.warc.gz
en
0.932638
112
2.671875
3
Learning a new language is a journey of highs and lows but when you’re out in local territory and you finally make heads and tails of a fast paced sentence, it can feel like everything you’ve worked for has finally paid off. How do you go about getting to this magical moment, though? Burying yourself in textbooks is one way to go about it but after an hour or so, you’re probably going to want to change it up just a little bit. These language learning tools will put you through your paces in some of the most creative ways and before you know it, you might have picked up a whole new set of expressions! - Language Immersion If you’re going to do it, do it right. There is no better place in which to learn a language than in its native country and if you can, signing up for an immersion program can help you come on leaps and bounds. Not only will you have the opportunity to speak the language with natives on a daily basis but also, you can receive daily intensive training on a variety of topics. If you can afford this kind of program and you’re serious about taking your language to the next level, you could just come out the other side with a whole new understanding of the language. - Language Meetups If, however, journeying across the world is not really an option, there are a load of other ways you can get a language under your belt. Language meetups give you the opportunity to try out your skills in real life conversations, helping you to pick up new phrases at the same time. While these kinds of meetups are often more social than anything else, they do give you the chance to talk to others as you would in real life, making it easier for you to practice the skills you know. You could even meet people with whom you can practice in the future, helping you to progress even faster. - Home Immersion Want to really tackle your new language? Try bringing it into your home! Adapting your living space to reflect the language you’re learning can help to cement basic vocabulary and make it become second nature. Try labeling your foods and home items with their foreign language name and referring to them using it when you can. You can even try taking on recipes in the foreign language, using the labeled food to guide you along the way!
<urn:uuid:90bf849f-6ae7-4895-8529-2061100322f0>
CC-MAIN-2023-40
https://practicalsmart.com/learning-new-language-get-creative/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00368.warc.gz
en
0.963305
487
2.546875
3