Dataset Viewer
Auto-converted to Parquet
text
stringlengths
196
593k
id
stringlengths
47
47
dump
stringclasses
1 value
url
stringlengths
14
1k
file_path
stringlengths
139
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
41
127k
score
float64
2.52
5.09
int_score
int64
3
5
Project Helps Fight the Life-Threatening Disease By Karen Angelo Building on the success of the childhood asthma prevention program, the University’s Healthy Homes Program is now targeting senior citizens who live in Lowell public housing. Studies show that asthma-related morbidity and mortality among the elderly is increasing. “The city of Lowell is ideal for our study since the prevalence of asthma among adults is 10.4 percent, higher than the state average of 8.1 percent,” says Research Prof. David Turcotte of the Department of Economics and director of the Lowell Healthy Homes program, which is operated through UMass Lowell’s Center for Community Research and Engagement. “Seniors spend 90 percent of their time in their homes, breathing in dust mites, mold and toxic cleaning solutions that can trigger asthma attacks.” The study will measure the effectiveness of interventions such as educational materials, mattress and pillow covers, green cleaning supplies, HEPA vacuum cleaners and pest control items to improve health and reduce medical costs for the elderly living in Lowell public housing. The work is being funded by a $750,000 grant from the U.S. Department of Housing and Urban Development that will be managed by UMass Lowell. The researchers will collect health data – symptoms, medication use, emergency room visits – on approximately 90 senior citizens with asthma or chronic obstructive pulmonary disease before any interventions. After conducting a home environmental assessment that includes testing dust samples, measuring nitrogen dioxide and evaluating cigarette smoke exposure, the research team will recommend improvements to residents. After one year, the team will evaluate the impact of the interventions on indoor air quality, asthma triggers, respiratory health and quality of life. “Since there is very little research on how in-home asthma interventions could help elders, this study will document the effectiveness of a multi-faceted approach to prevent asthma-related deaths and sickness among this vulnerable population,” says Turcotte. To carry out the study, UMass Lowell researchers – led by Turcotte and Work Environment Prof. Susan Woskie – are partnering with the Lowell Housing Authority and the Lowell Community Health Center, which provide access to low- to moderate-income public housing residents who are senior citizens. Past Project Showed Significant Improvements for Children This program builds upon previous research conducted by UMass Lowell researchers on asthmatic children living in Lowell public housing. The results of that research showed a dramatic improvement in the health and well-being of the children. Asthma attacks decreased by 76 percent, hospital emergency room visits decreased by 79 percent and the physical and emotional health of the children improved substantially.</s>
<urn:uuid:f11e5b3b-1148-4d25-b229-cc64fbf62419>
CC-MAIN-2015-32
http://[email protected]/News/stories/2014/AsthmaElderly.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.936046
541
2.515625
3
Calorie counters and fitness trackers aren't the only way smartphones can keep track of your health. Researchers at Cornell University in New York are currently developing an app and accessory called SmartCARD, short for Smartphone Cholesterol Application for Rapid Diagnostics, that can measure your cholesterol. David Erickson, a professor of mechanical engineering at Cornell, said that smartphones were a natural fit for a cholesterol tracking device. "Everyone already carries a smartphone, and that gives you an incredible amount of hardware and computational power in your pocket all the time," he told ABC News. "It's silly not to take advantage of it." The SmartCARD system clamps over the smartphone's camera. Just like a standard detector, the person pricks his or her finger and dabs a drop of blood onto a test strip. The strip is fed into a holding slot on the system, and the smartphone snaps a photo of the blood sample for analysis. Erickson sees the app as giving its users some piece of mind. "The real advantage of things like smartphone-based diagnostics is that it gives feedback when people want it," he said. "It has all the other smartphone features built into it, like tracking cholesterol over time and being able to take notes." Sri Krishna Madan Mohan, a cardiologist at the University Hospital Case Medical Center in Ohio, said that while he's generally an app-happy guy, he doesn't see much value in SmartCARD. "Unlike something like sugar levels or blood thickness, [cholesterol] isn't something that fluctuates from minute to minute, or even from month to month," he said. "If I start treating you, I'd recheck [your cholesterol] in three months to see if the treatment had any effect." One of the other problems is that the accessory does not distinguish between HDL and LDL, or good and bad cholesterol. "If I have a cholesterol level of 200, it could be 180 good and 20 bad, or 180 bad and 20 good," said Mohan. "It's important to measure the levels of each type of cholesterol." Mohan said, however, that SmartCARD's principles could be used to measure other vitals. "When you come in for a visit, I want to screen you not just for cholesterol but for sugar, vitamins, this and that," he said. "It would be useful if this device were able to track four of these things at once." Erickson's research is published in the most recent issue of the journal Lab on a Chip.</s>
<urn:uuid:8f0d1f18-23dd-4fd0-87ae-7d9f74b13120>
CC-MAIN-2015-32
http://abcnews.go.com/Technology/curious-cholesterol-smartphone-accessory/story?id=21267462
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.968466
524
2.625
3
African Origins contains information about the migration histories of Africans forcibly carried on slave ships into the Atlantic. Using the personal details of 91,491 Africans liberated by International Courts of Mixed Commission and British Vice Admiralty Courts, this resource makes possible new geographic, ethnic, and linguistic data on peoples captured in Africa and pulled into the slave trade. Through contributions to this website by Africans, members of the African Diaspora, and others, we hope to set in motion the rediscovery of the backgrounds of the millions of Africans captured and sold into slavery during suppression of transatlantic slave trading in the 19th century. To begin searching these records of liberated Africans, try the Guided Search below. Enter an African name that you know (such as Quarko, Kwesi, or Fatima) and select a country (or countries), then click Explore. Checking either the male or female box will filter your search.</s>
<urn:uuid:40c628e4-4b5c-49e3-b7d1-f12c236ba079>
CC-MAIN-2015-32
http://african-origins.org/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.911444
182
3.234375
3
- Magnetic Attraction – Demystify the magic of magnets as students explore the sizes, shapes and strengths of magnets and test materials using magnetometer. Grades K-3 - Mr. Stuffee -Do your students have the guts to learn about human organs, respiratory and circulatory systems while observing replicas of instestines, lungs, and more. Grades K-3 - SLGP Matters – Scientific senses matter as students collect facts about solids, liquids, gases, and plasma, how they change from one state to another and how they relate to everday life. Grades K-3 - Science of Circuits – Electricity is in the air as students create series and parallel circuits to test materials for conductive and insulative properties. Grades 4-6 - Sweet Heat – Insulative properties of various materials are investigated while teams compete to see who can keep it hot or lose their spot. Grades 4-6 - Scavenger Hunt – Search each exhibit area in the museum for clues to the answers for this pictorial scavenger hunt. - Videos – Our video library has a variety of energy and science topics. Please ask when you register your group about the titles that best fit your needs. Please feel free to contact us for more information.</s>
<urn:uuid:01a5cd89-511a-4007-aa39-bab2920fb5b6>
CC-MAIN-2015-32
http://amse.org/educators/educational-programs/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.90329
263
3.9375
4
The Computer History Museum has made available the source code for the 1.0.1 version of Photoshop, as noticed by Slashdot. The image editing application is a staple of professional and amateur artists alike, and its ubiquity has led its name to be generalized in the same way as "kleenex," "xerox," and "google"—to edit an image is to "photoshop" it. Though this early build of Photoshop lacks a lot of features present in the current Creative Suite version, it was still a powerful graphical editing utility when released back in 1990. Photoshop 1.0 was exclusively a Macintosh application, and the code is representative of the typical Mac coding tools of the era—it's a mixture of about 75 percent Pascal and 15 percent Motorola 68000 assembly language, with the rest of the code composed of data files. Altogether, there are about 185,000 lines of code in 179 files. The code isn't quite complete, though, since it's missing the MacApp framework (which can't be included because it would have to be licensed from Apple). The linked Computer History Museum page contains some commentary on the code from Grady Booch, chief scientist for Software Engineering at IBM Research Almaden: Architecturally, this is a very well-structured system. There’s a consistent separation of interface and abstraction, and the design decisions made to componentize those abstractions – with generally one major type for each combination of interface and implementation — were easy to follow.... There are only a few comments in the version 1.0 source code, most of which are associated with assembly language snippets. That said, the lack of comments is simply not an issue. This code is so literate, so easy to read, that comments might even have gotten in the way....This is the kind of code I aspire to write. Booch notes the code even contains easily identifiable references to Macintosh software architect Andy Hertzfeld's Thunderscan device, a clip-in scan head that could transform a dot matrix printer into an inexpensive (but slow) grayscale scanner. Though Pascal and 68000 assembly aren't the modern coding tools of choice, there's tremendous value to be gained in studying beautiful code (see this Doom 3 source code critique for a more contemporary example). Lessons in structuring a program tend to transcend languages, and being able to define and solve computing problems in discrete, understandable steps with a minimum of cruft or kludging is something every developer should strive for. Listing image by Computer History Museum</s>
<urn:uuid:b33183b1-9ff1-4217-96fc-fbb4b30ceeab>
CC-MAIN-2015-32
http://arstechnica.com/information-technology/2013/02/step-back-in-time-with-the-elegant-source-code-for-photoshop-1-0/?comments=1&post=23881513
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.951036
523
2.734375
3
Q: Is it true that the stained glass windows in many old cathedrals are thicker at the bottom because the glass has flowed over the centuries? A: No, said materials scientist Edgar Dutra Zanotto of the Federal University of Sao Carlos in Brazil, who recently calculated how long it would take the windows to flow in such a manner. He concluded that the glass is actually very stable, and such flow would require a period "well beyond the age of the universe." The difference in thickness probably results from the way the glass was manufactured, according to Science News. Until the 19th century, the only way to make window glass was to blow molten glass into a large globe, then flatten it into a disk. Whirling the disk introduced ripples and thickened the edges, which were probably installed at the bottom of windows for structural strength. Later glass was drawn into sheets by pulling it from the melt on a rod. Today, most glass is made by floating liquid glass on molten tin.</s>
<urn:uuid:c94848e0-73ed-4eb8-8e6d-0e8f9eef2bad>
CC-MAIN-2015-32
http://articles.latimes.com/1998/jun/25/local/me-63473
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.975598
203
3.9375
4
September 3, 2008 By combining telescopes in Hawaii, Arizona, and California, astronomers detected structure at a tiny angular scale of 37 micro-arcseconds — the equivalent of a baseball seen on the surface of the Moon, 240,000 miles distant — on the edge of a black hole. These observations are among the highest resolution ever done in astronomy. "This technique gives us an unmatched view of the region near the Milky Way's central black hole," says Sheperd Doeleman of MIT, first author of the study that will be published in the September 4 issue of the Nature. "No one has seen such a fine-grained view of the galactic center before," agrees coauthor Jonathan Weintroub of the Harvard-Smithsonian Center for Astrophysics (CfA). "We've observed nearly to the scale of the black hole event horizon — the region inside of which nothing, including light, can ever escape." Using a technique called Very Long Baseline Interferometry (VLBI), a team of astronomers led by Doeleman employed an array of telescopes to study radio waves coming from the object known as Sagittarius A*. In VLBI, signals from multiple telescopes are combined to create the equivalent of a single giant telescope, as large as the separation between the facilities. As a result, VLBI yields exquisitely sharp resolution. The Sgr A* radio emission, at a wavelength of 1.3 millimeters, escapes the galactic center more easily than emissions at longer wavelengths, which tend to suffer from interstellar scattering. Such scattering acts like fog around a streetlamp, both dimming the light and blurring details. VLBI is ordinarily limited to wavelengths of 3.5 millimeters and longer; however, using innovative instrumentation and analysis techniques, the team was able to tease out this remarkable result from 1.3-millimeters VLBI data. The team clearly discerned structure with a 37 micro-arcsecond angular scale, which corresponds to a size of about 30 million miles (or about one-third the Earth-Sun distance) at the galactic center. With three telescopes, the astronomers could only vaguely determine the shape of the emitting region. Future investigations will help answer the question of what, precisely, they are seeing: a glowing corona around the black hole, an orbiting "hot spot," or a jet of material. Nevertheless, their result represents the first time that observations have gotten down to the scale of the black hole itself, which has a "Schwarzschild radius" of 10 million miles. "This pioneering paper demonstrates that such observations are feasible," comments theorist Avi Loeb of Harvard University and frequent contributor to Astronomy, who is not a member of the discovery team. "It also opens up a new window for probing the structure of space and time near a black hole and testing Einstein's theory of gravity." In 2006, Loeb and his colleague, Avery Broderick, examined how ultra-high-resolution imaging of the galactic center could be used to look for the shadow or silhouette of the supermassive black hole lurking there, as well as any "hot spots" within material flowing into the black hole. Astronomers now are poised to test those theoretical predictions. "This result, which is remarkable in and of itself, also confirms that the 1.3-mm VLBI technique has enormous potential, both for probing the galactic center and for studying other phenomena at similar small scales," says CfA's Weintroub. The team plans to develop novel instrumentation to make more sensitive 1.3-mm observations possible. It also hopes to develop additional observing stations, to gain extra baselines (pairings of two telescope facilities at different locations) to enhance the detail in the picture. Future plans also include observations at shorter, 0.85-mm wavelengths; however, such work will be even more challenging for many reasons, including stretching the capabilities of the instrumentation, and the requirement for a coincidence of excellent weather conditions at all sites.</s>
<urn:uuid:faa41bb2-3211-4f81-a99a-79e418d77b09>
CC-MAIN-2015-32
http://astronomy.com/news-observing/news/2008/09/to%20the%20edge%20of%20a%20black%20hole
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.935141
823
4.125
4
Just curious to know what will be the time difference between someone living on the outer layer of our galaxy and us, considering the known facts that - Time is relative to gravity - Our sun goes around at 483,000 miles/hour(792,000 km/hr) to complete its galactic year - Star systems at outer layer travel faster than ours due to Dark Matter and Dark Energy - couldn't find speed of those star systems though! We can assume that both (Solar system and outer layer of star system) are on the same side of the galaxy. EDIT: In order to re-phrase this question more clearly, as per Joan.bdm, it is related to time dilation - what is the aging rate difference if we left one of two twins on the Earth and the other one on a planet at outskirts of the Milky Way. Conversely, what is aging rate difference between closer to center of our galaxy and us?</s>
<urn:uuid:a07f6932-66b4-407a-9bb9-25ed68b1daef>
CC-MAIN-2015-32
http://astronomy.stackexchange.com/questions/6217/what-is-the-relative-time-difference-between-us-and-a-star-system-in-outer-layer
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.941958
192
2.734375
3
In a recent posting, Jewish Atheist offered a ‘morality test’ that attempted to collect empirical data that no two people are in complete agreement on a range of moral statements. What Jewish Atheist meant to imply from this set of data is not entirely clear. It is not clear, in part, because I can come up with a similar set of statements about things that are totally objective, where people are in disagreement about the facts of the matter. Yet, they are still facts. Argument from Differences of Opinion For example, assume I construct a test where I ask readers to rank the following statements according to whether or not they are likely to be true. A score of ‘0’ means that the statement is definitely false, while a ‘10’ means that it cannot possibly be false. I suspect that I can come up with a set of statements where no two people will be in complete agreement. (1) At least one God exists. (2) Humans are the product of a phenomena called ‘evolution’ in a universe designed by God in such a way that evolution would create humans. (3) Jesus rose from the dead. (4) Mohammed was a prophet of God. (5) There is at least one planet with multi-cellular life within 1000 light years of Earth. (6) Earth will be hit by an asteroid or comet at least 0.5 km in diameter within the next 100,000 years. (7) There were dinosaurs on Noah’s Arc. And so on. Given enough questions (and the right questions) I can guarantee that no two people will entirely agree on the answer to these questions. But what does that prove? It proves that people disagree. It does not prove that there are no right answers. The argument being made, when this form of reasoning is applied to moral claims, is that disagreement over the answers to a set of moral questions proves something profound. It proves that there are no right answers to be had to moral questions – as if the claim “there are right answers to these questions” is somehow supposed to imply, “everybody is in agreement over what those right answers are” (such that denying the consequent proves that the antecedent is false. The implication is invalid. I find it, at best, odd to note that people who not only object to religious people using poor arguments in defense of their favorite religious beliefs, but make them objects of ridicule and derisive laughter, so easily accept such a poor argument in defense of the claim that there are no right answers to moral questions. One would expect that a group of people who express such contempt for poor reasoning would say, “That argument doesn’t work. Throw it out.” Argument from Imagination Another argument that does not work, that is no less popular, goes something like this. “I can imagine two people who are in perfect agreement over all of the facts of the matter, who still disagree over a moral claim such as whether abortion is wrong.” Well, I can imagine spaceships traveling faster than the speed of light, traveling from star system to star system in the time that it takes to run a string of 30-second commercials. I can imagine dragons, and sorcerers casting spells. I can imagine Jesus walking on water and curing blindness with a touch of his hand. I can imagine traveling back in time and meeting Thomas Jefferson. I can imagine quite a few things . . . but are any of them true? “I can imagine” is, itself, a very poor argument. The question to be answered is whether it can happen in fact that two people can be in complete agreement on a set of facts and still disagree on a moral conclusion. This “I can imagine” argument is, in fact, completely question-begging. It does not prove truth but, instead, stands as a substitute for the beliefs of the person making the claim. Instead of, “I can imagine X; therefore X”, what the person who uses this argument is really saying is, “I believe X; therefore, X”. There is a third problem with this line of reasoning that deserves a look. I have noticed a tendency among those who try to prove that there are no right answers when it comes to moral questions that they tend to cite David Hume with admiration – particularly Hume’s claim that it is not possible to derive ‘ought’ from ‘is’. According to Hume, since ‘ought’ describes some new sort of relation from ‘is’, that the person giving the argument needs to explain his transition from ‘is’ premises, to an ‘ought’ conclusion. Jewish Atheist, in part, defines morality as, an immoral act as an act that causes the individual committing the act any degree of guilt and/or an act that was done maliciously or selfishly that causes any degree of hurt or grief onto another living being. For this part of the argument, I am going to focus on the first half of the argument – the claim that moral terms refers to that which is disposed to cause a sensation of guilt in the agent. Most moral subjectivists use a definition that is similar to this – that we call something right of wrong in virtue of whether it is something that tends to cause a sensation of approval or disapproval in the person making the claim. However, it is often overlooked that the definition, “Is such as to cause in the agent a feeling of guilt” or ‘is such as to cause a feeling of approval or disapproval in the agent’ is an is statement. It is a description of a real-world state of affairs. It is a statement about a state of affairs that is either true or false. From such an is premise, the subjectivist makes an immediate leap to providing us with an ‘ought’ conclusion. They tell us that, ‘If it is the case that forcing children to recite the Bible in school creates a sensation of approval in you,” then one is justified in inferring, “Then, the school system ought to institute mandatory school prayer.” At least, this inference is supposed to hold for those people of whom the antecedent is true. What they fail to explain to us is how one can get from this ‘is’ premise to an ‘ought’ conclusion. What is it (if anything) that makes this inference valid? It is not sufficient to show that many people often make this inference – that it is second-nature to them and they do it without thinking. My question is, “Why is this inference not a mistake? What makes it valid?” I will assert, in this case, that no answer can be provided. A Sense of Right and Wrong The problem with this tendency to infer something like, “School systems ought to institute mandatory school prayer,” from “The thought of mandatory school prayer is such as to cause a sensation of approval within me,” can be illustrated in another way. Speaking to my atheist readers, each of us probably knows of a lot of people who claim that they can look at a beautiful sunset, or at the face of their newborn child, and ‘see’ God. Their experience gives rise to certain sentiments, and they take those sentiments themselves as evidence of God’s existence. The inference from “Being with my newborn daughter creates a particular sensation within me,” to “God exists,” is no less problematic than, “The thought of mandatory school prayer creates such a sensation within me,” to “School systems ought to institute mandatory prayer.” Yes, people are in the habit of making rash and unwarranted inferences from their private sensations. However, this does not prove that the inference is valid. The person who uses this argument still needs to explain how it is that their sensation is a sensation that X is wrong. So, here are four arguments that are often used to support subjectivism that do not work. (1) The argument from differences of opinion (2) The argument from imagination (3) The argument from ‘is such as to cause guilt’ to ‘ought not to be done’ (4) The argument from sensing right and wrong. These arguments do not support the conclusions that those who use them think they support. They are arguments that those with a devotion to reason should abandon. This post does not prove that subjectivism is not true. It does, however, attempt to point out that those who use certain arguments in defense of subjectivism are ignoring basic rules of logic and reason in doing so. If there is an argument to offer in defense of subjectivism, it is not any of these</s>
<urn:uuid:e0fba4fe-7f4e-4b05-ac08-379eb304eace>
CC-MAIN-2015-32
http://atheistethicist.blogspot.com/2006/12/morality-test.html?showComment=1167286020000
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.961114
1,854
2.515625
3
Athlete's foot is a common infection that affects the skin between the toes and soles of the feet. Athlete's foot is caused by fungus. Fungus thrives in warm, dark, moist places such as the inside of a shoe, locker rooms, showers, and swimming pool areas. The fungus can exist on a floor, mat, rug, shoe, or towel and transfer to your skin when your feet come in contact with them. You can also get athlete's foot if you come into contact with fungus on someone else's feet. The fungus can then grow on your skin if your feet or the area between your toes stays slightly wet. Athlete's foot is more common in men. Other risk factors that increase your chance of athlete's foot: - A history of athlete's foot infection - Walking barefoot in locker rooms or public places - Not keeping your feet clean and dry - Wearing air-tight or poorly ventilated shoes or boots - Sweaty feet - Hot, humid weather - Disorders of the immune system Athlete's foot symptoms usually starts in the webbing between the toes. It may spread to the soles or arches of the feet, or to the toenails if the infection continues. Athlete's foot may cause: - Dry skin - Itching (with or without burning), which gets worse as the infection spreads - A white, wet surface - Blisters , which may open and become painful The doctor will ask about your symptoms and medical history. An exam of your feet will be done. Your doctor may suspect that you have athlete's foot based on the exam. If necessary, your doctor may scrape a small sample from the infected skin and look at it under the microscope to confirm a diagnosis. Treatment aims to get rid of the infection and prevent it from spreading to others. Treatment steps includes the following: Take proper care of your feet: - Gently wash your feet often (at least daily) with soap and water. Completely dry all areas, especially between the toes. - Put a dusting of antifungal foot powder on your feet or in your shoes to absorb moisture. - Change your shoes and socks frequently. - Wash your hands after treating your feet. To prevent spreading the infection to others, avoid walking barefoot in public, especially in locker rooms and public showers. Athlete's foot can be treated with over-the-counter antifungal medications that are applied to the skin. If you have recurrent infections, or do not see improvement in 2 weeks, your doctor may prescribe other anti-fungal medication. Treatment may last 1-2 months. It is important to take medication as advised to completely rid yourself of the infection. To help reduce your chance of athlete's foot: - Wear shower shoes or sandals in locker rooms, public showers, and around swimming pools - Keep your feet clean and dry, especially between your toes - Wear shoes that are comfortable and allow your feet to breathe - Wear cotton socks that pull moisture away from your skin - Change socks regularly, especially if they become damp - Do not borrow other people's shoes - If you have diabetes, follow your doctor's instructions for taking care of your feet and get them examined regularly - Reviewer: David L. Horn, MD, FACP - Review Date: 12/2014 - - Update Date: 12/20/2014 -</s>
<urn:uuid:38aab3a3-286a-4d6d-910f-33a832253556>
CC-MAIN-2015-32
http://aventurahospital.com/your-health/?/12030/this-condition
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.942753
722
3.46875
3
An intellectual sparring ground Ted Langston Chase | 2/4/2009, 5:12 a.m. Jourdain went on to describe the situation in New Bedford, where some residents understood fully the value of “material advancement.” “… For while we number only about 1,700, we pay taxes on real estate the assessed valuation of which is about $330,000.00; and our percentage of men in business for themselves averages well with other races,” Jourdain wrote. But as Jourdain rightly pointed out, industrial training and high moral values were only part of the solution. “Love of personal history, a jealous defense of their rights and liberties have been the dominant traits of every people who ever achieved anything admirable, and we believe those traits to be prime essentials of the Negro American today,” Jourdain wrote. Uplifting the race Historians and scholars have agreed that this period was especially difficult. The end of Reconstruction was marked by the demise of so-called “Radical Republican” control of the Congress around 1877. A cautious reconciliation between North and South seemed apparent, as did the drastic turn away from the campaign for equal rights for blacks. By 1883, the U.S. Supreme Court had repealed the Civil Rights Act of 1875, and legislation to make lynching people of color a federal crime turned the county’s nonchalance toward the issue into heated debate that was eventually silenced in the halls of U.S. Congress. In 1901, Congressman George White of North Carolina was the last of the blacks that had been elected to Congress during or just after Reconstruction. The bill he introduced to make lynching blacks a federal crime during his last term had been unanimously defeated. Given the political calculus at the time, the radicals had more questions than answers. What laws could be drafted to replace the protective legislation that had been enacted between 1875 and 1877, only to be repealed by the U.S. Supreme Court in 1883? Who would be their allies? How would they replace the legal mechanisms that granted black Americans their basic rights during the Reconstruction era? And questions aimed at Booker T. Washington were particularly sharp. In a Dec. 17, 1903, letter to Washington, Jourdain and two others wrote: “We want to put the question fairly: do you believe it necessary for the support and maintenance of Tuskegee that you should bow subservient to unreasoning and senseless southern prejudice and opposition to the civil and political rights of black Americans? Do you believe it serves to elevate the Negro when you not only fail to speak out in condemnation of such unjust and humiliating proscriptions as ‘grandfather’ clause suffrage provisions, and ‘jim crow’ car laws, but actually seek to find something good to say about them?” In response to Washington’s public policies and national legal setbacks, individuals and groups across the nation called for “mass meetings” with personal and public pledges to “uplift the race.” On an increasing basis, everyday working-class blacks attended mass meetings in black churches, black women feverishly mobilized their own for the right to vote and newspaper journalists singled out those who appeared to be assuming leadership in black America. Oftentimes these meetings and attendees were identified by their location. Thus the participants eventually became known as “Boston Radicals,” “Niagarites,” the “Niagara Movement” and the “New Bedford Annex.” New Bedford: The host city In spite of its size, when it came to meeting places for the black elite, New Bedford was in the company of cities like Boston, Washington, D.C., Philadelphia, Atlanta and New York City. All of these cities played host to some of the country’s more esteemed black intellects and leaders. Newspaper publishers, lawyers, public figures, physicians, academicians, suffragettes, businessmen, the self-made and top-flight intellectuals all passed through or were welcomed in these cities, just as they were in New Bedford and in households such as E.B. Jourdain’s.</s>
<urn:uuid:f53b5877-fa1d-4e29-8d2e-84d131b17038>
CC-MAIN-2015-32
http://baystatebanner.com/news/2009/feb/04/an-intellectual-sparring-ground/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.972496
876
2.640625
3
MIKINAK (Meckinac, Mequinac, “The Turtle”), Ottawa chief; d. 1755 at Detroit. Mikinak is first reported in 1695 or 1696 as a leader of an Ottawa-Potawatomi expedition from Michilimakinac against the Iroquois. The Iroquois had been actively seeking alliance with the tribes of the pays d’en haut. Their aim, had it been achieved, would have been disastrous for French interests, since trade would then have drained through Iroquois middlemen to the English. Prompted by Cadillac [Laumet*], the commandant of Michilimackinac, Mikinak and his party attacked some Iroquois who had been hunting around Detroit, and thus effectively disrupted chances for peace between their nations. After Cadillac established a post at Detroit in 1701, Mikinak frequently carried messages between him and Joseph-Jacques Marest*, the Jesuit missionary among the Michilimackinac Ottawas. Commandant and missionary struggled bitterly over where the Indians should settle, and in 1702 Mikinak was still unwilling to move to Detroit. By 1737 he was certainly living there and was described as a “great chief of the Ottawas.” He made several trips to Montreal, including one in 1742 when he presented his son to the governor, Charles de Beauharnois. Although on this occasion and almost certainly on the others Mikinak made polite assurances of support and promised to discourage all trade with the English, he apparently had an independent view of Ottawa interests. When Orontony and a group of Hurons from Sandoské (near Sandusky, Ohio) revolted against the French in the summer of 1747, Mikinak was said to sympathize with them. Years later Pontiac told the French that Mikinak had declared he “would carry the head of your commander to his village, and devour his heart, and drink his blood. . . .” Whatever the foundation of such accusations, after the arrival of more troops at Detroit in the fall of 1747 Mikinak appeared more friendly toward the French. He offered to use his influence to get the dissident Hurons to move back to Detroit from Sandoské, and suggested that the French bring in reinforcements to use against them should they remain defiant. In return for his good offices he demanded to have his prestige restored by being given equal treatment with Kinousaki, an Ottawa chief opposed to the revolt, who had been sent a scarlet coat with silver lacings. Paul-Joseph Le Moyne* de Longueuil, the commandant at Detroit, advised that Mikinak could provoke considerable trouble if his request were refused. Although a coat was sent, Mikinak continued his somewhat independent course. In 1751 Kakȣenthiony reported to Governor La Jonquière [Taffanel] that Mikinak had been to the English post at Chouaguen (Oswego) and he hinted that the Ottawa chief had also had dealings with the English in the Ohio country. When Gaspard-Joseph Chaussegros* de Léry visited Detroit in the winter of 1754–55, he noted that Mikinak was discontented at being obliged to cede the land around Presqu’île (Erie, Pa.) to the French for a fort, and that he was to have gone to Montreal in the spring. On 26 February, however, the old chief died. In contemporary documents and in later accounts, Mikinak is usually described as a vacillator, one whose “loyalty to the French weakened.” Such an interpretation does an injustice to an Ottawa chief whose territory was occupied by one European power and threatened by another. No one ever questioned Mikinak’s fighting ability or his qualities as a leader. Only after his death was Pontiac able to gain ascendancy among the Detroit Ottawas. AN, Col., C11A, 67, f.139v; 75, f.91; 77, f.199. “Cadillac papers,” Michigan Pioneer Coll., XXXIII (1903), 113–14, 121–22, 126–29; XXXIV (1904), 288. Charlevoix, History (Shea), IV, 278. [G.-J. Chaussegros de Léry], “Journal de Joseph-Gaspard Chaussegros de Léry, lieutenant des troupes, 1754–1755,” APQ Rapport, 1927–28, 411, 413, 414, 418. French regime in Wis., 1727–48 (Thwaites), 262–64, 456–68, 478–92; “French regime in Wis., 1743–60” (Thwaites), 104–8. NYCD (O’Callaghan and Fernow). The siege of Detroit in 1763: the journal of Pontiac’s conspiracy, and John Rutherfurd’s narrative of a captivity, ed. M. M. Quaife (Chicago, 1958), 99–100.</s>
<urn:uuid:df47d0b6-ccde-47e0-80f9-ff52803fe937>
CC-MAIN-2015-32
http://biographi.ca/en/bio/mikinak_3E.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.968946
1,094
3.421875
3
What is the genetic evidence for human evolution? In recent decades, scientists have discovered more about the beginnings of humanity. The fossil record shows a gradual transition over 5 million years ago from chimpanzee-size creatures to hominids with larger brains who walked on two legs. Later hominids used fire and stone tools and had brains as large as modern humans. Fossils of homo sapiens in east Africa date back nearly 200,000 years. Humans developed hearths for fire, stone points for spears and arrows, and cave paintings by 30,000 years ago. By 10,000 years ago, humans had spread throughout the globe. Genetic studies support the same picture. Humans share more DNA with chimpanzees than with any other animal, suggesting that humans and chimps share a relatively recent common ancestor. Also, the same defective genes appear in both humans and chimps, at the same locations in the genome—an observation difficult to explain except by common ancestry. Genetics also tells us that the human population today descended from more than two people. Evolution happens not to individuals but to populations, and the amount of genetic diversity in the gene pool today suggests that the human population was never smaller than several thousand individuals. Yet all humans, of all races, are descended from this group. Humanity is one family.</s>
<urn:uuid:059709a3-95f0-457d-adc8-635403185495>
CC-MAIN-2015-32
http://biologos.org/resources/find/Essay,Question/all/Human+Origins
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.959208
261
4.09375
4
By Kathy Sykes One of the indelible memories I have of my grandfather, Lars Svensson, was the trouble he had breathing. For as long as I can remember he struggled to breathe, even when we went for a short walk or just a few feet to the mail box in the front yard. My grandfather was a smoker and suffered from a serious lung disease called emphysema, also known as chronic bronchitis, chronic obstructive pulmonary disease, or COPD. COPD is now the fourth leading cause of death in the United States and also causes long-term disability. Both asthma and COPD are common chronic respiratory diseases that take a toll on the quality of life for persons of all ages. More than 12 million Americans suffer from COPD and another 12 million may have it and not know it. I was a teenager when my grandfather died, at a time when very little was known about treating the disease. We fortunately know a lot more now about living with COPD and asthma including how to avoid the environmental triggers that can cause an attack. By reducing exposure to environmental triggers one can control and reduce the frequency of symptoms and make it easier to breathe. Triggers in the environment include outdoor particle pollution and ozone. Indoors, where we spend 90 percent of our time, common indoor hazards may trigger an asthma or COPD attack including tobacco smoke, direct and second-hand smoke, animal dander, dust mites and cockroaches, mold, and pollen. It is also important to check furnace and heating units each year and fix water leaks quickly help to reduce the occurrence of these triggers in your home. Pesticides, household cleaning products and substances with irritating odors may also exacerbate COPD and asthma. And don’t forget to check the air quality index where you live to see if the air quality is a problem. If it is, reduce outdoor activity as much as possible on poor air quality days. Asthma and COPD have a lot in common and affect the health and quality of life of older Americans. The U.S. EPA Aging Initiative has developed a poster in English and Spanish called Age Healthier, Breathe Easier. The fact sheet on the same topic has been translated into 17 languages. About the author: Kathy Sykes began working for the U.S. EPA in 1998. Since 2002, she has served as the Senior Advisor for the Aging Initiative. Editor’s Note: The opinions expressed in Greenversations are those of the author. They do not reflect EPA policy, endorsement, or action, and EPA does not verify the accuracy or science of the contents of the blog.</s>
<urn:uuid:d2482ed1-f400-4ff1-ace1-d244792ac014>
CC-MAIN-2015-32
http://blog.epa.gov/blog/2011/05/age-healthier-breathe-easier/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.964194
544
2.71875
3
By Michael A. Smith, MDSure, ideally everyone would be eating fresh, non-processed foods all of the time, but we get it. We know that it can be expensive to eat this way and that sometimes convenience and simple economics guide our decisions. So, here’s the question that begs answering: are there any healthy packaged foods? The answer is yes. Fortunately, more and more companies are now offering wholesome packaged foods that are far less processed and much healthier. But here’s your warning: all packaged foods undergo some level of processing, and processing strips food of nutrients. There’s no way around that. With that said, let’s take a look at some packaged foods that you can actually feel alright about eating. Packaged Foods that are Actually Healthy1. Frozen Fruit & Vegetables – Produce picked and frozen at peak ripeness has just as many nutrients and antioxidants as fresh produce. Make sure that the produce is certified organic and natural. Organic means that the produce is grown without pesticides or synthetic chemicals, and natural means that nothing is added during the packaging process. If it’s frozen, there’s no need to add anything. 2. Whole Grain Cereals – However, we suggest avoiding wheat if you can. The wheat we consume today has been genetically modified over the years. Some experts believe that wheat causes insulin sensitivity issues and contributes to “wheat belly.” Here’s a list of “safe” whole grains to look for: - Buckwheat (which isn’t really a grain) 3. Greek Yogurt – When made with organic and all-natural ingredients, Greek yogurt is a healthy snack any time of the day. The live bacterial cultures are essential for digestive and immune health. But, once again, don’t buy the flavored ones unless you check the label first. Unfortunately, many companies ruin their otherwise-healthy yogurts with artificial flavorings. 4. Chicken Broth – Broth that’s made from free-range chickens raised on organic, vegetarian diets is a great way to make your own soups. However, don’t buy the broth that’s sold in cans. Instead, look for broths in high-quality packaging. By the way, making your own soup is smart and pretty easy. Processed food companies sell vegetable soups inexpensively because they load them with high-glycemic carbohydrates (rice, potatoes, pasta) that cost virtually nothing. They then add inexpensive ingredients like corn, sugar, and sometimes omega-6 fats (like cottonseed oil). By the way, we have a new soup that you should try. It’s low in sugar, salt, and fat but loaded with flavor. 5. Canned Salmon – Canned salmon is an easy, convenient, and affordable way to add omega-3s to your diet. And, believe it or not, most canned salmon is from wild sources and not farm raised. Just make sure to choose the kind that’s made from wild Alaskan salmon (it'll say so on the label). 6. Sprouted Grains – Breads made with sprouted grains have twice the fiber and less simple sugar than traditional breads. Sprouted bread and organic all-natural black cherry spreads can make a great snack. Recipe: Alaskan Salmon & Chick Pea Mint PattiesThis is a recipe that I tried a couple of months ago and loved! Of course, since I don’t cook, my friend cooked for both of us. I did enjoy eating it though: - 1 or 2 cans Alaskan packed-salmon. - 2 cups fresh or frozen chick peas or cannellini beans - 1 small red onion, chopped - 3 cloves garlic - 2 teaspoons medium curry powder - 1 medium red chile, seeded and minced - Mint leaves - 1 teaspoon cumin seeds - 1-2 teaspoons hot pepper sauce - Salt and pepper - All-purpose whole grain flour (for dusting) - Olive oil Place the Alaskan salmon in blender; add chick peas or cannellini beans, onion, garlic, curry powder, chili, mint, cumin seeds, hot pepper sauce, salt and pepper. Blend together for a few seconds, but do not over-blend. Shape mixture into 18 balls; flatten them into patties. Dust lightly with flour. Heat olive oil in a large frying pan and gently fry patties for about 2 minutes on each side, until golden brown. (You may have to do this in batches.) Drain on paper towels. Makes 6 servings. Give it a try and let us know what you think! Share | |</s>
<urn:uuid:e32bca2f-1d20-4324-b6fc-7940a0597935>
CC-MAIN-2015-32
http://blog.lifeextension.com/2011/12/healthy-packaged-foods.html?showComment=1323714633516
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.937877
990
2.6875
3
For those of you who’ve been trying to find a legitimate excuse to cut down on your coffee intake for health reasons, hold that thought for a second and thank UCLA researchers who’ve given all of us another reason why we shouldn’t kick that caffeine habit quite yet. For quite some time now, researchers have had an inkling that coffee has had a connection with preventing type 2 diabetes. And in fact they were right. What researchers have found is that caffeine aficionados were least likely to develop type 2 diabetes, as the java works as a protective agent by increasing the plasma levels of sex-hormone-binding globulin (SHGB). The SHGB protein regulates the biological activity of the body’s sex hormones, testosterone and estrogen which has been long been thought to play a role in the development of type 2 diabetes. As Science Daily reported, after Atsushi Goto, UCLA doctoral student in epidemiology, and Dr. Simin Liu, professor of epidemiology and medicine with joint appointments at the UCLA School of Public Health and the David Geffen School, tested 359 new diabetes cases with 359 said to be healthy controls out of 40,000 women varying in both age and race, “they found women who drank four cups of caffeinated coffee each day had significantly higher levels of SHBG than did non-drinkers and were 56 percent less likely to develop diabetes than were non-drinkers,” explained Mark Wheeler of the UC Newsroom. “Early studies have consistently shown that an “inverse association” exists between coffee consumption and risk for type 2 diabetes,” Liu said. “That is the greater the consumption the lesser the risk of diabetes. It was thought that coffee may improve the body’s tolerance to glucose by increasing metabolism or improving its tolerance to insulin.” Liu adds, they now know that SHBG is indeed critical as an early target for assessing the risk and prevention of the onset of diabetes. They now know the protein can be influenced by dietary factors like coffee intake in affecting diabetes risk. The lower the levels of SHBG, the greater the risk beyond any known diabetes factor. But diabetes prevention is only the beginning of the health benefits coffee may give us. In a number of other studies, one in particular published in the Wall Street Journal and referenced by Top News, coffee has been found to possess antimicrobial agents that aid in the prevention of tooth decay. Other studies have said it decreases the risk of cardiovascular diseases in women by no less than 24 percent, protects men from Parkinson’s disease while also increasing their metabolism and may also help the condition of short-term memory loss and is a helpful factor in aiding headaches. So before you back away from that latte, just remember that one cup of espresso can provide you with loads of health benefits, so you might as well ask your barista for that double shot.</s>
<urn:uuid:d54a4653-8019-4fe6-8bf9-4b9b3be5ff15>
CC-MAIN-2015-32
http://blog.seattlecoffeegear.com/tag/coffee-news/page/2/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.963475
602
2.796875
3
What’s the News: For someone with severe peanut allergies, the tiniest trace of the nut makes their immune system go into overdrive, attacking what it perceives as an intruder so vehemently that the person can go into anaphylactic shock. Scientists may have found a way to calm that immune overreaction, a new study in rats shows, by tacking peanut proteins onto certain immune cells, effectively teaching the whole system that peanuts aren’t a threat. How the Heck: - The research team drew blood from mice bred to have a condition much like severe human food allergies: a tiny taste of peanut, and their hypersensitive immune system would ramp up, causing their airways to swell shut. - From the blood sample, the researchers isolated the leukocytes, white blood cells that help the immune system protect against microbes and other invaders, and attached peanut proteins to the cells’ surface. They then reintroduced each rat’s cells—now with the peanut-protein addition—into its blood stream. - In people (and rats) with peanut allergies, a particular type of helper T cell, a cell that signals the immune system to attack, sounds the alarm when it comes across a peanut protein. But since peanut proteins were attached to the immune system’s own cells, the T helper cells in these rats learned to tolerate the peanut protein, no longer treating it as a threat. - Once they’d gotten two doses of the modified leukocytes, the rats ate peanut extract. They didn’t show any serious ill effects, even though a similar snack would have dangerously swollen their airways prior to the transfusions. - The researchers then did a similar test, with rats bred to be allergic to an egg protein, and got the same result: tacking a bit of the offending molecule onto an immune cell ahead of time meant the rats’ immune system could handle egg protein later. Not So Fast: The study was in rats, not humans. It will take a lot more testing, and a lot more time, to know whether this sort of treatment will allow people with severe peanut allergies can safely eat foods with trace amounts of peanuts, much less enjoy a PB&J. The Future Holds: The ultimate goal is, of course, to develop a treatment for people with severe allergies to peanuts or other food. The researchers also hope that tacking on proteins from multiple allergens—say peanuts, egg, and soy—could be used to treat multiple food allergies at once. Reference: Charles B. Smarr, Chia-Lin Hsu, Adam J. Byrne, Stephen D. Miller & Paul J. Bryce. “Antigen-Fixed Leukocytes Tolerize Th2 Responses in Mouse Models of Allergy.” Journal of Immunology, published online October 5, 2011. DOI: 10.4049/jimmunol.1100608 Photo courtesy of EuroMagic / Flickr</s>
<urn:uuid:e6a35d9b-9d79-40a8-9216-6db38f41c96f>
CC-MAIN-2015-32
http://blogs.discovermagazine.com/80beats/2011/10/14/training-the-immune-system-may-turn-off-peanut-allergies/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.928437
611
3.359375
3
High-fructose corn syrup ups the sugar content of many As the obesity rates continue to climb in developed countries, and research about hunger and how our bodies process food advances, researchers are finding more clues that the epidemic’s cause is more complex than simple overeating. And one contributor may be the increase in the amount of sugar in processed foods, especially with the rise of mass-produced, cheaper-than-cane-sugar high-fructose corn syrup in the 1970s. At The Guardian, documentary maker Jacques Peretti has written a detailed history of the food industry’s role in popularizing high-fructose corn syrup and fueling obesity. Peretti’s story begins with corn overproduction in the 1970s causing a surplus, which led to the mass production of corn-based foods, including high-fructose corn syrup, long before worries about obesity had arisen.</s>
<urn:uuid:e4257132-9979-4b8b-8081-c345479ce0de>
CC-MAIN-2015-32
http://blogs.discovermagazine.com/80beats/tag/sugar/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.926859
184
2.84375
3
Roboticists have successfully colonized air, water and land with their mechanical critters. There are aerial research drones, underwater robotic gliders, robots that can roll and climb stairs. But one consistent challenge for existing robots is walking on shifting surfaces such as sand. A robot design published today is a good contender for solving that As is often the case in modern robotics, the scientists’ inspiration came from nature. Many small animals navigate sand, gravel, rubble, snow and leaf litter every day. However the mechanics of interactions with such “flowable ground” have been even more challenging for researchers to mathematically model than movement through fluids. Modeling that interaction is a crucial first step of building a sand-walking robot. The engineers began their research by looking at previous studies on the way various kinds of desert lizards walk, as well as data on existing similar robots such as RHex. Computer simulations allowed them to identify the optimal leg shapes and stride frequencies for traversing such deformable terrain. A C-shaped leg was mathematically most efficient. They then mechanically tested the leg, measuring the lift and drag as it rotated through sand (or sometimes flat beds of glass beads or poppy seeds What they came up with is a six-legged robot that is able to move efficiently across a bed of dry, loose sand. Its maximum speed was a little over 2 feet per second, with each leg making 5 cycles in that amount of time, they report today in Science. That’s still not as efficient as the locomotion of walking animals. However it’s a step in the right direction to improve the gait of roving and walking robots, such as the Mars rovers. Robot image courtesy of Chen Li, Tingnan Zhang, and Daniel Goldman Lizard image courtesy pixy / Shutterstock</s>
<urn:uuid:238ca27b-0fb7-4e2d-847f-d06cdaabfc8b>
CC-MAIN-2015-32
http://blogs.discovermagazine.com/d-brief/2013/03/21/robot-designed-to-run-like-a-lizard-over-sand/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.956687
374
4.40625
4
…and there is also a human figure, several faces, a bunny rabbit, a gun, a small chair, a large forest, and pretty much every other shape the human eye can piece together given a very large number of random shapes to contemplate. They are all real, in the sense that people genuinely do register them in the mind. As many writers have noted, the tendency of the eye and the brain to collaborate on creating recognizable objects is a well-known and quite powerful psychological phenomenon known as pareidolia. From an evolutionary point of view, pareidolia is a very useful thing. Babies are hard-wired to look for their mothers’ faces, because that is their source of food and protection (and eye contact is an important social bond). There is also a significant upside in perceiving the shapes of both predators and prey half-hidden in abstract clumps of leaves; seeing some animals that are not actually there is far less of a problem than missing some that are. Which brings me to the new “Mars rat,” or maybe “Mars lizard” depending on your perspective. This story has been lighting up the interwebs for about a week now. There is a long, long history of seeing animal shapes on Mars–the Red Planet being an especially attractive target because it is so tightly associated with the search for life in space, and because we just have so many pictures of the surface to dig through. The most notable thing about the latest sighting is that this time the conspiracy theorists are not arguing that NASA has found Mars life and is keeping it a secret (for unimaginable reasons). No, the alleged plot is that NASA is running secret animal experiments on Mars and one of the creatures has escaped. Here’s a quick thought: If scientists want to know how animals react to thin air and cold temperatures, they could easily do that experiment in the lab and save a billion dollars. Like most conspiracy theories, the fun of it lies entirely on the idea that somebody has a secret. Logic is not required. [Addendum: I just noted a link to an insightful recent study on conspiracy theories in the Comments section below.] I do find it interesting, though, that scientists themselves fully participate in the process of projecting animal and human figures out into space. The list of scientific nicknames for rocks on Mars is full of such imagery. Just moments ago I got a press release about a new story of the Cat’s Paw Nebula (though for the life of me I cannot see the paw in that image). I’d like to put this experiment out to DISCOVER’s readers: What are the most exotic creatures and constructions that you can find in the flood of amazing Mars imagery from the Curiosity mission? Follow me on Twitter: @coreyspowell</s>
<urn:uuid:a05eee94-9376-4d0b-a1bb-17595c6a4766>
CC-MAIN-2015-32
http://blogs.discovermagazine.com/outthere/2013/06/05/yes-there-is-a-rat-on-mars/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.95423
576
2.859375
3
Flipped instruction is a teaching approach that has gained prominence over the last couple of years. Using the flipped method, teachers expose their students to content outside the classroom, so in-class time can be used for more engaging exercises and activities. This summer, a group of Elon faculty members explored the flipping method with a Moodle course through the Teaching and Learning Technologies (TLT) department to see how this kind of teaching could be applied to their classrooms. The flipped course This course was a self-paced series in which faculty members learned about flipped instruction and how to incorporate its techniques effectively. Over five weeks, TLT facilitators released modules that taught the different elements of a flipped classroom, including: how to find or create out-of-class content, how to asses a student’s comprehension of that content and how to help students apply that knowledge in the classroom. Each faculty member finished the course with a fully-functional plan to flip some aspect of a course they would teach in the fall. Several professors created videos for their students to view at home. The videos were paired with Moodle quizzes to evaluate the students’ understanding of the material. That made class time available for labs and any additional questions from the previous night’s material. Another professor planned to use a web application to provide articles that her students could annotate online as they read at home. This, the professor hoped, would allow her writing-based course to focus on sharpening her students’ writing skills in class. In addition, the faculty members who participated in the course applied for mini-grants from TLT and the Academic Technology and Computing Committee (ATACC). These grants provided the necessary software and hardware to implement their flipped instruction plans in their courses. Feedback from faculty After completing the course, faculty took a survey, which reflected the group’s positive experiences learning how to flip their courses. When asked if they would recommend flipped instruction to a colleague, all replied affirmatively. “I would recommend the class because it made me aware of resources and techniques that I would not likely have discovered on my own,” one participant said. “I liked the opportunity to meet with the [TLT facilitator] for an individual feedback session as well.” While these faculty members had a satisfactory experience flipping their classrooms, some educators are still tentative about incorporating this approach in their own teaching. However, one of the participant emphasized that flipped instruction isn’t about altering everything about teaching; it’s about creating a more effective environment for the student to learn. “I think it’s important to emphasize that this is not a radical rethinking of the teacher’s role,” the participant said. “It can come off like lecturing is antiquated. [But] flipping can be just pieces, or specific exercises. It doesn’t have to be a complete rethinking of education, but an additional tool in the professorial arsenal.” More flipping this fall Be on the lookout in the upcoming weeks for our profiles on the Elon faculty members who completed the flipped instruction course and how they’re adapting to this method of teaching. If you’re interested in learning how to use flipped instruction in your course, contact Teaching and Learning Technologies at 336.278.5006 or [email protected] to schedule an individual consultation.</s>
<urn:uuid:81ef2936-c4c8-4c5b-829d-07bf49ac804e>
CC-MAIN-2015-32
http://blogs.elon.edu/technology/tlt-summer-course-encourages-elon-faculty-to-use-flipped-instruction/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.959464
703
2.828125
3
In A Tale of Two Cultures, Gary Goertz and James Mahoney argue that qualitative and quantitative methods constitute different cultures, each internally coherent yet marked by contrasting norms, practices, and toolkits. The authors seek to promote toleration, exchange, and learning by aiming to enable scholars to think beyond their own culture and see an alternative scientific worldview. Those instructing research methods will find the book a particularly helpful teaching tool, writes Maria Kuecken, with clear examples and case studies throughout. A Tale of Two Cultures: Qualitative and Quantitative Research in the Social Sciences. Gary Goertz and James Mahoney. Princeton University Press. August 2012. Between camps of quantitative and qualitative researchers, a discussion of research methods is one that usually incites more contention than cooperation. But, according to Gary Goertz and James Mahoney, conflict doesn’t need to be the norm. By carefully dissecting each methodological tradition in their book A Tale of Two Cultures, Goertz and Mahoney do social scientists a great service by promoting mutual understanding and appreciation of both quantitative and qualitative research methods. Goertz and Mahoney frame their book with the assertion that “the quantitative-qualitative disputation in social sciences is really a clash of cultures.” Like different cultures, they explain that each tradition abides by its own sets of practices and beliefs. And while there is potentially a great deal to be gained from cross-over between the two, more often than not cross-cultural interactions are waved away or, at the very least, misunderstood. Gary Goertz and James Mahoney are both social scientists themselves – the former is a political scientist at the University of Arizona and the latter is a professor of political science and sociology at Northwestern University. Both have extensive chops in teaching and writing about research methods, which explains why A Tale of Two Cultures is easy to follow despite its technical subject. The authors encourage social scientists to avoid knee-jerk reactions deriving from an aversion to or preference for one particular methodological tradition. Instead, they maintain impartiality, reminding the reader that both traditions “are appropriate for different research tasks and are designed to achieve different research goals.” Put simply, no tradition is better than the other. Moreover, to reduce the clash of cultures as simply “numbers versus words” is to make an unhelpful and misleading simplification. Adopting the cultures approach thus allows Goertz and Mahoney to initiate a breakdown of the two research traditions in a systematic and nuanced fashion. An important take-away is that some analogies which seem useful on the surface can instead be misleading. The authors emphasize early on that there is a translation problem across cultures. For example, the quantitative researcher is equipped with probability theory and statistical tools. Qualitative researchers don’t typically consider their tradition as one that is explicitly couched in mathematics but, as Goertz and Mahoney explain carefully in their mathematical prelude, logic and set theory support this paradigm. They demonstrate how applying fuzzy-set math as a formal tool in qualitative analysis can produce useful distinctions with quantitative analysis as well as illuminate the translation problem across the two research cultures. A simple demonstration is the seemingly straightforward comparison between using either statistical multiplication or the logical AND to aggregate data. While analogous, they result in two entirely different mathematical procedures since the latter requires taking the minimum. Thus, when taken to the mathematical roots, attempts to translate directly from one culture to another can be misleading. But it is not just the mathematical values that differ; norms and procedures do, too. Quantitative social scientists tend to begin investigations of causality by hypothesizing the impact of a particular cause on an outcome, while qualitative social scientists take the opposite approach, starting their investigation with a given outcome and working in reverse to find the causes. Choices such as these direct quantitative researchers to pursue methods of estimations that yield average effects of specific variables across samples, while qualitative researchers focus on a multivariate approach which leads them to look for explanations that fit a group as well as individuals within said group. The authors make similar distinctions regarding concept and measurement in each methodology as well as the qualitative within-case analysis (and its implications for both traditions). For a book that celebrates the complementarities between quantitative and qualitative research methods, it is unsurprising that the authors wrap up with a call for more mixed-method research. While a completely sensible suggestion, it is also a bit ironic, considering that the book’s tendency to focus on sociology and political science risks making other social scientists feel excluded. Yet, all social scientists do in fact have something to gain from the discussions presented here, especially by being more open-minded to the value of exchanges. A Tale of Two Cultures is an informative read for social scientists, especially those who find themselves specialized in one culture of research instead of the other (which, of course, is most of us). If one is absent a background in either culture, Goertz and Mahoney provide clear examples to illustrate their arguments. Thus, those instructing research methods will find the book a particularly helpful teaching tool, even if some may take issue with the ‘two culture’ approach. After all, promoting appreciation and exchange of research methods through better understanding is indeed a worthy goal. Maria Kuecken is a Ph.D. candidate in Economics at the Paris School of Economics—Paris I Pantheon-Sorbonne University. Maria teaches graduates and undergraduates in Applied Econometrics and Mathematics. Specializing in development economics, her own research focuses on the determinants of educational quality in developing countries. She has blogged on a variety of issues for the European Journalism Centre, worked on educational projects in Rwanda, and interned in the Health Division of the Organisation for Economic Co-operation and Development. Read more reviews by Maria.</s>
<urn:uuid:90803c30-fd4e-47bf-9675-76d325cadbf9>
CC-MAIN-2015-32
http://blogs.lse.ac.uk/impactofsocialsciences/2013/05/26/book-review-a-tale-of-two-cultures-qualitative-and-quantitative-research-in-the-social-sciences/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.938019
1,202
2.59375
3
Is it true that a single espresso can damage your heart? “A single espresso a day can damage heart.” “Just one espresso can put your heart at risk.” “One caffeine-packed cup can slow blood flow to the heart by 22%.” Whoa! Those are headlines that can make your heart skip a beat. They come from British newspapers reporting on an Italian study about the effects of a cup of espresso on blood flow and blood pressure. As is so often the case, the headlines don’t reflect what the study actually found, and anyone reading only the headlines may end up unnecessarily depriving themselves of the delights of an espresso. Coffee is obviously of interest to researchers because it is so widely consumed and because it has a number of biologically active compounds. Caffeine is the best known of these, but recently we have heard a great deal about the antioxidants that are also present in coffee. Part of the reason for the interest in coffee is that acute effects, such as a rise in blood pressure, are deemed to be detrimental, whereas long term consumption has been associated with a lower risk of cardiovascular disease and type 2 diabetes. This has actually been termed the coffee paradox. The current thinking is that the long term benefits are due to coffee’s antioxidants while the unfavourable acute effects are due to caffeine. Whether the acute effects present a risk is essentially unknown and this is what the Italian researchers decided to explore. They enlisted ten healthy males and ten healthy females to drink either a cup of espresso or a cup of decaf and have their blood pressure and arterial response be monitored. In the latter case, the technique is to cut off the blood supply in an arm and then using ultrasound, measure how effectively the brachial artery, the main artery in the arm, dilates when blood flow is restored. If the artery doesn’t dilate effectively, it means that blood flow is impaired, which is a possible sign of atherosclerosis in the making. The dilation of arteries is triggered by the release of nitric oxide, which is also an inhibitor of blood clot formation and inflammation. Basically, impaired endothelial function, as the lack of arterial dilation is called, means a reduction in the bioavailability of nitric oxide, which may be a harbinger of future trouble. What the researchers found in this case was a poorer dilation response after drinking a cup of espresso than after drinking a cup of decaffeinated coffee. There was actually a 22% greater dilation after the decaf, inspiring headlines about damaging the heart and reducing blood flow to the heart by 22%. As far as blood pressure goes, there was a small increase, but essentially within the scope of experimental error. And of course the study did not show any heart damage at all, no attempts were even made to study any such effect. And the endothelial response was measure in an artery in the arm, not in the coronary arteries that supply the heart with oxygen. The study was quite well carried out in the sense that neither the subjects nor the researchers who evaluated blood flow and blood pressure knew who was drinking which beverage. Furthermore, the study was of a cross-over design meaning that all subjects were investigated after drinking both types of coffee. On the other hand, twenty subjects makes for a pretty small sample. And measurements were taken only thirty and sixty minutes after drinking the coffee, so the longevity of the vasoconstriction effect is unknown. Most importantly, the short term constriction of the arteries may have no clinical significance since arteries in any case constrict and dilate throught the day in response to activity. A large body of evidence indicates that up to four or five cups of coffee a day is safe for the general population. Contrary to the implication inherent in the headlines, this Italian study does not show that a single cup of espresso damages the heart. The overwhelming evidence shows that when consumed in moderation – 400-500mg of caffeine per day, the equivalent of approximately four to five cups, coffee is safe for the general population.</s>
<urn:uuid:f3e66400-d9ab-4cca-9e74-ba8b3df4f7cc>
CC-MAIN-2015-32
http://blogs.mcgill.ca/oss/2012/11/17/is-it-true-that-a-single-espresso-can-damage-your-heart-2/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.962385
832
3.140625
3
Last weekend, NASA successfully launched the Mars Science Laboratory - called Curiosity, which is currently well on its way towards the red planet. Back in May, I went to an Open House at the Jet Propulsion Lab in Pasadena. What a refreshing sight it was to see so many people – couples, families, grandparents and grandchildren, groups of teenagers – coming to a scientific laboratory to learn about space and science! But the real reason I was there was to see Curiosity. Visitors could only see it from a closed viewing area high above the clean room where the rover, about the size of an SUV, was being built. It boggles my mind to think: that contraption that I saw being built in Pasadena is now millions of miles away, en route to another planet. All photos copyright the author.</s>
<urn:uuid:35288d44-439b-46ba-9f35-8d26dc1601a4>
CC-MAIN-2015-32
http://blogs.scientificamerican.com/thoughtful-animal/sunday-photoblogging-curious-about-curiosity/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.973652
163
2.578125
3
After many years of studying invasive plant species in Patagonia, Argentina, Dr. Eduardo Rapoport, Professor at the Universidad Nacional Del Camohue, realized that many of the “pests” he was cataloging were edible. “I found that, especially in areas disturbed by man, such as roads, back lots, and gardens, there are a great deal of unintentional food sources.” As a result, Dr. Rapoport found himself looking at these “pests, invaders, and weeds,” in a very different light. “I gathered together a group of students and we set out to assess how many kilograms of wild-growing edible food could be found in a hectare of urban space,” said Dr. Rapoport. Starting with the airport and working through different parts of the city, Dr. Rapoport and his students found that the average amount of food per hectare was 1,300 kilograms—or about 3,400 pounds of food per acre. Dr. Rapoport repeated the same study in Mexico in order to compare the results in temperate Patagonia with a tropical environment. He and his students found that there was an even greater wealth of food in that area—about 2,100 kilograms per hectare. “It was surprising,” said Dr. Rapoport, “and it was incredibly valuable. There are people who are going hungry and they are surrounded by plenty of food. They just don’t know it.” Not only are there a wide variety of wild edible plants growing near city streets, at schools, and in the public areas throughout South America, explains Dr. Rapoport, but many of them are also incredibly productive. “These are weeds,” says Dr. Rapoport, “they multiply and grow quickly. We found that many of them could be harvested multiple times per season, meaning that a gatherer could get more than one meal from one plant over the course of a very short period of time.” Dr. Rapoport and his wife, Dr. Barbara Drausal, with the help of the University, have published a book, Malezas Comestibles del Cono Sur or Edible Weeds of the Southern Continent, a guidebook of sorts that identifies and describes 240 edible weeds growing throughout South America. The book includes illustrations and recipes, directing the reader to the parts of each plant that are edible and providing detailed instructions for how to best prepare them. Although, Dr. Rapoport does not encourage people to plant these species—they are invasive after all—he says that they can be an important source of inexpensive food. “This is not a solution to world hunger,” says Dr. Rapoport, “but it is valuable knowledge that has been lost over the years. There is food all around us but most people just don’t notice it. Or they destroy it because they mistake it for useless pests.” In addition to his book, Dr. Rapoport visits primary school classrooms to help educate the next generation of Argentina’s food gatherers. And he has reached out to the Ministry of Education in the hopes that his research might become a part of standardized curriculum. “Often I take students outside to their school yard,” he says, “and they are amazed by how many edible plants are growing right there.” With edible plants throughout South America originating from North America, Asia, Africa and Europe, Dr. Rapoport also hope to have his book translated into English and other languages. The more people he can share this information with the better. “It’s about getting this valuable information to the people who need it most,” he says, “the hungry people who are surrounded by food.” To read more about looking to “weeds” and indigenous vegetables as a source of food, see: Keeping Weeds for Nutrition and Taste, Homegrown Solutions to Hunger and Poverty, Emphasizing Malawi’s Indigenous Vegetables as Crops, and Malawi’s Real Miracle. - Innovation of the Week: From the Township Garden to the City Table - Innovation of the Week: Giving Farmers a Reason to Stay - Innovation of the Week: Banking on the Harvest - Innovation of the Week: Agriculture Education in School - Innovation of the Week: Reducing the Things They Carry - Innovation of the Week: Turning the School Yard into a Classroom - Innovation of the Week: Turning an Invasive Species into a Livelihood - Innovation of the Week: Taking the Classroom to the Field</s>
<urn:uuid:3a672626-ea20-4643-ad08-2fdd0eafabb0>
CC-MAIN-2015-32
http://blogs.worldwatch.org/nourishingtheplanet/innovation-of-the-week-gathering-the-food-growing-at-our-feet/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.973437
976
3.140625
3
They used a common text-analysis software program called Linguistic Inquiry and Word Count, or LIWC2007. The software is a dictionary of more than 4,500 words and word stems that helps researchers mine and analyze emotions in text. Posts were determined to be positive or negative if they contained at least one word LIWC classifies as positive or negative, according to the paper. For example, LIWC categorizes “cried” as sadness, one of several negative emotions. Words like annoyed fall into the anger category. Words like “maybe, perhaps, or guess,” indicate that the person is tentative. The software analyzes parts of speech to assess the context in which a word is used. Designers of similar software packages say they “train” the software to resolve ambiguity by reviewing hundreds of thousands of sentences. Companies and researchers increasingly use software like LIWC to analyze the huge volume of content on social media. Marketers want to know what users are saying about their brands. Academics mine social media content to study behavioral and social trends. According to the LIWC site, the software was developed in the early 1990s. It is based on decades of research that found that people’s physical and mental health can be predicted by the words they use. Researchers have also found that the act of writing can influence people’s emotional state. You can score your own emotions using LIWC’s software. The company offers a free tool on its site where anyone can plug in their Twitter handle and see their emotional score. Based on the 911 most recent words used, LIWC says my emotional style is “worried” and my social style is “arrogant.” More on the News Feed Study: - Furor Erupts Over Facebook’s Experiment - It’s Time We Talk Seriously About Facebook’s Awesome Power - What Readers Are Saying About the Test - ‘Facebook Experiment:’ 21,000 Tweets in 24 Hours - Facebook’s Own Rules About Data Use - The Study’s Findings For the latest news and analysis, follow @wsjd. And like us on Facebook to get our news right in your feed: Get breaking news and personal-tech reviews delivered right to your inbox. More from WSJ.D: And make sure to visit WSJ.D for all of our news, personal tech coverage, analysis and more, and add our XML feed to your favorite reader.</s>
<urn:uuid:a79a2061-de08-45f0-9c5f-983212822102>
CC-MAIN-2015-32
http://blogs.wsj.com/digits/2014/06/30/how-researchers-classified-facebook-posts-as-happy-or-sad/?mod=trending_now_7
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.911235
529
2.921875
3
Your Chance to Help Bluefin Tuna The National Marine Fisheries Service has recently proposed a new rule to reduce the wasteful catch of bluefin tuna on longlines. While the rule is a step in the right direction, some changes are necessary to better protect this important fish. Each year, longlines, stretching up to 40 miles long with hundreds of baited hooks, are used to catch yellowfin tuna and swordfish, but they also catch more than 80 unintended marine species, including the deeply depleted Atlantic bluefin tuna. Because longline fishermen are only allowed to retain a limited amount of bluefin tuna, they must discard many of the bluefin they catch back to sea, even though they come up dead. A significant amount of this wasteful bluefin tuna catch occurs off Cape Hatteras, North Carolina, where bluefin tuna concentrate at certain times of the year, and in the Gulf of Mexico, the sole area on this side of the Atlantic Ocean where bluefin tuna come to breed. This wasteful catch is harming the Atlantic bluefin tuna population. For more information please see our recent blog post- Bluefin Tuna: Promise and Problems in a New Government Proposal. The Safina Center is writing to the National Marine Fisheries Service (NMFS) to urge them to strengthen the proposed rule and provide stronger protection to bluefin tuna. If you would like to let your voice be heard, below is a sample letter you can send. You can submit your letter electronically here or mail to Thomas Warren, Highly Migratory Species Management Division, NMFS, 55 Great Republic Drive, Gloucester, MA 01930. Please mark the outside of the envelope “Comments on Amendment 7 to the HMS FMP.” Dear Mr. Warren, I urge you take advantage of this historic opportunity to reduce the wasteful catch of depleted Atlantic bluefin tuna on longlines and protect this important fish. For decades U.S. longline fishermen have caught and killed bluefin tuna. Significant amounts of this bluefin tuna catch occur off Cape Hatteras, North Carolina and in the Gulf of Mexico, the only breeding area for bluefin tuna on this side of the Atlantic. Longline fishermen frequently catch more bluefin tuna than they are allowed to keep, requiring them to discard large numbers of bluefin back to sea, dead. The proposed rule by the National Marine Fisheries Series is a step in the right direction toward ending this waste, but some changes are necessary to ensure bluefin tuna get the protection they need and deserve. The small Gulf of Mexico closure proposed by the NMFS excludes an important breeding area for bluefin tuna in the north central Gulf where bluefin catch is high. Therefore the NMFS should expand this closure to include the entire Gulf of Mexico and extend the length of the closure to cover the peak breeding season for bluefin tuna, March-May. In addition the NMFS should establish the five month Cape Hatteras longline closure that restricts fishing for all longline vessels. Further, the NMFS should minimize the waste of dead bluefin released back to sea by implementing a bluefin tuna catch cap for the longline fishery and the associated individual bluefin quota system. The NMFS should not provide any additional bluefin tuna quota to the longline fishery beyond its current share of 8.1%. Giving additional bluefin tuna quota to the longline fishery would undercut the benefits of the bluefin tuna catch cap and associated measures. Strengthening the proposed rule as outlined above would eliminate much of the wasteful bluefin tuna catch that occurs on longlines each year. It would also encourage the use of more selective fishing methods, capable of avoiding the lethal catch of bluefin and other non-target ocean wildlife. Thank you for your time and consideration.</s>
<urn:uuid:8b89382d-c89b-4fd5-b3f3-af6e39ee498b>
CC-MAIN-2015-32
http://blueocean.org/issues/chance-help-bluefin-tuna/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.91458
768
2.75
3
FREE Trial Membership It doesn’t look like you are currently logged in to CADeeze.com. Please login using the box on the right, or if you are not a member, give us a test-drive by registering for FREE below. The AutoCAD Interface and Basic Drawing/Editing Commands Tutorial 01 – The Autocad interface, screen layout, ribbon, command line, accessing commands Tutorial 02 – AutoCAD’s Cartesian Workspace, Drawing Lines. Tutorial 03 – Erasing Lines and Erasing Lines with Crossing and Windows. Tutorial 04 – Drawing Lines with Polar Tracking, Absolute coordinates, Relative coordinates, Relative Polar coordinates, Dynamic Input. Tutorial 05 – Working with command line options, Specifically, the Rectangle. Tutorial 06 – Drawing Circles. Tutorial 07 – Viewing Your Drawing, Zoom Commands, Zoom Dynamic, Pan. Making Your Drawings More Precise Tutorial 08 – Using Object Snaps – Endpoint, Midpoint, Intersection, Perpendicular, Ortho. Tutorial 09 – Using Object Snaps – Center, Quadrant, Tangent, Osnap Settings, None, Osnap Tracking. Making Changes To Your Drawing Tutorial 10 – Moving Objects, Copying Objects. Tutorial 11 – Rotating Objects, Scaling Objects. Tutorial 12 – Mirroring Objects, Stretching Objects. Tutorial 13 – Editing Objects with Grips. Tutorial 14 – What are Layers?, Layer States (On/Off, Freeze, Thaw). Drawing Organization and Information Tutorial 15 – More Layer Tools; Lock/Unlock, Layer Isolate, Merge Layers. Tutorial 16 – Layer state manager, Line types, Working with Properties. Creating More Complex Objects Tutorial 17 – Trimming and Extending, Lengthen, Break. Tutorial 18 – Creating Fillets, Chamfers, Offsetting Objects. Tutorial 19 – Creating Arrays using the Rectangular Array and the Polar Array. Tutorial 20 – What are Blocks? Inserting Blocks. Tutorial 21 – Editing Blocks using Block Editor, Wblock, Inserting Blocks w/Design Center. Tutorial 22 – Drawing Arcs, Drawing Ellipses. Tutorial 23 – Drawing Polylines, Editing Polylines. Tutorial 24 – Drawing Polygons, Boundaries, Wipeout, Revision Cloud. Tutorial 25 – Drawing and Editing Hatches. Tutorial 26 – Paper Space vs. Model Space, About Layouts, Creating a New Layout, Set Layout To Proper Paper Printing Size. Tutorial 27 – Multiple Layouts, Viewports, Layers in Viewports. Tutorial 28 – Setting Drawing Units. Annotating Your Drawing Tutorial 29 – Introduction To Annotative Objects. Tutorial 30 – Text and Text Styles, Single Line Text, Multi-Line Text. Tutorial 31 – Dimensions and Dimension Styles.</s>
<urn:uuid:3b49a7f6-ac7d-45b0-b6f9-558a63ee5fc8>
CC-MAIN-2015-32
http://cadeeze.com/autocad-2011-tutorials
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.668174
629
2.71875
3
Data Visualization overlaps with the area of Human-Computer Interaction (HCI) which is as broad as computing and a broad as all of human society. Researchers in the area of Visualization borrow techniques from Psychology, Sociology, Linguistics, Artificial Intelligence and Computer Science, as well as many other areas of knowledge. The range of methods of analysis that can be applied ranges from techniques borrowed from the physical sciences to techniques that come from literary criticism. Interactive visualization research is also constructive. Often the most valuable contributions involve developing new methods for solving problems. Nevertheless, simply developing something is not usually enough. It is also necessary to convince other people that what you have done is valuable and this usually involves both analysis and testing. Here is a partial list of the research techniques that apply in Visualization research Evaluating the Applicability of Theory to Data vis Broblem: E.g. theory of luminance channel being good for form perception applies to color sequence design. Comparing solution A to solution B (atheorotetcal): E.g. David Laidlaw's study of flow vis methods. Rapid Prototyping and Spiral Design: Often the most effective systems are first built using quick and dirty methods, then evalutated and modified in a cyclical spiral design process. Sometimes the early implementation can consist of a set of sheets of paper representing interfaces screens. Proof of Concept Prototypes: This used to be the most common style of research. In essence this meant building a system and then describing it. In so far as the people who built sustems were also the ones to describe them, the descriptions were often overly positive. "Look, this really works well". Nevertheless, a constructive solution with a clear statement of reasons why is should be superior is an important contribution.. Graphics Algorithms: Graphics algorithms are needed to transform data into display. However, often the simplest algorithms are the most effective in visualization. The algorithms are not the problem. The most effective mapping of data to display is the real problem and this is a problem of perception. Interactive methods: The most effective techniques for exploratory data analysis involve rapidly revealing and hiding data "on demand" using techniques such as brushing and direct manipulation. Psychophysics: In psychophysics, measurements of human performance are made using the methods of physical science. The methods are useful to measure the human sensitivity to light or sound, for example. In data visualizaiton the methods relate to task like judging orientation in flow fields, finding hidden features, and so on. Cognitive Psychology: In cognitive psychology the human brain is assumed to consist of a number of processing centers that interact with one another. Experimental methods are designed to test models of these processing centers. The classic example of a cognitive theory is the division of memory into long term and short term components. Techniques from cognitive psychology are widely used in HCI. For example, In dual processing tasks we can determine how much cognitive load is placed on the user by a particular aspect of a user interface. Sociology and Anthropology: Artifact analysis: In anthropology, the goal is often to find out how some particular object or "artifact" is use in its cultural setting. It is religeous? Is it used for something practical? etc. The point is that in order to understand the object it is necessary to place it in a cultural context. In user interfaces, the computer program is treated as an artifact that is placed in the cultural context of its intended use. We study how it functions within the office or home work or play environment. Scenarios: In a scenario, someone invents a system or program and then writes a story about how this might be used. Often, the result looks a lot like a film script. For example, A lot of work on the early develpment of Personal Digital Assistants was done in this way. A scenario may be a useful way of getting funding to build a prototype. Role playing: Role playing involves acting out a scenario. It is usually coupled with a considerable amount of brain storming to try to find useful extensions to the object being designed. This is especially useful with meeting support tools. Wizard of Oz: In the Wizard of Oz method a person is made to simulate how the computer should react in some yet-to-be implemented user interface. This is especially useful in designing help systems. In essence the computer becomes human powered rather than silicon powered. The actual measurement tools used in assessment are extremely Some of the more common measurements are the following: In addition there are many highly specialized methods borrowed from various sciences.</s>
<urn:uuid:f2a81d50-0c18-4128-b146-2edd64913e23>
CC-MAIN-2015-32
http://ccom.unh.edu/vislab/VisCourse/Methodology.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.937501
960
3.203125
3
Cesar Chavez and Dolores Huerta recognized for their life long contributions to organized labor and social justice. Cesar Chavez Day is a state holiday in California – one of eight states to recognize the date, and one of the few holidays in the nation dedicated to a labor leader. Sacramento and dozens of cities, counties and labor federations will celebrate the life of Cesar Chavez on March 31, 2013. The year 2012 was the 50th. anniversary of the founding of the U.F.W. by Cesar Chavez, Dolores Huerta, Philip Vera Cruz and others. The celebrations focused on the struggle for union rights and justice in the fields of California. The United Farm Workers (UFW) was the first successful union of farm workers in U.S. history. There had been more than ten prior attempts to build a farm workers union. Each of the prior attempts were destroyed by racism and corporate power. Chávez and Huerta chose to build a union that incorporated the strategies of social movements and community organizing and allied itself with the churches, students, and organized labor. The successful creation of the UFW changed the nature of labor organizing in the Southwest and contributed significantly to the birth of Latino politics in the U.S. Today, under the leadership of UFW president Arturo Rodriguez, only about 25,000 farm workers enjoy benefits on the job. Wages and benefit in farm labor have again been reduced to the pre union levels. The UFW has shown unions that immigrants can and must be organized.</s>
<urn:uuid:e8be4351-bf42-447a-95b6-99b3ef20d585>
CC-MAIN-2015-32
http://choosingdemocracy.blogspot.com/2013_03_01_archive.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.963667
314
3.765625
4
A self-reflective essay is a brief paper where you describe an experience and how it has changed you or helped you to grow. Self-reflective essays often require students to reflect on their academic growth from specific projects or assignments, though others might require you to think about the impact of a specific event in your life. By describing your overall experience for readers, discussing your current strengths and weaknesses as they relate to the experience you wrote about and sharing your future plans for using this new information, you can paint a vivid picture of how you have grown and changed. An introduction to a self-reflective essay is a preview of what you'll be discussing. Developing a thesis statement that illustrates the major points of your reflection can give readers a preview of the content without giving too many of the details away in the beginning. A student writing an essay on her academic growth, for example, might write as a thesis, "Through my work on my final research paper, I've learned how to do stronger research and use an objective voice, but I still need to work on structure and transitions." Many instructors may provide you with questions to consider in your reflection. You might be asked to talk about a specific way an experience changed your attitudes or actions, a significant challenge you faced or things you would do differently if given a second chance. If the assignment does not include a prescribed list of questions, you might start by considered what your experience taught you and how it has changed you as a student or person. Specific details and anecdotes from the experience will help to clearly demonstrate your areas of growth. Strengths and Weaknesses Self-reflective essays may challenge you to think critically about what you are doing well and what needs to be changed as a result of the experience you're writing about. You can begin by talking about skills, responses and actions that have been strengthened by this experience, then move into a discussion of areas that need work. A student writing about being a camp counselor or doing community volunteer work might write about his strength in finding ways to relate to different kinds of people, and then discuss his need to work on his tendency to prejudge them when they first meet. Throughout your reflection, you should make a case for how the experience has stimulated your personal growth. By the conclusion, readers should have a clear, specific idea of how the experience affected you and particular ways you have made progress. In a reflective essay, you can approach the conclusion by talking about how you plan to use what you learned from this experience in the future. For example, you can talk about how the knowledge and experiences you gained will be useful in future classes, jobs, relationships and other aspects of your life. Style Your World With Color Explore a range of deep greens with the year's "it" colors.View Article Let your imagination run wild with these easy-to-pair colors.View Article Explore a range of beautiful hues with the year’s must-have colors.View Article Explore a range of cool greys with the year's top colors.View Article - George Doyle/Stockbyte/Getty Images</s>
<urn:uuid:6115c90e-711f-42d5-83ed-692be41ef7fa>
CC-MAIN-2015-32
http://classroom.synonym.com/write-selfreflective-essay-2138.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.953857
634
3.265625
3
Netbooks vs. Notebooks Notebook computers are lighter than the laptops we looked at in the previous section. They usually have screens ranging from 12 to 17 inches (30.5 to 43.2 centimeters) and weigh around 5 to 6 pounds (2.3 to 2.7 kilograms). Ideally, a notebook computer has the same processing power and features as larger laptop computers. Many manufacturers charge a premium price for the convenience of a small computer that packs a big punch. The Lenovo ThinkPad X300 is a notebook computer. It has a 13.3-inch (33.8 centimeter) screen and weighs only 3.2 pounds (1.5 kilograms), making it a lightweight in the notebook category. When closed, it measures only .9 inches (2.3 centimeters) thick. It also has many of the features you'd find in a typical laptop computer: a WiFi card, a Bluetooth antenna, a dual-core processor, 1 gigabyte (GB) of RAM and a 64-GB solid-state hard drive. It also has a DVD drive and an integrated Web camera. It comes with the Windows Vista operating system. Netbook computers are relative newcomers to the computer market. The general definition for a netbook computer is that they are smaller, less powerful and less expensive than notebook computers. When they first began to get attention in early 2008, netbooks seemed to contradict the popular philosophy in the computer market. For many years, the prevailing strategy for computer consumers was to find the fastest, most powerful computer in their price range. But consumers are beginning to understand that they don't necessarily need a bleeding-edge computer for most of the tasks they perform. And as the Web takes a more prevalent role in computing, the processing requirements for consumer computers become less demanding. Though people disagree on specific metrics for netbooks, in general they have screens smaller than 12 inches (30.5 centimeters) and weigh only one or two pounds (.5 to .9 kilograms). Typically they cost between $300 and $600. An example is the Asus EEE PC 4G. It weighs two pounds (.9 kilograms) and has a seven-inch (17.8 centimeter) screen. The processor is an Intel Celeron M 353/630 megahertz chip and it has 512 megabytes of RAM. It comes with a 4 GB solid-state hard drive and costs around $400.</s>
<urn:uuid:65e5ec49-ccb5-42e3-bba1-d6adfc6ed98b>
CC-MAIN-2015-32
http://computer.howstuffworks.com/notebook-vs-netbook-vs-ultra-mobile-pc1.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.941512
490
3.375
3
Talk to a Local Criminal Law Process Attorney Enter Your Zip Code to Connect with a Lawyer Serving Your Area Once an accused individual, or defendant, is arrested for allegedly committing a crime, there are certain legal proceedings that’ll occur. The defendant will be booked by the police. This means that he’ll be fingerprinted, photographed and put in a holding cell. The defendant will remain in the cell until his initial appearance. An initial appearance is the first proceeding in front of a judge. The police may also release a defendant on bail. This means that the defendant or a third party pays or pledges to pay a set amount of money to allow the defendant’s temporary release. The defendant is obligated to return for the initial appearance. Purpose of Initial Appearance There are two important reasons for an initial appearance. The first reason is to inform the defendant of his legal rights. The defendant may not be aware of what exact rights he has after his arrest. The judge will inform him of these rights to help him in his decisions. The second reason for an initial appearance is to prevent coercive interrogation by the police. The defendant is entitled to an initial appearance without unnecessary delay after he’s arrested. If there’s a long delay, the police may attempt to secure a confession using improper techniques. The defendant is entitled to be fully advised of his rights by the judge. Some states may combine the initial appearance with the arraignment. An arraignment is a proceeding before the court where the charges are formally read to the defendant. He may also enter a plea to the charges at this proceeding. A plea is the defendant’s answer to the charges. Rights of Defendant at Initial Appearance There are certain key rights that the defendant must be informed of at the initial appearance. Some rights may depend on whether the defendant is being charged with a felony or a misdemeanor. A felony is a crime that’s punishable by death or imprisonment for more than one year. A misdemeanor is a crime that’s punishable by a fine or imprisonment less than one year. States vary as to what rights the defendant must be told at the initial appearance. If the defendant is charged with either a misdemeanor or a felony, the judge must usually inform him of: The judge will decide whether to allow the defendant to be released on bail. The defendant is entitled to a reasonable opportunity to consult with a lawyer. Most states will appoint an attorney if the defendant is too poor to obtain one. However, the defendant may not have a right to a court-appointed lawyer if he’s only charged with a misdemeanor. Warrantless Arrest of Defendant Judges are extra careful at the initial appearance if the defendant was arrested without a warrant. A warrant is an official order from a judicial officer that authorizes the police to arrest a defendant. Judges want to prevent the unlawful detention of suspects by police. If there’s no warrant, the judge must determine whether there’s probable cause to justify the arrest of the defendant. Probable cause means that that there’s a reasonable ground in the facts and circumstances for a belief that the defendant committed the crime. If there’s no probable cause, the judge will have the defendant released from custody. This determination will be made at the initial appearance or a probable cause hearing soon after. Remedy for Unreasonable Delay If there’s an unreasonable delay between the time the defendant is arrested until his initial appearance, the judge will normally suppress any confession or statements made during this delay. Courts will vary as to what’s an unreasonable delay. There’s no set time that constitutes a delay that’s unacceptable. Each case is determined on its own facts and circumstances.</s>
<urn:uuid:9f7b4c6a-3d38-4e25-bc05-0b66947cc69a>
CC-MAIN-2015-32
http://criminal.lawyers.com/criminal-law-basics/initial-appearance-in-court-after-an-arrest.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.951222
772
2.53125
3
BY FREDDIE ALLEN NNPA WASHINGTON CORRESPONDENT WASHINGTON – Even before they typically learn to read, Black preschoolers – some as young as 4 years old – are taught a disgusting lesson: They are three times more likely to be suspended from school than their White classmates, according to a recent study by the civil rights division of the U.S. Department of Education. “Black students are suspended and expelled at a rate three times greater than White students. On average, 5 percent of White students are suspended, compared to 16 percent of Black students,” the Department of Education study found. Black children account for 18 percent of the nation’s preschoolers, but nearly half of students in that age group suspended more than once, compared to White children who represent 43 percent of preschoolers and 26 percent of students suspended more than once, according to the report. High in Florida Daniel Losen, director of the Center for Civil Rights Remedies for the Civil Rights Project at UCLA, told the Associated Press: “Just kicking them out of school is denying them access to educational opportunity at such a young age. Then, as they come in for kindergarten, they are just that much less prepared.” Florida, Indiana, North Carolina, Rhode Island, and South Carolina reported the widest gaps in the racial disparity suspensions between Black and White students. New Jersey, New York and North Dakota reported the smallest gaps. Black students also account for nearly 30 percent of students referred to law enforcement in what many civil rights advocates have called the school-to-prison pipeline. “Black students represent 16 percent of student enrollment, 27 percent of students referred to law enforcement, and 31 percent of students subjected to a school-related arrest. In comparison, White students represent 51 percent of students enrolled, 41 percent of referrals to law enforcement, and 39 percent of those subjected to school-related arrests,” stated the report. For the first time in 14 years, the Education Department collected data from all 97,000 public schools and its 16,500 school districts, responsible for 49 million students. “This data collection shines a clear, unbiased light on places that are delivering on the promise of an equal education for every child and places where the largest gaps remain. In all, it is clear that the United States has a great distance to go to meet our goal of providing opportunities for every student to succeed,” Secretary of Education Arne Duncan said in a press release. “As the President’s education budget reflects in every element – from preschool funds to Pell Grants to Title I to special education funds – this administration is committed to ensuring equity of opportunity for all.” The Education Department report comes on the heels of research funded by the Atlantic Philanthropies and the Open Society Foundations that showed that implicit bias contributes to racial disparities in student suspension rates from kindergarten to the 12th grade. ‘Misperceived’ to be adult In a study titled, “The Essence of Innocence: Consequences of Dehumanizing Black Children,” researchers from the University of California, the National Center for Post-Traumatic Stress Disorder, and the University of Pennsylvania, concluded that after 9 years old, “Black children and adults were rated as significantly less innocent than White children and adults or children and adults generally.” A majority of the survey participants were White women, the same group that is also over-represented among public school teachers. Researchers found that Black boys may be perceived as more than 4.53 years older than their actual age, which meant that a 13 year-old might be “misperceived” to be an adult by law enforcement officials. The report continued: “These outcomes are particularly worrisome for Black children, who are 18 times more likely than White children to be sentenced as adults and who represent 58 percent of children sentenced to adult facilities, the report stated. Holder: Work together In recent speeches Attorney General Eric Holder has urged school administrators, lawmakers and parents to work together to dismantle the school-to-prison pipeline that often has far-reaching consequences for young people that get swept up into the criminal justice system. Holder said that the report was critical and showed that racial disparities in school discipline policies are not only well-documented among older students, but actually begin during preschool. “Every data point represents a life impacted and a future potentially diverted or derailed,” Holder said. “This administration is moving aggressively to disrupt the school-to-prison pipeline in order to ensure that all of our young people have equal educational opportunities.”</s>
<urn:uuid:99cd833e-8158-4a94-a230-8196a7c53860>
CC-MAIN-2015-32
http://daytonatimes.com/2014/04/black-preschoolers-suspensions-triple-that-of-whites/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.958982
960
2.90625
3
Parsley seeds can be difficult to start. They often take 3-4 weeks to germinate and then grow very slowly. If you only want a few parsley plants, it’s easiest to buy them as small plants from a nursery. If you are determined to start your own from seed, soak the seeds in warm water overnight before planting. Parsley grows best in cool soil and will tolerate some shade. In hot climates the plants will benefit from afternoon shade. Although you can start harvesting parsley any time, you can expect the plants to mature in about 75 days. Parsley is available in two basic forms: flat-leafed (also called Italian) and curly-leafed. Curly-leafed is the most attractive, and is often used as a garnish in restaurants. It can even be used in flower arrangements. Most cooks prefer the flat leafed type, believing it to be more flavorful. Parsley is a biennial, so there is no need to worry about it going to seed in the first year. If your parsley plant survives the winter in your garden, or if you decide to bring it indoors, you can expect to get about a month of usable leaves in early spring before the plant sends up a flower stalk, goes to seed and then dies. Parsley freezes well (chop it in a food processor and freeze it in plastic bags) and it also dries well. To dry parsley, use a food dehydrator at a low temperature, or put it on a rack in the oven with the pilot light on. Store dried parsley in an airtight container, away from sunlight. Parsley doesn’t have a problem with cold temperatures. In the fall you can use or store what you need, and leave the plant right in the ground. Even in cold parts of the country you should be able to go outside on Thanksgiving Day and pick some– even if you have to shovel snow off the plants.</s>
<urn:uuid:5c8fa209-04e6-4b1c-8b0c-2938b761f568>
CC-MAIN-2015-32
http://demandware.edgesuite.net/aabf_prd/on/demandware.static/Sites-Gardeners-Site/Sites-Gardeners-Library/default/v1358521219468/Articles/kgp/assets/parsley.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.953099
410
2.75
3
You will benefit from using residential wiring diagrams if you plan on completing electrical wiring projects in your home. An electrical wiring diagram can be as simple as a diagram showing how to install a new switch in your hallway, or as complex as the complete electrical blueprint for your new home.Although household electricity is nothing to play around with, in many ways, wiring is simpler than other repair and remodeling skills such as carpentry. Once you’ve learned some basic skills such as installing boxes, running cable, and splicing, you just need to determine which wire goes where. This is why a good wiring diagram is important for wiring your home safely. Keep your diagrams near-by. You’ll want to refer to them often as you work on your project.Wire Colors:Electrical wiring diagrams that are in color have an advantage over ones that are black and white only. The wires will be colored the same as the actual wires you will be using. Commonly, the green wire is ground, white or off-white is neutral, and black, red or other colors indicate the hot wire. In some instances, such as some switch legs, the function of the wires will be indicated by colored electrical tape.Symbols:When looking at any residential wiring diagram, start by familiarizing yourself with the symbols that are being used. The electrical symbols will not only show where something is to be installed, but what type of device is being installed. Make sure you understand the symbols on your diagram before beginning your project. There should be a chart on your diagram showing the different symbols being used, much like a legend on a map.For example, a surface ceiling light will be shown by one symbol, a recessed ceiling light will have a different symbol, and a surface fluorescent light will have another symbol. Each type of switch will have a different symbol and so will the various outlets. You’ll even find symbols showing the location of smoke detectors, your doorbell chime, and the thermostat.Switches:When it comes to household electricity, there’s a lot more to consider than simply turning a switch On and Off. Some of the most common questions electricians receive involve switches. Once you understand the different types of switches and follow a good wiring diagram, you should be able to install a new switch in your home.Here are some of the more common switching configurations:A Single-Pole Switch provides switching from one location only. “Single-Pole” may sound simple, but there are different ways to wire a Single-Pole Switch and a set of electrical wiring diagrams will explain each of them to you clearly.3-Way Switches are used to control one or more fixtures from two locations. This is a common configuration in hallways and staircases. There are many ways to wire a 3-Way Switch. The power can start at a fixture or either of the two switches. Without a wiring diagram it can be very easy to make a serious mistake.A wiring diagram will even take the mystery out of wiring a 3-Way Dimmer Switch. What a great way to enjoy softer light and a reduced energy bill!One of the most complicated wiring configurations is a 4-Way Switch. These switches enable you to control one or more fixtures from three or more locations. It would be almost impossible to write the instructions in a way that you could simply read them and complete your project. However, a good wiring diagram will make it possible for you to successfully and safely tackle wiring 4-Way Switches.As important as electrical wiring diagrams are to the successful completion of your wiring project, safety and respect for electricity are essential. Never work on live circuits. Before you begin your project, identify the circuit you’re working on and then turn off power to that circuit at the main panel. Then confirm that the power is off with a voltage tester. If at any time you feel unsure about what you’re doing, please call a licensed electrical contractor. More information on residential wiring diagrams and diagrams for all of these switches can be found in the Residential Wiring Diagrams section of my website: Ask-The-Electrician.com. Dave Rongey is a Licensed Electrical Contractor with over 35 years of experience. He is also an avid Do It Yourselfer. Through the years Dave has seen too many DIY projects that are serious fire and safety hazards. Visit Dave at Ask-The-Electrician.com for electrical project guides, complete with photographs, which will enable you to enhance the beauty and value of your home safely. Last search terms ~~</s>
<urn:uuid:923dea62-215a-4421-862c-e40531564e6f>
CC-MAIN-2015-32
http://diagramwiring.net/search/s40+volvo+belt+routing+diagram/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.92772
937
3.078125
3
That surely is the perfection of description; whilst the wimple of the burn is echoed in the music of the verse! She stopped short, drew her wimple round her face, and was gone. The wimple or gorger is stated first to have appeared in Edward the First's reign. On the early brasses the wimple under the chin marked the rank of the wearer. Turning into his own house Bradford found Alice with her wimple and scarf on just about to leave it. Her wimple is trimly plaited, and how fashionable is her cloak! wimple, wim′pl, n. a hood or veil folded round the neck and face (still a part of a nun's dress): a flag. Here is a candle-end, which you must hide under your wimple. The Wife of Bath has the wimple below her broad hat and rides in a foot mantle about her hips. The top of this head-dress is covered with a wimple, which is sometimes stiffened with wires. "head covering for women," especially worn by nuns, Old English wimpel, from Proto-Germanic *wimpilaz (cf. Old Saxon wimpal, Old Frisian wimpel, Middle Dutch, Dutch wimpel, Old High German wimpal, German wimpel, Old Norse vimpill), of obscure origin. Old French guimple (French guimpe) is a Germanic loan-word. Isa. 3:22, (R.V., "shawls"), a wrap or veil. The same Hebrew word is rendered "vail" (R.V., "mantle") in Ruth 3:15.</s>
<urn:uuid:23b88eb5-069f-4a5b-b8e6-d93adee1c1cb>
CC-MAIN-2015-32
http://dictionary.reference.com/browse/wimple?qsrc=2446
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.953721
369
2.734375
3
The focus is on the programming process, with special emphasis on debugging. The book includes a wide range of exercises, from short examples to substantial projects, so that students have ample opportunity to practice each new concept. This package is listed in the following Collections: |License||Verified by||Verified on||Notes| |GFDL||Algot Runeman||20 December 2013| Leaders and contributors |Allen B. Downey||original author| Resources and communication |Learners of Python||Homepage||http://www.thinkpython.com/| |Required to use||Book teaches Python programming| This entry (in part or in whole) was last reviewed on 20 December 2013.</s>
<urn:uuid:9d5b24e3-94f2-445b-b98f-f0a28045f2c0>
CC-MAIN-2015-32
http://directory.fsf.org/wiki?title=Think_Python
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.821642
149
2.640625
3
The /etc/patch/pdo.conf file is used to specify the number of processes that are forked to execute the patch utilities in a parallel fashion on a zoned system. This file is used by the pdo binary which the patching utilities are linked to after a patch has been successfully added or removed from the global zone. In the current version of pdo.conf file, there is only one entry that is present. As future changes could be made to this pdo.conf, no application other than the patching utilities should rely on the layout of this file. Entries in the pdo.conf file have the following format: The following definitions are part of the format: Key for this record. Specifies the number of process to fork that are used by the patching utilities Standard delimiter used for parsing the record Value for the key determining the to be forked processes. The value of the actual number of processes is determined by the following three factors: Number of online CPUs Number of non global zones in the system This value is set to 1 by default, which means that old (serial) patching behavior is followed. If the value of num_proc is less than the online CPUs and zones in the system, then this value is used. However, if it is greater than the number of online CPUs but less than the number of zones, then a value equal to the 1.5 times the number of online CPUs is used. If the value of num_proc is more than then number of zones present, then the minimum of the number of 1.5 times of online CPUs and number of zones are used to fork processes. The pdo.conf file uses the following rules for parsing: There can be any number of white space characters anywhere in the file There can be only one valid entry in this file of the form discussed above, parser returns a failure if such an entry is not present. An entry which starts with #character is considered to be a comment and are not be processed An entry can begin with any number of white space characters and then followed by an ascii character. The following character should be forming a string of the form num_proc. If such a string is not found, parsing returns an error. If num_proc string is found in an entry, then the next valid character can only be a = character. Its an error if such a character is not found The next character following = can not be a ascii character which is not a digit. If such an ascii character is present its an error. Having parsed all digits after = character, parser proceeds to check if there are any white space characters following the last digit or is it immediately followed by an ascii character which is not a space but either # or any other ascii character. If such an occurrence is there, then it is an error. The parser literally follows all the above rules until it finds an entry which matches all the rules which means that the parser has successfully parsed the configuration file # # This file contains key value pair of the following format. There # is only one legal entry which starts with num_proc key. This key # is followed by a delimiter '=' which is then immediately followed # by a value which determines the number of processes to be forked. # To get better performance, it is advisable to keep the num_proc # value equal to the number of online CPUs in the system. For more # details read the section 4 man page of /etc/patch/pdo.conf # # Format: # # num_proc=<num_of_processes> # # where: # # num_proc is the key for this record. It specifies # the number of process # to fork that will be used by the patching utilities # # = the standard delimiter used for parsing the record # #<num_of_processes> the value for the key determining the to be forked # processes # The value of actual number of proceses is determined # by the # following three factors mentioned in 'Factors # determining # procesesse to be forked' num_proc=10 # fork 10 processes See attributes(5) for descriptions of the following attributes:</s>
<urn:uuid:f50040a9-4e92-4850-93b7-0c59b4d334ae>
CC-MAIN-2015-32
http://docs.oracle.com/cd/E19253-01/816-5174/pdo.conf-4/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.8882
888
2.8125
3
The $ORIGIN command is a way of changing the origin in a data file. The line starts in column 1, and is followed by a domain name. It resets the current origin for relative domain names (for example, not fully qualified names) to the stated name. This is useful for putting more than one domain in a data file. You cannot use $ORIGIN() for putting more than one zone in a data file. Use of $ORIGIN commands in a data file is optional. If there is no $ORIGIN() statement the default origin for DNS data files is the domain named in the second field of the primary or secondary line of the named.conf file.</s>
<urn:uuid:c8f4b2ee-e112-4890-a4c4-ac587787bd19>
CC-MAIN-2015-32
http://docs.oracle.com/cd/E19455-01/806-1387/ad1intro-24/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.866739
144
2.78125
3
What you eat during your pregnancy has a direct effect on the growth and development of your baby. It is important to eat a well-balanced diet that includes lean meats or meat alternatives, whole grains, low-fat dairy products, and plenty of fruits and vegetables. In addition to increasing your consumption of healthy foods, there are certain foods you need to limit or avoid. Some foods contain substances that can affect your baby’s development, while others put you at risk of developing an infection that can be passed to your baby. Fish and Shellfish Mercury is naturally found in the environment and is also released by industrial pollution. When mercury settles into water, it is converted into methylmercury, a more dangerous form. Methylmercury can build up in the fatty tissue of fish. Most fish contain trace amounts of methylmercury, which is unlikely to cause harm. But, large, predatory fish can contain high levels of methylmercury. The United States Food and Drug Administration (FDA) and the Environmental Protection Agency (EPA) provide these recommendations for women who may become pregnant, are pregnant, or are nursing: - Do not eat fish that contain high levels of mercury, including swordfish, shark, king mackerel, and tilefish. - Eat up to 12 ounces (340 grams) of fish containing low levels of mercury per week. Fish containing low levels of mercury include shrimp, canned light tuna, salmon, pollock, and catfish. Because white tuna and tuna steak contain higher levels of mercury, women are advised to eat no more than 6 ounces of these fish per week. - If you usually eat locally caught fish, check advisories about the safety of the fish. If there are no advisories, limit your intake to 6 ounces (170 grams) per week. If you eat local fish, do not eat any other fish during that week. Pregnant women should also avoid raw and undercooked fish, especially shellfish, such as oysters or clams, because they can contain disease-causing organisms. Cook fish until it is opaque and flakes easily with a fork. Ready-to-Eat Meats and Soft Cheeses Unpasteurized soft cheeses and ready-to-eat meats should be avoided during pregnancy because they may contain bacteria that causes listeriosis, a form of food poisoning that is especially harmful to unborn babies. Listeriosis is associated with miscarriage , premature delivery or stillbirth, and serious illnesses in newborn babies. To avoid listeriosis, take these steps: - Avoid eating hot dogs or luncheon meats that have not been reheated until steaming hot, or 160°F. - Do not eat soft cheeses, such as feta, brie, Camembert, Roquefort, or Mexican soft cheeses, unless they are made with pasteurized milk. - Avoid refrigerated pâtés or meat spreads. - Avoid refrigerated smoked seafood unless it has been cooked. - Do not consume unpasteurized milk or foods made from it, such as eggnog or Hollandaise sauce. Undercooked Meat and Eggs Undercooked meat, including poultry and eggs, should be avoided during pregnancy. These foods can increase your risk of a number of foodborne illnesses, including listeriosis, E. coli, Campylobacter infections, salmonellosis, and toxoplasmosis. To ensure your meat is well-cooked, use a meat thermometer. Follow these temperature guidelines when cooking food: Pregnant women should also avoid eating raw vegetable sprouts, such as alfalfa, clover, or radish, and unpasteurized fruit or vegetable juices. These can carry disease-causing bacteria. In addition, pregnant women should limit their consumption of liver, since it contains high levels of vitamin A, which could potentially cause harm to a developing baby. Food Preparation Tips When preparing and handling foods, the March of Dimes recommends you take the following precautions to avoid foodborne illnesses: - Before and after handling food, wash your hands with soap and hot water. - Wash any item or area that comes in contract with raw meat, poultry, or fish. - Separate ready-to-eat food from raw meat, poultry, or fish. - Before eating raw fruits and veggies, rinse them and use a scrub brush to remove dirt. - Take the outermost leaves off of lettuce and cabbage. - Refrigerate leftovers within 2 hours after eating. Also, avoid eating cooked food that has been out of the refrigerator for more than 2 hours. - Keep your refrigerator temperature below 40ºF (4ºC) and your freezer at 0ºF (-18ºC) or below. Buy a thermometer to check the temperature. - Reviewer: Michael Woods, MD - Review Date: 04/2015 - - Update Date: 04/16/2015 -</s>
<urn:uuid:f6f9d6e2-d64b-4c77-8ac9-1e2586d4b862>
CC-MAIN-2015-32
http://doctors-hospital.net/your-health/?/101118/Reducing-food-borne-risks-during-pregnancy
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.931911
1,027
3.34375
3
Dragons are creatures with nearly unlimited life spans. They can survive for long periods of time, and no one has found a dragon that has died of old age. Adolescence is usually marked by the growth of a hatchling’s wings, although not all breeds of dragons grow wings and some breeds have other traits that indicate the beginning of maturation. Once they hit adolescence, hatchlings change quickly, maturing to their full forms in only 2 years. Dragons don’t communicate with each other verbally, but they will growl to scare off predators and frighten prey. Young dragons will emit an extremely high-pitched squeal when they are frightened. To communicate, they use telepathy with each other and to speak to other creatures. Waterhorse dragons received their name due to their horse-like physique and endearing behavior. They are capable of surviving out of water, and when on land their skin secretes a gelatinous goo to retain moisture. However, their large paddle feet are better suited for swimming, and waterhorse dragons tend to move very awkwardly when on land. Waterhorses are very friendly dragons and enjoy playing with humans.</s>
<urn:uuid:50799d4a-9380-4801-8a71-de280d30ab66>
CC-MAIN-2015-32
http://dragcave.net/view/nQRNm
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.966477
238
3.015625
3
15 Feb 2013: Meteor Strike in Siberia Rains Down Debris and Injures 1,000 A 10-ton meteor broke apart 20 to 30 miles above the ground in western Siberia, raining chunks of debris over a large area, causing a powerful boom that damaged buildings across a vast territory, and injuring more than 1,000 people, mostly from shattering glass. The Russian Academy of Sciences said the meteor, known as a bolide, streaked through the earth’s atmosphere near the Ural mountain city of Chelyabinsk, 950 miles east of Moscow, around 9 a.m. local time Friday. It lit up the sky with a fireball that could be seen for hundreds of miles and that was captured on video by scores of observers. Pieces of the disintegrating meteor fell into a lake about 50 miles west of Chelyabinsk, and scientists and local officials said the damage and injuries could have been far worse had chunks of the meteor fallen on Chelyabinsk itself. As it was, the meteor strike shattered windows, TV sets, and dishes across a wide area, which caused most of the injuries. Most meteors that strike Earth disintegrate in the atmosphere, but this meteor was made of exceptionally hard material and did not fully burn up as it approached Siberia, scientists said. Yale Environment 360 is a publication of the Yale School of Forestry & Environmental Studies Yale Environment 360 articles are now available in Spanish and Portuguese on Universia , the online educational network. Visit the site. Business & Innovation Policy & Politics Pollution & Health Science & Technology Antarctica and the Arctic Central & South America Photographer Robert Wintner documents the exquisite beauty and biodiversity of Cuba’s coral reefs, which are largely intact thanks to stifled coastal development in the communist nation. View the gallery. is now available for mobile devices at e360.yale.edu/mobile The Warriors of Qiugang , a Yale Environment 360 video, chronicles a Chinese village’s fight against a polluting chemical plant. It was nominated for a 2011 Academy Award for Best Documentary Short. Watch the video. Top Image: aerial view of Iceland . © Google & TerraMetrics. A three-part series Tainted Harvest looks at the soil pollution crisis in China, the threat it poses to the food supply, and the complexity of any cleanup. Read the series.</s>
<urn:uuid:157b780f-90bf-4cdc-b077-b3ce3e7aee83>
CC-MAIN-2015-32
http://e360.yale.edu/digest/meteor_strike_in_siberia__rains_down_debris_and_injures_1000_/3769/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.902946
510
3.4375
3
Online petitions and a well-funded legal challenge aside, South Fork local officials who are moving toward large-scale killing of deer, politely called culling, have a difficult time ahead. Leadership is never easy when policy gets mixed up in emotion, and wildlife management is one of the most emotional aspects of government. Few other issues draw as much attention and heat from the public, making the job of deciding how to proceed fraught with tension from the start. But rational, dispassionate policy-making must be foremost in such instances. The key for officials is studying precedents in other communities and what science says. The problems are well understood. A spike in deer populations in the eastern United States has come at the same time as sharp increases in the type and number of disease-carrying ticks. Deer cause huge and nearly unmeasurable damage to landscaping and crops. Those struck by vehicles often meet terrible, painful deaths, which are heart-wrenching for us. Deer have radically altered the forest understory in many places, leading to habitat loss for other native species, such as songbirds and small mammals, and threatening biodiversity. Deer are not the only large animals for which aggressive control measures are being taken. Black bears as nearby as suburban New Jersey have adapted to life close to people and are being targeted by wildlife managers. Time magazine featured a cover story this month about what it called America’s “pest problem.” Expanded hunting and professional harvests have been pursued from Florida to California. Closer to home, Block Island officials recently voted to hire sharpshooters to reduce the deer herd from 800 to 100 individuals, according to low estimates. The target there is to maintain the deer population at 10 to 15 per square mile. No one knows for sure precisely how many deer there are on the South Fork, and their distribution is not in even numbers across the island. The Town of East Hampton’s two surveys came in with widely disparate numbers — 877 in a March aerial study and 3,293 in a 2006 roadside count. Estimates of the density in East Hampton Town are all over the map, but could be as high as 100 per square mile. Though a clearer total should be known before a long-term program is undertaken, by all appearances there are just too many deer. There are few residents who have not at one time or another struck a deer on the road or had someone in the family touched by tick-borne illness. And now there is a rising count of people with a serious and life-threatening allergy to red meat caused by the bite of the lone star tick. Those opposed to hunting claim there is no valid link between deer and ticks, but scientific studies say otherwise. Large, warm-blooded hosts such as deer have been clearly implicated in this regard — one must not overlook that it is the deer tick that carries Lyme disease as well as babesiosis, ehrlichia, and borrelia. True, the rodents that larval ticks first feed on are believed to be the reservoirs for the illness-causing spirochetes, but it is undisputable that concentrations of all tick varieties have soared along with the deer’s numbers. A public health crisis is under way, with deer clearly implicated. Research has demonstrated that maintaining deer at 8 to 12 per square mile essentially eliminates ticks and the diseases in humans. Deer birth control has not proven to be an adequate alternative to hunting. Nor does applying pesticides at feeding stations solve the problems of habitat devastation and deer-vehicle collisions. It is also not acceptable for residents to have to avoid the woods and wild places for fear of ticks in other than the coldest months. Those passionately opposed to the planned killing appear to overlook the fact that the present environment is one in which nature’s balance has been overturned by centuries of human presence. In the case of deer and other highly adaptable wildlife, there still is no substitute for lethal management.</s>
<urn:uuid:72fba1d5-faec-42c7-8434-536de20b3148>
CC-MAIN-2015-32
http://easthamptonstar.com/Editorials/20131224/Taking-Aim-Deer
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.967865
810
2.984375
3
When you're designing an electrical system for a building, don't let elevator requirements bring you down. The many codes and guidelines that regulate the electrical design of an elevator can seem overwhelming, and dealing with the electrical inspector, elevator inspector, and Fire Marshal can be even more intimidating. As they review the plans and the construction site, they may have conflicting interpretations or requirements. And as the designer, you can become the fulcrum on which all of these requirements and authorities exert their leverage, but an understanding of elevator basics can help you handle the pressure. The two main types of elevators are hydraulic and traction. Hydraulic elevators comprise a hydraulic reservoir, pump, cylinder, and controller. The pump sends hydraulic fluid from the reservoir to the cylinder, buried deep below the elevator shaft. Fluid pressure in the cylinder raises and lowers the elevator cab. Limit switches placed throughout the height of the shaft communicate with the controller and stop the cab at each landing. Cylinders in hydraulic elevators usually aren't suitable for buildings taller than five stories. In such cases, it's economically justifiable to specify a traction type elevator. Traction elevators raise and lower the elevator cab with cables, a pulley system, and counter weights powered by a motor at the main drive wheel. Motors for traction elevators were traditionally DC or synchronous, but new installations use AC motors and VFDs for speed control. The elevator equipment room that serves a hydraulic elevator is almost always located on the lowest floor adjacent to the elevator shaft. A traction elevator's equipment room is typically located at the top of the building, directly over or adjacent to the shaft. Your elevator supplier will take care of all the wiring and related code requirements for the elevator cab and the various controls. You'll be responsible for specifying the items related to the fire alarm and some controls, as well as supplying lighting and power to the equipment room and elevator pit. First, you'll need to install lighting in the elevator equipment room (Photo 1) and shaft pit (Photo 2). Luminaires must be lensed or equipped with wire guards to protect the lamps. The light switch for the equipment room must be adjacent to the entrance door on the latch side. The light switch in the pit must be mounted 42 in. above the seal plate, adjacent to the ladder. You need at least one 120VAC GFCI-protected receptacle at each location. The circuit(s) for the lighting and receptacles must be dedicated to the elevator area only. Power for the elevator controller must first enter a lockable safety disconnect device, located adjacent to the door of the equipment room. This device must be either a fused disconnect or a circuit breaker because ANSI/ASME A17.1 requires you to install an additional overcurrent protection device (OCPD) in the elevator equipment room. A separate 120VAC, 15A circuit is required for cab lighting and accessories, and it must have its own local disconnect and OCPD in the equipment room as well. You must run a separate insulated grounding conductor with the feeder conductors from the electrical source to the elevator controller. The conduit alone can't act as the grounding means. Elevator cab lights require emergency back-up power. If the building has emergency power available, use it to supply the cab lights. Otherwise, specify that the elevator supplier provide a battery back-up unit to power the lights in the event of an outage. You'll need to run telephone cables to the equipment room control panel, but the elevator supplier will take care of getting the cables to the elevator cab. The Americans with Disabilities Act Accessibility Guidelines for Buildings and Facilities (ADAAG) now require the cab to have a special phone accessible by individuals with disabilities. In the event of a breakdown, that phone must automatically call a location staffed 24 hours a day. Smoke detectors, which are required in all elevator lobbies and elevator equipment rooms, must be connected to the elevator controllers directly by means of auxiliary contacts and wiring, or indirectly by means of output signals from the fire alarm control panel. If a smoke detector goes into alarm, it signals the elevator to go into “Fire Recall Function,” at which point the controller directs the elevator cab to travel to its pre-programmed designated landing, open its doors, and remain stopped there until the alarm clears. The floor specified as the designated landing, which must be approved by the Fire Marshal, is usually the floor on grade level so passengers can quickly exit to the outside. If the smoke detector at the designated landing goes into alarm, the elevator will stop at a predetermined alternate floor, which is usually the floor above the designated floor. However, this can vary depending on building conditions and exterior grade. Therefore, there will be two signals to the elevator control panel related to smoke detectors: one from the “designated floor” smoke detector and another combined signal from the smoke detectors at the other lobby landings and in the equipment room. Regardless of the number of elevators, only one smoke detector is required at each floor lobby, but it must be located within 21 ft of every elevator door. Be sure to provide a horn/strobe alarm in large equipment rooms because they can be noisy, isolated places. To safeguard the passengers and electrical equipment, ASME A188.8.131.52.3.2 requires the power source to the elevator control panel to shut down prior to the discharge of water from a sprinkler head. Depending on your local codes, you can do this by installing heat or smoke detectors within 24 in. of the sprinkler heads. If a hydraulic elevator loses power because a heat detector goes off — or for any other reason — it could trap occupants for an unpleasant amount of time. To avoid this situation, designers can specify elevator controls with a safety feature commonly called a rescuvator. Upon loss of power, the rescuvator controls the cab, lowers it to the designated floor, and opens its doors. If you specify a rescuvator, you must also specify a disconnect switch with an auxiliary contact that opens when the disconnect arm moves to the open position, but stays closed when the OCPD trips. This switch will ensure that the elevator won't descend into the elevator pit and allow maintenance people to work safely in the area beneath the cab. Where a feeder powers more than one elevator, you need selective coordination; the OCPDs must be series-designed so a fault at one of the elevators will be cleared by only the OCPD serving it. The feeder OCPD needs to remain closed so the remaining elevators have power and continue to function. Modern electronic elevator controls can be sensitive to temperature shifts. Therefore, elevator equipment rooms must maintain a temperature between 50°F and 90°F. This will normally require you to vent the room with a fire/smoke damper and include smoke detector signals in the control logic. If your specifications require a vent at the top of the shaft for venting smoke, you must provide a key switch with a pilot light to control that vent. You must locate this key switch at the main lobby or at the building fire command center. The new ADAAG guidelines now require that emergency power be available to elevators that have four or more stories of travel above or below the accessible floor [4.1.3(9)(1)]. If you provide your elevators with emergency power, you must run communications wires between the automatic transfer switch (ATS) and the elevator control panel. This accomplishes two functions. First, the ATS signals the elevators that it's about to switch over to emergency power — preferably 30 sec or more prior to switching, which allows the elevator controller to bring each elevator cab to the nearest landing and stop, thus protecting the motors and electrical system. Next, with multiple elevator banks, the controller will usually allow only one elevator at a time to operate, reducing the amount of emergency power required. High-rise buildings pose additional concerns. The Uniform Building Code requires two-way communications between the central command center and the elevators, each elevator lobby, emergency power rooms, and by entries into enclosed stairways (Section 403.5.3). Fireman telephone jacks and telephone cabling are typically sufficient for each of these locations. Firefighters can then use portable telephone handsets in combination with the jacks and cabling. The various items to consider and check when designing for elevator installations have many potential pitfalls. But by understanding how these items fit together and what purpose they serve, you can have a successful project. Always verify all conditions and requirements with the state and the AHJ where the installation is taking place. Granle is a licensed professional engineer with Sebesta Blomberg & Associates, Rochester, Minn.</s>
<urn:uuid:83c4fdc0-dc6f-436a-8378-7002ceff8037>
CC-MAIN-2015-32
http://ecmweb.com/content/electrical-ups-and-downs-elevator-design
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.923971
1,799
2.953125
3
- International adoptions from Uganda are rising - The country is not a signatory to the treaty offering a blueprint for international adoptions - One rights worker says many vulnerable children are at risk - Others say international adoptions give the children a better life Uganda is one of the poorest countries on earth with an economy based on agriculture but there is one industry that's booming -- international child adoptions. Extreme poverty combined with one of the world's highest birth rates is creating a pressure cooker where many children are abandoned or put up for adoption. And there are also fears that as the adoption numbers grow more needs to be done to prevent children being exploited. Children -- sometimes orphans, sometimes just with parents unable to care for them -- find themselves taken into Uganda's child welfare system. For some this can mean foster care or a temporary home. For others it is the first step on a road that will lead to adoption and a new life. While traditional adoption hotspots are becoming less attractive -- Russia has banned Americans from adopting children, and it can take years to navigate China's adoption bureaucracy -- Uganda is seen as a quick and easy alternative for prospective parents. In Uganda, the adoption process can take just a few months to complete. The country is not a signatory to the Hague Convention, a treaty which provides a blueprint for safe international adoptions. Many of the children adopted from Uganda are given a better shot at life overseas - certainly in material terms -- but the speed and ease of the process has many observers worried. Freda Luzinda worked at the U.S. Embassy in Kampala, Uganda, for two years processing adoption visas. She is now the Uganda national director of the A Child's Voice, an NGO promoting child rights and welfare. She says that many birth parents in Uganda don't fully understand what adoption actually means and that there is no word for 'adoption' in the local Luganda language. "I can say that about 60% of the birth parents that I spoke to didn't understand adoption," said Luzinda. Many birth parents do not understand that adoption is permanent. They believe they may get their children back later. These misconceptions are part of the problem, but not the only problem. The rise in Ugandan adoptions over the past few years has created a growing number of orphanages and adoption agencies to meet the demand. "When I first started processing visas at the embassy... there were probably between seven and 10 orphanages that were putting children up for adoption. And the numbers grew, and they grew, and they grew. By the time I finished, and this was two years later, we had a count, and we were dealing with about 100 orphanages." said Luzinda. The explosive growth of the adoption industry in Uganda has fueled fears that children are being exploited for profit and that the best interests of the child is not paramount. "Orphan creation does happen a lot in Uganda, and this is done by adoption facilitators who will go and scout the slums, find vulnerable families and talk them into giving up their children," said Luzinda. In the 12 years from 1999-2010 there were just 311 adoptions from Uganda to the U.S. In 2011 alone -- the last year for which State Department numbers are available -- 207 children were adopted to the U.S. from Uganda. Brothers Zach, age about 4 and Philip, about a year older, have found a loving family in the U.S. but their early life was typical of Uganda's estimated 2.4 million orphans. Both boys were found abandoned in different places in Kampala, both were left in conspicuous places and both were found by police officers. Now Zach and Philip have a new life in the U.S., both are in school and having loving new parents. In 2008, they were adopted by Lisa and Tague Harding of Minnesota through the Amani Baby Cottage, one of the respected, religiously-affiliated orphanages. "There is always a tragedy at the beginning of a story that makes adoption a necessary step," said Lisa. As their children grew up and left home, the Hardings saw an opportunity to provide a stable home for children who would otherwise grow up in poverty. The Hardings became interested in international adoption after traveling to Uganda with a church group. "I love that in our faith, adoption is part of the story -- that Baby Moses was adopted and there was Samuel in the Bible that was adopted and baby Jesus. Joseph was not his birth father." said Lisa. Danyne Randolph Bharj, director of the Amani Baby Cottage, understands the fears concerning the exploitation of children, but says that given the options for Ugandan children, in many cases adoption is the best solution. "I don't think it's right to say the West is the way to save Uganda at all. I don't think that's the answer. But I think if there's people in the West that can give these children a family when no one else can, I do think it's more important," said Bharj. But James Kabogoza, assistant commissioner of Children's Affairs for the Ugandan Government, feels that Ugandan children should stay in Uganda. "It's not right what they are doing. I know for them they get something out of it, but it's also wrong to defraud parents and Ugandans of their children," he said. Kabogoza's fear is that by leaving Uganda, many of these orphans will lose sight of their cultural identity. He also believes that regardless of the circumstances, many of these children would be better off with their birth parents. "That is the biggest thing that ever happens to a child. If the child remains with the family, they are able to grow up with them,"said Kabogoza. He added: " know they feel what is done in America and what is proper in America is a better life. But you could provide that better life to the child here, within the family ... You can change the life of that child within the family here, if you support them." Zach and Philip' adopted father, Tague Harding, understands that his sons will lose some of their cultural heritage by growing up in the United States, but he also sees the advantages. "It's better that Ugandan orphans stay in Uganda as much as possible but perhaps by us bringing two boys home or other people bringing Ugandan children back internationally, we can raise awareness to say, there is a need."</s>
<urn:uuid:595df0a2-2954-4822-9e67-9dc134d24a71>
CC-MAIN-2015-32
http://edition.cnn.com/2013/02/27/world/africa/wus-uganda-adoptions/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.977076
1,350
2.625
3
About one-third of Patriot soldiers at the Battle of Bunker Hill were African Americans. Census data also reveal that there were slaves and free Blacks living in the North in 1790 and later years. What were the experiences of African-American individuals in the North in the years between the American Revolution and the Civil War? In this lesson, students reflect on the Holocaust from the point of view of those who actively resisted Nazi persecution. Weigh the choices faced by those for whom resistance seemed both futile and the essence of survival. In the spring of 1948 Stalin provoked the first serious international crisis of the Cold War by announcing a blockade of West Berlin. This lesson will trace the Berlin blockade and airlift of 1948–49 and the establishment of NATO.</s>
<urn:uuid:b6d09d5e-5c3c-4f29-9454-d50faefd91c3>
CC-MAIN-2015-32
http://edsitement.neh.gov/calendar/2013-11-09/american-civil-war-terrible-swift-sword
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.963935
150
3.703125
4
Culture and tradition The Kreetassan race were particularly concerned with proper etiquette, courtesy and adherence to certain, sometimes complex social codes. As a result, they came to have a reputation for being easily offended, and a number of such offenses occurred during their problematic early encounters with Humans. The Kreetassans considered eating a taboo to be performed privately in the same manner as mating. In fact, in the Kreetassan language, which was very complex by Human standards, the words "eat" and "mate" were very similar. Thus they were offended when, circa 2151, they saw the crew of Enterprise eating their food in public, which caused them to storm off the ship in rage. Their anger was alleviated, however, when Travis Mayweather apologized on behalf of the entire crew and assured them that no insult was intended. (ENT: "Vox Sola") In front of the Kreetassan Hall of Diplomacy stood a row of Alvera trees that, by 2152, were over 300 years old, and which were considered cultural treasures by the Kreetassans. Defacing them in any way was a major offense to their people; however, if it was done accidentally, there was a special, elaborate apologizing ceremony that involved cutting the tree into many pieces. Kreetassans were a humanoid race who had an elaborate facial structure. They had heavily-ridged faces with a row of purple-tinged rectangular scutes along the midline of the forehead (nose to hairline), covering one-third of its width. They wore their hair long and in braids and dressed in long, brown, embellished gowns. During the Kreetassan's visit to Enterprise, a fibrous, web-like organism, accidentally removed from its homeworld during their research, was transferred to Enterprise and took over a cargo bay. (ENT: "Vox Sola") Kreetassans were famous for manufacturing plasma injectors, and they were one of the few races in their particular vicinity that did. In late 2152, Enterprise visited Kreetassa to make up for the political mishap a year earlier. They were invited down to the Hall of Diplomacy, and after sending the Kreetassans their genome, Captain Archer, Hoshi Sato, T'Pol, and Porthos (the Captain's dog) went down to the planet. After the initial meetings went well, the Kreetassans were shocked and sent them back to Enterprise, for reasons the Enterprise crew couldn't comprehend. After asking what had happened, T'Pol informed him that Porthos had urinated on one of the sacred Alvera trees. To apologize to the head of the Kreetassan government, they asked that Archer perform a ritual. Down in the Hall of Diplomacy, in a ringed arena, he would have to cut the tree's trunk on a special base with a chainsaw, and arrange the 5 cm thick rings in a special pattern (pictured right). Throughout the whole ceremony, he would wear beads in a special pattern in his hair and have Kreetassan markings on his chest in red ink. At the conclusion, he had to say a message in the Kreetassan language. After the ceremony, the Kreetassans happily gave them the plasma injector they needed, and also an additional two spares. (ENT: "A Night in Sickbay") A Kreetassan merchant also recommended Tessic's mining colony as a source for deuterium. (ENT: "Marauders") List of Kreetassans - See: Kreetassans</s>
<urn:uuid:a3ea72a3-1f2f-41d2-b5a0-3f55062fd283>
CC-MAIN-2015-32
http://en.memory-alpha.wikia.com/wiki/Kreetassan?oldid=1226656
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.985345
753
2.609375
3
How long did the limits last? By Dr. Robert Owens In 1798, a mere ten years after the ratification of the Constitution war with France seemed imminent. In reaction to opposition regarding the policies of the government John Adams, hero of the Revolution, co–author of the Declaration of Independence, one of the Framers of the Constitution, and only the second President of the United States Congress passed the Alien and Sedition Acts. Congress eventually passed four of these laws in an effort to strengthen the Federal government against internal dissent. The former supporters of the Constitution, now known as Federalists sponsored the legislation meant to silence political opposition which was coming mainly from the Democratic Republicans and their leader Thomas Jefferson. First Congress passed the Naturalization Act which required people to be residents of the United States for fourteen years instead of five years before becoming eligible for U.S. citizenship. Then they passed the Alien Act which authorized the President to deport aliens who the government determined to be dangerous or a threat to the peace and/or safety of the United States. It must be remembered that while many believed America was under a threat of war this law was passed and enforced during peacetime. Seeking to extend the power of the central government even further Congress next passed the Alien Enemies Act. This third act allowed the arrest, imprisonment, and deportation of aliens who were from to an enemy country. Finally Congress added the Sedition Act, aimed at any action deemed by the government to be treason. This included the publication of any material judged to be false, scandalous, or malicious. No matter what the Bill of Rights said the government declared these activities to be a severe misdemeanor that was punishable by both fine and imprisonment. Under these bills twenty-five men, including numerous editors of newspapers, were arrested. In addition, their newspapers were shut down. The net of suspicion was spread so far that it included Benjamin Franklin Bache, Benjamin Franklin's grandson who was the editor of a Philadelphia newspaper. He was charged with libeling President Adams. This arrest elicited a mounting public reaction against all four of the Alien and Sedition Acts. Many Americans questioned the constitutionality of these laws. Indeed, public opposition to the Alien and Sedition Acts was so great that they were in part responsible for the election of Thomas Jefferson, a Republican, to the presidency in 1800. Once in office, Jefferson pardoned all those convicted under the Sedition Act, while Congress restored all fines paid with interest. The unpopularity and questionable legality of these acts led to Adams being the first one-term president. And these actions by one of the foremost Framers and most vocal supporters during the ratification process used these oppressive laws to silence opposition. Here at the very beginning of the Constitutional republic one of the architects of the document believed it gave him and Congress the power to silence the people when the people disagreed. Jefferson and his Democratic Republicans defeated Adams' bid for a second term by capitalizing on the public's disgust at what were perceived to be unconstitutional and repressive actions by the very people who wrote and led the fight for the adoption of the constitution. Now those who portrayed themselves as the protectors of liberty would make sure that the limits placed upon the Federal Government were strictly observed. In 1803, during their long wars with England and in need of financial relief France offered to sell Louisiana to the United States. This caused a novel situation and became the cause of a grave constitutional question and a major problem for President Thomas Jefferson and his ruling party. Seeing the opportunity to double the size of the United States, President Jefferson immediately wanted to purchase the territory. This was rather surprising in that Jefferson advocated a narrow or strict interpretation of the Constitution. And no matter how you read the document nowhere in it does it authorize the President or even the Congress to buy additional territory. Not debating this point, not disputing this limitation but at the same time feeling the need to act quickly, and believing there was not time for the amendment process to legally change the Constitution. This being the case, President Jefferson and his Democratic-Republicans merely passed legislation giving the President permission to sign a treaty obligating the United States to pay the money and to take possession of Louisiana. In addition, the Democratic-Republicans also appropriated the money to pay France for the territory. Where did Democratic-Republicans in Congress believe they acquired the authority to do this? They claimed to act under the provision of the Constitution (Article 5, Section 3) which gave Congress the power to regulate the territories. The third President and a compliant Congress interpreted the Constitution to do what they wanted to do even though it violated their own previously stated position. As a third and final example of how soon the limited government promised by the Framers of the constitution began to encroach upon the liberty it was meant to preserve let us look at the Monroe Doctrine. During the presidency of James Monroe's there occurred several revolutions against Spanish rule in South and Central America. The United States quickly recognized these newly established countries. Believing there was a strong possibility that European governments would intervene and try to reassert their control over the former colonies; President Monroe declared the doctrine in 1823. This doctrine declared that from that time forward America saw itself as the dominant power in the Western Hemisphere. It also warned that European interference in the Americas would not be allowed. The Doctrine consists of three principles: 1. The United States would remain neutral in European wars unless American interests were involved 2. Both North and South America were no longer subject to colonization by European powers. 3. The United States would consider any and all attempt at European colonization in the New World as an "unfriendly act." And although the United States did not have the military power to enforce these claims, the declaration had symbolic importance: announcing the United States' posture as the power to be reckoned with in the New World. Monroe's Doctrine aggressively asserted the position of dominance claimed by the United States in the Americas, and it has been a cornerstone of American foreign policy ever since. An interesting point that is little mentioned or considered is that this doctrine (and every doctrine proclaimed since) is not law but merely a declaration of a presidential policy. It is this fact that persuaded Monroe that as President he was authorized without any Constitutional authorization, to establish a foreign policy that commits the United States to military action without a declaration of war by Congress. Thus following in the footsteps of the second and the third our fifth president moved well beyond the limits the Constitution had imposed. How long did the limits last? The Anti-Federalists were still active in politics as the warnings they gave were realized and the children of the Revolution took their first steps down the road to tyranny. These earliest assaults upon limits were followed by: Jackson used the spoils system to pack the federal bureaucracy with his supporters. Jackson advocated the removal of all Native Americans across the Mississippi in violation of numerous treaties passing the Indian Removal Act. When the Supreme Court ruled that Georgia's expropriation and removal of the Cherokee was unconstitutional, referring to the Chief Justice Jackson said, "John Marshall has made his decision, now let him enforce it." He then used the standing army the anti-federalists had warned against to complete the deportation acting as ruthlessly and as arrogantly as any Babylonian king. Lincoln decided that States which had voluntarily joined could not leave though this is stated nowhere in the Constitution. Teddy Roosevelt ran rough shod over Latin America with his gunboat diplomacy. He provoked a revolution in Columbia, established Panama as a near colony, seized the Canal Zone, and in many ways used his big stick like a cudgel to establish and maintain an American Empire from Asia to the Dominican Republic in contravention to the advice of Washington and the words of the Constitution. Wilson rounded up and interred Italians and Germans during WWI, took over mines and factories, fixed prices, took over the transportation and communications networks, and strictly managed the production and distribution of food. FDR stretched the Constitution in so many ways it never snapped back. Since our first President for life established the bloated federal bureaucracy and its symbiotic military-industrial complex we have seen a succession of undeclared wars for peace, the welfare state, the Patriot Act, and preemptive war become emblems of a system that practice government of Washington, by Washington, and for Washington. Congress has declared war on only five occasions: the War of 1812; the Mexican War; the Spanish-American War, World War I, and World War II. However, this has not been the extent of our involvement in armed conflict. When American citizens have challenged the constitutionality of these wars without a declaration Federal Courts have ruled a declaration is not required. Ask yourself: How long did the limits last? Where did the limits go? How many limits are left? Which leads to the ultimate question: How can we get the limits back? Keep the faith. Keep the peace. We shall overcome. Dr. Robert Owens teaches History, Political Science, and Religion for Southside Virginia Community College. He is the author of the History of the Future @ http://drrobertowens.com View the trailer for Dr. Owens' latest book at http://www.youtube.com/watch?v=_ypkoS0gGn8. Follow Dr. Robert Owens on Facebook. © 2011 Robert R. Owens</s>
<urn:uuid:a89e7f99-5745-4377-b420-8d026b778802>
CC-MAIN-2015-32
http://enterstageright.com/archive/articles/0211/0211limits.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.969351
1,910
3.890625
4
The Eritrean-Ethiopian War was a border conflict that took place from May 1998 to June 2000. On May 8, a platoon of Eritreans soldier deployed into Badme region. Fighting escalated to artillery and tank fire leading to four weeks of intense fighting. Ground troops fought on three fronts. Eritrea claims Ethiopia launched air strikes against Eritrea’s capital Asmara while Ethiopia accused Eritrea of striking first. The fighting led to huge internal displacement in both countries as civilians fled the war zone. The conflict ended in stalemate and deployment of UNMEE Following independence, the two neighbours disagreed over currency and trade issues, and both laid claim to several border regions including Badme, Tsorona-Zalambessa, and Bure. Nevertheless, since the two governments were close allies they agreed to set up a commission to look into their common border and disputed places. Since early 1991 they had agreed to set up a commission to look into each others’ claims. Of particular issue was the border through the Badme Plain. As a result of the Treaty of 1902 the Badme Plain is bisected by the border which runs in a straight line between the Gash and Setit (Tekezé) Rivers. The development of the war: On 6 May 1998, a few Eritrean soldiers entered the Badme region, a borderline zone, along the border of Eritrea and Ethiopia’s northern Tigray Region, resulting in a fire fight between the Eritrean soldiers and the Tigrayan militia and security police they encountered. The evidence illustrated that, at about 5:30 a.m. on May 12, 1998, Eritrean armed forces, consisted of at least two brigades of regular soldiers, supported by tanks and artillery, attacked the town of Badme and other border areas in Ethiopia’s Tahtay Adiabo Wereda, as well as at least two places in its neighboring Laelay Adiabo Wereda. On that day and in the days instantly following, Eritrean armed forces then pushed across the flat Badme plain to higher ground in the east. Although the evidence regarding the nature of Ethiopian armed forces in the area conflicted, the weight of the evidence indicated that the Ethiopian defenders were composed merely of militia and some police, who were swiftly forced to move back by the invading Eritrean forces. Given the absence of an armed attack against Eritrea, the attack that began on May 12 cannot be justified as lawful self-defense under the UN Charter. The areas initially invaded by Eritrean forces on that day were all either within undisputed Ethiopian territory or within territory that was quietly administered by Ethiopia and that later would be on the Ethiopian side of the line to which Ethiopian armed forces were compelled to withdraw in 2000 under the Cease-Fire Agreement of June 18, 2000. On May 13, 1998 Ethiopia, in what Eritrean radio described as a “total war” policy, mobilized its forces for a full assault against Eritrea. The Claims Commission established that this was in essence an pronouncement of the existence of a state of war between belligerents not a declaration of war and that Ethiopia also notified the United Nations Security Council, as required under Article 51 of the UN Charter. The fighting rapidly escalated to exchanges of artillery and tank fire leading to four weeks of intense fighting. Ground troops fought on three fronts. On 5 June 1998, the Ethiopians launched air attacks on the airport in Asmara and the Eritreans retaliate by attacking the Ethiopian town of Mekele. These raids caused civilian casualties and deaths on both sides of the border. There was then a quiet period as both sides mobilized huge forces along their common border and dug extensive trenches. Both countries used up several hundred million dollars on new military equipment. This was despite the peace mediation efforts by the Organization of African Unity (OAU) and the US/Rwanda peace plan that was in the works. The US/Rwanda was a four point peace plan that called for withdrawal of both forces to pre-June 1998 positions. Eritrea rejected and instead demanded for demilitarization of all disputed areas along the common border overseen by a neutral monitoring force and direct talks. With Eritrea’s refusal to accept the US/Rwanda peace plan, on 22 February 1999, Ethiopia launched a huge military offensive to bring back Badme. Tension had been elevated since February 6, 1999, When Ethiopia claimed that Eritrea had violated the moratorium on air raids by bombing Adigrat, a claim it later withdrew. Following the first five days of military set back at Badme, by which time Ethiopia broken through Eritrea’s fortified front and was 10 kilometers (six miles) deep into Eritrean territory, Eritrea accepted the OAU peace plan on 27 February 1999. Ethiopia did not at once stop its advance because it demanded that peace talks be contingent on an Eritrean withdrawal from territory occupied since the first outbreak of fighting. Ethiopia commenced an offensive that broke through the Eritrean lines between Shambuko and Mendefera, crossed the Mareb River, and cut the road between Barentu and Mendefera, the main supply line for Eritrean troops on the western front of the fighting. By May 2000, Ethiopia occupied about a quarter of Eritrea’s territory, displacing 650,000 people and wiping out key components of Eritrea’s infrastructure. The Eritreans withdrawn from the disputed border town of Zalambessa and other disputed areas on the central front saying it was a ‘tactical retreat’ to take away one of Ethiopia’s last remaining excuses for continuing the war. Having recaptured the most of the contested territories — and heard that Eritrean government in accordance with a request from the Organisation of African Unity would withdraw from any other territories it occupied at the start of fighting — on 25 May 2000, Ethiopia affirmed the war was over. Results of the war: Eritrea claimed that 19,000 Eritrean soldiers were killed during the clash, while the number of Ethiopian soldiers dead is most likely around 50,000 as the total war casualties from both countries is reported worldwide as being around 70,000. All these figures have been contested and other news reports simply state that “tens of thousands” or “as many as 100,000″ were killed in the war. The fighting led to massive internal displacement in both countries as civilians fled the war zone. Ethiopia expelled 77,000 Eritreans and Ethiopians of Eritrean origin it believed to be security risk, hence compounding Eritrea’s refugee problem. Many of the 77,000 Eritrean and Ethiopians of Eritrean origins were considered well off by the standard of Ethiopian standard living and deporteeing them all after confiscating their belonging was a cruel act of human rights violations. The economies of these countries were already weak as a result of decades of cold war politics, civil war and drought. The war intensified these problems, resulting in food shortages. Before the war, much of Eritrea’s trade was with Ethiopia, and much of Ethiopia’s foreign trade relied on Eritrean roads and ports. Keywords: Eritrea, Ethiopia, UNMEE, Badme region, Tsorona, Zalambessa, Bure, Gash, Setit, Tigrayan militia, Tahtay Adiabo Wereda, Laelay Adiabo Wereda, Mekele, OAU, Adigrat, Shambuko, Mendefera, Mareb River, Barentu,</s>
<urn:uuid:d30687a3-4b62-497b-8fe3-0a1edfb616ed>
CC-MAIN-2015-32
http://ethiopiamilitary.com/ethio-eritrean-war/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.962812
1,605
2.96875
3
The International Phonetic Alphabet is based on the Latin alphabet A-Z, with a lot of extensions. There are extensions like “Latin script a” ɑ, like “Latin epsilon” ɛ, like “Latin gamma” ɣ, like “Latin eng” ŋ, like “Latin phi” ɸ, and so on. Notice the following: - Latin ɛ is fairly similar to Greek ε, though its capital is Ɛ and the Greek’s is Ε. - Latin ɣ is rather different to to Greek γ being symmetrical with a loop; its capital is Ɣ and the Greek’s is Γ. - Latin ɸ is distinctly different from Greek φ, having strong serifs in its ascender and descender; it has no capital and the Greek’s capital is Φ. And this is fine. These Latin letters were “disunified” from Greek a long time ago, and the UCS contains all of them as uniquely encoded characters. Three letters, however, were not disunified, and are problematic. - U+03B2 ( β ) GREEK SMALL LETTER BETA - U+03B8 ( θ ) GREEK SMALL LETTER THETA - U+03C7 ( χ ) GREEK SMALL LETTER CHI Now the first and third of these do have non-Greek shapes, just as Latin phi does. Here’s an example from Daniel Jones’ Outline of English Phonetics (1932)—click on the image to see it larger if you like: Now, the serifs on that beta’s descender are very atypical indeed in Greek typography. Moreover, the fact that the letter is unified with Greek can cause some troubles in sorting multilingual data, since oin a typical English or German or French sort (for instance) the Latin alphabet sorts first, then the Greek alphabet, then the Cyrillic, and then others. In practice this means that β does not sort after b (where one might expect it), but after z. The IPA chi can also differ from the typical Greek chi. In the 1949 Handbook of the IPA, the serifs on the letter are on the top-right to bottom-left branch of the x; the other branch is curved. A point to remember is that the intent of the IPA chi was originally not that it was unified with Greek chi, but rather that it was different: The non-roman letters of the International Phonetic Alphabet have been designed as far as possible to harmonise well with the roman letters. The Association does not recognise makeshift letters; it recognises only letters which have been carefully cut so as to be in harmony with the other letters, For instance, the Greek letters included in the International Phonetic Alphabet are cut in roman adaptations. Let’s compare capital and small Latin Xx, Greek Χχ, and that IPA chi. Now it’s possible that because Greek fonts have been in use for a good while that some people might prefer a greekish glyph to a latinish glyph. Nevertheless, take note of the weight of that older IPA chi, and compare it to the “stretched x” shape. But in fact there’s another reason to encode a Latin chi. Lepsius made use of it in his transcription of Chukchi, and there its capital is entirely different from the capital used in Greek. Now, there is precedent for just this kind of thing being a reason to disunify: Cyrillic Ԛ and ԛ (used in Kurdish) were disunified from Latin Q and q because the capital Cyrillic one sometimes looks like an oversized small one. So, what it looks like is that we have the following—Latin x, Greek chi, and Latin chi (both greekish and latinish glyphs are shown): Let’s assume that LATIN LETTER CHI and LATIN LETTER BETA get encoded (leaving aside the question of THETA for now). Now the big question for the IPA is, what should be done when they are? The current recommendation is “use GREEK LETTER CHI”, but of course there’s no alternative. When there is… well, I for one would prefer a Latin letter that sorts between x and y, rather than a Greek letter that sorts between φ and ψ. There is certainly data out there using the Greek letters β and χ and θ. Of course, there is also data out there using non-Unicode fonts, or SAMPA, or other things. In my opinion, the right thing to do is bite the bullet, get Latin beta, chi, and theta encoded, and get the recommediations promulgated through fonts and keyboard drivers. But I do not know what the view of the International Phonetic Association might be. Here is an example of some functionality related to this. I created a number of folders named “a_la”, where the “_” is replaced by various letters. It’s easy to see that in the Mac OS, Latin letters sort before Greek. Thorn þ sorts correctly after z. Eth ð after d. IPA ɡ after g, followed by IPA gamma ɣ. Small capital ɪ and Latin iota ɩ follow i, as expected. Then, after þ, we see that the Greek alphabet appears in its correct order. But I am sure that I want IPA beta to sort after b, not after þ, and likewise IPA chi after x. I am torn between wanting IPA theta to sort after t or after þ, but probably the former. Anyway, I want a disunification of these three IPA letters from Greek.</s>
<urn:uuid:34420414-3681-4fed-9fb2-1343b80c229b>
CC-MAIN-2015-32
http://evertype.com/blog/blog/category/unicode/
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.94827
1,257
3.421875
3
Grab and hold the attention of kids with a series of multicultural genealogical activities developed for use in the classroom, but useful for kids in any setting. The material in this lecture is based on the presenter’s experience teaching school-age children about family and local history. Maureen Taylor is an internationally recognized expert on the intersection of history, genealogy, and photography. She has been featured in top media outlets, including The View, Better Homes & Gardens, the Boston Globe, Martha Stewart Living, MSNBC, DIY: Scrapbooking, PBS Ancestors, Creative Memories' Lasting Moments, Dear Myrtle, and Satisfaction Magazine. Maureen is the author of a number of books and magazine articles, as well as a contributing editor at Family Tree Magazine. The Wall Street Journal calls Maureen “the nation’s foremost historical photo detective.” Before she was the Photo Detective, Maureen was known for her expertise researching families in her home state of Rhode Island. Sign up for Maureen’s free e-newsletter at www.MaureenTaylor.com Ask Maureen – www.AskMaureenTaylor.com Maureen’s bookstore: http://www.maureentaylor.com/publications/</s>
<urn:uuid:50a6687b-b744-4ecb-929c-139f6ee52957>
CC-MAIN-2015-32
http://familytreewebinars.com/download.php?webinar_id=118
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
en
0.919824
259
3.140625
3
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
26