text
stringlengths 196
593k
| id
stringlengths 47
47
| dump
stringclasses 1
value | url
stringlengths 14
1k
| file_path
stringlengths 139
140
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 41
127k
| score
float64 2.52
5.09
| int_score
int64 3
5
|
|---|---|---|---|---|---|---|---|---|---|
Project Helps Fight the Life-Threatening Disease
By Karen Angelo
Building on the success of the childhood asthma prevention program, the University’s Healthy Homes Program is now targeting senior citizens who live in Lowell public housing.
Studies show that asthma-related morbidity and mortality among the elderly is increasing.
“The city of Lowell is ideal for our study since the prevalence of asthma among adults is 10.4 percent, higher than the state average of 8.1 percent,” says Research Prof. David Turcotte of the Department of Economics and director of the Lowell Healthy Homes program, which is operated through UMass Lowell’s Center for Community Research and Engagement. “Seniors spend 90 percent of their time in their homes, breathing in dust mites, mold and toxic cleaning solutions that can trigger asthma attacks.”
The study will measure the effectiveness of interventions such as educational materials, mattress and pillow covers, green cleaning supplies, HEPA vacuum cleaners and pest control items to improve health and reduce medical costs for the elderly living in Lowell public housing. The work is being funded by a $750,000 grant from the U.S. Department of Housing and Urban Development that will be managed by UMass Lowell.
The researchers will collect health data – symptoms, medication use, emergency room visits – on approximately 90 senior citizens with asthma or chronic obstructive pulmonary disease before any interventions. After conducting a home environmental assessment that includes testing dust samples, measuring nitrogen dioxide and evaluating cigarette smoke exposure, the research team will recommend improvements to residents. After one year, the team will evaluate the impact of the interventions on indoor air quality, asthma triggers, respiratory health and quality of life.
“Since there is very little research on how in-home asthma interventions could help elders, this study will document the effectiveness of a multi-faceted approach to prevent asthma-related deaths and sickness among this vulnerable population,” says Turcotte.
To carry out the study, UMass Lowell researchers – led by Turcotte and Work Environment Prof. Susan Woskie – are partnering with the Lowell Housing Authority and the Lowell Community Health Center, which provide access to low- to moderate-income public housing residents who are senior citizens.
Past Project Showed Significant Improvements for Children
This program builds upon previous research conducted by UMass Lowell researchers on asthmatic children living in Lowell public housing. The results of that research showed a dramatic improvement in the health and well-being of the children. Asthma attacks decreased by 76 percent, hospital emergency room visits decreased by 79 percent and the physical and emotional health of the children improved substantially.</s>
|
<urn:uuid:f11e5b3b-1148-4d25-b229-cc64fbf62419>
|
CC-MAIN-2015-32
|
http://[email protected]/News/stories/2014/AsthmaElderly.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.936046
| 541
| 2.515625
| 3
|
Calorie counters and fitness trackers aren't the only way smartphones can keep track of your health. Researchers at Cornell University in New York are currently developing an app and accessory called SmartCARD, short for Smartphone Cholesterol Application for Rapid Diagnostics, that can measure your cholesterol.
David Erickson, a professor of mechanical engineering at Cornell, said that smartphones were a natural fit for a cholesterol tracking device. "Everyone already carries a smartphone, and that gives you an incredible amount of hardware and computational power in your pocket all the time," he told ABC News. "It's silly not to take advantage of it."
The SmartCARD system clamps over the smartphone's camera. Just like a standard detector, the person pricks his or her finger and dabs a drop of blood onto a test strip. The strip is fed into a holding slot on the system, and the smartphone snaps a photo of the blood sample for analysis.
Erickson sees the app as giving its users some piece of mind. "The real advantage of things like smartphone-based diagnostics is that it gives feedback when people want it," he said. "It has all the other smartphone features built into it, like tracking cholesterol over time and being able to take notes."
Sri Krishna Madan Mohan, a cardiologist at the University Hospital Case Medical Center in Ohio, said that while he's generally an app-happy guy, he doesn't see much value in SmartCARD. "Unlike something like sugar levels or blood thickness, [cholesterol] isn't something that fluctuates from minute to minute, or even from month to month," he said. "If I start treating you, I'd recheck [your cholesterol] in three months to see if the treatment had any effect."
One of the other problems is that the accessory does not distinguish between HDL and LDL, or good and bad cholesterol. "If I have a cholesterol level of 200, it could be 180 good and 20 bad, or 180 bad and 20 good," said Mohan. "It's important to measure the levels of each type of cholesterol."
Mohan said, however, that SmartCARD's principles could be used to measure other vitals. "When you come in for a visit, I want to screen you not just for cholesterol but for sugar, vitamins, this and that," he said. "It would be useful if this device were able to track four of these things at once."
Erickson's research is published in the most recent issue of the journal Lab on a Chip.</s>
|
<urn:uuid:8f0d1f18-23dd-4fd0-87ae-7d9f74b13120>
|
CC-MAIN-2015-32
|
http://abcnews.go.com/Technology/curious-cholesterol-smartphone-accessory/story?id=21267462
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.968466
| 524
| 2.625
| 3
|
African Origins contains information about the migration histories of Africans forcibly carried on slave ships into the Atlantic. Using the personal details of 91,491 Africans liberated by International Courts of Mixed Commission and British Vice Admiralty Courts, this resource makes possible new geographic, ethnic, and linguistic data on peoples captured in Africa and pulled into the slave trade. Through contributions to this website by Africans, members of the African Diaspora, and others, we hope to set in motion the rediscovery of the backgrounds of the millions of Africans captured and sold into slavery during suppression of transatlantic slave trading in the 19th century.
To begin searching these records of liberated Africans, try the Guided Search below. Enter an African name that you know (such as Quarko, Kwesi, or Fatima) and select a country (or countries), then click Explore. Checking either the male or female box will filter your search.</s>
|
<urn:uuid:40c628e4-4b5c-49e3-b7d1-f12c236ba079>
|
CC-MAIN-2015-32
|
http://african-origins.org/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.911444
| 182
| 3.234375
| 3
|
- Magnetic Attraction – Demystify the magic of magnets as students explore the sizes, shapes and strengths of magnets and test materials using magnetometer. Grades K-3
- Mr. Stuffee -Do your students have the guts to learn about human organs, respiratory and circulatory systems while observing replicas of instestines, lungs, and more. Grades K-3
- SLGP Matters – Scientific senses matter as students collect facts about solids, liquids, gases, and plasma, how they change from one state to another and how they relate to everday life. Grades K-3
- Science of Circuits – Electricity is in the air as students create series and parallel circuits to test materials for conductive and insulative properties. Grades 4-6
- Sweet Heat – Insulative properties of various materials are investigated while teams compete to see who can keep it hot or lose their spot. Grades 4-6
- Scavenger Hunt – Search each exhibit area in the museum for clues to the answers for this pictorial scavenger hunt.
- Videos – Our video library has a variety of energy and science topics. Please ask when you register your group about the titles that best fit your needs.
Please feel free to contact us for more information.</s>
|
<urn:uuid:01a5cd89-511a-4007-aa39-bab2920fb5b6>
|
CC-MAIN-2015-32
|
http://amse.org/educators/educational-programs/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.90329
| 263
| 3.9375
| 4
|
The Computer History Museum has made available the source code for the 1.0.1 version of Photoshop, as noticed by Slashdot. The image editing application is a staple of professional and amateur artists alike, and its ubiquity has led its name to be generalized in the same way as "kleenex," "xerox," and "google"—to edit an image is to "photoshop" it.
Though this early build of Photoshop lacks a lot of features present in the current Creative Suite version, it was still a powerful graphical editing utility when released back in 1990. Photoshop 1.0 was exclusively a Macintosh application, and the code is representative of the typical Mac coding tools of the era—it's a mixture of about 75 percent Pascal and 15 percent Motorola 68000 assembly language, with the rest of the code composed of data files.
Altogether, there are about 185,000 lines of code in 179 files. The code isn't quite complete, though, since it's missing the MacApp framework (which can't be included because it would have to be licensed from Apple).
The linked Computer History Museum page contains some commentary on the code from Grady Booch, chief scientist for Software Engineering at IBM Research Almaden:
Architecturally, this is a very well-structured system. There’s a consistent separation of interface and abstraction, and the design decisions made to componentize those abstractions – with generally one major type for each combination of interface and implementation — were easy to follow....
There are only a few comments in the version 1.0 source code, most of which are associated with assembly language snippets. That said, the lack of comments is simply not an issue. This code is so literate, so easy to read, that comments might even have gotten in the way....This is the kind of code I aspire to write.
Booch notes the code even contains easily identifiable references to Macintosh software architect Andy Hertzfeld's Thunderscan device, a clip-in scan head that could transform a dot matrix printer into an inexpensive (but slow) grayscale scanner.
Though Pascal and 68000 assembly aren't the modern coding tools of choice, there's tremendous value to be gained in studying beautiful code (see this Doom 3 source code critique for a more contemporary example). Lessons in structuring a program tend to transcend languages, and being able to define and solve computing problems in discrete, understandable steps with a minimum of cruft or kludging is something every developer should strive for.
Listing image by Computer History Museum</s>
|
<urn:uuid:b33183b1-9ff1-4217-96fc-fbb4b30ceeab>
|
CC-MAIN-2015-32
|
http://arstechnica.com/information-technology/2013/02/step-back-in-time-with-the-elegant-source-code-for-photoshop-1-0/?comments=1&post=23881513
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.951036
| 523
| 2.734375
| 3
|
Q: Is it true that the stained glass windows in many old cathedrals are thicker at the bottom because the glass has flowed over the centuries?
A: No, said materials scientist Edgar Dutra Zanotto of the Federal University of Sao Carlos in Brazil, who recently calculated how long it would take the windows to flow in such a manner. He concluded that the glass is actually very stable, and such flow would require a period "well beyond the age of the universe."
The difference in thickness probably results from the way the glass was manufactured, according to Science News. Until the 19th century, the only way to make window glass was to blow molten glass into a large globe, then flatten it into a disk. Whirling the disk introduced ripples and thickened the edges, which were probably installed at the bottom of windows for structural strength. Later glass was drawn into sheets by pulling it from the melt on a rod. Today, most glass is made by floating liquid glass on molten tin.</s>
|
<urn:uuid:c94848e0-73ed-4eb8-8e6d-0e8f9eef2bad>
|
CC-MAIN-2015-32
|
http://articles.latimes.com/1998/jun/25/local/me-63473
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.975598
| 203
| 3.9375
| 4
|
September 3, 2008
By combining telescopes in Hawaii, Arizona, and California, astronomers detected structure at a tiny angular scale of 37 micro-arcseconds — the equivalent of a baseball seen on the surface of the Moon, 240,000 miles distant — on the edge of a black hole. These observations are among the highest resolution ever done in astronomy.
"This technique gives us an unmatched view of the region near the Milky Way's central black hole," says Sheperd Doeleman of MIT, first author of the study that will be published in the September 4 issue of the Nature.
"No one has seen such a fine-grained view of the galactic center before," agrees coauthor Jonathan Weintroub of the Harvard-Smithsonian Center for Astrophysics (CfA). "We've observed nearly to the scale of the black hole event horizon — the region inside of which nothing, including light, can ever escape."
Using a technique called Very Long Baseline Interferometry (VLBI), a team of astronomers led by Doeleman employed an array of telescopes to study radio waves coming from the object known as Sagittarius A*. In VLBI, signals from multiple telescopes are combined to create the equivalent of a single giant telescope, as large as the separation between the facilities. As a result, VLBI yields exquisitely sharp resolution.
The Sgr A* radio emission, at a wavelength of 1.3 millimeters, escapes the galactic center more easily than emissions at longer wavelengths, which tend to suffer from interstellar scattering. Such scattering acts like fog around a streetlamp, both dimming the light and blurring details. VLBI is ordinarily limited to wavelengths of 3.5 millimeters and longer; however, using innovative instrumentation and analysis techniques, the team was able to tease out this remarkable result from 1.3-millimeters VLBI data.
The team clearly discerned structure with a 37 micro-arcsecond angular scale, which corresponds to a size of about 30 million miles (or about one-third the Earth-Sun distance) at the galactic center. With three telescopes, the astronomers could only vaguely determine the shape of the emitting region. Future investigations will help answer the question of what, precisely, they are seeing: a glowing corona around the black hole, an orbiting "hot spot," or a jet of material. Nevertheless, their result represents the first time that observations have gotten down to the scale of the black hole itself, which has a "Schwarzschild radius" of 10 million miles.
"This pioneering paper demonstrates that such observations are feasible," comments theorist Avi Loeb of Harvard University and frequent contributor to Astronomy, who is not a member of the discovery team. "It also opens up a new window for probing the structure of space and time near a black hole and testing Einstein's theory of gravity."
In 2006, Loeb and his colleague, Avery Broderick, examined how ultra-high-resolution imaging of the galactic center could be used to look for the shadow or silhouette of the supermassive black hole lurking there, as well as any "hot spots" within material flowing into the black hole. Astronomers now are poised to test those theoretical predictions.
"This result, which is remarkable in and of itself, also confirms that the 1.3-mm VLBI technique has enormous potential, both for probing the galactic center and for studying other phenomena at similar small scales," says CfA's Weintroub.
The team plans to develop novel instrumentation to make more sensitive 1.3-mm observations possible. It also hopes to develop additional observing stations, to gain extra baselines (pairings of two telescope facilities at different locations) to enhance the detail in the picture. Future plans also include observations at shorter, 0.85-mm wavelengths; however, such work will be even more challenging for many reasons, including stretching the capabilities of the instrumentation, and the requirement for a coincidence of excellent weather conditions at all sites.</s>
|
<urn:uuid:faa41bb2-3211-4f81-a99a-79e418d77b09>
|
CC-MAIN-2015-32
|
http://astronomy.com/news-observing/news/2008/09/to%20the%20edge%20of%20a%20black%20hole
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.935141
| 823
| 4.125
| 4
|
Just curious to know what will be the time difference between someone living on the outer layer of our galaxy and us, considering the known facts that
- Time is relative to gravity
- Our sun goes around at 483,000 miles/hour(792,000 km/hr) to complete its galactic year
- Star systems at outer layer travel faster than ours due to Dark Matter and Dark Energy - couldn't find speed of those star systems though!
We can assume that both (Solar system and outer layer of star system) are on the same side of the galaxy.
EDIT: In order to re-phrase this question more clearly, as per Joan.bdm, it is related to time dilation - what is the aging rate difference if we left one of two twins on the Earth and the other one on a planet at outskirts of the Milky Way. Conversely, what is aging rate difference between closer to center of our galaxy and us?</s>
|
<urn:uuid:a07f6932-66b4-407a-9bb9-25ed68b1daef>
|
CC-MAIN-2015-32
|
http://astronomy.stackexchange.com/questions/6217/what-is-the-relative-time-difference-between-us-and-a-star-system-in-outer-layer
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.941958
| 192
| 2.734375
| 3
|
In a recent posting, Jewish Atheist offered a ‘morality test’ that attempted to collect empirical data that no two people are in complete agreement on a range of moral statements. What Jewish Atheist meant to imply from this set of data is not entirely clear.
It is not clear, in part, because I can come up with a similar set of statements about things that are totally objective, where people are in disagreement about the facts of the matter. Yet, they are still facts.
Argument from Differences of Opinion
For example, assume I construct a test where I ask readers to rank the following statements according to whether or not they are likely to be true. A score of ‘0’ means that the statement is definitely false, while a ‘10’ means that it cannot possibly be false. I suspect that I can come up with a set of statements where no two people will be in complete agreement.
(1) At least one God exists.
(2) Humans are the product of a phenomena called ‘evolution’ in a universe designed by God in such a way that evolution would create humans.
(3) Jesus rose from the dead.
(4) Mohammed was a prophet of God.
(5) There is at least one planet with multi-cellular life within 1000 light years of Earth.
(6) Earth will be hit by an asteroid or comet at least 0.5 km in diameter within the next 100,000 years.
(7) There were dinosaurs on Noah’s Arc.
And so on.
Given enough questions (and the right questions) I can guarantee that no two people will entirely agree on the answer to these questions.
But what does that prove?
It proves that people disagree.
It does not prove that there are no right answers.
The argument being made, when this form of reasoning is applied to moral claims, is that disagreement over the answers to a set of moral questions proves something profound. It proves that there are no right answers to be had to moral questions – as if the claim “there are right answers to these questions” is somehow supposed to imply, “everybody is in agreement over what those right answers are” (such that denying the consequent proves that the antecedent is false.
The implication is invalid.
I find it, at best, odd to note that people who not only object to religious people using poor arguments in defense of their favorite religious beliefs, but make them objects of ridicule and derisive laughter, so easily accept such a poor argument in defense of the claim that there are no right answers to moral questions. One would expect that a group of people who express such contempt for poor reasoning would say, “That argument doesn’t work. Throw it out.”
Argument from Imagination
Another argument that does not work, that is no less popular, goes something like this. “I can imagine two people who are in perfect agreement over all of the facts of the matter, who still disagree over a moral claim such as whether abortion is wrong.”
Well, I can imagine spaceships traveling faster than the speed of light, traveling from star system to star system in the time that it takes to run a string of 30-second commercials. I can imagine dragons, and sorcerers casting spells. I can imagine Jesus walking on water and curing blindness with a touch of his hand. I can imagine traveling back in time and meeting Thomas Jefferson. I can imagine quite a few things . . . but are any of them true?
“I can imagine” is, itself, a very poor argument.
The question to be answered is whether it can happen in fact that two people can be in complete agreement on a set of facts and still disagree on a moral conclusion.
This “I can imagine” argument is, in fact, completely question-begging. It does not prove truth but, instead, stands as a substitute for the beliefs of the person making the claim. Instead of, “I can imagine X; therefore X”, what the person who uses this argument is really saying is, “I believe X; therefore, X”.
There is a third problem with this line of reasoning that deserves a look. I have noticed a tendency among those who try to prove that there are no right answers when it comes to moral questions that they tend to cite David Hume with admiration – particularly Hume’s claim that it is not possible to derive ‘ought’ from ‘is’. According to Hume, since ‘ought’ describes some new sort of relation from ‘is’, that the person giving the argument needs to explain his transition from ‘is’ premises, to an ‘ought’ conclusion.
Jewish Atheist, in part, defines morality as, an immoral act as an act that causes the individual committing the act any degree of guilt and/or an act that was done maliciously or selfishly that causes any degree of hurt or grief onto another living being.
For this part of the argument, I am going to focus on the first half of the argument – the claim that moral terms refers to that which is disposed to cause a sensation of guilt in the agent. Most moral subjectivists use a definition that is similar to this – that we call something right of wrong in virtue of whether it is something that tends to cause a sensation of approval or disapproval in the person making the claim.
However, it is often overlooked that the definition, “Is such as to cause in the agent a feeling of guilt” or ‘is such as to cause a feeling of approval or disapproval in the agent’ is an is statement. It is a description of a real-world state of affairs. It is a statement about a state of affairs that is either true or false.
From such an is premise, the subjectivist makes an immediate leap to providing us with an ‘ought’ conclusion. They tell us that, ‘If it is the case that forcing children to recite the Bible in school creates a sensation of approval in you,” then one is justified in inferring, “Then, the school system ought to institute mandatory school prayer.” At least, this inference is supposed to hold for those people of whom the antecedent is true.
What they fail to explain to us is how one can get from this ‘is’ premise to an ‘ought’ conclusion. What is it (if anything) that makes this inference valid? It is not sufficient to show that many people often make this inference – that it is second-nature to them and they do it without thinking. My question is, “Why is this inference not a mistake? What makes it valid?” I will assert, in this case, that no answer can be provided.
A Sense of Right and Wrong
The problem with this tendency to infer something like, “School systems ought to institute mandatory school prayer,” from “The thought of mandatory school prayer is such as to cause a sensation of approval within me,” can be illustrated in another way.
Speaking to my atheist readers, each of us probably knows of a lot of people who claim that they can look at a beautiful sunset, or at the face of their newborn child, and ‘see’ God. Their experience gives rise to certain sentiments, and they take those sentiments themselves as evidence of God’s existence.
The inference from “Being with my newborn daughter creates a particular sensation within me,” to “God exists,” is no less problematic than, “The thought of mandatory school prayer creates such a sensation within me,” to “School systems ought to institute mandatory prayer.” Yes, people are in the habit of making rash and unwarranted inferences from their private sensations. However, this does not prove that the inference is valid.
The person who uses this argument still needs to explain how it is that their sensation is a sensation that X is wrong.
So, here are four arguments that are often used to support subjectivism that do not work.
(1) The argument from differences of opinion
(2) The argument from imagination
(3) The argument from ‘is such as to cause guilt’ to ‘ought not to be done’
(4) The argument from sensing right and wrong.
These arguments do not support the conclusions that those who use them think they support. They are arguments that those with a devotion to reason should abandon.
This post does not prove that subjectivism is not true. It does, however, attempt to point out that those who use certain arguments in defense of subjectivism are ignoring basic rules of logic and reason in doing so. If there is an argument to offer in defense of subjectivism, it is not any of these</s>
|
<urn:uuid:e0fba4fe-7f4e-4b05-ac08-379eb304eace>
|
CC-MAIN-2015-32
|
http://atheistethicist.blogspot.com/2006/12/morality-test.html?showComment=1167286020000
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.961114
| 1,854
| 2.515625
| 3
|
Athlete's foot is a common infection that affects the skin between the toes and soles of the feet.
Athlete's foot is caused by fungus. Fungus thrives in warm, dark, moist places such as the inside of a shoe, locker rooms, showers, and swimming pool areas. The fungus can exist on a floor, mat, rug, shoe, or towel and transfer to your skin when your feet come in contact with them. You can also get athlete's foot if you come into contact with fungus on someone else's feet. The fungus can then grow on your skin if your feet or the area between your toes stays slightly wet.
Athlete's foot is more common in men. Other risk factors that increase your chance of athlete's foot:
- A history of athlete's foot infection
- Walking barefoot in locker rooms or public places
- Not keeping your feet clean and dry
- Wearing air-tight or poorly ventilated shoes or boots
- Sweaty feet
- Hot, humid weather
- Disorders of the immune system
Athlete's foot symptoms usually starts in the webbing between the toes. It may spread to the soles or arches of the feet, or to the toenails if the infection continues. Athlete's foot may cause:
- Dry skin
- Itching (with or without burning), which gets worse as the infection spreads
- A white, wet surface
- Blisters , which may open and become painful
The doctor will ask about your symptoms and medical history. An exam of your feet will be done. Your doctor may suspect that you have athlete's foot based on the exam. If necessary, your doctor may scrape a small sample from the infected skin and look at it under the microscope to confirm a diagnosis.
Treatment aims to get rid of the infection and prevent it from spreading to others. Treatment steps includes the following:
Take proper care of your feet:
- Gently wash your feet often (at least daily) with soap and water. Completely dry all areas, especially between the toes.
- Put a dusting of antifungal foot powder on your feet or in your shoes to absorb moisture.
- Change your shoes and socks frequently.
- Wash your hands after treating your feet.
To prevent spreading the infection to others, avoid walking barefoot in public, especially in locker rooms and public showers.
Athlete's foot can be treated with over-the-counter antifungal medications that are applied to the skin. If you have recurrent infections, or do not see improvement in 2 weeks, your doctor may prescribe other anti-fungal medication. Treatment may last 1-2 months. It is important to take medication as advised to completely rid yourself of the infection.
To help reduce your chance of athlete's foot:
- Wear shower shoes or sandals in locker rooms, public showers, and around swimming pools
- Keep your feet clean and dry, especially between your toes
- Wear shoes that are comfortable and allow your feet to breathe
- Wear cotton socks that pull moisture away from your skin
- Change socks regularly, especially if they become damp
- Do not borrow other people's shoes
- If you have diabetes, follow your doctor's instructions for taking care of your feet and get them examined regularly
- Reviewer: David L. Horn, MD, FACP
- Review Date: 12/2014 -
- Update Date: 12/20/2014 -</s>
|
<urn:uuid:38aab3a3-286a-4d6d-910f-33a832253556>
|
CC-MAIN-2015-32
|
http://aventurahospital.com/your-health/?/12030/this-condition
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.942753
| 722
| 3.46875
| 3
|
An intellectual sparring ground
Ted Langston Chase | 2/4/2009, 5:12 a.m.
Jourdain went on to describe the situation in New Bedford, where some residents understood fully the value of “material advancement.”
“… For while we number only about 1,700, we pay taxes on real estate the assessed valuation of which is about $330,000.00; and our percentage of men in business for themselves averages well with other races,” Jourdain wrote.
But as Jourdain rightly pointed out, industrial training and high moral values were only part of the solution.
“Love of personal history, a jealous defense of their rights and liberties have been the dominant traits of every people who ever achieved anything admirable, and we believe those traits to be prime essentials of the Negro American today,” Jourdain wrote.
Uplifting the race
Historians and scholars have agreed that this period was especially difficult. The end of Reconstruction was marked by the demise of so-called “Radical Republican” control of the Congress around 1877. A cautious reconciliation between North and South seemed apparent, as did the drastic turn away from the campaign for equal rights for blacks.
By 1883, the U.S. Supreme Court had repealed the Civil Rights Act of 1875, and legislation to make lynching people of color a federal crime turned the county’s nonchalance toward the issue into heated debate that was eventually silenced in the halls of U.S. Congress.
In 1901, Congressman George White of North Carolina was the last of the blacks that had been elected to Congress during or just after Reconstruction. The bill he introduced to make lynching blacks a federal crime during his last term had been unanimously defeated.
Given the political calculus at the time, the radicals had more questions than answers.
What laws could be drafted to replace the protective legislation that had been enacted between 1875 and 1877, only to be repealed by the U.S. Supreme Court in 1883? Who would be their allies? How would they replace the legal mechanisms that granted black Americans their basic rights during the Reconstruction era?
And questions aimed at Booker T. Washington were particularly sharp.
In a Dec. 17, 1903, letter to Washington, Jourdain and two others wrote: “We want to put the question fairly: do you believe it necessary for the support and maintenance of Tuskegee that you should bow subservient to unreasoning and senseless southern prejudice and opposition to the civil and political rights of black Americans? Do you believe it serves to elevate the Negro when you not only fail to speak out in condemnation of such unjust and humiliating proscriptions as ‘grandfather’ clause suffrage provisions, and ‘jim crow’ car laws, but actually seek to find something good to say about them?”
In response to Washington’s public policies and national legal setbacks, individuals and groups across the nation called for “mass meetings” with personal and public pledges to “uplift the race.”
On an increasing basis, everyday working-class blacks attended mass meetings in black churches, black women feverishly mobilized their own for the right to vote and newspaper journalists singled out those who appeared to be assuming leadership in black America. Oftentimes these meetings and attendees were identified by their location. Thus the participants eventually became known as “Boston Radicals,” “Niagarites,” the “Niagara Movement” and the “New Bedford Annex.”
New Bedford: The host city
In spite of its size, when it came to meeting places for the black elite, New Bedford was in the company of cities like Boston, Washington, D.C., Philadelphia, Atlanta and New York City. All of these cities played host to some of the country’s more esteemed black intellects and leaders. Newspaper publishers, lawyers, public figures, physicians, academicians, suffragettes, businessmen, the self-made and top-flight intellectuals all passed through or were welcomed in these cities, just as they were in New Bedford and in households such as E.B. Jourdain’s.</s>
|
<urn:uuid:f53b5877-fa1d-4e29-8d2e-84d131b17038>
|
CC-MAIN-2015-32
|
http://baystatebanner.com/news/2009/feb/04/an-intellectual-sparring-ground/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.972496
| 876
| 2.640625
| 3
|
MIKINAK (Meckinac, Mequinac, “The Turtle”), Ottawa chief; d. 1755 at Detroit.
Mikinak is first reported in 1695 or 1696 as a leader of an Ottawa-Potawatomi expedition from Michilimakinac against the Iroquois. The Iroquois had been actively seeking alliance with the tribes of the pays d’en haut. Their aim, had it been achieved, would have been disastrous for French interests, since trade would then have drained through Iroquois middlemen to the English. Prompted by Cadillac [Laumet*], the commandant of Michilimackinac, Mikinak and his party attacked some Iroquois who had been hunting around Detroit, and thus effectively disrupted chances for peace between their nations.
After Cadillac established a post at Detroit in 1701, Mikinak frequently carried messages between him and Joseph-Jacques Marest*, the Jesuit missionary among the Michilimackinac Ottawas. Commandant and missionary struggled bitterly over where the Indians should settle, and in 1702 Mikinak was still unwilling to move to Detroit. By 1737 he was certainly living there and was described as a “great chief of the Ottawas.”
He made several trips to Montreal, including one in 1742 when he presented his son to the governor, Charles de Beauharnois. Although on this occasion and almost certainly on the others Mikinak made polite assurances of support and promised to discourage all trade with the English, he apparently had an independent view of Ottawa interests. When Orontony and a group of Hurons from Sandoské (near Sandusky, Ohio) revolted against the French in the summer of 1747, Mikinak was said to sympathize with them. Years later Pontiac told the French that Mikinak had declared he “would carry the head of your commander to his village, and devour his heart, and drink his blood. . . .” Whatever the foundation of such accusations, after the arrival of more troops at Detroit in the fall of 1747 Mikinak appeared more friendly toward the French. He offered to use his influence to get the dissident Hurons to move back to Detroit from Sandoské, and suggested that the French bring in reinforcements to use against them should they remain defiant. In return for his good offices he demanded to have his prestige restored by being given equal treatment with Kinousaki, an Ottawa chief opposed to the revolt, who had been sent a scarlet coat with silver lacings. Paul-Joseph Le Moyne* de Longueuil, the commandant at Detroit, advised that Mikinak could provoke considerable trouble if his request were refused.
Although a coat was sent, Mikinak continued his somewhat independent course. In 1751 Kakȣenthiony reported to Governor La Jonquière [Taffanel] that Mikinak had been to the English post at Chouaguen (Oswego) and he hinted that the Ottawa chief had also had dealings with the English in the Ohio country.
When Gaspard-Joseph Chaussegros* de Léry visited Detroit in the winter of 1754–55, he noted that Mikinak was discontented at being obliged to cede the land around Presqu’île (Erie, Pa.) to the French for a fort, and that he was to have gone to Montreal in the spring. On 26 February, however, the old chief died.
In contemporary documents and in later accounts, Mikinak is usually described as a vacillator, one whose “loyalty to the French weakened.” Such an interpretation does an injustice to an Ottawa chief whose territory was occupied by one European power and threatened by another. No one ever questioned Mikinak’s fighting ability or his qualities as a leader. Only after his death was Pontiac able to gain ascendancy among the Detroit Ottawas.
AN, Col., C11A, 67, f.139v; 75, f.91; 77, f.199. “Cadillac papers,” Michigan Pioneer Coll., XXXIII (1903), 113–14, 121–22, 126–29; XXXIV (1904), 288. Charlevoix, History (Shea), IV, 278. [G.-J. Chaussegros de Léry], “Journal de Joseph-Gaspard Chaussegros de Léry, lieutenant des troupes, 1754–1755,” APQ Rapport, 1927–28, 411, 413, 414, 418. French regime in Wis., 1727–48 (Thwaites), 262–64, 456–68, 478–92; “French regime in Wis., 1743–60” (Thwaites), 104–8. NYCD (O’Callaghan and Fernow). The siege of Detroit in 1763: the journal of Pontiac’s conspiracy, and John Rutherfurd’s narrative of a captivity, ed. M. M. Quaife (Chicago, 1958), 99–100.</s>
|
<urn:uuid:df47d0b6-ccde-47e0-80f9-ff52803fe937>
|
CC-MAIN-2015-32
|
http://biographi.ca/en/bio/mikinak_3E.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.968946
| 1,094
| 3.421875
| 3
|
What is the genetic evidence for human evolution?
In recent decades, scientists have discovered more about the beginnings of humanity. The fossil record shows a gradual transition over 5 million years ago from chimpanzee-size creatures to hominids with larger brains who walked on two legs. Later hominids used fire and stone tools and had brains as large as modern humans. Fossils of homo sapiens in east Africa date back nearly 200,000 years. Humans developed hearths for fire, stone points for spears and arrows, and cave paintings by 30,000 years ago. By 10,000 years ago, humans had spread throughout the globe. Genetic studies support the same picture. Humans share more DNA with chimpanzees than with any other animal, suggesting that humans and chimps share a relatively recent common ancestor. Also, the same defective genes appear in both humans and chimps, at the same locations in the genome—an observation difficult to explain except by common ancestry. Genetics also tells us that the human population today descended from more than two people. Evolution happens not to individuals but to populations, and the amount of genetic diversity in the gene pool today suggests that the human population was never smaller than several thousand individuals. Yet all humans, of all races, are descended from this group. Humanity is one family.</s>
|
<urn:uuid:059709a3-95f0-457d-adc8-635403185495>
|
CC-MAIN-2015-32
|
http://biologos.org/resources/find/Essay,Question/all/Human+Origins
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.959208
| 261
| 4.09375
| 4
|
By Kathy Sykes
One of the indelible memories I have of my grandfather, Lars Svensson, was the trouble he had breathing. For as long as I can remember he struggled to breathe, even when we went for a short walk or just a few feet to the mail box in the front yard. My grandfather was a smoker and suffered from a serious lung disease called emphysema, also known as chronic bronchitis, chronic obstructive pulmonary disease, or COPD.
COPD is now the fourth leading cause of death in the United States and also causes long-term disability. Both asthma and COPD are common chronic respiratory diseases that take a toll on the quality of life for persons of all ages. More than 12 million Americans suffer from COPD and another 12 million may have it and not know it.
I was a teenager when my grandfather died, at a time when very little was known about treating the disease. We fortunately know a lot more now about living with COPD and asthma including how to avoid the environmental triggers that can cause an attack. By reducing exposure to environmental triggers one can control and reduce the frequency of symptoms and make it easier to breathe.
Triggers in the environment include outdoor particle pollution and ozone. Indoors, where we spend 90 percent of our time, common indoor hazards may trigger an asthma or COPD attack including tobacco smoke, direct and second-hand smoke, animal dander, dust mites and cockroaches, mold, and pollen. It is also important to check furnace and heating units each year and fix water leaks quickly help to reduce the occurrence of these triggers in your home. Pesticides, household cleaning products and substances with irritating odors may also exacerbate COPD and asthma. And don’t forget to check the air quality index where you live to see if the air quality is a problem. If it is, reduce outdoor activity as much as possible on poor air quality days.
Asthma and COPD have a lot in common and affect the health and quality of life of older Americans. The U.S. EPA Aging Initiative has developed a poster in English and Spanish called Age Healthier, Breathe Easier. The fact sheet on the same topic has been translated into 17 languages.
About the author: Kathy Sykes began working for the U.S. EPA in 1998. Since 2002, she has served as the Senior Advisor for the Aging Initiative.
Editor’s Note: The opinions expressed in Greenversations are those of the author. They do not reflect EPA policy, endorsement, or action, and EPA does not verify the accuracy or science of the contents of the blog.</s>
|
<urn:uuid:d2482ed1-f400-4ff1-ace1-d244792ac014>
|
CC-MAIN-2015-32
|
http://blog.epa.gov/blog/2011/05/age-healthier-breathe-easier/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.964194
| 544
| 2.71875
| 3
|
By Michael A. Smith, MDSure, ideally everyone would be eating fresh, non-processed foods all of the time, but we get it. We know that it can be expensive to eat this way and that sometimes convenience and simple economics guide our decisions. So, here’s the question that begs answering: are there any healthy packaged foods? The answer is yes.
Fortunately, more and more companies are now offering wholesome packaged foods that are far less processed and much healthier. But here’s your warning: all packaged foods undergo some level of processing, and processing strips food of nutrients. There’s no way around that.
With that said, let’s take a look at some packaged foods that you can actually feel alright about eating.
Packaged Foods that are Actually Healthy1. Frozen Fruit & Vegetables – Produce picked and frozen at peak ripeness has just as many nutrients and antioxidants as fresh produce. Make sure that the produce is certified organic and natural. Organic means that the produce is grown without pesticides or synthetic chemicals, and natural means that nothing is added during the packaging process. If it’s frozen, there’s no need to add anything.
2. Whole Grain Cereals – However, we suggest avoiding wheat if you can. The wheat we consume today has been genetically modified over the years. Some experts believe that wheat causes insulin sensitivity issues and contributes to “wheat belly.” Here’s a list of “safe” whole grains to look for:
- Buckwheat (which isn’t really a grain)
3. Greek Yogurt – When made with organic and all-natural ingredients, Greek yogurt is a healthy snack any time of the day. The live bacterial cultures are essential for digestive and immune health. But, once again, don’t buy the flavored ones unless you check the label first. Unfortunately, many companies ruin their otherwise-healthy yogurts with artificial flavorings.
4. Chicken Broth – Broth that’s made from free-range chickens raised on organic, vegetarian diets is a great way to make your own soups. However, don’t buy the broth that’s sold in cans. Instead, look for broths in high-quality packaging.
By the way, making your own soup is smart and pretty easy. Processed food companies sell vegetable soups inexpensively because they load them with high-glycemic carbohydrates (rice, potatoes, pasta) that cost virtually nothing. They then add inexpensive ingredients like corn, sugar, and sometimes omega-6 fats (like cottonseed oil). By the way, we have a new soup that you should try. It’s low in sugar, salt, and fat but loaded with flavor.
5. Canned Salmon – Canned salmon is an easy, convenient, and affordable way to add omega-3s to your diet. And, believe it or not, most canned salmon is from wild sources and not farm raised. Just make sure to choose the kind that’s made from wild Alaskan salmon (it'll say so on the label).
6. Sprouted Grains – Breads made with sprouted grains have twice the fiber and less simple sugar than traditional breads. Sprouted bread and organic all-natural black cherry spreads can make a great snack.
Recipe: Alaskan Salmon & Chick Pea Mint PattiesThis is a recipe that I tried a couple of months ago and loved! Of course, since I don’t cook, my friend cooked for both of us. I did enjoy eating it though:
- 1 or 2 cans Alaskan packed-salmon.
- 2 cups fresh or frozen chick peas or cannellini beans
- 1 small red onion, chopped
- 3 cloves garlic
- 2 teaspoons medium curry powder
- 1 medium red chile, seeded and minced
- Mint leaves
- 1 teaspoon cumin seeds
- 1-2 teaspoons hot pepper sauce
- Salt and pepper
- All-purpose whole grain flour (for dusting)
- Olive oil
Place the Alaskan salmon in blender; add chick peas or cannellini beans, onion, garlic, curry powder, chili, mint, cumin seeds, hot pepper sauce, salt and pepper. Blend together for a few seconds, but do not over-blend. Shape mixture into 18 balls; flatten them into patties.
Dust lightly with flour. Heat olive oil in a large frying pan and gently fry patties for about 2 minutes on each side, until golden brown. (You may have to do this in batches.) Drain on paper towels. Makes 6 servings.
Give it a try and let us know what you think!
Share | |</s>
|
<urn:uuid:e32bca2f-1d20-4324-b6fc-7940a0597935>
|
CC-MAIN-2015-32
|
http://blog.lifeextension.com/2011/12/healthy-packaged-foods.html?showComment=1323714633516
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.937877
| 990
| 2.6875
| 3
|
For those of you who’ve been trying to find a legitimate excuse to cut down on your coffee intake for health reasons, hold that thought for a second and thank UCLA researchers who’ve given all of us another reason why we shouldn’t kick that caffeine habit quite yet.
For quite some time now, researchers have had an inkling that coffee has had a connection with preventing type 2 diabetes. And in fact they were right.
What researchers have found is that caffeine aficionados were least likely to develop type 2 diabetes, as the java works as a protective agent by increasing the plasma levels of sex-hormone-binding globulin (SHGB). The SHGB protein regulates the biological activity of the body’s sex hormones, testosterone and estrogen which has been long been thought to play a role in the development of type 2 diabetes.
As Science Daily reported, after Atsushi Goto, UCLA doctoral student in epidemiology, and Dr. Simin Liu, professor of epidemiology and medicine with joint appointments at the UCLA School of Public Health and the David Geffen School, tested 359 new diabetes cases with 359 said to be healthy controls out of 40,000 women varying in both age and race, “they found women who drank four cups of caffeinated coffee each day had significantly higher levels of SHBG than did non-drinkers and were 56 percent less likely to develop diabetes than were non-drinkers,” explained Mark Wheeler of the UC Newsroom.
“Early studies have consistently shown that an “inverse association” exists between coffee consumption and risk for type 2 diabetes,” Liu said. “That is the greater the consumption the lesser the risk of diabetes. It was thought that coffee may improve the body’s tolerance to glucose by increasing metabolism or improving its tolerance to insulin.”
Liu adds, they now know that SHBG is indeed critical as an early target for assessing the risk and prevention of the onset of diabetes. They now know the protein can be influenced by dietary factors like coffee intake in affecting diabetes risk. The lower the levels of SHBG, the greater the risk beyond any known diabetes factor.
But diabetes prevention is only the beginning of the health benefits coffee may give us. In a number of other studies, one in particular published in the Wall Street Journal and referenced by Top News, coffee has been found to possess antimicrobial agents that aid in the prevention of tooth decay. Other studies have said it decreases the risk of cardiovascular diseases in women by no less than 24 percent, protects men from Parkinson’s disease while also increasing their metabolism and may also help the condition of short-term memory loss and is a helpful factor in aiding headaches.
So before you back away from that latte, just remember that one cup of espresso can provide you with loads of health benefits, so you might as well ask your barista for that double shot.</s>
|
<urn:uuid:d54a4653-8019-4fe6-8bf9-4b9b3be5ff15>
|
CC-MAIN-2015-32
|
http://blog.seattlecoffeegear.com/tag/coffee-news/page/2/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.963475
| 602
| 2.796875
| 3
|
What’s the News: For someone with severe peanut allergies, the tiniest trace of the nut makes their immune system go into overdrive, attacking what it perceives as an intruder so vehemently that the person can go into anaphylactic shock. Scientists may have found a way to calm that immune overreaction, a new study in rats shows, by tacking peanut proteins onto certain immune cells, effectively teaching the whole system that peanuts aren’t a threat.
How the Heck:
- The research team drew blood from mice bred to have a condition much like severe human food allergies: a tiny taste of peanut, and their hypersensitive immune system would ramp up, causing their airways to swell shut.
- From the blood sample, the researchers isolated the leukocytes, white blood cells that help the immune system protect against microbes and other invaders, and attached peanut proteins to the cells’ surface. They then reintroduced each rat’s cells—now with the peanut-protein addition—into its blood stream.
- In people (and rats) with peanut allergies, a particular type of helper T cell, a cell that signals the immune system to attack, sounds the alarm when it comes across a peanut protein. But since peanut proteins were attached to the immune system’s own cells, the T helper cells in these rats learned to tolerate the peanut protein, no longer treating it as a threat.
- Once they’d gotten two doses of the modified leukocytes, the rats ate peanut extract. They didn’t show any serious ill effects, even though a similar snack would have dangerously swollen their airways prior to the transfusions.
- The researchers then did a similar test, with rats bred to be allergic to an egg protein, and got the same result: tacking a bit of the offending molecule onto an immune cell ahead of time meant the rats’ immune system could handle egg protein later.
Not So Fast: The study was in rats, not humans. It will take a lot more testing, and a lot more time, to know whether this sort of treatment will allow people with severe peanut allergies can safely eat foods with trace amounts of peanuts, much less enjoy a PB&J.
The Future Holds: The ultimate goal is, of course, to develop a treatment for people with severe allergies to peanuts or other food. The researchers also hope that tacking on proteins from multiple allergens—say peanuts, egg, and soy—could be used to treat multiple food allergies at once.
Reference: Charles B. Smarr, Chia-Lin Hsu, Adam J. Byrne, Stephen D. Miller & Paul J. Bryce. “Antigen-Fixed Leukocytes Tolerize Th2 Responses in Mouse Models of Allergy.” Journal of Immunology, published online October 5, 2011. DOI: 10.4049/jimmunol.1100608
Photo courtesy of EuroMagic / Flickr</s>
|
<urn:uuid:e6a35d9b-9d79-40a8-9216-6db38f41c96f>
|
CC-MAIN-2015-32
|
http://blogs.discovermagazine.com/80beats/2011/10/14/training-the-immune-system-may-turn-off-peanut-allergies/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.928437
| 611
| 3.359375
| 3
|
High-fructose corn syrup ups the sugar content of many
As the obesity rates continue to climb in developed countries, and research about hunger and how our bodies process food advances, researchers are finding more clues that the epidemic’s cause is more complex than simple overeating. And one contributor may be the increase in the amount of sugar in processed foods, especially with the rise of mass-produced, cheaper-than-cane-sugar high-fructose corn syrup in the 1970s.
At The Guardian, documentary maker Jacques Peretti has written a detailed history of the food industry’s role in popularizing high-fructose corn syrup and fueling obesity. Peretti’s story begins with corn overproduction in the 1970s causing a surplus, which led to the mass production of corn-based foods, including high-fructose corn syrup, long before worries about obesity had arisen.</s>
|
<urn:uuid:e4257132-9979-4b8b-8081-c345479ce0de>
|
CC-MAIN-2015-32
|
http://blogs.discovermagazine.com/80beats/tag/sugar/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.926859
| 184
| 2.84375
| 3
|
Roboticists have successfully colonized air, water and land with their mechanical critters. There are aerial research drones, underwater robotic gliders, robots that can roll and climb stairs. But one consistent challenge for existing robots is walking on shifting surfaces such as sand. A robot design published today is a good contender for solving that
As is often the case in modern robotics, the scientists’ inspiration came from nature. Many small animals navigate sand, gravel, rubble, snow and leaf litter every day. However the mechanics of interactions with such “flowable ground” have been even more challenging for researchers to mathematically model than movement through fluids. Modeling that interaction is a crucial first step of building a sand-walking robot.
The engineers began their research by looking at previous studies on the way various kinds of desert lizards walk, as well as data on existing similar robots such as RHex. Computer simulations allowed them to identify the optimal leg shapes and stride frequencies for traversing such deformable terrain. A C-shaped leg was mathematically most efficient. They then mechanically tested the leg, measuring the lift and drag as it rotated through sand (or sometimes flat beds of glass beads or poppy seeds
What they came up with is a six-legged robot that is able to move efficiently across a bed of dry, loose sand. Its maximum speed was a little over 2 feet per second, with each leg making 5 cycles in that amount of time, they report today in Science.
That’s still not as efficient as the locomotion of walking animals. However it’s a step in the right direction to improve the gait of roving and walking robots, such as the Mars rovers.
Robot image courtesy of Chen Li, Tingnan Zhang, and Daniel Goldman
Lizard image courtesy pixy / Shutterstock</s>
|
<urn:uuid:238ca27b-0fb7-4e2d-847f-d06cdaabfc8b>
|
CC-MAIN-2015-32
|
http://blogs.discovermagazine.com/d-brief/2013/03/21/robot-designed-to-run-like-a-lizard-over-sand/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.956687
| 374
| 4.40625
| 4
|
…and there is also a human figure, several faces, a bunny rabbit, a gun, a small chair, a large forest, and pretty much every other shape the human eye can piece together given a very large number of random shapes to contemplate. They are all real, in the sense that people genuinely do register them in the mind. As many writers have noted, the tendency of the eye and the brain to collaborate on creating recognizable objects is a well-known and quite powerful psychological phenomenon known as pareidolia.
From an evolutionary point of view, pareidolia is a very useful thing. Babies are hard-wired to look for their mothers’ faces, because that is their source of food and protection (and eye contact is an important social bond). There is also a significant upside in perceiving the shapes of both predators and prey half-hidden in abstract clumps of leaves; seeing some animals that are not actually there is far less of a problem than missing some that are.
Which brings me to the new “Mars rat,” or maybe “Mars lizard” depending on your perspective. This story has been lighting up the interwebs for about a week now. There is a long, long history of seeing animal shapes on Mars–the Red Planet being an especially attractive target because it is so tightly associated with the search for life in space, and because we just have so many pictures of the surface to dig through. The most notable thing about the latest sighting is that this time the conspiracy theorists are not arguing that NASA has found Mars life and is keeping it a secret (for unimaginable reasons). No, the alleged plot is that NASA is running secret animal experiments on Mars and one of the creatures has escaped.
Here’s a quick thought: If scientists want to know how animals react to thin air and cold temperatures, they could easily do that experiment in the lab and save a billion dollars. Like most conspiracy theories, the fun of it lies entirely on the idea that somebody has a secret. Logic is not required. [Addendum: I just noted a link to an insightful recent study on conspiracy theories in the Comments section below.]
I do find it interesting, though, that scientists themselves fully participate in the process of projecting animal and human figures out into space. The list of scientific nicknames for rocks on Mars is full of such imagery. Just moments ago I got a press release about a new story of the Cat’s Paw Nebula (though for the life of me I cannot see the paw in that image). I’d like to put this experiment out to DISCOVER’s readers: What are the most exotic creatures and constructions that you can find in the flood of amazing Mars imagery from the Curiosity mission?
Follow me on Twitter: @coreyspowell</s>
|
<urn:uuid:a05eee94-9376-4d0b-a1bb-17595c6a4766>
|
CC-MAIN-2015-32
|
http://blogs.discovermagazine.com/outthere/2013/06/05/yes-there-is-a-rat-on-mars/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.95423
| 576
| 2.859375
| 3
|
Flipped instruction is a teaching approach that has gained prominence over the last couple of years. Using the flipped method, teachers expose their students to content outside the classroom, so in-class time can be used for more engaging exercises and activities. This summer, a group of Elon faculty members explored the flipping method with a Moodle course through the Teaching and Learning Technologies (TLT) department to see how this kind of teaching could be applied to their classrooms.
The flipped course
This course was a self-paced series in which faculty members learned about flipped instruction and how to incorporate its techniques effectively. Over five weeks, TLT facilitators released modules that taught the different elements of a flipped classroom, including: how to find or create out-of-class content, how to asses a student’s comprehension of that content and how to help students apply that knowledge in the classroom.
Each faculty member finished the course with a fully-functional plan to flip some aspect of a course they would teach in the fall. Several professors created videos for their students to view at home. The videos were paired with Moodle quizzes to evaluate the students’ understanding of the material. That made class time available for labs and any additional questions from the previous night’s material.
Another professor planned to use a web application to provide articles that her students could annotate online as they read at home. This, the professor hoped, would allow her writing-based course to focus on sharpening her students’ writing skills in class.
In addition, the faculty members who participated in the course applied for mini-grants from TLT and the Academic Technology and Computing Committee (ATACC). These grants provided the necessary software and hardware to implement their flipped instruction plans in their courses.
Feedback from faculty
After completing the course, faculty took a survey, which reflected the group’s positive experiences learning how to flip their courses. When asked if they would recommend flipped instruction to a colleague, all replied affirmatively.
“I would recommend the class because it made me aware of resources and techniques that I would not likely have discovered on my own,” one participant said. “I liked the opportunity to meet with the [TLT facilitator] for an individual feedback session as well.”
While these faculty members had a satisfactory experience flipping their classrooms, some educators are still tentative about incorporating this approach in their own teaching. However, one of the participant emphasized that flipped instruction isn’t about altering everything about teaching; it’s about creating a more effective environment for the student to learn.
“I think it’s important to emphasize that this is not a radical rethinking of the teacher’s role,” the participant said. “It can come off like lecturing is antiquated. [But] flipping can be just pieces, or specific exercises. It doesn’t have to be a complete rethinking of education, but an additional tool in the professorial arsenal.”
More flipping this fall
Be on the lookout in the upcoming weeks for our profiles on the Elon faculty members who completed the flipped instruction course and how they’re adapting to this method of teaching.
If you’re interested in learning how to use flipped instruction in your course, contact Teaching and Learning Technologies at 336.278.5006 or [email protected] to schedule an individual consultation.</s>
|
<urn:uuid:81ef2936-c4c8-4c5b-829d-07bf49ac804e>
|
CC-MAIN-2015-32
|
http://blogs.elon.edu/technology/tlt-summer-course-encourages-elon-faculty-to-use-flipped-instruction/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.959464
| 703
| 2.828125
| 3
|
In A Tale of Two Cultures, Gary Goertz and James Mahoney argue that qualitative and quantitative methods constitute different cultures, each internally coherent yet marked by contrasting norms, practices, and toolkits. The authors seek to promote toleration, exchange, and learning by aiming to enable scholars to think beyond their own culture and see an alternative scientific worldview. Those instructing research methods will find the book a particularly helpful teaching tool, writes Maria Kuecken, with clear examples and case studies throughout.
A Tale of Two Cultures: Qualitative and Quantitative Research in the Social Sciences. Gary Goertz and James Mahoney. Princeton University Press. August 2012.
Between camps of quantitative and qualitative researchers, a discussion of research methods is one that usually incites more contention than cooperation. But, according to Gary Goertz and James Mahoney, conflict doesn’t need to be the norm. By carefully dissecting each methodological tradition in their book A Tale of Two Cultures, Goertz and Mahoney do social scientists a great service by promoting mutual understanding and appreciation of both quantitative and qualitative research methods.
Goertz and Mahoney frame their book with the assertion that “the quantitative-qualitative disputation in social sciences is really a clash of cultures.” Like different cultures, they explain that each tradition abides by its own sets of practices and beliefs. And while there is potentially a great deal to be gained from cross-over between the two, more often than not cross-cultural interactions are waved away or, at the very least, misunderstood.
Gary Goertz and James Mahoney are both social scientists themselves – the former is a political scientist at the University of Arizona and the latter is a professor of political science and sociology at Northwestern University. Both have extensive chops in teaching and writing about research methods, which explains why A Tale of Two Cultures is easy to follow despite its technical subject.
The authors encourage social scientists to avoid knee-jerk reactions deriving from an aversion to or preference for one particular methodological tradition. Instead, they maintain impartiality, reminding the reader that both traditions “are appropriate for different research tasks and are designed to achieve different research goals.” Put simply, no tradition is better than the other. Moreover, to reduce the clash of cultures as simply “numbers versus words” is to make an unhelpful and misleading simplification. Adopting the cultures approach thus allows Goertz and Mahoney to initiate a breakdown of the two research traditions in a systematic and nuanced fashion.
An important take-away is that some analogies which seem useful on the surface can instead be misleading. The authors emphasize early on that there is a translation problem across cultures. For example, the quantitative researcher is equipped with probability theory and statistical tools. Qualitative researchers don’t typically consider their tradition as one that is explicitly couched in mathematics but, as Goertz and Mahoney explain carefully in their mathematical prelude, logic and set theory support this paradigm. They demonstrate how applying fuzzy-set math as a formal tool in qualitative analysis can produce useful distinctions with quantitative analysis as well as illuminate the translation problem across the two research cultures. A simple demonstration is the seemingly straightforward comparison between using either statistical multiplication or the logical AND to aggregate data. While analogous, they result in two entirely different mathematical procedures since the latter requires taking the minimum. Thus, when taken to the mathematical roots, attempts to translate directly from one culture to another can be misleading.
But it is not just the mathematical values that differ; norms and procedures do, too. Quantitative social scientists tend to begin investigations of causality by hypothesizing the impact of a particular cause on an outcome, while qualitative social scientists take the opposite approach, starting their investigation with a given outcome and working in reverse to find the causes. Choices such as these direct quantitative researchers to pursue methods of estimations that yield average effects of specific variables across samples, while qualitative researchers focus on a multivariate approach which leads them to look for explanations that fit a group as well as individuals within said group. The authors make similar distinctions regarding concept and measurement in each methodology as well as the qualitative within-case analysis (and its implications for both traditions).
For a book that celebrates the complementarities between quantitative and qualitative research methods, it is unsurprising that the authors wrap up with a call for more mixed-method research. While a completely sensible suggestion, it is also a bit ironic, considering that the book’s tendency to focus on sociology and political science risks making other social scientists feel excluded. Yet, all social scientists do in fact have something to gain from the discussions presented here, especially by being more open-minded to the value of exchanges.
A Tale of Two Cultures is an informative read for social scientists, especially those who find themselves specialized in one culture of research instead of the other (which, of course, is most of us). If one is absent a background in either culture, Goertz and Mahoney provide clear examples to illustrate their arguments. Thus, those instructing research methods will find the book a particularly helpful teaching tool, even if some may take issue with the ‘two culture’ approach. After all, promoting appreciation and exchange of research methods through better understanding is indeed a worthy goal.
Maria Kuecken is a Ph.D. candidate in Economics at the Paris School of Economics—Paris I Pantheon-Sorbonne University. Maria teaches graduates and undergraduates in Applied Econometrics and Mathematics. Specializing in development economics, her own research focuses on the determinants of educational quality in developing countries. She has blogged on a variety of issues for the European Journalism Centre, worked on educational projects in Rwanda, and interned in the Health Division of the Organisation for Economic Co-operation and Development. Read more reviews by Maria.</s>
|
<urn:uuid:90803c30-fd4e-47bf-9675-76d325cadbf9>
|
CC-MAIN-2015-32
|
http://blogs.lse.ac.uk/impactofsocialsciences/2013/05/26/book-review-a-tale-of-two-cultures-qualitative-and-quantitative-research-in-the-social-sciences/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.938019
| 1,202
| 2.59375
| 3
|
Is it true that a single espresso can damage your heart?
“A single espresso a day can damage heart.” “Just one espresso can put your heart at risk.” “One caffeine-packed cup can slow blood flow to the heart by 22%.” Whoa! Those are headlines that can make your heart skip a beat. They come from British newspapers reporting on an Italian study about the effects of a cup of espresso on blood flow and blood pressure. As is so often the case, the headlines don’t reflect what the study actually found, and anyone reading only the headlines may end up unnecessarily depriving themselves of the delights of an espresso.
Coffee is obviously of interest to researchers because it is so widely consumed and because it has a number of biologically active compounds. Caffeine is the best known of these, but recently we have heard a great deal about the antioxidants that are also present in coffee. Part of the reason for the interest in coffee is that acute effects, such as a rise in blood pressure, are deemed to be detrimental, whereas long term consumption has been associated with a lower risk of cardiovascular disease and type 2 diabetes. This has actually been termed the coffee paradox. The current thinking is that the long term benefits are due to coffee’s antioxidants while the unfavourable acute effects are due to caffeine.
Whether the acute effects present a risk is essentially unknown and this is what the Italian researchers decided to explore. They enlisted ten healthy males and ten healthy females to drink either a cup of espresso or a cup of decaf and have their blood pressure and arterial response be monitored. In the latter case, the technique is to cut off the blood supply in an arm and then using ultrasound, measure how effectively the brachial artery, the main artery in the arm, dilates when blood flow is restored. If the artery doesn’t dilate effectively, it means that blood flow is impaired, which is a possible sign of atherosclerosis in the making. The dilation of arteries is triggered by the release of nitric oxide, which is also an inhibitor of blood clot formation and inflammation. Basically, impaired endothelial function, as the lack of arterial dilation is called, means a reduction in the bioavailability of nitric oxide, which may be a harbinger of future trouble.
What the researchers found in this case was a poorer dilation response after drinking a cup of espresso than after drinking a cup of decaffeinated coffee. There was actually a 22% greater dilation after the decaf, inspiring headlines about damaging the heart and reducing blood flow to the heart by 22%. As far as blood pressure goes, there was a small increase, but essentially within the scope of experimental error. And of course the study did not show any heart damage at all, no attempts were even made to study any such effect. And the endothelial response was measure in an artery in the arm, not in the coronary arteries that supply the heart with oxygen. The study was quite well carried out in the sense that neither the subjects nor the researchers who evaluated blood flow and blood pressure knew who was drinking which beverage. Furthermore, the study was of a cross-over design meaning that all subjects were investigated after drinking both types of coffee. On the other hand, twenty subjects makes for a pretty small sample. And measurements were taken only thirty and sixty minutes after drinking the coffee, so the longevity of the vasoconstriction effect is unknown. Most importantly, the short term constriction of the arteries may have no clinical significance since arteries in any case constrict and dilate throught the day in response to activity.
A large body of evidence indicates that up to four or five cups of coffee a day is safe for the general population. Contrary to the implication inherent in the headlines, this Italian study does not show that a single cup of espresso damages the heart. The overwhelming evidence shows that when consumed in moderation – 400-500mg of caffeine per day, the equivalent of approximately four to five cups, coffee is safe for the general population.</s>
|
<urn:uuid:f3e66400-d9ab-4cca-9e74-ba8b3df4f7cc>
|
CC-MAIN-2015-32
|
http://blogs.mcgill.ca/oss/2012/11/17/is-it-true-that-a-single-espresso-can-damage-your-heart-2/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.962385
| 832
| 3.140625
| 3
|
Last weekend, NASA successfully launched the Mars Science Laboratory - called Curiosity, which is currently well on its way towards the red planet.
Back in May, I went to an Open House at the Jet Propulsion Lab in Pasadena. What a refreshing sight it was to see so many people – couples, families, grandparents and grandchildren, groups of teenagers – coming to a scientific laboratory to learn about space and science! But the real reason I was there was to see Curiosity. Visitors could only see it from a closed viewing area high above the clean room where the rover, about the size of an SUV, was being built.
It boggles my mind to think: that contraption that I saw being built in Pasadena is now millions of miles away, en route to another planet.
All photos copyright the author.</s>
|
<urn:uuid:35288d44-439b-46ba-9f35-8d26dc1601a4>
|
CC-MAIN-2015-32
|
http://blogs.scientificamerican.com/thoughtful-animal/sunday-photoblogging-curious-about-curiosity/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.973652
| 163
| 2.578125
| 3
|
After many years of studying invasive plant species in Patagonia, Argentina, Dr. Eduardo Rapoport, Professor at the Universidad Nacional Del Camohue, realized that many of the “pests” he was cataloging were edible. “I found that, especially in areas disturbed by man, such as roads, back lots, and gardens, there are a great deal of unintentional food sources.” As a result, Dr. Rapoport found himself looking at these “pests, invaders, and weeds,” in a very different light.
“I gathered together a group of students and we set out to assess how many kilograms of wild-growing edible food could be found in a hectare of urban space,” said Dr. Rapoport. Starting with the airport and working through different parts of the city, Dr. Rapoport and his students found that the average amount of food per hectare was 1,300 kilograms—or about 3,400 pounds of food per acre.
Dr. Rapoport repeated the same study in Mexico in order to compare the results in temperate Patagonia with a tropical environment. He and his students found that there was an even greater wealth of food in that area—about 2,100 kilograms per hectare. “It was surprising,” said Dr. Rapoport, “and it was incredibly valuable. There are people who are going hungry and they are surrounded by plenty of food. They just don’t know it.”
Not only are there a wide variety of wild edible plants growing near city streets, at schools, and in the public areas throughout South America, explains Dr. Rapoport, but many of them are also incredibly productive. “These are weeds,” says Dr. Rapoport, “they multiply and grow quickly. We found that many of them could be harvested multiple times per season, meaning that a gatherer could get more than one meal from one plant over the course of a very short period of time.”
Dr. Rapoport and his wife, Dr. Barbara Drausal, with the help of the University, have published a book, Malezas Comestibles del Cono Sur or Edible Weeds of the Southern Continent, a guidebook of sorts that identifies and describes 240 edible weeds growing throughout South America. The book includes illustrations and recipes, directing the reader to the parts of each plant that are edible and providing detailed instructions for how to best prepare them.
Although, Dr. Rapoport does not encourage people to plant these species—they are invasive after all—he says that they can be an important source of inexpensive food. “This is not a solution to world hunger,” says Dr. Rapoport, “but it is valuable knowledge that has been lost over the years. There is food all around us but most people just don’t notice it. Or they destroy it because they mistake it for useless pests.”
In addition to his book, Dr. Rapoport visits primary school classrooms to help educate the next generation of Argentina’s food gatherers. And he has reached out to the Ministry of Education in the hopes that his research might become a part of standardized curriculum. “Often I take students outside to their school yard,” he says, “and they are amazed by how many edible plants are growing right there.”
With edible plants throughout South America originating from North America, Asia, Africa and Europe, Dr. Rapoport also hope to have his book translated into English and other languages. The more people he can share this information with the better. “It’s about getting this valuable information to the people who need it most,” he says, “the hungry people who are surrounded by food.”
To read more about looking to “weeds” and indigenous vegetables as a source of food, see: Keeping Weeds for Nutrition and Taste, Homegrown Solutions to Hunger and Poverty, Emphasizing Malawi’s Indigenous Vegetables as Crops, and Malawi’s Real Miracle.
- Innovation of the Week: From the Township Garden to the City Table
- Innovation of the Week: Giving Farmers a Reason to Stay
- Innovation of the Week: Banking on the Harvest
- Innovation of the Week: Agriculture Education in School
- Innovation of the Week: Reducing the Things They Carry
- Innovation of the Week: Turning the School Yard into a Classroom
- Innovation of the Week: Turning an Invasive Species into a Livelihood
- Innovation of the Week: Taking the Classroom to the Field</s>
|
<urn:uuid:3a672626-ea20-4643-ad08-2fdd0eafabb0>
|
CC-MAIN-2015-32
|
http://blogs.worldwatch.org/nourishingtheplanet/innovation-of-the-week-gathering-the-food-growing-at-our-feet/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.973437
| 976
| 3.140625
| 3
|
They used a common text-analysis software program called Linguistic Inquiry and Word Count, or LIWC2007. The software is a dictionary of more than 4,500 words and word stems that helps researchers mine and analyze emotions in text.
Posts were determined to be positive or negative if they contained at least one word LIWC classifies as positive or negative, according to the paper.
For example, LIWC categorizes “cried” as sadness, one of several negative emotions. Words like annoyed fall into the anger category. Words like “maybe, perhaps, or guess,” indicate that the person is tentative.
The software analyzes parts of speech to assess the context in which a word is used. Designers of similar software packages say they “train” the software to resolve ambiguity by reviewing hundreds of thousands of sentences.
Companies and researchers increasingly use software like LIWC to analyze the huge volume of content on social media. Marketers want to know what users are saying about their brands. Academics mine social media content to study behavioral and social trends.
According to the LIWC site, the software was developed in the early 1990s. It is based on decades of research that found that people’s physical and mental health can be predicted by the words they use. Researchers have also found that the act of writing can influence people’s emotional state.
You can score your own emotions using LIWC’s software. The company offers a free tool on its site where anyone can plug in their Twitter handle and see their emotional score. Based on the 911 most recent words used, LIWC says my emotional style is “worried” and my social style is “arrogant.”
More on the News Feed Study:
- Furor Erupts Over Facebook’s Experiment
- It’s Time We Talk Seriously About Facebook’s Awesome Power
- What Readers Are Saying About the Test
- ‘Facebook Experiment:’ 21,000 Tweets in 24 Hours
- Facebook’s Own Rules About Data Use
- The Study’s Findings
For the latest news and analysis, follow @wsjd.
And like us on Facebook to get our news right in your feed:
Get breaking news and personal-tech reviews delivered right to your inbox.
More from WSJ.D: And make sure to visit WSJ.D for all of our news, personal tech coverage, analysis and more, and add our XML feed to your favorite reader.</s>
|
<urn:uuid:a79a2061-de08-45f0-9c5f-983212822102>
|
CC-MAIN-2015-32
|
http://blogs.wsj.com/digits/2014/06/30/how-researchers-classified-facebook-posts-as-happy-or-sad/?mod=trending_now_7
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.911235
| 529
| 2.921875
| 3
|
Your Chance to Help Bluefin Tuna
The National Marine Fisheries Service has recently proposed a new rule to reduce the wasteful catch of bluefin tuna on longlines. While the rule is a step in the right direction, some changes are necessary to better protect this important fish.
Each year, longlines, stretching up to 40 miles long with hundreds of baited hooks, are used to catch yellowfin tuna and swordfish, but they also catch more than 80 unintended marine species, including the deeply depleted Atlantic bluefin tuna. Because longline fishermen are only allowed to retain a limited amount of bluefin tuna, they must discard many of the bluefin they catch back to sea, even though they come up dead. A significant amount of this wasteful bluefin tuna catch occurs off Cape Hatteras, North Carolina, where bluefin tuna concentrate at certain times of the year, and in the Gulf of Mexico, the sole area on this side of the Atlantic Ocean where bluefin tuna come to breed. This wasteful catch is harming the Atlantic bluefin tuna population. For more information please see our recent blog post- Bluefin Tuna: Promise and Problems in a New Government Proposal.
The Safina Center is writing to the National Marine Fisheries Service (NMFS) to urge them to strengthen the proposed rule and provide stronger protection to bluefin tuna. If you would like to let your voice be heard, below is a sample letter you can send. You can submit your letter electronically here or mail to Thomas Warren, Highly Migratory Species Management Division, NMFS, 55 Great Republic Drive, Gloucester, MA 01930. Please mark the outside of the envelope “Comments on Amendment 7 to the HMS FMP.”
Dear Mr. Warren,
I urge you take advantage of this historic opportunity to reduce the wasteful catch of depleted Atlantic bluefin tuna on longlines and protect this important fish. For decades U.S. longline fishermen have caught and killed bluefin tuna. Significant amounts of this bluefin tuna catch occur off Cape Hatteras, North Carolina and in the Gulf of Mexico, the only breeding area for bluefin tuna on this side of the Atlantic. Longline fishermen frequently catch more bluefin tuna than they are allowed to keep, requiring them to discard large numbers of bluefin back to sea, dead.
The proposed rule by the National Marine Fisheries Series is a step in the right direction toward ending this waste, but some changes are necessary to ensure bluefin tuna get the protection they need and deserve. The small Gulf of Mexico closure proposed by the NMFS excludes an important breeding area for bluefin tuna in the north central Gulf where bluefin catch is high. Therefore the NMFS should expand this closure to include the entire Gulf of Mexico and extend the length of the closure to cover the peak breeding season for bluefin tuna, March-May. In addition the NMFS should establish the five month Cape Hatteras longline closure that restricts fishing for all longline vessels.
Further, the NMFS should minimize the waste of dead bluefin released back to sea by implementing a bluefin tuna catch cap for the longline fishery and the associated individual bluefin quota system. The NMFS should not provide any additional bluefin tuna quota to the longline fishery beyond its current share of 8.1%. Giving additional bluefin tuna quota to the longline fishery would undercut the benefits of the bluefin tuna catch cap and associated measures.
Strengthening the proposed rule as outlined above would eliminate much of the wasteful bluefin tuna catch that occurs on longlines each year. It would also encourage the use of more selective fishing methods, capable of avoiding the lethal catch of bluefin and other non-target ocean wildlife.
Thank you for your time and consideration.</s>
|
<urn:uuid:8b89382d-c89b-4fd5-b3f3-af6e39ee498b>
|
CC-MAIN-2015-32
|
http://blueocean.org/issues/chance-help-bluefin-tuna/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.91458
| 768
| 2.75
| 3
|
FREE Trial Membership
It doesn’t look like you are currently logged in to CADeeze.com. Please login using the box on the right, or if you are not a member, give us a test-drive by registering for FREE below.
The AutoCAD Interface and Basic Drawing/Editing Commands
Tutorial 01 – The Autocad interface, screen layout, ribbon, command line, accessing commands
Tutorial 02 – AutoCAD’s Cartesian Workspace, Drawing Lines.
Tutorial 03 – Erasing Lines and Erasing Lines with Crossing and Windows.
Tutorial 04 – Drawing Lines with Polar Tracking, Absolute coordinates, Relative coordinates, Relative Polar coordinates, Dynamic Input.
Tutorial 05 – Working with command line options, Specifically, the Rectangle.
Tutorial 06 – Drawing Circles.
Tutorial 07 – Viewing Your Drawing, Zoom Commands, Zoom Dynamic, Pan.
Making Your Drawings More Precise
Tutorial 08 – Using Object Snaps – Endpoint, Midpoint, Intersection, Perpendicular, Ortho.
Tutorial 09 – Using Object Snaps – Center, Quadrant, Tangent, Osnap Settings, None, Osnap Tracking.
Making Changes To Your Drawing
Tutorial 10 – Moving Objects, Copying Objects.
Tutorial 11 – Rotating Objects, Scaling Objects.
Tutorial 12 – Mirroring Objects, Stretching Objects.
Tutorial 13 – Editing Objects with Grips.
Tutorial 14 – What are Layers?, Layer States (On/Off, Freeze, Thaw).
Drawing Organization and Information
Tutorial 15 – More Layer Tools; Lock/Unlock, Layer Isolate, Merge Layers.
Tutorial 16 – Layer state manager, Line types, Working with Properties.
Creating More Complex Objects
Tutorial 17 – Trimming and Extending, Lengthen, Break.
Tutorial 18 – Creating Fillets, Chamfers, Offsetting Objects.
Tutorial 19 – Creating Arrays using the Rectangular Array and the Polar Array.
Tutorial 20 – What are Blocks? Inserting Blocks.
Tutorial 21 – Editing Blocks using Block Editor, Wblock, Inserting Blocks w/Design Center.
Tutorial 22 – Drawing Arcs, Drawing Ellipses.
Tutorial 23 – Drawing Polylines, Editing Polylines.
Tutorial 24 – Drawing Polygons, Boundaries, Wipeout, Revision Cloud.
Tutorial 25 – Drawing and Editing Hatches.
Tutorial 26 – Paper Space vs. Model Space, About Layouts, Creating a New Layout, Set Layout To Proper Paper Printing Size.
Tutorial 27 – Multiple Layouts, Viewports, Layers in Viewports.
Tutorial 28 – Setting Drawing Units.
Annotating Your Drawing
Tutorial 29 – Introduction To Annotative Objects.
Tutorial 30 – Text and Text Styles, Single Line Text, Multi-Line Text.
Tutorial 31 – Dimensions and Dimension Styles.</s>
|
<urn:uuid:3b49a7f6-ac7d-45b0-b6f9-558a63ee5fc8>
|
CC-MAIN-2015-32
|
http://cadeeze.com/autocad-2011-tutorials
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.668174
| 629
| 2.71875
| 3
|
Data Visualization overlaps with the area of Human-Computer Interaction (HCI) which is as broad as computing and a broad as all of human society. Researchers in the area of Visualization borrow techniques from Psychology, Sociology, Linguistics, Artificial Intelligence and Computer Science, as well as many other areas of knowledge.
The range of methods of analysis that can be applied ranges from techniques borrowed from the physical sciences to techniques that come from literary criticism.
Interactive visualization research is also constructive. Often the most valuable contributions involve developing new methods for solving problems. Nevertheless, simply developing something is not usually enough. It is also necessary to convince other people that what you have done is valuable and this usually involves both analysis and testing.
Here is a partial list of the research techniques that apply in Visualization research
Evaluating the Applicability of Theory to Data vis Broblem: E.g. theory of luminance channel being good for form perception applies to color sequence design.
Comparing solution A to solution B (atheorotetcal): E.g. David Laidlaw's study of flow vis methods.
Rapid Prototyping and Spiral Design: Often the most effective systems are first built using quick and dirty methods, then evalutated and modified in a cyclical spiral design process. Sometimes the early implementation can consist of a set of sheets of paper representing interfaces screens.
Proof of Concept Prototypes: This used to be the most common style of research. In essence this meant building a system and then describing it. In so far as the people who built sustems were also the ones to describe them, the descriptions were often overly positive. "Look, this really works well". Nevertheless, a constructive solution with a clear statement of reasons why is should be superior is an important contribution..
Graphics Algorithms: Graphics algorithms are needed to transform data into display. However, often the simplest algorithms are the most effective in visualization. The algorithms are not the problem. The most effective mapping of data to display is the real problem and this is a problem of perception.
Interactive methods: The most effective techniques for exploratory data
analysis involve rapidly revealing and hiding data "on demand" using
techniques such as brushing and direct manipulation.
Psychophysics: In psychophysics, measurements of human performance are made using the methods of physical science. The methods are useful to measure the human sensitivity to light or sound, for example. In data visualizaiton the methods relate to task like judging orientation in flow fields, finding hidden features, and so on.
Cognitive Psychology: In cognitive psychology the human brain is assumed
to consist of a number of processing centers that interact with one another.
Experimental methods are designed to test models of these processing centers.
The classic example of a cognitive theory is the division of memory into long
term and short term components. Techniques from cognitive psychology are widely
used in HCI. For example, In dual processing tasks we can determine how much
cognitive load is placed on the user by a particular aspect of a user interface.
Sociology and Anthropology: Artifact analysis: In anthropology, the goal is often to find out how some particular object or "artifact" is use in its cultural setting. It is religeous? Is it used for something practical? etc. The point is that in order to understand the object it is necessary to place it in a cultural context. In user interfaces, the computer program is treated as an artifact that is placed in the cultural context of its intended use. We study how it functions within the office or home work or play environment.
Scenarios: In a scenario, someone invents a system or program and then writes a story about how this might be used. Often, the result looks a lot like a film script. For example, A lot of work on the early develpment of Personal Digital Assistants was done in this way. A scenario may be a useful way of getting funding to build a prototype.
Role playing: Role playing involves acting out a scenario. It is usually coupled with a considerable amount of brain storming to try to find useful extensions to the object being designed. This is especially useful with meeting support tools.
Wizard of Oz: In the Wizard of Oz method a person is made to simulate how the computer should react in some yet-to-be implemented user interface. This is especially useful in designing help systems. In essence the computer becomes human powered rather than silicon powered.
The actual measurement tools used in assessment are extremely
Some of the more common measurements are the following:
In addition there are many highly specialized methods borrowed from various sciences.</s>
|
<urn:uuid:f2a81d50-0c18-4128-b146-2edd64913e23>
|
CC-MAIN-2015-32
|
http://ccom.unh.edu/vislab/VisCourse/Methodology.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.937501
| 960
| 3.203125
| 3
|
Cesar Chavez and Dolores Huerta recognized for their life long contributions to organized labor and social justice.
Cesar Chavez Day is a state holiday in California – one of eight states to recognize the date, and one of the few holidays in the nation dedicated to a labor leader. Sacramento and dozens of cities, counties and labor federations will celebrate the life of Cesar Chavez on March 31, 2013.
The year 2012 was the 50th. anniversary of the founding of the U.F.W. by Cesar Chavez, Dolores Huerta, Philip Vera Cruz and others. The celebrations focused on the struggle for union rights and justice in the fields of California.
The United Farm Workers (UFW) was the first successful union of farm workers in U.S. history. There had been more than ten prior attempts to build a farm workers union. Each of the prior attempts were destroyed by racism and corporate power. Chávez and Huerta chose to build a union that incorporated the strategies of social movements and community organizing and allied itself with the churches, students, and organized labor. The successful creation of the UFW changed the nature of labor organizing in the Southwest and contributed significantly to the birth of Latino politics in the U.S.
Today, under the leadership of UFW president Arturo Rodriguez, only about 25,000 farm workers enjoy benefits on the job. Wages and benefit in farm labor have again been reduced to the pre union levels. The UFW has shown unions that immigrants can and must be organized.</s>
|
<urn:uuid:e8be4351-bf42-447a-95b6-99b3ef20d585>
|
CC-MAIN-2015-32
|
http://choosingdemocracy.blogspot.com/2013_03_01_archive.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.963667
| 314
| 3.765625
| 4
|
A self-reflective essay is a brief paper where you describe an experience and how it has changed you or helped you to grow. Self-reflective essays often require students to reflect on their academic growth from specific projects or assignments, though others might require you to think about the impact of a specific event in your life. By describing your overall experience for readers, discussing your current strengths and weaknesses as they relate to the experience you wrote about and sharing your future plans for using this new information, you can paint a vivid picture of how you have grown and changed.
An introduction to a self-reflective essay is a preview of what you'll be discussing. Developing a thesis statement that illustrates the major points of your reflection can give readers a preview of the content without giving too many of the details away in the beginning. A student writing an essay on her academic growth, for example, might write as a thesis, "Through my work on my final research paper, I've learned how to do stronger research and use an objective voice, but I still need to work on structure and transitions."
Many instructors may provide you with questions to consider in your reflection. You might be asked to talk about a specific way an experience changed your attitudes or actions, a significant challenge you faced or things you would do differently if given a second chance. If the assignment does not include a prescribed list of questions, you might start by considered what your experience taught you and how it has changed you as a student or person. Specific details and anecdotes from the experience will help to clearly demonstrate your areas of growth.
Strengths and Weaknesses
Self-reflective essays may challenge you to think critically about what you are doing well and what needs to be changed as a result of the experience you're writing about. You can begin by talking about skills, responses and actions that have been strengthened by this experience, then move into a discussion of areas that need work. A student writing about being a camp counselor or doing community volunteer work might write about his strength in finding ways to relate to different kinds of people, and then discuss his need to work on his tendency to prejudge them when they first meet.
Throughout your reflection, you should make a case for how the experience has stimulated your personal growth. By the conclusion, readers should have a clear, specific idea of how the experience affected you and particular ways you have made progress. In a reflective essay, you can approach the conclusion by talking about how you plan to use what you learned from this experience in the future. For example, you can talk about how the knowledge and experiences you gained will be useful in future classes, jobs, relationships and other aspects of your life.
Style Your World With Color
Explore a range of deep greens with the year's "it" colors.View Article
Let your imagination run wild with these easy-to-pair colors.View Article
Explore a range of beautiful hues with the year’s must-have colors.View Article
Explore a range of cool greys with the year's top colors.View Article
- George Doyle/Stockbyte/Getty Images</s>
|
<urn:uuid:6115c90e-711f-42d5-83ed-692be41ef7fa>
|
CC-MAIN-2015-32
|
http://classroom.synonym.com/write-selfreflective-essay-2138.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.953857
| 634
| 3.265625
| 3
|
Netbooks vs. Notebooks
Notebook computers are lighter than the laptops we looked at in the previous section. They usually have screens ranging from 12 to 17 inches (30.5 to 43.2 centimeters) and weigh around 5 to 6 pounds (2.3 to 2.7 kilograms). Ideally, a notebook computer has the same processing power and features as larger laptop computers. Many manufacturers charge a premium price for the convenience of a small computer that packs a big punch.
The Lenovo ThinkPad X300 is a notebook computer. It has a 13.3-inch (33.8 centimeter) screen and weighs only 3.2 pounds (1.5 kilograms), making it a lightweight in the notebook category. When closed, it measures only .9 inches (2.3 centimeters) thick. It also has many of the features you'd find in a typical laptop computer: a WiFi card, a Bluetooth antenna, a dual-core processor, 1 gigabyte (GB) of RAM and a 64-GB solid-state hard drive. It also has a DVD drive and an integrated Web camera. It comes with the Windows Vista operating system.
Netbook computers are relative newcomers to the computer market. The general definition for a netbook computer is that they are smaller, less powerful and less expensive than notebook computers.
When they first began to get attention in early 2008, netbooks seemed to contradict the popular philosophy in the computer market. For many years, the prevailing strategy for computer consumers was to find the fastest, most powerful computer in their price range. But consumers are beginning to understand that they don't necessarily need a bleeding-edge computer for most of the tasks they perform. And as the Web takes a more prevalent role in computing, the processing requirements for consumer computers become less demanding.
Though people disagree on specific metrics for netbooks, in general they have screens smaller than 12 inches (30.5 centimeters) and weigh only one or two pounds (.5 to .9 kilograms). Typically they cost between $300 and $600. An example is the Asus EEE PC 4G. It weighs two pounds (.9 kilograms) and has a seven-inch (17.8 centimeter) screen. The processor is an Intel Celeron M 353/630 megahertz chip and it has 512 megabytes of RAM. It comes with a 4 GB solid-state hard drive and costs around $400.</s>
|
<urn:uuid:65e5ec49-ccb5-42e3-bba1-d6adfc6ed98b>
|
CC-MAIN-2015-32
|
http://computer.howstuffworks.com/notebook-vs-netbook-vs-ultra-mobile-pc1.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.941512
| 490
| 3.375
| 3
|
Talk to a Local Criminal Law Process Attorney
Enter Your Zip Code to Connect with a Lawyer Serving Your Area
Once an accused individual, or defendant, is arrested for allegedly committing a crime, there are certain legal proceedings that’ll occur. The defendant will be booked by the police. This means that he’ll be fingerprinted, photographed and put in a holding cell. The defendant will remain in the cell until his initial appearance. An initial appearance is the first proceeding in front of a judge.
The police may also release a defendant on bail. This means that the defendant or a third party pays or pledges to pay a set amount of money to allow the defendant’s temporary release. The defendant is obligated to return for the initial appearance.
Purpose of Initial Appearance
There are two important reasons for an initial appearance. The first reason is to inform the defendant of his legal rights. The defendant may not be aware of what exact rights he has after his arrest. The judge will inform him of these rights to help him in his decisions.
The second reason for an initial appearance is to prevent coercive interrogation by the police. The defendant is entitled to an initial appearance without unnecessary delay after he’s arrested. If there’s a long delay, the police may attempt to secure a confession using improper techniques. The defendant is entitled to be fully advised of his rights by the judge.
Some states may combine the initial appearance with the arraignment. An arraignment is a proceeding before the court where the charges are formally read to the defendant. He may also enter a plea to the charges at this proceeding. A plea is the defendant’s answer to the charges.
Rights of Defendant at Initial Appearance
There are certain key rights that the defendant must be informed of at the initial appearance. Some rights may depend on whether the defendant is being charged with a felony or a misdemeanor. A felony is a crime that’s punishable by death or imprisonment for more than one year. A misdemeanor is a crime that’s punishable by a fine or imprisonment less than one year.
States vary as to what rights the defendant must be told at the initial appearance. If the defendant is charged with either a misdemeanor or a felony, the judge must usually inform him of:
The judge will decide whether to allow the defendant to be released on bail. The defendant is entitled to a reasonable opportunity to consult with a lawyer. Most states will appoint an attorney if the defendant is too poor to obtain one. However, the defendant may not have a right to a court-appointed lawyer if he’s only charged with a misdemeanor.
Warrantless Arrest of Defendant
Judges are extra careful at the initial appearance if the defendant was arrested without a warrant. A warrant is an official order from a judicial officer that authorizes the police to arrest a defendant. Judges want to prevent the unlawful detention of suspects by police.
If there’s no warrant, the judge must determine whether there’s probable cause to justify the arrest of the defendant. Probable cause means that that there’s a reasonable ground in the facts and circumstances for a belief that the defendant committed the crime. If there’s no probable cause, the judge will have the defendant released from custody. This determination will be made at the initial appearance or a probable cause hearing soon after.
Remedy for Unreasonable Delay
If there’s an unreasonable delay between the time the defendant is arrested until his initial appearance, the judge will normally suppress any confession or statements made during this delay. Courts will vary as to what’s an unreasonable delay. There’s no set time that constitutes a delay that’s unacceptable. Each case is determined on its own facts and circumstances.</s>
|
<urn:uuid:9f7b4c6a-3d38-4e25-bc05-0b66947cc69a>
|
CC-MAIN-2015-32
|
http://criminal.lawyers.com/criminal-law-basics/initial-appearance-in-court-after-an-arrest.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.951222
| 772
| 2.53125
| 3
|
BY FREDDIE ALLEN
NNPA WASHINGTON CORRESPONDENT
WASHINGTON – Even before they typically learn to read, Black preschoolers – some as young as 4 years old – are taught a disgusting lesson: They are three times more likely to be suspended from school than their White classmates, according to a recent study by the civil rights division of the U.S. Department of Education.
“Black students are suspended and expelled at a rate three times greater than White students. On average, 5 percent of White students are suspended, compared to 16 percent of Black students,” the Department of Education study found.
Black children account for 18 percent of the nation’s preschoolers, but nearly half of students in that age group suspended more than once, compared to White children who represent 43 percent of preschoolers and 26 percent of students suspended more than once, according to the report.
High in Florida
Daniel Losen, director of the Center for Civil Rights Remedies for the Civil Rights Project at UCLA, told the Associated Press: “Just kicking them out of school is denying them access to educational opportunity at such a young age. Then, as they come in for kindergarten, they are just that much less prepared.”
Florida, Indiana, North Carolina, Rhode Island, and South Carolina reported the widest gaps in the racial disparity suspensions between Black and White students. New Jersey, New York and North Dakota reported the smallest gaps.
Black students also account for nearly 30 percent of students referred to law enforcement in what many civil rights advocates have called the school-to-prison pipeline.
“Black students represent 16 percent of student enrollment, 27 percent of students referred to law enforcement, and 31 percent of students subjected to a school-related arrest. In comparison, White students represent 51 percent of students enrolled, 41 percent of referrals to law enforcement, and 39 percent of those subjected to school-related arrests,” stated the report.
For the first time in 14 years, the Education Department collected data from all 97,000 public schools and its 16,500 school districts, responsible for 49 million students.
“This data collection shines a clear, unbiased light on places that are delivering on the promise of an equal education for every child and places where the largest gaps remain. In all, it is clear that the United States has a great distance to go to meet our goal of providing opportunities for every student to succeed,” Secretary of Education Arne Duncan said in a press release. “As the President’s education budget reflects in every element – from preschool funds to Pell Grants to Title I to special education funds – this administration is committed to ensuring equity of opportunity for all.”
The Education Department report comes on the heels of research funded by the Atlantic Philanthropies and the Open Society Foundations that showed that implicit bias contributes to racial disparities in student suspension rates from kindergarten to the 12th grade.
‘Misperceived’ to be adult
In a study titled, “The Essence of Innocence: Consequences of Dehumanizing Black Children,” researchers from the University of California, the National Center for Post-Traumatic Stress Disorder, and the University of Pennsylvania, concluded that after 9 years old, “Black children and adults were rated as significantly less innocent than White children and adults or children and adults generally.”
A majority of the survey participants were White women, the same group that is also over-represented among public school teachers.
Researchers found that Black boys may be perceived as more than 4.53 years older than their actual age, which meant that a 13 year-old might be “misperceived” to be an adult by law enforcement officials.
The report continued: “These outcomes are particularly worrisome for Black children, who are 18 times more likely than White children to be sentenced as adults and who represent 58 percent of children sentenced to adult facilities, the report stated.
Holder: Work together
In recent speeches Attorney General Eric Holder has urged school administrators, lawmakers and parents to work together to dismantle the school-to-prison pipeline that often has far-reaching consequences for young people that get swept up into the criminal justice system.
Holder said that the report was critical and showed that racial disparities in school discipline policies are not only well-documented among older students, but actually begin during preschool.
“Every data point represents a life impacted and a future potentially diverted or derailed,” Holder said. “This administration is moving aggressively to disrupt the school-to-prison pipeline in order to ensure that all of our young people have equal educational opportunities.”</s>
|
<urn:uuid:99cd833e-8158-4a94-a230-8196a7c53860>
|
CC-MAIN-2015-32
|
http://daytonatimes.com/2014/04/black-preschoolers-suspensions-triple-that-of-whites/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.958982
| 960
| 2.90625
| 3
|
Parsley seeds can be difficult to start. They often take 3-4 weeks to germinate and then grow very slowly. If you only want a few parsley plants, it’s easiest to buy them as small plants from a nursery. If you are determined to start your own from seed, soak the seeds in warm water overnight before planting.
Parsley grows best in cool soil and will tolerate some shade. In hot climates the plants will benefit from afternoon shade. Although you can start harvesting parsley any time, you can expect the plants to mature in about 75 days.
Parsley is available in two basic forms: flat-leafed (also called Italian) and curly-leafed. Curly-leafed is the most attractive, and is often used as a garnish in restaurants. It can even be used in flower arrangements. Most cooks prefer the flat leafed type, believing it to be more flavorful.
Parsley is a biennial, so there is no need to worry about it going to seed in the first year. If your parsley plant survives the winter in your garden, or if you decide to bring it indoors, you can expect to get about a month of usable leaves in early spring before the plant sends up a flower stalk, goes to seed and then dies.
Parsley freezes well (chop it in a food processor and freeze it in plastic bags) and it also dries well. To dry parsley, use a food dehydrator at a low temperature, or put it on a rack in the oven with the pilot light on. Store dried parsley in an airtight container, away from sunlight.
Parsley doesn’t have a problem with cold temperatures. In the fall you can use or store what you need, and leave the plant right in the ground. Even in cold parts of the country you should be able to go outside on Thanksgiving Day and pick some– even if you have to shovel snow off the plants.</s>
|
<urn:uuid:5c8fa209-04e6-4b1c-8b0c-2938b761f568>
|
CC-MAIN-2015-32
|
http://demandware.edgesuite.net/aabf_prd/on/demandware.static/Sites-Gardeners-Site/Sites-Gardeners-Library/default/v1358521219468/Articles/kgp/assets/parsley.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.953099
| 410
| 2.75
| 3
|
You will benefit from using residential wiring diagrams if you plan on completing electrical wiring projects in your home. An electrical wiring diagram can be as simple as a diagram showing how to install a new switch in your hallway, or as complex as the complete electrical blueprint for your new home.Although household electricity is nothing to play around with, in many ways, wiring is simpler than other repair and remodeling skills such as carpentry. Once you’ve learned some basic skills such as installing boxes, running cable, and splicing, you just need to determine which wire goes where. This is why a good wiring diagram is important for wiring your home safely. Keep your diagrams near-by. You’ll want to refer to them often as you work on your project.Wire Colors:Electrical wiring diagrams that are in color have an advantage over ones that are black and white only. The wires will be colored the same as the actual wires you will be using. Commonly, the green wire is ground, white or off-white is neutral, and black, red or other colors indicate the hot wire. In some instances, such as some switch legs, the function of the wires will be indicated by colored electrical tape.Symbols:When looking at any residential wiring diagram, start by familiarizing yourself with the symbols that are being used. The electrical symbols will not only show where something is to be installed, but what type of device is being installed. Make sure you understand the symbols on your diagram before beginning your project. There should be a chart on your diagram showing the different symbols being used, much like a legend on a map.For example, a surface ceiling light will be shown by one symbol, a recessed ceiling light will have a different symbol, and a surface fluorescent light will have another symbol. Each type of switch will have a different symbol and so will the various outlets. You’ll even find symbols showing the location of smoke detectors, your doorbell chime, and the thermostat.Switches:When it comes to household electricity, there’s a lot more to consider than simply turning a switch On and Off. Some of the most common questions electricians receive involve switches. Once you understand the different types of switches and follow a good wiring diagram, you should be able to install a new switch in your home.Here are some of the more common switching configurations:A Single-Pole Switch provides switching from one location only. “Single-Pole” may sound simple, but there are different ways to wire a Single-Pole Switch and a set of electrical wiring diagrams will explain each of them to you clearly.3-Way Switches are used to control one or more fixtures from two locations. This is a common configuration in hallways and staircases. There are many ways to wire a 3-Way Switch. The power can start at a fixture or either of the two switches. Without a wiring diagram it can be very easy to make a serious mistake.A wiring diagram will even take the mystery out of wiring a 3-Way Dimmer Switch. What a great way to enjoy softer light and a reduced energy bill!One of the most complicated wiring configurations is a 4-Way Switch. These switches enable you to control one or more fixtures from three or more locations. It would be almost impossible to write the instructions in a way that you could simply read them and complete your project. However, a good wiring diagram will make it possible for you to successfully and safely tackle wiring 4-Way Switches.As important as electrical wiring diagrams are to the successful completion of your wiring project, safety and respect for electricity are essential. Never work on live circuits. Before you begin your project, identify the circuit you’re working on and then turn off power to that circuit at the main panel. Then confirm that the power is off with a voltage tester. If at any time you feel unsure about what you’re doing, please call a licensed electrical contractor.
More information on residential wiring diagrams and diagrams for all of these switches can be found in the Residential Wiring Diagrams section of my website: Ask-The-Electrician.com.
Dave Rongey is a Licensed Electrical Contractor with over 35 years of experience. He is also an avid Do It Yourselfer. Through the years Dave has seen too many DIY projects that are serious fire and safety hazards. Visit Dave at Ask-The-Electrician.com for electrical project guides, complete with photographs, which will enable you to enhance the beauty and value of your home safely.
Last search terms ~~</s>
|
<urn:uuid:923dea62-215a-4421-862c-e40531564e6f>
|
CC-MAIN-2015-32
|
http://diagramwiring.net/search/s40+volvo+belt+routing+diagram/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.92772
| 937
| 3.078125
| 3
|
That surely is the perfection of description; whilst the wimple of the burn is echoed in the music of the verse!
She stopped short, drew her wimple round her face, and was gone.
The wimple or gorger is stated first to have appeared in Edward the First's reign.
On the early brasses the wimple under the chin marked the rank of the wearer.
Turning into his own house Bradford found Alice with her wimple and scarf on just about to leave it.
Her wimple is trimly plaited, and how fashionable is her cloak!
wimple, wim′pl, n. a hood or veil folded round the neck and face (still a part of a nun's dress): a flag.
Here is a candle-end, which you must hide under your wimple.
The Wife of Bath has the wimple below her broad hat and rides in a foot mantle about her hips.
The top of this head-dress is covered with a wimple, which is sometimes stiffened with wires.
"head covering for women," especially worn by nuns, Old English wimpel, from Proto-Germanic *wimpilaz (cf. Old Saxon wimpal, Old Frisian wimpel, Middle Dutch, Dutch wimpel, Old High German wimpal, German wimpel, Old Norse vimpill), of obscure origin. Old French guimple (French guimpe) is a Germanic loan-word.
Isa. 3:22, (R.V., "shawls"), a wrap or veil. The same Hebrew word is rendered "vail" (R.V., "mantle") in Ruth 3:15.</s>
|
<urn:uuid:23b88eb5-069f-4a5b-b8e6-d93adee1c1cb>
|
CC-MAIN-2015-32
|
http://dictionary.reference.com/browse/wimple?qsrc=2446
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.953721
| 369
| 2.734375
| 3
|
The focus is on the programming process, with special emphasis on debugging. The book includes a wide range of exercises, from short examples to substantial projects, so that students have ample opportunity to practice each new concept.
This package is listed in the following Collections:
|License||Verified by||Verified on||Notes|
|GFDL||Algot Runeman||20 December 2013|
Leaders and contributors
|Allen B. Downey||original author|
Resources and communication
|Learners of Python||Homepage||http://www.thinkpython.com/|
|Required to use||Book teaches Python programming|
This entry (in part or in whole) was last reviewed on 20 December 2013.</s>
|
<urn:uuid:9d5b24e3-94f2-445b-b98f-f0a28045f2c0>
|
CC-MAIN-2015-32
|
http://directory.fsf.org/wiki?title=Think_Python
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.821642
| 149
| 2.640625
| 3
|
The /etc/patch/pdo.conf file is used to specify the number of processes that are forked to execute the patch utilities in a parallel fashion on a zoned system.
This file is used by the pdo binary which the patching utilities are linked to after a patch has been successfully added or removed from the global zone.
In the current version of pdo.conf file, there is only one entry that is present. As future changes could be made to this pdo.conf, no application other than the patching utilities should rely on the layout of this file.
Entries in the pdo.conf file have the following format:
The following definitions are part of the format:
Key for this record. Specifies the number of process to fork that are used by the patching utilities
Standard delimiter used for parsing the record
Value for the key determining the to be forked processes.
The value of the actual number of processes is determined by the following three factors:
Number of online CPUs
Number of non global zones in the system
This value is set to 1 by default, which means that old (serial) patching behavior is followed.
If the value of num_proc is less than the online CPUs and zones in the system, then this value is used. However, if it is greater than the number of online CPUs but less than the number of zones, then a value equal to the 1.5 times the number of online CPUs is used. If the value of num_proc is more than then number of zones present, then the minimum of the number of 1.5 times of online CPUs and number of zones are used to fork processes.
The pdo.conf file uses the following rules for parsing:
There can be any number of white space characters anywhere in the file
There can be only one valid entry in this file of the form discussed above, parser returns a failure if such an entry is not present.
An entry which starts with #character is considered to be a comment and are not be processed
An entry can begin with any number of white space characters and then followed by an ascii character. The following character should be forming a string of the form num_proc. If such a string is not found, parsing returns an error.
If num_proc string is found in an entry, then the next valid character can only be a = character. Its an error if such a character is not found
The next character following = can not be a ascii character which is not a digit. If such an ascii character is present its an error.
Having parsed all digits after = character, parser proceeds to check if there are any white space characters following the last digit or is it immediately followed by an ascii character which is not a space but either # or any other ascii character. If such an occurrence is there, then it is an error.
The parser literally follows all the above rules until it finds an entry which matches all the rules which means that the parser has successfully parsed the configuration file
# # This file contains key value pair of the following format. There # is only one legal entry which starts with num_proc key. This key # is followed by a delimiter '=' which is then immediately followed # by a value which determines the number of processes to be forked. # To get better performance, it is advisable to keep the num_proc # value equal to the number of online CPUs in the system. For more # details read the section 4 man page of /etc/patch/pdo.conf # # Format: # # num_proc=<num_of_processes> # # where: # # num_proc is the key for this record. It specifies # the number of process # to fork that will be used by the patching utilities # # = the standard delimiter used for parsing the record # #<num_of_processes> the value for the key determining the to be forked # processes # The value of actual number of proceses is determined # by the # following three factors mentioned in 'Factors # determining # procesesse to be forked' num_proc=10 # fork 10 processes
See attributes(5) for descriptions of the following attributes:</s>
|
<urn:uuid:f50040a9-4e92-4850-93b7-0c59b4d334ae>
|
CC-MAIN-2015-32
|
http://docs.oracle.com/cd/E19253-01/816-5174/pdo.conf-4/index.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.8882
| 888
| 2.8125
| 3
|
The $ORIGIN command is a way of changing the origin in a data file. The line starts in column 1, and is followed by a domain name. It resets the current origin for relative domain names (for example, not fully qualified names) to the stated name. This is useful for putting more than one domain in a data file.
You cannot use $ORIGIN() for putting more than one zone in a data file.
Use of $ORIGIN commands in a data file is optional. If there is no $ORIGIN() statement the default origin for DNS data files is the domain named in the second field of the primary or secondary line of the named.conf file.</s>
|
<urn:uuid:c8f4b2ee-e112-4890-a4c4-ac587787bd19>
|
CC-MAIN-2015-32
|
http://docs.oracle.com/cd/E19455-01/806-1387/ad1intro-24/index.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.866739
| 144
| 2.78125
| 3
|
What you eat during your pregnancy has a direct effect on the growth and development of your baby. It is important to eat a well-balanced diet that includes lean meats or meat alternatives, whole grains, low-fat dairy products, and plenty of fruits and vegetables. In addition to increasing your consumption of healthy foods, there are certain foods you need to limit or avoid. Some foods contain substances that can affect your baby’s development, while others put you at risk of developing an infection that can be passed to your baby.
Fish and Shellfish
Mercury is naturally found in the environment and is also released by industrial pollution. When mercury settles into water, it is converted into methylmercury, a more dangerous form. Methylmercury can build up in the fatty tissue of fish. Most fish contain trace amounts of methylmercury, which is unlikely to cause harm. But, large, predatory fish can contain high levels of methylmercury.
The United States Food and Drug Administration (FDA) and the Environmental Protection Agency (EPA) provide these recommendations for women who may become pregnant, are pregnant, or are nursing:
- Do not eat fish that contain high levels of mercury, including swordfish, shark, king mackerel, and tilefish.
- Eat up to 12 ounces (340 grams) of fish containing low levels of mercury per week. Fish containing low levels of mercury include shrimp, canned light tuna, salmon, pollock, and catfish. Because white tuna and tuna steak contain higher levels of mercury, women are advised to eat no more than 6 ounces of these fish per week.
- If you usually eat locally caught fish, check advisories about the safety of the fish. If there are no advisories, limit your intake to 6 ounces (170 grams) per week. If you eat local fish, do not eat any other fish during that week.
Pregnant women should also avoid raw and undercooked fish, especially shellfish, such as oysters or clams, because they can contain disease-causing organisms. Cook fish until it is opaque and flakes easily with a fork.
Ready-to-Eat Meats and Soft Cheeses
Unpasteurized soft cheeses and ready-to-eat meats should be avoided during pregnancy because they may contain bacteria that causes listeriosis, a form of food poisoning that is especially harmful to unborn babies. Listeriosis is associated with miscarriage , premature delivery or stillbirth, and serious illnesses in newborn babies.
To avoid listeriosis, take these steps:
- Avoid eating hot dogs or luncheon meats that have not been reheated until steaming hot, or 160°F.
- Do not eat soft cheeses, such as feta, brie, Camembert, Roquefort, or Mexican soft cheeses, unless they are made with pasteurized milk.
- Avoid refrigerated pâtés or meat spreads.
- Avoid refrigerated smoked seafood unless it has been cooked.
- Do not consume unpasteurized milk or foods made from it, such as eggnog or Hollandaise sauce.
Undercooked Meat and Eggs
Undercooked meat, including poultry and eggs, should be avoided during pregnancy. These foods can increase your risk of a number of foodborne illnesses, including listeriosis, E. coli, Campylobacter infections, salmonellosis, and toxoplasmosis.
To ensure your meat is well-cooked, use a meat thermometer. Follow these temperature guidelines when cooking food:
Pregnant women should also avoid eating raw vegetable sprouts, such as alfalfa, clover, or radish, and unpasteurized fruit or vegetable juices. These can carry disease-causing bacteria.
In addition, pregnant women should limit their consumption of liver, since it contains high levels of vitamin A, which could potentially cause harm to a developing baby.
Food Preparation Tips
When preparing and handling foods, the March of Dimes recommends you take the following precautions to avoid foodborne illnesses:
- Before and after handling food, wash your hands with soap and hot water.
- Wash any item or area that comes in contract with raw meat, poultry, or fish.
- Separate ready-to-eat food from raw meat, poultry, or fish.
- Before eating raw fruits and veggies, rinse them and use a scrub brush to remove dirt.
- Take the outermost leaves off of lettuce and cabbage.
- Refrigerate leftovers within 2 hours after eating. Also, avoid eating cooked food that has been out of the refrigerator for more than 2 hours.
- Keep your refrigerator temperature below 40ºF (4ºC) and your freezer at 0ºF (-18ºC) or below. Buy a thermometer to check the temperature.
- Reviewer: Michael Woods, MD
- Review Date: 04/2015 -
- Update Date: 04/16/2015 -</s>
|
<urn:uuid:f6f9d6e2-d64b-4c77-8ac9-1e2586d4b862>
|
CC-MAIN-2015-32
|
http://doctors-hospital.net/your-health/?/101118/Reducing-food-borne-risks-during-pregnancy
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.931911
| 1,027
| 3.34375
| 3
|
Dragons are creatures with nearly unlimited life spans. They can survive for long periods of time, and no one has found a dragon that has died of old age. Adolescence is usually marked by the growth of a hatchling’s wings, although not all breeds of dragons grow wings and some breeds have other traits that indicate the beginning of maturation. Once they hit adolescence, hatchlings change quickly, maturing to their full forms in only 2 years.
Dragons don’t communicate with each other verbally, but they will growl to scare off predators and frighten prey. Young dragons will emit an extremely high-pitched squeal when they are frightened. To communicate, they use telepathy with each other and to speak to other creatures.
Waterhorse dragons received their name due to their horse-like physique and endearing behavior. They are capable of surviving out of water, and when on land their skin secretes a gelatinous goo to retain moisture. However, their large paddle feet are better suited for swimming, and waterhorse dragons tend to move very awkwardly when on land. Waterhorses are very friendly dragons and enjoy playing with humans.</s>
|
<urn:uuid:50799d4a-9380-4801-8a71-de280d30ab66>
|
CC-MAIN-2015-32
|
http://dragcave.net/view/nQRNm
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.966477
| 238
| 3.015625
| 3
|
15 Feb 2013:
Meteor Strike in Siberia
Rains Down Debris and Injures 1,000
A 10-ton meteor broke apart 20 to 30 miles above the ground in western Siberia,
raining chunks of debris over a large area, causing a powerful boom that damaged buildings across a vast territory, and injuring more than 1,000 people, mostly from shattering glass. The Russian Academy of Sciences said the meteor, known as a bolide, streaked through the earth’s atmosphere near the Ural mountain city of Chelyabinsk, 950 miles east of Moscow, around 9 a.m. local time Friday. It lit up the sky with a fireball that could be seen for hundreds of miles and that was captured on video by scores of observers. Pieces of the disintegrating meteor fell into a lake about 50 miles west of Chelyabinsk, and scientists and local officials said the damage and injuries could have been far worse had chunks of the meteor fallen on Chelyabinsk itself. As it was, the meteor strike shattered windows, TV sets, and dishes across a wide area, which caused most of the injuries. Most meteors that strike Earth disintegrate in the atmosphere, but this meteor was made of exceptionally hard material and did not fully burn up as it approached Siberia, scientists said.
Yale Environment 360 is
a publication of the
Yale School of Forestry
& Environmental Studies
Yale Environment 360
articles are now available in Spanish and Portuguese on Universia
, the online educational network. Visit the site.
Business & Innovation
Policy & Politics
Pollution & Health
Science & Technology
Antarctica and the Arctic
Central & South America
Photographer Robert Wintner documents the exquisite beauty and biodiversity of Cuba’s coral reefs, which are largely intact thanks to stifled coastal development in the communist nation. View the gallery.
is now available for mobile devices at e360.yale.edu/mobile
The Warriors of Qiugang
, a Yale Environment 360
video, chronicles a Chinese village’s fight against a polluting chemical plant. It was nominated for a 2011 Academy Award for Best Documentary Short.
Watch the video.
Top Image: aerial view of Iceland
. © Google & TerraMetrics.
A three-part series Tainted Harvest
looks at the soil pollution crisis in China, the threat it poses to the food supply, and the complexity of any cleanup. Read the series.</s>
|
<urn:uuid:157b780f-90bf-4cdc-b077-b3ce3e7aee83>
|
CC-MAIN-2015-32
|
http://e360.yale.edu/digest/meteor_strike_in_siberia__rains_down_debris_and_injures_1000_/3769/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.902946
| 510
| 3.4375
| 3
|
Online petitions and a well-funded legal challenge aside, South Fork local officials who are moving toward large-scale killing of deer, politely called culling, have a difficult time ahead. Leadership is never easy when policy gets mixed up in emotion, and wildlife management is one of the most emotional aspects of government. Few other issues draw as much attention and heat from the public, making the job of deciding how to proceed fraught with tension from the start. But rational, dispassionate policy-making must be foremost in such instances. The key for officials is studying precedents in other communities and what science says.
The problems are well understood. A spike in deer populations in the eastern United States has come at the same time as sharp increases in the type and number of disease-carrying ticks. Deer cause huge and nearly unmeasurable damage to landscaping and crops. Those struck by vehicles often meet terrible, painful deaths, which are heart-wrenching for us. Deer have radically altered the forest understory in many places, leading to habitat loss for other native species, such as songbirds and small mammals, and threatening biodiversity.
Deer are not the only large animals for which aggressive control measures are being taken. Black bears as nearby as suburban New Jersey have adapted to life close to people and are being targeted by wildlife managers. Time magazine featured a cover story this month about what it called America’s “pest problem.” Expanded hunting and professional harvests have been pursued from Florida to California. Closer to home, Block Island officials recently voted to hire sharpshooters to reduce the deer herd from 800 to 100 individuals, according to low estimates. The target there is to maintain the deer population at 10 to 15 per square mile.
No one knows for sure precisely how many deer there are on the South Fork, and their distribution is not in even numbers across the island. The Town of East Hampton’s two surveys came in with widely disparate numbers — 877 in a March aerial study and 3,293 in a 2006 roadside count. Estimates of the density in East Hampton Town are all over the map, but could be as high as 100 per square mile. Though a clearer total should be known before a long-term program is undertaken, by all appearances there are just too many deer. There are few residents who have not at one time or another struck a deer on the road or had someone in the family touched by tick-borne illness. And now there is a rising count of people with a serious and life-threatening allergy to red meat caused by the bite of the lone star tick.
Those opposed to hunting claim there is no valid link between deer and ticks, but scientific studies say otherwise. Large, warm-blooded hosts such as deer have been clearly implicated in this regard — one must not overlook that it is the deer tick that carries Lyme disease as well as babesiosis, ehrlichia, and borrelia. True, the rodents that larval ticks first feed on are believed to be the reservoirs for the illness-causing spirochetes, but it is undisputable that concentrations of all tick varieties have soared along with the deer’s numbers.
A public health crisis is under way, with deer clearly implicated. Research has demonstrated that maintaining deer at 8 to 12 per square mile essentially eliminates ticks and the diseases in humans. Deer birth control has not proven to be an adequate alternative to hunting. Nor does applying pesticides at feeding stations solve the problems of habitat devastation and deer-vehicle collisions. It is also not acceptable for residents to have to avoid the woods and wild places for fear of ticks in other than the coldest months.
Those passionately opposed to the planned killing appear to overlook the fact that the present environment is one in which nature’s balance has been overturned by centuries of human presence. In the case of deer and other highly adaptable wildlife, there still is no substitute for lethal management.</s>
|
<urn:uuid:72fba1d5-faec-42c7-8434-536de20b3148>
|
CC-MAIN-2015-32
|
http://easthamptonstar.com/Editorials/20131224/Taking-Aim-Deer
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.967865
| 810
| 2.984375
| 3
|
When you're designing an electrical system for a building, don't let elevator requirements bring you down.
The many codes and guidelines that regulate the electrical design of an elevator can seem overwhelming, and dealing with the electrical inspector, elevator inspector, and Fire Marshal can be even more intimidating. As they review the plans and the construction site, they may have conflicting interpretations or requirements. And as the designer, you can become the fulcrum on which all of these requirements and authorities exert their leverage, but an understanding of elevator basics can help you handle the pressure.
The two main types of elevators are hydraulic and traction. Hydraulic elevators comprise a hydraulic reservoir, pump, cylinder, and controller. The pump sends hydraulic fluid from the reservoir to the cylinder, buried deep below the elevator shaft. Fluid pressure in the cylinder raises and lowers the elevator cab. Limit switches placed throughout the height of the shaft communicate with the controller and stop the cab at each landing. Cylinders in hydraulic elevators usually aren't suitable for buildings taller than five stories. In such cases, it's economically justifiable to specify a traction type elevator.
Traction elevators raise and lower the elevator cab with cables, a pulley system, and counter weights powered by a motor at the main drive wheel. Motors for traction elevators were traditionally DC or synchronous, but new installations use AC motors and VFDs for speed control.
The elevator equipment room that serves a hydraulic elevator is almost always located on the lowest floor adjacent to the elevator shaft. A traction elevator's equipment room is typically located at the top of the building, directly over or adjacent to the shaft.
Your elevator supplier will take care of all the wiring and related code requirements for the elevator cab and the various controls. You'll be responsible for specifying the items related to the fire alarm and some controls, as well as supplying lighting and power to the equipment room and elevator pit.
First, you'll need to install lighting in the elevator equipment room (Photo 1) and shaft pit (Photo 2). Luminaires must be lensed or equipped with wire guards to protect the lamps. The light switch for the equipment room must be adjacent to the entrance door on the latch side. The light switch in the pit must be mounted 42 in. above the seal plate, adjacent to the ladder. You need at least one 120VAC GFCI-protected receptacle at each location. The circuit(s) for the lighting and receptacles must be dedicated to the elevator area only.
Power for the elevator controller must first enter a lockable safety disconnect device, located adjacent to the door of the equipment room. This device must be either a fused disconnect or a circuit breaker because ANSI/ASME A17.1 requires you to install an additional overcurrent protection device (OCPD) in the elevator equipment room. A separate 120VAC, 15A circuit is required for cab lighting and accessories, and it must have its own local disconnect and OCPD in the equipment room as well. You must run a separate insulated grounding conductor with the feeder conductors from the electrical source to the elevator controller. The conduit alone can't act as the grounding means.
Elevator cab lights require emergency back-up power. If the building has emergency power available, use it to supply the cab lights. Otherwise, specify that the elevator supplier provide a battery back-up unit to power the lights in the event of an outage.
You'll need to run telephone cables to the equipment room control panel, but the elevator supplier will take care of getting the cables to the elevator cab. The Americans with Disabilities Act Accessibility Guidelines for Buildings and Facilities (ADAAG) now require the cab to have a special phone accessible by individuals with disabilities. In the event of a breakdown, that phone must automatically call a location staffed 24 hours a day.
Smoke detectors, which are required in all elevator lobbies and elevator equipment rooms, must be connected to the elevator controllers directly by means of auxiliary contacts and wiring, or indirectly by means of output signals from the fire alarm control panel. If a smoke detector goes into alarm, it signals the elevator to go into “Fire Recall Function,” at which point the controller directs the elevator cab to travel to its pre-programmed designated landing, open its doors, and remain stopped there until the alarm clears. The floor specified as the designated landing, which must be approved by the Fire Marshal, is usually the floor on grade level so passengers can quickly exit to the outside.
If the smoke detector at the designated landing goes into alarm, the elevator will stop at a predetermined alternate floor, which is usually the floor above the designated floor. However, this can vary depending on building conditions and exterior grade. Therefore, there will be two signals to the elevator control panel related to smoke detectors: one from the “designated floor” smoke detector and another combined signal from the smoke detectors at the other lobby landings and in the equipment room.
Regardless of the number of elevators, only one smoke detector is required at each floor lobby, but it must be located within 21 ft of every elevator door. Be sure to provide a horn/strobe alarm in large equipment rooms because they can be noisy, isolated places.
To safeguard the passengers and electrical equipment, ASME A188.8.131.52.3.2 requires the power source to the elevator control panel to shut down prior to the discharge of water from a sprinkler head. Depending on your local codes, you can do this by installing heat or smoke detectors within 24 in. of the sprinkler heads.
If a hydraulic elevator loses power because a heat detector goes off — or for any other reason — it could trap occupants for an unpleasant amount of time. To avoid this situation, designers can specify elevator controls with a safety feature commonly called a rescuvator. Upon loss of power, the rescuvator controls the cab, lowers it to the designated floor, and opens its doors. If you specify a rescuvator, you must also specify a disconnect switch with an auxiliary contact that opens when the disconnect arm moves to the open position, but stays closed when the OCPD trips. This switch will ensure that the elevator won't descend into the elevator pit and allow maintenance people to work safely in the area beneath the cab.
Where a feeder powers more than one elevator, you need selective coordination; the OCPDs must be series-designed so a fault at one of the elevators will be cleared by only the OCPD serving it. The feeder OCPD needs to remain closed so the remaining elevators have power and continue to function.
Modern electronic elevator controls can be sensitive to temperature shifts. Therefore, elevator equipment rooms must maintain a temperature between 50°F and 90°F. This will normally require you to vent the room with a fire/smoke damper and include smoke detector signals in the control logic.
If your specifications require a vent at the top of the shaft for venting smoke, you must provide a key switch with a pilot light to control that vent. You must locate this key switch at the main lobby or at the building fire command center.
The new ADAAG guidelines now require that emergency power be available to elevators that have four or more stories of travel above or below the accessible floor [4.1.3(9)(1)].
If you provide your elevators with emergency power, you must run communications wires between the automatic transfer switch (ATS) and the elevator control panel. This accomplishes two functions. First, the ATS signals the elevators that it's about to switch over to emergency power — preferably 30 sec or more prior to switching, which allows the elevator controller to bring each elevator cab to the nearest landing and stop, thus protecting the motors and electrical system. Next, with multiple elevator banks, the controller will usually allow only one elevator at a time to operate, reducing the amount of emergency power required.
High-rise buildings pose additional concerns. The Uniform Building Code requires two-way communications between the central command center and the elevators, each elevator lobby, emergency power rooms, and by entries into enclosed stairways (Section 403.5.3). Fireman telephone jacks and telephone cabling are typically sufficient for each of these locations. Firefighters can then use portable telephone handsets in combination with the jacks and cabling.
The various items to consider and check when designing for elevator installations have many potential pitfalls. But by understanding how these items fit together and what purpose they serve, you can have a successful project. Always verify all conditions and requirements with the state and the AHJ where the installation is taking place.
Granle is a licensed professional engineer with Sebesta Blomberg & Associates, Rochester, Minn.</s>
|
<urn:uuid:83c4fdc0-dc6f-436a-8378-7002ceff8037>
|
CC-MAIN-2015-32
|
http://ecmweb.com/content/electrical-ups-and-downs-elevator-design
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.923971
| 1,799
| 2.953125
| 3
|
- International adoptions from Uganda are rising
- The country is not a signatory to the treaty offering a blueprint for international adoptions
- One rights worker says many vulnerable children are at risk
- Others say international adoptions give the children a better life
Uganda is one of the poorest countries on earth with an economy based on agriculture but there is one industry that's booming -- international child adoptions.
Extreme poverty combined with one of the world's highest birth rates is creating a pressure cooker where many children are abandoned or put up for adoption.
And there are also fears that as the adoption numbers grow more needs to be done to prevent children being exploited.
Children -- sometimes orphans, sometimes just with parents unable to care for them -- find themselves taken into Uganda's child welfare system.
For some this can mean foster care or a temporary home. For others it is the first step on a road that will lead to adoption and a new life.
While traditional adoption hotspots are becoming less attractive -- Russia has banned Americans from adopting children, and it can take years to navigate China's adoption bureaucracy -- Uganda is seen as a quick and easy alternative for prospective parents.
In Uganda, the adoption process can take just a few months to complete. The country is not a signatory to the Hague Convention, a treaty which provides a blueprint for safe international adoptions.
Many of the children adopted from Uganda are given a better shot at life overseas - certainly in material terms -- but the speed and ease of the process has many observers worried.
Freda Luzinda worked at the U.S. Embassy in Kampala, Uganda, for two years processing adoption visas. She is now the Uganda national director of the A Child's Voice, an NGO promoting child rights and welfare.
She says that many birth parents in Uganda don't fully understand what adoption actually means and that there is no word for 'adoption' in the local Luganda language.
"I can say that about 60% of the birth parents that I spoke to didn't understand adoption," said Luzinda.
Many birth parents do not understand that adoption is permanent. They believe they may get their children back later. These misconceptions are part of the problem, but not the only problem.
The rise in Ugandan adoptions over the past few years has created a growing number of orphanages and adoption agencies to meet the demand.
"When I first started processing visas at the embassy... there were probably between seven and 10 orphanages that were putting children up for adoption. And the numbers grew, and they grew, and they grew. By the time I finished, and this was two years later, we had a count, and we were dealing with about 100 orphanages." said Luzinda.
The explosive growth of the adoption industry in Uganda has fueled fears that children are being exploited for profit and that the best interests of the child is not paramount.
"Orphan creation does happen a lot in Uganda, and this is done by adoption facilitators who will go and scout the slums, find vulnerable families and talk them into giving up their children," said Luzinda.
In the 12 years from 1999-2010 there were just 311 adoptions from Uganda to the U.S. In 2011 alone -- the last year for which State Department numbers are available -- 207 children were adopted to the U.S. from Uganda.
Brothers Zach, age about 4 and Philip, about a year older, have found a loving family in the U.S. but their early life was typical of Uganda's estimated 2.4 million orphans.
Both boys were found abandoned in different places in Kampala, both were left in conspicuous places and both were found by police officers.
Now Zach and Philip have a new life in the U.S., both are in school and having loving new parents.
In 2008, they were adopted by Lisa and Tague Harding of Minnesota through the Amani Baby Cottage, one of the respected, religiously-affiliated orphanages.
"There is always a tragedy at the beginning of a story that makes adoption a necessary step," said Lisa.
As their children grew up and left home, the Hardings saw an opportunity to provide a stable home for children who would otherwise grow up in poverty.
The Hardings became interested in international adoption after traveling to Uganda with a church group.
"I love that in our faith, adoption is part of the story -- that Baby Moses was adopted and there was Samuel in the Bible that was adopted and baby Jesus. Joseph was not his birth father." said Lisa.
Danyne Randolph Bharj, director of the Amani Baby Cottage, understands the fears concerning the exploitation of children, but says that given the options for Ugandan children, in many cases adoption is the best solution.
"I don't think it's right to say the West is the way to save Uganda at all. I don't think that's the answer. But I think if there's people in the West that can give these children a family when no one else can, I do think it's more important," said Bharj.
But James Kabogoza, assistant commissioner of Children's Affairs for the Ugandan Government, feels that Ugandan children should stay in Uganda.
"It's not right what they are doing. I know for them they get something out of it, but it's also wrong to defraud parents and Ugandans of their children," he said.
Kabogoza's fear is that by leaving Uganda, many of these orphans will lose sight of their cultural identity.
He also believes that regardless of the circumstances, many of these children would be better off with their birth parents.
"That is the biggest thing that ever happens to a child. If the child remains with the family, they are able to grow up with them,"said Kabogoza.
He added: " know they feel what is done in America and what is proper in America is a better life. But you could provide that better life to the child here, within the family ... You can change the life of that child within the family here, if you support them."
Zach and Philip' adopted father, Tague Harding, understands that his sons will lose some of their cultural heritage by growing up in the United States, but he also sees the advantages.
"It's better that Ugandan orphans stay in Uganda as much as possible but perhaps by us bringing two boys home or other people bringing Ugandan children back internationally, we can raise awareness to say, there is a need."</s>
|
<urn:uuid:595df0a2-2954-4822-9e67-9dc134d24a71>
|
CC-MAIN-2015-32
|
http://edition.cnn.com/2013/02/27/world/africa/wus-uganda-adoptions/index.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.977076
| 1,350
| 2.625
| 3
|
About one-third of Patriot soldiers at the Battle of Bunker Hill were African Americans. Census data also reveal that there were slaves and free Blacks living in the North in 1790 and later years. What were the experiences of African-American individuals in the North in the years between the American Revolution and the Civil War?
In this lesson, students reflect on the Holocaust from the point of view of those who actively resisted Nazi persecution. Weigh the choices faced by those for whom resistance seemed both futile and the essence of survival.
In the spring of 1948 Stalin provoked the first serious international crisis of the Cold War by announcing a blockade of West Berlin. This lesson will trace the Berlin blockade and airlift of 1948–49 and the establishment of NATO.</s>
|
<urn:uuid:b6d09d5e-5c3c-4f29-9454-d50faefd91c3>
|
CC-MAIN-2015-32
|
http://edsitement.neh.gov/calendar/2013-11-09/american-civil-war-terrible-swift-sword
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.963935
| 150
| 3.703125
| 4
|
Culture and tradition
The Kreetassan race were particularly concerned with proper etiquette, courtesy and adherence to certain, sometimes complex social codes. As a result, they came to have a reputation for being easily offended, and a number of such offenses occurred during their problematic early encounters with Humans.
The Kreetassans considered eating a taboo to be performed privately in the same manner as mating. In fact, in the Kreetassan language, which was very complex by Human standards, the words "eat" and "mate" were very similar. Thus they were offended when, circa 2151, they saw the crew of Enterprise eating their food in public, which caused them to storm off the ship in rage. Their anger was alleviated, however, when Travis Mayweather apologized on behalf of the entire crew and assured them that no insult was intended. (ENT: "Vox Sola")
In front of the Kreetassan Hall of Diplomacy stood a row of Alvera trees that, by 2152, were over 300 years old, and which were considered cultural treasures by the Kreetassans. Defacing them in any way was a major offense to their people; however, if it was done accidentally, there was a special, elaborate apologizing ceremony that involved cutting the tree into many pieces.
Kreetassans were a humanoid race who had an elaborate facial structure. They had heavily-ridged faces with a row of purple-tinged rectangular scutes along the midline of the forehead (nose to hairline), covering one-third of its width. They wore their hair long and in braids and dressed in long, brown, embellished gowns.
During the Kreetassan's visit to Enterprise, a fibrous, web-like organism, accidentally removed from its homeworld during their research, was transferred to Enterprise and took over a cargo bay. (ENT: "Vox Sola")
Kreetassans were famous for manufacturing plasma injectors, and they were one of the few races in their particular vicinity that did.
In late 2152, Enterprise visited Kreetassa to make up for the political mishap a year earlier. They were invited down to the Hall of Diplomacy, and after sending the Kreetassans their genome, Captain Archer, Hoshi Sato, T'Pol, and Porthos (the Captain's dog) went down to the planet. After the initial meetings went well, the Kreetassans were shocked and sent them back to Enterprise, for reasons the Enterprise crew couldn't comprehend. After asking what had happened, T'Pol informed him that Porthos had urinated on one of the sacred Alvera trees.
To apologize to the head of the Kreetassan government, they asked that Archer perform a ritual. Down in the Hall of Diplomacy, in a ringed arena, he would have to cut the tree's trunk on a special base with a chainsaw, and arrange the 5 cm thick rings in a special pattern (pictured right). Throughout the whole ceremony, he would wear beads in a special pattern in his hair and have Kreetassan markings on his chest in red ink. At the conclusion, he had to say a message in the Kreetassan language.
After the ceremony, the Kreetassans happily gave them the plasma injector they needed, and also an additional two spares. (ENT: "A Night in Sickbay") A Kreetassan merchant also recommended Tessic's mining colony as a source for deuterium. (ENT: "Marauders")
List of Kreetassans
- See: Kreetassans</s>
|
<urn:uuid:a3ea72a3-1f2f-41d2-b5a0-3f55062fd283>
|
CC-MAIN-2015-32
|
http://en.memory-alpha.wikia.com/wiki/Kreetassan?oldid=1226656
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.985345
| 753
| 2.609375
| 3
|
How long did the limits last?
By Dr. Robert Owens
In 1798, a mere ten years after the ratification of the Constitution war with France seemed imminent. In reaction to opposition regarding the policies of the government John Adams, hero of the Revolution, co–author of the Declaration of Independence, one of the Framers of the Constitution, and only the second President of the United States Congress passed the Alien and Sedition Acts.
Congress eventually passed four of these laws in an effort to strengthen the Federal government against internal dissent. The former supporters of the Constitution, now known as Federalists sponsored the legislation meant to silence political opposition which was coming mainly from the Democratic Republicans and their leader Thomas Jefferson.
First Congress passed the Naturalization Act which required people to be residents of the United States for fourteen years instead of five years before becoming eligible for U.S. citizenship.
Then they passed the Alien Act which authorized the President to deport aliens who the government determined to be dangerous or a threat to the peace and/or safety of the United States. It must be remembered that while many believed America was under a threat of war this law was passed and enforced during peacetime.
Seeking to extend the power of the central government even further Congress next passed the Alien Enemies Act. This third act allowed the arrest, imprisonment, and deportation of aliens who were from to an enemy country.
Finally Congress added the Sedition Act, aimed at any action deemed by the government to be treason. This included the publication of any material judged to be false, scandalous, or malicious. No matter what the Bill of Rights said the government declared these activities to be a severe misdemeanor that was punishable by both fine and imprisonment.
Under these bills twenty-five men, including numerous editors of newspapers, were arrested. In addition, their newspapers were shut down.
The net of suspicion was spread so far that it included Benjamin Franklin Bache, Benjamin Franklin's grandson who was the editor of a Philadelphia newspaper. He was charged with libeling President Adams. This arrest elicited a mounting public reaction against all four of the Alien and Sedition Acts.
Many Americans questioned the constitutionality of these laws. Indeed, public opposition to the Alien and Sedition Acts was so great that they were in part responsible for the election of Thomas Jefferson, a Republican, to the presidency in 1800. Once in office, Jefferson pardoned all those convicted under the Sedition Act, while Congress restored all fines paid with interest.
The unpopularity and questionable legality of these acts led to Adams being the first one-term president. And these actions by one of the foremost Framers and most vocal supporters during the ratification process used these oppressive laws to silence opposition. Here at the very beginning of the Constitutional republic one of the architects of the document believed it gave him and Congress the power to silence the people when the people disagreed.
Jefferson and his Democratic Republicans defeated Adams' bid for a second term by capitalizing on the public's disgust at what were perceived to be unconstitutional and repressive actions by the very people who wrote and led the fight for the adoption of the constitution. Now those who portrayed themselves as the protectors of liberty would make sure that the limits placed upon the Federal Government were strictly observed.
In 1803, during their long wars with England and in need of financial relief France offered to sell Louisiana to the United States. This caused a novel situation and became the cause of a grave constitutional question and a major problem for President Thomas Jefferson and his ruling party. Seeing the opportunity to double the size of the United States, President Jefferson immediately wanted to purchase the territory.
This was rather surprising in that Jefferson advocated a narrow or strict interpretation of the Constitution. And no matter how you read the document nowhere in it does it authorize the President or even the Congress to buy additional territory. Not debating this point, not disputing this limitation but at the same time feeling the need to act quickly, and believing there was not time for the amendment process to legally change the Constitution.
This being the case, President Jefferson and his Democratic-Republicans merely passed legislation giving the President permission to sign a treaty obligating the United States to pay the money and to take possession of Louisiana. In addition, the Democratic-Republicans also appropriated the money to pay France for the territory. Where did Democratic-Republicans in Congress believe they acquired the authority to do this? They claimed to act under the provision of the Constitution (Article 5, Section 3) which gave Congress the power to regulate the territories.
The third President and a compliant Congress interpreted the Constitution to do what they wanted to do even though it violated their own previously stated position.
As a third and final example of how soon the limited government promised by the Framers of the constitution began to encroach upon the liberty it was meant to preserve let us look at the Monroe Doctrine.
During the presidency of James Monroe's there occurred several revolutions against Spanish rule in South and Central America. The United States quickly recognized these newly established countries. Believing there was a strong possibility that European governments would intervene and try to reassert their control over the former colonies; President Monroe declared the doctrine in 1823. This doctrine declared that from that time forward America saw itself as the dominant power in the Western Hemisphere. It also warned that European interference in the Americas would not be allowed. The Doctrine consists of three principles:
1. The United States would remain neutral in European wars unless American interests were involved
2. Both North and South America were no longer subject to colonization by European powers.
3. The United States would consider any and all attempt at European colonization in the New World as an "unfriendly act."
And although the United States did not have the military power to enforce these claims, the declaration had symbolic importance: announcing the United States' posture as the power to be reckoned with in the New World.
Monroe's Doctrine aggressively asserted the position of dominance claimed by the United States in the Americas, and it has been a cornerstone of American foreign policy ever since.
An interesting point that is little mentioned or considered is that this doctrine (and every doctrine proclaimed since) is not law but merely a declaration of a presidential policy. It is this fact that persuaded Monroe that as President he was authorized without any Constitutional authorization, to establish a foreign policy that commits the United States to military action without a declaration of war by Congress. Thus following in the footsteps of the second and the third our fifth president moved well beyond the limits the Constitution had imposed.
How long did the limits last? The Anti-Federalists were still active in politics as the warnings they gave were realized and the children of the Revolution took their first steps down the road to tyranny. These earliest assaults upon limits were followed by:
Jackson used the spoils system to pack the federal bureaucracy with his supporters. Jackson advocated the removal of all Native Americans across the Mississippi in violation of numerous treaties passing the Indian Removal Act. When the Supreme Court ruled that Georgia's expropriation and removal of the Cherokee was unconstitutional, referring to the Chief Justice Jackson said, "John Marshall has made his decision, now let him enforce it." He then used the standing army the anti-federalists had warned against to complete the deportation acting as ruthlessly and as arrogantly as any Babylonian king. Lincoln decided that States which had voluntarily joined could not leave though this is stated nowhere in the Constitution.
Teddy Roosevelt ran rough shod over Latin America with his gunboat diplomacy. He provoked a revolution in Columbia, established Panama as a near colony, seized the Canal Zone, and in many ways used his big stick like a cudgel to establish and maintain an American Empire from Asia to the Dominican Republic in contravention to the advice of Washington and the words of the Constitution.
Wilson rounded up and interred Italians and Germans during WWI, took over mines and factories, fixed prices, took over the transportation and communications networks, and strictly managed the production and distribution of food.
FDR stretched the Constitution in so many ways it never snapped back. Since our first President for life established the bloated federal bureaucracy and its symbiotic military-industrial complex we have seen a succession of undeclared wars for peace, the welfare state, the Patriot Act, and preemptive war become emblems of a system that practice government of Washington, by Washington, and for Washington.
Congress has declared war on only five occasions: the War of 1812; the Mexican War; the Spanish-American War, World War I, and World War II. However, this has not been the extent of our involvement in armed conflict. When American citizens have challenged the constitutionality of these wars without a declaration Federal Courts have ruled a declaration is not required.
Ask yourself: How long did the limits last? Where did the limits go? How many limits are left? Which leads to the ultimate question: How can we get the limits back? Keep the faith. Keep the peace. We shall overcome.
Dr. Robert Owens teaches History, Political Science, and Religion for Southside Virginia Community College. He is the author of the History of the Future @ http://drrobertowens.com View the trailer for Dr. Owens' latest book at http://www.youtube.com/watch?v=_ypkoS0gGn8. Follow Dr. Robert Owens on Facebook. © 2011 Robert R. Owens</s>
|
<urn:uuid:a89e7f99-5745-4377-b420-8d026b778802>
|
CC-MAIN-2015-32
|
http://enterstageright.com/archive/articles/0211/0211limits.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.969351
| 1,910
| 3.890625
| 4
|
The Eritrean-Ethiopian War was a border conflict that took place from May 1998 to June 2000. On May 8, a platoon of Eritreans soldier deployed into Badme region.
Fighting escalated to artillery and tank fire leading to four weeks of intense fighting. Ground troops fought on three fronts.
Eritrea claims Ethiopia launched air strikes against Eritrea’s capital Asmara while Ethiopia accused Eritrea of striking first.
The fighting led to huge internal displacement in both countries as civilians fled the war zone. The conflict ended in stalemate and deployment of UNMEE
Following independence, the two neighbours disagreed over currency and trade issues, and both laid claim to several border regions including Badme, Tsorona-Zalambessa, and Bure.
Nevertheless, since the two governments were close allies they agreed to set up a commission to look into their common border and disputed places. Since early 1991 they had agreed to set up a commission to look into each others’ claims.
Of particular issue was the border through the Badme Plain. As a result of the Treaty of 1902 the Badme Plain is bisected by the border which runs in a straight line between the Gash and Setit (Tekezé) Rivers.
The development of the war: On 6 May 1998, a few Eritrean soldiers entered the Badme region, a borderline zone, along the border of Eritrea and Ethiopia’s northern Tigray Region, resulting in a fire fight between the Eritrean soldiers and the Tigrayan militia and security police they encountered.
The evidence illustrated that, at about 5:30 a.m. on May 12, 1998, Eritrean armed forces, consisted of at least two brigades of regular soldiers, supported by tanks and artillery, attacked the town of Badme and other border areas in Ethiopia’s Tahtay Adiabo Wereda, as well as at least two places in its neighboring Laelay Adiabo Wereda.
On that day and in the days instantly following, Eritrean armed forces then pushed across the flat Badme plain to higher ground in the east.
Although the evidence regarding the nature of Ethiopian armed forces in the area conflicted, the weight of the evidence indicated that the Ethiopian defenders were composed merely of militia and some police, who were swiftly forced to move back by the invading Eritrean forces.
Given the absence of an armed attack against Eritrea, the attack that began on May 12 cannot be justified as lawful self-defense under the UN Charter.
The areas initially invaded by Eritrean forces on that day were all either within undisputed Ethiopian territory or within territory that was quietly administered by Ethiopia and that later would be on the Ethiopian side of the line to which Ethiopian armed forces were compelled to withdraw in 2000 under the Cease-Fire Agreement of June 18, 2000.
On May 13, 1998 Ethiopia, in what Eritrean radio described as a “total war” policy, mobilized its forces for a full assault against Eritrea.
The Claims Commission established that this was in essence an pronouncement of the existence of a state of war between belligerents not a declaration of war and that Ethiopia also notified the United Nations Security Council, as required under Article 51 of the UN Charter.
The fighting rapidly escalated to exchanges of artillery and tank fire leading to four weeks of intense fighting.
Ground troops fought on three fronts. On 5 June 1998, the Ethiopians launched air attacks on the airport in Asmara and the Eritreans retaliate by attacking the Ethiopian town of Mekele. These raids caused civilian casualties and deaths on both sides of the border.
There was then a quiet period as both sides mobilized huge forces along their common border and dug extensive trenches.
Both countries used up several hundred million dollars on new military equipment. This was despite the peace mediation efforts by the Organization of African Unity (OAU) and the US/Rwanda peace plan that was in the works.
The US/Rwanda was a four point peace plan that called for withdrawal of both forces to pre-June 1998 positions.
Eritrea rejected and instead demanded for demilitarization of all disputed areas along the common border overseen by a neutral monitoring force and direct talks.
With Eritrea’s refusal to accept the US/Rwanda peace plan, on 22 February 1999, Ethiopia launched a huge military offensive to bring back Badme.
Tension had been elevated since February 6, 1999, When Ethiopia claimed that Eritrea had violated the moratorium on air raids by bombing Adigrat, a claim it later withdrew.
Following the first five days of military set back at Badme, by which time Ethiopia broken through Eritrea’s fortified front and was 10 kilometers (six miles) deep into Eritrean territory, Eritrea accepted the OAU peace plan on 27 February 1999.
Ethiopia did not at once stop its advance because it demanded that peace talks be contingent on an Eritrean withdrawal from territory occupied since the first outbreak of fighting.
Ethiopia commenced an offensive that broke through the Eritrean lines between Shambuko and Mendefera, crossed the Mareb River, and cut the road between Barentu and Mendefera, the main supply line for Eritrean troops on the western front of the fighting.
By May 2000, Ethiopia occupied about a quarter of Eritrea’s territory, displacing 650,000 people and wiping out key components of Eritrea’s infrastructure.
The Eritreans withdrawn from the disputed border town of Zalambessa and other disputed areas on the central front saying it was a ‘tactical retreat’ to take away one of Ethiopia’s last remaining excuses for continuing the war.
Having recaptured the most of the contested territories — and heard that Eritrean government in accordance with a request from the Organisation of African Unity would withdraw from any other territories it occupied at the start of fighting — on 25 May 2000, Ethiopia affirmed the war was over.
Results of the war: Eritrea claimed that 19,000 Eritrean soldiers were killed during the clash, while the number of Ethiopian soldiers dead is most likely around 50,000 as the total war casualties from both countries is reported worldwide as being around 70,000.
All these figures have been contested and other news reports simply state that “tens of thousands” or “as many as 100,000″ were killed in the war.
The fighting led to massive internal displacement in both countries as civilians fled the war zone.
Ethiopia expelled 77,000 Eritreans and Ethiopians of Eritrean origin it believed to be security risk, hence compounding Eritrea’s refugee problem.
Many of the 77,000 Eritrean and Ethiopians of Eritrean origins were considered well off by the standard of Ethiopian standard living and deporteeing them all after confiscating their belonging was a cruel act of human rights violations.
The economies of these countries were already weak as a result of decades of cold war politics, civil war and drought.
The war intensified these problems, resulting in food shortages. Before the war, much of Eritrea’s trade was with Ethiopia, and much of Ethiopia’s foreign trade relied on Eritrean roads and ports.
Keywords: Eritrea, Ethiopia, UNMEE, Badme region, Tsorona, Zalambessa, Bure, Gash, Setit, Tigrayan militia, Tahtay Adiabo Wereda, Laelay Adiabo Wereda, Mekele, OAU, Adigrat, Shambuko, Mendefera, Mareb River, Barentu,</s>
|
<urn:uuid:d30687a3-4b62-497b-8fe3-0a1edfb616ed>
|
CC-MAIN-2015-32
|
http://ethiopiamilitary.com/ethio-eritrean-war/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.962812
| 1,605
| 2.96875
| 3
|
The International Phonetic Alphabet is based on the Latin alphabet A-Z, with a lot of extensions. There are extensions like “Latin script a” ɑ, like “Latin epsilon” ɛ, like “Latin gamma” ɣ, like “Latin eng” ŋ, like “Latin phi” ɸ, and so on. Notice the following:
- Latin ɛ is fairly similar to Greek ε, though its capital is Ɛ and the Greek’s is Ε.
- Latin ɣ is rather different to to Greek γ being symmetrical with a loop; its capital is Ɣ and the Greek’s is Γ.
- Latin ɸ is distinctly different from Greek φ, having strong serifs in its ascender and descender; it has no capital and the Greek’s capital is Φ.
And this is fine. These Latin letters were “disunified” from Greek a long time ago, and the UCS contains all of them as uniquely encoded characters. Three letters, however, were not disunified, and are problematic.
- U+03B2 ( β ) GREEK SMALL LETTER BETA
- U+03B8 ( θ ) GREEK SMALL LETTER THETA
- U+03C7 ( χ ) GREEK SMALL LETTER CHI
Now the first and third of these do have non-Greek shapes, just as Latin phi does. Here’s an example from Daniel Jones’ Outline of English Phonetics (1932)—click on the image to see it larger if you like:
Now, the serifs on that beta’s descender are very atypical indeed in Greek typography. Moreover, the fact that the letter is unified with Greek can cause some troubles in sorting multilingual data, since oin a typical English or German or French sort (for instance) the Latin alphabet sorts first, then the Greek alphabet, then the Cyrillic, and then others. In practice this means that β does not sort after b (where one might expect it), but after z.
The IPA chi can also differ from the typical Greek chi. In the 1949 Handbook of the IPA, the serifs on the letter are on the top-right to bottom-left branch of the x; the other branch is curved.
A point to remember is that the intent of the IPA chi was originally not that it was unified with Greek chi, but rather that it was different:
The non-roman letters of the International Phonetic Alphabet have been designed as far as possible to harmonise well with the roman letters. The Association does not recognise makeshift letters; it recognises only letters which have been carefully cut so as to be in harmony with the other letters, For instance, the Greek letters included in the International Phonetic Alphabet are cut in roman adaptations.
Let’s compare capital and small Latin Xx, Greek Χχ, and that IPA chi. Now it’s possible that because Greek fonts have been in use for a good while that some people might prefer a greekish glyph to a latinish glyph. Nevertheless, take note of the weight of that older IPA chi, and compare it to the “stretched x” shape.
But in fact there’s another reason to encode a Latin chi. Lepsius made use of it in his transcription of Chukchi, and there its capital is entirely different from the capital used in Greek. Now, there is precedent for just this kind of thing being a reason to disunify: Cyrillic Ԛ and ԛ (used in Kurdish) were disunified from Latin Q and q because the capital Cyrillic one sometimes looks like an oversized small one.
So, what it looks like is that we have the following—Latin x, Greek chi, and Latin chi (both greekish and latinish glyphs are shown):
Let’s assume that LATIN LETTER CHI and LATIN LETTER BETA get encoded (leaving aside the question of THETA for now). Now the big question for the IPA is, what should be done when they are? The current recommendation is “use GREEK LETTER CHI”, but of course there’s no alternative. When there is… well, I for one would prefer a Latin letter that sorts between x and y, rather than a Greek letter that sorts between φ and ψ.
There is certainly data out there using the Greek letters β and χ and θ. Of course, there is also data out there using non-Unicode fonts, or SAMPA, or other things. In my opinion, the right thing to do is bite the bullet, get Latin beta, chi, and theta encoded, and get the recommediations promulgated through fonts and keyboard drivers. But I do not know what the view of the International Phonetic Association might be.
Here is an example of some functionality related to this. I created a number of folders named “a_la”, where the “_” is replaced by various letters.
It’s easy to see that in the Mac OS, Latin letters sort before Greek. Thorn þ sorts correctly after z. Eth ð after d. IPA ɡ after g, followed by IPA gamma ɣ. Small capital ɪ and Latin iota ɩ follow i, as expected. Then, after þ, we see that the Greek alphabet appears in its correct order. But I am sure that I want IPA beta to sort after b, not after þ, and likewise IPA chi after x. I am torn between wanting IPA theta to sort after t or after þ, but probably the former. Anyway, I want a disunification of these three IPA letters from Greek.</s>
|
<urn:uuid:34420414-3681-4fed-9fb2-1343b80c229b>
|
CC-MAIN-2015-32
|
http://evertype.com/blog/blog/category/unicode/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.94827
| 1,257
| 3.421875
| 3
|
Grab and hold the attention of kids with a series of multicultural genealogical activities developed for use in the classroom, but useful for kids in any setting. The material in this lecture is based on the presenter’s experience teaching school-age children about family and local history.
Maureen Taylor is an internationally recognized expert on the intersection of history, genealogy, and photography. She has been featured in top media outlets, including The View, Better Homes & Gardens, the Boston Globe, Martha Stewart Living, MSNBC, DIY: Scrapbooking, PBS Ancestors, Creative Memories' Lasting Moments, Dear Myrtle, and Satisfaction Magazine. Maureen is the author of a number of books and magazine articles, as well as a contributing editor at Family Tree Magazine. The Wall Street Journal calls Maureen “the nation’s foremost historical photo detective.” Before she was the Photo Detective, Maureen was known for her expertise researching families in her home state of Rhode Island.
Sign up for Maureen’s free e-newsletter at www.MaureenTaylor.com
Ask Maureen – www.AskMaureenTaylor.com
Maureen’s bookstore: http://www.maureentaylor.com/publications/</s>
|
<urn:uuid:50a6687b-b744-4ecb-929c-139f6ee52957>
|
CC-MAIN-2015-32
|
http://familytreewebinars.com/download.php?webinar_id=118
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.919824
| 259
| 3.140625
| 3
|
In a demonstration of carrier long-range attack capabilities, a P2V-3C Neptune took off from USS Franklin D. Roosevelt (CVB 42) off the coast of Jacksonville, FL on 07 February 1950 . The Neptune flew over Charleston, SC, the Bahamas, the Panama Canal, up the coast of Central America, over Mexico, and landed on Feb. 8, at San Francisco's Municipal Airport. The flight, covering 5,060 miles in 25 hrs. 59 min., was the longest ever made from a carrier deck.
The USS Midway was commissioned on September 10, 1945. Named for the Battle of Midway, the carrier was the lead ship of her class, three of which were completed, with another two ships cancelled. Serving her country for 47 years, more than 200,000 American veterans served aboard her. In that time, the USS Midway saw service off Vietnam, in the Persian Gulf and in a number of other conflicts and crises. After being the first aircraft carrier forward deployed for 17 years in Yokosuka, Japan, she returned to North Island Naval Air Station in San Diego for decommissioning in April of 1992.
The ability to adapt to new technologies, systems, platforms, and operational needs is nowhere better exemplified than in the design and 50-year operational history of the USS Midway. Designed during World War II, in 1945 this "flattop" initially operated piston-driven propeller aircraft, yet returned from her last deployment in 1991 with the Navy's most modern, multipurpose strike-fighters. Her original axial-deck design was modified to an angled-deck layout, her original hydraulic catapults were replaced with more powerful steam catapults, and the most basic electronics replaced by advanced sensors and communications equipment. Her air wing included four squadrons of F/A-18 Hornets and two squadrons of A-6 Intruders (a strike capability of 68 attack aircraft). While unable to operate either the F-14 Tomcat or S-3 Viking, MIDWAY was still an amazing and powerful national asset over forty years after her commissioning.The former USS Midway, now part of the Navy's mothball fleet in Bremerton, Washington, is available as a donation. Eligible recipients include any US state, possession, municipal government, or non-profit entity. The recipient of the aircraft carrier will be required to maintain the ship as a non-moving museum or memorial.
|Displacement||62,000 tons full load|
|Flight Deck Width||238 feet|
|Power Plant|| 12 boilers, four geared steam turbines|
four shafts, 212,000 shaft horsepower
Sea Sparrow missiles|
3 Phalanx CIWS 20mm mounts
SPS-48C 3-D Air Search Radar|
SPS-49 Air Search Radar
SPS-65 Navigation Radar
2 Mk115 Fire Control WLR- 1 ESM
|Complement||2,533 ship's company; 2,239 in air wing|
|CV 41||Midway||Newport News||Yokosuka||01 Aug 1942||10 Oct 1945||11 Apr 1992|
|CV 42||Franklin D Roosevelt||New York NSY||1942||27 Oct 1945||01 Oct 1977|
|CV 43||Coral Sea||Newport News||Norfolk||1942||01 Oct 1947||30 Apr 1990|
|CV 44||[CANCELLED]||1942||-||11 Jan 1943|
|CVB 56||[CANCELLED]||1945||-||28 Mar 1945|
|CVB 57||[CANCELLED]||1945||-||28 Mar 1945|</s>
|
<urn:uuid:601e752a-3498-43fc-be93-284030c1cd6b>
|
CC-MAIN-2015-32
|
http://fas.org/man/dod-101/sys/ship/cv-41.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.888341
| 764
| 3.046875
| 3
|
Q: I read your recent article about recycling computers and wanted to know more about what kind of toxic chemicals are inside. Can they harm the user?
A: First of all let me put your mind at ease — while there are toxic chemicals in computers, they exist in trace amounts that are unlikely to harm a human, and the computer case shields you from them. The problem arises when toss a bunch of them into a landfill. That’s why we need to manage our e-Waste.
In 2006 Greenpeace X-rayed a number of laptops to see what kind of toxic chemicals they held. They found that circuit boards contained the heavy metals Cadmium and Beryllium. The steel inside had hexavalent chromium baked into it. The wires contained PVC and the fans were coated in flame-retardent BFRs. The LCDs contained Mercury. But again, we’re talking trace amounts that are hidden away behind a plastic or aluminum case. Keep your kids from playing around inside and you should be fine.
Our worries shouldn’t be so much about how our computer’s chemical components might harm us, but how they might harm the environment after we’re done with them.
If you have a computer ready for the afterlife, don't throw it in the trash. Drop it off Tuesday through Saturday at the city's Household Hazardous Waste Facility located at 2675 Commonwealth Ave.</s>
|
<urn:uuid:d97cc534-7f78-4827-8005-8b3bc82ffaf7>
|
CC-MAIN-2015-32
|
http://folioweekly.com/Can-Chemicals-in-My-Computer-Harm-Me,6158?category_id=138,&sub_type=blogs
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.952926
| 294
| 3.078125
| 3
|
Qualitative aspects of the grandparent -grandchild relationship and the impact on adolescent self-esteem and ethnic identity
The study investigated four qualitative aspects of the grandparent-grandchild relationship with college-age grandchildren (M = 19 years, SD = 1.4): social support, affection, affectional bond, and attachment security. The psychological qualities of the relationship on grandchildren's self-esteem and ethnic identity achievement were also studied. Data from 202 research participants from introductory and upper-division psychology classes, who had at least one living grandparent confirmed the notion that qualitative aspects of the grandparent-grandchild relationship were related to adolescent grandchildren's self-esteem but not their ethnic identity achievement. The strength of grandchildren's affectional bond to their emotionally closest grandparent and grandchildren's degree of attachment security to their grandparent were unique predictors of grandchildren's self-esteem. The hypothesized, positive interrelationships among the relationship-quality variables were also confirmed by the data but the predicted, positive relationship between grandchildren's security of attachment to their emotionally closest grandparent and grandchildren's ethnic identity achievement was not. Post hoc and exploratory analyses indicated that grandchildren who were securely attached to their grandparents, always emotionally close to their current living grandparent, emotionally close to their maternal grandparents, and of Italian ancestry had intergenerational relationships characterized by more positive relationship qualities than those grandchildren who were insecurely attached, closer to another grandparent, closer to their paternal grandparents, and/or of Hispanic ancestry. Two qualities of the grandparent-grandchild relationship (affectional bond and security) mediated the relationship between the intergenerational contact variables, such as visiting with grandparents and the parent-grandparent relationship, and the grandchildren's self-esteem not the reverse. The findings extend the study of the qualitative aspects of the intergenerational relationship to college-age grandchildren and their grandparents. Two of the psychological qualities present in the grandparent-grandchild relationship are attachment components (affectional bond and security of attachment) and, therefore the findings extend the study of attachment to college-age students and to a new attachment figure, grandparents. Continued investigation of developmental consequences of the relationship on both the grandchild and the grandparent is warranted. Intervention programs to enhance the psychological qualities of the relationship are discussed and should be studied. ^
Psychology, Developmental|Psychology, Personality|Sociology, Individual and Family Studies|Sociology, Ethnic and Racial Studies
Susan Ann Rosendahl-Masella,
"Qualitative aspects of the grandparent -grandchild relationship and the impact on adolescent self-esteem and ethnic identity"
(January 1, 1996).
ETD Collection for Fordham University.</s>
|
<urn:uuid:ca6a19cb-a43e-4732-9aea-d7b10c713bc8>
|
CC-MAIN-2015-32
|
http://fordham.bepress.com/dissertations/AAI9613859/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.934326
| 545
| 2.53125
| 3
|
... marshal law was declared in several southern states and the state governments replaced in order to get ratification...
This is getting off topic but I will post on it to play along.
Not exactly so. The Reconstruction Act of 1867 abolished civilian governments in the former Confiderate States and to be readmitted to the Union that Lincoln said that they had never left they had to radiffy Amendments 13, 14, and 15 as a condition of readmidance..
Political Correctness is our greatest danger. This is so because Political Correctness is blind to the duel threat posed by Siera Law and La Raza. Both of these threats are much more serious to the future or long term survival of America than slavery ever was.
By 1850 the economic dislocation posed by the Industrial Revolution coupled with a fast growing world population , numbered slavery's days. However slavery and its economic impact was the core issue that deepened geographic as well as economic differences and these deeping rifts led to a national split. However if slavery ever stages a come back in North America it will be because of something like sustainable, organic, local-vor agriculture and its need for gobs and gobs of cheap hand labor at the drop of a hat.
In 1860 the Democrat Party was the party of free trade, and the Republican Party was the party of high tariffs. The South wanted to trade freely with the world, exporting its raw materials like cotton, corn, timber, and tobacco, (before the Civil war more corn was exported from Charlston, South Carolina than from anyother American port) and using the profits of this trade to buy cheaper and better quality goods than were generally available from the Northern factories of the day.
The American merchant marine infact has never overcome the tripple hits of ships lost to Confederate raiders, the flight of US vessels to forigen flags because of high insurance rates caused by these raiders, and the decreased international trade to American ports caused by higher tariffs in the aftermath of a Northern victory.
This was basally the dynamic that caused George Washington and most of the founders to turn their backs on England. The Brittish were taking her North American colonial consumers for granted, by forcing ever lower prices on us for colonial products inforced by banning world trade with the colonies, while charging us ever higher prices for ever shoddier English goods.
GM, Chrysler, as well as Rambler, Packard, Nash, Willis, and a host of other brands and manufactures met their end the same way. That way is the way of the market, and among other things the market led to China loosing her tea monoply while the Brittish fretted over the ongoing slave trade in Cuba, Egypt, Nigeria, The Soudan, and Kenya on the one hand while with their other left hand the English profited greatly from the trade in Indian (Afghan Pakistan) opium for Chinese tea. The English even fought several wars with China to get or keep their street corner location to better smuggle Afghan opium into China. Meanwhile the English fought two disastrous (Disastrous at least for the English) wars to safeguard their supply of Afghan opium.
Another example is Brittan using armed force into the 1940s to force India to pay dearly for English salt and cloth even though India is situated between two great oceans chocked full of salt and historically India was both a grower of cotton as well as a center of spinning and textile weaving. How many Indian (Hindu) fabrics can you name?
The Northern Republicans wanted more internal trade and high taxes on imports to both ensure profits for factory owners as well as to protect factory workers jobs. Then like now a rising economy floated all boats. Marx more than once said that the only thing the American Worker wanted was to get rich, if not to actually become a Capitalist himself. Even though Marx and Engels Together wrote more than 300 articles for Republican Newspapers, neither one was optimistic about Socialism taking root in America.
Today every time someone mentions "Cheep Chinese" goods or "adulterated imported honey" or "buy American," I bet you can scratch that person and you will most likely find a Classical Republican under the surfice. If on the other hand you are driving an imported car (especially a hybrid or up scale brand like Mercedes, SAAB, BMW, Jag, Lexus, etc) you are more likely a Classical free trade Confederate.</s>
|
<urn:uuid:ad587998-1005-4c29-bf6f-14d4b00fd5d5>
|
CC-MAIN-2015-32
|
http://forum.beemaster.com/index.php?topic=39110.msg329524
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.964985
| 900
| 2.578125
| 3
|
Would help if you knew what you where talking about
Ethics (also known as moral philosophy) is a branch of philosophy which seeks to address questions about morality; that is, about concepts like good and bad, right and wrong, justice, virtue, etc.
Major branches of ethics include meta-ethics, about the theoretical meaning and reference of moral propositions and how their truth-values (if any) may be determined; normative ethics, about the practical means of determining a moral course of action; applied ethics, about how moral outcomes can be achieved in specific situations; moral psychology, about how moral capacity or moral agency develops and what its nature is; and descriptive ethics, about what moral values people actually abide by.
Governments undoubtedly has to abide by the people that elected them into office - It is their fabric of ethics / morals in this case that the government has to abide by .
Bottom Line; It is the people what are the ethics or morals by majority - not the government
You sound just like priggish little Miss Perdita, although she was concerned, not with shagging anything in particular (that concern seems to be your recurring theme), but rather with the streaked gillivor, in whose piedness she saw the human touch and so would not set the dibble in the earth to plant it. If you want an argument, go read The Winter's Tale. I'm not gonna to work on your farm no more.
_________________________ MACTECHubi dolor ibi digitus
Xplain's use of MacNews, AppleCentral and AppleExpo are not affiliated with Apple, Inc. MacTech is a registered trademark of Xplain Corporation. AppleCentral, MacNews, Xplain, "The journal of Apple technology", Apple Expo, Explain It, MacDev, MacDev-1, THINK Reference, NetProfessional, MacTech Central, MacTech Domains, MacForge, and the MacTutorMan are trademarks or service marks of Xplain Corp. Sprocket is a registered trademark of eSprocket Corp. Other trademarks and copyrights appearing in this printing or software remain the property of their respective holders.
All contents are Copyright 1984-2010 by Xplain Corporation. All rights reserved. Theme designed by Icreon.</s>
|
<urn:uuid:b3a59dae-c594-48d2-beb1-04c507ab255d>
|
CC-MAIN-2015-32
|
http://forums.applecentral.com/ubbthreads.php/topics/482294/2/Remember_Bush_didn_t_want_stem
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.931038
| 468
| 2.5625
| 3
|
Nixon had influence because, like Romney, he was viewed as the next US President.
Seems probable he could have had plenty of influence at the time:
He was [had been] the running mate of Dwight D. Eisenhower, the Republican Party presidential nominee in the 1952 election. Nixon served for eight years as vice president. He waged an unsuccessful presidential campaign in 1960, narrowly losing to John F. Kennedy, and lost a race for Governor of California in 1962. In 1968, he ran again for the presidency and was elected.
Xplain's use of MacNews, AppleCentral and AppleExpo are not affiliated with Apple, Inc. MacTech is a registered trademark of Xplain Corporation. AppleCentral, MacNews, Xplain, "The journal of Apple technology", Apple Expo, Explain It, MacDev, MacDev-1, THINK Reference, NetProfessional, MacTech Central, MacTech Domains, MacForge, and the MacTutorMan are trademarks or service marks of Xplain Corp. Sprocket is a registered trademark of eSprocket Corp. Other trademarks and copyrights appearing in this printing or software remain the property of their respective holders.
All contents are Copyright 1984-2010 by Xplain Corporation. All rights reserved. Theme designed by Icreon.</s>
|
<urn:uuid:4034fbb5-1376-4eda-9dc2-dcf4107e7c96>
|
CC-MAIN-2015-32
|
http://forums.applecentral.com/ubbthreads.php/topics/591909/2
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.939673
| 265
| 2.703125
| 3
|
News & Policies >
Policies in Focus >
Enhancing Education Through Technology 18
Purpose of the Program
The primary goal of this program is to improve student academic achievement through the use of technology in elementary and secondary schools. The program also seeks to: (1) ensure that every student is technologically literate by the end of the eighth grade; and (2) establish research-based instructional methods through the effective integration of technology, professional development for teachers, and curriculum development.
New Program Improvements and Resources
The No Child Left Behind Act establishes this program by consolidating several programs into a single State formula-grant program. This change will help improve childrens education by focusing the program on improving student achievement and focusing funds on the poorest schools.
Last year, President Bush signed legislation that provides $700 million for this program in FY-02. This year, President Bushs budget proposes sustaining this commitment in FY-03.</s>
|
<urn:uuid:8e03a01b-db5a-4550-acce-8d04c2a971f9>
|
CC-MAIN-2015-32
|
http://georgewbush-whitehouse.archives.gov/infocus/education/teachers/sect2-6.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.93156
| 191
| 3.5625
| 4
|
That's right, double what Japanese authorities originally estimated. That's a lot of cesium-137 to miss, so where did it all disappear to?
Out to sea, apparently. A study recently completed by Andreas Stohl of the Norwegian Institute for Air Research pegs the total amount of cesium-137 released at 36,000 terabecquerels through April 20 compared to the 15,000 terabecquerels the Japanese government reported. Stohl's report asserts that the government only gathered data from terrestrial sensors and failed to account for the radiation blown off-shore.
The report also states that a mere 20 percent of the emitted radiation actually landed on the Land of the Rising Sun, the vast majority settling in the Pacific with as much as two percent making foreign landfall. However, while 36,000 terabecquerels is a massive dose of radiation, it's still less than half of what Chernobyl released during its meltdown. It should also be noted that while the Atmospheric Chemistry and Physics journal posted the report for comment, the study hasn't yet completed the peer-review process. [Washington Post]
You can keep up with Andrew Tarantola, the author of this post, on Twitter, Facebook, or Google+.</s>
|
<urn:uuid:ce1ba7de-5d01-4626-afe3-56a29054ba68>
|
CC-MAIN-2015-32
|
http://gizmodo.com/5854089/fukushima-may-have-dumped-twice-as-much-radiation-as-previously-thought
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.948525
| 256
| 3.046875
| 3
|
GRIGNARD REAGENTS. Magnesium is unique amongst the chemical elements in the application which it finds in syn thetic organic chemistry by virtue of its power of dissolving readily in solutions of many organic compounds which contain chlorine, bromine, or iodine as a constituent atom in their molecules. Thus, if magnesium is added to methyl iodide dissolved in pure dry ether, a vigorous ebullition soon develops, and after a short time the magnesium completely disappears. The solution obtained is termed a Grignard reagent, so named after its discoverer V. Grig nard who first carried out this reaction in 1900. In the previous year P. Barbier had found that magnesium may be used to bring about the synthesis of the organic compound dimethylheptenol. and this suggested the above experiment to Grignard. Magnesium will dissolve in ethereal solutions of a wide range of substances which are constituted similarly to methyl iodide (alkyl and aryl halides and substituted derivatives of these), but all halogen com pounds of this class do not react with equal facility. In all cases success in the preparation of these reagents depends on the use of pure materials; the presence of water must be carefully avoided, or immediate decomposition of the reagents will be brought about.
Grignard reagents have proved of the greatest utility in organic chemistry as a means of effecting the syntheses of an extensive variety of substances. The preparation of the Grignard reagent methyl magnesium iodide, and the synthesis of phenylmethylcar binol by means of this afford a typical illustration of the manner in which these reagents are prepared and used. Methyl iodide dissolved in ether is slowly added to magnesium covered with ether. Reaction soon commences and is carefully regulated by efficient cooling. When this stage of the reaction is complete, ben zaldehyde dissolved in ether is added drop by drop to the well cooled and vigorously stirred solution. Each drop causes a hissing sound on striking the Grignard solution and an additive compound between the reagent and benzaldehyde shortly begins to separate. Decomposition of this by means of water and dilute acid yields phenylmethylcarbinol dissolved in the ethereal layer, from which it is separated, after drying, by distillation. As benzaldehyde and methyl magnesium iodide can react to give products other than phenylmethylcarbinol (viz., benzyl alcohol, acetophenone, phenyl styryl ketone, dibenzoylmethane, and aa'- diphenyldiethyl ether), it is necessary in the experiment above described to adhere to exact conditions with regard to quantities and details of working.
Symbolically the preparation of phenylmethylcarbinol is repre sented as follows: Although the Grignard reagent is represented as in (1), each molecule is actually combined with some of the solvent ether. Thus by evaporation of the ethereal solution under specified con ditions, a compound of the composition may be obtained, but the exact structure of this remains a matter for varied opinion. By heating more strongly, may be pre pared. The ethereal solution is, however, employed for synthetic purposes, and the equation is represented as above, since the prod ucts formed by the use of Grignard reagents may be accurately accounted for whilst ignoring the combined ether of the reagent.
The reaction given is one of a general type, namely, the reaction between Grignard reagents and compounds containing the carbonyl grouping (> C=0). By such reactions, alcohols, unsaturated hydrocarbons, and acids may be readily prepared. Frequently in addition to the carbonyl group a second grouping may also under go reaction as in the formation of tertiary alcohols from esters. Many reactions of types quite different from these -3 known, however, and the examples here cited provide only the most frag mentary indication of the application of Grignard reagents; for detailed summaries of original investigations see Alex. McKenzie, British Association Report, 1907, p.273; Henry Wren, "Organo metallic Compounds of Zinc and Magnesium" (1913) ; Chemical Society (London), Annual Reports, 1915, vol. xii., p. 97; 1925, vol. xxii., p. 121. (A. M. W.)</s>
|
<urn:uuid:76da3a4a-aed4-4450-bbea-9cdbd5526686>
|
CC-MAIN-2015-32
|
http://gluedideas.com/Encyclopedia-Britannica-Volume-10-Part-2-Game-Gun-Metal/Grignard-Reagents.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.941724
| 901
| 2.921875
| 3
|
Thank you for using the timer!
We noticed you are actually not timing your practice. Click the START button first next time you use the timer.
There are many benefits to timing your practice, including:
Studies of fatal automobile accidents reveal that, in the [#permalink]
02 Sep 2005, 05:23
84% (01:46) correct
16% (01:24) wrong based on 12 sessions
Studies of fatal automobile accidents reveal that, in the majority of cases in which one occupant of an automobile is killed while another survives, it is the passenger, not the driver, who is killed. It is ironic that the innocent passenger should suffer for the driver’s carelessness, while the driver often suffers only minor injuries or none at all.
Which of the following is an assumption underlying the reasoning in the passage above?
(A) In most fatal automobile accidents, the driver of a car in which an occupant is killed is at fault.
(B) Drivers of automobiles are rarely killed in auto accidents.
(C) Most deaths in fatal automobile accidents are suffered by occupants of cars rather than by pedestrians.
(D) Auto safety experts should increase their efforts to provide protection for those in the passenger seats of automobiles.
(E) Automobile passengers sometimes play a contributing role in causing auto accidents.
B can be easily rejected because, though drivers are not killed in majority of the accident, whether it is a rarity is under question 51% is majority, what if in 49% of the cases drivers are also seriously injured, it is not a rarity at all. _________________
Re: Studies of fatal automobile accidents reveal that, in the [#permalink]
19 Apr 2014, 04:58
it`s A, absolutely no doubt.
Answer: The statement implies that it is always the passengers who are innocent (because they are behaving careful). However, there is no proof that it is always the drivers who are at fault. This statement is actually very tendentious.
Hope that helps.
Re: Studies of fatal automobile accidents reveal that, in the
19 Apr 2014, 04:58</s>
|
<urn:uuid:edfc968a-d720-4527-b4ce-7ae51c4e8393>
|
CC-MAIN-2015-32
|
http://gmatclub.com/forum/studies-of-fatal-automobile-accidents-reveal-that-in-the-19504.html?kudos=1
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.938623
| 442
| 2.515625
| 3
|
What It Is
Reuse is different from recycling, although people often confuse the two. Recycling, while a good practice, uses a lot of energy and requires an industrial change to a product. This usually results in a new product of lesser quality.
Reusing a product, however, does not require major manufacturing manipulation. A reused object is simply put back to work, whether for its original purpose or not.
Examples of reusing materials include
- Donating old, working computers to a school
- Allowing customers to return used packaging (e.g., boxes, packing peanuts, bubble wrap), so that the business can use it again
- Furnishing an office with reclaimed materials instead of purchasing new chairs, tables, etc.
Why It Matters
Reusing resources can help a business save money while decreasing its ecological footprint. It increases the lifespan of investments and spares a business the cost of buying new products.
Reuse can also impact the community. Businesses can donate old materials and products to schools, creative art centers, or any number of reuse organizations. This benefits the community and avoids wasting good materials.
Ask yourself the following questions when throwing something away at work:
- Can we use this somewhere else in our organization?
- Could someone outside the organization use this?
Can we use this somewhere else?
Business owners and employees may be surprised by what ‘trash’ they can repurpose to help the firm. If you can think of a way to reuse an object (or part of it), keep it!
For example, instead of tossing used paper, consider shredding it and using it for packing material. Or set aside a bin for scrap paper, so employees can reuse the sheets for one-off printing or note taking.
Before tossing office furniture and supplies, think about using them in different rooms. An old filing cabinet doesn’t have to stay in your office. You can just as easily use it to store snacks in the break room. You can turn an old crate into a new stepping stool. Try thinking outside the box, you may be surprised what you come up with.
To help get your wheels turning, check out this post on SimpleOrganic.net, which talks about updating and reusing furniture.
Can someone else use this?
If you can’t reuse an object within your business, consider if someone else could use it. Perhaps you could donate your old computers to an underfunded school in your area. If someone else could use your items, don’t throw them away.
If you can’t think of any specific organizations that could use your materials, post them on a website like Freecycle. Freecycle connects people who are donating supplies with people who need them. When getting rid of electronics, try “e-cycling,” or donating your electronics for reuse. Visit the EPA website for more information on e-cycling.
- Conduct a waste audit.
- Acquire new materials through reuse networks.
- Establish reuse relationships with organizations in your community.
- Adopt a culture of reuse within your business.
Conduct a waste audit.
Conduct a waste audit, so you can see what items your business discards. This can help you figure out how (or who) can reuse these materials. Click here to learn how to conduct a waste audit.
Use reuse networks.
Establish reuse relationships.
Make an effort to forge ongoing reuse partnerships. Reach out to organizations in your community that may need and appreciate donations on a regular basis. Conversely, if you think you can reuse another organization’s goods, reach out to them for donations.
Adopt a reuse culture.
Encourage employee involvement and support of reuse. Consider including reuse in your code of ethics or posting signs around the office to promote reuse in the workplace. For help with making and finding signs, check out the Green Plus How To Guide article, Office Signage.
Finally, try to make purchasing decisions with reuse in mind. Ask yourself “Will we be able to reuse this product after we are done with it?”
Riley Life, a Green Plus Certified warehousing and order fulfillment business in Durham, NC, reuses all the incoming cardboard boxes it receives. This saves the business money and increases the lifespan of its packing material. Click here to learn more about Riley Life.
Another Green Plus Certified business, Taylor Companies, a furniture manufacturer, used to throw away its leather scraps and sawdust, until it found businesses that wanted these materials. Now a Canadian purse producer uses the leather scraps for its products and local horse farmers pick up the sawdust for bedding stables. This saves Taylor Companies $10,000 every year. Read more on this story here.
More Success Stories
The EPA’s WasteWise website highlights businesses that successfully incorporate reuse into their waste reduction plans. Visit this link for more information.
Resources for More Information
- 1000 Ideas for Creative Reuse by Garth Johnson
- Reduce, Reuse, Recycle: An Easy Household Guide by Nicky Scott
- CalRecycle offers signage that promotes paper reuse.
- eCyclingTools.com helps you purchase, manage, reuse, and recycle electronics.
- The EPA provides more information on how to reduce and reuse and also links readers to more detailed publications.
- The EPA also offers information on ecycling.
- Freecycle connects people who are donating supplies with people who need them.
- The Reuse Development Organization lists reuse centers here and gives an introduction to potential tax incentives here.
- The Reusable Resources Association
- The Scrap Exchange, a Green Plus Certified business and an example of a creative reuse organization, can be a useful resource.
- People often post free or inexpensive items on Craigslist.
- Where can I donate or recycle my old electronics? EPA
Reusing office supplies, furniture, and products can help your business save money, build partnerships, and reduce its ecological footprint.
Glossary of Related Terms
Reuse: Finding new uses for items instead of tossing them in the trash.
WasteWise: An EPA partnership program, which allows organizations to share reuse strategies and eliminate solid waste.</s>
|
<urn:uuid:345f49fa-4c20-4901-b076-1f24b2201ed3>
|
CC-MAIN-2015-32
|
http://gogreenplus.org/nuts-and-bolts-guide/planet-nuts-and-bolts-guide/waste-reduction-responsible-disposal/reusing-materials/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.901261
| 1,288
| 3.328125
| 3
|
The posterior cruciate ligament (PCL) is connective tissue located within the knee. The PCL connects the thighbone to the shinbone. This connection keeps the shinbone from moving too far backward, stabilizing the knee.
The PCL ligament can become strained or torn when a strong force is applied to it. This force can occur during sports or other high-stress activity.
Factors that may increase your chance of injuring the PCL include:
- Sports injury
- Motor vehicle accident
- Fall on a bent knee
- Strong force to the leg immediately below the kneecap
- Knee dislocation
A PCL tear may cause:
- Pain and swelling in the knee
- Soreness in the area behind the knee
- Weakness or instability in the knee
- Difficulty walking
- Pain when moving the knee
You will be asked about your symptoms and medical history. A physical exam will be done.
Images may need to be taken of the internal structure of your knee. This can be done with:
Ligament sprains are graded according to their severity:
- Grade 1—Mild ligament damage
- Grade 2—Partial tearing of the ligament
- Grade 3—Complete tearing of the ligament
Talk with your doctor about the best treatment plan for you. Recovery time ranges depending on the grade of your injury. Treatment steps may include:
Your ligament will need time to heal. RICE is often the main part of treatment:
- Rest—Activities may need to be restricted at first. Normal activities will be gradually reintroduced.
- Ice—Ice therapy may help relieve swelling. Heat or cold may be recommended throughout recovery if they provide benefits.
- Compression—Used for a limited time, compression bandages can provide gentle pressure to help move fluids out of the area.
- Elevation—Keeping the area elevated can help fluids drain out or prevent fluids from building up.
Your doctor may recommend a knee brace to stabilize the knee, and crutches to keep extra weight off your leg.
Prescription or over-the-counter medications may be advised to reduce pain.
A physical therapist will assess your knee. An exercise program will be created to help recovery and to strengthen the muscles.
Surgery may be needed to fully restore function of the knee. The decision to have surgery should be made after discussion with your doctor about your athletic needs, age, and associated factors.
Some steps that may help decrease your chance of getting a PCL injury include:
- Protect your knees by doing regular strengthening exercises for your thighs.
- Maintain proper technique when exercising or playing sports.
- Reviewer: Teresa Briedwell, PT, DPT, OCS, CSCS
- Review Date: 03/2015 -
- Update Date: 02/28/2014 -</s>
|
<urn:uuid:f88a6eeb-de2d-4e50-b2ca-70bfc8a08c5b>
|
CC-MAIN-2015-32
|
http://grandstrandmed.com/your-health/?/222175/sp
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.908658
| 596
| 2.84375
| 3
|
Updated at: 05/05/2013 4:35 PM
(AP) ANCHORAGE, Alaska - Alaska’s Cleveland Volcano is undergoing a continuous low-level eruption following an explosion early Saturday morning, scientists from the Alaska Volcano Observatory and the U.S. Geological Survey said.
Satellites and cameras suggest low-level emissions of gas, steam and ash, scientists said, and satellites detected highly elevated surface temperatures at the summit. A faint plume of ash extended eastward below 15,000 feet, but the Federal Aviation Administration said there were no flight restrictions as a result.
"Sudden explosions of blocks and ash are possible with little or no warning," scientists said. "Ash clouds, if produced, could exceed 20,000 feet above sea level."
The aviation alert level was raised from "yellow" to "orange." A major ash emission could threaten international flights.
The activity began with an explosion at 5 a.m. Saturday, followed by two others at 9:17 and 11:44 a.m. A nearby seismic network detected long-duration airwave signals that indicate a sustained eruption.
Cleveland is a 5,675-foot peak on a remote, uninhabited island 940 miles southwest of Anchorage. Its most recent significant eruption began in February 2001 and featured three explosive events that sent ash clouds as high 39,000 feet above sea level. It also produced a rubbly lava flow and hot avalanche that reached the sea.
The most recent minor ash emissions were observed in November 2012.
(Copyright 2013 by The Associated Press. All Rights Reserved.)</s>
|
<urn:uuid:37dfc4d2-a665-4028-8fe7-c8de8346a646>
|
CC-MAIN-2015-32
|
http://hbispace.com/printStory/whec/index.cfm?id=3022164
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.948944
| 328
| 2.765625
| 3
|
Myasthenia Gravis and Pregnancy
What is myasthenia gravis?
Myasthenia gravis (MG) is a complex autoimmune disorder that causes antibodies to destroy the connections between your mucles and your nerves. This causes muscle weakness and fatigue. Myasthenia gravis is rare. Only about 20 out of 100,000 people get it. At younger ages, MG is more common in women than men. The level of muscle weakness depends on how bad the disease is. Weakness usually happens in the muscles that you control, especially in the eyes, mouth, throat, and limbs.
Myasthenia gravis is diagnosed by various tests for muscle strength and nerve conduction. Treatment varies greatly among individuals depending on how bad the disease is. Treatment may include steroid medications and immunosuppressant drugs. Many people with MG have a thymectomy surgery to remove the thymus. The thymus is a gland located under the breastbone near the heart. Although MG may get better in some people after this surgery, the role of the thymus in MG is not fully understood.
How does pregnancy affect myasthenia gravis?
Myasthenic crises (increased symptoms that lead to difficulty breathing) may occur during pregnancy. In other women, the disease may go into remission (complete or partial absence of symptoms). Pregnancy does not appear to make the disease worse.
How does myasthenia gravis affect pregnancy?
Pregnant women with MG often have more weakness and fatigue because of the added weight and effort of pregnancy. Some pregnancy complications may be more likely in women with MG. Preterm labor (labor before 37 weeks of pregnancy) is more likely. It is thought that anticholinesterase medications used to treat MG may cause uterine contractions. Myasthenic crisis may be more likely during the stress of labor.
Delivery of the baby may be more difficult in women with MG. While labor itself is not affected by MG (the uterus is a smooth muscle), the muscles needed for pushing can be affected. This may make forceps and vacuum-assisted deliveries more likely.
A medication called magnesium sulfate that is commonly used for treating high blood pressure and preterm labor should not be used in women with MG. This drug blocks the nerve-muscle connections and can worsen MG muscle weakness.
Between 12 and 20 percent of babies born to women with MG may have neonatal myasthenia gravis. This occurs when antibodies common in MG cross the placenta to the developing fetus. These babies may be weak, with poor suck, and may have respiratory difficulty. Neonatal MG is usually temporary, lasting only a few weeks.
Management of myasthenia gravis during pregnancy
Pregnant women with MG need close monitoring of the disease. More frequent prenatal visits are often needed.
Management of pregnancy with myasthenia gravis may include the following:
Adjustment of medication type and dosage
Avoiding emotional and physical stress
Monitoring for signs of myasthenic crisis
Ultrasound. A diagnostic imaging technique that uses high-frequency sound waves and a computer to create images of blood vessels, tissues, and organs. Ultrasounds are used to view internal organs as they function, and to assess blood flow through various vessels used to monitor fetal growth and development.
Fetal monitoring (for signs of muscle weakness that may indicate fetal MG)
Other fetal testing including Doppler flow studies (to monitor the blood flow in the uterus and umbilical cord), used to check for preeclampsia or fetal growth problems.
Women with myasthenia gravis can increase their chances for a healthy pregnancy by getting early prenatal care and working with their health care providers to manage their disease.</s>
|
<urn:uuid:9a9f7e33-4c81-4331-8f39-9e9f52f8cc6e>
|
CC-MAIN-2015-32
|
http://healthcare.utah.edu/healthlibrary/related/doc.php?type=90&id=P02434
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.943933
| 785
| 3.265625
| 3
|
It’s called “vocal fry,” and once you’ve heard it, you’ll start noticing it everywhere.
Also known as “creaky voice,” vocal fry refers to the low, guttural vibrations that sometimes occur in speech, often appearing at the end of sentences. (Here’s an example.) It’s the lowest of three so-called vocal registers, the other two being falsetto at the high end, and modal, which is the normal speaking register. As one linguist put it, vocal fry has been commonly identified in speech “since forever” (in some languages, it’s a legitimate part of the phonemic system), but now some studies hint that it’s particularly popular among young American women of a certain type.
Singers like Britney Spears slip into vocal fry when hitting low notes or for sultry effect, noted Science NOW’s Marissa Fessenden, characterizing the creak as a “language fad.” Kim Kardashian is guilty of it. So is Zooey Deschanel. And a small new study in the Journal of Voice suggests that it may be common in young female college students, or at least the ones the researchers studied.
Led by speech pathologist Lesley Wolk, researchers at Long Island University (LIU) recruited 34 female students and had them participate in a sentence-reading task. They analyzed the women’s speech based on their pitch, as well as the “jitter” and “shimmer” of their voice — changes in pitch and volume, respectively. Overall, two-thirds of the women used creaky voice, the authors found, particularly at the end of sentences, where it can be used as a sort of linguistic marker.
Notably, the study did not analyze any male counterparts for comparison, but citing forthcoming data from the LIU researchers, Science NOW’s Fessenden reported that they will be the first to document that creaking is a girl thing:
The group is also the first to verify that American women are much more likely to exhibit the behavior than men, as its yet-unpublished data show that male college-age students don’t use the creaky voice. The team’s next steps will attempt to find out when this habit started — and if it is indeed a budding trend.
Actually, the LIU group is one step behind language guru Ikuko Patricia Yuasa at the University of Iowa, who published a study in the journal American Speech last fall looking at the use of creaky voice in American women. Yuasa found that American females used creaky voice more often than American males and Japanese females. She also found that people tend to associate the female creak with being educated, urban-oriented and upwardly mobile.
For the study, Yuasa recorded conversations about food among male and females, a topic judged to be interesting but not likely to make people emotional (which is usually true outside of Hell’s Kitchen). She then analyzed random snippets of the recordings for creaky voice, finding that on average 12.5% of the words spoken by American females contained creaks, compared with 6.9% of those uttered by Japanese females and 5.6% of those by American males.
Despite its seeming prevalence in women, creaky voice has historically been associated with men — and authority. That seems intuitive, in fact, since a rumbling voice typically connotes masculinity. Yuasa cites past studies that have linked creaky voice to men and higher status; some researchers in the 1980s even deemed it “hyper-masculine” and a “robust marker of male speech.”
Perhaps that same semblance of authority can explain why young, college-bound women seem to be employing the creak. Yuasa posited that it could be a way to compete with men by taking advantage of the attributes associated with a lower-pitched voice. “Creaky voice may provide a growing number of American women with a way to project an image of accomplishment,” Yuasa wrote in her 2010 study, “while retaining female desirability.”</s>
|
<urn:uuid:021bd5a3-28fa-43af-83e1-c9a0b0166c04>
|
CC-MAIN-2015-32
|
http://healthland.time.com/2011/12/15/get-your-creak-on-is-vocal-fry-a-female-fad/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.962439
| 876
| 2.796875
| 3
|
Archaeologists warn Taliban destroying Pakistan's ancient heritage
"Militants are the enemies of culture," said Abdul Nasir Khan, curator of Taxila Museum, one of the premier archaeological collections in Pakistan.
"It is very clear that if the situation carries on like this, it will destroy our culture and will destroy our cultural heritage," he told AFP.
Taxila, a small town around 20 kilometres (13 miles) south of Islamabad, is one of Pakistan's foremost archaeological attractions given its history as a centre of Buddhist learning from the 5th century BC to the 2nd century.
Violence is on the rise in Pakistan as Taliban bombers and gunmen strike with increasing frequency and intensity in the cities of North West Frontier Province and around the capital Islamabad.
comments powered by Disqus
sell mbt masai shoes - 11/24/2009
The mbt walk shoes is part of mbt usa the new line scarpe mbt of mbt shoes which run slightly narrower, and have a slightly different feel. Women mbt shoes have all the benefits of the other styles like encouraging you to carry your weight more efficiently.This cheap mbt shoes help improve posture, reuce back pain, and alleviate joint pressure. http://www.mbtshoessale.com/
- Kitty Genovese Killing Is Retold in the Film ‘37’
- Lithuania wants to erase its ugly history of Nazi collaboration
- Huckabee: Iran nuclear deal will march Israelis ‘to the door of the oven’
- Connecticut Democrats drop Thomas Jefferson and Andrew Jackson names from annual fundraising dinner
- AP releases a million minutes of filmed history to YouTube
- Historian Howard Segal says the cost of paying for expensive commencement speeches is diverting funds from where they’re most needed
- Historian Shelly Cline researches female Nazi guards
- Owen Chadwick, Eminent Historian of Christianity, Dies at 99
- Members of the University of South Florida’s history department are finding new ways to get their jobs done after budget cuts
- Testing the U.S.-Israel Bond</s>
|
<urn:uuid:9ddf1a74-17aa-40ca-a5bf-a3862f8708ff>
|
CC-MAIN-2015-32
|
http://historynewsnetwork.org/article/120408
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.911273
| 433
| 2.640625
| 3
|
In today’s dose of art history geek news, we turn to the Daily Mail, which reports that “art restorers have discovered the figure of a devil hidden in the clouds of one of the most famous [13th C.] frescos by Giotto in the Basilica of St Francis in Assisi.” If Giotto wasn’t already the master of kicking off the Renaissance, his art history cred just skyrocketed (if that’s possible) with the latest discovery.
According to Reuters:
The discovery was made by Italian art historian Chiara Frugone. It shows a profile of a figure with a hooked nose, a sly smile and dark horns hidden among the clouds in the panel of the scene depicting the death of St Francis.
And then the art history game of “who did it first” kicks in as the Washington Post writes:
Giotto appears to have beaten by nearly two centuries a technique attributed to Andrea Mantegna, who in one painting shows a knight emerging from a cloud.
Damn, Giotto. You just pwnd Mantegna. The Mantegna work they are referring to is his “St. Sebastian” (1456-59) in Vienna:
You can see the Giotto fresco in a larger context here. I can barely see the horns of the figure in Giotto’s mural but I’ll leave the final decision with those who have seen it in person and can make out the color changes clearly — from here it looks more like a dark spot though I can see what could be horns.
Yet more proof that Giotto was truly awesome and deserves his title of the first master of the Italian Renaissance. No word yet as to whether the devil discovery impacts the interpretation of the mural cycle.
Get Hyperallergic in your Inbox!
Subscribe to our email newsletter. (Daily or Weekly)</s>
|
<urn:uuid:aab39c5d-ef2b-4707-a16f-0bdb830504f7>
|
CC-MAIN-2015-32
|
http://hyperallergic.com/40127/giotto-assisi-devil-mantegna/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.953472
| 393
| 2.6875
| 3
|
Two staples of twentieth-century American culture share a common progenitor. Ironically, the father of the Indy 500–and Miami Beach–rolled in on two wheels. Carl Fisher and his brothers ran a successful bicycle repair shop in Indianapolis during the 1890s, at the height of the national bicycle craze.
Automobiles began to eclipse bikes in the new century, however, and Indiana was the center of the industry. Fisher and a partner opened one of the first automobile dealerships in the nation, marketing Packards, Stutzes and Oldsmobiles with such publicity stunts as launching a chassis over the city via hot air balloon.
Teaming up with former biking associate James Allison, Fisher made his fortune manufacturing gas-fired auto headlamps, ultimately selling their company “Prest-O-Lite” for $9 million to Union Carbide.
At the same time, Fisher and three partners developed a proving ground where auto manufacturers in the vicinity could showcase their latest models. The first few events around the two-and-a-half-mile crushed stone track flopped, but after Fisher paved the Indianapolis Motor Speedway with bricks, the Indy 500 was off and running by Memorial Day, 1911.
Ever the auto industry impresario, Fisher convinced private and corporate interests to fund an improved roadway between New York and San Francisco. Begun in 1913, the Lincoln Highway generated enthusiasm among the American public, ultimately informing such federal projects as the Interstate Highway system.
Miami Beach was still something of an outpost when Fisher vacationed there in 1913. His initiative to fund the development of the Dixie Highway, running from Indianapolis to Florida by 1916, served the interests not only of the car industry, but Fisher’s own plans to create a tourist destination in Miami Beach.
The resort grew over 440 percent in the first half of the twenties, after which Fisher’s fortunes, along with his health, began to decline. Carl Fisher succumbed to cirrhosis of the liver in 1938, and was ultimately interred in the family mausoleum at Indy’s Crown Hill Cemetery.
This essay was drawn from the following source: McDonald, John. P. Lost Indianapolis. Chicago, Illinois: Arcadia Publishing, 2002.</s>
|
<urn:uuid:e71b5e34-2c98-4915-a362-d6b3f92d2c02>
|
CC-MAIN-2015-32
|
http://indianapublicmedia.org/momentofindianahistory/spinning-dreams-wheels/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.952851
| 458
| 2.59375
| 3
|
American History Myths Debunked: The Indians Weren’t Defeated by White Settlers
When the “6 Ridiculous Lies You Believe About the Founding of America” was posted May 15 by Cracked.com is started something of an Internet sensation; and a spike in people searching for things like “who discovered America?” More than 1.5 million people have viewed the story thus far.
So we’ve decided to go a step further and offer our own take on their six myths, see where they got their information and see what else we can find.
Myth number six says “The Indians Weren’t Defeated by White Settlers,” it instead says Native Americans were wiped out by a plague.
This plague was smallpox, something Native Americans had never seen because it came from living in close proximity to livestock, something farmers in Europe had been doing for thousands of years.
Cracked.com sited a PBS series titled “Guns, Germs and Steel” based on the book by Jared Diamond that details how Europeans brought that disease and others like the flu and measles with them, killing some 90 percent of the Native American population between the time Columbus showed up and the Mayflower landed.
“More victims of colonization were killed by Eurasian germs, than by either the gun or the sword, making germs the deadliest agent of conquest,” says PBS.org.
And reports of the British then using biological warfare to gain an edge in subsequent battles against the American Indians abound. One of the most prevalent examples of its use came from Lord Jeffrey Amherst, who was commanding general of British forces in North America during the final battles of the French & Indian war (1754-1763). The town of Amherst, Massachusetts was later named for him, as was Amherst College.
Historical stories point to Lord Amherst requesting that smallpox infected blankets be sent to the Indians, like this one in Carl Waldman's Atlas of the North American Indian about a siege of Fort Pitt by Chief Pontiac’s forces during the summer of 1763: “Captain Simeon Ecuyer had bought time by sending smallpox-infected blankets and handkerchiefs to the Indians surrounding the fort—an early example of biological warfare—which started an epidemic among them. Amherst himself had encouraged this tactic in a letter to Ecuyer.”
To push their point home, the Cracked.com post sites the book 1491: New Revelations of the Americas Before Columbus by Charles C. Mann in which Giovanni de Verrazzano, an Italian sailor, describes first seeing the East Coast of North America in 1523. “He observed that the coastline everywhere was ‘densely populated,’ smoky with Indian bonfires; he could sometimes smell the burning hundreds of miles away.”
The Cracked.com post says there were between 20 million and 100 million people here before the plague, and the entire population of Europe was 70 million, so let’s face it, the settlers couldn’t have defeated the Native Americans without the diseases they brought with them, especially if the Vikings hadn’t been able to before them. Read more about that in yesterday’s post, “American History Myths Debunked: Columbus Discovered America.”
Also check out the first in ICTMN’s series based on the Cracked.com post, “American History Myths Debunked: No Native Influence on Founding Fathers.”
You need to be logged in in order to post comments
Please use the log in option at the bottom of this page</s>
|
<urn:uuid:a79f3bdc-0ad3-4611-b31b-8ea15a60ce69>
|
CC-MAIN-2015-32
|
http://indiancountrytodaymedianetwork.com/comment/76639
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.959399
| 776
| 2.984375
| 3
|
The medieval city of Provins was named a UNESCO World Heritage Site in 2001. The police station sits on a site that joins the historic center to a residential neighborhood, so Ameller, Dubois & Associes had the task of designing a complex that did not disrupt the architectural flow between the historic and private homes, while respecting the heritage of the site. Originally, the site marked the gate to the walled city of Provins, so the architects took that as inspiration to create a police station that could also function as a gateway to the city.
The structure rises from a low stone wall, made from small locally sourced white cobblestones – this element is evocative of the walled cities of Medieval times. The wall houses the ground floor of the station and the parking lot, and offers a barrier of protection to the building behind it.
The second and third floors are encased with a glass curtain on the front façade that floods the modular offices with light. They glass is lined with copper louvers, which gently filter the light while reducing solar gain. Three large sections capped with large windows jut out, directing sunlight into the interior.
The opposite façade is clad in thick concrete, which covers the more private areas of the police station – the interrogation rooms and holding cells. An interior patio fills the inside with more light and fresh air while maintaining privacy.
The innovative police station has a great set of architectural elements and green features that set it apart while allowing it to blend in with the rich history of Provins.</s>
|
<urn:uuid:7c78c58d-0bfa-4ef6-b548-f5b4eb1517d5>
|
CC-MAIN-2015-32
|
http://inhabitat.com/copper-louvered-provins-police-station-sits-lightly-on-unesco-world-heritage-site/ameller-dubois-provins-police-station2/?extend=1
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.95513
| 313
| 2.546875
| 3
|
RECOMMENDED FOR YOU:X
Scientists to Use World’s Largest Laser to Create Star on Earth
Images via CNN
According to scientists at a government lab in Livermore, CA, all we need to do in order to save our planet from its energy woes is create a star right here on Earth. It’s that simple! All joking aside, researchers at the Lawrence Livermore National Laboratory are 100% serious and believe they’ve come up with a way to use the world’s largest laser (it’s about 3 football fields long) to trigger a nuclear reaction so powerful that it will make a star form right on the surface of the Earth. We’ve written about the laser itself before, but read on to learn more about how they intend create the mini-star and solve our power issues with near limitless energy.
What the scientists are proposing is a form of nuclear fusion – a miracle power solution that has been attempted many times in the past. All that have tried, however, have failed, so many in the scientific community have reason to believe that this new attempt won’t be any different. The team at Livermore is optimistic though. Bruno Van Wonterghem, a manager of the project told CNN, “We have a very high confidence that we will be able to ignite the target within the next two years,” [thus proving that controlled fusion is possible. That would put the lab a step closer to] “our big dream, which is to solve the energy problems of the world.”
Images via CNN
All that seems fine and dandy, but how does one go about building a star? First, build the largest laser in the world, and then split this humongous laser into 192 beams. Then, aim all of them at a single point that’s about the size of a BB pellet coated with deuterium and tritium (two reactive isotopes of hydrogen that can be extracted from seawater). Make sure to surround those atoms with a gold capsule that’s smaller than a thimble. Lastly, the fun part – fire the laser! If the whole Earth doesn’t implode (we’re just kidding, according to Lynda Seaver, a spokesperson for the project, there is no danger to the public), the resulting reaction will be more than 100 million degrees Celsius (hotter than the center of the sun) and will exert more pressure than 100 billion atmospheres. Then hydrogen isotopes will band together with so much force and heat that their nuclei will fuse, creating energy which, as you can imagine, will be plentiful enough to supply abundant power.
How soon will this mini-star be a reality? The Livermore team claims that it will be possible as early as this summer but the U.S. Government Accountability Office released an audit of the lab this month citing hold-ups and mismanagement and basically saying that it is unlikely the scientists will create a fusion reaction this year. While we’re still skeptical that this extremely ambitious plan will work, we think the amount of money and time being poured into the project does add credibility to the fact that we can’t play around about our energy problems anymore. We need to bring out the big guns – uh, lasers, now.
Browse by Keyword</s>
|
<urn:uuid:704bb6f5-b46d-499b-924a-731fd41290dd>
|
CC-MAIN-2015-32
|
http://inhabitat.com/scientists-to-use-worlds-largest-laser-to-create-star-on-earth/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.92643
| 692
| 3.40625
| 3
|
Section 5 of the Voting Rights Act requires states with a long history of flagrant discriminatory practices to clear any changes it makes to the electoral process with the U.S. Justice Department. Nine states, most of them southern, and several counties, cities and smaller political locales are covered under the Act. The small Austin municipality argues that the Act is unconstitutional because it infringes on state's rights and over extends federal power. Furthermore, they say the America that elected Barack Obama as president is dramatically different from the America that existed when the Act was passed in 1965, implying that the country has moved beyond its race issues.
We must not forget that it has not even been a decade since the 2000 Florida voting scandal, where African Americans and poor people were disenfranchised. Four years later, in Ohio, there was a similar debacle. In both instances, voters lost faith in the system and George W. Bush was victorious. In 2006, before renewing the Act, Congress held 22 hearings and determined there was enough evidence to support extending the law. The Voting Rights Act was passed to counter, and put an end to, state level practices, like poll taxes and literacy tests, used to prevent blacks from voting. While those specific barriers may no longer exist, voter discrimination and intimidation do.
We all long for a 'post racial' America but those of us who have been burned too many times are cautious. Let's wait another decade and continue to monitor voting practices before we begin dismantling the Act. America may have changed but she is far from perfect.</s>
|
<urn:uuid:e964ee9e-0631-43c1-bf8c-1ccd7f7acc2a>
|
CC-MAIN-2015-32
|
http://insightnews.com/commentary/4408-continue-voting-rights-fight
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.969362
| 312
| 3.0625
| 3
|
Wi-Fi, sweet deliverer of information and porn, may be killing trees. A study by a Dutch university suggests that Wi-Fi radiation causes weird abnormalities in trees. This is disturbing, as we love both Wi-Fi and trees.
The dutch city of Alphen aan den Rijn commissioned the study five years ago to figure out why their city's trees were developing weird growths, according to PC World. The study, conducted by a researcher at Wageningen University, found that 70 percent of trees in urban areas exhibited similar symptoms today, while only 10 percent did five years ago. What's to blame for the increase? Wi-Fi, maybe.
From PC World:
The study exposed 20 ash trees to various radiation sources for a period of three months. Trees placed closest to the Wi-Fi radio demonstrated a "lead-like shine" on their leaves that was caused by the dying of the upper and lower epidermis of the leaves. This would eventually result in the death of parts of the leaves. The study also found that Wi-Fi radiation could inhibit the growth of corn cobs.
But when bunch of media outlets picked up the story and were all, "BREAKING: Wi-FI IS AIRBORNE DEATH," the Dutch Antennebureau cautioned that these are only initial results, and previous studies showed Wi-Fi was harmless."There are no far-reaching conclusions from the results. Based on the information now available, it can not be concluded that the WiFi radio signals lead to damage to trees or other plants." (Isn't that cute? The Dutch have entire bureau dedicated to antennae.)
In conclusion: Wi-Fi signals will make your baby's arms turn into trees.</s>
|
<urn:uuid:29424568-dc3b-491b-9f9f-09d960983476>
|
CC-MAIN-2015-32
|
http://io9.com/5695095/study-says-wi-fi-makes-trees-sick
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.963078
| 355
| 2.8125
| 3
|
Harvester ant colonies are able to decide how many foragers they need to send out of the nest by using a protocol system that's eerily similar to the one IT professionals use to determine how much bandwidth is available on the internet. This so-called "anternet" apparently proves that ant decision-making and behavior is regulated by a sophisticated set of algorithms that have evolved over the course of millions of years — algorithms that we ourselves have only recently discovered.
The research was conducted by Stanford ant biologist Deborah Gordon and computer scientist Balaji Prabhakar, whose findings were recently published in PLOS. Prabhakar was brought on board to see if he could find any correlations between ant behavior and computer science. After some preliminary observations he quickly realized that the ants were essentially using the same algorithm that describes TCP, the Transmission Control Protocol. TCP is used to discover how much bandwidth is available for transferring a file. But instead of bandwidth, the ants are using their own version of TCP to determine how much food is available based on the reports coming back from foraging ants.
TCP was an important breakthrough that allowed information technologists to take the internet from a few dozen nodes to the billions currently in use today. It works by transferring a file from a source to the destination in a series of packets. The source is continually informed by the destination as to when the packets have arrived. So, if it's taking too long, there must not be much bandwidth available, and the source will re-adjust by decreasing the rate of packet transmission — what's referred to as throttling.
As it turns out, the ants are doing exactly the same thing — but they're not looking to throttle data, they're looking to control the release of forager ants.
A forager harvester ant will only return to the colony after it finds some food. Thus, if there's lots of food in the immediate environment, the number of ants returning with positive food messages will be high; but if there's little to no food around, very few ants will be transmitting their acknowledgement messages back to the colony. So, with a returning ant frequency established, the colony can adjust the forager throttle accordingly. When there's more food available, the hive mind releases more ants given the confirmed presence of food.
It's worth noting that harvester ants do not use pheromone trails, and that they transmit information to each other using their antennae.
In the study, the researchers did not specify why the ants did not increase their foraging activities in consideration of trace amounts of food. One possible explanation is that the colony trusts the data coming back from the foragers, and that sending more foragers would simply be a waste of time and energy.
As for testing this theory, Prabhaker wrote an algorithm to predict the foraging behavior of ants depending on the amount of food available. It turned out that his ant-algorithm was almost identical to TCP. Moreover, he discovered that ants follow two other aspects of TCP, namely slow start phases (where a source sends out a large wave of packets at the beginning of a transmission to assess bandwidth), and a transmission time-out (where the source will stop sending out data packets (or ants) when a data transfer is broken or disrupted). In the latter case, ants will also stop sending out ants if, after 20 minutes, no foragers have returned to the nest.
Fascinatingly, the team speculates that, had IT developers discovered this ant algorithm during the 1970s, they very well might have used it to develop TCP. Moreover, they believe the ants have more to offer, and strongly suspect they could still teach us about the design of network systems. The researchers contend that each ant may be very basic in terms of its capacities, but that the collective is capable of forming incredibly complex and sophisticated tasks.
The entire report can be read at PLOS.</s>
|
<urn:uuid:e3f4ca15-1e02-410f-9db6-4066e04c0c82>
|
CC-MAIN-2015-32
|
http://io9.com/5938267/harvester-ants-use-their-own-internet-for-hive-mind-decision-making
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.96249
| 802
| 3.84375
| 4
|
December 1941 was not a good time for Adolf Hitler — and you can see it on his face in these remarkable color photos taken by his official photographer, Hugo Jaeger. The war was supposed to have been over by this point — but the Russian campaign was turning into a fiasco and the Americans had now entered into the fray. Adolf, it would appear, was having a hard time getting into some Christmas cheer.
The pictures are definitely surreal — and even a bit pathetic. While he was setting the world ablaze, Hitler organized a Christmas party for his generals in Munich. Earlier that spring, when the Russian campaign was launched, he had promised everyone that the war would be over by Christmas. Instead, he had to spend it with his generals while contemplating an uncertain future.
The photos show the usual Nazi iconography backdropped against advent candles, the glint of ornaments, and streams of tinsel dangling from a giant Christmas tree. It's fascist dystopia meets A Christmas Carol.
LIFE magazine explains how it came into the possession of these photos:
The photos published here were part of an enormous stash of color transparencies made by Hitler's personal photographer, Hugo Jaeger, and buried in glass jars on the outskirts of Munich in 1945, near the war's end. Advancing Allied forces had almost discovered the pictures during an earlier search of a house where Jaeger was staying (a bottle of cognac on top of the transparencies distracted the troops), and Jaeger — justifiably terrified that the photos would serve as evidence of his own ardent Nazism — cached them in the ground. A decade later, he exhumed the pictures; 10 years after that, he sold them to LIFE, which published a handful in 1970.
You can find more photos at LIFE, including an explanation as to why the anti-religious Nazis were celebrating Christmas in the first place.
All images via LIFE.</s>
|
<urn:uuid:c6289b72-be66-4087-870b-76e1483dbe79>
|
CC-MAIN-2015-32
|
http://io9.com/5970184/this-nazi-christmas-party-must-have-been-the-worst-ever?tag=history
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.981367
| 391
| 2.671875
| 3
|
It won't help you sling webs or climb walls, but SpiderSense, the suit created by Victor Mateevitsi, a computer science PhD student at the University of Illinois in Chicago, will give you one of Peter Parker's powers. The suit uses a combination of robotic arms and ultrasonic technology to warn its wearer that someone—or something—is drawing near, giving you an approximation of those handy Spidey Senses.
New Scientist spoke to Mateevitsi about the suit, which contains tiny robotic arms sitting with microphones. The suit sends out ultrasonic signal, and the microphones pick up the reflections of the sound waves. When the reflected waves indicate that an object is too close, the robotic arms activate, pushing into the wearer's body.
Appropriately, Mateevitsi devised a mini-superhero test for his supersuit. He put students in the suit, blindfolded them, and handed them a stack of cardboard ninja throwing stars. When the student in the suit sensed someone coming at them, they were instructed to throw a star at the "attacker." Ninety percent of the time, the students were able to sense the "attacker" and throw the star at them.
Mateevitsi sees the suit as a possible safety solution for cyclers so they can better sense approaching traffic. But between this and the Air Force's vacuum-powered wall-crawling technology, we might be close to building our very own Spider-Man.
Spidey-sense suit tingles when someone gets too close [New Scientist via The Mary Sue]</s>
|
<urn:uuid:1d58f24f-fecb-4818-8940-3920ec2e8811>
|
CC-MAIN-2015-32
|
http://io9.com/5986362/real-life-spidey-sense-suit-tingles-when-objects-get-close
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.936006
| 325
| 2.65625
| 3
|
Survey Weeds—Late Spring
By surveying weeds in late spring, you can identify any species that escaped previous control attempts and determine what perennials are present. Weeds in tree rows must be managed, but annual weeds in row middles may be beneficial. If herbicides were used, surveying identifies any need for changing to another herbicide.
Record your observations in order to make weed management decisions. Keep these records so that you can track weed population information from year to year to better understand how weed populations change, problems with herbicide resistance, and how effective your management operations have been over the long term.
How to survey your orchard
Survey information collected over a period of years tells you how weed populations may be changing and how effective your management operations have been over the long term and help you better understand ongoing weed control problems such as resistance.
PDF: To display a PDF document, you may need to use a PDF reader.</s>
|
<urn:uuid:b086dd5b-2b34-4f9d-a5ae-c4a0932fb211>
|
CC-MAIN-2015-32
|
http://ipm.ucdavis.edu/PMG/C603/m603fcweedsurvey.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.897643
| 194
| 3
| 3
|
- Posted December 16, 2012 by
This iReport is part of an assignment:
Newtown school shooting: Thoughts and tributes
Could "Owner-Authorized" Firearms Prevent Another Sandy Hook Tragedy?
In 2003, The National Academy of Engineering reported that fingerprint-read, “smart” or “personalized” firearms technology was available for what are known as “owner-authorized weapons.” In 1994, BAFTA released a statement suggesting "if all the handguns in America were replaced by Smart Gun technology, it would surely cut down on black market sales and the urge for thieves to steal your weapon."
In fact, O'Dwyer introduced their personalized weapon in June of '99, but that organization is contracted with our Department of Defense. Smith Wesson had reportedly been on the literal brink of development at an earlier point in time as well -by a decade before yesterday’s shocking events at Sandy Hook Elementary in Newtown, CT.
An "owner-authorized/ personalized firearms" refer to firearms that have a permanent programmable biometric or other permanent programmable feature as part of the original manufacture that renders the gun incapable of being fired except when activated by the lawful, registered owner or other users authorized by the lawful owner, and that cannot be readily deactivated.
These “personalized” firearms, also known as “smart” guns, are firearms that can only be fired by authorized users. Personalized guns are designed to prevent shootings, both intentional and unintentional, by children and other unauthorized users. A 2003 study analyzing data from seven years of unintended firearm deaths or deaths of undetermined intent found that 37% of the deaths could have been prevented by a smart gun. Personalized guns also render firearms useless to thieves and criminals who gain access to law enforcement weapons during the course of an arrest or other encounter.
Personalized guns incorporate a variety of design technologies, including magnetic devices and radio frequency transponders. Fingerprint identification and other biometric technologies (i.e., those that rely on the authorized user’s unique physical characteristics) are also being developed.
However, there are a number of concerns about these weapons.
Foremost, is the concern by gun manufacturers that the weapons may result in failure of the gun to authorize, leading to accidental deaths and civil liability. Many programmers and biometrics engineers of past years have determined scientific feasibility and even cost estimates (about 50% higher than current weapon costs) and the current successes in Information Technology is aimed at this precision of applied technology, particularly so within the computer applications boom of the last few years and rapid-release of new and improved versions of all technology.
Another concern is the reported fears by citizens about the loss of personally-identifiable data, specifically DNA and/or fingerprint information being used for reasons apart of the personalized weapon registry of their guns.
As such, this technology remains on the literal shelf for individual gun owners.
The problem with moving these weapons to the shelf is not a technological one; rather, it is a financial and legal risk.
Who will carry the civil liability of any failure rate (if any) of these weapons?
Or, the more immediate question about whether this owner-authorized gun technology had been available before the morning events at Sandy Hook Elementary.
What if Adam Lansz’ mother had purchased a personalized gun in favor of the requirement in Connecticut to purchase a locking device with the sale of her handguns/rifle? Was that lock in use? We may never know.
Still, we must ask if people are locking up their weapons once that device is home? Can we assume all gun owners are educated about locking devices, options for personalized weapons, or the risks inherent to special populations?
Ultimately, we ask if this biometric personalized firearm technology could have prevented the killing of 20 beautiful, innocent children, 6 adults and the shooter. If indeed the answer is “yes.”, please, let us commence to the development and adoption of some new safety measures. The black and white options of gun control laws are not likely to be resolved in real time but technology and better education measures could be implemented and evaluated as a part of the current debate.
Conceptually, this could work. Constitutionally, perhaps we begin by offering this as an optional safety net for parents or caregivers to the young, mentally or emotionally challenged. Maybe a Grandfather Clause is in order to address the concerns of weapon manufacturers to not be liable to retrospective litigation where impending civil liability may be the primary hold-up in manufacturing. I don't know, but I think we can all recognize that unless there is some movement toward mandating or incentivizing new initiatives like this, gun manufacturers will continue to withhold this advancement.
At the end of this day, yesterday, and tomorrow, many of us wish there had been some way to protect those children and adults. Adam Lansz' mother owned those weapons legally. Might she have opted for the smart gun if she'd had the choice?</s>
|
<urn:uuid:002d4f90-d94d-42cd-a7aa-53e053392335>
|
CC-MAIN-2015-32
|
http://ireport.cnn.com/docs/DOC-896833
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.95882
| 1,027
| 2.546875
| 3
|
Certainly your students have studied the ideal gas law in chemistry. But chances are, all they did (in their minds) was plug numbers into the equation PV=nRT. A major first step in teaching this unit is to give your class a firm understanding of the physical meaning of each of these variables.
The three variables to measure are pressure, volume, and temperature of the gas in the cylinder. I attach a Vernier pressure probe to one of the ports on the front to measure, um, pressure. Temperature can be taken care of with a Vernier temperature probe inserted into the hole in the stopper on top of the metal cylinder. It’s only volume measurement that’s truly tricky.
If you can measure the height of the piston, then the volume of the gas under the piston and in the cylinder can be calculated. Pasco provides an instruction packet that suggests the use of a rotary motion sensor or smart pulley to get the piston’s position. I don’t do that, though it should work fine.
Instead, I mount a motion detector above the piston. By measuring the height of the detector above the piston’s lowest point, I can set the Logger Pro software to calculate the volume of the gas automatically from the motion detector reading. Thus, I’m collecting volume, temperature, and pressure data as many as 20 times per second.</s>
|
<urn:uuid:0b4192ee-58d8-4833-99ae-b7967936b288>
|
CC-MAIN-2015-32
|
http://jacobsphysics.blogspot.com/2009_11_01_archive.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.924041
| 287
| 3.671875
| 4
|
It's perfectly fine to use only half-width arabic numbers.
However, there are other rules in operation, coming from various time in the history of writing and printing:
- A. Don't use arabic numbers at all - maybe seen in formal documents:
- B. Half-width for two-digit numbers, otherwise full-width - mostly in printed materials:
- C. Full-width for a digit, half-width for more than two digits - sometimes used in electronic texts and printed materials:
If you're writing some serious documents, check if there is any style guide provided that specifies which to use when. Or you can adopt one of the publicly available style guides. For example,
All of the three recommends to use half-width numbers in general. So there you have a justification to use half-width numbers only.
[Note: my knowledge is biased towards software documentations]
Traditional Japanese typesetting faced the problem of how to arrange multilingual text that include Japanese and Roman characters in an aesthetically pleasing way, when Roman characters were introduced to Japan.
Take vertical typesetting. When you're writing vertically, there is no way for a word with more than two half-width letters to fit in a single cell without losing readability. They'll have to occupy individual cells vertically next to each other. In fact, Rule B is actually optimized for vertical writing. ex:
When digital publishing entered the scene, these conventions have been carried over to electronic text composition. Consequently, some people use different standards for full-width/half-width numerals as we've seen above.
Side note: Another practice in writing electronic text tries to replicate the aesthetics of horizontal typesetting. That is, inserting a half-width space whenever there's a pair of half-width letter and full-width letter:
空白を 1 つ -
空白を1つ. This is a workaround around the fact that modern consumer softwares don't layout Japanese texts properly. Probably except TeX. Whether this practice is acceptable or not is a favorite topic of Japanese blogosphere that pops up every so often.
- 数字の扱い方 (how to handle numerals) from a company specializing in desktop publishing. Covers historical backgrounds.
- More ways of mixing different character types are covered in W3C's Requirements for Japanese Text Layout, which is based on a standard established by Japanese Industrial Standards Committee.</s>
|
<urn:uuid:42b4fb41-a8c9-4d12-9842-8b14cf92bf46>
|
CC-MAIN-2015-32
|
http://japanese.stackexchange.com/questions/710/arabic-numbers-half-width-or-full-width/1673
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.920757
| 514
| 2.84375
| 3
|
Home > Deeds > Aseret ha-Dibrot: The "Ten Commandments"
< Previous | Next >
According to Jewish tradition, G-d gave the Jewish people 613 mitzvot (commandments). All 613 of those mitzvot are equally sacred, equally binding and equally the word of G-d. All of these mitzvot are treated as equally important, because human beings, with our limited understanding of the universe, have no way of knowing which mitzvot are more important in the eyes of the Creator. Pirkei Avot, a book of the Mishnah, teaches "Be as meticulous in performing a 'minor' mitzvah as you are with a 'major' one, because you don't know what kind of reward you'll get for various mitzvot." It also says, "Run after the most 'minor' mitzvah as you would after the most 'important' and flee from transgression, because doing one mitzvah draws you into doing another, and doing one transgression draws you into doing another, and because the reward for a mitzvah is a mitzvah and the punishment for a transgression is a transgression." In other words, every mitzvah is important, because even the most seemingly trivial mitzvot draw you into a pattern of leading your life in accordance with the Creator's wishes, rather than in accordance with your own.
But what about the so-called "Ten Commandments," the words recorded in Exodus 20, the words that the Creator Himself wrote on the two stone tablets that Moses brought down from Mount Sinai (Ex. 31:18), which Moses smashed upon seeing the idolatry of the golden calf (Ex. 32:19)? In the Torah, these words are never referred to as the Ten Commandments. In the Torah, they are called Aseret ha-D'varim (Ex. 34:28, Deut. 4:13 and Deut. 10:4). In rabbinical texts, they are referred to as Aseret ha-Dibrot. The words d'varim and dibrot come from the Hebrew root Dalet-Beit-Reish, meaning word, speak or thing; thus, the phrase is accurately translated as the Ten Sayings, the Ten Statements, the Ten Declarations, the Ten Words or even the Ten Things, but not as the Ten Commandments, which would be Aseret ha-Mitzvot.
The Aseret ha-Dibrot are not understood as individual mitzvot; rather, they are categories or classifications of mitzvot. Each of the 613 mitzvot can be subsumed under one of these ten categories, some in more obvious ways than others. For example, the mitzvah not to work on Shabbat rather obviously falls within the category of remembering the Sabbath day and keeping it holy. The mitzvah to fast on Yom Kippur fits into that category somewhat less obviously: all holidays are in some sense a Sabbath, and the category encompasses any mitzvah related to sacred time. The mitzvah not to stand aside while a person's life is in danger fits somewhat obviously into the category against murder. It is not particularly obvious, however, that the mitzvah not to embarrass a person fits within the category against murder: it causes the blood to drain from your face thereby shedding blood.
According to Judaism, the Aseret ha-Dibrot identify the following ten categories of mitzvot. Other religions divide this passage differently. See The "Ten Commandments" Controversy below. Please remember that these are categories of the 613 mitzvot, which according to Jewish tradition are binding only upon Jews. The only mitzvot binding upon gentiles are the seven Noahic commandments.
Judaism teaches that the first tablet, containing the first five declarations, identifies duties regarding our relationship with G-d, while the second tablet, containing the last five declarations, identifies duties regarding our relationship with other people.
You may have noticed, however, that the fifth category, which is included in the first tablet, is the category to honor father and mother, which would seem to concern relationships between people. The rabbis teach that our parents are our creators and stand in a relationship to us akin to our relationship to the Divine. Throughout Jewish liturgy, the Creator is referred to as Avinu Malkeinu, our Father, our King. Disrespect to our biological creators is not merely an affront to them; it is also an insult to the Creator of the Universe. Accordingly, honor of father and mother is included on the tablet of duties to G-d.
These two tablets are parallel and equal: duties to G-d are not more important than duties to people, nor are duties to people more important than duties to G-d. However, if one must choose between fulfilling an obligation to G-d and fulfilling an obligation to a person, or if one must prioritize them, Judaism teaches that the obligation to a person should be fulfilled first. This principle is supported by the story in Genesis 18, where Abraham is communing with G-d and interrupts this meeting to fulfill the mitzvah of providing hospitality to strangers (the three men who appear). The Talmud gives another example, disapproving of a man who, engrossed in prayer, would ignore the cries of a drowning man. When forced to choose between our duties to a person and our duties to G-d, we must pursue our duties to the person, because the person needs our help, but G-d does not need our help.
In the United States, a controversy has persisted for many years regarding the placement of the "Ten Commandments" in public schools and public buildings. But one critical question seems to have escaped most of the public dialog on the subject: Whose "Ten Commandments" should we post?
The general perception in this country is that the "Ten Commandments" are part of the common religious heritage of Judaism, Catholicism and Protestantism, part of the sacred scriptures that we all share, and should not be controversial. But most people involved in the debate seem to have missed the fact that these three religions divide up the commandments in different ways! Judaism, unlike Catholicism and Protestantism, considers "I am the L-rd, your G-d" to be the first "commandment." Catholicism, unlike Judaism and Protestantism, considers coveting property to be separate from coveting a spouse. Protestantism, unlike Judaism and Catholicism, considers the prohibition against idolatry to be separate from the prohibition against worshipping other gods. No two religions agree on a single list. So whose list should we post?
And once we decide on a list, what translation should we post? Should Judaism's sixth declaration be rendered as "Thou shalt not kill" as in the popular KJV translation, or as "Thou shalt not murder," which is a bit closer to the connotations of the original Hebrew though still not entirely accurate?
These may seem like trivial differences to some, but they are serious issues to those of us who take these words seriously. When a government agency chooses one version over another, it implicitly chooses one religion over another, something that the First Amendment prohibits. This is the heart of the controversy.
But there is an additional aspect of this controversy that is of concern from a Jewish perspective. In Talmudic times, the rabbis consciously made a decision to exclude daily recitation of the Aseret ha-Dibrot from the liturgy because excessive emphasis on these statements might lead people to mistakenly believe that these were the only mitzvot or the most important mitzvot, and neglect the full 613 (Talmud Berakhot 12a). By posting these words prominently and referring to them as "The Ten Commandments," (as if there weren't any others, which is what many people think) schools and public buildings may be teaching a message that Judaism specifically and consciously rejected.
© Copyright 5762-5771 (2002-2011), Tracey R Rich</s>
|
<urn:uuid:4fbef2c6-997f-4f44-a55c-b3909eec2936>
|
CC-MAIN-2015-32
|
http://jewfaq.org/m/10.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.956009
| 1,701
| 3.078125
| 3
|
The dreaded infectious disease frequent in ancient Israel and proving fatal in the majority of cases was probably the bubonic plague, which in antiquity was especially prevalent in Egypt, and also occurred in other countries of the East (Pliny, "Historia Naturalis," iii. 4). Moses threatened the people with this pestilence (Lev. xxvi. 25; Deut. xxviii. 21), while Yhwh warned the spies that it would be the punishment for the evil report which they had brought of the Holy Land (Num. xiv. 12). The Psalmist besought protection from the plague (Ps. xci. 3, 6), and Solomon prayed for deliverance from it when Israel should come to the Temple (I Kings viii. 37); but Jeremiah (xiv. 12, xxi. 6, xxiv. 10) and Ezekiel (v. 12, vii. 15) threatened the people with this disease if they continued to despise the word of God. Pestilence was also one of the four judgments which God inflicted upon Jerusalem in order to turn it into wilderness (Ezek. xiv. 21). In II Sam. xxiv. 13-15 and I Chron. xxi. 11-14 there is an account of a plague which caused a mortality of 70,000 in Israel within three days (years ?). Amos (iv. 10) says that the plague in the wilderness was not effective in reforming the people, the allusion probably being to one of the two "maggefot" which killed many persons within a short time, according to Num. xvii. 9 and xxv. 8. This pestilence is different from that whichattacks animals and from which the cattle of the Egyptians died (Ex. ix. 6-8).
According to Ta'an. iii. 1, a city ravaged by the pestilence must institute fast-days and prayers. In answer to the question when may an infectious disease be called a pestilence, the Mishnah declares that if three persons die during three consecutive days in any city of 500 inhabitants, the pestilence is raging there. Further details are given in the baraita Ta'an. 21a, which decides that if nine persons die within three consecutive days in a city of 1,500 inhabitants, the pestilence is present; but that if nine persons die in one day and none in the following days, or if only nine persons die within four consecutive days, there is no pestilence. Ta'an. 21b states that in the first half of the third century C.E. the pestilence ravaged Syria, but did not come near the habitation of Abba Arika.
Bibliography:E. G. H. S. O.
- Riehm, Handwörterb. s.v.;
- Herzog-Hauck, Real-Encyc. xi. 72-74.</s>
|
<urn:uuid:daed244c-3bc7-4342-a0f8-f20205944351>
|
CC-MAIN-2015-32
|
http://jewishencyclopedia.com/articles/12066-pestilence
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.939492
| 612
| 3.109375
| 3
|
Willow bark has been used as a treatment for pain and fever in China since 500 BC. In Europe, it was primarily used for altogether different purposes, such as stopping vomiting, removing warts, and suppressing sexual desire. However, in 1828, European chemists made a discovery that would bring together some of these different uses. They extracted the substance salicin from white willow, which was soon purified to salicylic acid. Salicylic acid is an effective treatment for pain and fever, but it is also sufficiently irritating to do a good job of burning off warts.
Chemists later modified salicylic acid (this time from the herb meadowsweet) to create acetylsalicylic acid, or aspirin.
What Is White Willow Used for Today?
As interest in natural medicine has grown, many people have begun to turn back to white willow as an alternative to aspirin. One double-blind, placebo-controlled trial found it effective for back pain , and another found it helpful for osteoarthritis . It is also used for such conditions as bursitis , dysmenorrhea , tension headaches , migraine headaches , rheumatoid arthritis , and tendonitis . However, two recent studies failed to find it effective for rheumatoid arthritis or osteoarthritis.
This latter finding raises an interesting question: If willow provides only a small amount of salicylic acid, how can it work? The most likely answer seems to be that other constituents besides salicin play a role. Another possibility may be that the studies finding benefit were flawed, and that it actually does not work.
What Is the Scientific Evidence for Willow?
The most likely interpretation of these conflicting findings is that willow provides at best no more than a modest level of pain relief.
For this reason, white willow should not be given to children, due to the risk of Reye's syndrome. It should also not be used by people with aspirin allergies, bleeding disorders, or kidney disease. In addition, it may interact adversely with "blood thinners," other anti-inflammatory drugs, methotrexate, metoclopramide, phenytoin, probenecid, spironolactone, and valproate.
Safety in pregnant or nursing women, or those with severe liver or kidney disease, has not been established.
Interactions You Should Know About
Avoid combining white willow with the following medications:
- Reviewer: EBSCO CAM Review Board
- Review Date: 09/2014 -
- Update Date: 09/18/2014 -</s>
|
<urn:uuid:9eeb2530-6ab9-4173-931f-79bb2d87045a>
|
CC-MAIN-2015-32
|
http://jfkmc.com/your-health/?/21882/Salix-alba
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.932632
| 534
| 3.046875
| 3
|
Tue December 25, 2012
Computers May Someday Beat Chefs At Creating Flavors We Crave
Originally published on Thu December 27, 2012 7:06 am
Mario Batali, watch your back.
Computer scientists at IBM have already built a computer that can beat human contestants on the TV quiz show, "Jeopardy." Now it appears they're sharpening their intellectual knives to make a computer that might someday challenge the competitors on "Iron Chef."
This is no trivial pursuit. Beating humans in a quiz show was a high-water mark for the computer science field. It meant designing a computer that understood how humans think. Now the plan is to design a computer that can understand how humans dream up new ideas, including new recipes.
"The goal in computational creativity is to come up with new things that have never been seen before," says Lav Varshney, a computer scientist at IBM. (Watch him explain the idea in the video below.)
Why focus on food? "Because food is so visceral," says Varshney. Everyone eats. It helps define our culture."
Culinary creativity isn't just about coming up with something novel. Varshney and his colleagues are hoping to make a computer that will be able to come up with recipes that taste good and don't add to our waistlines.
So how do you turn a computer into a culinary genius? The first step is to give the computer access to a database of recipes that are already being used successfully. "Then we remix them, substitute things, do all kinds of other modifications and generate millions of new ideas for recipes," says Varshney.
"The second step is to take those millions of ideas and find the best ones. To do that we try to predict what humans will find flavorful, based on some basic ideas from chemistry and psychology."
For example, they started with an idea known as the flavor pairing hypothesis. "The basic idea is that two ingredients that share a lot of flavor compounds will go together well in Western cuisine," says Varshney. (We wrote about a University of Cambridge study on this concept just last year.)
But Varshney and his colleagues are not just interested in things that are flavorful, but also food combinations that are perceived as novel — like bell peppers and black tea, blue cheese and dark chocolate — even turmeric and black currants. They have some ideas from information theory and psychology that will help them come up with more.
The computer has already spit out some interesting suggestions. For example, last week Varshney and his colleagues tried a computer-generated recipe that was a mash up of a Spanish paella and an Indian curry. "It had turmeric and some other Indian spices and potatoes, pork and beef and then it has a kinda of a mango rum topping," says Varshney.
And how did it taste? "I'm actually vegetarian so I didn't eat that one, but the team did," he says. "They thought it was pretty good."
Varshney is hoping that their work will lead to make school lunches more attractive to students. They also hope it will help combat obesity by finding dishes that will satisfy people's food cravings without the accompanying calories.
Varshney says the work to create to a computerized top chef is just starting. IBM doesn't expect the computer will be ready for prime time for five years or so.
ROBERT SIEGEL, HOST:
From NPR News, this is ALL THINGS CONSIDERED. I'm Robert Siegel.
Scientists at IBM have already built a computer that can beat humans on "Jeopardy!"And now, they are sharpening their intellectual knives to make a computer that might someday challenge competitors on "Iron Chef." NPR's Joe Palca gives us a taste of the future.
JOE PALCA, BYLINE: The idea isn't really to win another TV competition. It's to explore the new field of computer science called computational creativity. Lav Varshney is a computer scientist at IBM Research.
LAV VARSHNEY: The whole goal in computational creativity is to come up with new things that have never been seen before.
PALCA: And not just new things. The computer is trying to create things that are useful or aesthetically pleasing.
VARSHNEY: And in particular, we were thinking about culinary creativity because food is so visceral, right? Everyone eats. It helps define our culture.
PALCA: Varshney says there are two steps to making a computer that can be creative in the kitchen. The first is to give the computer access to a huge number of recipes that are already popular, what Varshney calls the computer's inspiration database. Then, the computer rearranges the recipes, adds new ingredients and generates millions of new ideas for recipes.
VARSHNEY: And then the second step is actually to take those millions ideas and actually find the best ones.
PALCA: That's the tricky bit, since taste tend to be idiosyncratic. Some people actually like pimento cheese sandwiches or pig brains in milk gravy. Varshney says he and his colleagues are relying on a concept from culinary circles called the flavor pairing hypothesis.
VARSHNEY: The basic idea is that two ingredients that share a lot of flavor compounds will go together well in Western cuisine.
PALCA: Varshney says he gives the computer information about the chemical components of various foods and let's the computer generate possible combinations. That's led to predictions of things going together that you might not expect.
VARSHNEY: Things like chocolate and blue cheese, we predict, will go together well or Jamaican rum and blue cheese.
PALCA: I found a recipe for a cake with chocolate and blue cheese on the Internet, so somebody seems to think that pairing works. Now, if you're thinking there's just no way a computer will ever be as creative a chef as Julia Child or James Beard, computer scientist Celine Latulipe says you're not alone.
CELINE LATULIPE: There are still many people who say, I don't think computers can be creative. And if a computer created this, then I don't think it's creative just because a computer created it.
PALCA: Latulipe is at the University of North Carolina, Charlotte. She's pretty convinced computers can be creative and her research is about how you would assess that creativity. She has developed a set of criteria - criteria that could be applied to Varshney's computer to see if it's being creative. For example, there's a quality she calls fluency.
LATULIPE: The number of ideas created. So that would be the number of different recipes that this thing comes up with.
PALCA: And then how original are the recipes.
LATULIPE: Are these actually new and different.
PALCA: And also quality.
LATULIPE: Are they actually good and relevant and useful.
PALCA: The IBM scientists aren't ready to put their computer to those tests yet. They're still in the early stages of developing it. But Lav Varshney says the computer has already come up with some interesting recipes. For example, it proposed a kind of mash-up between an Indian curry and a Spanish paella.
VARSHNEY: It had turmeric and some other Indian spices and potatoes, pork and beef. And then it had kind of a mango rum topping.
PALCA: OK. Sounds intriguing. But how did it taste?
VARSHNEY: I'm actually vegetarian, so I didn't eat that one. But the team did, so they thought it was pretty good.
PALCA: I'll buy that. It actually does sound pretty good. Joe Palca, NPR News, Washington. Transcript provided by NPR, Copyright NPR.</s>
|
<urn:uuid:c6cf459a-bd10-4390-bbdb-179b511c634e>
|
CC-MAIN-2015-32
|
http://kazu.org/post/computers-may-someday-beat-chefs-creating-flavors-we-crave
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.967271
| 1,636
| 3.1875
| 3
|
Stool (or feces) is usually thought of as nothing but waste — something to quickly flush away. But bowel movements can provide doctors with valuable information as to what's wrong when a child has a problem in the stomach, intestines, or another part of the gastrointestinal system.
A doctor may order a stool collection to test for a variety of possible conditions, including:
infection, as caused by some types of bacteria, viruses, or parasites that invade the gastrointestinal system
digestive problems, such as the malabsorption of certain sugars, fats, or nutrients
bleeding inside of the gastrointestinal tract
The most common reason to test stool is to determine whether a type of bacteria or parasite may be infecting the intestines. Many microscopic organisms living in the intestines are necessary for normal digestion. If the intestines become infected with harmful bacteria or parasites, though, it can cause problems like certain types of bloody diarrhea, and testing stool can help find the cause.
Stool samples are also sometimes analyzed for what they contain; for instance, examining the fat content. Normally, fat is completely absorbed from the intestine, and the stool contains virtually no fat. In certain types of digestive disorders, however, fat is incompletely absorbed and remains in the stool.
Unlike most other lab tests, stool is sometimes collected by the child's family at home, not by a health care professional. Here are some tips for collecting a stool specimen:
Collecting stool can be messy, so be sure to wear latex gloves and wash your hands and your child's hands well afterward.
Many kids with diarrhea, especially young children, can't always let a parent know in advance when a bowel movement is coming. Sometimes a hat-shaped plastic lid is used to collect the stool specimen. This catching device can be quickly placed over the toilet bowl or your child's rear end to collect the specimen. Using a catching device can prevent contamination of the stool by water and dirt. If urine contaminates the stool sample, it will be necessary to take another sample. Also, if you're unable to catch the stool sample before it touches the inside of the toilet, the sample will need to be repeated. Fishing a bowel movement out of the toilet does not provide a clean specimen for the laboratory to analyze.
Another way to collect a stool sample is to loosely place plastic wrap across the rim of the toilet, under the seat. Then place the stool sample in a clean, sealable container before taking to the laboratory. Plastic wrap can also be used to line the diaper of an infant or toddler who is not yet using the toilet.
The stool should be collected into clean, dry plastic jars with screw-cap lids. You can get these from your doctor or through hospital laboratories or pharmacies, although any clean, sealable container could do the job. For best results, the stool should then be brought to the laboratory immediately.
If the stool specimen is going to be examined for an infection, and it's impossible to get the sample to the laboratory right away, the stool should be refrigerated, then taken to the laboratory to be cultured as soon as possible after collection. When the sample arrives at the lab, it is either examined and cultured immediately or placed in a special liquid medium that attempts to preserve potential bacteria or parasites.
The doctor or the hospital laboratory will usually provide written instructions on how to successfully collect a stool sample; if written instructions are not provided, take notes on how to collect the sample and what to do once you've collected it.
If you have any questions about how to collect the specimen, be sure to ask. The doctor or the lab will also let you know if a fresh stool sample is needed for a particular test, and if it will need to be brought to the laboratory right away.
Most of the time, disease-causing bacteria or parasites can be identified from a single stool specimen. Sometimes, however, up to three samples from different bowel movements must be taken. The doctor will let you know if this is the case.
In general, the results of stool tests are usually reported back within 3 to 4 days, although it often takes longer for parasite testing to be completed.
Examining the Stool for Blood
Your doctor will sometimes check the stool for blood, which can be caused by certain kinds of infectious diarrhea, bleeding within the gastrointestinal tract, and other conditions. However, most of the time, blood streaking in the stool of an infant or toddler is from a slight rectal tear, called a fissure, which is caused by straining against a hard stool (this is fairly common in infants and kids with ongoing constipation).
Testing for blood in the stool is often performed with a quick test in the office that can provide the results immediately. First, stool is smeared on a card, then a few drops of a developing solution are placed on the card. An instant color change shows that blood is present in the stool. Sometimes, stool is sent to a laboratory to test for blood, and the result will be reported within hours.
Culturing the Stool
Stool can be cultured for disease-causing bacteria. A stool sample is placed in an incubator for at least 48 to 72 hours and any disease-causing bacteria are identified and isolated. Remember that not all bacteria in the stool cause problems; in fact, about half of stool is bacteria, most of which live there normally and are necessary for digestion. In a stool culture, lab technicians are most concerned with identifying bacteria that cause disease.
For a stool culture, the lab will need a fresh or refrigerated sample of stool. The best samples are of loose, fresh stool; well-formed stool is rarely positive for disease-causing bacteria. Sometimes, more than one stool will be collected for a culture.
Swabs from a child's rectum also can be tested for viruses. Although this is not done routinely, it can sometimes give clues about certain illnesses, especially in newborns or very ill children. Viral cultures can take a week or longer to grow, depending on the virus.
Testing the Stool for Ova and Parasites
Stool may be tested for the presence of parasites and ova (the egg stage of a parasite) if a child has prolonged diarrhea or other intestinal symptoms. Sometimes, the doctor will collect two or more samples of stool to successfully identify parasites. If parasites — or their eggs — are seen when a smear of stool is examined under the microscope, the child will be treated for a parasitic infestation. The doctor may give you special collection containers that contain chemical preservatives for parasites.</s>
|
<urn:uuid:bfac421e-f6ba-4e6e-85be-e00bced4a376>
|
CC-MAIN-2015-32
|
http://kidshealth.org/PageManager.jsp?dn=BlankChildrensHospital&lic=145&cat_id=128&article_set=22831&tracking=P_RelatedArticle
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.928149
| 1,351
| 3.578125
| 4
|
Most teens need about 8½ to more than 9 hours of sleep each night. Getting the right amount of sleep is essential for anyone who wants to do well on a test or play sports without stumbling. Unfortunately, though, many teens don't get enough sleep.
Why Don't Teens Get Enough Sleep?
Until recently, teens often got a bad rap for staying up late, oversleeping for school, and falling asleep in class. But recent studies show that adolescent sleep patterns actually differ from those of adults or kids.
Experts say that during the teen years, the body's rhythm (sort of like an internal biological clock) is temporarily reset, telling a person to fall asleep later and wake up later. This change might be due to the fact that the brain hormone is produced later at night for teens than it is for kids and adults. This can make it harder for teens to fall asleep early.
These changes in the body's circadian rhythm coincide with a busy time in life. For most teens, the pressure to do well in school is more intense than when they were kids, and it's harder to get by without studying hard. And teens also have other time demands — everything from sports and other extracurricular activities to working a part-time job to save money for college.
Early start times in some schools also might play a role in lost sleep. Teens who fall asleep after midnight may still have to get up early for school, meaning that they might squeeze in only 6 or 7 hours of sleep a night. A few hours of missed sleep a night may not seem like a big deal, but it can create a noticeable sleep deficit over time.
A sleep deficit affects everything from someone's ability to pay attention in class to his or her mood. According to a National Sleep Foundation Sleep in America poll, more than 25% of high school students fall asleep in class, and experts have tied lost sleep to poorer grades. Lack of sleep also damages teens' ability to do their best in athletics.
Slowed responses and dulled concentration from lack of sleep don't just affect school or sports performance, though. More than half of teens surveyed reported that they have driven a car while drowsy over the past year and 15% said they drove drowsy at least once a week. The National Highway Safety Traffic Administration estimates that more than 100,000 accidents, 40,000 injuries, and 1,500 people are killed in the U.S. every year in crashes caused by drivers who are simply tired. Young people under the age of 25 are far more likely to be involved in drowsy driving crashes.
Lack of sleep also is linked to emotional troubles, such as feelings of sadness and depression. Sleep helps keep us physically healthy, too, by slowing the body's systems to re-energize us for everyday activities.
Am I Getting Enough Sleep?
Even if you think you're getting enough sleep, you might not be. Here are some of the signs that you may need more sleep:
Some researchers, parents, and teachers have suggested that middle- and high-school classes begin later in the morning to accommodate teens' need for more sleep. Some schools have implemented later start times. You and your friends, parents, and teachers can lobby for later start times at your school, but in the meantime you'll have to make your own adjustments.
Here are some things that may help you to sleep better:
Set a regular bedtime. Going to bed at the same time each night signals to your body that it's time to sleep. Waking up at the same time every day also can help establish sleep patterns. So try to stick as closely as you can to your sleep schedule, even on weekends. Try not to go to sleep more than an hour later or wake up more than 2 to 3 hours later than you do during the week.
Exercise regularly. Try not to exercise right before bed, though, as it can rev you up and make it harder to fall asleep. Finish exercising at least 3 hours before bedtime. Many sleep experts believe that exercising in late afternoon may actually help a person sleep.
Avoid stimulants. Don't drink beverages with caffeine, such as soda and coffee, after 4 p.m. Nicotine is also a stimulant, so quitting smoking may help you sleep better. And drinking alcohol in the evening can make a person restless and interrupt sleep.
Relax your mind. Avoid violent, scary, or action movies or television shows right before bed — anything that might set your mind and heart racing. Reading books with involved or active plots may also keep you from falling or staying asleep.
Unwind by keeping the lights low. Light signals the brain that it's time to wake up. Staying away from bright lights (including computer screens!), as well as meditating or listening to soothing music, can help your body relax. Try to avoid TV, computers and other electronics, and using your phone (including texting) at least 1 hour before you go to bed.
Don't nap too much. Naps of more than 30 minutes during the day and naps too close to bedtime may keep you from falling asleep later.
Avoid all-nighters. Don't wait until the night before a big test to study. Cutting back on sleep the night before a test may mean you perform worse than you would if you'd studied less but got more sleep.
Create the right sleeping environment. Studies show that people sleep best in a dark room that is slightly on the cool side. Close your blinds or curtains (and make sure they're heavy enough to block out light) and turn down the thermostat (pile on extra blankets or wear PJs if you're cold). Lots of noise can be a sleep turnoff, too. Use a nature sounds or white-noise machine (or app!) if you need to block out a noisy environment.
Wake up with bright light. Bright light in the morning signals your body that it's time to get going. If it's dark in your room, it can help to turn on a light as soon as your alarm goes off.
If you're drowsy, it's hard to look and feel your best. Schedule "sleep" as an item on your agenda to help you stay creative and healthy.</s>
|
<urn:uuid:77408ae6-459f-4f56-b9fa-0b46e8b60072>
|
CC-MAIN-2015-32
|
http://kidshealth.org/PageManager.jsp?dn=Chris_Evert_Childrens_Hospital&lic=306&cat_id=20977&article_set=20280&tracking=T_RelatedArticle
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.966474
| 1,290
| 3.703125
| 4
|
It seems like just yesterday you were reading "Goodnight Moon" to your little girl, and now — right before your very eyes — she's growing into a woman. As she develops, your daughter is bound to have questions about the physical and emotional changes of puberty.
As a parent, it's your job to listen to her concerns and keep the lines of communication open. Here are some tips on how to make that happen:
Answer questions openly and honestly. Let your daughter know that you're available any time to talk, but also schedule time to talk (don't always wait for her to initiate the discussion). If she has questions or concerns that you can't answer, talking with her doctor may help provide reassurance.
If you haven't already, start the talk early. By the time a girl is 8 years old, she should know what bodily changes are associated with puberty. That may seem young, but consider this: some early bloomers are already wearing training bras at that age. As a conversation starter, you might tell your daughter about what puberty was like for you when you were growing up.
Talk about menstruation before she gets her period. Girls who are unaware of their impending period can be frightened by the sight and location of blood. Most girls get their first period when they're 12 or 13 years old; others get it as early as age 9 or as late as age 16.
Make it practical. Most girls are interested in practical matters, like how to find a bra that fits and what to do if they get their first period at school. Your daughter will appreciate concrete assistance, such as taking a measurement for a bra or getting some pads that she can stash in her backpack or locker, just in case.
Offer reassurance. Girls often express insecurity about their appearance as they go through puberty. Some develop breasts at a younger age or get their period early, while others may not start until they're a little older. Reassure your daughter that there's a huge amount of variation in the timing of these milestones. Everyone goes through them, but not always at the same pace.
If you're not entirely comfortable having a conversation about puberty, practice what you want to say first or ask your doctor for advice.
Remember, it's important to talk about puberty — and the feelings associated with it — as openly as possible so that your daughter will be prepared for the changes ahead.</s>
|
<urn:uuid:21bc527d-d3f2-4e51-9461-8c0e6462211a>
|
CC-MAIN-2015-32
|
http://kidshealth.org/PageManager.jsp?dn=NationwideChildrens_Hospital&lic=238&cat_id=171&article_set=63686&ps=104
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.981915
| 490
| 2.921875
| 3
|
Pools, lakes, ponds, and beaches mean summer fun and cool relief from hot weather. But water also can be dangerous for kids if parents don't take the proper precautions. Nearly 1,000 kids die each year by drowning. And most drownings happen in home swimming pools. It is the second leading cause of accidental death for people between the ages of 5 and 24.
The good news is there are many ways to keep your kids safe in the water — and make sure that they take the right precautions when they're on their own.
Keeping Kids Safe
Kids need constant supervision around water — whether the water is in a bathtub, a wading pool, an ornamental fish pond, a swimming pool, a spa, the beach, or a lake.
Young children are especially at risk — they can drown in less than 2 inches (6 centimeters) of water. That means drowning can happen where you'd least expect it — the sink, the toilet bowl, fountains, buckets, inflatable pools, or small bodies of standing water around your home, such as ditches filled with rainwater. Always watch children closely when they're in or near any water.
If you're not a swimmer yourself, it's a good idea to take lessons and learn how to swim. And kids over 4 years old should learn, too (check the local recreation center for classes taught by qualified instructors). Kids who are younger (but older than age 1) also might benefit from swimming lessons, but check with your doctor first.
Don't assume that a child who knows how to swim isn't at risk for drowning. All kids need to be supervised in the water, no matter what their swimming skills. And infants, toddlers, and weak swimmers should have an adult swimmer within arm's reach to provide "touch supervision."
Invest in proper-fitting, Coast Guard-approved flotation devices (life vests) and have kids wear them whenever near water. Check the weight and size recommendations on the label, then have your child try it on to make sure it fits snugly. For kids younger than 5 years old, choose a vest with a strap between the legs and head support — the collar will keep the child's head up and face out of the water. Inflatable vests and arm devices such as water wings are not effective protection against drowning.
Don't forget the sunscreen and reapply often, especially if the kids are getting wet. UV sunglasses, hats, and protective clothing also can help provide sun protection.
Kids should drink plenty of fluids, particularly water, to prevent dehydration. It's easy to get dehydrated in the sun, especially when kids are active and sweating. Dizziness, feeling lightheaded, or nausea are just some of the signs of dehydration and overheating.
Water temperature is important, too. Enter the water slowly and make sure it feels comfortable for you and your kids. A temperature below 70°F (20°C) is cold to most swimmers. Recommended water temperatures vary depending on the activity and a swimmer's age, as well as for pregnant women. But in general, 82°-86°F (28°-30°C) is comfortable for recreational swimming for children (babies are more comfortable when the water is on the warmer side of this temperature range).
Body temperature drops more quickly in water than on land, and it doesn't take long for hypothermia (when the body loses heat faster than it can produce it) to set in. If a child is shivering or has muscle cramps, get him or her out of the water immediately.
The bathroom is full of dangers for youngsters. Never leave a young child unattended in the bathroom, especially while bathing — even if the child appears to be well propped in a safety tub or bath ring. Put away hair dryers and all other electrical appliances to avoid the risk of electrocution.
Hot water also can be dangerous, particularly for kids younger than 5, who have thinner skin than older kids and adults, so can burn more easily. Just 3 seconds of exposure to hot tap water that's 140°F (60°C) can give a child a third-degree burn.
You can reduce the risk of scalding by turning the water heater thermostat in your home down to 120°F (49°C) and by always testing the water with your wrist or elbow before placing your child in the bath.
Outside the home, being aware can help prevent accidents. Find out where the water hazards in your neighborhood are. Who has a pool or hot tub? Where are the retaining ponds or creeks that may attract kids? Tell neighbors who have pools that you have a young child and ask them to keep their gates locked.
Having a pool, pond, spa, or hot tub on your property is a tremendous responsibility when it comes to safety.
Hot tubs may feel great to adults, but kids can become dangerously overheated in them and can even drown — so it's best not to let them use them at all. Having a fence (one that goes directly around the pool or spa) between the water and your house is the best safety investment you can make and will help prevent pool-related drownings.
According to the Consumer Product Safety Commission (CPSC), fences should meet these standards:
Fences should stand at least 4 feet (130 centimeters) high with no foot or handrails for kids to climb on.
The slats should be less than 4 inches (110 millimeters) apart so a child can't get through, or if chain link, should have no opening larger than 1¾ inches (50 millimeters).
Gates should be self-closing and self-latching, and the latch should be out of kids' reach.
You can buy other devices, such as pool covers and alarms, but these haven't been proved effective against drowning for very young children, so fencing remains your best measure of protection.
It's important to teach your kids proper pool and spa behavior, and to make sure that you take the right precautions, too. Let kids know that they should contact the lifeguard or an adult if there's an emergency.
Kids shouldn't run or push around the pool and should never dive in areas that are not marked for diving. If the weather turns bad (especially if there's lightning), they should get out of the pool immediately.
Above all, supervise your kids at all times. Don't assume that just because your child took swimming lessons or is using a flotation device such as an inner tube or inflatable raft that there's no drowning risk. If you're at a party, it's especially easy to become distracted, so designate an adult who will be responsible for watching the children. If you leave your child with a babysitter, make sure he or she knows your rules for the pool.
Seconds count when it comes to water emergencies, so take a cordless phone with you when you're watching kids during water play. A quick-dial feature keyed to 911 or your local emergency center will also save additional seconds. If you receive a call while supervising kids, keep your conversation brief to prevent being distracted.
Once you've installed all your safety equipment, review your home for water hazards and plan what to do in an emergency. Learn CPR (other caregivers should learn it, too) and make sure you have safety equipment, such as emergency flotation devices, that are in good shape and are close at hand when boating or swimming.
Post emergency numbers on all phones and make sure all caregivers are aware of their locations. After your kids are finished playing in the pool for the day, be sure to remove all pool toys and put them away. Children have drowned while trying to retrieve playthings left in the pool.
Keep water safety a priority, even after the swim season is over. Pools with covers are not safe; many kids try to walk on top of pools during the winter months and may get trapped underneath a pool cover.
In addition, icy pools, ponds, and streams are tempting play areas for kids, so keep your pool gates locked and teach your kids to stay away from water without your supervision. If you have an above-ground pool, it's wise to always lock or remove the ladder when the pool is not in use.
First, teach kids never to swim alone. Using the buddy system means there's always someone looking out for you. Make sure your kids understand that swimming in a pool is different from swimming in a lake or the ocean — there are different hazards for each.
Here are some tips:
At Lakes and Ponds
Don't let kids swim without adult supervision — lakes or ponds might be shallow near the bank, but increase in depth sharply farther out from shore.
Ponds and lakes may hide jagged rocks, broken glass, or trash.
Make sure kids wear foot protection; even in the water, they should wear aqua socks or water shoes.
Watch out for weeds and grass that could entangle a leg or arm.
Most boating accidents, particularly among teens, are related to alcohol. When you and your family are boating, assign a designated driver who won't drink. Be sure teens know about the dangers of alcohol, on and off the water.
Teach kids to always swim when and where a lifeguard is on duty. They shouldn't swim close to piers or pilings because sudden water movements may cause swimmers to collide with them.
Unlike the calm waters of a swimming pool, the beach has special dangers like currents and tides. Check with the lifeguard when you arrive to find out about the water conditions.
Don't allow kids to swim in large waves or undertows, and tell them never to stand with their back to the water because a sudden wave can easily knock them over.
Teach kids that if they're caught in a rip current or undertow, they should swim parallel to the shore or should tread water and call for a lifeguard's help.
The stings of jellyfish or Portuguese man-of-wars can be painful, so tell kids to watch out for them in the water and to tell an adult right away if they're stung.
Whether at the lake or at the beach, teach your child to get out of the water during bad weather, especially lightning.
At Water Parks
Water parks can be a lot of fun for kids, as long as you keep safety in mind. Before you go, make sure the park is monitored by qualified lifeguards. Once there, read all posted signs before letting your child on any rides (many rides have age, height, weight, or health requirements, and each has a different depth of water).
Teach your kids to follow all rules and directions, such as walking instead of running and always going down the water slide in the right position — feet first and face up. A Coast-Guard approved life jacket is a good idea, too.
Know which rides are appropriate for your child's age and development. For example, wave pools can quickly go from calm to rough, putting even a good swimmer in over his or her head. Younger children can be intimidated by older kids' splashing and roughhousing.
Whenever a child is missing, always check the pool first. Survival depends on a quick rescue and restarting breathing as soon as possible:
If you find a child in the water, immediately get the child out while calling loudly for help. If someone else is available, have them call 911. Check to make sure the child's air passages are clear. If the child is not breathing, start CPR if you are trained to do so. When the emergency number is called, follow the instructions the emergency operators provide.
If you think the child may have suffered a neck injury, such as from diving, keep the child on his or her back and brace the neck and shoulders with your hands and forearms to help keep the neck from moving until emergency help arrives. This type of immobilization minimizes further injury to the spine and is best done by someone who is trained in the technique. Keep the child still and speak in calm tones to keep the child comforted. Continue to watch for adequate breathing.
Water illnesses can happen when someone has contact with, swallows, or breathes in water that is contaminated with germs. This can happen in a swimming pool, hot tub, water fountain, water park, lake, or ocean.
Most such infections are diarrhea-related and often are caused by the parasite Cryptosporidium, which normally lives in the gastrointestinal tract and is found in feces (poop). Other infections can affect the skin, eyes, ears, and respiratory tract. Kids, pregnant women, and people with weakened immune systems can be the most affected by these infections.
A few tips to protect against recreational water illnesses:
Kids with diarrhea should not swim.
Take kids on bathroom breaks often and change swim diapers often (not at the poolside).
If you are taking a baby in the water who is not potty trained, use a swim diaper.
Wash hands after using the bathroom or changing diapers.
Avoid swallowing or getting water in your mouth.
Keep a pool's water clean by showering before entering the pool.
After swimming, dry ears well with a towel/washcloth, tilting each ear down to help water drip out of the ear canal. This can help prevent swimmer’s ear (an ear infection due to trapped water in the ear canal).
Drowning, although the biggest worry, isn't the only concern when babies are exposed to water. Infants are particularly susceptible to diseases that can spread through water.
After a dip, wash your baby with a mild soap and shampoo the hair to remove pool chemicals. Also dry the baby's ears carefully with a towel or cotton ball to help prevent swimmer's ear.
Water temperatures below 85°F (29°C) can cause babies to lose heat quickly, putting them at risk for hypothermia (when body temperature falls below normal). Shivering infants or those whose lips are turning blue should be removed from the water immediately, dried, and kept in a towel.
Infants also can spread disease in a pool. Cryptosporidium can be released into pools by babies with leaky diapers. When swallowed by other swimmers, the parasite can cause severe diarrhea, nausea, vomiting, weight loss, and dehydration.
The safest thing to do is to keep your baby out of public pools until the child is potty trained. If you do decide to take the baby in for a dip, use waterproof diapers only and change the diapers often (but not poolside!), washing your child well each time. Keep any child with diarrhea or a gastrointestinal illness out of the pool during the illness and for 2 weeks afterward. Provide frequent bathroom breaks for kids who are already toilet trained.
Water play can be a great source of fun and exercise. You'll enjoy the water experience more by knowing and practicing these safety precautions.</s>
|
<urn:uuid:bb6ae076-917f-4b13-9eff-1bc4e0bcbcea>
|
CC-MAIN-2015-32
|
http://kidshealth.org/PageManager.jsp?dn=NiswongerChildrens_Hospital&lic=362&cat_id=20741&article_set=21687&ps=104
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.957823
| 3,097
| 3.4375
| 3
|
When people talk about the calories in food, what do they mean? A calorie is a unit of measurement — but it doesn't measure weight or length. A calorie is a unit of energy. When you hear something contains 100 calories, it's a way of describing how much energy your body could get from eating or drinking it.
Are Calories Bad for You?
Calories aren't bad for you. Your body needs calories for energy. But eating too many calories — and not burning enough of them off through activity — can lead to weight gain.
Most foods and drinks contain calories. Some foods, such as lettuce, contain few calories (1 cup of shredded lettuce has less than 10 calories). Other foods, like peanuts, contain a lot of calories (½ cup of peanuts has 427 calories).
You can find out how many calories are in a food by looking at the nutrition facts label. The label also will describe the components of the food — how many grams of carbohydrate, protein, and fat it contains.
Here's how many calories are in 1 gram of each:
carbohydrate — 4 calories
protein — 4 calories
fat — 9 calories
That means if you know how many grams of each one are in a food, you can calculate the total calories. You would multiply the number of grams by the number of calories in a gram of that food component. For example, if a serving of potato chips (about 20 chips) has 10 grams of fat, 90 calories are from fat. That's 10 grams x 9 calories per gram.
Some people watch their calories if they are trying to lose weight. Most kids don't need to do this, but all kids can benefit from eating a healthy, balanced diet that includes the right number of calories — not too many, not too few. But how do you know how many calories you need?
Kids come in all sizes and each person's body burns energy (calories) at different rates, so there isn't one perfect number of calories that a kid should eat. But there is a recommended range for most school-age kids: 1,600 to 2,200 per day.
When they reach puberty, girls need more calories than before but they tend to need fewer calories than boys. As boys enter puberty, they may need as many as 2,500 to 3,000 calories per day, especially if they are very active. But whether they are girls or boys, kids who are active and move around a lot will need more calories than kids who don't.
Most kids don't have to worry about not getting enough calories because the body — and feelings of hunger — help regulate how many calories a person eats. But kids with certain medical problems may need to make sure they eat enough calories. Kids with cystic fibrosis, for instance, have to eat high-calorie foods because their bodies have trouble absorbing the nutrients and energy from food.
Kids who are overweight might have to make sure they don't eat too many calories. (Only your doctor can say if you are overweight, so check with him or her if you're concerned. And never go on a diet without talking to your doctor!)
If you eat more calories than your body needs, the leftover calories are converted to fat. Too much fat can lead to health problems. Often, kids who are overweight can start by avoiding high-calorie foods, such as sugary sodas, candy, and fast food, and by eating a healthy, balanced diet. Exercising and playing are really important, too, because activity burns calories.
How the Body Uses Calories
Some people mistakenly believe they have to burn off all the calories they eat or they will gain weight. This isn't true. Your body needs some calories just to operate — to keep your heart beating and your lungs breathing. As a kid, your body also needs calories from a variety of foods to grow and develop. And you burn off some calories without even thinking about it — by walking your dog or making your bed.
But it is a great idea to play and be active for at least 1 hour and up to several hours a day. That means time spent playing sports, just running around outside, or riding your bike. It all adds up. Being active every day keeps your body strong and can help you maintain a healthy weight.
Watching TV and playing video games won't burn many calories at all, which is why you should try to limit those activities to 1 to 2 hours per day. A person burns only about 1 calorie per minute while watching TV, about the same as sleeping!</s>
|
<urn:uuid:aac7b405-d620-44a2-8aa8-388af91b1303>
|
CC-MAIN-2015-32
|
http://kidshealth.org/PageManager.jsp?dn=YourOrganizationsName&lic=29&cat_id=119&article_set=39822&ps=304
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.968096
| 933
| 3.671875
| 4
|
KRWG.ORG-The Region's Home Page
The Race Card Project: Six-Word Essays
Tue April 2, 2013
When You're Mixed Race, Just One Box Is Not Enough
Originally published on Tue April 2, 2013 7:49 pm
NPR continues a series of conversations about The Race Card Project, where thousands of people have submitted their thoughts on race and cultural identity in six words. Every so often NPR Host/Special Correspondent Michele Norris will dip into those six-word stories to explore issues surrounding race and cultural identity for Morning Edition. You can find hundreds of six-word submissions and submit your own at www.theracecardproject.com.
Since The Race Card Project is about identity, it's not surprising that many submissions deal with the question of how people choose to identify themselves. That can be more complicated for those who have two parents who do not share the same race — especially when asked to choose a particular box for race or ethnicity on an application or government form.
George Washington III is familiar with this quandary. An African-American voice-over artist, Washington has been married twice, both times to women who are white. When he heard about The Race Card Project, his thoughts went immediately to his children. His six words: "My mixed kids have it differently."
Since Washington is black, he assumed the world would also see his olive-skinned children as black. But during a routine trip to the doctor's office in Charlotte, N.C., he realized his son Jordan, 18, had his own ideas about identity.
"It was an 'aha' and an awareness moment for me," Washington says. "[My kids] know that they don't exactly fit into the, 'They are black, they are white' ... way of thinking."
An Inner Struggle Over 'One Box'
In 2000, the U.S. Census began allowing people of mixed race to choose more than one box to describe their racial makeup.
Dave Kung of St. Mary's City, Md., was grateful for that policy change, and his submission to The Race Card Project explains why: "No one box is correct."
Dave, a math professor, struggled for years over what box to check on government forms and applications. His father is Chinese. His mother is white. Picking just one box on a form, Dave says, meant choosing one race over another — and that meant denying part of his ancestry. But checking "other" as an alternative choice was also unsatisfying, he says.
"Sometimes when I was applying for colleges I was just annoyed at whoever was asking me. I was sort of picturing some bureaucrat forcing me to check a box," Dave says. "And sometimes I would just check both boxes and force them to deal with it."
Kung was in his late 20s when his 2000 Census form arrived. He already knew, before opening it, that the form would offer him a chance to check more than one "race" box.
Even so, he wasn't prepared for "how emotional that experience was," Dave says. "When I filled out my census card and was finally allowed to — correctly — check more than one box, I cried."
STEVE INSKEEP, HOST:
We have another installment this morning of the Race Card Project. NPR's Michele Norris invites people to send in six-word stories about race. People take a complicated, controversial subject, and boil down to six words what it means for them. They write those words on a card or a tweet or an email - words like these from a man in Charlotte, N.C.
GEORGE WASHINGTON III: My name is George Washington III, and my six words are: My mixed kids have it differently.
INSKEEP: My mixed kids have it differently. Michele Norris is with us to help pull out the meaning behind those words. Hi, Michele.
MICHELE NORRIS, BYLINE: Hey, Steve.
INSKEEP: OK. You get thousands of submissions, I know. In fact, you got thousands more after the first installment of this series, a few weeks ago. What makes this particular submission leap out of the pile for you?
NORRIS: Well, I get a lot of submissions around a dilemma involving the exercise of checking a box to determine your racial identity. And I was looking at a lot of those submissions, and George's submission really stood out for me. I went back, and I was calling people to find out why this was such a dilemma for them.
INSKEEP: And so we're talking about the act of checking that you are white, that you are black, that you're Native American - whatever the box says; and that's become a more and more complicated act as the years have gone on. So, who is George Washington III, who faced this dilemma?
NORRIS: Let's let him tell us a little bit about his brood.
WASHINGTON: Well, I have a blended family, and it's quite large these days. I have an 18-year-old son, a 14-year-old daughter, a 13-year-old stepson, a 12-year-old daughter, a 10-year-old stepson and a 16-month-old daughter.
INSKEEP: OK, blended family. In this case, that means...
NORRIS: Well, this is a yours, mine and ours situation. George Washington is African-American. He's been married twice - both times to white women. In his current marriage, he brought children to the marriage who are mixed race. She had two children, two sons. They're white. And together, they now have a mixed-race daughter. And his experience of raising biracial children is what prompted him to send in those six words: My mixed kids have it differently.
WASHINGTON: I knew that my children's experience would be very different from my own, as I am African-American and they are of a mixed heritage; and that they would experience race, and people talking about them and how they are perceived, very differently than I did when I was growing up.
INSKEEP: Differently in what way, Michele?
NORRIS: Well, some of that comes down to assumptions. And he says that because he's black and his kids are part-black, the thinking was that America would sort of automatically put them in the black category, much in the same way that we, as a nation, now have a president who's mixed race. And yet President Obama will be remembered in history books as America's first black president. And George Washington III explains that this is just sort of a cultural norm for his generation.
WASHINGTON: My parents, you know, kind of expressed to me in our dealings, you know, you are black; you're African-American. And we think and believe that your children are as well. And maybe not explicitly saying in those words, but that's kind of what we were thought to be. And when the kids come along, they have a different interpretation.
INSKEEP: You know, this was a cultural norm in most of the United States, and even a legal norm in much of the United States, for decades and decades. If you had any black blood, you were black. That was a legal definition, in some states. But clearly, things are changing now.
NORRIS: Yeah. We are comfortable thinking back to - you know, the one-drop rule. But things are changing. Cultural norms are changing, and society is changing, in terms of demographics. I mean, right now, the fastest-growing cohort among youth are mixed-race kids. That category has increased by 50 percent since 2000. And the questions around identity, you know, for those kids are really changing very quickly, and the notion of what box they will check on the forms that we were talking about. And George had an experience that really goes to the heart of this. He tells a wonderful story about a recent visit to the doctor's office with his 18-year-old son, Jordan.
WASHINGTON: I had taken him to the eye doctor, and we were filling out the forms. And I checked African-American. And he was standing kind of behind me and to my right. And I didn't notice; he didn't say anything. But when we got in the car afterwards, he - that was the first thing he wanted to talk about.
NORRIS: You know, I so appreciate you sharing this story with us, but I'm wondering if you're willing to put us in the car with you - if you could describe in detail what happened when you got in the car.
WASHINGTON: Well, we sat down, you - started the engine, started to go. Our eye doctor is - what, five minutes from the house. And he said, well, Dad, it's not a big deal, but I don't always just check black when I use those - when I do those kind of forms. And the feeling came over me like, oh, I should have thought of that; I should have realized that. He didn't make a big deal out of it. It wasn't something that we were going to have an argument over. He just wanted it known that he considers himself more than just one race - which he is.
INSKEEP: So that's George Washington III. He spoke with our own Michele Norris for the Race Card project. And Michele, such a small thing, what box to check on a form; such large issues raised. What did George Washington III do about it?
NORRIS: Well, there are a lot of big issues around this. You know, some cases, you get to check more than one box. In other cases, you have to just check one box. And he thinks about whether he should approach the people who create these forms and ask them to think about it. And he said he decided to focus on sort of the things that he could control. He can't determine how they comprise these forms that he and his family members have to fill out. But he took control of the situation that was closest to him. And he actually went back to the eye doctor's office and asked for the medical form, so he could go back and correct the record and honor his son. And his son is now identified as biracial, as being more than one race.
INSKEEP: Let's remember that this is one story, one set of six words from one person. But you've received thousands, including many others, on this topic. And you're sharing another one with us at npr.org.
NORRIS: If you visit the Web, you'll hear and see the story of David Kung. He is mixed-race also. He's white and Asian. And for years, he confronted forms where he was asked to choose just one box. It was before the norm started to change in the way that these forms are comprised. And that marking of the box carries a lot of weight because you have to decide if you're accepting one line of ancestry or denying the other. And he explained to his own son the difficulty of having to make that decision. His stepson is white, and didn't really understand why it was so hard. And he told him this.
DAVID KUNG: If you were told to choose just one - do you love your mother or your father? - what would you say? And he said, that's just absurd; nobody would ever ask me that. And I said, every time they said check one, that's what they were asking me. That's what it felt like to have to check one of those boxes; either I was choosing my mother or my father, and I was not allowed to choose both.
NORRIS: Dave Kung said that when he received the 2000 census and for the first time was able to check more than one box, he was in his apartment; he sat down on his couch, and he cried.
INSKEEP: And you can hear more of his story at npr.org. NPR's Michele Norris is curator of the Race Card Project. Michele, thanks for coming by.
NORRIS: Thank you, Steve.
INSKEEP: Talk to you again soon. Transcript provided by NPR, Copyright NPR.</s>
|
<urn:uuid:0162e142-714a-4d26-875c-4ffc1a57f592>
|
CC-MAIN-2015-32
|
http://krwg.org/post/when-youre-mixed-race-just-one-box-not-enough
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.986887
| 2,560
| 2.515625
| 3
|
BOGOTA, Colombia (AP) — Colombia reduced its area under coca cultivation by 25 percent last year, the United Nations said Thursday, meaning Peru has likely surpassed it as the world’s No. 1 cocaine-producing country.
The annual reduction was Colombia’s biggest since the international body began monitoring it in 2001.
The U.N. Office of Drugs and Crime is not slated to release 2012 Peru coca crop numbers until next month.
Earlier this week, it announced that Bolivia’s crop, the world’s third-largest, dropped for a second straight year.
The UNODC said the Colombian coca crop fell to 185 square miles (48,000 hectares) last year from 247 square miles (64,000 hectares) in 2011. It placed Peru’s crop at 240 square miles (62,500 hectares) in 2011.
Peru says it destroyed 54 square miles (14,000 hectares) of coca last year, all manually. That compares to 505 square miles (131,000 hectares) eradicated in Colombia, most via U.S.-funded aerial spraying.
Neither UNODC officials in Peru’s nor the country’s drug czar, Carmen Masias, would comment on whether Peru has passed Colombia.
Former Peruvian drug czar Ricardo Soberon said there is little doubt that Peru’s crop is now bigger, although he has little faith in either the U.N. or the U.S. measuring methods.
“There is more area (under cultivation), and more unrefined cocaine,” he said. Much of it is being smuggled eastward via small plane to Bolivia for final processing, he said.
That cocaine almost exclusively serves the Brazilian, Argentine and European markets while Colombian cocaine is primarily shipped to the United States.
Colombian and U.N. authorities attributed the big drop in Colombia’s coca crop last year to repeated eradication of land where coca growers have tried to replant and to a migration of a lot of coca growers to mining.
Coca bushes on such parcels are relatively immature and yield fewer leaves than more mature plants, explaining why Colombia’s potential cocaine production only dropped 10 percent last year to 345 metric tons, by U.N count.
In neither Peru nor Bolivia does the U.N. make estimates of potential cocaine production.
The U.N. says Bolivia’s coca crop is currently at 90 square miles (23,500 hectares).
U.S Drug Enforcement Administration agents are active in supporting local law enforcement in Colombian and Peru but were kicked out of leftist-led Bolivia in 2008 for allegedly inciting the political opposition.
Associated Press Writer Frank Bajak reported from Lima, Peru</s>
|
<urn:uuid:aa63f3ee-e3c1-4097-a931-4502e6b7b5b2>
|
CC-MAIN-2015-32
|
http://ksnt.com/2013/08/08/un-colombia-coca-crop-down-25-percent/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.927375
| 574
| 2.859375
| 3
|
Stolen California Petroglyphs Returned, But Many Questions Remain
ROBERT SIEGEL, HOST:
Well, now to the publishing past, the very ancient past. In California last fall, a set of petroglyphs was stolen from a sacred Native American site. They were brazenly sawed and chiseled out of the face of a rock formation. The petroglyphs are believed to be more than 3,000 years old. And now, they've been found. Still, authorities don't know who took them or why. Here's NPR's Kirk Siegler reporting from Bishop, California.
KIRK SIEGLER, BYLINE: The sun is just coming up on the dramatic snowcapped peaks of the distant Eastern Sierra as Raymond Andrews slides out of a jeep and into the crisp, early morning.
(SOUNDBITE OF FOOTSTEPS)
SIEGLER: An ancient riverbed crackles beneath his feet as he walks through dusty sagebrush and stops in front of a small cliff.
RAYMOND ANDREWS: Then you see where there's kind of like a cut out there.
SIEGLER: Andrews is the Bishop Paiute Tribe's historic preservation officer. He points to white etchings - drawings of deer, snakes and circles. But in one small spot, there's only rubble.
ANDREWS: It seems like something's been severed.
SIEGLER: Literally. That's what thieves did here last fall. They came into this remote basin undetected and used sophisticated saws and tools to chisel out five different rock panels on which ancient petroglyphs were drawn.
ANDREWS: You see the saw marks around it?
Was it a malicious act directed at the tribe who considers this area sacred, or were these panels worth something on the black market? Andrews doesn't know. He's just glad to have them back. He knew they'd return.
ANDREWS: People have taken things from Hawaii, and they get back home. And the Hawaiians tell them, you know, bad things are going to happen to you. And then that's pretty much the belief of all the indigenous peoples. So we were thinking the same thing.
SIEGLER: Authorities were led to the petroglyphs late last week, thanks to an anonymous tip. It came in a letter to the local Bureau of Land Management office in nearby Bishop.
BERNADETTE LOVATO: It was one of the worst things I've seen in my federal career.
SIEGLER: Bernadette Lovato is BLM's field manager here.
LOVATO: It was not done with surgical precession. It's very ugly. And the scars out there are going to be with us for a very long time.
SIEGLER: And the five panels themselves are ruined. They'll never be returned to the site. Lovato says the investigation is continuing, and she's tightlipped about any more details. What is known is that stealing or defacing cultural artifacts on federal land is a felony, punishable by jail time and up to a $20,000 fine.
(SOUNDBITE OF A VEHICLE)
ANDREWS: Because they used to have a chain-link fence up.
SIEGLER: Back at the site, there are now surveillance cameras, and the BLM is ramping up patrols. Bishop Paiute tribal member Raymond Andrews says they want to keep historical areas like these open. But he says the tribe and the BLM have taken down marker signs and stopped promoting the area to tourists.
ANDREWS: It's a nice site. It's nice, you know, it's a nice setting and - but it's not helping us. It's not helping us protect it.
SIEGLER: Indeed, there are concerns all this publicity will encourage more thefts and vandalism. Kirk Siegler, NPR News.
(SOUNDBITE OF MUSIC)
AUDIE CORNISH, HOST:
You're listening to ALL THINGS CONSIDERED from NPR News. Transcript provided by NPR, Copyright NPR.</s>
|
<urn:uuid:4c79d9ab-d25e-4c87-9f9e-8a3f2e5ddb51>
|
CC-MAIN-2015-32
|
http://ktep.org/post/stolen-california-petroglyphs-returned-many-questions-remain
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.96437
| 866
| 2.8125
| 3
|
The purpose of screening is early diagnosis and treatment. Screening tests are administered to people without current symptoms, but who may be at high risk for certain diseases or conditions.
During regular check ups, your doctor will ask lifestyle questions, including those about alcohol use. Brief questionnaires may also be used to help identify unhealthy alcoholic habits. An honest conversation with the doctor is important for all aspects of health.
- Reviewer: Peter J. Lucas, MD
- Review Date: 02/2014 -
- Update Date: 04/10/2015 -</s>
|
<urn:uuid:fc6677a1-ccf8-43e2-bc2a-9bf633692811>
|
CC-MAIN-2015-32
|
http://largomedical.com/hl/?/19042/Are-there-screening-tests-for-alcoholism
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.885736
| 112
| 2.546875
| 3
|
Dr. Martin Luther King, Jr. worked for racial equality and civil rights in the United States. Download this puzzle and see if you can arrange the events into the correct order. Some stickers have extra information or links where you can learn more about the event. Before starting the puzzle you can click the web link to read a PDF with a short biography.
Download the puzzle file: Open this link on your iPad and then choose to Open in Stick Around. You need to have Stick Around installed on your iPad in order to play this puzzle. Download Stick Around from the App Store.
What's better than playing a puzzle? Creating one yourself! Perhaps your students can make sequencing puzzles from the biographies of other famous civil rights leaders.</s>
|
<urn:uuid:6c8900f8-bb5e-49c8-88f3-d1b2211ecfce>
|
CC-MAIN-2015-32
|
http://learninginhand.com/stickaroundblog/2014/1/8/dr-martin-luther-king-jr-timeline
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.926101
| 148
| 3.765625
| 4
|
At 08:20 PM 1/10/2007, Daron J. Wilson wrote:
> > NOT .. means "Universal High Frequency"
> > (Have heard others .. but it did NOT mean Ultra High Frequency --- no
> > way!)
>Do you have one shred of support for this bogus claim? Every reference I've
>checked on my bookshelf defines it as Ultra High Frequency, which it was at
>the time the definition was proposed. So...show me the money. A simple
>google search for the definition of UHF will show you many reputable
>resources defining it as Ultra High Frequency.
>Share the knowledge!!
It's a bit tricky tracking this stuff down. But, so far, I have
found that the UHF connector was invented by E. Clark Quackenbush at
the American Phenolic Company (Amphenol) in the 1930s. (at least this
is what the Amphenol RF catalog says)
One also might find this
an interesting summary.
That ap note cites an IEEE paper by Bryant in the IEEE Trans on MTT, Sept 1984
It also cites a paper about blue dot precision N connectors published
at JPL (so now I know what those connectors are down in the lab.)
Another source (one Andrew Emmerson) credits Quackenbush, and
comments that in the late 30s, UHF meant frequencies over 100 MHz.
TowerTalk mailing list</s>
|
<urn:uuid:5a5a0ac1-d913-4fdd-9760-60dbaf32d4ba>
|
CC-MAIN-2015-32
|
http://lists.contesting.com/_towertalk/2007-01/msg00412.html?contestingsid=osjdn79spq0pgimm7jti4j2ji7
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.888722
| 308
| 2.625
| 3
|
By Erika, Pure Matters
One of the most important nutrients we need on a daily basis is calcium. Our bodies need calcium to maintain healthy bones and teeth as well as to help muscles and nerves to carry messages between the brain and other body parts. Lots of us aren’t getting enough calcium regularly, which can lead to issues such as osteoporosis or risk of bone fractures in the long term, especially as we get older.
Keep your bones and teeth healthy by exercising regularly, eating foods that contain calcium, and taking supplements. Calcium comes in a variety of food, including the following:
- Dairy: Milk, yogurt, cheese
- Vegetables: Kale, broccoli, Chinese cabbage
- Fish: Sardines, salmon
- Grains: Breads, pasta, unfortified cereals
Healthcare providers often recommend that adults, especially women, take calcium supplements regularly to maintain healthy bones. The amount that you need varies with age. Check out the National Institutes of Health’s Office of Dietary Supplements for average recommended daily doses by age group.
Calcium supplements may interfere with some medications, so make sure to check with your healthcare provider before starting a regular supplement plan.</s>
|
<urn:uuid:5ba87e03-1cad-4d4a-a016-0bfd01ae78a5>
|
CC-MAIN-2015-32
|
http://m.clickorlando.com/Why-you-need-a-daily-dose-of-calcium/16564694
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.936082
| 248
| 3.125
| 3
|
Ask the Ombudsman
Q: Are albino or partial albino game animals protected from harvest?
A: No, in Missouri they fall under the same regulations as the normally colored animals. One reference estimated the frequency of true albino deer as about one in 30,000, though partially albino (also called piebald) deer occur somewhat more frequently. It is not unusual for albinism to be associated with poor eyesight and other disabilities that can affect the survival of those animals in the wild. To artificially protect the occasional albino individuals would allow those negative characteristics to become more frequent in the population. I do think that many Missouri deer hunters would be reluctant to shoot an albino animal. A few states prohibit the harvest of albino deer, for cultural rather than biological reasons, but most wildlife management agencies have not taken that position.
Q: If deer have a life expectancy of 5 to 6 years, why do you never find dead deer in the woods or fields that have died from natural causes?
A: Your life expectancy numbers include the probability of unnatural death. Deer are in the prime of life between 2.5 and 7.5 years of age, and some may live for 15 years in the wild. Excluding hunting and disease outbreaks, the annual mortality of deer older than 6 months of age is less than 5 percent. That’s fewer than five deer out of a hundred dying natural deaths each year, and those deaths are spread out over 365 days of the year. During warmer seasons, deer carcasses will “melt” into the ground quickly and can easily go unnoticed. When deer that die from natural mortality are observed, we may assume incorrectly that the carcasses resulted from deer that were killed by hunters or vehicle collisions. This year there has been an increase in deer mortality from hemorrhagic disease.
Encouraging Safe, Knowledgeable and Responsible Hunters
One of the most rewarding aspects of being an active outdoors enthusiast is passing on your knowledge and experience to someone else. Whether by participating in outdoor activities within your community, taking a child hunting or fishing, or inviting someone else to go hunting with you. The time you invest in such a project is well worth it. For many new hunters, this journey starts by attending a hunter education course.
This course focuses on producing knowledgeable, responsible, and involved hunters and reducing the number of hunting incidents. In Missouri, every hunter born on or after Jan. 1, 1967, must complete an approved hunter-education program in Missouri or another state to buy firearms hunting permits, with a few exceptions. One of those exceptions involves hunting with the Apprentice Hunter Authorization.
Apprentice Hunter Authorizations are designed to help introduce adults to hunting. MDC allows hunters age 16 and older who are not hunter-education certified to hunt with firearms, as long as they take all three of these steps:
- Purchase an Apprentice Hunter Authorization.
- Purchase a hunting permit for the season they want to hunt.
- Hunt in the immediate presence of a properly licensed adult hunter who is 18 years of age or older and has in his/ her possession a valid hunter-education certificate card, or was born before January 1, 1967.
This authorization may be purchased annually for no more than two permit years (March 1 through the last day of February).
Safety is the number one priority. Here are some tips to help you stay safe this season:
- Always point the muzzle in a safe direction.
- Unload your firearm before crossing obstacles, approaching populated areas such as parking lots and campsites, or climbing up or down tree stands.
- Let someone know where you will be hunting and when you plan to return home.
- Inspect and clean your equipment before taking it afield.
- Always use a safety harness while in a tree stand.
- Hoist your unloaded firearm into your tree stand after you are secured.
- Bring binoculars or a spotting scope with you to properly identify wildlife. NEVER use your mounted sight until you KNOW what you are aiming at.
- Make sure your target has a safe backstop. It is easy to get caught up in the excitement of the hunt. Next time you come to a fence crossing or begin to climb your tree stand, just remember to take your time and be safe.</s>
|
<urn:uuid:d3dc4b95-5be4-4285-86f6-ec7742ef8ae4>
|
CC-MAIN-2015-32
|
http://m.mdc.mo.gov/conmag/2012/11/miscellany
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.950861
| 884
| 3.125
| 3
|
In the Democratic Republic of Congo an estimated 6.7 million people (11% of the rural population) are in Crisis and Emergency food insecurity phases (phases 3 and 4, respectively), based on the Integrated Food Security Phase Classification (IPC) undertaken in December 2013. The situation remains worrying especially in territories of Irumu (Orientale), Punia (Maniema) and Manono, Mitwaba and Pweto (Katanga). In these zones, conflict is the main driver of food insecurity.
A joint vulnerability assessment carried out in February-March 2014 in North Kivu indicated that 64% of households in resettlement camps and sites are vulnerable to food insecurity. Vulnerability to food insecurity in the camps and resettlement sites is generally driven by extreme poverty which also affects 95% of the population in DRC.</s>
|
<urn:uuid:14d6d850-ea8d-4d91-810d-e61ed96127af>
|
CC-MAIN-2015-32
|
http://m.wfp.org/countries/congo-democratic-republic-of/food-security/overview?device=mobile
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042981460.12/warc/CC-MAIN-20150728002301-00000-ip-10-236-191-2.ec2.internal.warc.gz
|
en
| 0.932413
| 169
| 2.65625
| 3
|